Bosch Fiber Optic Transmitters & Telemetry Receivers(1)
Browse Fiber Optic Transmitters & Telemetry Receivers
Fibre optics, telemetry receivers, transmitters, transceivers products updated recently
Video surveillance across the world is growing exponentially and its major application is in both public safety and law enforcement. Traditionally, it has been fixed surveillance where cameras provide live streams from fixed cameras situated in what is considered strategic locations. But they are limited in what they can see given by their very definition of being “fixed”. The future of video surveillance includes the deployment of more mobile video surveillance with the benefits it offers. Instead of fixed cameras, this is the ability to live stream from mobile devices on the move such as body-worn cams, drones, motorbikes, cars, helicopters and in some cases, even dogs!Sending drones into the air, for example for missing people or rescue missions, is much more cost-effective than deploying helicopters Advantages Of Mobile Surveillance The advantage of mobile surveillance is that the camera can go to where the action is, rather than relying on the action going to where the camera is. Also, sending drones into the air, for example for missing people or rescue missions, is much more cost-effective than deploying helicopters. The ability to live stream video from cars and helicopters in high-speed pursuits can be used to take some of the operational issues from the first responders on the ground and share that “life and death” responsibility with the operational team leaders back in the command center. This allows the first responders in the pursuit vehicle to focus on minimizing risk while staying in close proximity of the fleeing vehicle, with direction from a higher authority who can see for themselves in real time the issues that are being experienced, and direct accordingly. In addition to showing video live stream from a pursuit car or motorcycle, by using inbuilt GPS tracking, the video can be displayed on a map in real time, allowing a command chief to better utilize additional resource and where to deploy them, through the use of displaying mapping information with real time video feed. It allows police chiefs to make better informed decisions in highly-charged environments. The 4G phone network can now be used with compressed video to live stream cost effectively Application in emergency situations The same is true of first responders in many different emergency situations. Mobile surveillance opens up a new area of efficiencies that previously was impossible to achieve. For example, special operations can wear action body-worn cameras when doing raids, fire departments can live stream from emergency situations with both thermal and daylight cameras, and paramedics can send video streams back to hospitals allowing doctors to remotely diagnose and prepare themselves for when patients arrive at the hospital. How can special operations and emergency first responders live stream video from a mobile camera with the issues of weight, reliability and picture-quality being considered? H265 Mobile Video Compression Law enforcement insists on secure transmissions, and it is possible to encrypt video to the highest level of security available in the public domain The 4G phone network can now be used with compressed video to live stream cost effectively. The issue of course is that 4G is not always reliable. Soliton Systems has mitigated this risk of low mobile quality in certain areas, by building an H265 mobile video compression device that can use multiple SIM cards from different cellular providers simultaneously. H265 is the latest compression technique for video, that is 50% more effective than conventional H264, and coupling this with using multiple “bonded” SIM cards provides a highly reliable connection for live-streaming high-quality HD video. The 400-gram device with an internal battery can be connected to a small action cam, and can live-stream simultaneously over at least three different cellular providers, back to a command center. Latency is typically less than a second, and new advance improvements are looking to reduce that latency further. Encrypted Video Transmission What about security? Law enforcement insists on secure transmissions, and it is possible to encrypt video to the highest level of security available in the public domain, i.e. AES256.What about integration into existing video infrastructure at the command center? It is not untypical for a police force to have an existing video management system (VMS) at their command center such as Milestone System’s Xprotect. The Soliton range of products are ONVIF-compliant, a standard used by video surveillance cameras for interoperability, allowing cameras and video devices that are ONVIF-compliant to simply “plug&play” into existing video management systems. These mobile transmitters are deployed with law enforcement and first responders across the globe. Their ability to provide secure, full HD quality and highly-reliable video streaming within a small unit, and to enable it to be integrated into the current eco-system that is already installed at the receiving end, has made them a favorite choice with many companies and government agencies.
The term “smart city” gets thrown around a lot nowadays, but as different technologies that strive to be defined in this way are adopted by different countries globally, the meaning of this phrase gets lost in translation. The simplest way to define a “smart city” is that it is an urban area that uses different types of data collecting sensors to manage assets and resources efficiently. One of the most obvious types of “data collecting sensor” is the video camera, whether that camera is part of a city’s existing CCTV infrastructure, a camera in a shopping mall or even a police car’s dash camera. The information gathered by video cameras can be used with two purposes in mind, firstly: making people’s lives more efficient, for example by managing traffic, and secondly (and arguably more importantly): making people’s lives safer. Live Streaming Video All The Time, Everywhere In the smart and safe city, traditional record-only video cameras are of limited use. Yes, they can be used to collect video which can be used for evidence after a crime has taken place, but there is no way that this technology could help divert cars away from an accident to avoid traffic building up, or prevent a crime from taking place in the first place. However, streaming live video from a camera that isn’t connected to an infrastructure via costly fiber optic cabling has proven challenging for security professionals, law enforcement and city planners alike. This is because it isn’t viable to transmit video reliably over cellular networks, in contrast to simply receiving it. Video Transmission Challenges Transmitting video normally results in freezing and buffering issues which can hinder efforts to fight crime and enable flow within a city, as these services require real-time, zero latency video without delays. Therefore, special technology is required that copes with poor and varying bandwidths to allow a real-time view of any scene where cameras are present to support immediate decision making and smart city processes. The information gatheredby video cameras can beused to make people’s lives more efficient, and to make people’s lives safer There are many approaches to transmitting video over cellular. We’ve developed a specialist codec (encoding and decoding algorithm) that can provide secure and reliable video over ultra-low bandwidths and can therefore cope when networks become constrained. Another technique, which is particularly useful if streaming video from police body worn cameras or dash cams that move around, is to create a local wireless “bubble” at the scene, using Wi-Fi or mesh radio systems to provide local high-bandwidth communications that can communicate with a central location via cellular or even satellite communications. Enhanced City Surveillance Live video streaming within the smart and safe city’s infrastructure means that video’s capabilities can go beyond simple evidence recording and evolve into a tool that allows operations teams to monitor and remediate against incidents as they are happening. This can be taken one step further with the deployment of facial recognition via live streaming video. Facial recognition technology can be added on to any video surveillance camera that is recording at a high enough quality to identify faces. The technology works by capturing video, streaming the live video back to a control center and matching faces against any watch lists that the control center owns. Importantly, the data of people who aren’t on watch lists is not stored by the technology. Identifying Known Criminals This technology can work to make the city safer in a number of ways. For example, facial recognition could spot a known drug dealer in a city center where they weren’t supposed to be, or facial recognition could identify if a group of known terror suspects were visiting the same location at the same time, and this would send an alert to the police. Facial recognition technology captures and streams live back to a controll center, matching faces against any watch lists that the control center owns In an ideal world where the police had an automated, electronic workflow, the police officer nearest to the location of the incident would be identified by GPS and would be told by the control room where to go and what to do. Most police forces aren’t quite at this technological level yet, and would probably rely on communicating via radio in order to send the nearest response team to the scene. As well as this, shopping malls could create a database from analog records of known shoplifters to identify criminals as soon as they entered the building. This would be even more effective if run co-operatively between all shopping malls and local businesses in an area, and would not only catch any known shoplifters acting suspiciously, but would act as a deterrent from shoplifting in the first place. Live Streaming For Law Enforcement As mentioned above, live streaming video from CCTV cameras can help the police fight crime more proactively rather than reactively. This can be enhanced even further if combined with live streaming video from police car dash cams and police body worn cameras. If video was streamed from all of these sources to a central HQ, such as a police operations center, the force would be able to have full situational awareness throughout an incident. This would mean that, if need be, officers could be advised on the best course of action, and additional police or other emergency services could be deployed instantly if needed. Incorporated with facial recognition, this would also mean that police could instantly identify if they were dealing with known criminals or terrorists. While they would still have to confirm the identity of the person with questioning or by checking their identification, this is still more streamlined than describing what a person looks like over a radio and then ops trying to manually identify if the person is on a watch list. The smart, safe city is possible today – for one, if live video streaming capabilities are deployed they can enable new levels of flow in the city. With the addition of facial recognition, cities will be safer than ever before and law enforcement and security teams will be able to proactively stop crime before it happens by deterring criminal activity from taking place at all.
In 2017, DITEK saw how power surges from the many natural disasters that took place damaged many businesses. In a natural disaster, or even everyday business operations, a facility’s entire investment in security, life safety and surveillance systems technology can be disabled or rendered useless in a few seconds. Surge protection solutions can mitigate those risks and protect security investments. Proactive Approach To Risk Mitigation Throughout 2017, we also witnessed a change in how enterprises view surge protection, which included how investments are being made in surge protection to protect valuable security, life safety and surveillance systems, while also reducing downtime, manpower costs, liability vulnerabilities, and possibly compliance issues that can force businesses to actually cease operations. Effective security management is about mitigating risks. But risks cannot be mitigated without a proactive approach. Enterprises and integrators, who take the time to assess risk and to develop a strategy to incorporate effective detection, deter and response criteria to protect physical assets will be successful in 2018. 2018 And Beyond That strategy includes designing surge protection into new security systems, while also adding surge protection to existing systems. Enterprises and security integrators who implement a surge protection strategy during security planning processes – or after – will be exercising prevention and mitigation, and they will be successful in 2018 and beyond. Surge protection devices have an untapped potential for enterprise surveillance and security systems In 2017, Ditek continued to offer security end users a solid surge protection solution. We also successfully educated system integrators, who are seeking value-added products or services to incorporate into their portfolios, on the importance of surge protection devices. Educating Security Integrators We believe that surge protection devices have an untapped potential for enterprise video surveillance and security systems, because they can and do meet safety and security challenges that have been rarely identified in the past. We are looking forward to 2018, when we will continue to develop new surge protection products – including a new product engineered to protect up to twelve individual fuel dispensers, which is critical to the financial operation of convenience stores. We will also continue to educate security integrators about the importance of including surge protection in the design/build RFP, to not only secure an enterprise’s valuable security equipment, but also to help integrators to differentiate their capabilities and knowledge from the competition.
Bosch Security Systems has released version 4.8 of its Building Integration System (BIS) which offers safe, touchless access control solutions to curb the spread of viruses like Covid-19. Secure access control solution BIS 4.8 supports biometric and mobile device authentication and provides building managers enhanced integration of fire panels and intrusion panels to ensure the security of buildings. The global COVID-19 pandemic has caused building operators to rethink their access control solutions In light of the global COVID-19 (coronavirus) pandemic, building operators need to rethink their access control solutions. Instead of systems that require physical touch and thereby increase the risk of virus transmission, contactless solutions that still meet the highest security guidelines are preferable. BIS 4.8, Building Integration System In response to these requirements, BIS 4.8 expands on the trusted features and benefits of version 4.7 to now work with three different touchless solutions that safeguard personal health: Face recognition - BIS 4.8 has been redesigned to work with the face recognition solution from Idemia. The face recognition device obtains a biometric scan from a safe distance and matches facial features with credentials in an encrypted database. Doors and gates open via the BIS Access Engine and the Bosch Access Modular Controller (AMC2). Touchless fingerprint readers - Integrated with Idemia’s Morphowave reader, BIS 4.8 controls access via a touchless fingerprint scan. A simple wave of the hand in front of the touchless sensor triggers a 3D scan of four fingers. Access rights are confirmed within less than one second by the system's fingerprint database for a clean and highly secure solution. Access via mobile phones - In conjunction with the mobile access control solutions from STid and HID, BIS 4.8 allows users to use their mobile phone instead of a card for access at the secure reader. For STid’s Mobile ID, the method requires a STid reader, while a Bosch Lectus secure reader works with HID’s Mobile Access solution. Users only need to install an app to verify access rights and use the safe, wireless technology. Aside from facilitating contactless access, all three solutions are also intuitive, quick and convenient compared to keycards and similar methods as there is no need to carry an access card or remember a password in order to gain entry to a building or area. Seamless fire and intrusion panel integration Combining BIS 4.8 with Bosch B and G Series intrusion panels unlock a new level of convenience Combining BIS 4.8 with Bosch B and G Series intrusion panels or MAP 5000 panels unlocks a new level of convenience. Users require only one authorization badge to control two systems. Disarming areas of the intrusion system and granting access can be realized with the same badge on the same reader, without entering a PIN code for easy, one-step authorization. Improved flexibility and efficiency With the introduction of version 4.8, BIS continues to unify the management of multiple security and safety domains and maximize flexibility for key customer requirements. New features include: Integration of the latest Bosch Avenar 2000 and 8000 fire panels and peripherals, along with command and control via BIS, with devices and status shown on maps, and events managed more intuitively via an alarm list. User authorization for Bosch B and G Series intrusion panels are managed directly within BIS for up to 2,000 users on as many as 25 intrusion panels, instead of handling authorizations separately on each of the 25 panels. Central overview of all existing access and B and G Series intrusion authorisations for the complete installation within one system. With these updates, BIS 4.8 helps operators meet the health and safety demands of the new reality without compromising on functionality and security. As a centralized platform for operational building management, the new version of BIS offers greater convenience, flexibility, and efficiency.
ASSA ABLOY Opening Solutions completed the integration of their Aperio® wireless lock technology with the Connect ONE® cloud-hosted management platform from Connected Technologies, Monument, Colo. Connect ONE manages all connected customer devices, including wireless and hardwired locks, access control, intrusion, video surveillance, critical environmental monitoring and energy management from a single interface. “We’re excited to present this integration with industry leading ASSA ABLOY Aperio wireless devices to Connect ONE dealers,” said Mike Simon, Managing Partner of Connected Technologies. Global wireless platform “Now, dealers can easily expand their services to more doors and offer new protection possibilities that save installation time and money. In addition, the Aperio/Connect ONE integration works with popular Bosch, DMP, ELK and Honeywell Vista panels so they can be up and running with new specs quickly.” The Aperio integration offers Connect ONE customers an easy way to connect additional wireless locks to new and existing installations. Aperio is a global wireless platform that works with extensive locking hardware options from ASSA ABLOY Group brands, offering the flexibility to address a variety of applications throughout any facility. The platform uses wireless communication (IEEE 802.15.4) between the lock and an Aperio hub to provide real-time communication to the access control system, simplifying installation and reducing costs. Encrypted wireless connection The integration also allows for a mapped hardwired relay output to initiate an auxiliary control upon access Aperio wireless locks map directly to the intrusion areas for an immediate armed status review to deny access when armed and can also disarm intrusion with proper authority upon granted access at the lock. Since the wireless locks are highly integrated with the control panel, user permissions are applied exactly the same for hardwired readers, allowing for a mix of wireless and hardwired reader/locks without additional set-up complexity. The integration also allows for a mapped hardwired relay output to initiate an auxiliary control upon access and a relay output to control an external door opener. Aperio locks use an encrypted wireless connection to an Aperio IP hub; each hub can communicate to a maximum of 64 locks. Highly flexible solution “Connect ONE offers a simple, scalable solution that complements the Aperio offering perfectly,” stated Mark Duato, Executive Vice President, Aftermarket, ASSA ABLOY Opening Solutions Americas. “This integration will offer dealers and end-users a highly flexible solution for comprehensive access management.” Connect One’s ScanPass® Mobile Credential smartphone control is also supported with the integration, eliminating the need for card or fob credentials. Dealers can contact ASSA ABLOY to become certified to offer Aperio locks, which come in a variety of form factors and can be purchased through ASSA ABLOY Authorized Channel Partners.
One of the largest public train operators in the United Kingdom, Southeastern Rail Network, now relies on a smart video security solution from Bosch Security Systems to secure twelve train depots, including five unmanned locations, against theft and intrusion. The fully digital video surveillance system presents a significant upgrade to the British train operating company, which provides train services between London, Kent and parts of East Sussex and transports 6, 40,000 passengers each weekday on its 392 trains. built-in Intelligent Video Analytics Powered by cameras featuring built-in Intelligent Video Analytics, the solution was installed and configured to the specific requirements at the train depots by Bosch integration partner, Taylor Technology Systems Ltd., over the course of six months. Video security system relies on machine learning algorithms to automatically sound alarms on security threats Fully operational at all twelve locations, the video security system relies on machine learning algorithms to automatically sound alarms on security threats, such as intruders and perimeter breaches. Beyond security applications, the system also tracks important metadata on the arrival times of trains, while also monitoring deliveries at the train depots, among other AI-assisted functions that it carries out. IP-based cameras with Starlight technology The cameras portfolio installed across the twelve depots replaces an analog legacy solution with IP-based security cameras from the Flexidome, Dinion, and Autodome product lines of Bosch Security Systems. These smart cameras include Bosch’s Intelligent Video Analytics capabilities as a built-in feature, ensuring that the most relevant video data can be precisely applied to the requirements of the train depots. Because night-time security and surveillance is critical, especially at the five unmanned train depots on the network, the Bosch cameras rely on Starlight technology to provide full intelligent analytics at night and in low light levels. The Starlight technology supports color filtering down to a light level of only 0.0077 lux, so as to deliver detailed monochrome images where other cameras show no image at all, and guard against intruders and unauthorized entry around the clock. Featuring digital ‘trip wire’ to counter false alarms Highly resilient against false alarms, the smart cameras can detect movement at the perimeters of the train depots using a digital ‘trip wire’. In case of a security breach, the system alerts Southeastern Rail Network’s watch personnel, who can view live camera footage, as well as recordings of incidents for heightened situational awareness and total perimeter security. Instead of relying on the pre-configured capabilities, such as vehicle tracking and more, security personnel can also use the built-in camera trainer function to ‘teach’ new functionality, such as detecting certain types of objects or situations. Remote video recordings storage with Divar recorders Recordings from the depots are safely stored and managed remotely with Divar recorders in encrypted format As an integral part of this end-to-end Bosch security solution, recordings from the depots are safely stored and managed remotely, using Divar all-in-one recorders in encrypted format. When looking at the bigger picture, the video security solution adopted by Southeastern Rail Network is part of an industry-wide evolution from cameras as mere video capturing devices to smart sensors capable of collecting rich metadata. Insights beyond security This metadata unlocks unique insights beyond security, including video analytics at the train depots that support applications such as monitoring deliveries to onsite buildings, providing access to personnel and logging the arrival and departure times of incoming trains. The system thereby not only ensures that all train depots remain fully guarded and protected 24/7 against criminal access, but also provides a data-based foundation to keep efficiency gains and cost savings on track in the long run.
10 Step Guide to Staying Ahead of Emerging Security ThreatsDownload
2021 Trends in Video SurveillanceDownload
Exploring New Vertical Markets for Professional Security SystemsDownload
Capture New Opportunities With Computer Vision And Video AnalyticsDownload
Unified Approach With OPTEX sensors And Genetec RSA Surveillance Module To Enhance Airport Perimeter Security
Leonardo Supplies Six AW119Kx Helicopters To The Polícia Rodoviária Federal To Strengthen Security In Brazil
- Unified Approach With OPTEX sensors And Genetec RSA Surveillance Module To Enhance Airport Perimeter Security
- Leonardo Supplies Six AW119Kx Helicopters To The Polícia Rodoviária Federal To Strengthen Security In Brazil
- Videotec And Pasubio Tecnologia Collaborate To Safeguard Schio With 14 ULISSE Compatc HD Cameras
- Houston Independent School District Installs Salient Systems’ IP Video Surveillance System