Power supplies & batteries - Expert commentary

Surge Protection For Security Installations: 2017 Saw Increased Investment
Surge Protection For Security Installations: 2017 Saw Increased Investment

In 2017, DITEK saw how power surges from the many natural disasters that took place damaged many businesses. In a natural disaster, or even everyday business operations, a facility’s entire investment in security, life safety and surveillance systems technology can be disabled or rendered useless in a few seconds. Surge protection solutions can mitigate those risks and protect security investments. Proactive Approach To Risk Mitigation Throughout 2017, we also witnessed a change in how enterprises view surge protection, which included how investments are being made in surge protection to protect valuable security, life safety and surveillance systems, while also reducing downtime, manpower costs, liability vulnerabilities, and possibly compliance issues that can force businesses to actually cease operations. Effective security management is about mitigating risks. But risks cannot be mitigated without a proactive approach. Enterprises and integrators, who take the time to assess risk and to develop a strategy to incorporate effective detection, deter and response criteria to protect physical assets will be successful in 2018. 2018 And Beyond That strategy includes designing surge protection into new security systems, while also adding surge protection to existing systems. Enterprises and security integrators who implement a surge protection strategy during security planning processes – or after – will be exercising prevention and mitigation, and they will be successful in 2018 and beyond.  Surge protection devices have an untapped potential for enterprise surveillance and security systems In 2017, Ditek continued to offer security end users a solid surge protection solution. We also successfully educated system integrators, who are seeking value-added products or services to incorporate into their portfolios, on the importance of surge protection devices. Educating Security Integrators We believe that surge protection devices have an untapped potential for enterprise video surveillance and security systems, because they can and do meet safety and security challenges that have been rarely identified in the past. We are looking forward to 2018, when we will continue to develop new surge protection products – including a new product engineered to protect up to twelve individual fuel dispensers, which is critical to the financial operation of convenience stores. We will also continue to educate security integrators about the importance of including surge protection in the design/build RFP, to not only secure an enterprise’s valuable security equipment, but also to help integrators to differentiate their capabilities and knowledge from the competition.

Adaptive Transmission Systems Evolve With Advanced Communications
Adaptive Transmission Systems Evolve With Advanced Communications

The security market in 2016 saw an uptick in the economy, the introduction of new technologies, increased compliance requirements in key verticals, and rising concerns over the need for greater security. Users interested in upgrading or deploying new systems consistently chose networked system platforms. This trend further drove the demand for adaptive transmission solutions as a means of repurposing existing analog infrastructure to accommodate IP devices on a networked platform. As this migration accelerated, product feature sets continued to evolve with the inclusion of advanced communications that let you monitor, control and report power/diagnostics from anywhere. These new products have also helped to stimulate new business opportunities for integrators by expanding their service offerings to include remote monitoring of these devices as a new source of recurring monthly revenue (RMR). PoE And Adaptive Transmission Solutions In last year’s 2016 forecast, we discussed the integration trend and how PoE and adaptive transmission solutions with network communications were rapidly gaining traction and market share. As the year progressed, the trend increased with customers migrating towards systems that provided more data, faster transmission rates and more versatility, and accessibility anytime from anywhere. Altronix responded with more advanced product solutions. This growing trend makes it more critical than ever for the core power and transmission infrastructure that make up the foundation of these systems to include network communications for true integration. As effective and efficient as integrated IP systems have become, the cost to upgrade or install new networked systems can be prohibitive. In 2017, security professionals will require expanded options to capitalize on existing infrastructure while accommodating IP devices with new levels of performance. These new products will greatly reduce installation and maintenance costswhen deploying orupgrading systems We will see the introduction of new products that offer greater levels of integration with bundled capabilities such as PoE, network switches, versatile adaptive transmission capabilities to accommodate different types of cabling, greater bandwidth and speed, and management capabilities. These new products will greatly reduce installation and maintenance costs when deploying or upgrading systems. Altronix 2016 Business Overview Altronix’s evolution as a designer and manufacturer of versatile power supplies and accessories – and the addition of innovative PoE and adaptive transmission solutions with network communications – was significant in 2016. We have continued to deliver new products incorporating advances in power and communication technologies that solve real-world installation issues with the highest levels of performance and cost-efficiency. One of the most significant technologies contributing to our extensive portfolio of power and adaptive transmission products is our innovative LINQ™ Technology, which provides remote control of power, along with monitoring and reporting of diagnostics from anywhere you have internet access. LINQ completes the network communication cycle for networked systems by providing true integration for power supply and adaptive transmission products that are the foundation of every system. Altronix will continue to design, manufacture and introduce new power and adaptive transmission solutions in 2017 that live up to our longstanding reputation for outstanding quality, performance and reliability. See the full coverage of 2016/2017 Review and Forecast articles here Save Save

Extenders Convert Media For Longer Video Distance Runs
Extenders Convert Media For Longer Video Distance Runs

IP/PoE systems eliminate the need for local power, thus saving installation costs Cost considerations are an important reason to use existing installed cable as part of a new system infrastructure. Extenders in the form of media converters can help. For almost three decades, video surveillance systems existed in the form of analog systems. Video coaxial cable was the primary method of transmission with a limited distance of about 750 feet. Analog systems required separate power supply located at each security camera site. Today, new technology often solves one problem and creates another. Internet Protocol/Power over Ethernet (IP/PoE) systems eliminate the need for local power supply, thus saving installation costs. The drawback is the restriction to only 328 feet and the required use of Cat 5e or above cable. Extended Transmission Distance So tens of thousands of video surveillance cameras are waiting to be converted to IP, and have been transmitting over coax at distances two-and-a-quarter-times greater than the Ethernet limit. The advent of extenders helps to solve this problem. In addition, the use of extenders for Cat cable and even single-pair alarm wire helps to add to the types of IP/PoE conversions while extending distance as far as three thousand feet. Tens of thousands of camerasare waiting to be converted to IP,and have been transmitting overcoax at distances two-and-a-quarter-times greater than theEthernet limit Considerations While Using Extenders Use of extenders requires taking several considerations into account. First and most important is a careful reading of specifications. A statement can be true while not applying to your applications. Let’s take IP/PoE transmission over coax as an example. A manufacturer’s product can state it has this feature and will meet your transmission requirement of X number of thousand feet. However, a careful reading reveals that achieving this requires RG 6 cable while you have RG 59 installed. You need to maintain a 100Mbps bandwidth and provide your cable with 12.95 watts of power. But as both bandwidth and power decrease with distances obtainable from many types of extensions, you realize that both are much less at the extended distance you require. In short, just depending on a product to make a simple specification statement is not enough when it comes to infrastructure considerations and especially with regards to extenders. Save Save

Latest IDIS news

Customers Gain From Reduced Liabilities As IDIS And VMI Extend Remote Monitoring Capability With Deep Learning Analytics
Customers Gain From Reduced Liabilities As IDIS And VMI Extend Remote Monitoring Capability With Deep Learning Analytics

Buyers of video technology are focusing increasingly on business protocol enforcement applications, in addition to traditional security, says IDIS America and virtual guarding and monitoring service partner Virtual Management Intelligence (VMI). The two companies are working together to deliver AI-supported remote surveillance services, including business operations monitoring, in sectors such as transportation, warehousing, cannabis production, food processing, banking, and finance. Improve monitoring of vehicle safety checks In transportation, for example, IDIS video is being used by VMI to improve monitoring of 24-point vehicle safety checks which must be carried about by drivers to ensure compliance with Department of Transportation (DoT) requirements. At high-security locations such as banks, the company is helping to streamline and adhere to opening and closing protocols. And, in major industrial applications - from coffee roasting to food processing - its monitoring services are underpinning both safety and production line efficiency. Delivering enterprise-level monitoring “These are applications where customers want video technology to focus on the wider wellbeing of their business operations, and to reduce their liabilities,” says San Kim, VMI, Operations Director. IDIS Deep Learning Analytics (IDLA) to deliver enterprise-level monitoring to more customers more affordably  “Security is still a key requirement but there is a growing realization that cameras can be used for so much more. VMI is using IDIS end-to-end video solutions, including IDIS Deep Learning Analytics (IDLA) to deliver enterprise-level monitoring to more customers more affordably,” he notes. “IDLA’s automated detection tools – including line-cross, loitering, and object detection – are taking pressure off VMI’s monitoring teams and helping them give users of all sizes access to the kind of customized 24/7 surveillance that was traditionally only available to large corporations with dedicated control room operations.” IDIS video tech “This is also helping users cut their insurance liabilities and reduce their litigation risks,” Kim adds. “Our clients can now contact any of our operators and say, ‘I had a slip in one of my lobbies. Can you back up the relevant cameras, upload the recordings to a particular folder on our FTP, send a link to the store manager, and also include it on a report to our insurers as soon as possible?” The comparatively long operational life of IDIS video tech, its straightforward maintenance and upgrade paths, along with its ease of use for VMI’s customers, are also proving to be valuable in reducing the company’s trouble-shooting workload. Offering video monitoring solutions “Compared to alternative mix-and-match solutions that we’ve tried, the IDIS end-to-end, single supply model is more cost-effective to operate and maintain,” Kim points out. However, he warns against the industry over-promising when it comes to the capabilities of deep learning analytics. “For the video sector as a whole, the challenge now is to focus on applicable solutions that work in real life. We’ve already proven that our deep learning engine is solid, we now need to look at how best to use the level of accuracy we’ve developed.” “We are working closely with VMI to offer some of the best value video monitoring solutions available, not just for security purposes but for much wider business applications, as well,” says Jason Burrows, Sales Director, Western U.S., IDIS America. “Looking ahead, we see exciting opportunities for deep learning analytics to be closely customized to solve the specific problems of individual customers.”

IDIS Launches A Tech-Explainer eBook On Video Analytics To Better Security, Safety And Business Intelligence
IDIS Launches A Tech-Explainer eBook On Video Analytics To Better Security, Safety And Business Intelligence

IDIS’s latest tech-explainer eBook – The Benefits of Deep Learning Driven Intelligent Video Analytics – explores how a new generation of AI video solutions is delivering better security, safety, operational efficiency, and business intelligence. The eBook, which can be downloaded now from the IDIS website, reflects the company’s commitment to supporting its systems integrator partners as they focus on delivering advanced video solutions into growth sectors. Modern network cameras In recent years, the terms ‘intelligent’ and ‘artificial intelligence (AI)’ have been applied to many different types of security system, but without agreement on what AI means, says IDIS, so it’s important to understand that not all solutions are designed to the same standard or deliver equal value. The new eBook explains some of the differences between conventional ‘blob’ analytics - found in most modern network cameras and relatively prone to false-alarm triggers caused by environmental factors - and more powerful deep learning technologies. This newest generation AI solutions leverage neural networks made up of multiple layers of algorithms and advanced processing and can be more accurately called ‘intelligent’ video analytics. Deep learning video solutions Metadata search functions also allow users to benefit from advanced interrogation of single and multiple cameras Deep learning’s real value comes from its ability to detect events of interest and distinguish these from video data input which is just ‘noise’. But some caution is still needed, warns IDIS: deep learning video solutions can still disappoint if the engines and algorithms that drive them are not fully trained and able to recognize objects reliably and accurately. By contrast, effective deep learning video analytics can deliver multiple benefits, from preventing ‘alarm overload’ in busy security control rooms, to freeing up personnel resources and enabling security provision to be better focused. Metadata search functions also allow users to benefit from advanced interrogation of single and multiple cameras, speeding up investigations and automatically locating objects or people of interest. Face mask detection The eBook also outlines how AI video can support efficient return-to-work strategies and ensure COVID-secure facilities and workplaces using highly accurate analytics for face mask detection, social distancing adherence, people counting, and occupancy monitoring. Guidance is also provided for systems integrators, demonstrating how the same functionality will deliver value beyond the pandemic, with benefits such as facilities and workspace optimization, and actionable insights, particularly for the retail and hospitality sectors. “The best AI offerings today add value for customers by rapidly increasing productivity and efficiency, and providing useful business intelligence,” says James Min, Managing Director, IDIS Europe. “This new eBook explains how systems integrators can get past the jargon to support end-users, building a compelling business case that both addresses immediate priorities and demonstrates long term return on investment.”

IDIS Suggests Users To Use Their Fingerprint Algorithm To Protect The Integrity Of The Recorded Video
IDIS Suggests Users To Use Their Fingerprint Algorithm To Protect The Integrity Of The Recorded Video

Growing concern about deep-fake videos will make it increasingly important to be able to demonstrate the integrity of video evidence, warns South Korea’s largest in-country video tech manufacturer IDIS. Rapid advances in digital video manipulation techniques, and a rise in alleged deep-fake celebrity videos being reported in the news, will put pressure on both video tech users and on prosecutors to demonstrate the integrity of any footage they use. Internal disciplinary proceedings “As we look ahead, wherever video is presented for use as legal evidence, or as part of internal disciplinary proceedings, we will see more attempts to assert that footage is not genuine. Courts will dismiss evidence where tampering cannot be ruled out,” says Dr. Peter Kim, Global Technical Consultant, IDIS. It will be vital that users can demonstrate beyond doubt that their footage has not been tampered" “Any challenge to the integrity of video evidence, if not countered, risks undermining the value of the entire video solution. This is particularly true in applications where investigating and prosecuting wrongdoing is a key function of the camera system. So, it will be vital that users can demonstrate beyond doubt that their footage has not been tampered with in any way.” IDIS, which supplies complete, end-to-end video solutions for applications ranging from high-risk critical infrastructure to commercial settings, has created protection of video footage integrity through its patented Chained Fingerprint™ algorithm. Exported video data IDIS recorders use Chained Fingerprint to ensure the integrity of the recorded and exported video data. Each frame is assigned a unique numerical ‘fingerprint’, calculated by relating its own pixel value to the fingerprint of the previous frame. This means that every single image frame of the video is linked by an encryption ‘chain’ with its neighboring image frames. The encrypted chain is stored as part of the video data when the video is recorded or exported as a video clip using the IDIS ClipPlayer. Before playback, the ClipPlayer scans video and recalculates the fingerprint chains of the video data. If any part of the image frame is tampered with, the fingerprint chain will be broken and will not match the chain value calculated at the time of video export, prompting a flag. “As organizations look to upgrade or invest in new video solutions, protecting themselves against claims of video evidence tampering should be high on their priority list,” Kim adds.