Voice recognition systems
Matrix COSEC Time-Attendance Solution promotes a smart and productive workplace. It is a one-stop solution for managing and controlling the attendance data. Time-attendance solution The Time-Attendance Solution is designed to meet the diverse requirements of any organisation by offering a superlative range of flexibility in attendance policies, configuration, integration and report generation. Additionally, it offers features like automatic calculation of overtime and much more! Key Features...
FIME has been accredited to test biometric components in line with FIDO Alliance’s Biometric Component Certification Program. The accreditation enables device manufacturers and solution providers to ensure the quality and performance of biometric authentication solutions including fingerprint, facial, voice, and iris recognition. "In an age dominated by cumbersome passwords, biometric authentication delivers stronger security while improving UX. And in a post-PSD2 world, it’s a comp...
Viking’s K-1900-712L-IP panel phone is durable, easy to use, and provides added strength to hold up under heavy abuse. “The shortened, reinforced armored cable increases safety for users and may discourage potential abusers.” – James Catt, Engineer, Viking Electronics. The K-1900-712L-IP vandal resistant VoIP SIP panel phone is equipped with a short 12-inch armoured handset cable to reduce the risk of users harming themselves, their surroundings, or the phone itself. Pr...
Discreetly place emergency calls at the touch of a button with reliable emergency communication provided at fingertips of users with the PB-3-IP Panic Button from Viking Electronics. “This is what people have been asking for – it’s quick, it’s discrete, it’s reliable. People know they can trust the PB-3-IP when it counts.” said Greg Yocom, Engineering Manager, Viking Electronics. PB-3-IP Panic Button The PB-3-IP is designed for VoIP SIP systems and is PoE p...
Bird Home Automation Group, a provider of IP video intercom technology, announces a partnership with SIP solution provider AV LinkPro. Through this strategic partnership, Bird Home Automation now offers an easily deployed option for its DoorBird product line, specifically its MDU video intercom stations, to make calls to IP, cellular and landline phones. Since its founding in 2014, Bird Home Automation has formed partnerships with many other industry pioneers to meet the demands of its customer...
Driven by technology developments such as voice recognition, smart devices and the Internet of Things, our homes are getting “smarter” all the time. Increasingly, we expect our residential environments to be responsive to our voice commands, whether we are adjusting a thermostat, turning on a light, or lowering the window shade. Smarter home integration yields new opportunities and challenges for home security, too, which contributes an element of safety and protection to the conveni...
Bosch Security & Safety Systems Limited, part of Bosch Building Technologies, is delighted to announce that its Public Address and Voice Evacuation products portfolio is now available in the UK market at ADI Global Distribution, a Resideo company. Andrew Pigram, UK General Manager for Bosch Security Systems explains, “The combination of Bosch’s 60 years of global experience in developing communication systems combined with ADI’s 30 years delivering extensive global distribution provides our customers and the market place with complete peace of mind.” Dedicated support team ADI stocks a broad portfolio of Public Address and Voice Evacuation systems from Bosch ADI stocks a broad portfolio of Public Address and Voice Evacuation systems from Bosch, including a wide range of loudspeakers for a broad range of applications, underpinned by the enhanced features, build quality and reliability installers have come to expect from Bosch. ADI offers support on these systems, including guidance on product selection and presales support in the form of site surveys, system design, pre-build and configuration and commissioning via a dedicated ADI project support team. New market opportunities Hemant Trivedi, regional director for UK and Southern Europe at ADI says “this collaboration will enable system integrators and installers to confidently pursue new market opportunities and add devices to existing installs, from small retail and commercial applications, such as churches, corner shops and doctors surgeries, to football stadiums and large shopping malls.” To ensure customers receive dedicated support in the field, there will be a comprehensive training roll out around the UK, providing hands on demonstrations across the local ADI branch network and at ADI EXPO’s throughout the year.
Seniors require and deserve peace of mind, knowing that help is easily available when they need it; they also need their boundaries respected, ensuring their privacy is paramount. Essence’s Care@Home solution delivers both. Essence will present its technology at Health+Care, June 26 & 27 at ExCel, London, to introduce the general availability of its offerings in the UK market. Essence SmartCare, part of the Israel-based Essence Group, is a pioneer in intelligent IoT and cybersecurity solutions for the monitored security, connected home, and senior telecare markets worldwide. Advanced speech recognition technology The system requires no wearables, so it’s available even when the senior cannot activate a panic buttonHighlighting its stand at the event will be the Care@Home Communicator, which is a significant differentiator for Essence SmartCare’s full line of smart Telecare technologies. They range from emergency alerting to a professional intelligent activity monitoring solution. Using advanced speech recognition technology – Intelligent Voice Activation (IVATM) – the Communicator’s two-way communication is activated only when a senior calls out a specific phrase that identifies that person is calling for help. The system requires no wearables, so it’s available even when the senior cannot activate a panic button. The Communicator immediately opens a two-way communication channel to the monitoring station, allowing them to get further details about the emergency to send an appropriate response. Monitoring and communications technologies Our breakthrough technologies provide this to the UK telecare market in a way that has not been seen here before"“Combining the most sophisticated senior monitoring and communications technologies delivers peace of mind to consumers and allows service providers to significantly expand their offerings,” said Dr Haim Amir, CEO, founder, and chairman of Essence. “Studies have shown that seniors live longer, happier, and more fulfilling lives when they can stay in their own homes, maintaining their independence. Our breakthrough technologies provide this to the UK telecare market in a way that has not been seen here before.” “Essence SmartCare leads by enabling reliable connectivity via digital, IP-based communication of the most advanced cellular networks with the flexibility to use an existing analogue channel on the same box,” says Barak Katz, General Manager of Essence SmartCare. Built-in speaker and microphone The battery-operated Communicator extension comes with a built-in speaker and microphone and can be located in any roomThe battery-operated Communicator extension comes with a built-in speaker and microphone and can be located in any room of the house – the waterproof system can even be installed directly in the shower. This enables complete coverage of the home with no areas inaccessible for assistance. Essence SmartCare provides flexible and scalable services for a person-centred approach, allowing providers to grow cost effectively with new offerings. Rich administration tools include operational capabilities to accelerate time to market as well as comprehensive account management and reporting. Essence SmartCare will also be previewing some of its upcoming products at the show, bringing even more emphasis to its commitment to improving the customer experience and level of safety. The Communicator will be among the products highlighted at the upcoming Health + Care conference, June 26 & 27 in London at ExCel. Essence will be at Stand #J62.
Matrix ETERNITY NENX is a small yet powerful phone system for small businesses, offering advanced features and functionalities as available with enterprise grade IP-PBXs. Based on modular architecture and state-of-the-art design, ETERNITY NENX provides connectivity to CO (FXO), GSM/3G and VOIP networks from a single platform. Range of phone options such as Analogue, IP and Mobile extensions provides flexibility to communicate from anywhere and at any time. Furthermore, ETERNITY NENX offers integrated voicemail system, multiple auto-attendants and web based remote management. Built-in resources The Built-in Resources of the ETERNITY NENX are: 50 IP Users 8 VOIP Trunks 8 IP to TDM Calls 25 IP to IP Calls 6 Party Conferencing 8 Video Calls 4 Voice Mail Channels (Optional) 2 GSM/3G Ports (Optional)
Resideo Technologies, Inc. is highlighting its latest offerings at ISC West 2019 for the first time as a standalone company, following its successful spinoff from Honeywell. The security industry will see Resideo’s new home automation platforms, a new security dealer loyalty program and how the companies’ new voice, video and mobile solutions integrate with consumer’s connected lifestyles to give dealers opportunities to expand their businesses. Home security “We are fully committed to providing our dealers with the right products and programs they need to win more customers, keep them longer and drive profits, while delivering an exceptional homeowner experience,” said Alice DeBiasio, vice president and general manager, Residential Pro Security at Resideo. “Increasingly, a majority of consumers prefer to have a professional install their home security system because it offers them assurance it was done right and will work correctly when they need it. It’s the professionally installed and monitored solution that helps homeowners have peace of mind that if something happens, their local police or emergency personnel will be alerted to help protect what matters most – their loved ones, valued possessions and property.” The loyalty program provides sales and marketing support, training and financial rewards Premier security dealer programme Further demonstrating its commitment to the professional channel, the company has launched the Resideo Premier Security Dealer Program to help participating dealers expand in the security and smart home market, while driving value for homeowners. Led by industry veterans and designed with input from top security dealers, the loyalty program provides sales and marketing support, training and financial rewards, and will help dealers differentiate in today’s market. Next generation security platform Resideo is showing the new Honeywell Home ProSeries Security and Smart Home Platform that will be available later this year. From an entry-level security installation to a fully integrated smart home solution, the ProSeries was designed to give dealers the end-to-end platform they need to deliver a complete security and smart home solution. The platform offers fast and responsive operation and creates a sophisticated user experience that is simple to understand. The ProSeries boasts numerous features to fit today’s consumer lifestyle including built-in voice control for hands-free operation A common user interface is featured across all customer touchpoints – panel, touchscreen, app – making the system easy for consumers to learn and operate. In addition, the ProSeries boasts numerous features to fit today’s consumer lifestyle including built-in voice control for hands-free operation, video alarm verification to reduce false alarms, and the convenience of Bluetooth system disarming. Line of sensors and life safety devices Built on a common platform, dealers can learn one system and know them all for easy installation and support. The expanded line of sensors and life safety devices are interchangeable across the entire platform to help reduce inventory and training costs, and user-replaceable parts provide added convenience and help to reduce truck rolls. Additionally, the new system features a modular design with expansion modules, allowing dealers to buy only what they need to help drive down operating costs. The ProSeries platform will integrate with the next generation of Resideo Total Connect for a seamless user experience. The updated platform features a redesigned consumer interface, faster connection and improved functionality, all streamlined with remote programming and device management through AlarmNet 360. Other technologies on display Expanding Smart Home Ecosystem: As voice assistants continue their use in homes, Resideo is expanding its ecosystem with key integrations to give users control of their system from their voice assistant platform of choice. In addition to Amazon Alexa, Total Connect will integrate with Google Assistant to provide additional voice controls, as well as IFTTT to help users connect more devices and services together for a broader platform. Total Connect Intelligent Multi-Family Property Solutions: New feature allows property managers, builders and others to remotely manage multiple properties while offering smart security options to renters. LTE (Long Term Evolution) Cellular Communicators: Resideo’s expanded line of LTE radios provides enhanced security and system longevity. Dealers are invited to visit the LTE opportunity pavilion located within Resideo’s booth to learn how they can turn routine upgrades into new sales opportunities. Tuxedo Graphic Touchscreen for VISTA®: The new Tuxedo graphic touchscreen controller offers a friendly user interface and seamless integration with security and automation, to help attract new customers and upgrade existing ones In addition, Brandon Board, chief information security officer at Resideo, will participate in the session Consumer Privacy – How Can Security Lead the Way? on Thursday, April 11, at 9:45-10:45 a.m. PDT. The panel session will explore current practices and opportunities for the security industry to strengthen their leadership in privacy standards.
Matrix PRASAR UCS, an Enterprise Unified Communication Server connects internal and external decision makers at multiple locations for effective communication and real-time collaboration. It enables enterprises to enhance business processes by unifying communication mediums to simplify the daily workflow and increase their response time. Being a pure IP solution, PRASAR UCS is a single box solution, scalable up to 2,100 users, as per future communication needs of the organization. Bring people together anytime, anywhere, and on any device with our integrated collaboration infrastructure for voice and video calling, messaging, and mobility. Corporate directory integration Key Features of the Matrix PRASAR UCS include: Scalable up to 2,100 UC Users Up to 550 Concurrent Calls Up to 99 SIP Trunks 248 VoIP Channels Corporate Directory Integration Multi Lingual IVR - 128 Auto-attendant Menus 64 Party Simultaneous Conference - 21 Three-party Conference 1U Enclosure 64 Ports Voice Mail System - Record Conversations Presence Sharing - BLF Notification Unified Messaging Redundant Power Supply Port
Matrix, a manufacturer and pioneer in telecom and security solutions, is participating at INDIA ELECTRONICS EXPO & INDIASOFT, Hyderabad, India, from 4th to 5th Feb 2019. Matrix will be unveiling its recently launched COSEC ARGO. Matrix will also be exhibiting its other video surveillance, people mobility and telecom solutions at the event. Matrix will be showcasing its new extreme series of network video recorder (NVRX) at the event. This NVR is equipped with 4K decoding capacity and characteristics like cascading (up to 20 NVRs), camera-wise recording retention and database level integration. Moreover, these latest NVRs are also backed with an intelligent software that helps detect threats and send instant notifications for real-time security. Audio compatible IP cameras Matrix will be launching COSEC ARGO – the next generation door controller with a blend of performance and aesthetics All in all, these comprehensive, flexible, reliable, integrated NVRX provide a proficient, persistent and preventive security solution, suitable for enterprises and multi-location offices. Along with these NVRs, Matrix will also be showcasing its audio compatible and compact professional Series IP cameras powered by SONY STARVIS series sensors. This gives the cameras an edge over others in terms of exceptional low light performance, consistent image quality during varying light conditions (True WDR), better bandwidth optimisation and many other features. In people mobility management domain, Matrix will be showcasing innovative range of access control and time-attendance solution. Matrix will be launching COSEC ARGO – the next generation door controller with a blend of performance and aesthetics. Ultrafast fingerprint identification The door controller is equipped with features like 3.5” IPS touchscreen LCD with gorilla glass, elegant aesthetic with full frontal glass, open connectivity with ethernet, Wi-Fi, BLE, USB, PoE, ultrafast fingerprint identification (2x fast sensor), wall and flush mount options, simple and clean installation with minimum wiring, intuitive user experience, vandal resistant enclosure with IK08 and suitable for outdoor applications with IP65 certification. Matrix will showcase PRASAR UCS – a pure IP solution for modern enterprise that sets a new benchmark at multi-location collaboration It benefits organisations with reduced user verification time, higher security, versatility, improved productivity, low IT infrastructure cost, future proof, flexibility, etc. Additionally, the device comes with higher processing speed, wall and flush mounting options, and increased fingerprint and event storage capacity, further enhancing its efficiency. As a major highlight in IP-PBX domain, Matrix will showcase PRASAR UCS – a pure IP solution for modern enterprise that sets a new benchmark at multi-location collaboration. Exhibition of gateways Moreover, Matrix will also showcase its unified communication solutions – a wide range of products that enhance mobility, productivity and collaboration across an organisation. Here, at this event, Matrix will exhibit its range of gateways. Based on SIP (Session Initiation Protocol), these Gateways allow easy integration with most of IP-PBX, TDM PBX, Softswitch and hosted solutions. Award winning series of Matrix gateways are perfect for enterprise and carrier-class solutions. Starting from a single port VoIP adaptor to high density VoIP-GSM-PRI-FXO/FXS Gateways, Matrix has one stop solution for every business need. Preloaded with superior voice quality and state-of-the-art routing features, Matrix gateways are ideal for multi-site connectivity, remote survivability and SIP trunking. Talk to Matrix solution experts to know more about these unique solutions by visiting Matrix at Booth 164, INDIASOFT, Hyderabad International Convention Center from 4th Feb to 5th Feb 2019.
There’s growing noise around smart homes and smarter security. You’ve probably heard it. But there is a place where access control and more have been smart for decades: the workplace. Home automation and IoT are still playing catch-up with the commercial sector. A new insights report from ASSA ABLOY and IFSEC Global — “The Smart Door Locks Report 2018” — measures just how fast consumer smart technology is running. According to a survey conducted for the report, 61% of households now claim to own at least one smart home device or system. Energy monitors, home CCTV cameras, intruder alarms and smart door locks are the most popular, according to the report. All these functions, of course, have been available to businesses for years.61% of households now claim to own at least one smart home device or system Educating the smart home consumer Paradoxically, report data also questions how much consumers really know about their smarter home. A surprising 42% of those surveyed, for example, were unaware they could control a smart door lock from their phone. In fact, many leading smart door lock models offer this feature, delivered by Wi-Fi or Bluetooth and an app. Despite a wealth of features offered by the latest smart door locks — remote and location-based locking/unlocking; voice activation; timed access; emailed entry alerts; and integration with smart camera and lighting systems — most people still have limited knowledge of their capabilities. Smart technology is increasingly becoming the new norm in terms of home security Only 14% of survey respondents described themselves as “very familiar” with what a smart lock can do. Even though most of them probably use smart access control solutions at their workplace. Secure homes through smart technology Monitoring and security are not the only drivers for smart home adoption. We humans also love convenience, and modern living presents us with problems that smart home technology can solve. Ironically, given the report’s findings, it takes a smartphone to really unlock the convenient possibilities of smarter living. The device that’s “always to hand” is central to the newest generation of smart door locks.A smart door lock is a convenient way for a landlord or agency to offer round-the-clock check-in and check-out If homeowners wish to remotely manage property access for friends and family, many smart door locks oblige. You let in guests remotely, send them a virtual digital key, or provide a temporary or single-use PIN to unlock the door. It is just as easy to revoke a digital key, if you don’t want its owner to come around anymore. This is a significant improvement over sharing physical keys — or hiding one under the doormat. We cannot be totally sure where a metal key ends up and have no way to track or cancel it once it’s “out in the wild”. Commercial access control offers such functionality as standard, of course. In addition, smart door locks offer more than just stand-alone operation and clever functions. In a domestic setting, magic happens when locks work in harmony with a home automation system, connected by protocols like Z-Wave, ZigBee or Wi-Fi. "Smart" security on the move The smartphone is becoming a remote control for managing a connected life beyond just home (and even workplace) security. According to Accenture, the parcel delivery services market will grow by $343 billion by 2020. Just like home security, convenience is a major driver of change. Homeowners can send guests a virtual digital key to their phones, or provide a temporary or single-use PIN to unlock the door A recent PostNord pilot in Sweden aimed to remove the inconvenience of waiting home for a postal delivery. Selected customers of some major Scandinavian e-retailers could choose to have parcels delivered inside their front door, if it was equipped with a Yale smart door lock. Home delivery is among potential smart services covered in “The Smart Door Locks Report 2018 ”. When asked whether the ability to receive parcels securely in a porch or lobby would make them more likely to invest in a smart door lock, 79% said it would.It is easy to revoke a digital key, if you don’t want its owner to come around anymore Holiday rentals and smart home tech ASSA ABLOY research published in 2017 forecasts continued growth in the European holiday rentals sector (at 5.8% CAGR). Smart door locks are also making an impact here, at both ends of the market: for service providers — agents and homeowners — and for travellers. A smart door lock is a convenient way for a landlord or agency to offer round-the-clock check-in and check-out, without creating extra work or staff costs. Both Intersoft, in Croatia, and Hoomvip in Spain have built holiday rentals management systems around an app and the ENTR® smart door lock. Agents issue, revoke, track and manage virtual keys for all their guests, saving everyone time and hassle. Travellers use their phones and an app to unlock their apartment. For these visitors the smartphone is already an essential travel accessory. It is a boarding pass, a credit card, a travel guide, and a postcard home... why not a door key, too? And if this key is backed by a trusted home security brand — and a company with vast experience in the mature market for commercial “smart” security — better still.
Multi-modal biometrics refers to a technology that combines a number of biometrics working together as a multifactor solution Global terrorism is on the rise. For many years, the West felt immune to these incidents, often asserting that these were problems felt only in countries with heated conflicts, such as Syria, Iraq, Israel and Nigeria. However, recent terror attacks have taken place in both Europe and the United States: Belgium, France (Paris and Nice), Orlando, various cities in Germany, Turkey, and the list goes on.The intelligence community is constantly looking for a single-point “source” to help prevent the next terror attack. However, in my experience serving as Head of Military Intelligence of the Israel Defence Forces, and through my work with the international intelligence community, I have learned that such a single source does not exist. There is no simple solution to terror prevention.Proactive and combined approachBut taking a proactive approach can help the fight against terror. To be proactive, the intelligence community must create an ecosystem of information—a network of interconnected sensors that combine to provide a clearer picture of the situations that security agencies must assess to prevent attacks from happening. The intelligence community must create an ecosystem of information—a network of interconnected sensors that combine to provide a clearer picture When it comes to preventing terror, this network might include an array of sensors: signal intelligence, cyber intelligence, visual intelligence—not only from satellites—surveillance balloons, drones, special forces, human intelligence, interrogations and others. Any of these sources alone would not get the job done; combined, however, they provided a clear picture of the security landscape. Intelligence agencies collect all these single points of information and fuse them together. Almost in real-time, this fusion creates actionable intelligence for end-users (special forces, air force, any actor who can utilise the intelligence). This combining of sources we employed in my career led me to understand the power of fusion.The power of fusion is the key to effective preventative security.Global megatrends and demand for convenient securityThere are two relevant megatrends in the world right now: Urbanisation and the rise of the megacity, which inevitably leads to rising crime rates The need to prevent terrorism With these two relevant trends, increased security has become a necessity. However, there is a misconception that increased security means increased inconvenience for people. As such, there is a need to create systems that provide the high level of security necessary in today’s world, given the aforementioned megatrends, while still maintaining the convenience and pace in our everyday lives. Biometric technology provides an answer to this. If we can quickly and securely identify individuals before they enter a building—or prevent them from doing so—many security crises can be prevented before they take place. Power of fusion and multi-modal biometricsThis is where the power of fusion comes into play. Any biometric sensor on its own – facial recognition, fingerprints, iris recognition, voice recognition—cannot provide the accuracy, speed, or ease of use needed for strong security that is also convenient for the public.Developing an effective biometric technology for secure access requires us to build a new intelligence ecosystem—a fusion of technologies that provide speed and accuracy, and are simple for the end-user. The most secure and convenient biometric technologies for identity verification must use the power of fusion. We find these types of solutions in multi-modal biometric technologies. Multi-modal biometrics allow people to move freely, yet securely, through their daily lives Multi-modal biometrics refers to a technology that combines a number of biometrics working together as a multifactor solution. This can include software that uses a fusion of biometric technologies, smartphones that require access via a fingerprint and PIN code, or access through voice and facial recognition, to name just a few. The primary advantages of such systems are the heightened levels of accuracy and security, as well as greater levels of accessibility and flexibility for users.The industry is trending towards adoption of multi-modal biometrics. This is because stand-alone biometric technologies, such as iris scanning, face recognition, fingerprinting or otherwise, are exposed to a) questions of accuracy and b) the ability for fraud to attempt to trick the system. But, by fusing a number of technologies such as face, body and voice, we can create a system that is highly accurate. In cases in which in-motion identification is part of the technology, a user may not even be required to stop for identification. This fusion of sensors allows us to identify a person in real-time, with high accuracy and speed. By employing the power of fusion, neither security nor convenience need be compromised. Adoption and real world use of multi-modal biometrics The use of multi-modal biometrics is expanding, and is being sought after by some of the largest companies in the world to secure facilities. Market research firm Technavio predicts that the global advanced authentication market (multi-factor and biometrics solutions) will experience a CAGR of 17 percent between 2016 and 2020. Lead analyst Amrita Choudhury commented that threats in the realm of digital security in retail, healthcare and the banking and financial services industry are driving companies toward multi-modal biometrics. According to Choudhury, multi-modal biometrics will likely gain widespread acceptance over the next four years. The use of multi-modal biometrics is expanding, and is being sought after by some of the largest companies in the world to secure facilities While we often see multi-modal biometrics in homeland security, military and law enforcement applications, more often, these technologies are being deployed for consumers. For example, certain smartphones, such as the Samsung Galaxy 5S, utilise face and voice biometrics for greater authentication accuracy. We can also see these technologies in banking apps and cloud platforms focused on the enterprise security market.However, multi-modal biometrics are certainly not limited to the digital/cyber realm. In fact, physical locations – buildings, healthcare facilities, corporations, schools and universities, stadiums and airports could all benefit from more secure and more convenient access made possible by multi-modal biometrics.We live in a world in which we contend with new threats created by rising crime and terror. By applying the power of fusion to physical secure access technologies, we can increase the level of security that is necessary without feeling that we live in a police state. Multi-modal biometrics allow people to move freely, yet securely, through their daily lives, providing access to those we recognise, and allowing the power of fusion to prevent access to those who are unfamiliar. In this way, we can practice proactive preventative security without encroaching on the pace of life.
Deploying audio solutions would flag incidents not caught on camera With the increasing number of campus shootings and lockdowns, security is a top priority for schools. Decision-makers are looking to repair the inefficient security measures on campuses by either upgrading their current systems or installing state-of-the-art technologies to enhance situational awareness. Traditionally, security personnel have relied on video as the primary method of monitoring. However, this strategy is outdated, similar to how watching silent movies is now obsolete. A security team who solely uses video to evaluate a situation is left with data that is limited and many times inconclusive. Only with the integration of audio into existing security systems is a security officer able to fully understand the gravity of a situation and be better equipped to respond to the danger. Many leaders in the education sector have begun to emphasise the importance of adopting audio in monitoring programs and security protocols including Guy Grace. Grace is an industry veteran with over 31 years of security experience. He is a Steering Committee Director for PASS, the Partner Alliance for Safer Schools, as well as the Director of Security & Emergency Preparedness for Littleton Public Schools. “Sound and sight are the new dynamics in school surveillance so to say,” Grace said. “I look at it as we need both.” The security director also affirmed that audio monitoring, especially when conducted through two-way solutions, is a great tool to provide accountability. “All of your first customer service interaction between your office staff and your visitors starts there at that intercom. Sometimes in very rare situations, it can get volatile,” Grace explained. “So it’s good to have, for those types of situations, the ability to hear and record what’s going on at your key customer service points.” Benefits of audio on campus When audio is paired with video, security needs are met and additional evidence is gained. Integrating microphones with cameras gives staff access to more details about a suspect or scene. Voices, names, languages spoken and directives are just a few examples of what information can be aggregated. This additional data is crucial for first responders as they assess the suspect’s intentions and threat level. When audio is paired with video, security needs are met and additional evidence is gained Video cameras are effective surveillance tools, but they are not able to capture everything. A small school may only have a few cameras installed throughout their grounds, creating surveillance blind spots for select buildings or areas. Meanwhile, a large entity, such as the Los Angeles Unified School District, which has over 900 schools, has hundreds of cameras. These cameras cannot be monitored at all times. In both cases, deploying audio solutions would automatically flag incidents not caught on camera, as well as alert central station guards of what surveillance zones need to be closely monitored. Dissuading young offenders Beyond detection, audio monitoring creates opportunities for prevention. In a situation where a rowdy teen walks onto school property after hours, a two-way audio unit allows security to speak to an individual remotely in real-time. Having the ability to communicate in real-time can be a powerful warning that dissuades a trespasser from vandalising the property or committing other offences. Conflict resolution Conflict resolution is another key benefit of audio monitoring. Bullying is one of the most prevalent issues concerning school communities today. According to the National Centre for Education Statistics, about 22 percent of students ages 12-18 reported being bullied at school. Installing microphones at a school’s key traffic or interaction points provides accountability by documenting what is said, which can then be used to resolve disputes or placate verbally hostile individuals. Audio analytics for aggression detection In addition to audio monitoring equipment, school administrators should also consider deploying audio analytics solutions. Specifically, aggression and gunshot detection are some of the best security tools in the campus security market when it comes to detection, intervention and deterrence. They are the next generation of monitoring; equipping security teams with critical information and enhancing perimeter security. Aggression detectors are capable of accurately recognising duress in a person’s voice. The software automatically and objectively detects the presence of rising human aggression, anger or fear, and subsequently warns staff by a visual alert or alarm trigger. As a result, end users can identify high-risk situations in real-time and prevent acts of physical aggression before they happen. "Audio analytics solutions are the next generation of monitoring; equipping security teams with critical information and enhancing perimeter security" A gunshot detector recognises firearm discharge from various firearms in different settings. Within seconds of a gunshot, the software accurately classifies and triggers an immediate notification through a designated VMS. Security staff can then verify the alert, effectively reducing the reaction time of first responders. Audio monitoring: Privacy best practices The benefits of integrating audio monitoring and sound detection into a school security solution are clear, but before any administration implements these systems, they need to understand the correlation between monitoring and privacy. The federal law indicates that when there is no expectation of privacy, such as in a public place, monitoring is supported. What school administrations need to focus on as they deploy surveillance solutions, is removing the expectation of privacy. Here are few best practices. Post clearly visible signage stating that audio and video surveillance are taking place on the premises. Typical places for mounting these signs can include school fences, main entrances and the main office. Notify students that the school is under surveillance by stating it in the student code of conduct. This increases awareness and reduces a school’s liability should an individual claim he or she did not see a sign on campus. Remind school staff of the purpose of the monitoring equipment. Reiterate that security personnel will only use audio to investigate and resolve wrongdoings so as to enhance the safety of staff and students. Conclusion Audio monitoring is quickly gaining attention in the education sector. It is a technology that is a cost-effective add-on to an existing system, making it an affordable solution. Moreover, audio yields a high return on investment, and for that reason, we will likely see schools across the country continue to adopt it.
The mindset behind a new law to prohibit the use of facial recognition and other security-related technologies by San Francisco police and other city agencies is obvious in the name of the new ordinance: “Stop Secret Surveillance.” Ordinance to stop secret surveillance The San Francisco Board of Supervisors passed the ordinance 8-1 with two abstentions on May 14, and there will be another vote next week before it becomes law. We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here" The irony of such a law emanating from northern California, where tech giants promote the use of numerous technologies that arguably infringe on privacy, is not lost on Aaron Peskin, the city supervisor who sponsored the bill. “We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here,” he told the New York Times. Regulating facial recognition technology Although the facial recognition aspects of the ordinance have been the most publicised, it also targets a long list of other products and systems. According to the ordinance, "Surveillance Technology" means “any software, electronic device, system utilising an electronic device, or similar device used, designed, or primarily intended to collect, retain, process, or share audio, electronic, visual, location, thermal, biometric, olfactory or similar information specifically associated with, or capable of being associated with, any individual or group.” Broadly interpreted, that’s a lot of devices. Includes biometrics, RFID scanners The ordinance lists some examples such as automatic license plate readers, gunshot detection hardware and services, video and audio monitoring and/or recording equipment, mobile DNA capture technology, radio-frequency ID (RFID) scanners, and biometric software or technology including facial, voice, iris, and gait-recognition software and databases. Among the exceptions listed in the ordinance are physical access control systems, employee identification management systems, and other physical control systems; and police interview rooms, holding cells, and internal security audio/video recording systems. The ordinance ban applies to city departments and agencies, not to the general public and exceptions include physical access control systems, employee identification management systems, and internal security audio/video recording systems Airport security not part of ordinance The ban only applies to city departments and agencies, not to private businesses or the general public. Therefore, San Franciscans can continue to use facial recognition technology every day when they unlock their smart phones. And technologies such as facial recognition currently used at the San Francisco airport and ports are not impacted because they are under federal jurisdiction. Furthermore, the San Francisco police department does not currently use facial recognition anyway, although it has been deployed in places such as Las Vegas, Orlando, Boston and New York City. Safeguarding privacy of citizens The ordinance appears to have a goal of avoiding government uses of technologies that can invade individual privacy, seeking to avoid worst-case scenarios such as an existing system in China that uses millions of surveillance cameras to keep close tabs on the Uyghurs, a Muslim minority population. Any new plans to use surveillance technology must be approved by the city government, and any existing uses must be reported and justified by submitting a Surveillance Technology Policy ordinance for approval by the Board of Supervisors within 180 days. Surveillance technology policy Banning use of facial recognition just when its capability is being realised is counterproductive But might such a ban on technology uses undermine their potential value as crime-fighting tools just when they are poised to become more valuable than ever? Ed Davis, a former Boston police commissioner, told the New York Times it is “premature to be banning things.” He notes: “This technology is still developing, and as it improves, this could be the answer to a lot of problems we have about securing our communities.” Technology development doesn’t happen in a vacuum and banning uses of facial recognition and other technologies just when their capabilities are being realised is counterproductive. We should be thoughtful, deliberate and transparent in how we embrace new technologies. However, discarding them out-of-hand using emotionally charged words such as “secret surveillance” does not promote the best use of technology to the benefit of everyone.
What happens to a company’s data in the case of a disaster such as 9/11 or Hurricane Sandy? How can a company recover from a disaster and continue their business uninterrupted? It’s a complicated challenge – and one many security professionals and risk management professionals must consider. Companies like Recovery Point provide resources to help a company survive a catastrophic event and keep its computer programs and business processes running. Their customers include large, well-known companies and the government. “When big disasters happen, people begin rethinking what they need to protect against,” says Dick Fordham, Director of Marketing and Strategy, Recovery Point. “We try to imagine the worst that can happen, and put in place adequate measures to provide the security in those areas.” Recovery Point is a national provider of integrated business continuity and disaster recovery systems. The company stores copies of its customers’ critical enterprise data on its servers in multiple locations. Recovery Point enables customers to bring their systems and networks back up and let employees continue working despite any damage from the disaster. “We’re not a big company – about 150 employees – but we can service the biggest clients because we provide a high degree of personalised service,” says Fordham. There is also a 45,000-square-foot facility in Gaithersburg, Maryland, where clients’ data can be stored up to 30 days on disk and up to seven years on tape Client data storage and backup Recovery Point’s flagship facility is located on a 17-acre private campus in Germantown, Maryland; about 30 miles northwest of Washington, D.C. There is also a 45,000-square-foot facility in Gaithersburg, Maryland, where clients’ data can be stored up to 30 days on disk and up to seven years on tape in high-end, secure vaults. There are also two 100-seat work areas where displaced workers from customer companies can continue to perform their duties – one in Gaithersburg and another one in Kenosha, Wisconsin. Recovery Point is also a tenant in a data centre in Mt. Prospect, Illinois, providing an additional, redundant location to store data in case of a disaster. Recovery Point offers cloud backup strategies to handle data from major computer systems used by large companies; whether it’s mainframe computers, AIX operating systems or iSeries. In addition to providing recovery services in case of a disaster, the company works with companies daily to test and maintain their systems and to provide proof-of-concept demonstrations. Concentric circles of security Security is a large part of the services Recovery Point provides. The company leverages the most secure approaches and technologies to ensure that customers’ data is protected, including the familiar “concentric circles of security” approach familiar to most security practitioners. At the centre of the circle is the data of customer companies, what Fordham calls ‘the crown jewels.’ Recovery Point uses a combination of cyber, network and physical security to protect a customer’s data assets. “If their data is gone or corrupted, their business is gone or corrupted,” says Fordham. Location of the data centre(s) is the first stage of protecting the backup data. Recovery Point is located outside urban areas, away from likely terrorist threats, in an area that is not prone to hurricane or tornado activity. The ‘geographically stable’ area is above the 100-year floodplain. At the perimeter, there is no signage identifying the company or its mission. An anti-ram barrier topped with a 10-foot personnel security fence encircles the campus. At the gate, visitors must be validated remotely or by authorised badge and security code. Inside the perimeter, there are hydraulic anti-vehicle barriers that can resist a 30-tonne truck going 50 miles per hour. Bollards at four-foot intervals keep vehicles away from the building. Visitors require access badges and receptionists at multiple sign-in desks are located behind ballistic-rated bullet-proof glass Inside, visitors require access badges and receptionists at multiple sign-in desks are located behind ballistic-rated bullet-proof glass. Badges allow access only to the specific areas a visitor needs, whether it is the location where their data is stored, temporary work areas, meeting rooms or overnight sleeping quarters. Two-factor authentication includes iris-scan, fingerprint and voice recognition biometrics. Data security process Independent certification, including auditing of processes and physical boundaries around the data, meets standards such as the Federal Information Security Management Act (FISMA) and the Federal Risk and Authorisation Management Program (FedRAMP). The network and power must also be stable and Recovery Point has Uptime Institute Tier 3 certification, which includes redundant, switchable systems. There is an A side and B side to each system; if one side is ‘down’ for maintenance or a malfunction, the other side is fully functional to ensure uninterrupted service. “Customers have already had one disaster,” says Fordham. “We make it as painless as possible for them not to worry about their data, to make them feel secure. In a disaster there are other things to worry about, such as their home and families. We want security you can see and security you can feel.”
Security vigilance can be sporadic at many companies and institutions. Facilities tend to tighten security in the days after a scary event happens or makes headlines, and people are generally tolerant of the associated inconvenience – for a time. But as memory fades, so too does tolerance for being inconvenienced. We want to be safe, but we also don’t want to be bothered. We want a security system that both provides safety and is unobtrusive. Security doesn’t have to be inconvenient. That’s a core message of FST Biometrics, which leverages multiple technologies to identify people in motion, ensuring non-invasive, seamless security in a variety of environments. “In Motion Identification” FST Biometrics’ system analyses body size, gait, movement and direction as an individual approaches an entry point, and then uses facial recognition to confirm that person as someone authorised to enter a facility The approach, says FST Biometrics, is to combine facial recognition biometrics with analysis of body behaviour and characteristics. Their system analyses body size, gait, movement and direction as an individual approaches an entry point, and then uses facial recognition to confirm that person as someone authorised to enter a facility. It all happens without the individual realising it or thinking about it – in effect, tightened security is invisible and non-intrusive to the environment being protected. FST Biometrics calls it “In Motion Identification” (IMID). The benefits are obvious in a global environment where security increasingly is needed everywhere. “It’s very accurate identification that translates into security without a high visibility of security,” says Arie Melamed, CMO of FST Biometrics. “If you have security that isn’t invasive, and without changing the status quo of life, people feel safer and they will be safer.” Accuracy With a false accept rate around 3 in 10,000, the system is sufficient for all but the most secure facilities, says Melamed. If additional security is needed, the system can also implement a voice recognition element, or other multi-factor identification such as cards or smart phone credentials can be added (with resulting false accept rates around 1 in 1 million). FST Biometrics’ software includes visitor management and access control suites, too. It can also be integrated with access control platforms such as Lenel, Tyco’s C-Cure, Honeywell and others. Analysing body recognition factors FST Biometrics analyses body recognition factors as an individual approaches an entry point to narrow the field of possible identities, from which a face is confirmed at the entry point. Narrowing the possible matches from 10,000 to 500 or fewer, the system both simplifies the task of recognising the face and eliminates a majority of possible false accepts, thus improving the accuracy of the total system. Body characteristics are analysed at distances ranging 12 to 18 feet from the entry point, and the final facial recognition takes place 2 or 3 feet from the entry. The system can be used with doors, speed gates or turnstiles, or even in an open environment where a security guard is notified if a person isn’t recognised. The company claims throughput at turnstiles of 30 people per minute. “It’s very accurate identification that translates into security without a high visibility of security. If you have security that isn’t invasive, and without changing the status quo of life, people feel safer and they will be safer”, says Arie Melamed, CMO of FST Biometrics The software system works with standard hardware, including a 5 megapixel IP camera installed at the entry point, and a server. Only the facial image is enrolled in the system. Over time, the system then “learns” information about body behaviour and characteristics -- and applies the data to simplifying identification and increasing accuracy. About FST Biometrics FST Biometrics was founded in 2007 by the former head of Israel’s military intelligence. The company installed the first systems in customer facilities in 2012, and has been receiving feedback since then. In 2014, they began to focus on the enterprise market, including “open campuses” that want security but without the “feel” of security. Clients include corporate, retail, financial services, telecommunications, residential and governmental sectors. Melamed says a new $15 million investment in FST Biometrics by GMF Capital is an endorsement of the company’s approach and a statement of trust. “We know how hard they look for uniqueness [in companies they invest in],” he says. “They are looking for companies that are changing the world.” Former Israeli Prime Minister Ehud Barak will represent GMF Capital on the FST Biometrics Board of Directors. FST Biometrics has also introduced a system that uses an Android-based mobile device (such as a smart phone with a camera) to enable a security guard to recognise people without being tied to a specific location, even in an environment such as a parking garage. After the identity is confirmed, the mobile system advises whether the person can enter and may also list who is authorised to be a passenger in their car (to identify possible car-jacking scenarios).
IP video intercom systems are becoming more popular not only in industrial environments but also in residential projects. Security business has moved towards IP technology. Video intercom, on the other hand, is a key system that should be considered as a link between the user and the security systems due to its integration capabilities. With MEET, it’s easy to integrate video surveillance systems and receive alarms at home. It can be integrated with third-party home automation systems and access control solutions. Face recognition, CCTV visualisation MEET system is a 100% IP technology based on a Point-to-Point infrastructure MEET, the most advanced IP system from FERMAX, was specially designed for residential communication. Secure, reliable and with cutting-edge functionalities, it ensures an outstanding high-quality audio & video, featuring call divert. Moreover, it is easy to install and maintain, with almost unlimited capacity. The system is a 100% IP technology based on a Point-to-Point infrastructure, highly efficient, flexible and powerful. As pointed out by Juan Madrid, Business Development Director and IP Product Manager at FERMAX, “MEET second-generation technology allows our customers to benefit from a top-notch 100% full IP system, even compatible with GPON infrastructure, and a broad range of built in security functions as proximity reader, lift control, face recognition, CCTV visualization and alarm detection”. Monitoring CCTV cameras The devices communicate directly, so MEET does not require central units or servers which could compromise the availability of the system in the event of an unforeseen error. MEET allows the installer to freely assign the range of IP addresses according to the needs of each project, and thus facilitate the control of the networks in every building. MEET system, has already been successfully adopted by FERMAX integrators worldwide MEET system, launched in January 2018, has already been successfully adopted by FERMAX integrators worldwide. “The market feedback has been very positive, especially due to the flexibility of the system, its capability to integrate with Wiegand controllers or readers and to monitor CCTV cameras through RTSP protocol. All these features allow the system to fulfil project requirements from different markets around the world” assures Francisco Alapont, Solutions Department Director and Digital Business at FERMAX. Home automation integration MEET is the system that brings to life the state-of-the-art digital panels which include a triple access control system: face recognition, keypad and proximity. The system’s range is made up of digital panels, one-button panels, touch screen monitors, concierge stations and various accessories. KIN panel, for instance, is an interactive approach featuring touch screen. While being elegant and customizable, it allows the visitor to interact in a simple way with its user interface. MILO panel and MEET Guard Unit are outstanding due to their design and intuitive interaction features. When it comes to the apartments, MEET offers indoor monitors with a simple and compact design. WIT PoE monitor, with its technology and exclusivity, is specially designed for home automation integration and suitable to fit in the most sophisticated environments; MIO monitor, is a symbol of urban and modern residences, represented by its compact and simple design. Single internet connection Our customers will benefit from a wide variety of intercom and security functions in all MEET products" Call Divert function to smartphone has been one of the key goals achieved thanks to MEET ME App, which features a high-resolution image even in portrait mode. It is not only an additional gadget; it is a part of the core features of MEET, which implements by default this function at zero cost. “Connectivity is the cornerstone of FERMAX´s strategy. With MEET system we can offer a seamless and enhanced experience to our installer, connecting our MEET monitors by default without any additional costs related to servers, gateways or licenses. Only one single Internet connection for the building is required.” adds Francisco Alapont. Competitiveness is key for FERMAX and MEET IP technology allows to offer a complete bundle of features already built in the product without increasing its price. “Our customers will benefit from a wide variety of intercom and security functions in all MEET products. This adds value to the MEET system and revert back to the installer as a turnkey solution in terms of easiness of installation and cost reduction” says Juan Madrid.
In the aging trend of 21th century with rapid aging population and high healthcare costs are creating a growing demand for care at home, especially for seniors with long-term health conditions. Home care is moving towards tele-health monitoring and telemedicine, including video conferencing and remote monitoring technology to help increase caregiver efficiency while still providing constant convenience to the patients. Living independently and aging gracefully are the ideals that every individual seeks to pursue, and the challenge is to ensure that all people can age with dignity and security. Climax’s GX Cubic Smart Care Medical Alarm is an all-in-one wellness, and personal safety medical alarm solution, designed to help the elderly to manage their long-term health conditions, bridging medical health monitoring information to care providers/hospitals and create points of care to keep them safe in their own homes. GX Cubic medical alarm GX Cubic can be flexibly connected with third-party Bluetooth (BLE) healthcare sensors GX Cubic can be flexibly connected with third-party Bluetooth (BLE) healthcare sensors, like blood glucose monitor, pulse oximeter, blood pressure monitor, or weight for tracking health data and providing customised alerts to meet individual needs. The measurements can be automatically sent to a health professional who can review the results and continuously keep an eye on the patient’s health needs and provide early treatment as necessary. In addition to medical health monitoring, GX Cubic is also compatible with Pivotell Advance Automatic Pill Dispenser to keep secure of all pills, and remind the user to take the correct medicine at the pre-set time. The solution allows health professionals to monitor pill taking timely results and keep an eye on the patients’ treatment as needed. For situation when remote monitoring care given is insufficient and the user requires onsite assistance, GX Cubic can raise an emergency alarm to inform the caregiver or medical personnel for immediate action. Seniors can be assured that they are always being taken care of, and provide their family members with a peace of mind. Voice recognition solution Voice recognition has innovated over time and continues to advance, allowing products to become even more intuitive and easier to use. GX Cubic has built-in voice recognition and can activate an emergency call to care provider or central monitoring center by preset vocal commands or keywords. This allows seniors to receive emergency attention even in situations where they are immobilised or cannot manually reach the panic button. Working with the leading voice ecosystems Amazon Alexa and Google Home via cloud, GX Cubic also features voice control to activate home electronic devices, complete daily tasks, and seek help during emergencies. Voice over Internet Protocol With the VoIP (Voice over Internet Protocol) feature, GX Cubic users can also initiate two-way voice callsWith the VoIP (Voice over Internet Protocol) feature, GX Cubic users can also initiate two-way voice calls to contact their caregivers or family members at any time. With the additional add-on of DECT, GX Cubic can pair with voice extenders, talking pendants, call points, and voice extenders placed strategically around the home to create a safety net. Smart Home Automation Comprehensive elderly-friendly health care should also have a focus on preventive action to maintain a healthy ageing process. To realise independent living in a smart way, GX Cubic pairs with Zigbee or Z-Wave sensors to enable the whole-home control with various protocol-of-choice. GX Cubic can be programmed to turn on the hallway lights automatically when a sensor reports a senior’s movement in the middle of the night, to reduce a chance of falling; or automatically adjusting air conditioning when there is a sudden temperature-drop. The scenarios are unlimited to fit individual requirements, ensuring a safest living experience for the senior users. GX Cubic can also integrate IP security cameras and camera PIR motion sensors to deliver real-time visual monitoring and verification. When an emergency occurs, alerts are immediately sent to family members, and Monitoring Center to verify the event and sending immediate assistance as needed. Lastly, GX Cubic can support wireless sensor devices, allowing users to add in smoke detectors, water leakage sensors, and gas sensors to monitor environmental emergencies; and motion sensors, door contacts, sensor pad transmitters for inactivity monitoring, to build a healthier, safer independent living.
One of the world’s most famous hotel-chains, DoubleTree by Hilton, part of Hilton Worldwide, has selected a high-performance fire system from Advanced Fire Systems Inc. at their eight-storey, 366 room hotel in Boston, Massachusetts. The challenge was to replace an existing system, integrate speakers to all guest rooms and ensure that all audio messages and strobes were fully synchronised across the hotel, in the event of a fire situation, without the need for costly re-wiring. Advanced audio system The Axis AX system was the preferred choice of the client too thanks to its voice communication system, coupled with PerfectSync" An Advanced audio system was specified by the stylish, four-star, DoubleTree by Hilton Boston North Shore as it met regulatory requirements for the low frequency 520 Hz warning tones necessary for the sleeping areas of the hotel and its award-winning emergency communications system, PerfectSync, synchronised tones and digital messages to ensure compliance with local codes. Christopher Whitmarsh, President at Hayden Systems, Inc., commented: “I was confident that the Advanced equipment could meet the application requirements based on my knowledge and experience with the equipment. In this case, the Axis AX system was the preferred choice of the client too thanks to its voice communication system, coupled with PerfectSync, ensuring the hotel adhered to strict guidelines. The system integrated seamlessly into the fabric of the building and provided the client with a solution that met their needs as well as satisfying the rigorous demands of the local fire authority.” PerfectSync emergency communications system PerfectSync automatically synchronises audio, voice and strobe signals across Advanced’s Axis AX fire alarm networks dynamically, as conditions change. Synchronisation of audio and visual signals across multiple notification zones, floors & areas, prevents confusion in an emergency situation and aids in meeting intelligibility standards. Using high performance, distributed, digital amplifiers that come standard with an integral backup amplifier and power source, should a fire spread to an adjacent floor or area, audio and visual indicators come on immediately, and the audio messages will quickly synchronise with any identical audio message on the system. Advanced’s Axis AX fire alarm system Advanced’s Axis AX system has been designed to offer enhanced power and performance in a user-friendly format Advanced’s Axis AX system has been designed to offer enhanced power and performance in a user-friendly format, offering a vast range of configurations, control and interface options all with simple set-up and operation. The Axis AX systems includes easily networked panels, audio panels and command centers, DynamixSmoke smoke control and a huge range of peripherals, devices and interfaces that make it ideal to suit almost any fire and life safety application. Advanced fire systems Mike Troiano, President and CEO of Advanced in the USA, said: “Advanced fire systems are specified in some of the most famous and prestigious hotels across the world and it was a pleasure to work with our customer Hayden Systems, Inc. to provide a system that will meet the rigorous standards required and ensure that the DoubleTree by Hilton’s staff and guests alike are safeguarded.” “PerfectSync insures synchronisation of audio, paging and strobe signals without the need for special wiring or programming, it’s all done automatically by the Axis AX system. Since its introduction in 2014, Award Winning PerfectSync has built a solid reputation with engineering firms and fire authorities alike for its ability to deliver superior performance. The end result is a technologically advanced, easy to use audio and visual communications system that improves life safety for all of the occupants of a building in an emergency situation.”
Brazilian infrastructure company Companhia Energética de Pernambuco (CELPE) is the main supplier of electricity in the country’s Northeastern state of Pernambuco. Headquartered in the state capital Recife, one of the most important economic and urban hubs in the country, CELPE serves a population of more than 8.8 million inhabitants in the 184 municipalities of Pernambuco. As part of the Brazilian government’s commitment to clean energy, the CELPE grid also contains several hydropower plants at rivers across the state. Providing electricity to private customers and industrial clients in the expansive region requires a 136,762 kilometres distribution network and 4,386 kilometres of transmission lines. As critical parts of the power infrastructure, CELPE operates 240 substations across Pernambuco. But as most of these stations are located in remote areas, the last few years saw an alarming increase of vandalism and theft of expensive power cables. For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management SystemBosch’s Building Integration System Looking to safeguard its vital infrastructure, CELPE needed an integrated security solution that achieved three goals: firstly, keep out criminals and alert police upon security breaches. Secondly, provide seamless access control for the 300 maintenance teams in the field. And thirdly, connect fire alarm, communications, and voice evacuation on an integrated system that allows for remote management from CELPE headquarters. As a one-stop solutions provider, Bosch won the contract for equipping sixteen substations with video security systems, access control, communications, fire alarm and voice evacuation as well as intrusion alarm connected on the Building Integration System (BIS). For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS). The fire alarm revolves around smoke and heat detectors, while for voice alarm and evacuation, Plena Mixer Amplifiers are connected to driver loudspeakers. Cameras with built-in video analytics For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities All systems and cameras are monitored by security personnel at the company’s control centre in Recife. For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities. The system also fulfils the key customer requirement for remote management via the management system BIS (Building Integration System), including administration of user credentials and access rights for the 300 maintenance teams serving various substation sites. Successfully installed at sixteen stations in Pernambuco, the Bosch solution has proven to be an asset for CELPE and its personnel. Aside from safeguarding valuable infrastructure against criminals, the system has also streamlined communications among the service teams in the region by including elements such as conferencing and automatic alerts for fires and intrusions through a messenger system. The remote management of user access rights at the substations has enhanced the overall service level and prevented security breaches. Satisfied with the end-to-end solution, CELPE has now commissioned Bosch to equip approximately 240 electrical substations over the next years.
The deep learning phenomenon continues to excite the IT world, with computing power now at the level where it can be properly used in practical applications. Hikvision has been at the forefront of applying the technology in the surveillance industry and beyond. It has already released its first set of products that harness the power of artificial intelligence (AI). The concept of deep learning takes inspiration from the way the human brain works. Our brain is a very complex deep learning model. Brain neural networks are comprised of billions of interconnected neurons; deep learning simulates this structure. These multi-layer networks can collect information and perform corresponding actions according to analysis of that information.The ability of deep learning to enhance the recognition of human beings makes it a great addition to the security arsenal Reducing false alarms In the past two years, the technology has excelled in speech recognition, computer vision, voice translation, and much more. It has even surpassed human capabilities in the areas of facial verification and image classification; hence, it has been highly regarded in the field of video surveillance for the security industry. Its ability to enhance the recognition of human beings - distinguishing them from animals, for example - makes the technology a great addition to the security arsenal. This is especially relevant in a world where false alarms account for 94%-99% of all alarms, according to police and fire service statistics. Deep learning for data processing Deep learning is intrinsically different from other algorithms. The way it solves the insufficiencies of traditional algorithms is encompassed in the following aspects. The algorithmic model for deep learning has a much deeper structure than the traditional algorithms. Sometimes, the number of layers can reach over a hundred, enabling it to process large amounts of data in complex classifications. Deep learning is very similar to the human learning process and has a layer-by-layer feature-abstraction process. Each layer will have different 'weighting', and this weighting reflects on what was learnt about the images’ 'components'.The more features there are, the more accurate the recognition and classification will be Feature classification and recognition The higher the layer level, the more specific the components. Just like the human brain, an original signal in deep learning passes through layers of processing; next, it takes a partial understanding (shallow) to an overall abstraction (deep) where it can perceive the object. Deep learning does not require manual intervention but relies on a computer to extract features by itself. This way, it is able to extract as many features from the target as possible, including abstract features that are difficult or impossible to describe. The more features there are, the more accurate the recognition and classification will be. Some of the most direct benefits that deep learning algorithms can bring include achieving comparable or even better-than-human pattern recognition accuracy, strong anti-interference capabilities, and the ability to classify and recognise thousands of features. Conventional surveillance challenges Conventional surveillance systems mostly detect moving targets without further analysis. Even smart IP cameras can only map individual points on a shape one by one, making it difficult to calibrate some features (e.g. forehead or cheek), thus decreasing accuracy. For perimeter security, for example, other technologies can be (and are) used to provide more comprehensive security. But they all have their downsides. Infrared emission detectors can be ‘jumped over’ but are also prone to false alarms caused by animals. Electronic fences can be a safety hazard and are limited in certain areas. Some of these solutions can also be expensive and complicated to install.Frequent false alarms are always an issue for end-users, who need to spend time to investigate each one Identifying false alarms Objects such as animals, leaves, or even light can cause false alarms, so being able to identify the presence of a human shape really improves the accuracy of perimeter VCA functions. Frequent false alarms are always an issue for end-users, who need to spend time to investigate each one, potentially delaying any necessary response and generally affecting efficiency. Imagine, for example, a scenario where it’s relatively quiet – a location at night where there are few cars and people around. Even here, there could be 50 false alarms in a night. Assuming it takes 2-3 minutes to check out a false alarm, and that just 3 out of the 50 warrants more attention – say 15 minutes each. A guard either needs to check the system and look back at the alert, or someone needs to be dispatched to the location and look around, checking if anyone has indeed ‘entered without permission’. In most organisations, these would need to be reported/recorded too, adding to the overall time spent on this ‘false alarm’. Increasing recognition accuracy Deep learning, however, makes a big difference. With a large amount of good quality data from the cameras and other sources, like the Hikvision Research Institute, and over a hundred data cleaning team members to label the video images, sample data with millions of categories within the industry have been accumulated. With this large amount of quality training data, human, vehicle, and object pattern recognition models become more and more accurate for video surveillance use. Based on a series of experiments, the recognition accuracy of solutions using the deep learning algorithm increased accuracy by 38% - applying this to the previous example, that’s a saving of nearly one hour each night. This makes deep learning technology a great advantage in a perimeter security solution, with much more accurate line crossing, intrusion, entrance and exit detection.The value of deep learning technology stretches further than traditional security Accurate motion detection The value of deep learning technology stretches further than traditional security. For example, tracking movement patterns of individuals can see if they are ‘loitering’ and a potential threat in the future. A threshold could be set to five metres radius of movement, or ten seconds of staying in the same place. If the person passes either threshold, an alarm could be triggered. The solution tracks the individual and compares this behaviour to a database to see if it recognises a pattern. Another application would be in a scenario where ‘falling down’ could be a threat, like an elderly care home. If a height threshold was set at 0.5m and duration time 10 seconds, for example, the solution would be able to see a person falling down (as they go below 0.5m) and might be in trouble (if they ‘stay down’ for longer than 10 seconds). AI-powered deep learning The solution uses the parameters set to compare with its database and raise an alarm. With features and benefits like these, it’s easy to see how many smart applications could be catered for by deep learning technology.Artificial intelligence has massive potential To sum up 10,000-strong R&D Centre is pushing the boundaries of surveillance solutions and bringing even more benefits to them. Artificial intelligence has massive potential, and Hikvision is always exploring new ways to apply this exciting technology throughout the security industry and beyond. Intelligent search Hikvision deep learning solutions are available at three levels: DeepinView camera can conduct target tracking, grading and capturing when an alarm is triggered. ‘Traditional’ IP camera using a DeepinMind NVR will add the function of searching intelligently by picture, saving time on searching for targets compared with a regular NVR. DeepinView camera and a DeepinMind NVR delivers a full power solution, with the camera sending the information to the NVR, which can then analyse it. This accelerates recording and false alarm filtering.
3 reasons to migrate to a new access control systemDownload
Schooling the market on education securityDownload
Lawrence, Massachusetts deploys FLIR video system for safetyDownload