IP Dome cameras News
The trend towards greater unification is facilitated by an all-encompassing shift to IP technologies As more organizations are looking for ways to maximize resources and increase operational efficiencies, unification of multiple security and business systems is gaining popularity. From the central command center, there is significant time lost when operators have to jump from video surveillance to access control systems to analyze an incident and take appropriate measures. Eve...
When you need to view video of an incident or information about an access point, you expect your security system will provide that information. But what happens if a camera or card reader isn’t working for some reason? It’s the security director’s worst nightmare. Sadly, the moment when a system fails is often the first indication an end user has that there is a problem. A useful trend I saw at ISC West this year is growth in various types of diagnostic, monitoring and control...
Seeking to manage uncertainty is part of the core mission of security professionals. When it comes to the technology systems they depend on every day, extended service agreements are a tool to manage uncertainty as it applies to system operation. We asked our Expert Panel this week to comment on how extended service contracts benefit users, integrators and/or suppliers. Their answers effectively enumerate multiple benefits to all parties involved. Ongoing service and maintenance help to ensure c...
Since acquiring SeeTec AG, On-Net Surveillance Systems, Inc. (OnSSI) is bringing production of its entire software platform in house. The SeeTec recorder will replace OnSSI’s legacy recorder, previously OEM’d by Milestone, beginning with the introduction of Ocularis 5.x. Familiar in Europe, SeeTec is a privately held German-based company providing VMS solutions and was among the first providers of network-based video management applications. With SeeTec now part of OnSSI, the combin...
Just as with network switches, there are no real standards for midspans In general terms, a midspan is a power over Ethernet (PoE) power source that is placed between a network switch and the device being powered, hence the term midspan. The real question is, with almost all network switches providing PoE power, why do we need a midspan? The answer is, in some cases we don’t, but in others we do. As with any other product we have discussed, we need to first consider that...
Honeywell recently helped the Penns Valley Area School district in Pennsylvania design and implement a custom security system Security systems are just part of the solution to protecting K-12 schools. Technology can contribute to a broader, holistic approach to security that is customized to meet the needs of each educational institution. Honeywell has helped many schools customize security systems to meet each school’s unique needs, says Bruce Montgomery, Business Deve...
There’s almost no such thing as a local business anymore. Even the smallest of entrepreneurs find they have immediate access to a global marketplace via the Internet, and larger companies continue to find new ways to maximize their successes throughout the world. We asked our panelists this week to comment on how they see globalization impacting the physical security market. Their broad-ranging responses emphazis the opportunities and challenges of succeeding the global marketplace.
Anyone thinking the Canon acquisition of Axis is a done deal should reconsider. Not so fast. A wrinkle has emerged as the Japanese imaging giant has been buying up shares of Axis in anticipation of acquiring the Swedish camera manufacturer. The wrinkle comes in the form of a hedge fund company called Elliott Management, which has reportedly bought 10.91 percent of Axis stock. Incomplete Sale The number is significant because Canon needs to acquire 90 percent of Axis stock in order to force th...
see bigger image Figure 5: Providing correct and useful results requires intersection of user intentions, VCA interpretation, and results provided by VCA tool The term Video Content Analysis (VCA) is often used to describe sophisticated video analytics technologies designed to assist analysts in classifying or detecting events of interest in videos. These events may include the appearance of a particular object, class of objects, or action. VCA technology employs a comple...
Beyond the need to install new systems, often overlooked is how schools are going to pay for security upgrades Limited financial resources are a common pain point for K-12 schools looking to implement cutting-edge security technology. But security needs persist despite scarce resources. All school administrators want to do everything in their power to secure their facilities against threats. More schools are recognizing the benefits and, in some cases, requirement of upgradin...
As we unpack our bags – literally and figuratively - from the recent ISC West in Las Vegas, it seems an appropriate time to reflect on the busy show. Specifically, it’s a good time to consider how the exhibition could be improved to be more valuable for attendees and/or exhibitors. We asked our panelists for their opinions, and we’re also interested in any other post-show commentary – please share in the comments section.
Wong was the first Asian woman to obtain the Alarm Contractor License Mun C. Wong, PSP and president of VinTech Systems Inc. in Chicago, is a successful entrepreneur who has brought new technologies and a knack for superior service to her integration business. In fact, at the age of 29, she was the first Asian woman to obtain the Alarm Contractor License from the State of Illinois and its Department of Financial and Professional Regulation. But she doesn't focus on gend...
Employees are the front line of defense — as well as the most economical defense — against shrinkage losses The financial cost of retail shrinkage is huge. The latest Annual Shrink Report issued by Dr. Richard Hollinger and Dr. Read Hayes at the University of Florida puts the total at $36 billion annually. Shrinkage has several causes: customers shoplifting , employee theft, supplier fraud and administrative errors. Frequent inventories and accounting audits coun...
Integrators must understand that the K-12 market has a unique and urgent need for access control, but with limited budgets Systems integrators play a key role delivering effective security solutions to the kindergarten through 12th grade (K-12) education market. Schools certainly depend on an integrator’s expertise regarding which electronic products to choose. However, schools also rely the benefit of an integrator’s experience and the insight gained by putting se...
Readily available security technology can help officials take control of their campuses Two top priorities for school security are the ability to communicate within a facility, and the ability to control access of who comes and goes. Paul Timm, president of RETA Security, an independent school security consulting firm, acknowledges the value (and popularity) of video cameras for school security, but that value is almost completely realised in terms of forensics – reactin...
Layering as applied to computers is a made up term having no relationship to any particular standards When it comes to setting the criteria for network switching, we often hear “I only want a layer 3 switch.” We naturally assume that since the number 3 is bigger than the number 2, a layer 3 switch must be better than a layer 2 switch. It may surprise you, but when it comes to video security applications, this may not be the case. In fact, just the opposite may...
The latest in video surveillance equipment at ISC West this week is reflected by the numbers you hear repeatedly on the show floor, numbers like 4K and H.265. Big players like Panasonic have joined the 4K bandwagon in a big way. Sony introduced a 4K camera with a larger sensor size (1-inch) to increase light sensitivity, displaying the better view alongside a “Brand X” competitor in the Sony booth. “Sharper and smarter” Promoting a theme of “sharper and smarter,...
Kevin Brownell, principal physical security consultant at PTS Consulting Group, considers convergence of IT networks and physical security. He argues that current best practice shows that they no longer need to be separate disciplines and reassures installers that their diversity has been exaggerated. Brownell describes experiences of working with IT managers who no longer see networked CCTV and access control as ‘black arts’ and are buying into the idea of IP security as an integr...
Companies need to increase the knowledge within their business on the range of cyber-vulnerabilities At one time, embedded devices, such as access control components communicating with application software, used proprietary protocols like RS485. Use of proprietary protocols kept these devices safe from attack. However, in this article TDSi Technical Director Mike Sussman explains that the growth of the Internet of Things (IoT) involves a move toward IP-based systems and open s...
Cybersecurity has been getting much more attention lately in the physical security market. One company ready to address cybersecurity of IP video products is DVTEL. The Israeli company’s roots in IT and networking make it a logical choice to take a lead in cyber-defense of IP video systems. DVTEL’s core research and development (R&D) in Israel includes cyber-defense expertise. DVTEL’s Cyber-Defense Plan In fact, DVTEL is moving fast to implement its cyber-defense plan &nd...
Organizations must find more effective ways to optimize the use of the resources they have available As market demand intensifies for higher resolution from megapixel, and 4K cameras, customers will begin to feel the ensuing cost pressures caused by the increased need for greater processing power. As customers update their system and add new cameras, operators must monitor additional cameras concurrently, oftentimes leveraging high resolution video streams. HPC For Quick...
Milestone Systems is closing in on a year since their acquisition by Canon’s European subsidiary in June 2014. Throughout the ownership transition, Milestone has reiterated its commitment to open systems and continued to flourish, building its “ecosystem” alongside other industry partners. At the recent Milestone Integration Platform Symposium (MIPS 2015), I had a chance to chat with Lars Thinggaard, Milestone’s president and CEO, about industry trends and what’s ah...
School administrators are now choosing products that make the biggest, long-term impact on campus security Well-publicised events such as the U.S. school shootings at Columbine and Sandy Hook lead to an increased demand of security equipment to protect kindergarten through 12th grade (K-12) education campuses. But do they also result in buying decisions made on impulse that don’t necessarily meet a school’s most pressing security needs? Increase In Demand For Secu...
4K places extra demands on video security but the results can be rewarding Since last year there has been a lot of talk with regard IP security cameras with 4K resolution. As with any advancement in video security, this too has come about due to advances in consumer electronics. While being the “latest and greatest,” it still raises questions as to actual, practical everyday usage. What Is 4K Resolution? Let’s start by defining 4K. Back in the day we had HD...
Traffic is a big challenge in most urban environments, and I had a chance recently to visit with the agency in Montreal, Quebec, that monitors traffic throughout the island, reacting to traffic conditions and daily situations such as road congestion and managing specific events and incidents. A network of traffic light controllers and video cameras provides data that is tied into Montreal’s Urban Mobility Management Center (UMMC), which is the “brains” of the city’s Inte...
If we didn’t have manufacturers, integrators wouldn’t have anything to sell. But what is the role of manufacturing companies when it comes to taking those products to market? Effectively managing the sales channel – helping resellers be successful without somehow undermining their efforts or (heaven forbid!) selling direct to an end user – is an ongoing and delicate challenge for manufacturers. They want to do everything in their power to ensure success of their products...
Misreading specifications of transmission products can lead to making the wrong selection Manufacturers’ product specifications are the main source of determining product purchases for video security users. In many cases, the ability to pretest a product under the actual operating conditions is almost impossible. Often the choice is between several different product manufacturers. The time and expense it would take to install and evaluate each one in the actual applicati...
Schools are unlike commercial buildings or other facilities in several ways, and the differences impact how they should be secured. For one thing, the inhabitants are mainly children and won’t carry card credentials. Also, schools have distinct traffic flows and are open all hours of the day for after-school activities and evening and weekend usage. “Security solutions must take into account this flexible and fluid schedule,” says Minu Youngkin, vertical marketing manager, Alle...
Commoditisation of cameras and downward price pressure are big topics in the video surveillance market. There was an interesting discussion about pricing and its impact on the integrator community at last month’s MIPS 2015 (Milestone Integration Platform Symposium). Participants were several of the major camera manufacturers, who provided a variety of viewpoints. Prompting the discussion – but with no representative on the panel – were the emerging Chinese manufacturers, who a...
A comprehensive security assessment will tell how to plan and manage security in the facility A comprehensive security assessment will tell you how to plan and manage security in your facility. Without an assessment, you can only guess about security. For facilities with existing security programs, an assessment can also reveal whether the pieces of the system are working as they should. As a security director, can you do the assessment yourself? Sure, although a large school...
Related videos
Find Lost Wallet with Dahua WizSeek
Dahua Traffic Signal Controller Highlight
CLIQ Connect
- View more IP cameras
- IP cameras
- IP Dome cameras
- Intercom Systems
- Network Video Recorders (NVRs)
- Surveillance cameras
KentixONE – IoT Access And Monitoring For Data Centers
Climax Technology HSGW-Gen3 Modular Smart Security Gateway
Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution