Construction surveillance
Portable Solutions Group (PSG) is proud to announce the launch of its newest product offering, the MAC-Link ™. This groundbreaking product marks a significant and revolutionary advancement in construction turnstiles and safety management. Real-time reporting PSG partnered with United Rentals to deliver a flexible and lower-cost site access solution to its broad customer base. By enabling data capture and real-time reporting for workers on the site, the construction industry's digital t...
Per Mar Security Services, Davenport, Iowa, has crafted a highly effective and efficient outdoor asset protection solution for its customers in partnership with iDter Systems, San Mateo, California. Per Mar is deploying iDter’s Nio Guardians with Artificial Intelligence (AI) and active intrusion detection to stop trespassing, theft and liability claims at construction and equipment sites. Intelligent video monitoring Theft and damage of heavy equipment continues to ramp up–the Na...
RGB Spectrum®, an industry pioneer in mission-critical video for real-time decision support, shares new features of its QuadView® IPX and SuperView® IPX multiviewers designed to revolutionise how industries handle data visualisation and decision-making. Multiviewers have become indispensable tools for consolidating diverse data sources onto a single screen, variously used for enhancing situational awareness and improving workflow efficiency. RGB Spectrum's latest offerings increase...
The cooperation between MOBOTIX AG and Kepler Vision Technologies has brought together two of the world's pioneering IT experts in the healthcare industry. Dutch computer vision and machine learning powerhouse Kepler Vision Technologies combines deep healthcare and nursing-specific expertise with profound artificial intelligence (AI)-based in human activity recognition know-how. MOBOTIX has focused on the healthcare industry for many years and has already implemented numerous projects for hosp...
Freevolt Technologies Limited a London, UK-based developer of biometric smart card products for access control, cryptocurrency wallets, payments and healthcare, has launched the second generation of its flagship access control card, S-Key. The new battery-less biometric access card featuring Freevolt’s patented energy harvesting technology has been upgraded to embed Fingerprints’ world-pioneering ‘T2’ biometric sensors. S-Key biometric cards are bringing stronger authent...
Fast-expanding First Response Group (FRG), the nationwide security, risk and property protection business, has strengthened its foothold in the events and stadia security management sector with the acquisition of Wembley-based ISC. The acquisition, which was completed this week, is part of the group’s strategy of diversification, whilst underpinning its strategic expansion into stadia, arena and the leisure crowd-safety sector. According to the group’s CEO, Simon Alderson, the acqui...
News
Teledyne Technologies Incorporated announced that it has entered into an agreement to acquire Xena Networks ApS. Xena Networks, headquartered outside of Copenhagen, Denmark, is a pioneering provider of high-speed Terabit Ethernet validation, quality assurance, and production test solutions. Teledyne LeCroy's protocol "The Xena Networks acquisition will further establish our leadership in the protocol test market, extending our reach to Ethernet system validation engineers, quality assurance labs, and production lines for test, evaluation, and acceptance of Ethernet components and systems," said Robert Mehrabian, Chairman, President, and Chief Executive Officer of Teledyne. Xena Networks will be a powerful addition to this strong and growing protocol test portfolio "The acquisition of LeCroy in 2012 provided a healthy and growing portfolio of protocol test businesses focused on PCI Express, USB as well as storage and networking technologies. Since then, we expanded Teledyne LeCroy's protocol test business with multiple acquisitions, including Quantum Data (for video), Frontline (for Bluetooth and WiFi) and OakGate (for storage devices test solutions). Xena Networks will be a powerful addition to this strong and growing protocol test portfolio." Teledyne LeCroy's network protocol Artificial intelligence and machine learning, high-performance computing and 5G all require ever higher speeds of data transmission and fuel the need for new solutions to test next-generation Terabit Ethernet network components. Xena Networks test tools offer in-depth Ethernet link training and auto-negotiation test capabilitiesThe same network equipment manufacturers that use Teledyne LeCroy's network protocol analysis and error injection tools also require high-performance Ethernet traffic generation and network emulation test tools to validate product designs. Xena Networks test tools offer in-depth Ethernet link training and auto-negotiation test capabilities, which next-generation Terabit Ethernet products need to ensure that expected performance is achieved. Author's quote "Combining the traffic generation and network emulation capabilities of Xena Networks with the protocol analysis functionality of Teledyne LeCroy will deliver a unique value proposition in support of semiconductor and network equipment manufacturers, network service providers, and hyperscale and cloud computing providers," said Kevin Prusso, Vice President and General Manager of Teledyne LeCroy. Jacob Vestergaard Nielsen, Xena Networks Chief Executive Officer, said, "We're excited to join Teledyne LeCroy and leverage its wide coverage of protocols technologies. In particular, Teledyne's network protocol analysis solutions complement well our traffic generation, physical layer, and network emulation products with support of up to 800Gbps Terabit Ethernet data rates, to the benefit of our customers."
Matrix, a prominent provider of Telecom and Security solutions, eagerly anticipates showcasing its range of security and telecom products at IREE 2023. This event is scheduled from 12th to 14th October 2023 and is dedicated to innovative security solutions. The venue is Booth No. 2.120, Pragati Maidan, New Delhi, India. Matrix is the first company to offer RDSO 6.0-compliant cameras for Indian Railways. Matrix cameras are certified by STQC, Delhi lab for following the OWASP ASVS 4.0 mandated by RDSO for cyber security. EN50155 compliant Matrix Cameras are designed to ensure that the data gathered by the cameras is secured against cyber threats both at the time of transmission and storage. Matrix will unveil its cutting-edge IP Video Surveillance solutions at this exhibition, encompassing enterprise-grade VMS, NVRs, and IP cameras with resolutions reaching up to 8 MP. Their latest camera in the range is ruggedised cameras that are EN50155 compliant. The cameras are anti-vibrant and shock-resistant making them ideal for roadways and railways. The comprehensive solution focuses on addressing three key client concerns: managing bandwidth and storage expenses, simplifying centralised video surveillance complexities, and offering proactive security measures. Matrix PTZ series 2MP cameras The IREE 2023 event in New Delhi, will feature a display of the Matrix Ruggedised Cameras In a recent addition to its diverse range of IP cameras for comprehensive security, Matrix introduces the ruggedised camera. Matrix ruggedised IP cameras cater to transportation's dynamic needs with high-quality video, low-light sensitivity, and versatile features for rail and roadway monitoring. It can capture images of vehicles moving in Zap Speed. The IREE 2023 event in New Delhi, will feature a display of the Matrix Ruggedised Cameras. Matrix also features PTZ cameras, enabling full 360-degree security coverage by enabling pan-tilt-zoom functions in multiple directions for extensive area monitoring. The Matrix PTZ series 2MP cameras with 25x/33x and 5MP Cameras with 42x optical zoom options enhance image clarity and surveillance efficiency. Project Series 5MP Cameras Furthermore, Matrix will also introduce its existing line of Project Series Cameras, specifically designed for large-scale organisations and project-based scenarios. The Project Series 5MP Cameras come with UL Certification, a globally recognised safety standard, and NEMA Certification, ensuring resilience against environmental threats. These cameras offer high-resolution imagery for enhanced clarity and protection. Advanced surveillance systems demand robust video recording solutions with ample storage capacity and redundancy to ensure continuous 24/7 surveillance with minimal downtime. Matrix addresses this need with its new ENVR line, capable of supporting up to 256 channels and boasting a storage capacity of up to 144 TB. Attendees of the event will have the opportunity to experience this innovation firsthand. SATATYA SAMAS range of solutions Matrix showcases the COSEC PANEL200P-a site controller ruling key operations for buildings To enhance proactive video surveillance capabilities, visitors can explore the SATATYA SAMAS range of solutions by Matrix, featuring features like tripwire, intrusion detection, motion detection, no-motion detection, and more. Within the realm of access control, Matrix will showcase the COSEC PANEL200P-a site controller overseeing access operations for entire buildings. This versatile controller functions in two distinct architectures: acting as a bridge between controllers and servers in network architecture, and operating autonomously without a server in Standalone Architecture. Its user interface can efficiently manage 255 COSEC door controllers and accommodate up to 25,000 users. COSEC ARC DC200P door controller Furthermore, Matrix will introduce the COSEC ARC DC200P door controller, an innovative IP-based access control terminal with several advantages over traditional models. Leveraging Power over Ethernet (PoE) eliminates the need for complex wiring and local power sources. Its compact design, offering both din rail and wall mount options, makes it suitable for even space-constrained environments. Matrix will raise the COSEC ARC DC200P door controller, an inventive IP-based access control Matrix's display will also feature the robust biometric door controller-VEGA FAX, boasting multiple connectivity options including Wi-Fi, PoE, and ethernet. The company will also present the COSEC ARGO FACE, a sophisticated face-based door controller renowned for its precise, swift, and reliable recognition capabilities, powered by cutting-edge AI-driven deep learning technology. Author's quote Kaushal Kadakia, Marketing Head, states, “IREE will provide an excellent opportunity for exhibitors to demonstrate our innovative security products for various industrial verticals. With a large crowd set to attend, we expect to meet some key decision-makers to advance our creative solutions. We look forward to understanding their organisational needs and showing them how our solutions will help them improve their security experience.” Matrix cordially invites to visit IREE 2023 from 12th to 14th October 2023 at Booth No. 2.120, Pragati Maidan, New Delhi, and get a hands-on experience with its enterprise-grade security solutions.
i-PRO Co. Ltd., a pioneer in professional security solutions for surveillance and public safety, has released the latest version of its popular Active Guard application that adds support for Vaxtor automatic licence plate recognition (ALPR) and make, model, colour (MMC) vehicle identification. The Vaxtor software has been tuned to run efficiently on the edge when installed within i-PRO AI-enabled cameras, providing the same level of performance normally associated with high-end PC processor architectures. i-PRO Active Guard v1.7 seamlessly delivers ALPR and MMC data, together with any other AI-based attributes, into popular video management systems (VMSs), providing a single, unified experience for operators. Forensic search and alert platform The same process can be set up for fast data mining of events during forensic investigations With Active Guard, the i-PRO data-driven forensic search and alert platform, security officers no longer need to spend time looking at multiple screens for persons or vehicles of interest or watch hours of recorded video to search for important events. Operators can register specific characteristics in their watch lists (e.g., red Toyota Hilux), and the VMS will send a real-time alarm whenever a match is identified, a feature that is unique to i-PRO. This enhances real-time situational awareness and enables proactive security. The same process can be set up for fast data mining of events during forensic investigations. With its high recognition rates, the solution is ideal for a range of applications, including city surveillance, parking, access control, security, law enforcement and intelligent transportation systems. AI-based analytics “The latest version of Active Guard further demonstrates our commitment to an open platform approach as Vaxtor is the first third-party analytic to be hosted within the application itself,” said Philippe Henaine, Manager, Strategic Partners, i-PRO EMEA. “It’s a big step in the evolution that enables developers on the edge to connect to market-pioneering VMS effortlessly within a single UI.” The plug-in integrates AI analytics seamlessly into a VMS, such as Genetec, Milestone, or Video Insight The plug-in integrates AI analytics seamlessly into a VMS, such as Genetec, Milestone, or Video Insight, and appears as an additional function tab within the user interface. Requiring no additional LPR server, it enables users to easily manage AI-based analytics from multiple i-PRO cameras and allows users to easily set up sophisticated search parameters based on the industry’s largest number of search attributes, including unique characteristics such as clothing and shoe colour, gender, age, bag colour, and now vehicle, make, model, colour, licence plate, the direction of travel, and much more. Author's quote “You might purchase an AI camera with amazing features, but if you can’t make use of the data it provides in your VMS, you’ve missed the mark,” said Adam Lowenstein, Director of Products, i-PRO Americas. “Active Guard is the bridge between the edge and the VMS. Our plug-in ensures that all 98 object attributes are searchable directly from within the VMS from our cameras.”
The Electronic Security Association (ESA) has bestowed its National Training School Instructor of the Year honour to Jim Mundy, President of Asset Protection Associates, who stands as a shining example of dedication, expertise, and inspiration in the field of electronic security and life safety. “My first absolute love is teaching,” says Jim Mundy. “I began teaching when I was twelve years old, starting with archery, then later as a technical instructor in the military, eventually making my way to teaching in the electronic and life safety industry.” Mundy’s background in teaching Not only did Mundy begin teaching when he was twelve years old, but he was also first introduced to the security industry. It was the mid-1950s and there was a man in Jim’s neighbourhood selling door-to-door heat detection systems, who pitched the product to Jim’s dad. A seed was planted, and young Jim became curious about fire detection technology. A seed was planted, and young Jim became curious about fire detection technology His school projects through elementary and high school often involved elements of fire alarm, security, and circuitry. Once Jim graduated from high school, he did a three-and-a-half-year apprenticeship in the burner boiler field. There he used circuits very similar to those used in fire alarm systems. Then Jim joined the military, where he became a circuitry instructor in the Air Force. NFPA technical committee work After his time in the military, Jim taught classes at The City University of New York in the areas of HVAC controls, fire alarms, and security. After spending thirty-five years in corporate America in 1999 he started his own company where he integrated building systems with a focus in fire alarms. Jim always found interest in the codes and standards for these processes in the industry. He decided to get involved in the National Fire Protection Association (NFPA) Technical Committee work and taught it to many organisations. Since 1992, Jim has been a dedicated ESA National Training School (NTS) Instructor. "I love engaging with people and watching all the light bulbs come on. ESA does an excellent job teaching code through its programs. They work really hard to make it simple, so people understand it. It is important to not make it complicated and instead make it meaningful,” says Jim. “If you understand the concept and ideas, you can always read the code and the technical stuff.” Sales is teaching Paul and I worked together on licencing and training issues in New York State while I was Chair One thing that Jim noticed during his time as a sales manager was the best salespeople he hired were individuals who had teaching degrees or equivalent experience. "Sales is about teaching. It is not simply about selling a deal. It is a matter of communicating in a way that helps people understand what we are trying to provide them. If they don't understand the idea, then you are going to have a bad sale,” explains Jim. When asked about how he felt about being awarded ESA’s NTS Instructor of the Year award Jim answered, “The answer in short is “Wow!” I was very profoundly humbled and did not expect to receive this honour. The person for whom this award is named is Paul Barran. Paul and I worked together on licencing and training issues in New York State while I was Chair of the NYS Licencing Board.” Real-world applications and implications Jim Mundy's journey as an instructor is characterised by his unwavering passion for teaching and his commitment to fostering an enriching learning experience. He consistently goes above and beyond to ensure that his students not only grasp the technical aspects but also develop a deep understanding of its real-world applications and implications. His ability to communicate complex concepts with clarity and enthusiasm has earned him the admiration of countless students. True mark of a special educator is one’s ability to inspire lifelong wisdom and unique growth A true mark of an outstanding educator is one’s ability to inspire lifelong learning and personal growth. By encouraging students to engage with the subject matter beyond the classroom, Jim Mundy fostered a sense of ownership and passion for each one’s own learning journey. In fact, Jim’s mantra has always been, “A day without learning is a waste of twenty-four hours.” This is applicable not only to training but to life in general. Jim Mundy's impact extends far beyond the duration of his courses, as he instilled in his students a curiosity and eagerness to continue exploring and expanding their horizons. His tells everyone that each should not lose a sense of wonder. Overall vitality of the security industry Additionally, Jim’s emphasis on critical thinking, problem-solving, and adaptability has equipped his students with the tools they need to thrive in a rapidly changing field. Jim has contributed to the overall vitality of the security industry by producing well-rounded and forward-thinking professionals. ESA would like to thank Jim Mundy for his 60 years of service and excellence in instructing within the industry and congratulate him on his upcoming retirement.
Quanergy Solutions, Inc. is showcasing how its innovative Q-Track™ 3D LiDAR (Light Detection and Ranging) solution can help retailers combat theft and criminal activity here at the 2023 LPRC Impact Conference in booth #505. A seamlessly integrated solution that combines Quanergy’s long-range 3D LiDAR sensors with its advanced perception software, Q-Track delivers real-time object detection, classification and tracking for enhanced loss prevention and security. Author's quote “With our attendance at the LPRC conference, we are effectively introducing 3D LiDAR to an industry that has historically relied on traditional, reactive security methods to protect their inventory, personnel and assets,” said Enzo Signore, CEO, Quanergy. We want to show retailers that there is a transformative alternative available today" “We want to show retailers that there is a transformative alternative available today. Our Q-Track 3D LiDAR solution not only fortifies perimeter security, it also empowers retailers to proactively mitigate shrinkage, elevate the customer experience, and stay one step ahead of rising crime and emerging challenges impacting today’s retail industry.” 3D LiDAR solutions Quanergy’s pioneering 3D LiDAR solutions offer an array of capabilities for retailers and businesses determined to enhance their loss prevention strategies. This includes: Precise Object Detection: Quanergy provides unmatched accuracy in detecting and tracking objects as small as a pen to cm level accuracy. With this heightened level of awareness, retailers can proactively identify and address potential instances of theft and loss in real time. Comprehensive Intrusion Detection: With Q-Track, retailers can pinpoint the exact location of a potential intrusion while tracking the direction and speed at which an intruder is moving to enable continuous tracking over the entire perimeter. Each Q-Track sensor further provides an impressive coverage area of 165,000 square feet (15,000 square metres), ensuring high accuracy and low total cost of ownership. Privacy-assured operation: Unlike traditional video surveillance systems, Q-Track does not capture any personally identifiable information (PII), ensuring the privacy of both customers and employees. Beyond loss prevention, Quanergy’s Flow Management platform can also be used to automate key retail processes to increase revenue by optimising room, floor, or building occupancy, regulating foot traffic, reducing wait times, increasing energy efficiency and workspace utilisation, and optimising existing resources.
According to the U.S. Occupational Safety and Health Administration (“OSHA”), hospitals are considered one of the most dangerous places to work in America. In fact, OSHA describes hospitals as generally “hazardous” places to work, contributing to missed days of work and adding to the high cost of healthcare. In 2019, OSHA reported, “U.S. hospitals recorded 221,400 work-related injuries and illnesses, a rate of 5.5 work-related injuries and illnesses for every 100 full-time employees. This is almost twice the rate for private industry as a whole.” Nursing assistants were among the occupations with the highest rates of musculoskeletal disorders of all occupations in 2020, with 15,360 cases. Musculoskeletal disorders comprised 52% of all days away from work cases for nursing assistants. Additionally, hospitals are more hazardous than the generally dangerous construction and manufacturing industries. Healthcare worker shortages The perception of hospital safety in the workforce has also declined beginning in 2020, as the COVID-19 pandemic placed tremendous pressure on the healthcare system due in part to workforce fatigue and healthcare worker shortages, which lead in part to poor patient outcomes. The perception of hospital safety in the workforce has also declined beginning in 2020 The patient caregiving workforce also has a stressful, unpredictable work environment and a “do no harm” culture that may require repeated overexertion, lifting, transferring, and repositioning of patients; may result in accidents like needlesticks and medicine errors; and may give rise to other concerns like co-worker, patient, or visitor violence. Such workplace stressors may also lead to fatigue, sick days, patient care errors, and poor infection control. OSHA reports Likewise, OSHA reports hospital workplace tasks such as manual lifting impact safety in at least two ways: when job tasks such as manual lifting can injure caregivers, and when such tasks risk or result in unintended falls, fractures, bruises, and skin tears to patients. Video technology Video surveillance is core to the healthcare facility's health and safety High-performing healthcare facilities combine the management of patient safety risks right along with worker safety risks when assessing the core elements of a safety and health management system. Video management software (VMS) for video surveillance is a highly-valued tool in the safety and health management system toolbox. Video technology is available for broad use by leadership for the following reasons: Video provides indicators of quality and quantity. HR can review workforce performance by medical staff. Legal, compliance, and audit teams can investigate alleged violations or resolve disputes. Workplace trainers can offer real-life examples and testimonials used in training. Risk managers can predict, identify, and assess risk. Supervisors can proactively prevent or reduce occurrences of various hazardous incidents. For example, the incident investigation may be enhanced with a video management system that offers recorded video archives for evidentiary preservation and retention, supporting root cause analysis and supporting analysis of legal risk. These video archives are also useful to the whole team when considering post-incident “lessons learned” and training. XProtect® VMS Video surveillance may also serve as a deterrent to internal and external thefts including, for example: when workforce members know active surveillance is in place in drug dispensing rooms or sensitive records areas, or to deter thieves who look for opportunities to steal inside the facility or in the parking lot. Milestone Systems has a history of working with healthcare organisations to provide a video technology platform that works with IP cameras, door access control, IoT sensors, and other security and healthcare technology at work throughout the hospital and clinic. XProtect® VMS is open platform software that integrates with many diverse tools, keeping people and property safe in any healthcare environment. General rights of privacy regulatory concerns Medical staff may welcome surveillance when they understand it enhances their safety in the workplace These days, most workers, patients, and visitors to healthcare facilities expect to see obvious video surveillance in public areas of the facility and parking areas. The video cameras offer some assurance that active monitoring of the facility occurs and that the buildings have sophisticated safety controls in place. Medical staff may welcome surveillance when they understand it enhances their safety in the workplace. A myriad of regulatory requirements, such as HIPAA and state privacy laws generally allow video surveillance in public and worker-only spaces without explicit consent, as there is no expectation of privacy in these areas. However, capturing audio along with video requires deeper analysis to avoid running afoul of two-party consent laws. Of course, adequate governance considering a multitude of regulatory concerns is a must, including workforce policy and public notices of the use of video surveillance in the facilities’ Notice of Privacy Practices or other posted privacy notices. Hospital’s regulatory requirements Numerous regulatory bodies, such as the Joint Commission, the American Hospital Association, and HIPAA regulators support the use of video surveillance in private areas, such as patient rooms, treatment areas, triage, and in the ER in some circumstances. Video surveillance may also be used to support a hospital’s regulatory requirements under HIPAA, OSHA and Joint Commission. Video surveillance used to support a hospital’s requirements under HIPAA, OSHA and Joint Commission Types of hazards employees are exposed to, the severity of the hazards, and the risk the hazards pose to employees are all considered in determining methods of hazard prevention, elimination, and control. According to the Joint Commission hospital accreditation standards, the hospital should take action to minimise or eliminate identified safety and security risks in the physical environment. HIPAA or general privacy laws The Health Information Portability and Accountability Act of 1996, commonly known as HIPAA, is the sweeping patient-centric federal confidentiality law requiring healthcare providers and facilities, among others, to address the following: Safeguard protected health information (PHI) by limiting the use or disclosure of PHI to that which is permitted or required, Reasonably secure electronic PHI, and Provide notice of unauthorised use of disclosure of unsecured PHI, such as a data breach. There is generally no expectation of privacy under HIPAA or general privacy laws in public or worker-only facility locations. Thus, location and surveillance methods must be carefully analysed under HIPAA, especially for use in exam and treatment areas, during telehealth visits, and in meetings or messaging applications. HIPAA privacy regulation Specifically, if the use of video surveillance passes muster under the HIPAA Privacy Regulation and there is a permissible or required use of PHI disclosure, the VMS platform must be assessed for risk for certain vulnerabilities and mitigations and for sufficient information security controls, including: technical security controls, such as encryption and retention, physical security controls, such as location, tampering, role-based access, and audit controls for video archives, and administrative security controls, such as vendor business associate agreements, facility policies, and procedures for handling video and training on such requirements. In addition, each of these controls should ensure the confidentiality, integrity, and availability of ePHI (e.g., electronic full-face images captured in electronic video format). Insurance Insurance premium rates, including rates for cybersecurity and regulatory defense continue to rise Insurance premium rates, including rates for cybersecurity and regulatory defense continue to rise. Having a video security system in place may offer relief to rising insurance premiums. Some liability and workers’ compensation insurance carriers may offer discounts or best premium rates for evidence of certain safety, privacy, and security controls. Many carriers are routinely requesting companies to complete the carrier’s privacy and security assessment. This includes sharing details about privacy and compliance programs and describing video security measures. Ask the insurance carrier or broker for more details. How Milestone helps safety and health management Milestone Systems and its diverse network of partners have experience in solving problems for the healthcare industry and focus on developing positive business outcomes for customers, such as supporting the complex challenge of ensuring the privacy and security of healthcare facilities, medical staff, patients, and visitors. Milestone Systems’ XProtect® VMS allows organisations to capture and preserve video evidence In traditional uses, Milestone Systems’ XProtect® VMS allows organisations to capture and preserve video evidence; conduct forensic, legal, and regulatory investigations of the video; and improve its security posture by using video archives in post-incident lessons learned and training. XProtect open platform Milestone Systems’ ongoing and most recent technological advancements include incorporating unique video analytics, integration with IoT sensors, and other innovations in conjunction with the partner community. The modern approach to security helps be proactive and helps predict, prevent, and identify problems early. If interested in learning more about Milestone Systems and the XProtect open platform, schedule a demonstration with one of the representatives to discuss desired business outcomes.
Expert commentary
The autumn equinox, which marks the start of autumn, occurs this weekend on Saturday, September 23. With darker evenings ahead, the experts at ADT have shared five ways to maximise your home's security. Author's quote Michele Bennett, General Manager at ADT UK&I comments: “Opportunistic thieves use darkness to their advantage, so it’s no surprise that the number of burglaries committed increases when the darker nights draw in." He adds, "Our 2022 burglary report found that burglaries are most common at night, with 58% of burglaries occurring between 6 p.m. and 6 a.m. Taking steps to optimise your home’s security before the clocks go back this year will provide reassurance that your property is as secure as possible.” Five ways to secure your property: Get a monitored alarm installed: A visible alarm system is a strong deterrent to potential burglars, as criminals are less likely to target a home that is protected. In the event of a break-in, a monitored alarm will alert you, your keyholders and depending on the package you take out, the police, ensuring a swift response to an alarm activation. Light up the dark: Well-lit exteriors make your home less appealing to potential intruders. Install motion-activated lights around any entry points, particularly porches and gardens, which alert you to movement on your property. This will also prevent burglars from operating under the cloak of darkness and increase the chance of a passerby spotting suspicious activity. Trim your garden landscape: Thieves look for escape routes and hiding spots when deciding which homes to break into, making gardens with high, overgrown hedges more likely to be targeted. This is especially true in the darker evenings, so be sure to give your garden a thorough tidy-up to make your property less likely to be targeted. It’s also advisable to ensure any tools are locked away in sheds and garages that could assist a burglar such as ladders, or a garden spade to force entry. Be smart with your lights: Using smart plugs allows you to turn on a few well-appointed lights and radios or televisions from any location from your phone. Used in conjunction with an outdoor camera or video doorbell, you can have lamps plugged into smart plugs come on when motion is detected. Programming lights to come on at different times throughout the night will help to deter burglars by making your property look occupied. Purchase a smart doorbell or outdoor camera: Smart doorbells are an effective way to deter burglars as they provide evidence in the event of a break-in, package theft, or other suspicious activity around your home. They also notify you when someone is at your door reducing the chance of you being caught out by a late evening or early morning robbery. Further encroachment Smart doorbells also act as a deterrent to unscrupulous door-to-door sellers and con artists, as video footage is recorded. In the event of a late-night door knock, you can see and speak to whoever is at your front door, without having to open the door. ADT’s new outdoor camera also has two-way audio and a high-pitch deterrent siren so you can warn off anyone from your property to deter any further encroachment.
Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply chains. Transportation sector The attack began with the port's legacy computer system, which handles shipping containers, being knocked offline. This forced the port to halt the handling of shipping containers that arrived at the terminal, effectively disrupting the flow of goods. The incident was a stark reminder of the risks associated with the convergence of information technology (IT) and operational technology (OT) in ports and other critical infrastructures. This is not an isolated incident, but part of a broader trend of escalating cyber threats targeting critical infrastructure. The transportation sector must respond by bolstering its defences, enhancing its cyber resilience, and proactively countering these threats. The safety and efficiency of our transportation infrastructure, and by extension our global economy, depend on it. Rising threat to port security and supply chains XIoT, from sensors on shipping containers to automatic cranes, are vital to trendy port functions OT, once isolated from networked systems, is now increasingly interconnected. This integration has expanded the attack surface for threat actors. A single breach in a port's OT systems can cause significant disruption, halting the movement of containers and impacting the flow of goods. This is not a hypothetical scenario, but a reality that has been demonstrated in recent cyberattacks on major ports. Adding another layer of complexity is the extended Internet of Things (XIoT), an umbrella term for all cyber-physical systems. XIoT devices, from sensors on shipping containers to automated cranes, are now integral to modern port operations. These devices are delivering safer, more efficient automated vehicles, facilitating geo-fencing for improved logistics, and providing vehicle health data for predictive maintenance. XIoT ecosystem However, the XIoT ecosystem also presents new cybersecurity risks. Each connected device is a potential entry point for cybercriminals, and the interconnected nature of these devices means that an attack on one, which can move laterally and can have a ripple effect throughout the system. The threat landscape is evolving, with cybercriminals becoming more sophisticated and their attacks more damaging with a business continuity focus. The growing interconnectivity between OT and XIoT in port operations and supply chains is also presenting these threat actors with a greater attack surface. Many older OT systems were never designed to be connected in this way and are unlikely to be equipped to deal with modern cyber threats. Furthermore, the increasing digitisation of ports and supply chains has led to a surge in the volume of data being generated and processed. This data, if not properly secured, can be a goldmine for cybercriminals. The potential for data breaches adds another dimension to the cybersecurity challenges facing the transportation sector. Role of cyber resilience in protecting service availability Cyber resilience refers to organisation's ability to prepare for, respond to, and recover from threats As the threats to port security and supply chains become increasingly complex, the concept of cyber resilience takes on a new level of importance. Cyber resilience refers to an organisation's ability to prepare for, respond to, and recover from cyber threats. It goes beyond traditional cybersecurity measures, focusing not just on preventing attacks, but also on minimising the impact of attacks that do occur and ensuring a quick recovery. In the context of port operations and supply chains, cyber resilience is crucial. The interconnected nature of these systems means that a cyberattack can have far-reaching effects, disrupting operations not just at the targeted port, but also at other ports and throughout the supply chain. A resilient system is one that can withstand such an attack and quickly restore normal operations. Port operations and supply chains The growing reliance on OT and the XIoT in port operations and supply chains presents unique challenges for cyber resilience. OT systems control physical processes and are often critical to safety and service availability. A breach in an OT system can have immediate and potentially catastrophic physical consequences. Similarly, XIoT devices are often embedded in critical infrastructure and can be difficult to patch or update, making them vulnerable to attacks. Building cyber resilience in these systems requires a multi-faceted approach. It involves implementing robust security measures, such as strong access controls and network segmentation, to prevent attacks. It also involves continuous monitoring and detection to identify and respond to threats as they occur. But perhaps most importantly, it involves planning and preparation for the inevitable breaches that will occur, ensuring that when they do, the impact is minimised, and normal operations can be quickly restored. Building resilience across port security and supply chains In the face of cyber threats, the transport sector must adopt a complete method of cybersecurity In the face of escalating cyber threats, the transportation sector must adopt a comprehensive approach to cybersecurity. This involves not just implementing robust security measures, but also fostering a culture of cybersecurity awareness and compliance throughout the organisation. A key component of a comprehensive cybersecurity strategy is strong access controls. This involves ensuring that only authorised individuals have access to sensitive data and systems. It also involves implementing multi-factor authentication and regularly reviewing and updating access permissions. Strong access controls can prevent unauthorised access to systems and data, reducing the risk of both internal and external threats. Network segmentation Network segmentation is another crucial measure. By dividing a network into separate segments, organisations can limit the spread of a cyberattack within their network. This can prevent an attack on one part of the network from affecting the entire system. Network segmentation also makes it easier to monitor and control the flow of data within the network, further enhancing security. Regular vulnerability assessments and patch management are also essential. Vulnerability assessments involve identifying and evaluating potential security weaknesses in the system, while patch management involves regularly updating and patching software to fix these vulnerabilities. These measures can help organisations stay ahead of cybercriminals and reduce the risk of exploitation. EU’s NIS2 Directive EU’s NIS2 Directive came into effect, and member states have until October 2024 to put it into law The transportation sector must also be prepared for greater legislative responsibility in the near future. The EU’s NIS2 Directive recently came into effect, and member states have until October 2024 to put it into law. The Directive aims to increase the overall level of cyber preparedness by mandating capabilities such as Computer Security Incident Response Teams (CSIRTs). Transport is among the sectors labelled as essential by the bill, meaning it will face a high level of scrutiny. Getting to grips with the complexities of XIoT and OT integration will be essential for organisations to achieve compliance and avoid fines. Global transportation infrastructure Finally, organisations must prepare for the inevitable breaches that will occur. This involves developing an incident response plan that outlines the steps to be taken in the event of a breach. It also involves regularly testing and updating this plan to ensure its effectiveness. A well-prepared organisation can respond quickly and effectively to a breach, minimising its impact and ensuring a quick recovery. In conclusion, mastering transportation cybersecurity requires a comprehensive, proactive approach. It involves implementing robust technical measures, fostering a culture of cybersecurity awareness, and preparing for the inevitable breaches that will occur. By taking these steps, organisations can enhance their cyber resilience, protect their critical operations, and ensure the security of our global transportation infrastructure.
Open platform video technology software is more than just a product; it's a tool that helps customers achieve their desired business outcomes. Safety, round-the-clock security, and increased operational efficiencies are now the norm due to video technology. Responsible Technology Despite humanity’s impressive technological advances, we also recognise the immense responsibility that comes with technological innovation. It's not enough to focus solely on the positive impact video technology can make, we must also be vigilant in identifying and addressing any potential negative consequences it can have on society and its citizens. This is the role of Responsible Technology. Data privacy We want to use all the good things that technology innovation brings, whether it be video, AI, ML, facial recognition, etc. We want to use all the good things that technology innovation brings, whether it be video, Artificial Intelligence, machine learning, facial recognition, etc. to serve people in societies in a responsible way. That means making sure that we regulate technology in a way that respects human rights and data privacy. Addressing the challenges The challenge is, that rather often technology leaders and policymakers either have conflicting interests or collaborate too late. To be responsible, business leaders must support their societies and policymakers in making regulations in the interest of the common good. At Milestone Systems, we are actively looking at how we develop our software responsibly, how our partners responsibly sell our software, and very importantly, how our customers use our software with a responsible mindset. Ensuring good corporate governance As a long-time partner within the security industry, we’re celebrating our 25th Anniversary this year, we are supporting the regulation of video technology for the good of society. However, it of course needs to strike the fine line between the right legislation and not hindering innovation. UNGP The UNGP is the most authoritative and widely adopted set of principles for responsible business At Milestone Systems, we want to play an active role in this and that is why we have pledged our support to the UN's Guiding Principles on Business and Human Rights (UNGP). The UNGP is the most authoritative and widely adopted set of principles for responsible business. The principles call on governments and companies to identify, prevent, mitigate, and remedy actual and potential human rights abuses. Since its launch in 2011, the UNGPs have received wide support from states, civil society organisations, and the private sector, making them the key global foundation for business and human rights. Protect, respect, and remedy Through this commitment, we are taking steps to ensure good corporate governance and ethical standards in the development of our technology. We're generating mechanisms to prevent misuse and we are building educational practices internally. Based on the UNGP’s three pillars: protect, respect, and remedy, we are developing a set of Responsible Technology Principles and procedures for the development, selling, and use of our products. Need for video technology regulation In addition, we are currently evaluating all the various technology areas in which our video software can be used, such as with third-party integrations that utilise e.g., facial recognition. We are mapping out the advantages and disadvantages for societies. One key area of concern is how local authorities are mapping and storing data about us as individuals. This is the reason why we're inviting more legislation to regulate video technology rather than less. Engaging With policymakers We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard We are proactively reaching out to and connecting with policymakers and other relevant stakeholders to discuss our approach to and take on Responsible Technology and encouraging the political landscape to work with us around regulation and legislation. We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard and where we can openly weigh the advantages and the challenges of technology, whether it is video, facial recognition, machine learning, Artificial Intelligence, or other technologies. Striking a balance Implementing Responsible Technology is a journey, not a destination. To give it the focus needed, we have created a dedicated team to implement this initiative at Milestone Systems. At the same time, we are reaching out to the political landscape to discuss how we balance regulation without hindering innovation. Video technology used ethically We are a global company with worldwide operations, and we are having dialogues about how video technology is being used and how we can have meaningful talks about what regulation and legislation should look like. However, we don’t necessarily want to limit access to the technology itself. Facial recognition We encourage the policymakers to engage with us in the industry so that together we can strike the fine line Facial recognition is a great example of this. The EU is considering making live facial recognition illegal. That would be a huge inhibitor of proactive terrorism prevention. For example, if a well-known terrorist is walking down the street and is being mapped out against Interpol’s most wanted list, the authorities should be able to react. However, if a person walking down the street but is not mapped out or does not have any priors then the city should not be allowed to store the data of that individual’s whereabouts at that point in time. This potential legislation is concerning to me as a citizen of Europe. Instead, we encourage the policymakers to engage with us in the industry so that together we can strike the fine line for the better good of all of us. Maintaining high ethical standards We have a firm understanding and expectation that ethical standards are a huge driver in the security business. Citizens are not in favour of technology companies abusing data about them and monetising from things that they have not opted in to do. Soon, I think we will see many more companies and governments leaning toward suppliers that do have a responsible mindset and high ethical standards for partnerships. Ethical practices Our journey toward Responsible Technology is an ongoing process, and we must remain steadfast in our commitment to ethical practices and the protection of human rights. We recognise that the rapidly changing technological landscape continually presents new challenges and opportunities. For this reason, we continuously look into how we can improve, for example, our end user licence agreements to avoid potential human rights abuses. An industry responsibility Security companies must prioritise careful planning and preparation, including developing policies and procedures For Responsible Technology to truly become a reality, compliance with international human rights laws and data privacy regulations is critical. Security companies must prioritise careful planning and preparation, including developing policies and procedures that govern the ethical use of video surveillance systems. The secure and ethical community In today's technology environment where deep integrations, machine learning, and artificial intelligence are becoming the norm, Responsible Technology is more relevant than ever. The security industry has a unique opportunity to set an example for other sectors by promoting a secure and ethical development community that prioritises Responsible Technology, trustworthy data collection, and the protection of human rights. We must all rise to this challenge and embrace our role as ethical leaders for the greater good of both people and societies.
Case studies
Drastically worsening thefts from professional gangs on UK construction sites have garnered national outrage and prompted many firms across the country to install temporary CCTV towers to deter ‘stealing to order’, say Kingdom Systems. The company, who protect hundreds of construction sites from theft each year, warns about the rise of ‘stealing to order’- where criminals are given a list of sought-after machinery and equipment to then steal and sell on. Equipment Theft Act Temporary CCTV towers can massively help to prevent ‘stealing to order’ crimes and protect businesses that are at risk of losing £800 million every year, according to insurer Allianz Cornhill. Businesses are also desperately waiting for the Government to address this surgeBusinesses are also desperately waiting for the Government to address this surge, says Kingdom Systems. Last year, the Government brought in the Equipment Theft (Prevention) Act to counteract the problem in the agricultural sector, but it failed to address the issue suffered by construction sites nationwide. Research by CIOB With research by the Chartered Institute of Building (CIOB) revealing that a staggering 92% of construction workers are affected by theft, with 21% saying they suffer from it every single week, it’s an epidemic that largely lies in the hands of individual project managers to prevent until wider governmental changes are made. Often, tradespeople and construction workers have no choice but to leave expensive equipment and machinery onsite overnight, making construction sites a goldmine for thieves looking for opportunities. Temporary CCTV towers CCTV footage from temporary CCTV towers can provide valuable evidence in the event of a theft “The serious risk of theft is a concern for all construction site managers and staff, especially when demand for stolen equipment is so high and the costs of replacing them remain equally astronomical. But installing permanent CCTV towers is expensive, time-consuming, and unlikely to be the best option for temporary construction sites,” says Paul Worsley, Director of Service from Kingdom Systems. “Installing temporary CCTV can be an efficient way to enhance security, deter criminals and safely document any breaches or suspicious activity.” CCTV footage from temporary CCTV towers can provide valuable evidence in the event of a theft, speeding up the time it takes to catch the perpetrators. With 34% of tradespeople saying that the thefts have impacted their mental health, temporary CCTV provides that much-needed peace of mind for the sector. Author's quote “For everyone involved in a project, a theft of a considerable amount of equipment or machinery can cause a lot of stress and worry." "The idea that professional gangs rather than opportunists are targeting sites without proper security means they need to have a more strategic and effective approach to deterring criminals, beyond just the usual lock and key,” says Paul Worsley.
Boosting its safety credentials in the French market, global wireless solutions provider Ramtech has successfully helped safeguard La Tour Pleyel – a 129 m skyscraper undergoing major restructuring ahead of the Paris Olympic Games. The iconic venue, which is due to complete in spring 2024, is being turned into a multi-purpose complex in the Plaine Saint-Denis and Greater Paris area – requiring a comprehensive fire safety solution to protect workers and site assets during the construction phase. Event of a fire incident The WES3 Wireless Fire Safety and Evacuation System is being used throughout the 39 floors of the site, providing an automatic 24/7 smoke and heat detection system that helps coordinate emergency response in the event of a fire incident. Fire safety should be the top priority at any construction site to keep workers safe" Stephane Stoesser, business development manager – France at Ramtech, said: "Fire safety should be the top priority at any construction site in order to keep workers safe, as well as project timelines and finances in check, and the WES3 system is the perfect choice for protection against potential hazards. This was a significant project, across a huge number of floors, so traditional methods of incident response, such as air horns or walking patrols, would only pose long delays between detection and emergency response. A forward-thinking, digital solution was needed, and we were delighted that our system was chosen to help keep people safe ahead of the Olympic Games.” WES3 wireless fire system The extensive renovation process at La Tour Pleyel has seen the construction of a hotel, conference centre and additional towers. The adaptability and ease of installation of the WES3 system were crucial in providing effective fire detection to an ever-evolving construction site. The WES3 wireless fire system proved the ideal choice for the large-scale project Ramtech’s role in safeguarding La Tour Pleyel comes off the back of further success in Paris, including protecting The Arboretum – a 125,000 sq ft tertiary campus on the banks of the river Seine. The solid wood structure of the building put it at particular risk of fire damage, and the WES3 wireless fire system proved the ideal choice for the large-scale project, as chosen by contractor GCC Groupe thanks to the system’s scalability and efficiency. Author's quote Adam Kovics, sales manager at Ramtech, said: “Right now we’re experiencing an accelerated growth period in the French market, which shows contractors are putting safety first and investing in technology to help futureproof construction sites." “Our aim at Ramtech is to help increase fire safety education across Europe and beyond, and these recent projects show we’re well on our way to achieving that. We’re pleased with the presence we’re building in the French region and look forward to working with even more contractors and fire safety professionals in 2024.”
Athena Security’s Concealed Weapons Detection System was selected by Champions Club Texas to protect patrons, members and staff at a first-of-its-kind hospitality destination in Houston that features a full-service hotel, lounge and bar with Southern-inspired cuisine and private-membership poker. Located in Houston’s expanding Westchase community, Champions Club Texas is celebrating its grand opening as a destination offering something for everyone, from business travellers seeking comfortable accommodations with well-appointed amenities to locals looking for a unique night out. Weapons detection system Athena's Concealed Weapons Detection System (WDS)/Walk Through Metal Detector is engineered to detect a wide range of mass casualty threats like handguns, shotguns, and rifles without requiring individuals to stop as they pass through the detector. There is no need to have individuals remove phones, wallets, or other extraneous items from their pockets due to the proprietary multiple-sensor detection method. The system adheres to Federal Standards while allowing both auditory and visual alert options, as seen in the best practices of Homeland Security for WDS. The concealed weapons detection system is designed to scan walking at an average speed of one person per second. Unintimidating approach Athena Security is a solution that detects weapons upon entry and is one of the many layers of security “At Champions we are raising the bar in hospitality and gaming, and that includes ensuring the most comfortable and safe atmosphere for our valued customers,” said Trent Touchstone, Director of Security, Champions Club Texas. “Athena Security is a solution that detects weapons upon entry and is one of the many layers of security protocols in place at Champions that improves operational efficiency of our security team as a workforce multiplier.” Athena Security’s low profile, unintimidating approach is a welcome differentiator from historic metal detector tech by eliminating the need to check cell phones and keys, allowing for a better flow into the venue. Modest-full time security team Advanced analytics and management protocols allow for deep visibility and flexibility to maintain staffing levels providing the highest level of safety. Touchstone, a 28-year veteran of the United States Marshals Service Chief with a long history of threat analysis, notes that given the hotel and membership club will require 24/7 attention with a modest-full time security team, he appreciates Athena Security’s ability to provide a feature-rich entryway security experience with the ability to automate and accomplish so much remotely.
Like most stadiums worldwide, the Alsancak Mustafa Denizli Stadium suffers from vandalism and riots by individual fans. To be able to better identify and track perpetrators and thus reduce financial and non-material damage, the operator opted for a video security solution from the German manufacturer Dallmeier. The Alsancak Mustafa DenizIi Stadium in Izmir–named after former Turkish football player and current football coach Mustafa Denizli–is a multipurpose stadium that mainly hosts football matches. With over 15,000 seats, it is one of the medium-sized stadiums in Türkiye. Originally built in 1929, it was demolished in 2015 and reopened after reconstruction in November 2021. Up to 15% fewer spectators due to riots Outcomes have been painful, ranging from classic fines to the closure of an entire block of viewers In Türkiye, stadiums are usually owned by the Ministry of Sport, which then grants the rights of use to an operator. In the case of the Alsancak stadium, the operator is “Altay Izmir”, an Izmir-based football club that currently plays in Türkiye’s top professional league. The club, like so many other football stadiums, has had its fair share of repeated incidents and threats to spectators and players. These have included verbal abuse and even the throwing of objects onto the pitch. In addition to the intangible damage to the image, the consequences have been painful, ranging from traditional fines to the closure of an entire block of spectators–a loss of 1,000 to 2,000 spectators per home game, and that on a regular basis. How is image quality defined to recognise perpetrators? Under these conditions, the operators were looking for a solution that would allow them to reliably detect and track potential offenders. The tender specified a minimum resolution density of 144 pixels per metre (px/m), which is also required by law. This means that there must be at least 144 pixels in the camera image to represent every metre of “reality” in the stands. This value is between the “recognition” (125 px/m) and “identification” (250 px/m) qualities specified in the IEC EN 62676-4 standard for video surveillance systems. Only ten cameras to monitor the stands The Ministry of Sports decided to invite various manufacturers to a comparative test To find the most suitable solution for the Alsancak Stadium, the Ministry of Sports decided to invite various manufacturers to a comparative test. After receiving the proofs of concept (PoCs) of several companies, the owner chose a solution from the German manufacturer Dallmeier Electronic. In addition to around 140 single-sensor cameras for corridors, outdoor areas and entrances, only ten “Panomera®” multifocal sensor systems are required for the particularly critical grandstand surveillance. 39% more resolution than required The low number of camera systems required for grandstand surveillance is due to the patented multifocal sensor technology: Panomera® cameras combine the images from up to seven detail sensors and one overview sensor in a single camera system. This provides the user with a high-resolution overview of the entire area to be monitored, which acts as a single image of a vast environment. Within this overall picture, system operators can now open any number of detail views at the same time, while the overall scene is always available in high resolution–even during recording, which is essential for possible prosecution. This provides an optimal overview of the situation and ensures that all events can be followed in real-time, in high resolution and in detail. Thanks to this technology, a minimum of 200 px/m is now available throughout the Alsancak stadium instead of the required 144 px/m – 39 percent more than originally required. No surprises: Remote “FAT” and training from Dallmeier Türkiye Due to the COVID-19 pandemic, the stadium's technicians were unable to travel to Dallmeier's headquarters in Regensburg, Germany, to commission the system and attend classroom training. For this reason, the so-called Dallmeier Factory Acceptance Test (FAT) took place online. The entire system was set up, configured and remotely accepted in the FAT centre in Regensburg. The training of the technicians and operators was carried out by Dallmeier Türkiye experts on-site The training of the technicians and operators was carried out by Dallmeier Türkiye experts on site. Serkan Atalar, CEO of RESA Construction Electromechanical Inc. Co, the installer company that implemented the project, is very pleased: “Dallmeier's sincere and collaborative approach, as well as the high-tech products and after-sale support they offered were very impressive. We thank Dallmeier Türkiye for the great cooperation.” Author's quote “The customer is very satisfied with the Panomera® systems. The benefits are equivalent to combining a powerful megapixel camera with any number of high-resolution 'virtual' PTZ cameras. At the same time, the systems reduce the total cost of ownership for infrastructure, cables, masts, screens, workstations, etc.,” Serkan Atalar summarises. “Alsancak Stadium only needs three system operators with one monitor each. They also have two workstations for the police and management. The solution always gives them 100% control of the security situation in the stadium, allowing them to react immediately and reliably track down perpetrators. And all this at a low total cost of ownership and with minimal manpower thanks to the unique multifocal sensor technology.”
Robots do monotonous workflows and less pleasant, repetitive tasks with brilliance. Combined with image processing, they become “seeing” and reliable supporters of humans. They are used in quality assurance to check components, help with the assembly and positioning of components, detect errors and deviations in production processes and thus increase the efficiency of entire production lines. An automobile manufacturer is taking advantage of this to improve the cycle time of its press lines. Together with the latter, VMT Vision Machine Technic Bildverarbeitungssysteme GmbH from Mannheim developed the robot-based 3D measuring system FrameSense for the fully automatic loading and unloading of containers. Pressed parts are thus safely and precisely inserted into or removed from containers. Four Ensenso 3D cameras from IDS Imaging Development Systems GmbH provide the basic data and thus the platform for process automation. Application The actual workflow that FrameSense is designed to automate is part of many manufacturing operations. A component comes out of a machine-here a press- and runs on a conveyor belt to a container. There it is stacked. As soon as the container is full, it is transported to the next production step, e.g., assembly into a vehicle. All these tasks are now to be taken over by a robot with a vision system-a technological challenge Up to now, employees have been responsible for loading the containers. This actually simple subtask is more complex than one might think at first glance. In addition to the actual insertion process, the first step is to determine the appropriate free space for the part. At the same time, any interfering factors, such as interlocks, must be removed and a general check of the “load box” for any defects must be carried out. All these tasks are now to be taken over by a robot with a vision system-a technological challenge. This is because the containers also come from different manufacturers, are of different types, and thus vary in some cases in their dimensions. Positioning of the components For their fully automatic loading and unloading, the position of several relevant features of the containers must be determined for a so-called multi-vector correction of the robot. The basis is a type, shape and position check of the respective container. This is the only way to ensure process-reliable and collision-free path guidance of the loading robot. All this has to be integrated into the existing production process. Time delays must be eliminated and the positioning of the components must be accurate to the millimetre. 3D point cloud These point clouds of all four sensors are combined for the subsequent evaluation To counter this, VMT uses four 3D cameras per system. The four sensors each record a part of the entire image field. This can consist of two containers, each measuring approximately 1.5 × 2 × 1.5 metres (D × W × H). Two of the cameras focus on one container. This results in data from two perspectives each for a higher information quality of the 3D point cloud. These point clouds of all four sensors are combined for the subsequent evaluation. In the process, registrations of relevant features of the container take place in Regions of Interest (ROIs) of the total point cloud. Interference contours Registration is the exact positioning of a feature using a model in all six degrees of freedom. In other ROIs, interference contours are searched for which could lead to collisions during loading. Finally, the overall picture is compared with a stored reference model. In this way, the containers can be simultaneously checked for their condition and position in a fully automated manner. Even deformed or slanted containers can be processed. All this information is also recorded for use in a quality management system where the condition of all containers can be traced. The calibration as well as the consolidation of the measurement data and their subsequent evaluation are carried out in a separate IPC (industrial computer) with screen visualisation, operating elements and connection to the respective robot control. Image processing solution The entire image processing takes place in the image processing software MSS developed by VMT The main result of the image processing solution is the multi-vector correction. In this way, the robot is adjusted to be able to insert the component at the next possible, suitable deposit position. Secondary results are error messages due to interfering edges or objects in the container that would prevent filling. Damaged containers that are in a generally poor condition can be detected and sorted out with the help of the data. The entire image processing takes place in the image processing software Multi-Sensor Systems (MSS) developed by VMT. FrameSense is designed to be easy to use and can also be converted to other components directly on site. Robust 3D camera system On the camera side, VMT relies on Ensenso 3D cameras-initially on the X36 model. The current expansion stage of FrameSense is equipped with the Ensenso C variant. The reasons for the change are mainly the better projector performance-thanks to a new projection process-as well as a higher recording speed. In addition, the Ensenso C enables a larger measuring volume. This is an important criterion for FrameSense, because the robot can only reach the containers to be filled up to a certain distance. The specifications of the Ensenso C thus correspond exactly to VMT's requirements, as project manager and technology manager Andreas Redekop explains: "High projector performance and resolution together with fast data processing were our main technical criteria when selecting the camera. The installation in a fixed housing was also an advantage.” Ensenso models Housing of a robust 3D camera system meets the requirements of protection class IP65/67 The Ensenso C addresses current challenges in the automation and robotics industry. Compared to other Ensenso models, it provides both 3D and RGB colour information. Customers thus benefit from even more meaningful image data. The housing of the robust 3D camera system meets the requirements of protection class IP65/67. It offers a resolution of 5 MP and is available with baselines from current to approx. 455 mm. This means that even large objects can be reliably detected. The camera is quick and easy to use and addresses primarily large-volume applications, e.g., in medical technology, logistics or factory automation. Outlook By automatically loading and unloading containers and the integrated 3D container inspection, manual workstations can be automated with the help of FrameSense. Against the background of the shortage of skilled workers, the system can thus make an important contribution to process automation in the automotive industry, among others. It meets the prevailing challenges of the industry. Ensenso C provides the crucial basis for data generation and exceeds the requirements of many applications. Lukas Neumann from Product Management sees their added value especially here: “The high projector power and large sensor resolutions are particularly advantageous in the field of intralogistics. Here, high-precision components have to be gripped from a great distance with a large measuring volume.” For other stacking or bin-picking applications in classic logistics, he could imagine a similar camera with high projector power but lower resolution and fast recording. So nothing stands in the way of further developments and automation solutions in conjunction with "seeing" robots.
The Rewley Road Swing Bridge, an integral part of Oxford's industrial history, underwent a remarkable transformation in 2023 from rusting to restoration. Through a collaborative effort between the Oxford Preservation Trust, the Railway Heritage Trust, Historic England, and input on security solutions from Jacksons Fencing, this iconic landmark was meticulously restored and safeguarded for the enjoyment of present and future generations. A journey through time Dating back to 1851, the Rewley Road Swing Bridge played a pivotal role in the movement of goods and people during the 19th century in Oxford. However, changing times lead to its disuse and subsequent state of disrepair. By the 1980s, the bridge stood permanently fixed in an open position. Recognising the historical and cultural significance of the bridge, the Oxford Preservation Trust embarked on a restoration journey to bring this historical treasure back to life. Jacksons Fencing was specified by the Railway Heritage Trust and Historic England to provide demarcation fencing around the landmark, playing a vital role in ensuring the successful establishment of the bridge as a visitor attraction. Modern security meets historical elegance Fencing's unique vertical bar design not only exudes visual grace but also helps as a robust barrier To ensure the safety of visitors and protect the bridge from potential vandalism, Jacksons Fencing provided a thoughtful protection plan that seamlessly integrated modern security features with the bridge’s historical aesthetic. In the pursuit of safeguarding the Rewley Road Swing Bridge, Jacksons Fencing introduced a total of 57 metres of 1.25 m high Barbican Imperial® fencing which seamlessly harmonised security with the bridge's historical charm. The fencing's unique vertical bar design not only exudes visual elegance but also serves as a robust barrier against unauthorised access. This fence choice is ideal for a heritage project as it offers the look of traditional metal railings but with a modern, stronger, and more sustainable tubular design. Barbican Imperial fencing Concealed connectors and the absence of visible bolts or fixings further amplify the fencing's security prowess while maintaining a clean and uncluttered appearance. As an integral part of the protection strategy, a 3.6 m wide double leaf gate was integrated, complete with a pad-lockable slide latch. This innovative latch ensures controlled access, reinforcing security without compromising convenience. The specification of high-quality materials was paramount for this project. The selected Barbican Imperial fencing was meticulously crafted from high-quality hot dip galvanised steel, equipping it with exceptional strength and resistance against the corrosive forces of time. To ensure the bridge's appearance would not wither, a black polyester powder coating was applied. This not only adds a touch of timeless sophistication but also guarantees durability and a long-lasting finish. By embracing modern techniques, the bridge's protective features are seamlessly integrated into its historic context, allowing it to confidently stand the test of time. A safe haven for local wildlife Gaps between the pales of the fencing facilitate the free movement of animals through the site Jacksons Fencing's commitment extended beyond human safety to encompass the thriving local ecosystem. With a profound understanding of the importance of coexistence with nature, the new security solution was intentionally designed to accommodate the movement of local wildlife. Gaps between the pales of the fencing facilitate the free movement of animals through the site ensuring that while security remains uncompromised, the natural ecosystem can flourish undisturbed. Now fully restored, a new life has been breathed into the Rewley Road Swing Bridge. Beyond its full restoration, the bridge now symbolises a link between the past and the future. Author's quote Peter Jackson, Managing Director, Jacksons Fencing, comments: "We're thrilled to have been part of restoring the Rewley Road Swing Bridge's historic charm while infusing modern security. Our commitment to eco-conscious solutions mirrors the Oxford Preservation Trust's vision for a biodiverse landscape. He adds, "By strategically integrating wildlife-friendly features, we've created a haven for both heritage and nature. The bridge's removal from the Heritage at Risk Register and its recognition with the Railway Heritage Trust Conservation Award in 2022 spotlight our collective dedication to preserving history while embracing security and sustainability."
Round table discussion
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
The high cost of thermal imaging cameras historically made their use more likely in specialised law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?