Research & Testing
HID Global, a worldwide provider of trusted identity solutions, announced its patented Lumidigm multispectral imaging solution is the first fingerprint technology certified to the ISO/IEC 30107-3 Presentation Attack Detection (PAD) standard, which focuses on anti-spoofing and liveness detection to determine whether fingerprint data captured from the sensor is from a real, living person or from a plastic fake or other artificial copy. Since the specification’s release more than a year ago,...
Ava Group, a market provider in the provision of risk management services and technologies, announces the launch of the Global Cybersecurity Centre of Excellence (CCoE). This new programme demonstrates Ava Group’s strong commitment to data security of customers, by providing expert guidance and assurance that the products deployed on their data network infrastructure exceed stringent globally-recognised cybersecurity standards. NIST Cybersecurity Framework The CCoE takes full advantage o...
EUSAS and Euralarm, hosted by Airbus, recently organised their second joint conference, which was this year on the topic of aviation safety and security. It showed once again the importance of technological development for an industry endeavoured to protect lives with a particular relevance to the aeronautics and air transport sectors. Aviation safety & security The US Federal Aviation Administration reports yearly over 100 false fire alarms on airplanes, resulting in unplanned landings an...
Zhejiang Dahua Technology Co., Ltd., a solution provider in the global video surveillance industry, signs a strategic partnership agreement with Denmark’s top parking and traffic solutions provider Scanview Systems, who has smoothly delivered the Copenhagen Airport and Billund Airport car parking projects upon close and successful cooperation with Dahua Technology. Mr. Michael Chen, Dahua VP, General Manager of Overseas Business, Mr. Zhang Xingming, Dahua VP, General Manager of R&D Ce...
Gallagher celebrates its 80th anniversary as a technology company in the security, fuel systems and animal management industries. The family owned-and-operated global security giant was founded in 1938 by the late Bill Gallagher Senior and 80 years ago was a 10-person business that designed and delivered New Zealand’s first electric fence solution. Today, the company employs 1,100 people across a global network in ten countries. Research and development alone makes up 135 of the workforce...
Finding the exact right technology to solve an end user’s problem is challenging, but the rewards are great when an integrator gets it right. A wide range of available product types, price levels and added features increases the likelihood of identifying a technology to solve any problem. But with so many technology and product choices in the marketplace, identifying that one solution can be akin to finding a needle in a haystack. We wondered whether a vast range of product choices is alwa...
While many door closers are stated as being approved for metal fire doors, in a number of cases this only applies to insulated metal fire doors. And with around 8 out of 10 metal fire doors sold in the UK being non-insulated, this means many door closers are not fit for purpose – with potentially disastrous results. Fire-resistant doors Non-insulated systems provide certified fire resistance for integrity only, protecting against the passage of fire and smoke. However, as the name implies, these fire doors are not certified for insulation and so cannot protect against the passage of heat. This becomes an issue for a door closer that is filled with mineral semi-synthetic mix oil, as it can ignite when it reaches a high enough temperature. Certifire, the testing organisation, has recently revised their certification to more accurately state the type of metal fire door that a door closer is approved for use Certifire, the testing organisation, has recently revised their certification to more accurately state the type of metal fire door that a door closer is approved for use. But with so many installers and specifiers unaware of this risk, UNION is urgently calling on installers and property owners to check their closing devices are suitable for non-insulated metal fire doors. Certifire documentation David Hindle, Door Closer Specialist at UNION, explains: “We believe many door closers could have been incorrectly specified for non-insulated metals fire doors, which could pose a real danger to lives in the event of a fire. These door closers are not suitable for fire escapes or other applications where extreme heat could risk lives or cause serious damage to property. Certifire have taken a proactive stance on this matter and updated their certification to give a specifier or installer more detailed information.” “Professionals can overcome this issue by following three simple steps. First of all, check all relevant Certifire documentation and make sure this has been updated for any recent amendments. Next, check whether the documentation includes details on the type of fire doors that the door closer has been tested on. Finally, where metal fire doors are covered, are there any restrictions on the type of fire door? By following these steps, you can discover if you have any issues to resolve with your door closers.” All UNION door closers are supplied with a glycol mix that has been successfully tested on non-insulated fire doors by two UKAS accredited fire testing facilities UNION door closers “For complete peace of mind, all UNION door closers are supplied with a glycol mix that has been successfully tested on non-insulated fire doors by two UKAS accredited fire testing facilities. Therefore, those choosing a UNION door closer can be safe in the knowledge that they are fitting a device that does not contain an oil that could possibly ignite in the case of a fire.” “This is a hugely serious issue that all specifiers and installers need to be aware of. Anyone worried that they may have a door closer that is not safe can also call us for advice on 0845 2232124.”
ASSA ABLOY Security Doors, a UK division of ASSA ABLOY, global supplier of door opening solutions, has delivered a successful security testing day in partnership with BRE. Held at the Security Doors factory in Lisburn, Northern Ireland, the day saw a fantastic turn-out of security professionals who witnessed various methods of attack on both steel and timber doorsets. The event consisted of an overview of the LPS 1175 test standard, a comprehensive factory tour and a practical demonstration that showed the difference between certified and non-certified security doors. Ian Broadley, Business Development Manager for ASSA ABLOY Security Doors said: “We hosted this event to help illustrate the difference between investing in a certificated product versus a product that may look similar visually but can be compromised very easily when put to the test.” A test rig was set up at our factory, housing two steels doors and two timber doors" Standard-compliant doors “A test rig was set up at our factory, housing two steels doors and two timber doors. The BRE team used various methods of attack to demonstrate how they were able to defeat the doors that were not built to meet LPS 1175 test standards.” “We received a great deal of positive feedback from attendees, which included security consultants, end users, police, and government personnel. Attendees commented on how thought-provoking it was to witness just how quickly un-certified doors could be compromised.” ASSA ABLOY Security Doors is the only UK company to manufacture steel and timber security doorsets to both LPS 1175 Commercial and CPNI HM Government standards.
Cybersecurity talk currently dominates many events in the physical security industry. And it’s about time, given that we are all playing catch-up in a scary cybersecurity environment where threats are constant and constantly evolving. I heard an interesting discussion about cybersecurity recently among consultants attending MercTech4, a conference in Miami hosted by Mercury Security and its OEM partners. The broad-ranging discussion touched on multiple aspects of cybersecurity, including the various roles of end user IT departments, consultants, and integrators. Factors such as training, standardisation and pricing were also addressed as they relate to cybersecurity. Following are some edited excerpts from that discussion. The role of the IT department Pierre Bourgeix of ESI Convergent: Most enterprises usually have the information technology (IT) department at the table [for physical security discussions], and cybersecurity is a component of IT. The main concern for them is how any security product will impact the network environment. The first thing they will say, is “we have to ensure that there is network segmentation to prevent any potential viruses or threats or breaches from coming in.” The main concern for IT departments is how any security product will impact the network environment”They want to make sure that any devices in the environment are secure. Segmentation is good, but it isn’t an end-all. There is no buffer that can be created; these air gaps don’t exist. Cyber is involved in a defensive matter, in terms of what they have to do to protect that environment. IT is more worried about the infrastructure. The role of consultants and specifiers Phil Santore of DVS, division of Ross & Baruzzini: As consultants and engineers, we work with some major banks. They tell us if you bring a new product to the table, it will take two to three months before they will onboard the product, because they will run it through [cybersecurity testing] in their own IT departments. If it’s a large bank, they have an IT team, and there will never be anything we [as consultants] can tell them that they don’t already know. But we all have clients that are not large; they’re museums, or small corporations, or mom-and-pop shops. They may not be as vulnerable from the international threat, but there are still local things they have to be concerned about. It falls on us as consultants to let them know what their problems are. Their IT departments may not be that savvy. We need to at least make them aware and start there. Wael Lahoud of Goldmark Security Consulting: We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels. At the procurement stage, we as consultants must select and specify products that have technology to enable cybersecurity, and not choose products that are outdated or incompatible with cybersecurity controls. We also see, from an access control perspective, a need to address weaknesses in databases. Specifying and having integrators that can harden the databases, not just the network itself, can help. The impact of physical security products on the network environment was a dominant topic at the MercTech4 consultants roundtable discussion The need for standards on cybersecurity Jim Elder of Secured Design: I’d like to know what standards we as specifiers can invoke that will help us ensure that the integrator of record has the credentials, knows what standards apply, and knows how to make sure those standards are maintained in the system. I’m a generalist, and cybersecurity scares the hell out of me.We’re not just talking about access to cameras, we are talking about access to the corporate network and all the bad things that can happen with that. My emphasis would be on standards and compliance with standards in the equipment and technology that is used, and the way it is put in. It can be easier for me, looking at some key points, to be able to determine if the system has been installed in accordance. We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels"I’m taking the position of the enforcement officer, rather than the dictator. It would be much better if there were focused standards that I could put into the specification— I know there are some – that would dictate the processes, not just of manufacturing, but of installation of the product, and the tests you should run accordingly. Pierre Bourgeix: With the Security Industry Association (SIA), we are working right now on a standard that includes analysed scoring on the IT and physical side to identify a technology score, a compliance score, a methodology, and best-of-breed recommendation. Vendor validation would be used to ensure they follow the same process. We have created the model, and we will see what we can do to make it work. Terry Robinette of Sextant: If a standard can be written and it’s a reasonable process, I like the idea of the equipment meeting some standardised format or be able to show that it can withstand the same type of cyber-attack a network switch can withstand. We may not be reinventing the wheel. IT is the most standardised industry you will ever see, and security is the least standardised. But they’re merging. And that will drive standardisation. Jim Elder: I look to Underwriters Laboratory (UL) for a lot of standards. Does the product get that label? I am interested in being able to look at a box on the wall and say, “That meets the standard.” Or some kind of list with check-boxes; if all the boxes are checked I can walk out and know I have good cybersecurity threat management. IT is the most standardised industry you will ever see, and security is the least standardised" The role of training Phil Santore: Before you do any cybersecurity training, you would need to set the level of cybersecurity you are trying to achieve. There are multiple levels from zero to a completely closed network. Wael Lahoud: From an integrator’s perspective, cybersecurity training by the manufacturer of product features would be the place to start – understanding how to partner the database, and the encryption features. We see integrators that know these features are available – they tick the boxes – but they don’t understand what they mean. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organisation. That would be a good starting point. The role of integrators Wael Lahoud: Integrators like convenience; less time means more money. So, we see some integrators cut corners. I think it is our role (as consultants) to make sure corners are not cut. If you rely solely on integrators, it will always be the weak password, the bypass. We have seen it from small projects to large government installations. It’s the same again and again. Even having an internal standard within an organisation, there may be no one overseeing that and double-checking. Tools will help, but we are not there at this point. I will leave it up to manufacturers to provide the tools to make it easy for consultants to check, and easier for integrators to use the controls. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organisation - so training is very important The impact of pricing Pierre Bourgeix: The race to the cheapest price is a big problem. We have well-intended designs and assessments that define best-of-breed and evaluate what would be necessary to do what the client needs. But once we get to the final point of that being implemented, the customer typically goes to the lowest price – the lowest bidder. That’s the biggest issue. You get what you pay for at the end of the day. With standards, we are trying to get to the point that people realise that not all products are made the same, not all integrators do the same work. We hope that through education of the end user, they can realise that if they change the design, they have to accept the liability.It’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it" The big picture Wael Lahoud: The Windows platform has a lot of vulnerabilities, but we’re still using it, even in banks. So, it’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it. That’s where the cybersecurity program comes into play. There are many vulnerable products in the market, and it’s up to professionals to properly secure these products and to design systems and reduce the risk. Pierre Bourgeix: The access port to get to data is what hackers are looking for. The weakest link is where they go. They want to penetrate through access control to get to databases. The golden ring is the data source, so they can get credentialing, so they can gain access to your active directory, which then gives them permissions to get into your “admin.” Once we get into “admin,” we get to the source of the information. It has nothing to do with gaining access to a door, it has everything to do with data. And that’s happening all the time.
Brexit will bring sweeping changes to the way the UK not only interacts internationally, but also internally. With the country standing alone with regards to trade and exports, it is vital for us to be fully prepared. However, there is one area that I think needs much greater scrutiny—the UK technical skills gap. Tellingly, there is a palpable shortage of technical training and skills right across the UK economy. With the country’s economic strength relying heavily on cutting-edge technology and knowledge, the UK security industry has particular reason to be anxious of movement restrictions on internationally sourced expertise and resources, as well as a potential ‘brain-drain’ of domestic talent. There is a lack of quantity and quality of home-grown talent in the pipeline, and there is a greater availability of talent from overseas Need for security education There are two distinct aspects that need to be addressed when you look at the requirements of the UK economy with regards to technical expertise. First of all, there is the quantity and quality of home-grown talent in the pipeline, and secondly, there is the availability and desire of talent from overseas wanting to work in the UK. In my own experience, it can be quite a challenge finding the best technical expertise (in the numbers needed) from the UK alone. Currently, alongside our British employees, our business employs a sizable amount of international security talent, ensuring we can fill key roles with exactly the right people. As well as sourcing expertise from abroad, I passionately believe we need to properly support and educate the next generation of UK security professionals too, ensuring we can also find the right talent closer to home in the future. T-Levels provide valuable business experience which can be lacking in traditional academic courses Technology-level training for modern needs It is frustrating to see the current skills gap—particularly as I felt the UK Government began moving in the right direction when it reintroduced the excellent national apprenticeships scheme a few years ago. There is no doubt we will always need excellent academic qualifications and people trained in research and development, but equally a stint in further education is certainly not for everyone! Undoubtedly apprenticeships are an excellent way of encouraging hungry young talent into any industry with on-the-job training. Importantly, this isn’t just academic training either—it also provides valuable business experience too, which can be lacking in more traditional academic courses. There has also been a lot of interest in ‘T-Levels’ in the UK. These are technology level courses that are designed to offer specific training for modern technology needs. It is very encouraging to see the promotion of technology education in this way, designed to appeal to students that are looking for a solid career in the UK technology sector. Apprenticeships are an excellent way of encouraging hungry young talent into any industry with on-the-job training Focus on engineering and vocational education Unfortunately, it seems the UK is still somewhat behind our European cousins when it comes to technology education and training. Germany, for example, is a country that has traditionally excelled in these areas. The education system in Germany has heavily focussed on engineering and vocational-based training programmes, which has seen noticeable benefits for its technology sector. The Germans have continued to focus on this for decades, meaning the country’s economy has an excellent pipeline of well-trained talent available. Taking this approach would greatly enhance training in the UK too, supporting up-and-coming talent and helping the next generation reach its potential. A healthy influx of highly talented individuals from across Europe has helped to fill the UK skills gap over recent decades Meeting business and technology needs A healthy influx of highly talented individuals from across Europe has helped to fill the UK skills gap over recent decades. Undoubtedly, like many British businesses we have significantly benefited from this open and vibrant skills market. With the fine details of Brexit being negotiated at the moment, I hope this valuable source of skilled professionals won’t be denied to UK businesses. Even if there are more stringent controls moving forward, the UK must continue to open its doors to this expertise—certainly until we can reap future generations of home-grown talent. It’s interesting (and somewhat ironic) that when you look at some UK universities’ engineering faculties, they often have half or over half of their students from other countries. The UK has world-renowned education facilities that we should be proud of, and yet paradoxically, we are still not educating enough UK engineers. There is a keen interest in technology from younger generations that needs to be nurtured Skill-based training for economic growth International trading and people movement will change after Brexit, but I hope there will also be a significant evolution in the education system to close the UK skills gap. The UK has some of the best educational establishments in the world and a long history of innovation and entrepreneurial skills to make our technology highly commercial. Frustratingly, there is a keen interest in technology from younger generations—just look how addicted young people are to their screens. This keen interest needs to be nurtured and career choices in technology encouraged. With the right training opportunities in place (university education, apprenticeships and T-Levels), the UK can easily implement the tools to create the right opportunities. However, what is really needed now is an impetus from political leaders to address training needs and ensure the economy continues to develop and grow to meet the challenges ahead.
Microsemi Corporation, a global provider of semiconductor solutions differentiated by power, security, reliability and performance, has announced interoperability between its 12 gigabits per second (Gbps) SAS/SATA host bus adapters (HBAs) and redundant array of independent disk (RAID) adapters, including the Microsemi Adaptec HBA 1100, SmartHBA 2100 and SmartRAID 3100, part of its Smart Storage adapters portfolio, and AMD’s EPYC processor series. Data centre customers looking for a storage adapter solution for EPYC processor deployments can now utilise Microsemi’s full suite of Smart Storage solutions with confidence as a fully compatible end-to-end solution. “As AMD-based processors are increasingly being considered for next-generation server deployments in cloud data centres, extensive interoperability testing between our companies has shown our feature-rich high performance Smart Storage adapters to be a powerful storage solution when paired with AMD’s EPYC processors,” said Pete Hazen, vice president and general manager of storage solutions at Microsemi. “We are pleased to work closely with a well-respected industry leader, as this collaboration provides data centre customers with the confidence to make Microsemi their first call when looking to adopt AMD’s unique EPYC processors.” The server processor market is experiencing tremendous change as workloads and applications continue to evolve" High performance and flexibility Market research firm IDC recently reported the worldwide server market grew nearly 20 percent in the third quarter of 2017, reaching $17 billion and trending even higher than the same research firm’s long-term forecast of 4 percent compound annual growth rate (CAGR) from 2015-2020. The Microsemi Smart Storage platform, which leverages the company’s unified Smart Storage Stack, is optimised for a variety of server storage applications for data centres, server original equipment manufacturers (OEMs) and server original design manufacturers (ODMs) due to its high performance and flexibility. “The server processor market is experiencing tremendous change as workloads and applications continue to evolve, consuming more memory bandwidth and I/O than ever before,” said Raghu Nambiar, CVP and CTO of Datacenter Ecosystems and Application Engineering, AMD. Security partnerships “This is where the AMD EPYC processor stands apart, delivering leading performance and scale for cloud and enterprise customers. Now these customers can benefit from Microsemi’s feature-rich Adaptec Smart Storage technologies combined with the AMD EPYC processor to help them achieve new levels of total cost of ownership savings in the data centre.” The Accelerate Ecosystem is designed to reduce time-to-market for end customers and time-to-revenue for Microsemi and ecosystem members AMD collaborates with Microsemi as part of Microsemi Accelerate Ecosystem, which facilitates collaboration between Microsemi and leading firms in the semiconductor integrated circuit (IC), intellectual property (IP), systems, software, tools and design spaces to integrate, test and deliver pre-validated designs and system-level solutions for end customers in Microsemi’s key vertical markets—aerospace and defense, data centre, communications and industrial. The Accelerate Ecosystem is designed to reduce time-to-market for end customers and time-to-revenue for Microsemi and ecosystem members via technology alignment, joint marketing and sales acceleration. Smart storage adapters The Microsemi Adaptec HBA 1100, as well as the company’s SmartHBA 2100 and SmartRAID 3100, leverage the unified Smart Storage Stack. The combination of its Unified Smart Storage Stack, SmartRAID and SmartHBA, HBA product families and Microsemi SXP family of SAS expanders provide a complete server solution for storage management and connectivity. Each family has unique differentiating features. The HBA 1100 is optimised for SDS, cloud storage and raw high-performance connectivity. It also includes: Adapters with up to 24 ports using 28nm SAS/SATA-optimised silicon, offering an optimal power profile for the target applications Support for host-managed and host-aware SMR drives Broad OS driver support, including inbox driver support Performance of up to 1.7 million input/output operations per second (IOPS) SmartHBA 2100 is industry's only basic RAID solution with more than eight portsOptimised for SDS applications The SmartHBA 2100 is optimised for SDS applications which desire hardware RAID for OS boot drives as well as entry-level RAID for SMBs. It also provides: Basic RAID without compromising on the requirement for a fully featured and functional HBA, which is required for multi-path IO and SDS applications Mixed mode enables drives to be independently configured as raw drives or as part of a logical volume True hardware RAID for RAID 0,1,10 and RAID 5 Industry's only basic RAID solution with more than eight ports Enterprise storage The SmartRAID 3100 is optimised for enterprise storage applications which require the highest level of data availability and data centre applications which benefit from caching. It also features: Adapters with up to 24 ports using 28nm SAS/SATA-optimised silicon, offering an optimal power profile for the target applications Zero Maintenance Cache Protection (ZMCP) with a cache size of up to 4GB and integrated cache backup circuitry for optimal cost, thermal performance and operating efficiency Board options without cache backup maxCache 4.0 included on all adapters with up to ~2TB SSD cache Roadmap to maxCrypto controller-based encryption
Multitone Electronics plc, a specialist in the design, manufacture and implementation of integrated communication systems, will premiere its new Appear Crew and Ambulance apps for emergency teams and first responders, on stand J7 at the BAPCO 2018 conference and exhibition. Appear Crew mobile app Appear Crew uses Multitone’s highly successful Appear mobile platform, to assist emergency crews with reliable and secure messaging. As a complement to a pager, the Appear Crew app registers a response from each crew member and tracks their progress to their station from whichever location they are at. The system can also be used to track the movement of the individual team members, right to the fire station, showing locations on a map. This allows the Command and Control team to ensure everyone is accounted for when required. Multitone’s Emergency Services Major Accounts Manager, Peter Eborall states: “We anticipate great interest and demand for our Appear Crew app, which we developed in close collaboration with fire and rescue services. It has been extensively trialled and rigorously tested, to ensure it can be relied upon to provide the essential support needed to save lives.” Eborall adds, “In addition to fire and rescue crews, Appear Crew is ideally suited to meet the exacting communications requirements of RNLI and Coastguard emergency teams.” Ambulance app for emergency services Also, on stand J7 is Multitone’s new Ambulance app, which has been designed specifically to assist and co-ordinate teams, from full-time paramedics to Community First Responders. “Based upon our Appear Lite solution, the Ambulance app provides highly reliable contact, with proof-of-delivery for a proven audit trail,” adds Eborall. “The app is highly secure, preventing sensitive information being removed or screenshots being taken, to ensure confidentiality at all time.” The Ambulance app sends an automatic acknowledgement when the recipient receives the message, so the Command and Control team know it has been read. The app features a clear and simple-to-use interface that is easy to use and simple to read, whilst working with patients or out in the community.
To grasp the current manufacturing trends and seize the Zeitgeist of Industry 4.0, a new smart IoT industrial park in Hangzhou has been put to use by Dahua Technology, a video surveillance solution provider. Dahua Smart (IoT) Industrial Park occupies in total 512 acres in Fuyang district of Hangzhou, about 20 minutes’ drive from Dahua headquarters, designed to host 6000 staff (by 2017, 4500 people have been working/living in the 262 acres of phase one area). With topnotch technologies, personnel, materials and other benefits, Dahua’s smart industrial park will bring productivity and quality to a brand new level. Efficient information integration The automatic production solution based on integrated information system not only grants a higher productivity that significantly shortens the delivery cycle time for Dahua customers, but also a greater flexibility to specialised requests and ever-changing reality.The employment of software such as ERP, PLM, PDM, MES, APS and WMS helps to achieve information integration The employment of software such as ERP, PLM, PDM, MES, APS and WMS helps to achieve information integration, which, combined with industrial cameras, RFID sensory technologies and automation technologies, can integrate personnel, logistics, works, engineering projects and finance from respective sections of production(preparation, assembly, testing, packaging, inspection, shipment), rendering the whole process visible, traceable and digital. The mounter serves as a good synecdoche to illustrate the incredible efficiency of the whole production system. The concerning high-end devices (including mounter, printer, automated optical inspection equipment, Ersa reflow soldering tools, etc.) provided by ASM (originally Siemens) achieve a speed among the fastest in the world. Fast processing According to IPC standard, X4iS, the latest high-speed mounter can process 125,000 components per hour, or 35 per second. X35 multifunctional mounter can do 54000 components per hour, or 15 per second. A production line in X series can enhance the productivity by 2.7 times while reducing the consumption of energy by 52%, comparing to the original production line in D series under the same conditions. Dahua Smart Industrial Park provides the great benefit of internal synergy The faster speed also applies to the development of new molding, since Dahua Smart Industrial Park provides the great benefit of internal synergy, allowing the end-to-end vertical supply chain with marketing, R&D and manufacturing efficiently integrated. The advanced organising system is supported by topnotch equipment, such as MAKINO high-speed graphite processing machine, GF CNC, GF WEDM-LS machine, Hexagon 3D Nikon projectors and electronic displays. With a processing accuracy of +/-0.002 to +/-0.005MM, while also supporting CAD / CAM / CAE collaborative development and simultaneous manufacturing, these machines enable Dahua to develop new mechanical molding in as short as 7 days.Higher quality results in less likelihood for products to malfunction especially when they are used in critical situations Time- and cost-saving solution By far, this developing system has already produced high precision molding for Lechange Robots, monitoring cameras in TP1-TC6 series, G20 intelligent head-gears, smoke alarm for fire detectors, etc., all of which proving the effectiveness of the system in shortening the development cycle and keeping the competitive edge with new products in the business. Higher quality saves lots of time and economic costs for clients. Even more importantly, higher quality results in less likelihood for products to malfunction especially when they are used in critical, not-allowed-to-go-wrong situations. Dahua’s products are guaranteed with a higher quality for two reasons: first, Dahua has set a high standard of accuracy in production; second, with a reliability lab at the production end, Dahua has put together an effectively closed loop for quality control in the manufacturing process. Accuracy has always been one vital index defining the manufacturing ability because it directly sets the limit to quality and range of products to be produced. Again, take the mounter mentioned above for example: it can process components, in metric size, as small as 03015(0.3x0.15mm), with a +-0.025mm SMD precision (within the 3-stigma range), boasting world leading performance and capable of covering basically all types of components used in the industry.Dahua industrial camera plays an important role in IoT, providing a closed loop for quality control in the manufacturing process Enhanced vision and intelligent analytics Dahua industrial camera plays an important role in IoT, providing a closed loop for quality control in the manufacturing process, in which all materials, personnel and devices are connected and products are traceable to the specific production line and precise time it got made. Boasting a variety of functions, Dahua industrial cameras are used in different sections of production, enabling automatic assembly, high-precision graphic inspection and product flaw inspection. Through high-definition machine vision, Dahua industrial cameras automatically and precisely locate the components, limiting the assembly error to micron level. Equipped with enhanced vision and intelligent analytics algorithm, the industrial camera can spontaneously detect and recognise flaws in the performance and outlook of products, thus promising not only the volume of cameras production but also the steady quality of each and every one of them.In the future phase, this industrial park is expected to be more intelligent to enable a safer society and smarter living Safe society and smart living Reliability must be put to test, in R&D as well as in manufacturing process. The reliability lab at the production end serves to assure quality by randomly taking products from production lines and put them into reliability tests simulating falling, high/low temperature, worn-out conditions, which are conducted by industry leading testing equipment in the lab. Thus what’s conceived in R&D is confirmed from the production line, the synergy of both ends promising better products (for common use or specialised needs). This lab is also responsible for testing all the raw materials. Thanks to the aforementioned information integration, all tests are automatically conducted, recorded and traceable. In conclusion, Dahua Smart (IoT) Industrial Park is endowed with the latest and world leading manufacturing equipment/system boasting high level automation and intelligence, which is essential to satisfy the ever higher demands from clients in terms of delivery time, specialised use and quality. There is still great potential to this new smart industrial park. It is literally only in its phase one. And in the future phase, it is expected to be more intelligent, to realise client-centred flexible production and to enable a safer society and smarter living.
ip.access has announced a collaboration with Imaginet, a provider of IT network and security solutions, to implement a rapidly deployable disaster response network in Makati City, the Philippines. Makati City, part of the Metro Manila region, is the main financial hub and has a population of 6 million people. Built on a drained mangrove swamp, the city’s infrastructure is at a high risk for significant damage in the event of an earthquake, typhoon or other natural disasters. In the event of a disaster it is likely that communications infrastructure would be affected – hindering efforts to direct the population to safety and locate people trapped in collapsed buildings. To improve the city’s preparedness for natural disasters, the local Disaster Risk Reduction & Management Office (DRRMO) worked with Imaginet to implement a rapidly deployable mobile network. Deployed via four command vehicles, the network will allow first responders to communicate with the population and report back to the central command office.The ip.access team has an inherent understanding of disaster situations, with extensive experience working in harsh environments Ensuring disaster preparedness Basing the network on 2G technology, to ensure that signals would be capable of penetrating collapsed buildings and enabling communication through SMS messaging, ip.access was tasked with designing, installing and testing the network in a tight six-week window. Following a successful commissioning period, the four command vehicles were first deployed in December 2017. Commenting on the partnership, Blair Duncan, CEO at Imaginet, said, “This was a challenging technical undertaking. As such, we needed confidence that we were working with a partner that could deliver a high quality solution. In that respect ip.access were an ideal partner – the team has an inherent understanding of disaster situations, with extensive experience working in harsh environments. We knew that we could rely on them to equip our vehicles with the robust and reliable radio network the DRRMO requires should a disaster strike.” Small cell solutions Nick Johnson, CTO at ip.access added, “We have a wide range of award winning commercial off-the-shelf (COTS) small cell solutions that can be easily integrated and operated within a wide range of specialist deployment scenarios – including in disaster response settings.” “Communication is critical in a disaster situation, so the fact our proven solutions deliver five nines availability with exceptional reliability makes them ideal for applications like the vehicle-borne network in Makati City.” Due to the success of the vehicles, the Makati City DRRMO is now looking to increase its fleet to nine vehicles to enable more flexibility and more robustness in its disaster readiness.
Concern for safety of the lab staff prompted IHEP to seek a more securely automated system The Institute of High Energy Physics (IHEP), the Chinese Academy of Sciences (CAS) is a comprehensive research base with its main efforts focused on high energy physics, R&D of advanced accelerator technologies, advanced synchrotron radiation technologies and applications. Advanced scientific research facility technologies and high-tech products with sophisticated science and technologies like radio frequency, UHV, microwave, precision magnet fabrication, etc. The developmental fields cover accelerator technology, nuclear medical instrument, nuclear instrument and meter technology, industrial automation technology, information technology, precision machining, etc. IHEP contains 11 laboratories. The research efforts are centred on high energy physics, cosmic ray and high energy astrophysics, theoretical physics, accelerator physics and technology, synchrotron radiation and free electron laser and nuclear analysis technology and application, etc. Large scientific tools include Beijing Electron Positron Collider (BEPC), Beijing Spectrometer (BES), Beijing Synchrotron Radiation Facility (BSRF) and Beijing Free Electron Laser (BFEL.). Solution Beijing Access Control Technology “We were seeking an advanced method of managing access control and for higher security,” said Li Tie Hui of The Accelerating Control Center in China. Access to restricted lab areas was being manually managed by staff – individuals requiring access to the lab had to physically use a key located in a central control unit. The key then had to be returned to its location and all staff had to evacuate the lab in order for the lab operations to initiate. The lack of a sophisticated security procedure generated a high risk of people remaining in the lab and potential exposure to radiation. Concern for safety of the lab staff prompted IHEP to seek a more securely automated system. "Convenience, safety and process automation were key considerations when we selected HID products" Solution Beijing Access Control Technology Co.(www.bj-access.com.cn), a local access control solutions provider, won the project out of nine bidders to exclusively develop an advanced safety and security system featuring HID RFID access control technology integrated with networked security, custom software, video surveillance, and a fire prevention/detection system. HID ProxPro® card readers “Convenience, safety and process automation were key considerations when we selected HID products. We had HID cards and readers at other IHEP facilities and knew those existing products were providing the kind of security needed at the lab,” said Hui. Manual access to each door of the lab is now accompanied by an HID reader with sound and a separate LCD. The HID® reader outputs an identification number that furnishes the customised system with a higher level of security and shows the identification of the entrant, time of day and how many people remain and/ or exit in and out of the restricted lab area, displaying their names on the LCD screen. Once a departure confirmation is complete by flashing on a “departure confirmation” reader, the remaining name on the LCD screen disappears. HID access control technology controls entry into the lab, prohibiting anyone from entering while the lab is operating. In addition, HID ProxPro® card readers were modified to overcome power disturbances created by the radioactive lab environment, delivering a reliable solution for the environmental challenges at the Institute of High Energy Physics
Two models of MOBOTIX IP camera were selected for the wind tunnel, as advised by R. Pierre Digital NEWTON S.r.l. is an independent testing laboratory established in 2000, recognised and certified by international bodies such as Accredia, FIA - Fédération Internationale de l’Automobile, SFI-USA, SNELL-USA, Italcert, Istituto Masini, TÜV Rheinland International, TNO and SNCH - Société Nazionale d’Homologation et de Certification for tests of motorcycle helmets and auto racing helmets (Formula 1 and WRC), children’s helmets for kart racing, HANS devices for Formula 1 drivers, devices to protect the head, eyes (goggles, masks, and visors) and body (riding, bike, and touring helmets) and for certification tests on high-performance seats. Wind tunnel project In addition, the Ministry of Infrastructure and Transport considers the laboratory’s equipment to be suitable for all tests required by Regulation 22 concerning helmets and visors for motorcycle drivers and for some of those concerning the approval of two- or three-wheeled motor vehicles. The Newton laboratory has recently completed the installation of a 280kW subsonic wind tunnel: this is a closed return, Göttingen-type wind tunnel, designed to be used with either an open or a closed test chamber, depending on the specific testing programme. The electric power needed is produced by a generator integrated into the structure. Thanks to the testing activity carried out within the laboratory, products obtain the certifications required by various Italian authorities (which vary according to the sector to which the tested product belongs) in order to be considered adequate, and consequently put on the market. “The idea of building an actual wind tunnel came about mainly to deal with the problem of ventilation inside the helmets,” explains Luca Cenedese, director of Newton. In fact, it seems that having solved the problem of head protection parameters, today there are large international groups focusing mainly on the study of comfort, concentrating mostly on thermal stresses and the analysis of how these phenomena affect the reaction and concentration abilities of automobile, motorcycle, and bicycle racers. “In existing wind tunnels, everything was focused on the machine, not on the helmet. So we decided to prepare by building ourselves a medium-sized wind tunnel that could also satisfy these new requirements. Today, with a wind speed of about 250 km per hour, we test helmets, bicycles, magnetic sirens for police cars and also traditionally large objects - for example subway cars or high-velocity train cars - that by utilising the principle of aerodynamic similarity, are proportionately reduced in scale,” continues Cenedese. Comparing data and images Built a few years ago, the Newton wind tunnel has now found approval from old and new clients from different sectors. The wind tunnel allows continuous and very effective activity. To obtain the greatest performance and offer something extra to our clients, Newton needed to identify a system that would permit keeping track of all inspection and test activities. “We work with the engineers who come to our laboratories during the testing phase to design and modify the prototypes currently being made while the product is being tested. Some tests last for many hours: we soon realised that we would have had surprising results if we had had a system available that allowed continuous recording.” "Network-integrated cameraswere needed that could not only communicate with each other but also be accessible remotely" The software used for tests inside the wind tunnels produce an enormous amount of numerical data: that is, numbers relating to performance that characterise an object, especially force, pressure, and temperature. The experts at Newton have augmented this type of numerical information, produced and processed by a PC, with a second, new perspective: the display of images produced by MOBOTIX cameras during the products’ testing phase. And thanks to the combination and comparison of numerical data and images, Newton can now provide its clients with much more accurate measurements, achieving levels of qualitative detail never before seen. Need for network-integrated cameras The years dedicated to this type of activity and the studies carried out in the Newton laboratories led to the awareness that the measurement of data, in and of itself, is very simple. Rather, the real problem is managing the amount of data produced by the system, which is quite often very difficult to read and make intelligible, so as to understand the various phenomena that occur in the products tested in the wind tunnel. To deal with this need, the idea was therefore to integrate the images by using video surveillance cameras. An idea that can now be described as a real pilot project, in other words a one of a kind application. “We could not rely on images taken with traditional movie cameras, because the test sessions often last for many hours and we needed images that would allow us to observe the phenomena from many angles at the same time. In addition, network-integrated cameras were needed that could not only communicate with each other but also be accessible remotely.” Two models of MOBOTIX IP cameras were chosen: one with a 360-degree view, and one AllroundMono model Quality, timeliness and immediacy with MOBOTIX Thanks to the support and advice of distributor R. Pierre Digital, two models of MOBOTIX IP cameras were chosen: one with a 360-degree view placed on the ceiling, perpendicular to the product test position, to offer a panoramic view; and one AllroundMono model, positioned at the side but movable as needed, which offers different details and angle shots within the same shot. Thanks to the high quality of the images from the two MOBOTIX cameras, the Newton engineers can guarantee the end user that they can take very timely action in the test phase of their products, managing any anomalies and malfunctions in real time and making the necessary changes. The advantage of MOBOTIX IP cameras is that they are also accessible remotely: a very significant plus since many of Newton’s clients come from abroad, and often some of their staff follow the product test operations remotely, thanks to a system access login offered to the client. “By combining data and images, we achieved surprising results in the test phase. When we analyze the data, if we see that the data changes, we go to retrieve pictures of the moment when the data changes and we can immediately understand the phenomenon. For example, during a test on a bicycle and a cyclist, the team’s engineers were simultaneously checking the numerical data regarding the bicycle’s efficiency and, from the images produced by the camera, the position of the cyclist at the moment when the efficiency was greatest. We are not information systems engineers, and in this sense, we were helped a lot by not having to use image management software: the images are processed on board the cameras and the result compared to other systems is surprising”, concludes Cenedese.
Airbus Defence and Space aims to validate the use of smartphones in different operational situations Airbus Defence and Space and its partner RIKS (the State Infocommunication Foundation), the technical operator of Estonia’s national Tetra network, is performing a field trial of the Tactilon Agnet smartphone application - formerly known as TSA - for two months. Voluntary civil defence and governmental organisations want to confirm Tactilon Agnet’s ability to fulfil the operational requirements for typical mission-critical communication. The field trial combines the use of public broadband networks and Tetra services. Airbus Defence and Space solutions For the field trial, Airbus Defence and Space has provided a service cloud environment and delivered an RCS9500 integrated radio dispatching system, an automatic vehicle location solution, a Tetra base station, several Tetra radios, and different types of smartphones equipped with the Tactilon Agnet application. The application enables smartphone users to make instant group calls (push-to-talk feature) and send messages to Tetra users as if they were equipped with Tetra devices. Challenging test environment During the field trial, Airbus Defence and Space and RIKS aim to validate the use of various types of smartphones in different operational situations. In addition, both Airbus Defence and Space and RIKS want to collect information about how mission-critical Tetra communication features have to be operated in an LTE environment. To push the LTE-based Tactilon Agnet application to its limits, RIKS has set up, in cooperation with commercial operators, a challenging and complete test environment that includes not only a regular LTE network on the 800 and 2600 MHz frequencies, but that also includes a mobile LTE base station that is connected to the core network via broadband satellite link. Demand for broadband group communication “As we observe an increasing demand for broadband group communication with multimedia features among mission critical users, Airbus Defence and Space offers a unique solution called Tactilon Agnet. It provides fully-fledged, seamless and secure integration of Tetra radio users with those who use Tactilon Agnet on their smartphones,” explains Olivier Koczan, Head of Secure Land Communications at Airbus Defence and Space. He points out that RIKS and Airbus Defence and Space are “clearly on the verge of introducing mission-critical communication features of the next generation”. Estonia’s public safety organisations have communicated within a nationwide Tetra network from Airbus Defence and Space since 2007. In 2015, the company delivered critical communication solutions enabling the use of LTE networks, which will also be used to test the Tactilon Agnet application. This solution provides high availability and secure access through commercial LTE network services.
The Iris ID reader takes less than one second to identify a person Iris ID, a leading provider of iris biometric technology, announced the completion of a new installation of its iris-recognition solution at CERN, a 21-country European research organisation operating the world’s largest particle physics laboratory located outside Geneva, Switzerland. Biometric access points The installation added Iris ID readers at 25 new biometrically controlled, security access points to the radiological area of CERN’s Proton Synchrotron (PS) accelerator complex. Another 55 Iris ID readers have been used since 2008 to access the Large Hadron Collider (LHC), CERN’s main underground particle collider. Since 1954, CERN scientists have reported many major scientific achievements in the study of interactions between subatomic particles. The LHC allowed the recent discovery of the Higgs boson, an elementary particle of crucial importance to particle physics theory. CERN is also credited with developing the World Wide Web in the late 1980s and early 1990s to enable sharing of information among its scientists. Pierre Ninin, CERN’s head of safety systems engineering, said Iris ID readers are the vital layer in the identity authentication process at the LHC and accelerator complexes. He said about 10,000 scientists, technicians and long-term visitors are registered in the system’s database, with around 3,000 people accessing the two facilities on a typical day. Maintaining audit trail “The high value we place on the security of our people, our work and our facilities demands tight security.” Ninin said. “The Iris ID system has been up to the task at 100 meters below ground.” He said extra precautions are designed to prevent “piggybacking,” a process in which one or more people enter along with an approved person. CERN staff members enter an airlock to access restricted areas. Inside, infrared beams note movements inconsistent with a single person. A floor pad sounds an alarm if it detects abnormal weight variations. Also, the compartment is small, making it difficult to fit a second person. The Iris ID reader takes less than one second to identify a person. If there is a match with a registered iris, a second door opens into the restricted area. Employees are only allowed access to those areas required for them to complete their work. The Iris ID system maintains an audit trail allowing CERN administrators to check who has entered certain areas and when. Ninin said about 20 more Iris ID readers will be installed at another CERN accelerator currently being refurbished and due to open again in 2019. Mohammed Murad, Vice President, Global Sales and Business Development for Iris ID, said the company’s iris-recognition technology has been proven at major government, scientific and corporate facilities worldwide. “Iris ID technology sets the standard for identity authorisation, access control and time and attendance,” he said. “Our solution is designed to meet the demanding needs at CERN or any other organisation requiring reliability, speed and accuracy.”