MOBOTIX Brought Innovation And Partnerships To ISC West 2017
MOBOTIX Brought Innovation And Partnerships To ISC West 2017

During ISC West 2017, MOBOTIX, the German System Manufacturer of Professional Video Management (VMS) and Smart IP Cameras presented its latest IP video security products and innovations including vertical specific solutions for IoT, retail, home automation, perimeter, transportation and industrial markets.Mike Bomas, General Manager for the Americas at MOBOTIX Corp. said, “Our innovative decentralized camerasystems and efficient video analytics within our ultra-reliable chassis are designed for a wide range of applicationsrequiring quality video along with flexible automation and integration tools to deliver a customer & applicationspecific solution.”As part of a strategic focus to open up its technology to the market, MOBOTIX demonstrated its latest innovations and integrations with key technology alliance partners including Genetec, Accel Robotics, SierraWireless, E-Holovision and Overland.The event also featured demonstrations of MxActivitySensor 2.0, the intelligent 3D motion detection systemusing on-board analytics to reduce false alarms caused by atmospheric conditions, animals and debris.The MOBOTIX range of award winning Thermal radiometry cameras were also showcased, including dual lensconfigurations able to offer both video and thermal imagery with alerts for up to 20 different kinds of temperatureevents in a range from -40 to +550°C for both security applications and fire detection.“Our diverse portfolio combined with innovative application interfaces and system development tools enablesystem integrators to build high value solutions that seamlessly combine a wide range of technologies to meet theneeds of our customers, while preserving the integrity & security of their computer networks”, Bomas adds.

Add to Compare
MOBOTIX Launches Lowlight Exposure Optimisation – MxLEO And New DoorStation Hardware
MOBOTIX Launches Lowlight Exposure Optimisation – MxLEO And New DoorStation Hardware

MOBOTIX AG launches the new Lowlight Exposure Optimisation (MxLEO) software and new hardware for its building automation/home automation offering. The MxLEO is part of the latest MOBOTIX firmware 4.1.9 that also includes support for Hemispheric 5 Megapixel technology sensor modules. "MxLEO is the latest in MOBOTIX image enhancing technology," says Dr. Ralf Hinkel, founder and CEO of MOBOTIX AG. "The main benefits for all MOBOTIX users are that our camera solutions now offer a dramatically enhanced sharpness of images, considerably less noise in these images, extremely user-friendly light settings in the camera(s), optimised recording and alarm results using the added MxActivitySensor intelligence. All these benefits in low-light conditions are made possible through the new MOBOTIX 5 Megapixel technology". MOBOTIX is adamant that one of the most important criteria for a security camera is to offer high-quality images no matter what. "Our users do not have the luxury to choose when and how they want to use MOBOTIX camera solutions whether it is day, night, good/bad weather or whatever. Our technology is put to test everyday and in the worst conditions imaginable for a camera. The sun is shining directly at it - no problem the camera handles it through the built-in automatic exposure settings, unwanted movement in the images triggering alarms - no longer a problem as the MxActivitySensor in the camera reduces these alarms and now in extreme low light conditions - the MxLEO enhances the images to a completely new level", continues Dr. Hinkel. The Lowlight Exposure Optimisation software is included in the firmware release 4.1.9 and is as all MOBOTIX software and firmware free of charge. It can be downloaded on all 5 Megapixel MOBOTIX cameras and is included as standard from today. Apart from the MxLEO does the 4.1.9 also include support for MOBOTIX new Hemispheric sensor modules for the newly released S15 and M15 camera platforms. The firmware 4.1.9 enhances the MOBOTIX door station offering further as MOBOTIX recently launched the AudioMount for the S14/S15 camera platform. "We have customers around the world that want to build their own building automation/home automation solutions," says Dr. Hinkel. "As a customer-focused company we have seen the possibilities and advantages of using our core strength in decentralised product technology to allow the S14/S15 product platform to be the main product for our partners to build their own door station offerings around. For instance mailboxes, different steel casings, etc. are solutions that MOBOTIX does not offer but we can help our customers through sharing our technology solutions with them. The AudioMount is extremely simple to install and integrate for the users." MOBOTIX also offers a new door opener, the MxDoorMaster for their users to integrate in their own solutions. MOBOTIX also launches a new component for the T24 Door Station product platform, the BellRFID keypad. The BellRFID keypad offers the possibility of adding a simplified keypad for usage in the T24 Door Station product platform. "The BellRFID is modular doorbell concept that simplifies the usage for many users. We have also integrated the latest in RFID technology so that users can open their doors completely secure with an RFID card. Of course the BellRFID includes the standard in MOBOTIX Door Station technology including leaving and retrieving messages from the integrated mailbox and connection through the MOBOTIX App ", continues Dr. Hinkel. MOBOTIX also offers a unique service for their customers. "All MOBOTIX customers using the new BellRFID module can free of charge order their wanted and needed personalised name signs for the BellRFID module using optimised paper against UV radiation. We thought all our users were worth that", says Dr. Hinkel.

Add to Compare
Avigilon Control Center 4.6 Network Video Management System Provides A Powerful Engine For HD Surveillance
Avigilon Control Center 4.6 Network Video Management System Provides A Powerful Engine For HD Surveillance

Avigilon Control Center 4.6 The award-winning, enterprise-class NVMS platform, Avigilon Control Center was engineered from the ground up to intelligently manage HD video, delivering both situational awareness and complete image detail. Avigilon Control Center captures, transmits, manages, stores, archives, plays back, and exports HD video while efficiently handling bandwidth and storage. Avigilon Control Center's modular, open architecture allows system designers to integrate Avigilon solutions with existing assets including analog and IP cameras, access control and other intrusion systems. New features Expanded third party IP camera support Avigilon Control Center 4.6 delivers expanded support for a wide range of third party IP cameras and analog encoders from vendors such as ACTi Corp., Sanyo Electric Co., Mobotix, and VideoIQ, in addition to ONVIF certified cameras for the purpose of building hybrid systems and preserving existing assets. Management of surveillance video from third party cameras and analog encoders is in the camera's native compression format, including H.264, MPEG4, or MJPEG. Expanded analytics support In addition to its current integration with SightLogix outdoor video analytics cameras, Avigilon Control Center 4.6 now also supports video analytics solutions from vendors including VideoIQ, creating an integrated situational awareness platform for real-time incident management and response. Advanced HD video management functionality Avigilon Control Center 4.6 offers enhanced HD video management features including an 'in-panel' acknowledgment of alarms from within the monitored video stream, streamlined advanced alarm management functionality, and expanded monitoring capabilities. In addition, Avigilon Control Center 4.6 can activate digital outputs from within the monitored video stream, enabling guards to open a gate or trigger a siren or alarm directly from the video. Expanded mapping interface An advanced graphic mapping interface enables operators to layout cameras and servers on an imported map for easy navigation of large surveillance systems and provides the ability to view alarm status directly on the map. A powerful rules engine enables operators to map any camera or system event to a set output action for access to surveillance images from any location, resulting in faster identification and improved response times. Enhance audit trail capabilities With new features to maintain details of user actions, Avigilon Control Center 4.6 ensures that a detailed audit trail is available for the highest level of system security possible.  See the image with captions

Add to Compare
Mobotix Updates MxControlCenter Software
Mobotix Updates MxControlCenter Software

MOBOTIX, the world's largest manufacturer of megapixel network video surveillance systems, recently unveiled a major update to MxControlCenter, its network video management platform. Focusing on operator usability, MxControlCenter 2.5 introduces a host of new features, including: saved search profiles to make user defined common search queries a single-click operation, unlimited users and groups rights management control with full action audit log, and video motion search on recorded footage to identify critical events quickly. Playback is improved, putting common functions in user friendly locations. MxControlCenter 2.5 also improves initial system setup, allowing recording paths for multiple cameras to be configured in a single operation. "Other vendors charge tens of thousands of dollars for their video management platforms," said Steve Gorski, General Manager, Americas, MOBOTIX. "We provide this software to our customers with no per-server or per-camera licenses and no installation fees with unlimited instances, plus phone and e-mail support for the life of the system." "ControlCenter allows users to easily manage and monitor their cameras and footage on-the-fly. This new release cements ControlCenter's position as a market leader and strengthens the overall MOBOTIX offering," Gorski said. These new features build on MxControlCenter's already strong capabilities including: alarm notification and management, system and software configuration management and backup, automatic camera discovery and setup using built-in Bonjour services, and flexible grid and background layouts. MxControlCenter 2.5 integrates features for managing video walls using readily available thin client PCs & LCD screens, making command center setups simple and cost efficient. The new software has an improved export function with additional container formats. Live recording of camera streams - even different cameras - as one clip on the local archive, means that someone tracking suspicious persons in an MxCC layout across several cameras can track that group or individual and record it as one clip. "The new MxControlCenter update from MOBOTIX has made my day-to-day use of the system much easier. I've always loved this software, and the new features make it an even more powerful tool for managing our security system," said Adam Lewis, Operations Manager, Canada Bay Club.

Add to Compare
Avigilon Links High Definition Video With Point Of Sale Transaction Data
Avigilon Links High Definition Video With Point Of Sale Transaction Data

Launched at ASIS 2009 in Anaheim, CA, the Avigilon Control Center HD Point-of-Sale (POS) Transaction Engine is a new add-on feature to the award winning Avigilon Control Center Network Video Management Software (NVMS). Avigilon Control Center HD POS Transaction Engine links live and visually lossless recorded high definition video with transaction data, enabling security professionals to search and quickly find specific transactions and associated indisputable video evidence for event validation.Meeting the increasing demands for better video quality, Avigilon Control Center HD POS Transaction Engine helps customers reduce shrinkage and theft, and address compliance requirements, by enabling security professionals to more quickly and successfully find video surveillance footage associated with a specific transaction. The transaction engine provides customers the ability to link vital business intelligence with HD video, helping to analyse operations and improve bottom line performance."With the current economy, all departments within an organization are focusing on performance," said Dave Tynan, vice-president of global sales and marketing at Avigilon. "The new Avigilon Control Center HD POS Transaction Engine is a highly effective tool for associating any character based transaction data-such as point of sale data and bar code data-with HD video to provide indisputable and instantaneous evidence to deal with liabilities, shrinkage, service level improvement, and process efficiencies."Avigilon Control Center HD POS Transaction Engine includes the following features and benefits:Multiple streams of transactions from devices such as cash registers, automated teller machines (ATM), or bar code scanners can be associated to a single HD camera to cover a larger field of viewTransactions are linked to associated video to allow instant review, including accessing individual transactions using a powerful search functionTransaction information is simultaneously displayed alongside live or recorded videoException filtering and reporting allows the triggering of events when transactions match certain criteria. These events can be mapped to on-screen alerts, e-mail alerts, and other system events.

Add to Compare
MOBOTIX MxMC 1.1 Includes Full Range Of Professional VMS Functions & Free One-Day Training
MOBOTIX MxMC 1.1 Includes Full Range Of Professional VMS Functions & Free One-Day Training

MOBOTIX has released an enhanced version of the intuitive Video Management Software platform, the MxManagementCenter for Windows and Macintosh. The latest version has been optimized to provide a full range of functions required for efficient and professional video surveillance management. The new MxMC has no system limits and can handle hundreds of cameras and users, live and recordings up to terabytes per camera. The number of recording servers is unlimited. MxMC 1.1 can be downloaded free of charge and is licence free.  Playback Technology MOBOTIX power playback technology of MxMC provides with direct fileserver access 60-times high-speed rewind and fast forward search capability of the recordings as well as a comfortable time lapse search, which reduces a 24-hour video footage down to nearly one minute for example.   Remote Access Thanks to the integrated scaling of image size and frame rate, MxMC supports optimized remote access of live images and playback of recordings over limited bandwidth connections, and is still able to retrieve related image details in full resolution. MxMC includes a complete user rights management. All functions and views can be easily defined per individual user, even down to a simple quad view arrangement with dedicated camera views. In order to become familiar with the exciting new features of MxMC. MOBOTIX is offering a number of free-of-charge trainings worldwide.

Add to Compare
Count, Measure, Analyze: New Video Analysis Tools For Retail Stores And Beyond
Count, Measure, Analyze: New Video Analysis Tools For Retail Stores And Beyond

The MOBOTIX Q24M-Sec hemispheric camera, which can capture an entire room with no blind spots, has now even more to offer with the new integrated MxAnalytics video analysis tool. MxAnalytics is an efficient tool for process optimization or marketing purposes and can be used in small retail stores as well as in public buildings such as museums or airports in order to receive important information. Heat Map: Track And Evaluate Movements Which shelves in the shop are attracting the most customers? Which products at the exhibition booth hold the attention of the visitors most? Which waiting areas in the departure hall are preferred on Mondays between 8 a.m. and 12 p.m.? MxAnalytics makes it possible to reliably capture and evaluate the movement of people or objects in the live image. The most frequented areas are highlighted in color on a heat map in a predefined area. The areas with the most movement are displayed in red, and those with little movement in blue. Counting Lines: Count People And Objects Using counting lines to count people and objects and generate observation data is a valuable tool. How many people pass by a specific entrance in an hour or a day? And what direction were they coming from? MxAnalytics also stands out when it comes to user-friendliness thanks to quick, user-friendly configuration, when creating reports, for example. Another highlight: The results of the video motion analysis can be saved as daily, weekly or monthly reports in a table and exported via various interfaces. Whether via web interface, e-mail or as a MxControlCenter prompt, the reports are automatically collected in the camera and can be easily accessed or sent at any time. This can take place fully automatically and individually for any number of addressees. Reduce costs with MxAnalytics In addition to the count feature, the analysis of statistical behavior data makes an essential contribution to process optimization, thus further reducing costs. MOBOTIX cameras like the Q24M differ from most traditional video systems thanks to their decentralized system architecture. Each camera includes a high-speed computer with long-term memory. It is no longer necessary to use a computer or server to record or analyze image material. Video analysis takes place decentralized in the camera, without network load. This reduces total costs and maintains the system's high performance. MxAnalytics is available free of charge with the latest en firmware version 4.1.4.11 and from the MOBOTIX website with no usage restrictions. It can also be easily integrated into all older Q24M-Sec models via software update. The new release (2.5.2) of the free MxControlCenter video management software supports MxAnalytics, too. This allows evaluating the results from different cameras in a more convenient manner. The update enables the configuration of MxAnalytics on a Q24M camera and subsequent analysis of the created and stored data. MxControlCenter 2.5.2 can now be downloaded free of charge from the MOBOTIX website. MOBOTIX is continuing to develop MxAnalytics for image data processing inside the camera for the Q24 initially. The robust MOBOTIX camera needs very little maintenance and can be discreetly integrated into any environment thanks to its elegant design and compact size. The next step will be the integration into further MOBOTIX camera models.

Add to Compare

Video Surveillance software - Expert commentary

Steps To Develop An Integrated Retail Security Strategy
Steps To Develop An Integrated Retail Security Strategy

There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT. All these areas could be the responsibility of just a few people working to secure a handful of stores or each of these areas could be entirely separate departments, as is often the case for major retailers with locations throughout the country. Regardless of the size of the retailer, there are many different technologies that can be used within a retail store to improve security and loss prevention, yet none should be used in a silo. There are tremendous benefits to integrating security technologies and communications systems together, including enhancing overall safety and security, reducing shrink, and improving operations. There are many different technologies that can be used within a retail store to improve security and loss prevention As the existing security infrastructure is evaluated and plans for the future are developed, the team responsible should consider some of the following questions. Are there areas of the store that require greater security? Are there notifications or other technologies that could improve the efficiency of personnel and the safety of shoppers? Are there other departments within the organization that could benefit from the data gathered by the security technology? Understanding current pain points within the stores and how integrated security solutions can address these is the key to implementing the best solution. Here are a few “hot spots” within a typical retail store that easily demonstrate the power of integrated solutions. Point Of Sale Terminals Whether it’s loss through sweet hearting or other fraud, point of sale terminals present a significant shrink risk for retailers. Integrated systems enhance security at these locations. Video recording of HD or megapixel cameras integrated with point of sale data makes it easy to locate video associated with transactions and exception reporting. This allows for visual verification of each transaction when needed.There are tremendous benefits to integrating security technologies and communications systems together Other risks like robbery not only result in loss, but also impact the safety of employees and shoppers alike. Panic buttons or bill trap sensors connected to the intrusion detection system ensure silent alarms are issued when employees are at risk. When the intrusion detection system is integrated with the video system, pressing a panic button or pulling the bill from the sensor can automatically trigger a video snapshot to be sent to the monitoring station to provide verification of the alarm and more information for law enforcement when they are dispatched. Adding audio integration to the intrusion system can also result in a message sent to the store security personnel’s two-way radio when a panic button is pushed, or a bill trap sensor is activated. If no security guard is onsite, video monitoring services can allow the monitoring center to intervene through audio, alerting the perpetrator that his or her actions are being monitored and that the authorities have been contacted. This may cause the offender to flee the area, helping to mitigate the safety risk as well as the potential for loss. Panic buttons or bill trap sensors connected to the intrusion detection system ensure silent alarms are issued when employees are at risk High Value Displays Protect high-value or frequently-stolen items such as electronics, using video analytics integrated with audio communications Protect high-value or frequently-stolen items such as electronics, using video analytics integrated with audio communications. For example, a person standing at a display for longer than a pre-defined time or touching items on display can trigger a video snapshot to be sent to the store manager and an audio message to play through a nearby loudspeaker, such as: “Thank you for your interest in our smartphone selection; an associate will be there soon to assist you.” This not only alerts potential offenders that their actions are being watched, it also serves to improve customer service for legitimate shoppers – as a retail floor associate is notified that a customer may need assistance. Cash Office An access control reader at the door to the cash office restricts access to only authorized individuals. Integrating video can automatically capture an image of the person requesting access for verifying an employee’s identification prior to granting access or for retrospective analysis in the event of a theft. Exit Doors If an employee props open a back door – either for easy re-entry after a break or to allow access to another person with intentions of theft – integration of the intrusion detection system to the video and audio system can significantly reduce risk of loss. For example, the intrusion detection system can monitor doors for abnormal conditions, even when the system is disarmed.Loss can also occur when a cooler or freezer malfunctions or when the door is accidentally left open  A door left open for longer than a pre-defined time can cause an alarm on the intrusion panel, which can trigger a nearby camera to send a snapshot of the open door to the store manager and trigger the public address system to play a pre-recorded message through a nearby speaker. This prompts the employee to close the door, reducing risk of theft. Coolers And Freezers Loss isn’t just about theft. Loss can also occur when a cooler or freezer malfunctions or when the door of one of these units is accidentally left open. The same concept for monitoring exit doors can also apply to doors for coolers and freezers to prevent spoilage. A cooler or freezer door monitored by the intrusion detection system can trigger an alert or chime to play in the area to remind an employee to close the door or to alert the store manager to the issue. While providing surveillance of the cash register area, the camera's video analytics can be used to trigger an alert in case the queue exceeds the pre-defined threshold Serving A Dual Purpose Retailers can use the metadata from the cameras to gather business statistics like counts of people entering the store While the technology solutions described above positively impact loss prevention in a retail store, they can also extend beyond security to improve health and safety and enhance customer service as well as customer engagement and sales. For example, while securing a store’s main entrance with IP cameras featuring on-board video analytics, retailers can use the metadata from the cameras to gather business statistics like counts of people entering the store. This data can help them understand peak days and times when making decisions about staffing. Or while providing surveillance of the cash register area, the camera's video analytics can also be used to trigger an alert in case the number of people in a queue exceeds the pre-defined threshold. At this point, the same public address system and loudspeakers used to play background music to enhance the shopping experience could be activated to broadcast a message to request another cash register to be opened, improving store operations. For security and loss prevention purposes, video analytics can also be used to ensure that no one enters or leaves the retail shop using the emergency exit. To address health and safety issues, these same cameras can also trigger an alarm if that emergency exit is blocked by an object – improving the safety of customers and employees. When systems are used to deliver data for purposes beyond security, other departments may be willing to contribute toward the cost Metadata generated by the cameras can also be used to gather information that when processed with sophisticated algorithms in the cloud can show trajectories of the paths that shoppers take as they travel throughout a store as well as heat maps indicating where they walk, stop and dwell – all while protecting the privacy of individual shoppers. This information can be used by merchandisers to evaluate the success of displays and store layouts, which directly impacts customer engagement and sales. When systems are used for and deliver data for purposes beyond security, other departments may be willing to contribute toward the cost of the system. This provides an added benefit by relieving some of the cost burden from security or other operational budgets. Product Selection Integration is becoming easier using standards and expanding industry partnerships. However, in some cases, choosing systems from a single vendor that are designed to work together can help to speed and simplify installation, while also reducing system costs for both the integrator and the user. Regardless of the products chosen, it will be important for a retailer with many locations to have consistency in the type of equipment installed at each site. This makes support easier and enables a more uniform response to incidents that happen at various stores. As many retailers already understand, there is no silver bullet to reducing loss. However, a combination of the right technologies working together to prevent shrink and improve investigative capabilities can result in smarter and more effective loss prevention.

The evolution of facial recognition: from bodycams to video surveillance
The evolution of facial recognition: from bodycams to video surveillance

Facial recognition has a long history dating back to the 1800s. To track down criminals, such as infamous bandits Jesse Woodson James and Billy the Kid, law enforcement would place “Wanted Alive or Dead” posters advertising bounties and soliciting public cooperation to help locate and even apprehend the alleged criminals. In addition to the bounty, these posters would include a photo and brief description of the crime, which would then be circulated to law enforcement agencies around the country and displayed in every US Post Office to speed up apprehension. Facial Recognition Advancements in artificial intelligence and biometric technology have led to the widespread use of computerised facial recognitionToday, technology such as social media, television and other more specialized communication networks play a more influential role in the recognition process. Advancements in artificial intelligence and biometric technology, including the development of Machine Learning capabilities, have led to increased accuracy, accessibility and the widespread use of computerized facial recognition. The significance of this means that facial recognition can occur on an even larger scale and in more challenging environments. This article will explore key milestones and technological advances that have resulted in the modern incarnation of facial recognition, before discussing the capabilities of cutting-edge “one-to-many” technology which is increasingly being used by counter-terror defense, police and security forces around the world. Technology Inception And Developments The technology was able to match 40 faces an hour, which was considered very impressive at the time The 1960s marked the start of computerized facial recognition, when Woodrow Wilson (Woody) Bledsoe developed a way to classify faces using gridlines. Bledsoe’s facial recognition still required a large amount of human involvement because a person had to extract the co-ordinates of the face’s features from a photograph and enter this information into a computer. The technology was able to match 40 faces an hour (each face took approximately 90 seconds to be matched) which was considered very impressive at the time. By the end of the 1960s, facial recognition had seen further development at the Stanford Research Institute where the technology proved to outperform humans in terms of accuracy of recognition (humans are notoriously bad at recognizing people they don’t know). By the end of the century, the leading player in the field was a solution that came out of the University of Bochum in Germany – and the accuracy of this technology was such that it was even sold on to bank and airport customers. From this stage on, the facial recognition market began to blossom, with error rates of automatic facial recognition systems decreasing by a factor of 272 from 1993 to 2010 according to US Government-sponsored evaluations. The aim for facial technology is to achieve successful and accurate recognition on commonly available hardware like live CCTV feeds and standard computing hardware Modern Usage Of Facial Recognition Fast-forward to the modern day and facial recognition has become a familiar technology when using applications such as the iPhone X’s Face ID capability or MasterCard Identity Check, passport e-gates at airports and other security and access control points. These solutions implement a consensual form of identity verification, as the user has a vested interest in being identified. This is a “one-to-one” facial recognition event, one person in front of the camera being compared to one identity either on a passport or the app. In these scenarios, the hardware is specifically developed for the application at hand, therefore technically much easier to accomplish. Facial recognition can now be used in a variety of governmental and commercial environments The safety and security world brings a much more complex problem to solve – how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve. It’s even more challenging when the aim is to achieve successful and accurate recognition on commonly available hardware like live CCTV feeds and standard computing hardware. And unlike in the 1960’s where identifying a face every 90 seconds was acceptable; the safety and security market requires near instant feedback on who a person matched against a watchlist is. Security And Safety Applications The idea behind all facial recognition technologies is broadly the same: you start with an image of a person’s face (ideally a high quality one, although machine learning means that to a point we can now even use video without reducing accuracy). A fully front facing image is best, think a passport photo, but machine learning and new software has made this more flexible. An algorithm converts this image into a numeric template, which cannot be converted back to an image and so represents a secure one way system. Every numeric template is different, even if it started out as an image of the same person, although templates from the same person are more similar than templates from different people. The accuracy of facial recognition continues to increase alongside deployments in more challenging and complex environments What happens next sounds simple although the technology is extremely complex: templates of people’s faces are taken in real time and compared to those in the database. The technology identifies individuals by matching the numeric template of their face with all the templates saved in a database in a matter of seconds or milliseconds. To put this into perspective, imagine you are at the turnstiles of a busy train station looking for a person on the run. Today’s facial recognition technology would be able to identify that person should they pass in view of a CCTV camera, as well as notify the police of any additional persons of interest, whether they are a known terrorist or missing vulnerable person on an entirely separate watch list. Because of technical progression, facial recognition can now be used in a variety of governmental and commercial environments, from identifying barred hooligans attempting entry at a football stadium or helping self-excluded gamblers at casino to overcome addiction. Real-Time Assessments The latest evolution of facial recognition pits the technology against an even more challenging application – directly matching individuals from body worn cameras for real time recognition for police officers on the beat. This capability equips first responders with the ability to detect a person from a photo and verify their identity with assurance. The broader implication for this means that every interaction, such as stop and search or arrest, can be supported by real-time facial recognition which will see cases of mistaken identity driven down on the streets. First responders can now for the first time be deployed and furnished with the ability to identify wider groups of people of interest with a degree of accuracy that previously relied only on the fallible human memory. As the accuracy of the technology continues to increase alongside deployments in more challenging and complex environments, its ability to support government initiatives and law enforcement means the debate about the lawful and appropriate use of facial recognition must be addressed. Facial recognition should not be everywhere looking for everyone, but when used properly it has the potential to improve public safety and we should make the most of its potential.

Six Reasons Security Integrators Should Adopt Cloud Technology Today
Six Reasons Security Integrators Should Adopt Cloud Technology Today

As technology advances, the world is becoming increasingly connected, changing the way users think about and interact with security systems, which continue to evolve across all verticals and applications. With this change comes new opportunity for security integrators; security systems are advancing, creating new needs for products and services — some of which can be met through the adoption of cloud-based service systems. Cloud technology is no longer a dreamt-up version of the future of security — it’s here. If you’re hesitant to make the move to the cloud, consider these six reasons to embrace this new technology now. Cloud technology has created an opportunity for integrators to offer managed services to their customers Increased RMR Cloud technology has created an opportunity for integrators to offer managed services to their customers, producing a new business model that generates more stable and predictable income streams. By offering managed services on a subscription basis, integrators can build a part of their business to provide recurring monthly revenue (RMR), allowing them to scale faster. This business model is especially beneficial for customers who prefer to pay a fixed monthly or yearly rate for services rather than a large upfront fee, which can help attract new business while growing revenue from current customers. Stickier Customers Providing managed services fosters a more involved relationship between integrators and their customers, which can help boost customer retention. This is primarily the result of three factors. Firstly, customers who buy managed services are committed for a specified term, which helps develop an ongoing business relationship between them and the integrator. Secondly, providing managed services creates an opportunity for more customer contact — each interaction is an opportunity to build rapport and monitor customer satisfaction.While the functionalities of each system vary, their potential is evident in the cloud-based services available Third, customers who purchase managed services generally tend to do business longer than customers who purchase products or services individually; with the monthly purchase of their services on autopilot, customers get into the habit of receiving these services, which helps reduce the chance that they’ll cancel their subscription while also building customer loyalty. High Gross Profit Margins Cloud managed services create an opportunity for a service and technology to be purchased together, helping to generate a higher gross profit margin from the beginning of the customer relationship. On an ongoing basis, cloud service platforms offer a new level of accessibility to integrators, helping to provide better insight on activity trends to identify opportunities to continuously grow their revenue through subscription-based streams. Easier To Provide Managed Services Traditionally, serving more sites required integrators to hire more technicians to meet the needs of their growing customer base, but the cloud has helped overcome this demand. While the functionalities of each system vary, their potential is evident in the cloud-based service platforms that are available today. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue The Avigilon Blue™ platform, for example, is a powerful new cloud service platform that helps integrators address the needs of their customer sites using fewer resources by offering the ability to administer system upgrades, fixes, health checks, and camera or system settings adjustments remotely. The Avigilon Blue platform automatically sends, and stores video analytics highlights in the cloud, which can easily be accessed from any PC browser or mobile device. This data can be used to efficiently manage customer sites and maintain the health of those sites, helping to increase speed of service and expand the capacity to have more sites up and running.Cloud service platforms have the potential to revolutionize the security industry by providing new opportunities for integrators Not only does this help integrators scale their business faster, it creates an opportunity to provide added value to the customer at a lower cost as new upgrades and services come out. Proactively Fix Problems Before They Occur In addition to automating notifications and tedious maintenance tasks, cloud service platforms help provide integrators with the information and abilities they need to keep their customer sites running smoothly. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue — possibly before the customer even notices a disruption in service. They can then identify the problem and determine whether it can be resolved remotely or requires a technician to be deployed. By having the capacity to pinpoint service needs and make certain adjustments via the cloud, integrators can streamline their customer service processes and lower their response times to provide better, more efficient service. Increased Valuation Of Business Companies that utilize cloud technologies are experiencing as much as 53 percent higher revenue growth rates The ability of cloud service platforms to help integrators manage more sites remotely and expand their revenue through subscription-based streams offers a competitive business advantage. Security innovators have harnessed the power of the cloud to enhance integrator efficiency so that they can spare their attention, resources and effort for where it’s needed most. As a service that helps offer scalability and a high gross profit margin while requiring fewer resources to maintain customer sites, cloud service platforms have the potential to revolutionize the security industry by providing new opportunities for integrators that may ultimately increase their business valuation. According to a study by Dell, companies that utilize cloud, mobility, and security technologies are experiencing as much as 53 percent higher revenue growth rates compared to those who do not such technologies. Integrators who adopt cloud service platforms can benefit from numerous advantages — cost-saving maintenance capabilities, the potential to generate new monthly recurring revenue, and user-friendly design and data security — which make them a significant development within the industry as well as a potential lucrative new business model. The dream of cloud technology is no longer a distant idea of the future, it can become a present reality — and integrators who harness its power can reap its business benefits now.