Showing posts with label CCTV. Show all posts
Showing posts with label CCTV. Show all posts

Sunday, December 3, 2023

6 Reasons your business needs gates and barriers

6 Reasons your Business Needs Gates & Barriers 

Although the onset of the coronavirus saw a significant decrease in crime rates across the India due to enforced lockdown, there are very few reasons for businesses to take this as a sign of things to come. Indeed businesses should take this time to consider their security protocols and begin to address any shortcomings in good time as restrictions lift. Here we will look at some of the benefits of two of our most popular forms of perimeter security: gates and barriers.
1 – Barriers and gates are strong deterrents against crime
Time and time again we hear stories of criminals that have acted on opportunity when committing a crime. A broken fence, unlocked door, insufficient lighting, the list goes on. Having outdated, broken or a complete lack of perimeter security almost guarantees you to be viewed as an easy target by criminal gangs. Barriers and gates are the first port of call for many perimeter security overhauls because they actively send out a message that your business is not going to be easy pickings.
 
2 – Barriers and gates allow you to control movement
While tools like CCTV are a great way to monitor the flow of traffic and pedestrians throughout your site, they do nothing to act on it. One of the main shortfalls of CCTV is that it simply takes a record of actions. The job of dealing with any issues is left to others. With barriers and gates, you can proactively limit entry to your site. With the use of pin pads, tokens, and fingerprint recognition you can reduce the need for manpower to administer front-of-house duties.
 
3 – Real-time savings
This brings us to our next reason to invest in gates and barriers. Perimeter security is essentially an investment in your future. These enhancements protect you from the disasters that follow on from a serious crime. Businesses that are victims of serious crimes like theft, burglary, vandalism, and arson can face significant losses in several different ways. The initial impact of stock loss or damage, losses from downtime for your business, and an impact on your customer relationships or reputation are all very real consequences. They can be successfully averted by investing in your security needs before the worst happens.

 
4 – Curb appeal
Gates and barriers are often the first thing that visitors to your site or passers-by will see. A high-quality installation will provide a level of professionalism to your company brand and reputation and show that you care about the safety of your employees, assets, and visitors.
 
5 – Privacy
For businesses that operate in sensitive areas or highly competitive fields, privacy is often high on their agendas. Gates and barriers extend your footprint to the far exterior of your property and mean that the only people who can approach your site are those who you have given explicit authorisation to do so.

6 – Restrict vehicular access
Smash and grab type crimes are on the rise. This is when a perpetrator uses a vehicle to approach their target quickly, commits their crime, and then escapes again before the police arrive. By utilising gates and barriers you can effectively shut down the chances of a speedy approach or escape and thwart their plans.
 
No matter the size or nature of your businesses, we can provide you with a free, no-obligation quotation and feasibility survey to assess the security requirements of your organization. For more information on any of the security options above, or for further advice on how to protect your business premises from criminals, please contact us on ssaintegrate@gmail.com


Wednesday, March 15, 2023

Camera Ban Due to Zero Cyber Security

 Camera Ban Due to Zero Cyber Security

Since what some experts considered a password-free engineering hack was found between firmware layers in HikVision cameras around 5 years ago, CCTV cameras manufactured in China have been squeezed from Australian federal government contracts, despite the fact no Chinese-made video surveillance camera in Australia (or anywhere else in the world) has been found transmitting video streams to the Chinese Government. 


The US communications regulator singled out tech giants Huawei and ZTE and surveillance camera makers Hikvision and Dahua. Spy chiefs have warned that the US could be vulnerable to economic espionage or digital sabotage.

The UK Government departments have been told to stop installing surveillance cameras made by Chinese companies on "sensitive sites" because of security concerns.

Both the UK and Scottish governments have banned Hikvision plus other PRC providers from certain government usage for national security reasons, in a sea change for UK video surveillance.

The Governor of New Hampshire has banned products from certain PRC companies including Dahua, Hikvision, and TikTok for use on state networks or devices in an executive order.

Security threat accusation is made against the Smart City project. The Mangaluru City Corporation (MCC) has installed Hikvision brand CCTV cameras in the city. This company is of China origin.

The Indian government has restricted PRC manufacturers such as Dahua and Hikvision from bidding on Indian government projects.


At this point, it’s worth noting that almost all professional CCTV cameras are installed on secure subnets supported by dedicated switches, servers, and video management systems, or they are installed standalone on DVR and NVRs. These systems log network actions from authorised users, including camera views, saves, searches and applications of analytics functionality, where this applies.

It goes without saying that no pro-grade network intrusion detection system could fail to alert network engineers to the transmission of big band video signals from secure network ports to an external network location. It would generate an immediate alert, remedial action and public condemnation.

While IP cameras can upgrade firmware automatically over public networks and will undertake handshakes with a manufacturer’s servers, these actions are ubiquitous across network devices of all types and, in the case of CCTV cameras, can be deactivated, with devices either left using original firmware, or upgraded manually.

Typically, network-based electronic security systems are updated manually by security teams managing system maintenance. These Australian security techs are highly integrated with an end user’s security operations team and will respond at a moment’s notice to issues of camera performance, network failure, or network breach.

Further, in compact applications, such as in the suburban high street offices of MPs, 3-4 CCTV cameras are installed in a basic star configuration that revolves around a PoE NVR/DVR supported by a dedicated keyboard, mouse and monitor. They are not connected to local data networks, let alone hooked to out of country servers – unlike a significant number of other manufacturers, neither Hikvision nor Dahua offers VSaaS in Australia.

Typically, the basic turret cameras used in such applications are mid-wide angle, have modest resolutions, fixed lenses, and are installed with an outward-facing angle of view covering front and rear entrances, car spaces and foyers to allow recording of events for police investigation after an incident.

Recordings are undertaken on local hard drives and written over after 30 days. Viewing of footage and event searches can only be undertaken by a person with access control rights to the location, and who is authenticated with a password issued by a nominated system administrator – typically an admin assistant or office manager who works on-site.

These cameras are installed for safety and security, not to ‘spy’ on MPs. Nor are these cameras being ‘found’ by shocked staffers in third-tier government applications, as if the cameras crept in at night and hung themselves onto walls, as some news websites have implied.

These CCTV systems were installed in plain sight by professional Australian security technicians using products supplied and supported by professional Australian security distributors with technical support from suppliers’ local operations, after an official government tender process.

These cameras and related systems were chosen by government decision makers because they offered the best performance for the least cost. This is not an imperative that will change when government agencies next take locations with modest security requirements to tender.

Similar strictures around installation and governance apply to the 11 Hikvision cameras at the Australian War Memorial, which are likely external bullet cameras installed to view choke points and entries, and are entirely governed by local subnet rules and managed and viewed using an over-arching video management system provided by a third party.

This server-based VMS brings together all the cameras across the site onto a video wall for monitoring by a dedicated security team. It’s normal for a major site like the Australian War Memorial to have multiple camera brands and camera types installed for different reasons at different times with different priorities of budget. Expensive upgrades are undertaken in stages.

Milestone has discontinued technology partnerships with "mainland China" companies, including mega-manufacturers Dahua and Hikvision, the company confirmed to IPVM.

Ambarella, a major supplier of AI chips for IP cameras, has stopped selling to Dahua, Ambarella confirmed to IPVM.

Western Digital and Seagate are no longer selling to Dahua due to US semiconductor export controls imposed on Nov 2022, IPVM has confirmed with WD directly and from sources for Seagate.

ADI has stopped relabeling Dahua, a year after the company secretly started selling relabeled Dahua gear as an ADI house product, despite the NDAA ban, human rights sanctions, and the FCC designation of Dahua as a threat to national security.

The most cyber secure IP surveillance camera is Mobotix, however, the Australian government rarely uses this brand, despite its enormous operational flexibility and impeccable cybersecurity credentials. Bosch, Axis and iPro are also highly regarded, and tier 1 offerings from everyone else – including HikVision and Dahua, which put considerable effort into cybersecurity and transparency to correct early issues that impacted all CCTV camera makers – are close behind.

Unsurprisingly in the current geopolitical climate, Chinese CCTV cameras are by far the most examined network devices when it comes to cyber security, and their camera firmware and supporting management solutions are constantly trawled through by experts looking for issues in devices that, despite their ‘surveillance’ function, are static edge sensors, governed by the settings of the network switches and servers that manage them.

It’s impossible to believe the Australian government’s highly qualified cybersecurity experts are not perfectly aware that edge devices, like CCTV cameras, when properly commissioned and installed on well-designed and secure data networks, are impossible to access remotely, and can’t be infected by ‘spyware’ in the way a mis-managed workstation or laptop might be.

Instead, they must be acutely aware the greatest security threats to security systems are posed by errors in network application, a failure to activate camera cybersecurity settings during installation and pre-commissioning, and weaknesses in the physical security around network components. And cybersecurity experts must know such risks apply to every networked device across a department’s topology – phones, switches, wired and wireless routers, laptops, servers, apps – not just to devices offering click-worthy headlines.

In our opinion, given the highly evolved state of cybersecurity in professional CCTV cameras (and intercoms), the possibility edge devices in secure subnets from any camera manufacturer, could suddenly breach network security settings and start operating unilaterally is so vanishingly small that cybersecurity can’t be the problem.

Instead the government’s core issue seems to be one of uncertainty and misunderstanding around a technology that, when properly installed and managed, leaves virtually no room for uncertainty at all.

Ref:
IPVM Portal
Sen network
US, UK web pages

Tuesday, February 14, 2023

Trends at the intersection of video and AI

Trends at the intersection of video and AI 

Installation and use of CCTV Cameras for security & surveillance is a no-brainer. Cameras are considered a fundamental commodity for setting up any surveillance infrastructure, but at the same time, 24×7 monitoring of hundreds or thousands of video feeds by operators doesn’t serve the purpose of providing proactive surveillance and quick response to breaches.

2022, where most security cameras deliver HD performance, with more and more models offering 4K resolution with 8K on the horizon. Advanced processing techniques, with and without the use of infrared illuminators, also provide the ability to capture usable images in total darkness; and mobile devices such as drones, dash cams, body cams, and even cell phones have further expanded the boundaries for video surveillance. Additionally, new cameras feature on-board processing and memory to deliver heightened levels of intelligence at the edge.

But video has evolved beyond the capabilities of advanced imaging and performance to include another level:  Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise.

This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends:

 

1) Purpose-built performance

Several video analytics technologies have become somewhat commoditised “intelligent” solutions over the past few years, including basic motion and object detection that can be found embedded in even the most inexpensive video cameras. New, more powerful, and intelligent video analytics solutions deliver much higher levels of video understanding.

This is accomplished using purpose-built deep learning, employing advanced algorithms and training input capable of extracting the relevant data and information of specific events of interest defined by the user. This capability powers the automation of two important workflows: the real-time monitoring of hundreds or thousands of live cameras, and the lightning-fast post-event search of recorded video. Vintra video analytics, for example, accomplishes this with proprietary analytics technology that defines multi-class algorithms for specific subject detection, classification, tracking, and re-identification and correlation of subjects and events captured in fixed or mobile video from live or recorded sources.

 

2) Increased security with personal privacy protections

The demand for increased security and personal privacy are almost contradictory given the need to accurately identify threatening and/or known individuals, whether due to criminal activity or the need to locate missing persons. But there is still societal pushback on the use of facial recognition technology to accomplish such tasks, largely surrounding the gathering and storage of Personally Identifiable Information (PII).

The good news is that this can be effectively accomplished with great accuracy without facial recognition, using advanced video analytics that analyse an individual’s whole-body signature based on various visual characteristics rather than a face. This innovative approach provides a fast and highly effective means of locating and identifying individuals without impeding the personal privacy of any individuals captured on live or recorded video.

 

3) Creation and utilisation of computer vision

There are a lot of terminologies used to describe AI-driven video analytics, including machine learning (ML) and deep learning (DL). Machine learning employs algorithms to transform data into mathematical models that a computer can interpret and learn from, and then use to decide or predict. Add the deep learning component, and you effectively expand the machine learning model using artificial neural networks which teach a computer to learn by example.

The combination of layering machine learning and deep learning produces what is now defined as computer vision (CV). A subset but more evolved form of machine learning, computer vision is where the work happens with advanced video analytics. It trains computers to interpret and categorize events much the way humans do to derive meaningful insights such as identifying individuals, objects, and behaviours.

 

4) Increased operational efficiencies

Surveillance systems with a dozen or more cameras are manpower-intensive by nature, requiring continuous live or recorded monitoring to detect and investigate potentially harmful or dangerous situations. Intelligent video analytics, which provides real-time detection, analysis, and notification of events to proactively identify abnormalities and potential threats, transform traditional surveillance systems from reactive to proactive sources of actionable intelligence. In addition to helping better protect people, property, and assets, advanced video analytics can increase productivity and proficiency while reducing overhead.

With AI-powered video analytics, security and surveillance are powered by 24/7 technology that doesn’t require sleep, taking breaks, or calling in sick. This allows security operations to redeploy human capital where it is most needed such as alarm response or crime deterrence. It also allows security professionals to quickly and easily scale operations in new and growing environments.

 

5) A return on security investment

The advent of advanced video analytics is slowly but surely also transforming physical security systems from necessary operational expenses into potential sources of revenue with tangible ROI, or as it is better known in the industry, ROSI – Return on Security Investment. New video analytics provide vast amounts of data for business intelligence across the enterprise. Advanced solutions can do this with extreme cost-efficiency by leveraging an organization’s existing investment in video surveillance systems technology.

This easy migration path and a high degree of cost-efficiency are amplified by the ability to selectively apply purpose-built video analytics at specific camera locations for specific applications. Such enterprise-grade software solutions make existing fixed or mobile video security cameras smarter, vastly improving how organizations and governments can automatically detect, monitor, search for and predict events of interest that may impact physical security, health safety, and business operations. For example, slip-and-fall analysis can be used to identify persons down or prevent future incidents, while building/area occupancy data can be used to limit crowds or comply with occupancy and distancing guidelines. In this way, the data gathered is a valuable asset that can deliver cost and safety efficiencies that manual processes cannot.

 

6) Endless applications

The business intelligence applications for advanced video analytics platforms are virtually endless including production and manufacturing, logistics, workforce management, retail merchandising and employee deployment, and more. This also includes mobile applications utilising dashboard and body-worn cameras, drones, and other forms of robotics for agricultural, oil and gas, transportation, and numerous other outdoor and/or remote applications.
An added benefit is the ability to accommodate live video feeds from smartphones and common web browsers, further extending the application versatility of advanced video analytics.


Indian Army to be equipped with AI-based threat assessment software linked to national databases
The Indian Army will soon get help from artificial intelligence to analyse threats during operations, especially in sensitive areas like Jammu and Kashmir. The ministry of defence is planning to equip the army with an AI-based threat assessment software that can be linked to national databases such as UIDAI and MoRTH.
According to an official communication, this software will be used to “track vehicular movement, monitor online presence of individuals, including on social media platforms, and derive linkages and patterns”.
The software will help the army in tracking and predicting incidents and the reason behind acquiring such a software is that operations require a detailed threat assessment. As of now, details of threat assessment are not available with either security forces or law enforcing agencies but only restricted information is available in the form of registers, both at company operating base (COB) levels and with other headquarters.
“Since the data is either non-existent or is recorded in legacy formats (documents and registers), no methods are available with SF for historic correlation of incidents due to which incidents cannot be tracked or predicted,” the official communication states.
The solution: “an AI-based networked solution that will enable storage and analysis of data to track and predict incidents. Details can be linked with national databases such as UIDAI, MoRTH in order to track vehicular movement, as also monitor online presence of individuals including on social media platforms and derive linkages and patterns”.
The software will have the ability to import data available with other agencies. It will enable central collation of details from various patrols with real-time data visibility at all outstations. According to the MoD, this software will be able to integrate legacy unstructured data available in different formats and provide actionable intelligence by combining different databases through the use of AI and data analytics techniques.
The software application is designed to integrate AI and machine learning (ML) aspects with existing known datasets, thereby giving commanders and staff a comprehensive and common picture with regard to operations intelligence, including the capability to carry out data processing in terms of staff checks, query management, use of business intelligence and visualisation to arrive at a course of actions and also assist in ruling out less viable options.
“As the system is being planned keeping in mind the automation requirements of the Indian Army for intelligence generation, the system will be designed for exploitation by AI and ML aspects,” the MoD said. The software will facilitate display and exchange of information over encrypted and secured internet connection and facilitate day-to-day functioning of operations and intelligence gathering and collating at various headquarters, and also facilitate commanders in decision making by incorporating appropriate inputs.
Adequate security measures will be ensured as per the latest guidelines or policies of army cyber group (ACG) system. It will have NLP (natural language processing) models in English, Hindi, Pashto, Arabic, and Urdu to automatically extract intelligence from generated reports, inputs, open source documents and memos.
It will be capable of conducting video and image analytics for raw camera footage from CCTV cameras, social media videos, images among others. The whole idea is to generate actionable intelligence and ability to do dark and deep web monitoring and analysis.

Thursday, September 15, 2022

The 5 D’s Of Outdoor Perimeter Security For Business

The 5 D’s Of Outdoor Perimeter Security For Business 

When it comes to your business, you must ensure that every inch of it is protected. Many people ignore the outdoor perimeter of their establishment and focus on the inside. However, the outdoor security of your business is equally important. To protect your building’s entire structure, there is a key security principle that you can use: The five D’s. They are Deter, Detect, Deny, Delay and Defend. Each plays a specific role in securing your business’ exterior.

Deter

Your first line of defence is deterrence. In order to keep criminals away, you have to deter them from even thinking about setting foot on your property. To create a shield of deterrence, you need to start simple with signs. Put up signs that say “No Trespassing,” “Property Under Surveillance,” “We review CCTV footage Everyday”, “Guard Dog on Premises” and “Security Personnel On Duty 24-7.” You may not have a guard dog but the suggestion of one could be enough to keep criminals at bay. Another line of deterrence is to have surveillance technology. Having CCTV security cameras visible will discourage criminals.

Detect

Protect your building’s perimeter with equipment that can detect trespassers. Surveillance cameras, motion sensors, and other security equipment that can sense movement are all must-haves to ensure that anything out of the ordinary is detected.

Deny

To keep your perimeter secure while letting authorized personnel come and go, you need to deny those who aren’t supposed to be there. With a manned security gate at the main point of entry, anyone who isn’t supposed to be coming and going will be stopped immediately. Another way to deny criminals entrance to your property is with card access. This is an added security measure that ensures that even when people are in the building they need to use an access card to get into certain areas. You can even have your employees scan their cards at the manned security gate.

Delay

A delay system should be in place in case something should go wrong with your security system and an intruder is able to penetrate the building’s perimeter. This can be done through interior locking doors and barriers. By having a delay system you give your security team and the police enough time to respond to the intrusion and the criminal cannot get away.

Defend

To defend your perimeter against intruders you will need the help of local law enforcement and your security personnel. This involves having a protocol in place for making sure a criminal is being watched during the time period after they’ve been apprehended by your security personnel, and the time law enforcement arrives scene.

Creating optimal outdoor perimeter security requires planning. However, once you have the Five D’s in place, you can rest assured that your business is safe.

For, free suggestion consultancy about security alarm system can contact SSA Integrate via mail ssaintegrate@gmail.com 


Monday, November 15, 2021

Should I Upgrade My Existing Security System?

Should I Upgrade My Existing Security System? 

A security system is designed to do one thing: keep you, your property, and those you care about safe. However, if you are using a security system that is ten or more years old, it may not be able to provide you with the level of security you want or need. Not only are older systems susceptible to malfunction, but since they are less sophisticated than systems available today, they put you at risk of malicious activities by tech-savvy thieves.

Unsure how to decide whether it is time for your upgrade? Below are three reasons that you should consider installing a new security system today!

Here are four signs it is time to upgrade your security system:

1. Dated technology
Security systems are not a once-in-a-lifetime investment. Like any piece of technology that you purchase, they have to be frequently updated and maintained to optimize their functionality. Your security system is like a phone — it requires periodic investment and replacement over time, not to mention that since technology changes so quickly, your device could soon become obsolete.

2. Alarm safety
Before the days of wireless data, security systems were operated via land lines with wires that could be easily manipulated by unwanted intruders. Luckily, since modern alarm systems operate using cellular transmitters to send and receive messages, they provide a safer alternative for homeowners.

At Video, Intrusion or Fire Monitoring in India, we have partnered with Netra Monitoring to provide customers with specialized Interactive Alarm Monitoring services, including home automation, remote arming and disarming, thermostat control, video surveillance and much more. Unlike an outdated security system, the Alarm Monitoring service feature can be managed centrally for one location or multiple locations through an app on your iPhone, iPad, or Android-powered device.

Your safety is of the upmost importance, but with Netra Monitoring, it doesn’t have to be an inconvenience.

3. Transmission
The biggest reason security systems become obsolete is that technology becomes outdated. Since most modern security devices use the same towers as cellphones to send and receive alerts, it is most likely that the reason your product will be unusable is that, much like a cell phone, the network it uses to operate is no longer available.

The good news is that there is often quite a bit of overlap in what networks are available. For instance, 2G technology is being phased out, but 3G, 4G, and 5G are still available and often work interchangeably.

What is great about a system that works on this kind of network is that while 2G will soon be unavailable, you don’t have to replace your entire system to still use it. Often, you will need to replace a small component to keep it running.

4. Protecting Your Investment
The best way to ensure that you are getting the most out of your investment is to purchase your new security system from a company that is dedicated to making your experience with their product the best one possible. At Fire Monitoring at India, we perform regular service and maintenance on your products and make sure you are informed of any upgrades that your system requires and technology changes or your system ages.

We think of keeping an alarm system up-to-date as being similar to maintaining a car. Just because your car gets old doesn’t mean it is useless — if something breaks, you fix it and keep on driving. By working with one of our technicians, you will get more life out of your equipment than you ever imagined and be able to enjoy the safety you deserve for years to come.

When your security system becomes an afterthought – and eventually an outdated afterthought – it leaves your building vulnerable.

Netra Monitoring installs custom-designed, scalable, user-friendly usable commercial intrusion alarm systems, and we feel that even the least experienced user will be able to use our systems with the proper training. Netra Monitoring also work for Central Alarm Monitoring with Video Verification services in India.



Wednesday, September 1, 2021

IoT is future of Video Technology

IoT is future of Video Technology 

The Internet of Things is about connecting network-enabled devices and exchanging data between them. This offers great potential for improving processes wherever information needs to be exchanged securely and quickly. It enable devices and add much more value than they have had so far. For this, there is no better example than security cameras. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose.

Acting alongside other sensors, such as motion or smoke detectors, security cameras have been in use for a long time, however without being connected to each other through data networks. Growing demands for smart video surveillance in public spaces, commercial buildings, public transport and other areas and the rise of IoT will drive for the further integration of these cameras systems. Let's see how video surveillance has evolved to this day and where the journey is heading.

The past: standard security surveillance systems

Closed-circuit television systems (CCTV) have demonstrated that they can do what they're supposed to: give humans a better eyesight on the security situation in order to reduce security incidents. CCTV cameras can only show and record video footage and not much more beyond that. As they do not understand what they are watching, they are also unable to do anything about it.

To fight theft, violence, vandalism or fire effectively, cameras must be able to detect and interpret such incidents by themselves. They must also have the capability to cooperate with other systems, such as alarm systems.

This is where the Internet of Things comes into play. It connects network-enabled cameras with other devices and systems that perform other tasks and turns security surveillance into smart safety and security management.

Video surveillance systems built the largest segment in our country. That’s why today modern camera systems are widely used in many areas of life, retail, commercial buildings, stadiums, transportation and public spaces in cities.

Security cameras frame the next technological step in the security surveillance evolution…

The future: smart security surveillance

The times when video surveillance systems only deliver video that must be continuously observed by humans are over. Machines able to record and analyse video data in one go are already available, and they can provide security managers with deep insights instead of single pieces of information.

This will significantly improve security and security-related processes in many areas and industries by enabling faster and more insightful response to any sort of incidents.

Future security surveillance essentially combines 3 technologies that will completely change the game: computer vision, automation and deep-learning, driven by powerful processors and apps on cameras in the IoT. Let's take a quick look at these technologies.

Data is the new digital oil

All these devices at their most basic, simply collect data. This information is used to streamline, manipulate and measure the way you interact with the world. From your online habits to your physical day-to-day routine – every single thing you do or don’t do is, or will very soon be, monitored.

In the case of connected ‘things’ – now known as ‘smart devices’ due to their ability to collect and transmit information – each one sends bytes of data over the internet to an application that interprets and collates that data into valuable insights. Your service provider and the product manufacturer can then use those insights to achieve a variety of objectives – from improving the device’s performance, and your experience of using it, to identifying how or when they should be selling you extra services or products.

What precisely is connecting all of these IoT things

2G, 3G and 4G are terms that we all know and understand well but how about radio, Wi-Fi, NB-IoT or LPWAN? There are various types of connectivity that can underpin the Internet of Things and these latter ones are arguably the most widely used outside of pure cellular connectivity.

When we talk about the ‘internet of things’ it’s not immediately clear which type of ‘internet’ connectivity we’re referring to because many devices are now being designed to intelligently select the connectivity that best suits its needs, based on the following three things:

Power consumption – How much power does the device or sensor need to operate?
Range – Does it need to connect and send data over great distances?
Bandwidth – Will it transmit small or large amounts of data e.g. low bandwidth and high bandwidth?

Two of the most commonly utilised connectivity networks are:

Cellular

Most of us are very familiar with cellular connectivity as it is used around the world to connect our mobile phones to the internet. IoT devices also use cell towers to connect to a cellular network. Cellular connectivity is prolific, has excellent range and the capacity to send high volumes of data over the network but uses a lot of power and, therefore, is not ideal for IoT devices which don’t have access to an immediate power supply and need a long battery life to operate over long periods of time, for instance in rural or agricultural areas.

LPWAN

‘LPWAN’ stands for Low-Power Wide-Area Network, which is a type of radio technology and is so far one of the most ideal connectivity networks available to IoT sensors that are deployed in areas where there is a lack of range. These devices are usually battery-powered and send very small packets of data over the network. This connectivity is ideal when it comes to monitoring utilities such as water, gas and electricity using smart meters and for farming and agriculture to check on water quality, sensing soil moisture and tracking livestock.

Computer Vision

Computer vision is becoming smarter because of more sophisticated algorithms, faster devices, larger networks and access to a wider range of data sets through IoT. This allows machines to “see” and analyze in real time.

“Deep Learning and general AI techniques within computer vision, makes possible what would be impossible to do by the naked eye.” - Matt Candy, Global leader for IBM’s iX creative solutions.

Example: Detect fire and smoke within seconds

Many threats, such as smoke, are difficult for the human eye to detect in videos, especially in poor lighting conditions. Seconds later, however, a fire may have broken out. Security cameras equipped with smoke and fire detection can alert at an early stage and activate the proper safety measures without any human assistance.

Source: Bosch Security Systems

Automation

Speed plays an important role in safety and security. The faster you react to security incidents, the greater the chance of preventing or at least reducing damage. In case of theft in a store, every second counts, because criminals may disappear before security personnel can intervene.

Standard security surveillance via CCTV wastes valuable time because reaction paths between machines and human operators are too long. Smart cameras take a shortcut by saving staff from interpreting videos. They immediately deliver notifications or initiate appropriate actions themselves.

Example: Detect and catch thieves in retail

The "AI Guardman" security camera helps shopkeepers identify potential thieves in time. Software installed on the camera scans live video streams and analyzes the poses of any person it can see. This data is automatically matched against predefined "suspicious" behavior. When it sees something remarkable, it alerts onsite personnel via app for double checking.

Deep learning

“Cameras capture the video, but video analytics captures the value.” (IBM)

Using computers for video analysis is not a new idea. However, there is a problem that slows the development of video analytics: mobile video made on drones or vehicles is full of dynamic variables that can confuse even the most intelligent computers. That's why many companies and startups are working on smart systems using self-learning algorithms.

Deep learning is a machine learning method based on artificial neural networks. Video analytics, which gives security cameras the ability to analyze video data on board, is one application of deep learning. Another application is automation, which embeds video analysis into processes.

The good thing about deep learning is that developers of video analytics apps for security cameras don't have to reinvent the wheel themselves. There are already sophisticated frameworks that simplify developing deep learning models, such as Google's Tensorflow, Microsoft’s Custom Vision and IBM’s PowerAI Vision.

Example: Training object recognition using IBM’s PowerAI Vision

To determine whether workers are complying with safety regulations such as wearing helmets, security cameras need to know what helmets look like. In case a person is not wearing a helmet, a camera could react and alert. This is what a simplified training process looks like…

Source: IBM

Flood Management Assistance

As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem.

Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure?

Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event.

Environmental Control Assistance

Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. 

But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary.

Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security.

Roadway Management & Parking Assistance

Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes.

They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database.

With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders.

Shopper Experience Assistance

In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings.

With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience.

For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked.

Capturing Business Intelligence

Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup.

They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns.

Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping.

A Natural Cross-Over Technology

This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond.

IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.


Saturday, May 1, 2021

Video Wall Magic

Video Wall Magic 

Whenever people talk about CCTV, one of the first associations is video walls. No matter how powerful the servers behind, it is the visual that produces the "wow" effect — even on the most tech-savvy customers. Yet, they often back off, having heard the price. And this is where all EVO Global customers clearly benefit: EVO video wall has just got a major enhancement, and it does not cost you a rupee. EVO by LUXRIOT.

Video walls are widely used everywhere from airports to rock concerts. Traditionally, in CCTV their application includes, but is not limited to, showrooms and control centres. To build a video wall, you take narrow bezel monitors, projectors, or TV sets, and tile them together. Depending on the goal, some or all of them may form one huge screen. This resulting "transformer" display is much better rather than just one large display: it offers customizable shape and size, distributed processing, and superior reliability.

Typically, you would employ additional technologies to make several output devices work as one. EVO Global allows casting a single picture onto a combination of displays from separate workstations. Most importantly: without anything other than just regular Windows display management. EVO is one of the most comprehensive enterprise-level VMS solutions on the market, featuring interactive maps linked to alarms; an advanced event and action manager; analytics tools; video wall support and other components you will definitely appreciate. To ensure the safety of your data, the software also offers edge recording for synchronising all data with IP devices storage, archive replication, advanced system health monitoring and failover, which will reduce the disruption of your video surveillance recordings to zero. SSA Integrate is India Regions business partner.

Fantastic Flexibility

Video walls have been available in EVO Global since its very first versions. So what's different now?

Earlier, we already saw how the Luxriot virtual video wall helps organize collections of displays, including those in different locations. Now, EVO Global offers another option: mosaic display, or, according to a customer, "the real video wall". Previously, you could have a virtual collection of screens, scattered across the place, managed from your office. From now on, EVO Global also gives you an opportunity to combine several local screens into one. Both approaches fit into the video wall definition, yet they have different use case scenarios. And, both retain EVO's convenient and flexible management instruments.

In other words, EVO now acts as your video wall controller — no middleware required. The displays may be independent, maybe even driven by different workstations. But, in EVO they behave as a single canvas. Clever algorithms ensure full synchronization between the screens, guaranteeing zero delays.

Such architecture provides notable flexibility. Not only can you re-arrange the displays or add new ones at any point, but you also are free to use variegated hardware. This is true for both workstations and display brands. While a consistent video wall solution looks best on homogenous LCD/LED panel sets, a temporary replacement or a quick demo set-up becomes a piece of cake.

As you would expect, the rest of EVO Global video wall functionality remains the same. Once configured, any video wall screen contents can be controlled from anywhere in the universe.

Smooth Setup

Let's consider a use case. 
Four display panels tiled contiguously, driven by two workstations. The task for EVO will be to display one high-resolution picture using all four screens. Simultaneously, an extra display in the operator's room should preview the same layout.
Briefly, the plan is: create a video wall, install clients, assign client displays to the video wall screens.

Add a single screen video wall in EVO Console

Detailed description

Step 1: in your EVO Console, add a new video wall. For the current setup, the wall layout will be simply one screen, 1x1 grid. We shall use the same video wall screen for both the showroom and the operator's room.

Step 2: install EVO Monitor on all client workstations. The client application does not require a license, and you can use either 32- or 64-bit packages. Each application instance may have one or several windows. Therefore, the four panels can be split between two, three, or four workstations. Let's assume we have two client PCs here, each driving two displays.

Step 3: link physical displays to video wall screens. In this case, we have only got a single video wall screen, and we shall use it twice.

First, in the showroom, all 2x2 displays will belong to the video wall screen with a "tiled" option. To do this, open the multi-display settings, select a window, tick the Video wall screen setting, then also tick the Tiled display option on the right. In the mosaic preview, enter the grid size and then select the part of the big screen that is occupied by the underlying physical display.

Second, in the operator's room, simply point the monitor to the same video wall screen, without selecting the "tiled" setting. As a result, the same output will be produced on a single preview display.

Create a tiled video wall in EVO Monitor via multi-display setup

Step 4: have fun managing the video wall remotely or with E&A. For manual remote administration, there is a separate tab in the EVO Monitor application called — who would have thought? — Video wall. To start, drag and drop your video wall from the Resources section on the left. And then, place the desired layouts, channels and maps onto the preview area below. All adjustments will take instant effect and you will notice the changes in both rooms. Don't forget to save the current layout as start-up by clicking the "three stripes" button in the upper right corner of the preview area.

Tips & Tricks

To make the most out of the tiled video wall, remember a few aspects:
  • make sure the video cards meet the hardware requirements for EVO Monitor
  • calibrate your displays to match the brightness and color settings
  • use displays with the same aspect ratio and resolution
  • choose displays with the near-zero bezel (frame) and minimize the gap between them

Hardware requirements

Refer https://www.luxriot.com/support/hardware-calculator/

Benefits

EVO Global video wall feature is a strikingly simple yet powerful solution for anyone. All the more, we are proud to present the "stretchy" video wall option as a further advantage.

  • Feel free to experiment with any size or shape, and re-build your video wall at any time. Any alterations to the original layout only need a few fine-tune clicks on the client side.
  • The feature is already included with your EVO Global license - no additional costs involved.
  • On top of that, the EVO Global video wall does not have strict requirements for the used display type. You do not have to stick to a particular brand, never mention additional software or hardware drivers. This also means you can start with the existing infrastructure, and the final solution may implore little or no extra investments at all.
  • Easy setup and re-configuration.
  • EVO Global redundancy covers for video walls, too, — have you set up your mirroring server?
  • Control your video walls remotely from anywhere in the world. All changes are effective immediately. For routine scenarios, use our advanced Event & Action management: any video wall contents will pop up and disappear automatically.

Luxriot Evo Global, is not only offering 64-bit speed and all the necessary tools for setting up an absolute situational alertness system aimed to respond quickly to events, but also introduces a central server governance hierarchy of all the components. To know more on this, can mail to ssaintegrate@gmail.com