Technology & Trends - Video Surveillance

Creating a Safe and Secure Workplace Environment Using a Culture of Openness

Companies that have developed a culture of openness can provide and receive feedback at all levels “The nail that sticks out gets hammered down” is an old Japanese saying that took hold in our post World War II corporate America culture. This phrase encourages an unspoken rule of conformity combined with an authoritarian hierarchical structure. Today it is important for business leaders to consider the impact this has in American workplaces. Brent O’Bryan...

How Retailers Can Best Utilize Video Surveillance Systems

Video surveillance software now allows retailers to monitor a location from anywhere Video surveillance has a lot more applications in the retail sector than mere loss prevention.  It can serve as an important management tool to boost operations and business intelligence. In this article, Gadi Piran of OnSSI, describes how surveillance video can be effectively used by retailers to improve their operating efficiencies and save costs by combining remote monitoring with...

Enhancing Security With 360-degree Video Surveillance

One alternative purpose for a 360-degree camera is the ability to provide a panoramic view in a wall-mounted orientation Changing security requirements have necessitated rapid advances in video surveillance technologies.  With the ability to retrospectively track incidents of security breaches, 360-degree cameras provide a much clearer perspective into such events. Here, Richard Pineau of Oncam explains the many facets of this technology and its impact on improv...

Perimeter Protection For Ports And Maritime Applications

Thermal video analytics identify intruders despite background water movement or glare off the water There are more than 300 ports in the U.S. maritime system, representing a major point of vulnerability that could have potentially devastating effects on the US economy. Securing the nation's ports is essential, and port perimeter security is the first line of defense against disruption to global commerce. In this article, SightLogix CEO, John Romanowich, explains how therma...

Getting The Most Out Of Your Emergency Call Box Investment

Acquiring emergency phones is an effective way to improve security and safety Call boxes / emergency phones play a very important role in improving security. Not only are they important communication tools in the event of an emergency, but they can also serve as effective deterrents to crime or prevent security threats.  In this article, Sam Shanes, Chairman at Talk-A-Phone, gives five valuable tips to significantly enhance the capabilities of the call box / emergenc...

IP Network Requirements For Video Surveillance/physical Security

IT networks are expanding to include more users and applications The use of corporate IT network infrastructure for physical security applications such as video surveillance presents unique challenges. Jack Fernandes, President & CEO of American Fibertek, makes a case for separate networks using specialized equipment and technologies specifically designed for video surveillance which could also integrate other physical security functions. In today’s business world, c...

Managing Physical Security Systems & Information In A Multi-Building Campus

Multi-building campuses face unique problems in implementing a total physical security solution The requirements of a physical security solution for a multi-building campus are quite different from those for the security of a single building. Gadi Piran, President of OnSSi, lists the immense potential and benefits of implementing an integrated security solution and the key characteristics of an effective solution. Multi-building campuses such as universities, research faciliti...

Accurate And Cost-effective Outdoor Video Security

Technologies are now available that are specifically designed to accurately detectbreaches in a range of environments Designing a surveillance system that is accurate and cost-effective for the outdoors has been a significant challenge for the security industry. However, time-proven technologies are now available that are specifically designed to accurately detect security breaches in a wide range of outdoor environments while addressing the core issue of n...

Power Supplies: Critical Component Of Security Solution Effectiveness

Security integrators prefer to standardizetheir choices of system components such as power supplues using security manufacturers they are familiar with Power supplies may be inconspicuous and literally out-of-sight however, they play a critical role in the effective functioning of security solutions. Selecting and using the right power supply is an important aspect of ensuring that the installed security system delivers the desired outcome and of course, a good ROI. In th...

Cost-effectiveness Of Megapixel Camera Systems

End users should consider the cost of anentire surveillance system rather than the cost of a single megapixel camera Are megapixel surveillance cameras more expensive than conventional cameras? Yes, if one were to believe a common misconception in the security industry. But, to get a clear picture of the reality, one should consider the cost of an entire video surveillance system rather than evaluating the cost of a single megapixel camera. A holistic evaluation of the cost ve...

Video Systems: Delivering Value To Enterprise Business Intelligence

Video surveillance solutions can work alone to deliver intelligence or integrate with other business systems and optimize operations If you think of video surveillance as an instrument of the security department, you risk overlooking the broader benefits of video. The fact is, video is much more than a security tool, it is a business intelligence (BI) tool. In this article, Gadi Piran President of OnSSI discusses how video systems can be used as an effective BI tool in a...

CFATS – Latest Standard In Vogue Amongst US Chemical Facilities

As per DHS, Tier 1 facilities will go through a preliminary round of site inspections called pre-authorisation inspections (PAI) In October 2006, the Department of Homeland Security Appropriations Act of 2007 became law in the US. Section 550 of the Act ordered the Department of Homeland Security (DHS) to “...issue interim final regulations establishing risk-based performance standards for security of chemical facilities and requiring security vulnerability assessments a...

Security System Implementation: "bleeding Edge" Versus Leading Edge Security Technologies

Choosing between "bleeding edge" and leading edge technology is critical when deploying a security system The choice of the right security technology is one of the primary considerations for implementation or upgrade of a video surveillance system or other security system. Industry professionals making this critical decision often have to choose between a ‘bleeding edge’ technology, i.e. one that is in its infancy but offers great potential, and a leading edge prov...

Security Management System’s Usability Key To Easy Adoption

The usability revolution that took place several years ago on the consumer market is breaking into the field of security management. Wouter Kersteman, Interaction Designer at Nedap, explains in this article that intuitive user interfaces with attractive apps and widgets - similar to those found on modern mobile phones and tablets - are the standard of the future; usability is the latest buzzword and may even be a pre-requisite for security management systems.   Rec...

Security Software For Identity Management – A Flexible, Scalable And Secure Approach To Manage Enterprise Risk

Software can combine information from various systems to create a single identity across the organization In today's enterprise business environment, the best approach to managing risk for a known scenario is to both prepare for it and guard against it.  Effective security management necessitates credible real-time information about risk and the ability to respond to that information in a timely manner. However, that information is often not available in real-time or ma...

Four Tips To Buy The Right Integrated Security Solution

An integrated security system needs to fulfill user's security objectives and needs To meet a user’s specific needs, a truly integrated security solution must include video surveillance and other security systems on a single platform. Although this is a high criteria for any system designer to meet, it is now becoming increasingly possible. Integration solutions require a commitment and expertise on the part of systems integrators as well as security product manufacturer...

Lighting Challenges In Video Surveillance In Retail, Financial And Hospitality Sectors

Ambient lighting in hospitality environments pose major challenges for video surveillance Variable lighting conditions pose a persistent challenge in video surveillance applications such as large retail locations, banks and financial institutions, and hospitality environments.Challenges to lighting quality Typically, retail locations, banks and hospitality venues include an abundance of windows. The resulting excessive light can damage video image quality, by flooding the ima...

Casino Surveillance Integration Adapts To A New Scale

The changes to the economic climate over the past few years have affected the construction industry as a whole, and the booming casino industry was naturally affected as well. While there are still new casinos being built, overall the scale of construction does not approach the mega-casinos that have dominated the industry for the previous twenty years. Many of the new builds today are smaller casinos with different budgets and requirements of past projects. In addition, existing c...

Using CCTV Security Systems To Deal With Rising Rural Crime

Innovative surveillance technology, relaxation in UK Data Protection Laws and shared resources are key to curb rural crimes The significant rise in crime in rural areas in recent times in the UK has led to growing calls from security and crime prevention experts for government to make it easier for communities and law enforcement to fight back. “In our areas, every farm within a 5 mile radius has had trespass, some kind of theft of property, plant or livestock in the las...

IP Technologies Fuel Global Expansion And Standardisation Of Security Systems

Networking is a powerful way to effectively converge and integrate security In an ever-changing world, business organizations require efficient security partners in order to focus their expansion towards growing economies. This physical expansion leads to a need for expanded and enhanced security programs to protect a growing network of people and facilities. In this article, Renae Leary, Senior Director, Global Accounts, at ADT Worldwide, provides an insight into cost-effecti...

Understanding Fiber Optic Transmission In Video Surveillance

Fiber optic technology offers the most efficient means of transmitting video in the digital environment In Part II of this article on the role of fiber optic transmission in network IP video surveillance systems Jack Fernandes, President and CEO of American Fibertek takes a deeper look at the critical needs of a reliable transmission system in the evolving age of digitalization. There is no doubt that fiber optics will play an even bigger role in modern security...

Powering Network IP Video Surveillance Systems With Fiber Optic Transmission

Fiber optic transmission has played a crucial role in the rise of IP video surveillance The advances in video surveillance technology have seen the increased adoption of network IP products over analog systems. A key constant to this shift has been the critical need for reliable transmission of video signal. As the transition to network IP video continues, the need for the widely used coaxial cable is wavering in favour of Cat-5/ UTP cable and high-speed Ethernet connections u...

Intelligent Security Components Pave The Second Wave Of Convergence

   Network-enabled "intelligent" security components increasingly have better computational and memory capacity The use of Internet Protocol (IP), or networking, is commonly associated with convergence. In this article, Markus Lahtinen of Lund University's LUSAX project, contends that the shift to network-enabled "intelligent" security components which increasingly have better computational and memory capacity has a significant impact on the present and future dy...

Open Standards In Physical Access Control Gain Momentum As ONVIF Adoption Grows

 The outlook of the access control is bright despite economic downturn Belying the tough economic environment in which it is operating globally, the security industry is apparently ‘weathering the storm' quite well. Despite some expected adverse impact of the economic downturn, overall the security industry has been relatively immune and resilient compared to some other sectors. This could well be because of the growth in unemployment and higher crime rates necessi...

Fiber Optic Transmission In Security And Surveillance Solutions

  Fiber optics enhances the operation and business bottom line of surveillance solutions Designers and end users of security systems, integrators and installers must consider and balance the functionality required of a video surveillance camera with its methods of transmission. This is the first of a 3-part examination by Mark Wilson, Marketing Vice President of Infinova, of how chief security officers (CSOs), directors and managers can understand the benefits of and...

Differentiating High-Definition And Megapixel Camera Resolution

  No more confusion: high definition and megapixel resolution explained  The growing popularity of IP-based video systems in the video surveillance market provides the ability to capture high-resolution images through megapixel video. The use of HDTV standards in the consumer video market is becoming more prevalent. The images produced by this new generation of surveillance cameras are often collectively referred to as high-definition (HD) or as megapixel images. Sin...

Choosing The Right Power Supplies For Security Installations

 Selecting the optimum power supply for a system is critical to an installation  When it comes to selecting power supplies, knowledge is power. Determining the power requirements of every systems product, taking into account their integration with one another is critical to ensure that you are selecting and installing the power solutions most appropriate for your installation. Such information will enable you to select the power supplies that will be required to keep your security sys...

Improving Airport Security Effectiveness - Key Solutions

 Dealing with rising airport security threats  demand more innovative solutions   With the rise in large security threats since the commencement of this century, security of airports has become paramount. Looking into this issue Ashley Smith, BSIA (British Security industry Association) Civil Aviation Security Section Chairman, explains how a mix of properly interfaced security systems working in conjunction with monitoring and response staff offers a cost...

Design Tips To Migrate From Analog To High Definition Surveillance

 Migrating from analog to HD surveillance solutions  Globally, the video surveillance market has been slow to move beyond its analog origins. Many analog technologies or first generation network video management systems installed in the last decade are now aging, becoming less reliable and unable to deliver the quality and coverage most security professionals demand. Increasing video quality using these older solutions requires an unmanageably large number of survei...

Understanding Transform, Quantisation And Entropy Encoding In H.264 Video Compression

Understanding the complexities of the transform matrix In the concluding part of this 3-part review of the H.264 video compression standard, Kate Huber, Peter de Konink and Piet Nieuwets of Siqura discuss the transform, quantisation and entropy encoding - various block-encoding steps following motion estimation. Describing data in the transform matrix In contrast to the motion estimation step, the transform phase in the encoding process is relatively similar in H.2...

Related videos

CLIQ Connect

DNAKE Access Control Terminals: Minimalist Design, Maximum Security!

Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems