SeeTec Cayuga R9 server-based video analytics
SeeTec Cayuga R9 server-based video analytics

Video systems are becoming ever larger and more complex - and they often create a veritable flood of image data that makes it difficult for security personnel to identify threats in time. Modern video analysis tools provide a remedy here by drawing attention to relevant events, thereby enabling rapid response.Server-based image analysisWith SeeTec Analytics Server 3D, a new server-based image analysis module for SeeTec Cayuga is now available for securing buildings and outdoor areas. It automatically detects events such as trespassing or climbing over a fence on the basis of different analysis scenarios, thereby reliably eliminating interferences such as shadows or weather conditions. Thanks to the full integration in SeeTec Cayuga, all camera models available there can also be used for video analysis. Since the analytics is operated directly on the video management server and integrated using shared memory, system resources are efficiently used and network bandwidth is saved. Easy deployment Especially for installers and integrators, SeeTec Analytics Server 3D offers a number of additional advantages: While many other video analytics systems require a large number of parameters to be defined or adapted for the correct detection of objects and events, the SeeTec solution can be deployed easily and quickly by just one person using auto calibration. In addition, the supplied graphical planning tool helps to determine the optimal camera positions and viewing angles. In addition to the serverbased video analysis, SeeTec Cayuga R9 has also expanded its support for third-party products. Via the SeeTec Analytics Interface, two additional video analysis products for the use on Axis cameras can now be connected to SeeTec Cayuga: Digital Barriers SafeZone-edge and Axis Perimeter Defender. Uninterrupted playback One further feature SeeTec Cayuga R9 provides for the increasing size of video projects – especially for systems that are spread over multiple sites or across a branch network. Here access to archive recordings can often only take place via narrow-band networks, for example via DSL connections. However, the image data are mostly stored on the server in high quality and resolution (e.g. Full HD or 4k), which is why a smooth playback of those video recordings is technically not possible in these cases. In SeeTec Cayuga R9, the Transcoded Playback can help: It allows the definition and transmission of video streams with reduced resolution, quality and frame rate according to the available bandwidth. This allows uninterrupted playback even in narrow-band networks, with the recorded picture material always being preserved in its original quality. Improved user interface Especially to improve the usability with high-resolution monitors, the user interface has been thoroughly revised in SeeTec Cayuga R9. For example, larger fonts provide better readability and redesigned icons allow a more intuitive system operation. The colour scheme has also been made clearer for screens with a low contrast ratio. The SeeTec Mobile Client for Android-based tablets and smartphones has been redesigned in contemporary material design, too.

Add to Compare
SeeTec Cayuga R10 supports H.265 streaming standard and bidirectional audio
SeeTec Cayuga R10 supports H.265 streaming standard and bidirectional audio

Recently SeeTec announced R10 of their video management software (VMS) solutions SeeTec Cayuga and SeeTec BVI. While SeeTec Cayuga now includes the support of the new H.265 streaming standard as well as bidirectional audio, SeeTec BVI provides a new dashboard to visualise transaction and process data in real-time.  Audio connections directly to the camera VoIP-based communication has already been possible with SeeTec Cayuga using a SIP server. With the release of R10, bi-directional audio connections directly to the camera are now implemented as well. Many IP cameras already have built-in audio functionalities such as an integrated microphone or a line output. On this basis, SeeTec Cayuga now offers direct voice communication in both directions – without the need for additional software components. For example, an employee in the control room can now remotely evaluate a critical situation much better, especially as they can directly communicate with a person on site. Therefore, the functionality is particularly suitable for use in combination with access control solutions, entrance doors or gates. As a first step, voice communication is supported with Axis devices, the support of further manufacturers is in preparation.  H.265/HEVC streaming standard In terms of camera and hardware integration SeeTec Cayuga R10 offers innovations, too: For many manufacturers, the transfer of image streams based on H.265/HEVC is now supported. Compared to MPEG-4, this new streaming standard reduces the required bandwidth while keeping the same image quality by up to 50 %, thus saving network resources and disk space.  SeeTec Business Video Intelligence While SeeTec Cayuga is primarily designed as a classic security application, SeeTec Business Video Intelligence (BVI) can be used to combine video and transaction data e.g. from PoS systems or scanners, enabling the gapless visual monitoring and documentation of business processes. Here the new release R10 creates visible added value for the user: With the recently developed visualisation component, transaction data and process data can be displayed graphically in dashboards in real-time. Predefined key performance indicators (KPIs) can be visualised quickly and easily using several diagram types, so deviations or recurring patterns become immediately apparent. An example from logistics: The head of a distribution centre can recognise irregularities regarding cases of loss or damage in his facility at an early stage – even remote via smartphone or tablet.  Customers holding a Software Maintenance Agreement (SMA) can retrieve and install the update to SeeTec Cayuga R10 and SeeTec BVI R10 via the Auto Updater or manually. SeeTec also offers a free demo version of SeeTec Cayuga on the company website.

Add to Compare
SeeTec announces new R11 of VMS solutions SeeTec Cayuga and SeeTec BVI
SeeTec announces new R11 of VMS solutions SeeTec Cayuga and SeeTec BVI

SeeTec has released an update of its product line for the second time in 2017 and announces the new R11 of its video management software (VMS) solutions SeeTec Cayuga and SeeTec BVI.  Benefits for large installations  These updates contain many “behind the scenes” improvements for customers and users of SeeTec’s software solutions. After months of work, the new versions mainly focus on refining many of the established features.  Further, many little things add up as well, and SeeTec is convinced that they will make users’ experience in working with SeeTec software so much more reliable, and ever more comfortable. Especially large installations (with a master and slave structure) will profit from an increased overall performance of the VMS.  However, there are of course also some more obvious changes to highlight:  SeeTec Cayuga  As the most used tool for forensic search, SeeTec has tweaked the ISearch feature within SeeTec Cayuga, so that it now delivers up to 20 x faster search results. The search function does not require any previously generated meta data and displays first results already while the search is still in progress.  A new notification window now gives the user detailed information in cases where there is a problem with the Device Manager (DM) or the Media Data Base (MDB), making it much easier to look for the cause of a problem within the installation. R11 of SeeTec Cayuga is fulfilling the requirements of the German UVV Kassen again, thus certifying it use for room surveillance in the banking environment.  Camera support  As with each new iteration, SeeTec Cayuga now also contains support for more cameras and camera functionalities with smart drivers, e.g. for cameras from Dahua and Panasonic. For critical environments with strict security policies in place, the communication between the hardware and SeeTec Cayuga can now be encrypted using TLS 1.2, depending on whether the cameras used support this protocol as well.  The list of supported cameras is extensive; however, please make sure to use only cameras that are officially certified. An overview can be found in the Supported Devices Database on the SeeTec website.  SeeTec BVI  SeeTec BVI also received some handling improvements: the map view has been revamped to improve usability and to not only gain easier access to the feeds of the camera, but also to receive a faster overview and handling of events. Videos now can be exported in the open AVI format and thus be viewed in any video viewer software. Pre-defined dashboards and reports can be generated to automate reporting and thus have quick and easy access to and disperse the relevant KPIs of your installed system to interested parties.  Language options  In order to make SeeTec products more easily accessible for international customers, the software interface is now available in many languages, and this number is growing.  SeeTec Cayuga is now available in 14 language localisations (English, German, French, Danish, Swedish, Norwegian, Russian, Turkish, Italian, Polish, Spanish, Czech, Dutch and new: Portuguese) while SeeTec BVI now supports 4 languages (English, German, French, new: Spanish).  Customers with a valid Software Maintenance Agreement (SMA) can already download and install the update to SeeTec Cayuga R11 and SeeTec BVI R11 (available November 23rd) either manually of via the Auto Updater. SeeTec also offers a free demo version of SeeTec Cayuga on the company website. 

Add to Compare
SeeTec announces new R11 of VMS solutions SeeTec Cayuga and SeeTec BVI
SeeTec announces new R11 of VMS solutions SeeTec Cayuga and SeeTec BVI

SeeTec has released an update of its product line for the second time in 2017 and announces the new R11 of its video management software (VMS) solutions SeeTec Cayuga and SeeTec BVI.  Benefits for large installations  These updates contain many “behind the scenes” improvements for customers and users of SeeTec’s software solutions. After months of work, the new versions mainly focus on refining many of the established features.  Further, many little things add up as well, and SeeTec is convinced that they will make users’ experience in working with SeeTec software so much more reliable, and ever more comfortable. Especially large installations (with a master and slave structure) will profit from an increased overall performance of the VMS.  However, there are of course also some more obvious changes to highlight:  SeeTec Cayuga  As the most used tool for forensic search, SeeTec has tweaked the ISearch feature within SeeTec Cayuga, so that it now delivers up to 20 x faster search results. The search function does not require any previously generated meta data and displays first results already while the search is still in progress.  A new notification window now gives the user detailed information in cases where there is a problem with the Device Manager (DM) or the Media Data Base (MDB), making it much easier to look for the cause of a problem within the installation. R11 of SeeTec Cayuga is fulfilling the requirements of the German UVV Kassen again, thus certifying it use for room surveillance in the banking environment.  Camera support  As with each new iteration, SeeTec Cayuga now also contains support for more cameras and camera functionalities with smart drivers, e.g. for cameras from Dahua and Panasonic. For critical environments with strict security policies in place, the communication between the hardware and SeeTec Cayuga can now be encrypted using TLS 1.2, depending on whether the cameras used support this protocol as well.  The list of supported cameras is extensive; however, please make sure to use only cameras that are officially certified. An overview can be found in the Supported Devices Database on the SeeTec website.  SeeTec BVI  SeeTec BVI also received some handling improvements: the map view has been revamped to improve usability and to not only gain easier access to the feeds of the camera, but also to receive a faster overview and handling of events. Videos now can be exported in the open AVI format and thus be viewed in any video viewer software. Pre-defined dashboards and reports can be generated to automate reporting and thus have quick and easy access to and disperse the relevant KPIs of your installed system to interested parties.  Language options  In order to make SeeTec products more easily accessible for international customers, the software interface is now available in many languages, and this number is growing.  SeeTec Cayuga is now available in 14 language localisations (English, German, French, Danish, Swedish, Norwegian, Russian, Turkish, Italian, Polish, Spanish, Czech, Dutch and new: Portuguese) while SeeTec BVI now supports 4 languages (English, German, French, new: Spanish).  Customers with a valid Software Maintenance Agreement (SMA) can already download and install the update to SeeTec Cayuga R11 and SeeTec BVI R11 (available November 23rd) either manually of via the Auto Updater. SeeTec also offers a free demo version of SeeTec Cayuga on the company website. 

Add to Compare

CCTV software - Expert commentary

The many faces of today's facial recognition technology
The many faces of today's facial recognition technology

The use of facial recognition has become a highly debated topic recently, and has increasingly and misleadingly been criticised by some for being an unethical tool used to spy on the public. The reason for such criticism is however largely due to lack of information and regulation around the technology. Used proportionately and responsibly, facial recognition can and should be a force for good. It has the ability to do a lot more to increase security in the future – from street crime to airport security, all the way through to helping those battling addiction, the technology can take security and operations to new heights. These systems can memorise the faces of persons of interest, networks of gang members, wanted criminals and those suspected of involvement in serious violent crimes The rise in knife crime Knife crime has dominated the headlines in the UK throughout the year. Recent statistics show the number of people being admitted to emergency care due to attacks by a sharp object to be up by nearly 40 per cent from two years ago, whilst the number of children under the age of 18 being admitted to hospitals with stab wounds is up by 86 per cent in only four years. This recent surge in knife crime has put police forces under immense pressure, and the intelligent use of facial recognition has a role to play in enabling more informed stop & search interventions. Currently UK police can stop and search an individual they suspect to be carrying drugs or weapons or both, or they can stop and search a person in a location where there have been or are considered likely to be “incidents involving serious violence.” In both cases they must do so with access to limited information, leaving themselves open to accusations of bias or discrimination. Knife crime dominated the headlines in the UK throughout 2018 Police systems benefiting crime investigations This is where facial recognition can offer up additional intelligence. These systems can memorise the faces of persons of interest, networks of gang members, wanted criminals and those suspected of involvement in serious violent crimes. Furthermore, these systems don’t need prior personal engagement to recognise an individual and see only data, not gender, age or race. Facial recognition thus helps eliminate both weapons and criminals off the streets and potentially prevent crimes before they have a chance to take place. The technology doesn’t take the decision away from the human police officer. However, it does bring greater transparency and context to the decision-making process of whether a stop and search intervention is justified.  Similarly, the advanced technology can recognise and match an individual seen on a CCTV camera at a crime scene to someone the police encounters on the streets some time later, justifying a stop and search on that individual. Its ability to check in real time if a person is on a criminal watchlist adds an extra layer to the decision-making process prior to conducting a stop and search, lowering the likelihood of discrimination. Facial recognition thus helps eliminate both weapons and criminals off the streets and potentially prevent crimes before they have a chance to take place. Gambling addiction and how facial recognition can help There are an estimated 593,000 people in the UK currently battling a gambling problem, making it a serious public health issue in the country. Having understood the gravity of the issue, the UK gambling commission have set limits and advice in place to help those suffering this addiction; yet as with all addictions, gambling is a tough habit to beat. In order to put effective limitations in place and make a real difference, the gambling commission needs the right technology to protect those most vulnerable in the industry.   Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers to a higher degree. Monitoring those entering and moving around gambling areas is an extremely difficult task for human staff to do alone, especially in large crowded areas such as casinos. Facial recognition technology installed around the premises would be able to help the company and the staff to identify people who have registered as gambling addicts, and keep record of their day’s play in order to inform staff if and when it was time for them to stop. It would also be able to ensure effective self-exclusion procedures, by identifying a self-excluded individual via CCTV as soon as they entered the venue to then allow security staff to respectfully escort them out. Utilising facial recognition at airport security Facial recognition has by now become a normal sight at many airports around the world. Several people today hold a so-called biometric passport, which allows them to skip the normally longer queues and instead walk through an automated ePassport control to proceed to the gate faster without having to deal with control officers. Facial recognition used in this way has managed to significantly cut waiting times at the passport control, but it also has the ability to enhance security in and around airports. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces Earlier this year, facial recognition technology managed to catch an imposter trying to enter the US at the Washington Dulles Airport. The false passport may have been uncaught by the human eye, yet due to the accuracy of the facial recognition technology it managed to help officers catch the imposter and bring him to justice. Facial recognition thus allows officers to identify an individual faster and more accurately than the human eye. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces, which have been collected from visas, passports and other sources.   Facial recognition allows officers to identify an individual faster and more accurately than the human eye At airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-inWhilst some critics may worry about issues of privacy related to the technology, at airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-in and, in the future, even boarding proceedings. If used correctly and proportionately, facial recognition can help safeguard the public and improve national security on several fronts. Whilst the many benefits of facial recognition are evident, the lack of regulation and understanding of the technology has led to misconception around how it works and what it is used for. Facial recognition technology can match faces in crowded public places against criminal watch lists, and register faces that match with those on criminal watch lists – whilst ignoring everyone else.

Video technology reimagined with the empowerment of IoT
Video technology reimagined with the empowerment of IoT

It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood management assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental control assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary.  Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway management and parking assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper experience assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognise and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing business intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A natural cross-over technology This trend towards integration has forever changed how organisations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyse what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalise on that connection is only limited by our imagination.

Watching trends in real-time: SourceSecurity's top 10 click-worthy articles posted in 2018
Watching trends in real-time: SourceSecurity's top 10 click-worthy articles posted in 2018

Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban on Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes a Splash with Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact of Data-Driven Smart Cities on Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyse data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing the Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends for 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How to Prevent ATM Jackpotting with Physical and Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve- how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need to Look Beyond Technology for Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organisation. 10. The Evolution of Facial Recognition from Body-Cams to Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.