Security camera mounts - Expert commentary

Making School Safety A Priority With Smart Technology
Making School Safety A Priority With Smart Technology

With pupils in the UK set to go back to school on 8 March, there are a number of safety measures schools need to implement to ensure the health and wellness of the staff, students, and school communities.  The first lockdown and closure of schools brought on by the coronavirus pandemic fired a “warning shot” for education facilities managers, forcing head-teachers to re-examine school safety standards. Now that a third lockdown is here and schools have been shut down for a second time, anyone behind the curve with the benefits of smart technology should get on board now before children return to the school environment. And with the ever-changing variants of the COVID-19 virus, schools can’t afford to be “late to class” when it comes to health and safety. Preventing the spread of disease Some schools in the US have been using smart technologies for a while to measure utility consumption and efficiency, streamline maintenance and enhance general school safety. These technologies are playing a significant role in keeping school buildings healthy and preventing the spread of disease. Let’s take a look at how smart technology can help schools to become safer, as well as more energy-efficient and cost-effective.   Thermal detection cameras  Smart cameras placed at entry points of a school can remove the manual task of temperature testing Smart cameras placed at entry points of a school can remove the manual task of temperature testing. These cameras provide medically-accurate, real-time temperatures of individuals in real-time. If a high temperature is detected, the software sends an instant alert to the relevant party. It can also be set to deny access to those with high temperatures or to people not wearing masks.  Safer water  As the coronavirus continues to sweep through the world’s population, healthcare providers should also be on heightened alert for Legionnaires’ disease, another potential cause of pneumonia with similar symptoms. Legionella is a potentially deadly bacteria that can infect a school’s water supply and cause an outbreak of Legionnaire’s disease. It’s a school's duty of care to prevent Legionella infection by monitoring the risk of the bacteria proliferating.  Particularly as schools reopen and previously stagnant plumbing and cooling systems return to use, additional Legionella cases could rear their ugly head to emergency departments in the coming months. Traces of Legionella were recently found at a Worcestershire school. The school was forced to remain shut while treatment and testing took place. Automated flushing and temperature testing Instant alerts will notify relevant staff if water temperatures fall within “Legionella-friendly” parameters The Health and Safety Executive advises, “If your building was closed or has reduced occupancy during the coronavirus (COVID-19) outbreak, water system stagnation can occur due to lack of use, increasing the risks of Legionnaires’ disease… If the water system is still used regularly, maintain the appropriate measures to prevent legionella growth.” Typically, managing the risk of Legionella includes running all outlets for two minutes, taking and recording the temperature of the water to ensure that it’s not conducive to Legionella growth. This is a time-consuming process, which is why schools are looking for automated water temperature monitoring systems. This smart system with automated flushing and temperature testing reports and records water temperature data in real-time. Instant alerts will notify relevant staff if water temperatures fall within “Legionella-friendly” parameters.  Cleaner air  Advisers say that improving air filtration and ventilation in schools can help mitigate the potential airborne transmission of COVID-19. Strategies include: Increasing outdoor air ventilation Filtering indoor air Using portable air cleaners with HEPA filters  Smart building technologies such as advanced HVAC controls can help facilities managers promote cleaner air with less hassle. For example, smart HVAC systems use sensors to remotely monitor and control variables such as:  Humidity Temperature Indoor air quality The level of carbon dioxide and other pollutants The technology is also energy-efficient and cost-effective.  While these solutions may be key to the reopening of schools in the era of COVID-19, they also bring long-term benefits. Although COVID-19 may have accelerated the adoption of smart technology, many of these solutions are focused on health, wellness, and security in general; which have been needed in school systems for a long time.

Ergonomic Standards Increase Control Room Productivity
Ergonomic Standards Increase Control Room Productivity

  Ergonomics are a critical, but often misunderstood aspect of designing control rooms for security. Ergonomics have a deep impact on the integrity of an operation, and the issue goes beyond the control room furniture. Matko Papic, Chief Technology Officer of Evans Consoles, divides ergonomics into three areas: physical (reach zones, touch points, monitors); cognitive (the individual’s ability to process information without overlooking a critical element) and organizational (how the facility operates in various situations; e.g., is it adequately designed for an emergency event?). He says the Evans approach is to determine the precise placement required for each element an operator needs, and then to design and build console furniture to position it there. Basically, the idea is to tailor the control room to the operation. What tasks must an operator perform? Are they manageable or should they be divided up among several operators? Control room design should accommodate the need to collaborate, and be flexible enough to adapt to various situations. It all begins with understanding the information that needs to be processed, says Papic. Increased Productivity In The Workplace Because personnel are often stationed at a specific console, desk or workstation for long hours, physical problems and productivity issues can result, says Jim Coleman, National Sales Manager, AFC Industries. Ergonomically designed furniture and related products have been proven to increase productivity and alleviate physical stress in the workplace. Ergonomic furniture solutions are crafted for the ultimate in safety, adaptability, comfort and functionality. Coleman says AFC Industries can tailor furniture to specific needs and environment. For example, a height-adjustable workstation can be combined with adjustable monitor arm mounts to create a relaxed, comfortable environment. Furniture offers modern designs, comfortable ergonomics, and comprehensive features. Rugged materials withstand the 24/7 use of command control centers. Health Benefits Of Ergonomic Workstations A sedentary office environment is often an unhealthy one. “For people who sit most of the day, their risk of heart attack is about the same as smoking,” says Martha Grogan, Cardiologist at the Mayo Clinic. Ongoing research and studies have shown that a change in posture (i.e., using ergonomic sit-to-stand workstations) is an effective means to combat these negative health issues. Using sit-to-stand workstations helps to eliminate musculoskeletal disorders caused by long-term sitting. They can also improve productivity and focus from the increased blood flow. Energy levels can rise and employees burn more calories. Control room design should accommodate the need to collaborate and be flexible enough to adapt to various situations “The ergonomic environment we create for control rooms involves considering every need of the staff at each workstation and their equipment, as well as workflow within the entire room,” says Coleman. “From the proper setting of screen focal lengths to sound absorption and glare reduction, each requirement and phase of a control room design is a necessary process to ensure the protection and safety of people and property.” Emergency Operations Center “The military has figured out that you are more alert when you are standing,” says Randy Smith, President of Winsted, and the realization is guiding emergency operations center (EOC) design toward sit-stand. “As soon as there is an emergency, everybody stands up,” Smith adds. Designing EOC environments also requires systems be integrated with annunciating signal lights to facilitate communication among operators. Winsted’s sit-stand consoles can be combined with a motorized M-View monitor wall mount, enabling a 60-inch wall monitor to be raised and lowered to match the positioning of the sit-stand console. Larger, wall-mounted screens are easier to use for operators, since a larger monitor size can make it easier to read text on a screen, for example. Combining the larger monitor with sit-stand capabilities provides the best of both options. Many operators today stand for 50 percent of their day, says Smith. Ergonomic standards guide the design of Winsted’s control room consoles, including ISO 11064 standards for the design of control centers. The furniture also is designed to accommodate industrial wire management (larger wire bundles), unlike furniture that might be bought in an office supply store. Read part 3 of our Control Rooms series here {##Poll37 - How well do you incorporate ergonomics into your control rooms?##}

Improving Security System Installations With Acceptance Testing
Improving Security System Installations With Acceptance Testing

Endless possibilities for security deployment have been made possible with technological advancements Significant technological advancements have created endless possibilities in how security is not only deployed, but also leveraged by the end user – the customer. For example, customers can now view surveillance at eight different offices in eight different states from a single, central location. A security director can manage an enterprise-wide access control system, including revoking or granting access control privileges, for 10,000 global employees from the company’s headquarters in Chicago. However, with that increased level of system sophistication comes an added level of complexity. After successfully completing the installation of a security system, integrators are now expected to formally and contractually prove that the system works as outlined in the project specification document. Tom Feilen, Director of National Accounts for Koorsen Security Technology explains that this formal checks and balance process is gaining momentum in the security industry. The step-by-step process of Acceptance Testing is more commonly being written into bid specifications, especially for projects that require the expertise of an engineer and/or architect. Simply put, it is a way for the end user to make sure the system they paid for works properly and is delivered by the integrator as outlined in the project’s request for proposal. While Acceptance Testing can be a time consuming process, it is a valuable industry tool. It is estimated that at least 95 percent of integrated security systems today have been brought through the Acceptance Testing process. Security systems have become more complicated in recent years. The introduction of IP-based, enterprise-wide and integrated solutions have all opened the door to more sophisticated access control and surveillance systems than ever thought possible. This process can vary depending upon the size of the project, but for a larger scale project, it is not uncommon for Acceptance Testing to take several weeks from start to finish. This timeline can be especially lengthy when the project involves hundreds of devices, such as access control readers, surveillance cameras, video recorders, intrusion sensors, and intercom systems. Most integrated security systems today have been brought through the Acceptance Testing process What is involved in the Acceptance Testing process? While the specific process can vary from integrator to integrator, many follow a similar process with their customer to ensure the system works accurately and that the customer has the proper certification documentation. The initial part of the process typically involves generating a report of each device installed as part of the system. This list enables the systems integrator to systematically test each device ensuring that individual devices are not specific points of failure for the overall system. For example, in a building equipped with a system that automatically releases the egress doors upon the fire alarm activation, it is important to make sure each door’s electro-magnetic locking system is operating properly. The systems integrator would not only test that a door releases when the fire alarm sounds, but also to make sure the access control system is notified if the door is propped open or held open longer than in normal usage parameters. For a door that is also monitored by a surveillance camera, part of the testing would also involve making sure that an image being transmitted to a video monitor is coming from the correct surveillance camera and that the actual angle of the image is what the customer has requested and is correctly labeled as such. If a device does not function as it should, it is then added to a punch list that would require the systems integrator to repair that device within a certain period of time. Once repairs are made, the system integrator would then submit a letter to the client stating that every device has been tested and works properly. It is also important for the integrator that once the testing process is complete to obtain a customer sign off (Certificate of Acceptance) on all systems tested and documentation provided. This limits liability once the system is turned over. From a safety perspective, Acceptance Testing is also used to verify that T-bars and safety chains are installed on cameras that are mounted in drop ceilings. It can confirm that panels are mounted in a room that is properly heated and cooled to avoid major temperature swings. Also, as part of the Acceptance Testing checklist, it can insure that power supplies that drive all the security systems are properly rated with the recommended batteries for back-up. And, that emergency exist devices or card readers are not mounted more than 48-inches above ground. An Acceptance Testing process serves to protect the end user's investment After the project is complete, Acceptance Testing protects both parties involved against liability issues. One example is if the building has a fire and the functionality of the life safety system comes into question. Acceptance Testing can be used to prove that the system was able to function as specified and dispel any concerns about its performance. At that time, all close out sheets are turned in, along with as-built drawings and a manual providing a complete listing of each device and system installed. Today, these manuals not only come in paper form as part of a large binder, but also digital files saved to a disc. The benefit of providing the customer with a binder or documentation of the system is that should the end user/customer replace the person who manages security at the company, valuable information will not leave with that former employee. While this checklist to close out a project may appear trivial at first, it is an important part of the security project process. By implementing an Acceptance Testing program, it serves to protect the end user’s investment, ensuring that the systems integrators hired for the project is knowledgeable and provides quality work. For the integrator, it helps towards the end goal of a satisfied customer.

Latest IDIS news

IDIS And Inner Range Tech Partnership Expands Integration Options For Enterprise Sites
IDIS And Inner Range Tech Partnership Expands Integration Options For Enterprise Sites

Demand for more powerful, flexible but simple integrated security and site management solutions - in applications including data centers, healthcare, banking, and critical infrastructure – is being met by a new technology tie-up between Korea’s IDIS and Australian-headquartered Inner Range. The collaboration brings together IDIS’s end-to-end video offering with Inner Range’s enterprise-level access control and intruder detection system Integriti, giving end-users everything they need for more efficient and productive control of their security, safety, and building systems from a single management platform.  Easy integration process IDIS technology is easy to install with Integriti, with a simple three-step process IDIS technology is easy to install with Integriti, with a simple three-step process and is already proving its value with small to enterprise-level projects in key regional markets. The partnership will support continued growth in Asia and Australasia where IDIS has strategic partnerships with some of the most respected distribution partners, including Hills Limited in Australia, while major U.S. and European applications are also now confirmed or in prospect, say the two companies. Examples include a global data and asset storage provider which has just completed a significant upgrade. Projects in retail, commercial office space, and local government are also underway. Control and management Inner Range’s Integriti access control and integrated management platform work seamlessly with the IDIS DirectIP® range of NVRs and cameras, giving them additional control and management via the total cost and license-free video management software (VMS), IDIS Center.  Using Cellphone credentials The comprehensive choice of door controllers, readers, and keypads from Inner Range can be extended with a range of third-party readers including Mifare, HID, biometrics, and cellphone credential support from multiple vendors. Video solutions Linking access and alarm devices with IDIS’ award-winning video tech, including deep learning analytics, allows granular monitoring and recording of activity across single and multiple sites – for example, door entry, forced-door, and a range of alarm trigger events – and provides instant visual verification of threats and faster incident response, together with comprehensive audit trails and reporting for both incident investigations and improved site management. Access control and security management The integrated approach helps customers mitigate current risks while ensuring a futureproof platform Together, the Inner Range intelligent access control and security management system and IDIS’ end-to-end video solutions can be used as the foundation platform for fully integrated solutions that incorporate everything from security, life safety, and building management systems to visitor management and site-specific systems and devices. This integrated approach helps customers mitigate current risks while ensuring a futureproof platform that will provide them with the scalability and flexibility to adapt as they face future operational challenges and an ever-evolving threat landscape. Easy and affordable maintenance “Our modular, out-of-the-box approach integrates simply and effectively with Inner Range’s Integriti system, offering customers integrated security management more affordably.” “Our partnership ensures a lower total cost of ownership (TCO), combined with assured local support, extended equipment warranties, and easier maintenance,” says Andrew Myung, President, IDIS America. Quick and efficient process “Our new seamless integration with IDIS is a simple three-step process, allowing security managers and integrators to quickly and efficiently associate cameras with any entity on the Integriti system and plot them on schematic maps.” “Our partnership extends the technology choice available to systems integrators and offers attractive new options for their customers,” says Tim Northwood, General Manager, Inner Range.

IDIS Announces That Their 12MP IR Super Fisheye Camera Is Now NDAA Compliant And Available Everywhere
IDIS Announces That Their 12MP IR Super Fisheye Camera Is Now NDAA Compliant And Available Everywhere

IDIS is pleased to announce that its award-winning 12MP IR Super Fisheye camera is now NDAA compliant and available to systems integrators and end users everywhere. The 12MP IR Super Fisheye ranks as one of the most popular IDIS cameras, due largely to its many innovative and unmatched features, including silky-smooth Smart UX Controls, which enable smooth and intuitive panning, tracking, and zooming with ease and accuracy. These revolutionary controls allow operators to easily follow moving objects or suspects in real-time and dewarp any point of interest in six view modes directly from the camera, VMS or via IDIS mobile apps on smartphones or tablets. Multi-Layered encryptions Essential on-board analytics include active tampering alert, trip-zone alert, and heat mapping tools. The Fisheye can also easily be utilized by IDIS Deep Learning Analytics, allowing users to benefit from a highly accurate object, loitering, and intrusion detection, as well as metadata and appearance searching. Fully cybersecure, this camera is equipped with multi-layered encryptions and proprietary protocols and gives users the assurance of continuous seamless recording with IDIS Smart Failover. Essential on-board analytics include active tampering alert, trip-zone alert, and heat mapping tools The 12MP Fisheye with its exceptional Wide Dynamic Range (WDR) capability covers a wider area even in varying lighting conditions, maintaining image brightness, exposure, and contrast to provide forensic-level detail right to the periphery. As a result, the IDIS Super Fisheye is a popular choice for schools, retail, healthcare, and logistics centers where it is significantly reducing the number of fixed-lens cameras required to cover a particular area, meaning less equipment costs, lower installation fees, and easier maintenance. Video management software “Meeting NDDA compliance and global regulations and standards is a concern for systems integrators and end-users worldwide,” says Andrew Myung, President, IDIS America. “We are now shipping an extensive Korean-made range of powerful cameras and recorders that are NDDA compliant, inherently cybersecure, and come with built-in failover. Together with a choice of video management software and our 98% accurate deep-learning powered analytics, we are giving customers the assurance and trust they need, while ensuring an industry-beating low total cost of ownership.” The NDAA compliant 12MP Super Fisheye is setting the benchmark for full situational awareness, which is critically important to rapid incident response and forensic investigation purposes. In addition, the new IDIS NDAA line-up includes a growing choice of network cameras and recorders for applications of any size.

Inner Range Announces Integrations With FLIR Latitude And IDIS CCTV
Inner Range Announces Integrations With FLIR Latitude And IDIS CCTV

Access control and security system manufacturer Inner Range has announced new integrations with FLIR Latitude and IDIS CCTV. The new integrations work with Inner Range’s enterprise-level intelligent, integrated access control system, Integriti, and bolster options for clients around video surveillance. Enhancing VMS and CCTV  FLIR Latitude is a powerful and versatile network VMS with enhanced cybersecurity. Its CCTV cameras automatically load configurations in Integriti, provide 64-bit integration server support, and security managers can set trigger inputs for CCTV events. Cameras by Korean video surveillance firm IDIS can show camera status in Integriti, display video time frames, show on-screen displays, and allow reverse playback. All-in-one security & access Inner Range general manager, Tim Northwood, said, “Integriti’s open IP platform means it can offer clients highly bespoke solutions by seamlessly integrating with a whole host of third-party systems." "CCTV is a key element of any access or security solution and we’re delighted to be working with IDS and FLIR to help our customers create one unified system that meets all their individual security and access needs.”