Security camera mounts - Expert commentary

Ergonomic Standards Increase Control Room Productivity
Ergonomic Standards Increase Control Room Productivity

  Ergonomics are a critical, but often misunderstood aspect of designing control rooms for security. Ergonomics have a deep impact on the integrity of an operation, and the issue goes beyond the control room furniture. Matko Papic, Chief Technology Officer of Evans Consoles, divides ergonomics into three areas: physical (reach zones, touch points, monitors); cognitive (the individual’s ability to process information without overlooking a critical element) and organizational (how the facility operates in various situations; e.g., is it adequately designed for an emergency event?). He says the Evans approach is to determine the precise placement required for each element an operator needs, and then to design and build console furniture to position it there. Basically, the idea is to tailor the control room to the operation. What tasks must an operator perform? Are they manageable or should they be divided up among several operators? Control room design should accommodate the need to collaborate, and be flexible enough to adapt to various situations. It all begins with understanding the information that needs to be processed, says Papic. Increased Productivity In The Workplace Because personnel are often stationed at a specific console, desk or workstation for long hours, physical problems and productivity issues can result, says Jim Coleman, National Sales Manager, AFC Industries. Ergonomically designed furniture and related products have been proven to increase productivity and alleviate physical stress in the workplace. Ergonomic furniture solutions are crafted for the ultimate in safety, adaptability, comfort and functionality. Coleman says AFC Industries can tailor furniture to specific needs and environment. For example, a height-adjustable workstation can be combined with adjustable monitor arm mounts to create a relaxed, comfortable environment. Furniture offers modern designs, comfortable ergonomics, and comprehensive features. Rugged materials withstand the 24/7 use of command control centers. Health Benefits Of Ergonomic Workstations A sedentary office environment is often an unhealthy one. “For people who sit most of the day, their risk of heart attack is about the same as smoking,” says Martha Grogan, Cardiologist at the Mayo Clinic. Ongoing research and studies have shown that a change in posture (i.e., using ergonomic sit-to-stand workstations) is an effective means to combat these negative health issues. Using sit-to-stand workstations helps to eliminate musculoskeletal disorders caused by long-term sitting. They can also improve productivity and focus from the increased blood flow. Energy levels can rise and employees burn more calories. Control room design should accommodate the need to collaborate and be flexible enough to adapt to various situations “The ergonomic environment we create for control rooms involves considering every need of the staff at each workstation and their equipment, as well as workflow within the entire room,” says Coleman. “From the proper setting of screen focal lengths to sound absorption and glare reduction, each requirement and phase of a control room design is a necessary process to ensure the protection and safety of people and property.” Emergency Operations Center “The military has figured out that you are more alert when you are standing,” says Randy Smith, President of Winsted, and the realization is guiding emergency operations center (EOC) design toward sit-stand. “As soon as there is an emergency, everybody stands up,” Smith adds. Designing EOC environments also requires systems be integrated with annunciating signal lights to facilitate communication among operators. Winsted’s sit-stand consoles can be combined with a motorized M-View monitor wall mount, enabling a 60-inch wall monitor to be raised and lowered to match the positioning of the sit-stand console. Larger, wall-mounted screens are easier to use for operators, since a larger monitor size can make it easier to read text on a screen, for example. Combining the larger monitor with sit-stand capabilities provides the best of both options. Many operators today stand for 50 percent of their day, says Smith. Ergonomic standards guide the design of Winsted’s control room consoles, including ISO 11064 standards for the design of control centers. The furniture also is designed to accommodate industrial wire management (larger wire bundles), unlike furniture that might be bought in an office supply store. Read part 3 of our Control Rooms series here {##Poll37 - How well do you incorporate ergonomics into your control rooms?##}

Improving Security System Installations With Acceptance Testing
Improving Security System Installations With Acceptance Testing

Endless possibilities for security deployment have been made possible with technological advancements Significant technological advancements have created endless possibilities in how security is not only deployed, but also leveraged by the end user – the customer. For example, customers can now view surveillance at eight different offices in eight different states from a single, central location. A security director can manage an enterprise-wide access control system, including revoking or granting access control privileges, for 10,000 global employees from the company’s headquarters in Chicago. However, with that increased level of system sophistication comes an added level of complexity. After successfully completing the installation of a security system, integrators are now expected to formally and contractually prove that the system works as outlined in the project specification document. Tom Feilen, Director of National Accounts for Koorsen Security Technology explains that this formal checks and balance process is gaining momentum in the security industry. The step-by-step process of Acceptance Testing is more commonly being written into bid specifications, especially for projects that require the expertise of an engineer and/or architect. Simply put, it is a way for the end user to make sure the system they paid for works properly and is delivered by the integrator as outlined in the project’s request for proposal. While Acceptance Testing can be a time consuming process, it is a valuable industry tool. It is estimated that at least 95 percent of integrated security systems today have been brought through the Acceptance Testing process. Security systems have become more complicated in recent years. The introduction of IP-based, enterprise-wide and integrated solutions have all opened the door to more sophisticated access control and surveillance systems than ever thought possible. This process can vary depending upon the size of the project, but for a larger scale project, it is not uncommon for Acceptance Testing to take several weeks from start to finish. This timeline can be especially lengthy when the project involves hundreds of devices, such as access control readers, surveillance cameras, video recorders, intrusion sensors, and intercom systems. Most integrated security systems today have been brought through the Acceptance Testing process What is involved in the Acceptance Testing process? While the specific process can vary from integrator to integrator, many follow a similar process with their customer to ensure the system works accurately and that the customer has the proper certification documentation. The initial part of the process typically involves generating a report of each device installed as part of the system. This list enables the systems integrator to systematically test each device ensuring that individual devices are not specific points of failure for the overall system. For example, in a building equipped with a system that automatically releases the egress doors upon the fire alarm activation, it is important to make sure each door’s electro-magnetic locking system is operating properly. The systems integrator would not only test that a door releases when the fire alarm sounds, but also to make sure the access control system is notified if the door is propped open or held open longer than in normal usage parameters. For a door that is also monitored by a surveillance camera, part of the testing would also involve making sure that an image being transmitted to a video monitor is coming from the correct surveillance camera and that the actual angle of the image is what the customer has requested and is correctly labeled as such. If a device does not function as it should, it is then added to a punch list that would require the systems integrator to repair that device within a certain period of time. Once repairs are made, the system integrator would then submit a letter to the client stating that every device has been tested and works properly. It is also important for the integrator that once the testing process is complete to obtain a customer sign off (Certificate of Acceptance) on all systems tested and documentation provided. This limits liability once the system is turned over. From a safety perspective, Acceptance Testing is also used to verify that T-bars and safety chains are installed on cameras that are mounted in drop ceilings. It can confirm that panels are mounted in a room that is properly heated and cooled to avoid major temperature swings. Also, as part of the Acceptance Testing checklist, it can insure that power supplies that drive all the security systems are properly rated with the recommended batteries for back-up. And, that emergency exist devices or card readers are not mounted more than 48-inches above ground. An Acceptance Testing process serves to protect the end user's investment After the project is complete, Acceptance Testing protects both parties involved against liability issues. One example is if the building has a fire and the functionality of the life safety system comes into question. Acceptance Testing can be used to prove that the system was able to function as specified and dispel any concerns about its performance. At that time, all close out sheets are turned in, along with as-built drawings and a manual providing a complete listing of each device and system installed. Today, these manuals not only come in paper form as part of a large binder, but also digital files saved to a disc. The benefit of providing the customer with a binder or documentation of the system is that should the end user/customer replace the person who manages security at the company, valuable information will not leave with that former employee. While this checklist to close out a project may appear trivial at first, it is an important part of the security project process. By implementing an Acceptance Testing program, it serves to protect the end user’s investment, ensuring that the systems integrators hired for the project is knowledgeable and provides quality work. For the integrator, it helps towards the end goal of a satisfied customer.

Latest Axis Communications news

Dahua Technology Installs HD CCTV Cameras With Smart Analytics Using AI To Secure Iconic Battle Of Britain Bunker
Dahua Technology Installs HD CCTV Cameras With Smart Analytics Using AI To Secure Iconic Battle Of Britain Bunker

An important heritage site which played a key role in protecting the UK during World War II is itself being made safe and secure with the installation of a comprehensive and fully integrated security system, including more than 75 Dahua HD CCTV cameras. Battle of Britain Bunker The Battle of Britain Bunker is an underground operations room in Uxbridge, formerly used by No. 11 Group Fighter Command during the Second World War, most notably in the Battle of Britain and on D-Day. The operations room was one of the key parts of the world’s first integrated defense system, which linked Fighter Command with Anti-Aircraft Command, Barrage Balloon Command, the Observer Corps, radar, and the intelligence services. The site is run by Hillingdon Council as a heritage attraction with a museum and a visitor center. Fully integrated security solution DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Center VMS DSSL Group completed a full analysis of the existing CCTV and intruder alarm systems, with the aim of creating a fully integrated security solution, to enhance the security around the site, reduce manned security costs, and speed up remote security and police response times. Using the existing wireless network also designed by them across the borough, DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Center video management system (VMS), as well as Axis IP PA speakers externally. All cameras are viewable by management and the security team on site, and also from Hillingdon Council’s main CCTV control room. Surveillance cameras with smart analytics using AI External cameras are equipped with smart analytics using AI, to help secure the perimeter of the site. In 2018, a state-of-the-art wireless CCTV system consisting of more than 1,000 Dahua HD cameras, along with Dahua NVRs, XVRs and control and viewing equipment, was installed across the borough by DSSL Group. More recently, an additional 1,000 Dahua HD cameras have been added to the council's network making it 2,000 in total. In addition to the cameras, DSSL Group installed a Honeywell Galaxy 62-zone intruder alarm system which feeds back to a central monitoring station and is also integrated with the VMS. Dahua CCTV system installed Cllr Richard Lewis, Hillingdon Council’s Cabinet Member for Cultural Services, Culture and Heritage, said “The Battle of Britain Bunker is one of Hillingdon’s treasured heritage sites. It played a pivotal role in the Second World War, and it’s important that we keep it protected. Dahua CCTV system will help us to do that with their state-of-the-art system and high performing cameras.”

Quanika Tech Available Through NIT Makes Security And Corporate Systems Integration Easier For Middle East And Africa Projects
Quanika Tech Available Through NIT Makes Security And Corporate Systems Integration Easier For Middle East And Africa Projects

IT and security systems integrators across the Middle East and Africa can now deliver more efficient, off-the-shelf integration of complete corporate systems - including access control, visitor management, security and building management - following a distribution agreement between Quanika and NIT, an Ingram Micro Company. Quanika’s modular, ready-made approach is designed to make integration straightforward, even for the most complex, multi-site projects, enabling organizations to adapt their on-site operations quickly to meet rapidly changing circumstances, and run them efficiently from a single interface. A1001 and A1601 controllers The company works with systems integrators, consultants, and end-user enterprises globally to leverage seamless integration with Axis Communications’ A1001 and A1601 controllers for unlimited doors and users, network cameras and audio devices. Quanika also allows integrators to scale up AXIS Camera Station VMS to encompass more cameras and cover multiple sites as well as giving them the extensibility choice of Milestone’s powerful XProtect for video management. Quanika’s portfolio of solutions is designed to eliminate the inefficiencies of siloed solutions Quanika’s portfolio of solutions is designed to eliminate the inefficiencies of siloed solutions to enable more productive connections between people, physical infrastructure, and corporate systems. Quanika Compact is a practical and affordable choice for small-to-medium applications in healthcare, retail, manufacturing, logistics and similar locations, giving users the ability to tie together and flexibly manage multiple sites. Visitor management solution Quanika Enterprise is designed for larger scale facilities and corporate enterprises, including multi-purpose buildings, hotels, transportation hubs, hospitals, and universities, giving organizations complete control and situational awareness across their entire estates globally. The Quanika VisitorPoint visitor management solution streamlines and automates operations. Delivering a frictionless and contactless experience, Quanika VisitorPoint is becoming essential during the COVID-era to minimize interaction and risks to frontline staff and reduce contact with doors and surfaces, while acting as a force multiplier for the efficient management, control and tracking of visitors and contractors access and movements throughout facilities. Building management systems As well as providing new technology application routes for security systems integrators, the distribution agreement opens up extensive project options for NIT’s customer base of IT systems integrators, allowing them to deliver modular, commerical off-the-shelf (COTS) security and safety solutions with an extensive choice of third-party systems - everything from intruder alarms, fire, and building management systems to individual, operations-specific business management databases, systems, or devices. Welcoming the deal, Bassel Al Fakir, Managing Director NIT, an Ingram Micro Company, said that Quanika’s solutions are expected to make it easier for NIT customers to deliver solutions with a single, intuitive, security and safety management interface. Integrators and consultants Our customers will be able to use Quanika’s off-the-shelf solutions and 24/7 support to integrate best-in-class technologies" “NIT’s distribution agreement with Quanika will provide major opportunities for ICT integrators and consultants across the Middle East and Africa,”  he said. “Our customers will be able to use Quanika’s off-the-shelf solutions and 24/7 support to integrate best-in-class technologies and deliver new levels of insight and control.” Quanika Managing Director, Leo Cook, said the agreement would also help integrators and their customers improve operational efficiency and meet the unprecedented challenges now facing them. Seamless operational efficiency “It’s never been more important for organizations to be able to manage their operations efficiently, and to let their people to work safely, flexibly and securely,” he said. “Quanika is already helping customers globally to meet today’s rapidly evolving challenges." "We are helping organizations to pivot their operations, including managing their people and networks more efficiently, and improving the way they use their buildings. We now look forward to working with NIT customers across the region to deliver seamless, advanced solutions here.”

Security Industry Association Discloses The Winners Of The 2020 SIA Women In Security Forum Scholarship
Security Industry Association Discloses The Winners Of The 2020 SIA Women In Security Forum Scholarship

The Security Industry Association (SIA) has selected 12 recipients for the inaugural SIA Women in Security Forum Scholarship – a program developed by the SIA Women in Security Forum designed to further educational opportunities and promote advancement for a diverse security workforce. Through this new scholarship – open to SIA members and student members – each awardee will receive $6,650 to use toward continuing education and professional development courses, conferences or webinars, SIA program offerings, repayment of student loan debt and/or other academic or education programs. “The SIA Women in Security Forum continues to break new ground, inspire me and many others and provide unique opportunities for the widest spectrum of people possible to thrive in this field through initiatives like this new scholarship offering,” said SIA CEO Don Erickson. “We congratulate this talented and historic first class of SIA Women in Security Forum Scholarship winners and look forward to celebrating their many accomplishments to come.” 2020 Scholarship winners The winners for the 2020 SIA Women in Security Forum Scholarship are: Ryane Burke, Partner Marketing and Events Manager, Identiv Margurie Evans, SIA student member; Event Security Lead, Phoenix Suns Antoinette King, Key Account Manager – end-user, Axis Communications Kavya Madhusudhan, Senior Project Engineer, Allegion Erin Mann, Customer Experience and Strategy Marketing Manager, Multifamily, Allegion Canada Inc. Daphne Navarro, SIA student member Sheethal Rao, Mechanical Engineer, Allegion Jenna Rolfe, SIA student member; Junior Readiness and Security Policy Officer, Global Affairs Canada Joneka Russell, Security Offer, Allied Universal Holly Sanson, Marketing Manager, ADT Commercial Kerri Sutherland, Human Resources Business Partner, Axis Communications Rachel Wyatt-Swanson, Director of Business Development, Cherokee Nation Security & Defense These honorees were selected with the help of SIA’s Scholarship Selection Committee – a group comprised of volunteers from the SIA Women in Security Forum and SIA’s Human Resources Committee. SIA thanks the scholarship committee and its chairs for their work in evaluating the 2020 scholarship applications. The leadership of women SIA’s Women in Security Forum works to engage all security professionals to promote the leadership of women SIA’s Women in Security Forum works to engage all security professionals to promote, recruit and cultivate the leadership of women for a more inclusive and diversified industry. The forum’s key efforts and activities – in addition to the scholarship – include the SIA Progress Award, which celebrates individuals who advance opportunities and pave the way to success for women in the security industry. Activities also include a quarterly virtual education series; collaborative projects with other organizations that seek to empower women in the security and technology fields; sponsorship of the Women in Biometrics Awards. Biometric identity and security industry The initiative recognizes distinguished females in the biometric identity and security industry; thought leadership opportunities; and engaging networking and professional growth events. The SIA Women in Security Forum is open to all employees of SIA member companies. The 2020 SIA Women in Security Forum Scholarship is generously supported by Diamond Level donor Axis Communications; Emerald Level donors Alarm.com, Allegion, Altronix and BCD International; Ruby Level donors Integrated Security Technologies, Brivo and Securitas. Donors Also, Sapphire Level donors Maureen Carlo, director of strategic alliances at BCD International, Ted Curtin, president of Repworks, Martha Entwistle, Women in Security Forum member, SIA CEO Don Erickson, John Gallagher, vice president of marketing at Viakoo, John Nemerofsky, chief operating officer at SAGE Integration, GSA Schedules Inc. Additionally, also supported by SAGE Integration, Security Specifiers, SoundSecure and Imperial Capital; and scholarship program affiliates SDM, SecurityInfoWatch, Security Matters, Security Sales & Integration and Security Systems News.