IP cameras News
The integration of H.265 technology may be hindered by the availability of optimized H.264 best encoding for surveillance systems Video compression technology has been a crucial element in surveillance system design since the advent of Internet Protocol (IP) in the 1990s. Since that time, standards for video encoding have been explored in various capacities. Currently, the industry is all abuzz around H.265 High Efficiency Video Coding – the next iteration beyond H.264,...
Cloud connectivity can provide a linkage between the mobile users and the facilities and systems they want to interact with From enterprise applications to small businesses, schools, health care facilities and beyond, investments in physical security systems provide valuable resources to help protect people, property and assets – and ultimately the financial security and well-being of the organization. As need and demand for better security has dramatically increased ove...
Though primarily developed for consumer electronic devices, the advantages ofH.265 compression technology make it ideal for the world of physical security Ever since digital video systems were introduced the race was on to develop compression technologies to reduce runaway bandwidth and storage consumption. We’ve watched the industry roll out MJPEG, MPEG and H.264 advanced compression standards in direct response to each innovation. With adoption of HDTV and 4K solutions...
With innovation continuing in HD CCTV, analog video surveillancemay be around for some time What’s your stance on the analog-to-IP video migration? When will it happen? Will analog go away entirely? Talk to any security company and they’ll admit they love the simplicity of the installation and setup of analog cameras. They know how to deploy it quickly, saving labor costs and also, can use the familiar and ever-present coaxial cabling network. That’s the here...
Systems may be reliable and performing as originally intended, but can also beoutdated in comparison to current technology offerings Let’s start by defining what a legacy system is in the context of a security control system. Legacy refers to an installed and operating security control system made up of numerous components, both hardware and software, that have been eclipsed by newer technologies. A shortage of parts and pieces may be creeping in, and it’s also li...
Today’s video cameras are better than ever, now able to capture images despite low light and other impediments. But do the images always provide enough clarity for security applications and/or for video analytics? The ability to capture an image in a variety of environments isn’t the same as capturing the best possible image, says Eddie Reynolds, President and CEO of Iluminar Inc., a provider of LED white light and infrared illuminators to the video surveillance market. Better came...
What's the Technology Report about? This SourceSecurity.com Technology Report will look at how cybersecurity risks of video surveillance systems can be minimized, and highlight the role manufacturers, installers/integrators and end users should play to make IP video systems as safe from cyber-attack as humanly possible. Manufacturers, in particular, are stepping up to drive the industry’s efforts, and Hikvision USA is a leader in educating the market to address...
Joining Pelco in late 2015, Sharad Shekhar is responsible for the entire global video business and is leading the charge to reinvigorate the Pelco brand with system integrators Back in the day, you literally couldn’t speak with a security company about a video surveillance project without the Pelco name coming up. It had a loyal following and an extremely large installation base. Over the years, that changed and the fervour with which integrators referred to the brand se...
From a network performance perspective, adding higher megapixel camerasaffects bandwidth utilization The quest for higher megapixel, high-definition and high-resolution video imaging continues, only now, it has become a marathon of sorts. That’s because the migration will progress decidedly – extending into the foreseeable future and beyond – as technology advances and becomes increasingly affordable. Ultra-high-resolution video is finding its niche, even am...
The largest global event of 2016 – and the year’s biggest security challenge – will no doubt be the Games of the XXXI Olympiad in Rio de Janeiro, Brazil. Around 15,000 athletes from 206 countries are expected to compete at the Olympic games, August 5-21, 2016, and about 7.5 million tickets will be issued. In our age of terrorism, organizers of any event on the scale of the Rio Olympics must consider the possibility of an attack or other security breach during the more than two...
How mobile telephones have transformed into “smartphones” is one of the great technology stories of our time. What once was a single-function device now can do almost anything – display video, pay for groceries, monitor our health. The smartphones we carry in our pockets today have more computing power than the “super computers” of yesteryear, and that power has found many uses in a seemingly endless array of “apps.” Some of them are directly related to...
Wireless surveillance systems are attractive to customersas they are cost-effective and easy to install Various studies, market statistics and forecasts project growth for the surveillance market from 2016 to 2020. Besides needs ranging from traditional analog cameras to IP network cameras, more and more consumers also have a high interest in intelligent surveillance systems. Along with safety, these systems provide additional details for users in applications such as peo...
Many operators don’t know what’s actually transpiring on their OT networkand, even if hacked, have no knowledge of the assault Innovation in the oil and gas, utility, healthcare and transportation industries is heavily reliant on connectivity - between devices and systems, machines and data, people and processes. This connectivity is great for productivity upstream, mid-stream and downstream, but is also exposes these systems to greater cyber threat. Furthermore, a...
The report says almost 50% of the public transport organizations are willingto broaden the type of video analytics used A detailed survey of public transport operators shows a growing demand for networked/IP systems and video analytics to help cope with the requirements of large surveillance systems. The report, Video Surveillance in Public Transport, published by the international public transport association UITP and Axis Communications, is based on 74 respondents across 30...
By adding remote monitoring to service contracts, dealers and end users bothbenefit from substantial cost savings while reducing potential downtime Whether upgrading an existing surveillance and/or access system from analog to IP, or installing a completely new system using structured cable, the ability to communicate, monitor and control IP devices delivers significant operational and economic benefits. The vast amounts of data these systems generate are useful in many ways &...
As the technology in omnidirectional cameras continues to improve, they are becoming increasingly more affordable to a wider segment of the video surveillance market Just a few years ago, omnidirectional cameras were a novelty. Today, however, this technology has taken the leap to the mainstream. Think about how ubiquitous Google’s Street View is, and you can gain a better idea of the power of omnidirectional cameras. Even consumers are starting to see many forms of omn...
As more security equipment categories become commoditized, a previously rich source of income for integrators and installers – markup – is becoming harder to come by. Less expensive products with little to no perceptible value differentiation leave integrators with few options, not to mention the growth of pricing transparency that comes courtesy of the Internet. We asked this week’s Expert Panel Roundtable: Given the increase in commoditized hardware (i.e., lower profit margin...
Nationally from 2012 - 2015, there has been a decrease in the money spent on theinstallation, monitoring and maintenance of CCTV compared to the period 2009-2012 The UK has often been referred to as the world’s most watched country in terms of the scale of CCTV surveillance. But a new report claims that UK local authorities have reduced spending on the installation, maintenance and monitoring of public space CCTV systems, while the number of cameras being used is also do...
ISE’s research shows that healthcare facilities & hospitals security programsto ward off determined attackers going after specific targets A well-known security axiom posits that an effective security program can discourage would-be attackers, causing them to move on in search of softer targets. But it doesn’t always work that way. Take healthcare facilities such as hospitals, for example. Prospective attackers with no particular target in mind may see a w...
The security market in the United States has been in a collective state of exhilaration since ISC West. The (possibly) unprecedented success of the big trade show has left us all feeling optimistic about the year ahead. Members of our Expert Panel Roundtable are joining the chorus of compliments for the show as they answer this week’s question: How successful was ISC West 2016? Did it meet your expectations?
No doubt about it: ISC West 2016 was a hit. Every comment I heard during the show (and since) has highlighted how busy the show was. There was plenty of booth traffic, even on the (traditionally slow) final day of the show. Some say it was the best ISC West in the last several years. Others say it was the best show ever. Quite a contrast to some other recent industry shows, plagued by meager traffic and complaining exhibitors. Instead, there were people everywhere at ISC West, asking questio...
Coming into ISC West, many in the industry had expected a renewed push toward use of mobile credentials (contained on smartphones, for example) instead of cards for access control. HID Global didn’t disappoint. A highlight of the second day of the show was a press conference in which HID Global announced new elements of its initiative to lead the industry into use of mobile credentials. Uses Of Smart Phone Credentials For Identity Management HID already provides SEOS mobile credentials,...
IP hardware is enabling customers to break free from proprietary security systems,to embrace the system integration available on open platforms Proprietary, closed systems are the bane of security. Yet they still exist. Robert (Rob) G. Lydic, Global Vice President of Sales for ISONAS, Boulder, Colorado, addresses the importance of open platforms in access control and what it means to systems integration in this exclusive Q&A. Trends In Access Control Technology SourceSec...
Access control now includes a strong focus on the data integration sideof the business, as showcased at this year’s ISC West When the category of physical security emerged many decades ago, it was literally all about locks, hardware and creating barriers such as fences to keep people out. Fast forward to ISC West 2016 in Las Vegas this week, where the focus is on intelligent solutions, smart data, cloud-based access control and incorporating audio, video and a wide r...
ISC West was hopping on its first day, with crowded aisles, packed booths and plenty of news to share. Much of the news consists of product announcements resulting from the rapid pace of technology development in the physical security market. It was enough to cause sensory overload. Educating Integrators And End Users About Security Technology Technology is moving so fast that it’s understandable integrators, not to mention end users, might struggle to digest it all and apply it to thei...
Cities are increasingly connected using information and communication technologies, a trend often referred to as “smart cities.” In much the same way, “safe cities” initiatives are uniting businesses, city officials, law enforcement and other stakeholders in an effort to maximize the safety of businesses and citizens and to minimize theft and crime. Safe cities programs seek to leverage a variety of resources, including public-private partnerships, to make urban communiti...
Women in Security will be a focus at this year's ISC West in Las Vegas, including targeted conference sessions and the Women in Security Forum Breakfast on Friday, April 12. As a preview of the upcoming events, let's revisit an Expert Panel Roundtable on this subject. We asked: How is the role of women in the physical security market changing and expanding?
Pre-existing networks are not usually designed to support IP video cameras, so aparallel network for their exclusive use is best when it comes to storage The video storage boom shows no signs of slowing down. The talk is not typically how much storage; but where and how to store. Locally-housed (on-premises) storage continues to be the most cost-effective, along with providing the most control over your data. However, prior to considering the storage, it is important to look a...
Energy efficiency extends beyond a company’s running costs vs. its carbonfootprint, to using security technological intelligently to the company’senvironmental advantage Even as manufacturers are becoming greener and innovation is reducing our industry’s carbon footprint , is there more we could be doing? Can we adapt our general operational methods to be smarter and help save the planet? Are we learning from other industries, do we absorb things quickly...
Temperature, dusty and dirty conditions, along with limited access to networkingmakes remote location video surveillance extremely challenging Properly conducting video surveillance for any organization comes with several challenges. Not the least of which is how to architect a system that finds the right balance between quality, cost and bandwidth impact. This becomes even more challenging in non-traditional, demanding environments that are uncontrolled or highly dispersed, w...
Related videos
Find Lost Wallet with Dahua WizSeek
Dahua Traffic Signal Controller Highlight
CLIQ Connect
- View more IP cameras
- IP cameras
- IP Dome cameras
- Intercom Systems
- Network Video Recorders (NVRs)
- Surveillance cameras
KentixONE – IoT Access And Monitoring For Data Centers
Climax Technology HSGW-Gen3 Modular Smart Security Gateway
Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution