Internet of Things (IoT)
Morse Watchmans, the globally renowned company in key control and asset management systems, will be exhibiting at GSX 2021 show, featuring their latest new key control and management solutions, at booth #1714. Key control solutions at GSX 2021 The company’s flagship KeyWatcher Touch will be displayed with a new Generation 3 CPU that provides improved performance, and faster user interface and improved synchronization times. The new Gen3 CPU upgrade is also available to current KeyWatcher...
Johnson Controls, the globally renowned company in smart, healthy, and sustainable building solutions is announcing the addition of body-worn cameras and autonomous robots to its physical security portfolio, along with the integration of package screening technology, powered by RaySecur. Intelligent technologies These intelligent technologies further strengthen Johnson Controls comprehensive building security portfolio and enable customers to extend the power of their systems, far beyond...
Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe, champions the use of the DORI standard, as the starting point for designing a video surveillance system and how in doing so, one can ensure that the specified cameras are able to cost-effectively meet the end-user’s expectations. The quality of the images that can be captured by many of the latest generations of super-high definition video surveillance cameras are simply breathtaking, allowing users to see ultra-shar...
Qognify has announced the appointment of two Regional Channel Managers to its Ocularis channel team. Amanda Euler and Olga Scorobogataya will support Qognify’s extensive network of channel partners and their customers, across the Northwest and Southwest regions of the US, helping them to maximize their use of the powerful Ocularis video management software (VMS). New Regional Channel Managers Amanda Euler joins Qognify as Regional Channel Manager for Northwest from ADT Commercial and is...
PSA Security Network (PSA), the world’s renowned consortium of professional systems integrators, has announced the addition of IronYun, to its network. With its VAIDIOTM AI-enabled video search and analytics platform, IronYun brings PSA members an enhanced offering, to apply cross-functional AI analytics. PSA partners group adds IronYun “PSA is excited to bring IronYun into the PSA technology partners group,” said Chris Salazar-Mangrum, PSA Security Network’s Vice Presi...
SALTO (SALTO Systems) has announced that the company will exhibit its latest access control innovations, at the International Security Expo 2021, taking place at Olympia London, in London, United Kingdom, on September 28 - 29, 2021. International Security Expo 2021 “With a welcome return to live exhibitions, after the COVID-19 pandemic, we’re looking forward to showcasing our latest access control products that deliver an unrivaled keyless experience,” said SALTO UK’s M...
As the market for rapidly deployable surveillance cameras expands, Digital Barriers, a UK-based provider of IoT surveillance and security technologies announces the immediate availability of the EdgeVis MiniCam. Compact, lightweight and affordable, with secure low bandwidth streaming over cellular or WiFi, the rapidly deployable camera is set to shake up the market for temporary and semi-permanent surveillance. IP66 and NDAA compliant The EdgeVis MiniCam is designed for quick and simple deployment straight out of the box. With only a requirement for power and no additional cabling, up to 2TB of storage, an IP66 rating, and NDAA compliant, the one-piece unit can easily be attached to existing street furniture or dedicated wall or pole mountings in minutes. The camera includes advanced, onboard analytics, enabling rapid set-up, VMS integration, and immediate alerts. Video technology EdgeVis MiniCam includes patented low bandwidth video streaming technology saving more than 50% of bandwidth Unlike competing solutions, the EdgeVis MiniCam includes patented low bandwidth video streaming technology, which saves more than 50% of bandwidth and can be capped to control costs and prevent unexpectedly high data bills—a major risk with solutions from other vendors that simply repackage third-party hardware. The secure, efficient video technology in the EdgeVis MiniCam has never been seen at this price point before. The video analytics on the EdgeVis MiniCam prioritizes operators’ time by sending alerts to connected devices only when events require action. Capturing, sharing, and enhancing areas of interest means users can better coordinate events live, and as they unfold. AI features and mobile surveillance “Our world-leading technology was developed to meet the demanding requirements of specialist law enforcement and defense agencies. Now available to everybody, the EdgeVis MiniCam represents a new generation of flexible mobile surveillance. World-class technology at standard market pricing” explains Zak Doffman, CEO, Digital Barriers. “We have focused on real customer needs by designing a product that is simple and quick to deploy, without compromising on functionality. It’s 5G-ready and has a range of optional AI-driven features to address long-term requirements, ensuring that customers have a future-proof device,” adds Dale Hall, Group Product Management Director, Digital Barriers. From private security to local authorities, healthcare to transportation and logistics, and first responders, the EdgeVis MiniCam is ideally suited to both everyday surveillance and special events and is powerful enough to cover major incidents and vulnerable facilities and sites.
Security and Safety Things GmbH (S&ST) is pleased to announce the three winners of its 2021 App Challenge, a contest to spur creative development in video analytic applications. The winning apps were chosen from a pool of more than 30 proposals for solutions, which addressed specific security and business use cases, in the retail, transportation, stadiums and entertainment, and healthcare verticals. S&ST's 2021 App Challenge “The Security & Safety Things open platform for smart cameras provides the ideal framework for developers to help solve real world customer pain points with innovative applications,” said Adam Wynne, Head of the Security & Safety Things Innovation Accelerator, based in Pittsburgh, Pennsylvania. The winners of this year’s App Challenge provided some very concrete and effective examples of how smart cameras are adding security and operational value to a variety of different types of organizations. AI-powered analytic apps added to Application Store As part of the App Challenge, 11 new AI-powered analytic apps have been loaded onto the company’s open Application Store As part of the App Challenge, 11 new AI-powered analytic apps have been loaded onto the company’s open Application Store, which already features nearly 100 different applications. Integrators and end-users can choose multiple applications from the app store, to run simultaneously on individual smart cameras running the S&ST camera operating system, which enables a single camera to accomplish several different functions. The camera OS is based on the developer-friendly Android Open Source Project (AOSP). Noema, a subsidiary of DSR Corporation based in Colorado, received the overall rating for its seat occupancy application to the transportation market. This application allows a surveillance camera to check seat availability and overall occupancy of a train car, as well as determine, whether the seat is occupied by a human or object. Noema’s seat occupancy application This application seeks to address pain points, such as a passenger taking up more than one seat, luggage or pets blocking seating areas, passengers sitting in the wrong seat or section, and passengers riding without fare. Each of these issues can impact both train departure, as well as overall revenue. “Our engineering team enjoyed developing apps for the Security & Safety Things platform, as it enables our team to focus on the underlying business logic of the applications and algorithms that we’re developing, instead of addressing the lower-level engineering aspects that S&ST’s system already addresses for us,” said Alexander (Alex) Fedoseev, the Co-Chief Executive Officer (Co-CEO) at Noema. FloodCam AI software WaterView, based in Italy, received the second-highest rating for its FloodCam application, an Artificial Intelligence (AI) software used to monitor infrastructure or areas, which are subject to flooding episodes, such as road underpasses or areas close to riverbanks. The FloodCam AI software recognizes portions of the images, where water is present and raises an alert The FloodCam AI software recognizes portions of the images, where water is present and raises an alert if the estimated water coverage exceeds a certain threshold. To keep privacy in mind, the image taken can be masked, so that only a desired region of interest is taken into account. “Taking part in the 2021 App Challenge hosted by Security & Safety Things was a stimulating and enjoyable experience,” said Matteo Ferrabone, the Chief Technology Officer (CTO) at WaterView, adding “We were very eager to launch our latest solutions on the market and the App Challenge served as the perfect opportunity and motivation.” Virtual Surveillance Assistant (VSA) application Studio Automated, based in Amsterdam, was the third winner for its Virtual Surveillance Assistant (VSA) application, an AI algorithm developed by The Netherlands Organization for Applied Scientific Research (TNO). This application can detect anomalies in video footage and can specifically be trained to detect aggressive behavior, at stadiums and venues, and in transportation vehicles. Besides the detection of aggression, the footage analyzed by this app can also be used for the analysis of walkways and footpaths, as well as passenger behavior in general. This will allow decision-makers to optimize operations at airports, stadiums, bus stands and railway stations. Winners chosen by S&ST's jury of representatives “We are very grateful to have been able to participate in this challenge and to be chosen as a winner,” said Elle de Jonge, Strategic Advisor at Studio Automated, adding “The Security & Safety Things store has more functionalities that allow us as a partner to grow with, and our clients can use our AI driven assistance within minutes, which speeds up implementation and helps clients innovate faster.” These winners were chosen by a jury of representatives from Security and Safety Things GmbH (S&ST) and 22 prominent integrators, from around the globe and will be awarded individual prizes in the form of cash funds.
To help support the Fire Door Safety Week 2021 campaign, ASSA ABLOY Opening Solutions UK & Ireland has announced the launch of a new best practice guide - ‘Fire Doorsets’ guide, on how to specify, install, maintain and inspect fire-certified doorsets in residential and commercial buildings. ‘Fire Doorsets’ guide The ‘Fire Doorsets’ best practice guide has been compiled, based on the knowledge and expertise of ASSA ABLOY’s FDIS-trained inspectors, as well as key insights, and information gathered from a range of third-party accreditation bodies, and trade associations, including the Door and Hardware Federation (DHF), the Fire Industry Association (FIA) and Secured By Design (SBD). The best practice guide is intended to help all those responsible for fire safety in residential and commercial environments The best practice guide is intended to help all those responsible for fire safety in residential and commercial environments, such as architects and specifiers, installers, landlords, local authorities, building owners and facilities managers, particularly at a time when fire safety is in the spotlight, due to the national Fire Door Safety Week 2021 campaign. Fire Door Safety Week 2021 campaign Scheduled to run from September 20 - 26, 2021, the Fire Door Safety Week 2021 campaign hopes to raise awareness of the critical role that fire doors play in saving lives and protecting property. Established by the British Woodworking Federation (BWF) and supported by the BWF Fire Door Alliance, the awareness campaign illustrates why it’s crucial to understand the factors that ensure a fire door performs as intended, with product manufacture, quality, installation and maintenance, all playing a part. Eryl Jones, Managing Director of the ASSA ABLOY Door Hardware Group, said “The correct specification, maintenance and management of fire doors can be the difference between life and death for people, not to mention the damage fires can cause to property and valuables. In our new ‘Fire Doorsets’ guide, we tackle all considerations, throughout a fire doorset’s lifecycle.” Empowering fire safety personnel He adds, “From standards, certification and security, to their design, specification and installation, right through to their ongoing usage, maintenance and inspection, our intention is to help empower those responsible for fire safety, with everything that they need to know.” Some of the statistics surrounding fire safety in the United Kingdom (UK) are staggering" Eryl Jones further said, “Some of the statistics surrounding fire safety in the United Kingdom (UK) are staggering. There are 20,000 commercial fires in the United Kingdom every year. Research suggests that the economy has lost £1 billion in GDP and 5,000 jobs from preventable fires in commercial properties. One study found that larger fires in schools cost on average £2.8 million to repair and in some cases, as much as £20 million.” Fire doorsets play critical role in protecting life, property He adds, “Last year, a Freedom of Information request responded to by 147 UK local authorities, found 63 per cent of planned fire door maintenance and replacement did not progress, as scheduled. It’s clear that there’s still plenty of work to be done around improving awareness of the critical role that fire doorsets play in protecting life and property." Eryl Jones concludes, "We hope our new guide acts as an invaluable resource for those tasked with fire safety in buildings, ensuring everyone throughout the doorset’s lifecycle plays their part, in upholding the highest fire safety standards.”
Wasabi Technologies (Wasabi), the globally renowned hot cloud storage company, has announced a new partnership with Rasilient Systems, the pioneer in forensic-grade video surveillance systems, to deliver industry-renowned hybrid cloud storage solutions for video surveillance deployments at the edge. Wasabi - Rasilient partnership This partnership combines the strength of Rasilient’s surveillance system optimization with Wasabi’s unlimited scalability and disruptively low cost, so users in industries with multiple distributed locations, such as healthcare networks, education systems, and retail branches, can effectively handle the rising amount of video being captured, at previously deemed ‘unserviceable’ or ‘difficult’ remote locations. With the ever-increasing amount of data produced by video surveillance applications, moving and archiving infrequently-accessed video to an offsite, secure, and reliable storage environment is the only way to keep up with the demand of footage being generated at the edge. Unfortunately, this is nearly impossible for remote locations, due to the limited bandwidth and connectivity needed to send video files, without the risk of frame drop, video degradation, and data corruption. Fast and reliable hot cloud storage Wasabi is 80% less expensive to store video recordings, in comparison to traditional cloud providers Now, with Wasabi’s affordable, fast, and reliable hot cloud storage on-demand, Rasilient customers can shorten upload windows and quickly access their video files for faster retrieval times, with a highly scalable repository for their video management software (VMS), which supports high camera counts, high definition resolutions, high frame rates, and long retention periods, all demands of modern video surveillance deployments. Wasabi is 80% less expensive to store video recordings, in comparison to traditional cloud providers and there are no fees for egress, or API requests. This lower cost allows customers to utilize video surveillance, not only for security and safety but for a variety of uses to cost-effectively monitor operations for business optimization and process improvement, while holding on to that footage forever, so they can refer back to it whenever necessary. Collaboration to offer cloud and edge hardware The two companies have partnered up to offer cloud, edge hardware, and secure transmission in a simple, predictable RMR pricing model, as well as omitting the expensive and fluctuating costs that are traditionally associated with cloud storage solutions. “With modern systems capturing more evidence and anomalies than ever before, there is a surging demand for increased storage capacity that is scalable, dependable, and secure,” said Sean Chang, the Co-founder and Chief Executive Officer (CEO) at Rasilient Systems. He adds, “By partnering with Wasabi, we’re able to provide our customers with a hybrid cloud solution that is affordable, fast, reliable, and secure, so they are properly equipped to manage the growing volume of video captured across locations.” VMS-agnostic NFDLink communication software Rasilient Systems’ patent-pending, VMS-agnostic NFDLink communication software enables the use of commonly available broadband wired or wireless internet services, to send and receive forensic-grade video recordings directly to and from the Wasabi cloud. Wasabi’s flexible storage capacity allows organizations to leverage NFDLink, to archive infrequently accessed video to Wasabi from any VMS, while keeping frequently accessed video on-site with Rasilient edge devices. PrivateLok for zero-knowledge encryption at the edge Rasilient Systems’ PrivateLok provides zero-knowledge encryption at the edge Rasilient Systems’ PrivateLok provides zero-knowledge encryption at the edge, to add cyber security on top of Wasabi’s safe and secure environment. Only the edge user holds the key, so even if the network was somehow compromised, no one could view sensitive video data. Wasabi is deployed in fully secure and redundant data centers that are certified for SOC-2 and ISO 27001 compliance. The service is architected, in accordance with industry-renowned security models and design practices. Organizations can configure their individual video files or storage buckets to be immutable for a user-defined retention period (in increments of days, weeks, months, or years). High levels of immutability Designated video files or files written to that bucket cannot be deleted or altered in any way, by anyone, throughout its storage lifetime. This level of immutability helps Rasilient customers comply with state and local government regulations. “Industries that operate in multiple locations, such as healthcare, government, education, and enterprise retail, may have a blend of software at different sites, often times not having one standard VMS across all locations.” said David Friend, the Founder and Chief Executive Officer (CEO) of Wasabi Technologies. He adds, “This scenario makes it difficult for organizations to keep up with increasing levels of video surveillance at the edge, in a secure and cost-effective manner. Rasilient has created a surveillance solution that is dependable, can be used in remote areas, and can cover multiple sites. We’re excited to partner with Rasilient, to provide their customers with a flexible, cost-effective, and secure cloud storage solution that caters to the modern demands of video surveillance.”
ProdataKey (PDK), manufacturer of the cloud access control platform built for mobile allows for "custom fields" within the interface of its pdk.io software. Custom fields increase PDK's solutions' overall functionality by allowing administrators to include a wide range of pertinent data associated with each user. Address, location, floor, unit number, or any other field can be added to the pdk.io user database, providing more ways to identify employees and tenants accurately and categorize them into meaningful segments. Benefits of customizing fields Custom fields give administrators greater latitude in defining user groups and customizing their permissions based on shared characteristics. For example, by identifying users by "shift," night workers can be limited to specific building entrances that are well lit and guarded. Identifying tenants by "floor" can allow elevator and stairwell permissions to be set accordingly. Custom fields may be easily applied to any pdk system directly from pdk.io Custom fields also expand the functionality of third-party integrations that rely on data that are not part of a typical access control user database. Custom fields may be easily applied to any pdk system directly from pdk.io. Conventional access control user profile “Applications for access control are expanding, and systems deployed in these new environments often benefit from descriptive fields that have not traditionally been part of a conventional access control user profile." "With custom fields, pdk system administrators now have unlimited flexibility to incorporate data that is relevant to their specific users and applications,” said Jeff Perri, ProdataKey's Founder and Chief Marketing Officer.
Infilect Technologies, a globally renowned visual intelligence company, based out of Bangalore, India, has named Naresh Sethi as their Chief Growth Evangelist, to take the helm of their global growth expansion plans. business transformations expert Naresh Sethi is a distinguished global strategic leader and champion in driving digital & business transformations for major consumer goods brands. He is currently the Chairman at VST industries, an Indian public conglomerate, associated with British American Tobacco (BAT) multi-national company. He has had a rich association with BAT, throughout his career, for more than two decades. He spent eight years on the Executive Management Board of BAT, in various roles, including Director of Global Strategy, M&A, Global IT, Global Business Services, Digital Transformation and Regional Director West Europe. Industry veteran in digital strategy and planning Infilect Technologies is a renowned Indian Deep Tech company that aims to digitally transform worldwide retail A market person at heart, he has championed key efforts in driving strategy & planning for digital expansion, across more than 70 countries (including India, Australasia, Indonesia, West Africa, Japan & West Europe) and drives business growth for innovative tech platforms, for the retail industry. He currently resides in London, United Kingdom and has also served as a Senior Advisor to Deloitte and Salesforce. Infilect Technologies is a renowned Indian Deep Tech company that aims to digitally transform worldwide retail, through cutting-edge Image Recognition (IR) and AI technology. For the last four years, Infilect has worked with top global FMCGs, consumer goods companies, and packaged food brands in India, APAC, MEA, and LATAM markets, to bring forth transformation in retail sales. In 2020, Infilect Technologies bagged US$ 1.5 million in a Pre-Series A funding, led by financial firms, Mela Ventures, 1Crowd, and Angel Investors at The Chennai Angels. Omni-channel AI technology adoption Naresh Sethi said, “The global consumer goods industry has been confronted with dramatic exponential change and challenges, in the last decade. COVID-19 has only accelerated this trend, as the industry experienced a tumultuous period, battling unforeseen impact on its manufacturing and supply chain, and go-to-consumer capabilities. Early adopters of omni-channel AI technology rose above the adversities and the non-adopters suffered a significant push back, in terms of market share and revenues.” Being a digital strategist, Naresh Sethi adds, “I am excited about what Infilect has to offer to the global consumer goods industry. The time is ripe and most opportune, as business leaders are now turning to digital and AI technology to gain competitive advantage, as they reinvent their future supply and sales strategies.” Computer Vision and AI technology in retail industry “Every sector has few turnpikes that they need to heed on their journey. Computer Vision and AI technology inside retail stores are one such pivot that retail industry needs to take. Our partnership with Naresh will be an exciting turning point, and we eagerly look forward to a fruitful journey with him, in the coming years,” said Anand Prabhu Subramanian, the Co-Founder and Chief Executive Officer (CEO) at Infilect Technologies. Vijay Gabale, the Co-Founder and Chief Technology Officer (CTO) at Infilect Technologies, said “We are extremely thrilled to have Naresh onboard. He is a very capable and astute leader, who will help drive product innovation, to build a holistic integrated platform that enhances the ability of retail decision makers, to optimize their in-store sales execution and store operations, at scale.” Image Recognition and AI products Vijay Gabale adds, “Using our Image Recognition & AI products, retail leaders can quickly respond to changing consumer demands, improve in-store sales and marketing ROI, and easily pinpoint new revenue growth opportunities.”
As the number of connected devices increases worldwide, the ways that they are being used, designed, and tested have also expanded. The rise of connected devices is demanding engineers to harness the power of the internet of things, which is expected to hit 28 billion by 2025. A comprehensive approach to device design is needed more than ever to address the challenges that this rapid growth will bring. Why engineers should be using IoT technology in product design The demand for devices designed to use the Internet of Things (IoT) technology is increasing as more industries are finding expanded ways to put them into use. Industries such as healthcare, automobiles, and agriculture are becoming more dependent on cloud capabilities and are therefore in need of new devices able to connect to it. Due to this rise in demand, an increasing amount of devices are delivering a multitude of benefits both to consumers and companies. However, this new wave of products has led to a growing list of challenges for engineers as they are forced to address IoT tech in regards to connectivity, regulations, longevity, and security. Ways to use IoT in the development process Engineers are facing these new challenges along with the normal pressure of deadlines and test considerations. By approaching all of these issues from a comprehensive point-of-view, the solutions become clearer and new device capabilities can be born. Let’s look at the challenges individually as well as possible solutions for them. Improving connectivity IoT enables data to be transferred between infrastructure, the cloud, and devices, making the process smooth Because IoT is based around connection, it’s no surprise that the primary challenge for engineers to overcome is the improvement of connectivity between devices. IoT enables data to be transferred between infrastructure, the cloud, and devices, so making this process as smooth as possible is crucial. The main challenges involved with connectivity have to do with development and product testing while meeting industry standards and best practices. Additionally, many companies lack the necessary equipment and technology to develop new IoT devices, which makes it difficult to create scalable prototypes and test new products. Suggested solutions To address the issue of not having the expertise and necessary tools for testing, we suggest outsourcing the prototyping and evaluation process instead of attempting to tackle this in-house. By doing this, you’re able to free up resources that would otherwise be needed for expensive equipment and qualified staff. Helping comply with regulations When working with devices that are connected across the world, there is a complex web of regulations and conformance standards that can lead to challenges for engineers. The necessity of complying with these regulations while also pushing to meet deadlines can be burdensome and lead to an increase in production time and expenses. Failure to comply with global and regional laws, as well as system and carrier requirements, can lead to fines and costly setbacks. This type of failure can destroy a company’s reputation on top of causing financial losses, often leading to the loss of business. Suggested solutions By testing the IoT device design and components early, engineers can address any pre-compliance issues that may arise. During the early stages of development, we suggest using scalable and automated test systems readily available in the marketplace. Improved communication with other devices New challenges arise as new devices hit the market and existing technologies are redesigned to offer a better experience In the rapidly growing number of connected devices, new challenges will arise as new devices hit the market and existing technologies are redesigned to offer a better user experience. This rapid growth in devices will lead to congested networks leading to the necessity of devices being able to function in the midst of increased traffic and interference. Failure to do this will lead to delayed responses which could prove to be fatal. Suggested solutions The best solution for this issue is found in the evaluation process and supporting test methods that the Institute of Electrical and Electronics Engineers (IEEE) published in the American National Standard for Evaluation of Wireless Coexistence (ANSI). This process addresses the interconnectivity issues present in radio frequency environments. The outlined process involves defining the environment and evaluating the wireless performance of the equipment through thorough testing. An in-depth version can be found in its entirety online. Increasing the longevity of devices IoT devices are being used in vital industries such as healthcare and automotive so battery life and power consumption are two challenges that engineers must take seriously. A failure in this area could potentially lead to loss of life or safety concerns on the road. As new firmware and software are being designed to address these factors, engineers must be implementing them into IoT devices with the ability to be continually updated. Suggested solutions Longevity should be addressed in all aspects of the design process and tested thoroughly using a wide range of currents. By doing this, an engineer can simulate consumer applications to best predict performance. Security Security and privacy are concerns with any technology, but with the use of IoT in medical devices, it’s paramount Security has been a controversial issue for IoT since its inception. Security and privacy are concerns with any technology, but with the widespread use of IoT in medical devices, smart home appliances, and access control and surveillance, it’s paramount. For example, medical devices may store information about health parameters, medications, and prescriber information. In some cases, these devices may be controlled by an app, such as a smart pacemaker, to prevent heart arrhythmias. Naturally, a security issue in these devices could be devastating. Another example of dangerous security concern is with surveillance cameras and access control, such as for home or business security systems. These intelligent door locking systems contain locks, lock access controllers, and associated devices that communicate with each other. Suspicious activities are flagged with alerts and notifications, but if a hacker gains access, it can lead to real-world, physical danger. Security design points Here are some key points for security design: Physical security: IoT devices may be in external, isolated locations that are vulnerable to attack from not only hackers but by human contact. Embedding security protection on every IoT device is expensive, but it’s important for general security and data safety. Security of data exchange: Data protection is also important because data gets transmitted from IoT devices to the gateway, then onto the cloud. With surveillance and access control information or sensitive medical information, and encryption is vital to protecting data from a breach. Cloud storage security: Similar to data exchange, the information stored in medical devices, surveillance and access control systems, and some smart appliances with payment features, must be protected. This includes encryption and device authentication through access control, which can police what resources can be accessed and used. Update: Security vulnerabilities will always occur, so the key to addressing them is having a plan to address errors and release patches. Customers should also have options to secure devices quickly and effectively. Suggested solutions Engineers can include security and protection into IoT devices with early and perpetual testing throughout the design process. Most security breaches occur at endpoints or during updates, giving engineers a starting point for how to address them. Creating more secure devices Ensuring the security of connected devices should be of supreme importance for engineers as these devices are vulnerable to security breaches. The ultimate security of devices goes beyond the scope of engineering as the network and enterprise levels must also be secure to protect against potential threats. However, engineers play a role in this protection as well and should consider device security in the design process. Suggested solutions On a device level, engineers can help protect IoT devices from vulnerabilities by implementing early testing and continuing it throughout the design process. Most security transgressions occur at endpoints so this continual testing can, and should, create barriers to breaches. Regulations and compliance For IoT engineers, the complex web of regulations and compliance standards present new challenges Regulations and compliance surrounding data and technology are nothing new, but for IoT engineers, the complex web of regulations and compliance standards present new challenges. Engineers are already addressing obstacles in security and connectivity, all while meeting deadlines, and working around regulations adds time and expense to the process. Unfortunately, a failure to comply with global, regional, or local laws can lead to setbacks and fines. In addition to time lost in production and possible fines, the damage to a company’s reputation can lead to even more losses. Suggested solutions Compliance should be considered early and often in the design process. In the early stages of development, the IoT device or components can be tested to address and compliance issues. If possible, use a scalable and automated test system. The comprehensive solution As we stare at an uncertain future full of possibilities, it’s clear to see that new challenges will continue to be presented as technology evolves and new innovative devices are designed by engineers. By addressing these issues early and often, solutions can be implemented and problems prevented before they even have a chance to occur thanks to sound engineering and solid design.
The impact of the COVID-19 pandemic has accentuated our digital dependency, on a global scale. Data centers have become even more critical to modern society. The processing and storage of information underpin the economy, characterized by a consistent increase in the volume of data and applications, and reliance upon the internet and IT services. Data centers classed as CNI As such, they are now classed as Critical National Infrastructure (CNI) and sit under the protection of the National Cyber Security Centre (NCSC), and the Centre for the Protection of National Infrastructure (CPNI). As land continues to surge in value, data center operators are often limited for choice, on where they place their sites and are increasingly forced to consider developed areas, close to other infrastructures, such as housing or industrial sites. Complex security needs One misconception when it comes to data centers is that physical security is straightforward One misconception when it comes to data centers is that physical security is straightforward. However, in practice, things are far more complex. On top of protecting the external perimeter, thought must also be given to factors, such as access control, hostile vehicle mitigation (HVM), protecting power infrastructure, as well as standby generators and localizing security devices to operate independently of the main data center. Face value How a site looks is more important than you may think. Specify security that appears too hostile risks blatantly advertising that you’re protecting a valuable target, ironically making it more interesting to opportunistic intruders. The heightened security that we recommend to clients for these types of sites, include 4 m high-security fences, coils of razor wire, CCTV, and floodlighting. When used together in an integrated approach, it’s easy to see how they make the site appear hostile against its surroundings. However, it must appear secure enough to give the client peace of mind that the site is adequately protected. Getting the balance right is crucial. So, how do you balance security, acoustics and aesthetics harmoniously? Security comes first These are essential facilities and as a result, they require appropriate security investment. Cutting corners leads to a greater long-term expense and increases the likelihood of highly disruptive attacks. Checkpoints Fortunately, guidance is available through independent accreditations and certifications, such as the Loss Prevention Certification Board’s (LPCB) LPS 1175 ratings, the PAS 68 HVM rating, CPNI approval, and the police initiative - Secured by Design (SBD). Thorough technical evaluation and quality audit These bodies employ thorough technical evaluation work and rigorous quality audit processes to ensure products deliver proven levels of protection. With untested security measures, you will not know whether a product works until an attack occurs. Specifying products accredited by established bodies removes this concern. High maintenance Simply installing security measures and hoping for the best will not guarantee 24/7 protection. Just as you would keep computer software and hardware updated, to provide the best level of protection for the data, physical security also needs to be well-maintained, in order to ensure it is providing optimum performance. Importance of testing physical security parameters Inspecting the fence line may seem obvious and straightforward, but it needs to be done regularly. From our experience, this is something that is frequently overlooked. The research we conducted revealed that 63% of companies never test their physical security. They should check the perimeter on both sides and look for any attempted breaches. Foliage, weather conditions or topography changes can also affect security integrity. Companies should also check all fixtures and fittings, looking for damage and corrosion, and clear any litter and debris away. Accessibility When considering access control, speed gates offer an excellent solution for data centres. How quickly a gate can open and close is essential, especially when access to the site is restricted. The consequences of access control equipment failing can be extremely serious, far over a minor irritation or inconvenience. Vehicle and pedestrian barriers, especially if automated, require special attention to maintain effective security and efficiency. Volume control Data centers don’t generally make the best neighbors. The noise created from their 24-hour operation can be considerable. HVAC systems, event-triggered security and fire alarms, HV substations, and vehicle traffic can quickly become unbearable for residents. Secure and soundproof perimeter As well as having excellent noise-reducing properties, timber is also a robust material for security fencing So, how do you create a secure and soundproof perimeter? Fortunately, through LPS 1175 certification and CPNI approval, it is possible to combine high-security performance and up to 28dB of noise reduction capabilities. As well as having excellent noise-reducing properties, timber is also a robust material for security fencing. Seamlessly locking thick timber boards create a flat face, making climbing difficult and the solid boards prevent lines of sight into the facility. For extra protection, steel mesh can either be added to one side of the fence or sandwiched between the timber boards, making it extremely difficult to break through. A fair façade A high-security timber fence can be both, aesthetically pleasing and disguise its security credentials. Its pleasant natural façade provides a foil to the stern steel bars and mesh, often seen with other high-security solutions. Of course, it’s still important that fencing serves its primary purposes, so make sure you refer to certifications, to establish a product’s security and acoustic performance. Better protected The value of data cannot be overstated. A breach can have severe consequences for public safety and the economy, leading to serious national security implications. Countering varied security threats Data centers are faced with an incredibly diverse range of threats, including activism, sabotage, trespass, and terrorism on a daily basis. It’s no wonder the government has taken an active role in assisting with their protection through the medium of the CPNI and NCSC. By working with government bodies such as the CPNI and certification boards like the LPCB, specifiers can access a vault of useful knowledge and advice. This will guide them to effective and quality products that are appropriate for their specific site in question, ensuring it’s kept safe and secure.
For many businesses and organizations, the term 'authentication' is synonymous with 'password' or 'multi-factor authentication (MFA)’. However, because today's business ecosystem is complex and stretches across distributed workforces with work from home, BYOD policies, and multiple cloud environments, it is very challenging to efficiently recognize and authenticate identities of people, processes, and devices throughout the enterprise using traditional methods. The problem with passwords For starters, people tend to forget passwords. To make passwords easier to remember, users may store their passwords in a vulnerable file, create passwords using a consistent pattern, or use the same password again and again. If a password is uncovered on one service or from an unprotected spreadsheet, a bad actor could use that same password to access a high-value network, maybe a corporate service or a bank account. Technical problems with password security Not only are passwords easy for today’s hackers to steal, they offer a poor user experience Not only are passwords easy for today’s hackers to steal, they offer a poor user experience and can be a burden to help desks workers. Password security also suffers from a legion of technical problems. For example, if a connected device machine has been infected with screen scraper malware, the malware can gather all visible data, including passwords, and send them back to the bad actor. Captured passwords are commonly sold and purchased in the underground economy, which can lead to a wide range of security problems. The modern way to authenticate - Public Key Infrastructure (PKI) If passwords are too easily intercepted, what is the best certificate authentication approach? The answer is Public Key Infrastructure (PKI)-based authentication, the better option, because it eliminates the password and reduces the time to authenticate. There is no stronger, easier-to-use authentication and encryption solution than the digital identity provided by PKI. Rather than secret-sharing, PKI uses certificates that do all the work behind the scenes, thereby eliminating the burden on users and the human-error accompaniment. PKI works by using an asymmetric cryptographic key pair, consisting of a private key and a public key. These keys function as a pair using incredibly complex cryptographic algorithms to protect identities and data from unauthorized access or use. Public key The public key consists of a long string of apparently random numbers and is used to encrypt a message. This encrypted message can only be decrypted by the associated private key, which is also made of a long string of numbers. This private key is a secret key and is never shared. The key pair is mathematically related, so that whatever is encrypted with a public or private key, can only be decrypted by its corresponding counterpart. Private key The private key is embedded inside the device, on which it sits - on every laptop, phone, IoT device, server and email client The private key is embedded inside the device, on which it sits - on every laptop, phone, IoT device, server and email client. Whenever possible, the private key is stored in a TPM or hardware security module, protecting it from discovery, even if the device is infected with malware or compromised by a hacker. Additionally, the private key would take decades to brute force and the result is that attack attempts fail. The connection between security and usability There is a dynamic relationship between security and usability - the more you try to up the ante on password-based security, the more difficult it becomes to use. The best security investment is one that can be easily deployed and enthusiastically used by employees. Using PKI authentication is both rock solid and seamless to end users. Digital certificates can be easily deployed to every employee device and system using automated tools. Wouldn't it be better and simpler to not have to type in passwords and instead be automatically authenticated and granted proper access? PKI takes us from the stone age of user names and passwords to a better authentication experience.
A new generation of video cameras is poised to boost capabilities dramatically at the edge of the IP network, including more powerful artificial intelligence (AI) and higher resolutions, and paving the way for new applications that would have previously been too expensive or complex. Technologies at the heart of the coming new generation of video cameras are Ambarella’s newest systems on chips (SoCs). Ambarella’s CV5S and CV52S product families are bringing a new level of on-camera AI performance and integration to multi-imager and single-imager IP cameras. Both of these SoCs are manufactured in the ‘5 nm’ manufacturing process, bringing performance improvements and power savings, compared to the previous generation of SoCs manufactured at ‘10nm’. CV5S and CV52S AI-powered SoCs The CV5S, designed for multi-imager cameras, is able to process, encode and perform advanced AI on up to four imagers at 4Kp30 resolution, simultaneously and at less than 5 watts. This enables multi-headed camera designs with up to four 4K imagers looking at different portions of a scene, as well as very high-resolution, single-imager cameras of up to 32 MP resolution and beyond. The CV52S, designed for single-imager cameras with very powerful onboard AI, is the next-generation of the company’s successful CV22S mainstream 4K camera AI chip. This new SoC family quadruples the AI processing performance, while keeping the same low power consumption of less than 3 watts for 4Kp60 encoding with advanced AI processing. Faster and ubiquitous AI capabilities Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions" “Security system designers desire higher resolutions, increasing channel counts, and ever faster and more ubiquitous AI capabilities,” explains John Lorenz, Senior Technology and Market Analyst, Computing, at Yole Développement (Yole), a French market research firm. John Lorenz adds, “Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions for meeting the growing demands of the security IC (integrated circuit) sector, which our latest report forecasts to exceed US$ 4 billion by 2025, with two-thirds of that being chips with AI capabilities.” Edge AI vision processors Ambarella’s new CV5S and CV52S edge AI vision processors enable new classes of cameras that would not have been possible in the past, with a single SoC architecture. For example, implementing a 4x 4K multi-imager with AI would have traditionally required at least two SoCs (at least one for encoding and one for AI), and the overall power consumption would have made those designs bulky and prohibitively expensive. By reducing the number of required SoCs, the CV5S enables advanced camera designs such as AI-enabled 4x 4K imagers at price points much lower than would have previously been possible. “What we are usually trying to do with our SoCs is to keep the price points similar to the previous generations, given that camera retail prices tend to be fairly fixed,” said Jerome Gigot, Ambarella's Senior Director of Marketing. 4K multi-imager cameras “However, higher-end 4K multi-imager cameras tend to retail for thousands of dollars, and so even though there will be a small premium on the SoC for the 2X improvement in performance, this will not make a significant impact to the final MSRP of the camera,” adds Jerome Gigot. In addition, the overall system cost might go down, Gigot notes, compared to what could be built today because there is no longer a need for external chips to perform AI, or extra components for power dissipation. The new chips will be available in the second half of 2021, and it typically takes about 12 to 18 months for Ambarella’s customers (camera manufacturers) to produce final cameras. Therefore, the first cameras, based on these new SoCs, should hit the market sometime in the second half of 2022. Reference boards for camera manufacturers The software on these new SoCs is an evolution of our unified Linux SDK" As with Ambarella’s previous generations of edge AI vision SoCs for security, the company will make available reference boards to camera manufacturers soon, allowing them to develop their cameras based on the new CV5S and CV52S SoC families. “The software on these new SoCs is an evolution of our unified Linux SDK that is already available on our previous generations SoCs, which makes the transition easy for our customers,” said Jerome Gigot. Better crime detection Detecting criminals in a crowd, using face recognition and/or license plate recognition, has been a daunting challenge for security, and one the new chips will help to address. “Actually, these applications are one of the main reasons why Ambarella is introducing these two new SoC families,” said Jerome Gigot. Typically, resolutions of 4K and higher have been a smaller portion of the security market, given that they came at a premium price tag for the high-end optics, image sensor and SoC. Also, the cost and extra bandwidth of storing and streaming 4K video were not always worth it for the benefit of just viewing video at higher resolution. 4K AI processing on-camera The advent of on-camera AI at 4K changes the paradigm. By enabling 4K AI processing on-camera, smaller objects at longer distances can now be detected and analyzed without having to go to a server, and with much higher detail and accuracy compared to what can be done on a 2 MP or 5 MP cameras. This means that fewer false alarms will be generated, and each camera will now be able to cover a longer distance and wider area, offering more meaningful insights without necessarily having to stream and store that 4K video to a back-end server. “This is valuable, for example, for traffic cameras mounted on top of high poles, which need to be able to see very far out and identify cars and license plates that are hundreds of meters away,” said Jerome Gigot. The advent of on-camera AI at 4K changes the paradigm Enhanced video analytics and wider coverage “Ambarella’s new CV5S and CV52S SoCs truly allow the industry to take advantage of higher resolution on-camera for better analytics and wider coverage, but without all the costs typically incurred by having to stream high-quality 4K video out 24/7 to a remote server for offline analytics,” said Jerome Gigot. He adds, “So, next-generation cameras will now be able to identify more criminals, faces and license plates, at longer distances, for an overall lower cost and with faster response times by doing it all locally on-camera.” Deployment in retail applications Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once Retail applications are another big selling point. Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once (e.g., in a mall), to provide not only security features, but also other business analytics, such as foot traffic and occupancy maps that can be used later to improve product placement. The higher resolution and higher AI performance, enabled by the new Ambarella SoCs, provide a leap forward in addressing those scenarios. In a store setup, a ceiling-mounted camera with four 4K imagers can simultaneously look at the cashier line on one side of the store, sending alerts when a line is getting too long and a new cashier needs to be deployed, while at the same time looking at the entrance on the other side of the store, to count the people coming in and out. This leaves two additional 4K imagers for monitoring specific product aisles and generating real-time business analytics. Use in cashier-less stores Another retail application is a cashier-less store. Here, a CV5S or CV52S-based camera mounted on the ceiling will have enough resolution and AI performance to track goods, while the customer grabs them and puts them in their cart, as well as to automatically track which customer is purchasing which item. In a warehouse scenario, items and boxes moving across the floor could also be followed locally, on a single ceiling-mounted camera that covers a wide area of the warehouse. Additionally, these items and boxes could be tracked across the different imagers in a multi-headed camera setup, without the video having to be sent to a server to perform the tracking. Updating on-camera AI networks Another feature of Ambarella’s SoCs is that their on-camera AI networks can be updated on-the-fly, without having to stop the video recording and without losing any video frames. So, for example in the case of a search for a missing vehicle, the characteristics of that missing vehicle (make, model, color, license plate) can be sent to a cluster of cameras in the general area, where the vehicle is thought to be missing, and all those cameras can be automatically updated to run a live search on that specific vehicle. If any of the cameras gets a match, a remote operator can be notified and receive a picture, or even a live video feed of the scene. Efficient traffic management With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself Relating to traffic congestion, most big cities have thousands of intersections that they need to monitor and manage. Trying to do this from one central location is costly and difficult, as there is so much video data to process and analyze, in order to make those traffic decisions (to control the traffic lights, reverse lanes, etc.). With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself. The camera would then take actions autonomously (for example, adjust traffic-light timing) and only report a status update to the main traffic control center. So now, instead of having one central location trying to manage 1,000 intersections, a city can have 1,000 smart AI cameras, each managing its own location and providing updates and metadata to a central server. Superior privacy Privacy is always a concern with video. In this case, doing AI on-camera is inherently more private than streaming the video to a server for analysis. Less data transmission means fewer points of entry for a hacker trying to access the video. On Ambarella’s CV5S and CV52S SoCs, the video can be analyzed locally and then discarded, with just a signature or metadata of the face being used to find a match. No actual video needs to be stored or transmitted, which ensures total privacy. In addition, the chips contain a very secure hardware cyber security block, including OTP memory, Arm TrustZones, DRAM scrambling and I/O virtualization. This makes it very difficult for a hacker to replace the firmware on the camera, providing another level of security and privacy at the system level. Privacy Masking Another privacy feature is the concept of privacy masking. This feature enables portions of the video (say a door or a window) to be blocked out, before being encoded in the video stream. The blocked portions of the scene are not present in the recorded video, thus providing a privacy option for cameras that are facing private areas. “With on-camera AI, each device becomes its own smart endpoint, and can be reconfigured at will to serve the specific physical security needs of its installation,” said Jerome Gigot, adding “The possibilities are endless, and our mission as an SoC maker is really to provide a powerful and easy-to-use platform, complete with computer-vision tools, that enable our customers and their partners to easily deploy their own AI software on-camera.” Physical security in parking lots With a CV5S or CV52S AI-enabled camera, the camera will be able to cover a much wider portion of the parking lot One example is physical security in a parking lot. A camera today might be used to just record part of the parking lot, so that an operator can go back and look at the video if a car were broken into or some other incident occurred. With a CV5S or CV52S AI-enabled camera, first of all, the camera will be able to cover a much wider portion of the parking lot. Additionally, it will be able to detect the license plates of all the cars going in and out, to automatically bill the owners. If there is a special event, the camera can be reprogrammed to identify VIP vehicles and automatically redirect them to the VIP portion of the lot, while reporting to the entrance station or sign how many parking spots are available. It can even tell the cars approaching the lot where to go. Advantages of using edge AI vision SoCs Jerome Gigot said, “The possibilities are endless and they span across many verticals. The market is primed to embrace these new capabilities. Recent advances in edge AI vision SoCs have brought about a period of change in the physical security space. Companies that would have, historically, only provided security cameras, are now getting into adjacent verticals such as smart retail, smart cities and smart buildings.” He adds, “These changes are providing a great opportunity for all the camera makers and software providers to really differentiate themselves by providing full systems that offer a new level of insights and efficiencies to, not only the physical security manager, but now also the store owner and the building manager.” He adds, “All of these new applications are extremely healthy for the industry, as they are growing the available market for cameras, while also increasing their value and the economies of scale they can provide. Ambarella is looking forward to seeing all the innovative products that our customers will build with this new generation of SoCs.”
Imagine a world where video cameras are not just watching and reporting for security, but have an even wider positive impact on our lives. Imagine that cameras control street and building lights, as people come and go, that traffic jams are predicted and vehicles are automatically rerouted, and more tills are opened, just before a queue starts to form. Cameras with AI capabilities Cameras in stores can show us how we might look in the latest outfit as we browse. That’s the vision from Panasonic about current and future uses for their cameras that provide artificial intelligence (AI) capabilities at the edge. Panasonic feels that these types of intelligent camera applications are also the basis for automation and introduction of Industry 4.0, in which processes are automated, monitored and controlled by AI-driven systems. 4K network security cameras The company’s i-PRO AI-capable camera line can install and run up to three AI-driven video analytic applications Panasonic’s 4K network security cameras have built-in AI capabilities suitable for this next generation of intelligent applications in business and society. The company’s i-PRO AI-capable camera line can install and run up to three AI-driven video analytic applications. The AI engine is directly embedded into the camera, thus reducing costs and Panasonic’s image quality ensures the accuracy of the analytics outcome. FacePRO facial recognition technology Panasonic began advancing AI technology on the server side with FacePRO, the in-house facial recognition application, which uses AI deep learning capabilities. Moving ahead, they transitioned their knowledge of AI from the server side to the edge, introducing i-PRO security cameras with built-in AI capabilities last summer, alongside their own in-house analytics. Moreover, in line with the Panasonic approach to focus more on collaboration with specialist AI software developers, a partnership with Italian software company, A.I. Tech followed in September, with a range of intelligent applications, partially based on deep learning. Additional collaborations are already in place with more than 10 other developers, across the European Union, working on more future applications. i-PRO AI-capable security cameras Open systems are an important part of Panasonic’s current approach. The company’s i-PRO AI-capable cameras are an open platform and designed for third-party application development, therefore, applications can be built or tailored to the needs of an individual customer. Panasonic use to be a company that developed everything in-house, including all the analytics and applications. “However, now we have turned around our strategy by making our i-PRO security cameras open to integrate applications and analytics from third-party companies,” says Gerard Figols, Head of Security Solutions at Panasonic Business Europe. Flexible and adapting to specific customer needs This new approach allows the company to be more flexible and adaptable to customers’ needs. “At the same time, we can be quicker and much more tailored to the market trend,” said Gerard Figols. He adds, “For example, in the retail space, enabling retailers to enhance the customer experience, in smart cities for traffic monitoring and smart parking, and by event organizers and transport hubs to monitor and ensure safety.” Edge-based analytics offer multiple benefits over server-based systems Edge-based analytics Edge-based analytics offer multiple benefits over server-based systems. On one hand, there are monetary benefits - a cost reduction results from the decreased amount of more powerful hardware required on the server side to process the data, on top of reduction in the infrastructure costs, as not all the full video stream needs to be sent for analysis, we can work solely with the metadata. On the other hand, there are also advantages of flexibility, as well as reliability. Each camera can have its own individual analytic setup and in case of any issue on the communication or server side, the camera can keep running the analysis at the edge, thereby making sure the CCTV system is still fully operational. Most importantly, systems can keep the same high level of accuracy. Explosion of AI camera applications We can compare the explosion of AI camera applications to the way we experienced it for smartphone applications" “We can compare the explosion of AI camera applications to the way we experienced it for smartphone applications,” said Gerard Figols, adding “However, it doesn’t mean the hardware is not important anymore, as I believe it’s more important than ever. Working with poor picture quality or if the hardware is not reliable, and works 24/7, software cannot run or deliver the outcome it has been designed for.” As hardware specialists, Figols believes that Panasonic seeks to focus on what they do best - Building long-lasting, open network cameras, which are capable of capturing the highest quality images that are required for the latest AI applications, while software developers can concentrate on bringing specialist applications to the market. Same as for smartphones, AI applications will proliferate based on market demand and succeed or fail, based on the value that they deliver. Facial recognition, privacy protection and cross line technologies Panasonic has been in the forefront in developing essential AI applications for CCTV, such as facial recognition, privacy protection and cross line. However, with the market developing so rapidly and the potential applications of AI-driven camera systems being so varied and widespread, Panasonic quickly realized that the future of their network cameras was going to be in open systems, which allow specialist developers and their customers to use their sector expertise to develop their own applications for specific vertical market applications, while using i-PRO hardware. Metadata for detection and recognition Regarding privacy, consider that the use of AI in cameras is about generating metadata for the detection and recognition of patterns, rather than identifying individual identities. “However, there are legitimate privacy concerns, but I firmly believe that attitudes will change quickly when people see the incredible benefits that this technology can deliver,” said Gerard Figols, adding “I hope that we will be able to redefine our view of cameras and AI, not just as insurance, but as life advancing and enhancing.” i-PRO AI Privacy Guard One of the AI applications that Panasonic developed was i-PRO AI Privacy Guard Seeking to understand and appreciate privacy concerns, one of the AI applications that Panasonic developed was i-PRO AI Privacy Guard that generates data without capturing individual identities, following European privacy regulations that are among the strictest in the world. Gerard Fogils said, “The combination of artificial intelligence and the latest generation open camera technology will change the world’s perceptions from Big Brother to Big Benefits. New applications will emerge as the existing generation of cameras is updated to the new open and intelligent next generation devices, and the existing role of the security camera will also continue.” Future scope of AI and cameras He adds, “Not just relying on the security cameras for evidence when things have gone wrong, end users will increasingly be able to use AI and the cameras with much higher accuracy to prevent false alarms and in a proactive way to prevent incidents." Gerard Figols concludes, “That could be monitoring and alerting when health and safety guidelines are being breached or spotting and flagging patterns of suspicious behavior before incidents occur.”
Growth is accelerating in the smart cities market, which will quadruple in the next four years based on 2020 numbers. Top priorities are resilient energy and infrastructure projects, followed by data-driven public safety and intelligent transportation. Innovation in smart cities will come from the continual maturation of relevant technologies such as artificial intelligence (AI), the Internet of Things (IoT), fifth-generation telecommunications (5G) and edge-to-cloud networking. AI and computer vision (video analytics) are driving challenges in security and safety, in particular, with video management systems (VMSs) capturing video streams and exposing them to various AI analytics. Adoption of disruptive technologies “Cities are entering the critical part of the adoption curve,” said Kasia Hanson, Global Director, Partner Sales, IOT Video, Safe Cities, Intel Corp. “They are beginning to cross the chasm to realize their smart city vision. Cities are taking notice and have new incentives to push harder than before. They are in a better position to innovate.” “Safety and security were already important market drivers responsible for adoption of AI, computer vision and edge computing scenarios,” commented Hanson, in a presentation at the Milestone Integration Platform Symposium (MIPS) 2021. She added: “2020 was an inflection point when technology and the market were ripe for disruption. COVID has accelerated the adoption of disruptive technologies in ways we could not have predicted last year.” Challenges faced by cities Spending in the European Union on public order and safety alone stood at 1.7% of GDP in 2018 Providing wide-ranging services is an expanding need in cities of all sizes. There are currently 33 megacities globally with populations over 10 million. There are also another 4,000 cities with populations over 100,000 inhabitants. Challenges for all cities include improving public health and safety, addressing environmental pressures, enabling mobility, improving quality of life, promoting economic competitiveness, and reducing costs. Spending in the European Union on public order and safety alone stood at 1.7% of GDP in 2018. Other challenges include air quality – 80% of those living in urban areas are exposed to air quality levels that exceed World Health Organization (WHO) limits. Highlighting mobility concerns is an eye-opening statistic from Los Angeles in 2017: Residents spent an average of 102 hours sitting in traffic. Smart technology “The Smart City of Today can enable rich and diverse use cases,” says Hanson. Examples include AI-enabled traffic signals to help reduce air pollution, and machine learning for public safety such as real-time visualization and emergency response. Public safety use cases include smart and connected outdoor lighting, smart buildings, crime prevention, video wearables for field agents, smart kiosks, and detection of noise level, glass breaks, and gunshots. Smart technology will make indoor spaces safer by controlling access to a building with keyless and touchless entry. In the age of COVID, systems can also detect face mask compliance, screen for fever, and ensure physical distancing. 2020 was an inflection point when technology and the smart cities market were ripe for disruption, Kasia Hanson told the MIPS 2021 audience. Video solutions Video workloads will provide core capabilities as entertainment venues reopen after the pandemic. When audiences attend an event at a city stadium, deep learning and AI capabilities analyze customer behaviors to create new routes, pathways, signage and to optimize cleaning operations. Personalized digital experiences will add to the overall entertainment value. In the public safety arena, video enables core capabilities such as protection of people, assets, and property, emergency response, and real-time visualization, and increased situational awareness. Video also provides intelligent incident management, better operational efficiency, and faster information sharing and collaboration. Smart video strategy Intel and Milestone provide video solutions across many use cases, including safety and security Video at the edge is a key element in end-to-end solutions. Transforming data from various point solutions into insights is complicated, time-consuming, and costly. Cities and public venues are looking for hardware, software, and industry expertise to provide the right mix of performance, capabilities, and cost-effectiveness. Intel’s smart video strategy focuses around its OpenVINO toolkit. OpenVINO, which is short for Open Visual Inference and Neural network Optimization, enables customers to build and deploy high-performing computer vision and deep learning inference applications. Intel and Milestone partnership – Video solutions “Our customers are asking for choice and flexibility at the edge, on-premises and in the cloud,” said Hansen in her presentation at the virtual conference. “They want the choice to integrate with large-scale software packages to speed deployment and ensure consistency over time. They need to be able to scale computer vision. Resolutions are increasing alongside growth in sensor installations themselves. They have to be able to accommodate that volume, no matter what causes it to grow.” As partners, Intel and Milestone provide video solutions across many use cases, including safety and security. In effect, the partnership combines Intel’s portfolio of video, computer vision, inferencing, and AI capabilities with Milestone’s video management software and community of analytics partners. Given its complex needs, the smart cities market is particularly inviting for these technologies.
Dahua Technology, a globally renowned video-centric smart IoT solutions and service provider, will hold its 2nd online Dahua Technology Partner Day, from October 13 - 14, 2021, with the theme - ‘Building a digital future’. Dahua Technology Partner Day Adhering to its strategy of open cooperation, Dahua Technology is committed to creating a win-win ecosystem, with major technology partners around the world. This year, Dahua Technology will join hands with its 22 global partners, in order to discuss interoperability, share industry trends and explore the future of digitalization and intelligence together. “We are excited to host our second virtual technology partner day. Technologies have evolved fast in the past year and the needs of digitization, and diversified challenges facing different industries today, are driving the integration of security companies,” said Mr. Jiaqi Gao, Overseas Marketing Director at Dahua Technology. Jiaqi Gao adds, “It is a great opportunity to show how we can build a digital future together with our partners and through which, we can jointly provide the right solution for our customers.” Smart solutions for IoT and security on show A number of Dahua regional experts will showcase the latest Dahua innovations and products, in 6 different hubs During the 2-day event, Dahua Technology and its partners, including Vanderbilt, AxxonSoft, Immix and Optex, will unveil how their smart solutions benefit the field of security and IoT (Internet of Things). It will focus on Artificial Intelligence (AI), cloud solutions and alarm monitoring, as well as specific vertical markets, such as retail, smart building & facilities, critical infrastructure, transportation, etc. This year’s event will also include a section that demonstrates outstanding Dahua products and their compatibility with third-party solutions. A number of Dahua regional experts will showcase the latest Dahua innovations and products, in 6 different hubs, including cyber security & privacy protection, full-color 2.0 and TiOC 2.0, WizMind portfolio, and more. Attendees can register free of charge, connect with presenters and get product information. Behavior analytics in Artificial Intelligence (AI) “The Dahua Partner Day event offers a great platform for AxxonSoft, to present our solutions. We successfully exhibited on last year’s Traffic & Parking session and are excited to share more information about behavior analytics in the AI hub, this year,” said Alan Ataev, AxxonSoft’s Chief Executive Officer (CEO), adding “Together with Dahua, we are enthusiastic about creating joint solutions that grow our value proposition for both our partners and clients.” With its mission of ‘Enabling a safer society and smarter living’, Dahua Technology will continue to focus on ‘Innovation, Quality and Service’, so as to serve its partners and customers around the world.
Globally renowned sensor solutions provider, HENSOLDT and L3Harris Technologies have joined forces to develop new capabilities for NATO’s Alliance Future Surveillance and Control (AFSC) program. Both companies have signed a joint strategic cooperation agreement, to combine their respective skills in the areas of platform-independent mission solutions. HENSOLDT - L3Harris Technologies In the frame of the cooperation, HENSOLDT, with its proven track record in developing and manufacturing sensors, and mission systems, will contribute, among other things, capabilities in the areas of active and passive sensors, sensor data fusion and network management capabilities. L3Harris and HENSOLDT with their respective strengths are ideally suited to offer NATO the optimum solution" “Next-generation surveillance requires an intelligent approach to platform-independent, networked high-end sensors, AI-based date exploitation and dissemination,” said Jürgen Halder, the Head of Strategic Projects at HENSOLDT’s Spectrum Dominance Division. Jürgen Halder adds, “L3Harris and HENSOLDT with their respective strengths are ideally suited to offer NATO the optimum solution.” Open systems and multi-function solutions “Our team will explore open systems, multi-function solutions and data-centric concepts to sustain the NATO Alliance’s military advantage from 2035 and beyond,” said Dave Johnson, the Vice President (VP) of Strategy, Integrated Mission Systems, at L3Harris Technologies. L3Harris Technologies and HENSOLDT are part of an international team that brings together NATO nations’ industrial expertise in surveillance and control. This team will analyze the risks and feasibility of technologies, and components within its systems of systems approach, in order to enhance the NATO Alliance’s capabilities, to the year 2035 and beyond. Enhancing efficiency of future NATO operations L3Harris Technologies’ international teammates share a common vision, which is to increase the effectiveness and efficiency of future NATO military operations, through the procurement and integration of a multi-domain (AFSC) capability, which is centered on the data enterprise.
Traditional monitoring systems often face a myriad of challenges: excessive usage of white light just to capture colour images; ubiquitous background noise; complicated alarm accessories; and lack of integration with third-party alarm systems, just to name a few. In response to these issues, Dahua Technology, a world-leading video-centric smart IoT solution and service provider, has launched its upgraded Three-in-One Camera series – the TiOC 2.0. Aside from its Active Deterrence function, it is also equipped with Smart Dual Illuminators, VoiceCatcher technology, and other intelligent features that can help ease monitoring operation and customise alarm systems based on the actual needs. Smart dual illuminators The upgraded TiOC 2.0 features Smart Dual Illumination technology that can flexibly switch between IR mode and white light mode. The smart illumination mode adopts a deep learning algorithm to detect a target, when the Smart Illumination Mode (default mode) is enabled, the supplementary white light will only turn on when a target has been detected in the monitored area (PTZ camera tracks the target). The active alarm will be triggered as well (siren and blue & red light) if the target enters the rule area The active alarm will be triggered as well (siren and blue & red light) if the target enters the rule area. When the target leaves the monitored area, the supplementary white light will turn off (PTZ camera goes back to preset) and the IR illuminator will turn back on, which can significantly help reduce light pollution during nighttime. Together with other modes including IR Mode and White Light Mode, the smart dual illumination technology can meet various scene requirements of customers. Smart Dual Illuminators can help reduce light pollution during the night VoiceCatcher technology The Dahua VoiceCatcher technology adopts a high-sensitivity dual mic array – a newly designed audio acquisition circuit that can intercept external circuit interference. With Dahua’s self-developed noise reduction algorithm and high-performance SOC, this feature significantly increases the camera’s audio pick-up distance by 7 meters compared with the previous generation of TiOC (based on standard laboratory environment). In addition, the VoiceCatcher technology can also reduce noise and extract audible audio signals, which greatly enhance the TiOC 2.0 cameras in terms of sound quality. These dual-mic cameras provide clear sound, high wind noise reduction rate, and low environmental background noise, whereas a typical single mic produces a slightly distorted sound. Combined with a built-in speaker, a dual-mic array greatly enhances the device’s Two-way Talk function, providing clearer and more audible sounds. The Dahua VoiceCatcher technology adopts a high-sensitivity dual mic array Optical Path Compensation technology Dahua innovatively adopts an F1.0 super large aperture which greatly improves image quality Normally, the focus for visible light and IR light cannot be achieved in the same plane when the camera uses an F1.0 large aperture. Focusing on an area in the monitored scene using cameras with these specs is difficult. Powered by OPC (Optical Path Compensation) technology, the TiOC 2.0 cameras can correct the angle of refraction of different light rays, allowing Dahua IPCs to output brighter and clearer black & white images with an F1.0 large-aperture lens. It is the first Dahua network camera with such a feature. Moreover, Dahua innovatively adopts an F1.0 super large aperture which greatly improves image quality (IR cameras on the market mostly have an F1.6 aperture). The F1.0 aperture lens of TiOC 2.0 cameras increases the light input by 1.96 times and 2.56 times compared with F1.4 and F1.6 respectively. This technological breakthrough enables a smooth visual experience with high brightness and real-time 4K resolution at 25/30 fps even when AI is enabled. Powered by OPC (Optical Path Compensation) technology, the TiOC 2.0 cameras can correct the angle of refraction of different light rays Ecosystem Aside from the DMSS app, the TiOC 2.0 camera series also works with WEB/NVR software. It allows the configuration of alarm-in ports directly on the webpage interface, providing alarm receiving or one-tap arming/disarming function that can control both siren and warning lights with just a click of a button through the alarm system interface. It features 11 built-in alarm sounds and supports importing of custom voice audios that can be used as a welcome message in stores and as a deterrent in restricted areas. AI features This upgraded series also adopts an AI algorithm instead of conventional PIR sensors to improve its event detection accuracy. It boasts an array of AI functions, including SMD 3.0, perimeter protection, making it suitable for various application scenarios including public areas and private places. Auto Tracking 3.0 (PTZ) Combined with the PFA 3.0 algorithm, it realises touchless focusing during the tracking and capturing process Equipped with a deep learning algorithm, the upgraded TiOC 2.0 also offers Auto Tracking 3.0, unique technology of PTZ cameras. It utilizes the characteristics of the PTZ camera to rotate (horizontally and vertically) and zoom in/out to track targets. Once a target triggers the IVS rule, the camera zooms in and tracks the defined target in motion within the scene. Auto Tracking 3.0 provides a smooth tracking process. Combined with the PFA 3.0 algorithm (a deep fusion of intelligent algorithms and focusing algorithms), it realises touchless focusing during the tracking and capturing process. With the Auto Tracking 2.0 algorithm as its foundation, the requirements for the tracking size of the target are further reduced, making the target size smaller and the tracking distance longer. Auto Tracking 3.0 provides a smooth tracking process. Customise systems based on preferences Overall, the upgraded Dahua TiOC 2.0 offers innovative features that allow users to customise their monitoring systems based on their own preferences. Its Smart Dual Illuminators can help reduce light pollution during the night, while its VoiceCatcher technology can significantly decrease background noise. It is equipped with an F1.0 large aperture and optical path compensation technology – breakthrough technology in the industry – that can capture a brighter and clearer image even under low-light conditions. What’s more, it offers longer tracking distance and intelligent AI functions that can help ease surveillance operation. It also allows integration with traditional alarm systems. The release of this series shows Dahua Technology’s dedication to “Innovation, Quality, and Service” to serve its partners and customers around the world. Note: The online launch conference for Full-color 2.0 and TiOC 2.0 will be held on September 14, 2021 (17:00-18:00 Beijing Time). Click here to register.
To keep an automotive manufacturing operation running 24 hours a day, auto manufacturers have utilized Kanban systems, lean manufacturing and just-in-time manufacturing (JIT) however these business processes require tracking of the inventory and materials within a manufacturing facility. Manufacturers that truly want to automate the replenishment process utilize automatic identification such as RFID to create real-time visibility into their manufacturing and inventory management process. One such automatic RFID replenishment system is from MSM Solutions called PortalTrack. This automated RFID and customizable software solution provides real-time visibility without disrupting workflow and can be seamlessly integrated into current manufacturing processes. Accurate inventory control The end result also provides for more accurate inventory control and will prevent lost revenue in mission-critical applications. MSM's PortalTrack system was successfully implemented in an automotive production site of a premium car manufacturer. MSM Solutions was able to work within the existing process flows without disrupting work in process and tailoring its PortalTrack Software to provide the required reporting and metrics that enabled real-time visibility for more informed decision making. As an automotive manufacturer, maintaining production without interruption is paramount As an automotive manufacturer, maintaining production without interruption is paramount. Having accurate real-time visibility allows the customer to know exactly what they have on hand, along with its precise location. PortalTrack enables visibility throughout the entire internal supply chain, thus enabling employees to make smarter decisions faster to insure production keeps running. Integrated RFID solution The goal of the premium car manufacturing project was to provide an automated real-time visibility solution utilizing RFID to track and visually report work in process replenishment inventory to maximize uptime for a mission-critical 24x7 automotive manufacturing operation. The manual processes currently in place relied too much on human intervention resulting in production delays, inaccurate inventory counts, and lost revenue. After an initial site assessment of a premium car manufacturer, MSM Solutions provided the customer with a completely integrated RFID solution. What drove this integration was finding a durable metal mount hard tag that provided reliable read ranges up to 20', develop a network strategy that entailed not directly interfacing the hardware and software components with the customer's network but utilizing an IoT Network solution to manage the RFID read data, reduce deployment time, and provide a secure independent network. Cloud-Based software MSM Solutions was able to overcome all of these challenges using their cloud-based software Also, it is important to note that the traditional ways of running hardware and software solutions directly on a customer's network are becoming increasingly more stringent due to security concerns, infrastructure costs, lack of IT resources and complexity of deployment. However, MSM Solutions was able to overcome all of these challenges using their cloud-based software and IoT network technology which takes the burden off of internal IT support, reduces costs, has zero maintenance for the end-user, along with providing security, and allowing for rapid deployment. With a new car rolling off the line roughly every 80 seconds it is imperative that the right parts and the right counts be at each designated work station in the process. The parts replenishment process flow for the production facility works in a continuous cycle with parts flowing from the supply side of the facility to the manufacturing lines. Target inventory level Parts are placed on racks and assigned to a specific part number with a specific count per rack. The racks are equipped with durable metal mount RFID tags that identify the part number. Once the racks are loaded, multiple racks are then hooked to an automated tug which moves the parts from the supply side to the manufacturing lines. Each part number has a target inventory level that must always be on hand in the manufacturing facility As the tug travels, it passes 2 sets of RFID fixed readers and antennas; one set of RFID readers monitors inbound inventory to the manufacturing lines and another set of RFID readers monitors empty racks returning from manufacturing back to the supply side to be reloaded. Each part number has a target inventory level that must always be on hand in the manufacturing facility. As items enter the manufacturing side via the automated tug, the RFID tags are read and the inventory is automatically increased. Flat-panel monitors On the other hand, as empty racks exit the manufacturing side the RFID tags are read again, and the inventory is automatically deducted. The real-time inventory counts are displayed on large monitors throughout the facility and on a web-based dashboard for viewing on any device. Once a date was determined for the physical install of RFID, MSM Solutions installed all the readers, cabling, mounts, cellular devices, and flat-panel monitors in a 2-day period. The PortalTrack customized software solution was live within 24 hours of the hardware installation. One key metric that was uncovered by MSM Solutions during this process was that once the system was in place, they were able to provide some travel and real-time analytics that drastically changed the customer's stated expectations. Real-time visibility The return on investment for the system was less than three months For example, the customer's perceived expectation for a particular parts cycle rate from supply-side to manufacturing was deemed to be on the replenishment cycle of ‘X’ when in reality the system showed the real cycle rate was ‘Y’. This was a key discovery in that MSM Solutions found parts that were not being replenished at the required cycle rate, parts that were not moving at all, and others that were traveling on paths that went against the workflow. The net gain of having real-time visibility into the production flows instantaneously allows management to react and institute the corrective measures so that production stays on schedule and replenishment efforts remain focused on the most critical parts at any given time. The return on investment for the system was less than three months and the project continues to expand to more applications within the facility. Internal security protocols A few key requirements for this installation were that the entire solution needed to operate independent of the customer's network based on internal security protocols, limited available IT support, infrastructure concerns, and the need for rapid deployment. MSM Solutions bundled the company's new RFID module with its existing solutions MSM Solutions was able to customize a cloud-based Cradlepoint IOT Network coupled with the PortalTrack software that provided a solution that was secure, completely manageable outside the 4 walls, reduced the infrastructure costs, required no internal IT support, and was easily deployable and expandable. By eliminating the manual data entry system, MSM Solutions bundled the company's new RFID module with its existing solutions. The result provided a fully automated system of goods receiving, automatic inventory updating, real-time visibility of production line consumption, and automated warehouse and vendor replenishment. Target inventory level The products and technologies suggested to the premium car manufacturing company included Zebra FX7500 readers, Times 7 5010 flat panel antennas, CradlePoint IoT devices, Xerafy Cargo Trak RFID hard tags, and 50" flat-panel commercial monitors. In many cases, customers have asked about dashboards that can easily display a real-time visual inventory report. The visual inventory report created by Portal Track is represented by 3 columns. Column A shows the actual real-time inventory count for a part on hand in manufacturing and provides a visual representation with a real-time count and a color code of either green (target level met or exceeded) or red (inventory level low) when compared to the target inventory level. Column B displays the target count for an item to always be maintained in manufacturing, and column C displays the total count of all the racks available for an item. Improving inventory accuracy RFID adoption rates in the auto industry are steadily increasing and the applications are expanding RFID adoption rates in the auto industry are steadily increasing and the applications are expanding. Traditional barcode technologies rely too much on human interaction and are no longer sufficient in today's data-driven global economy. Having access to real-time information and analytics drives informed decision-making that results in less downtime, increased sales, improved inventory accuracy, and knowing an item's location instantly. RFID and PortalTrack enable connectivity that allows companies to identify, track, count, and manage all of their assets from point of origin to point of sale. Due to the success of this initial project, MSM Solutions is piloting a new supplier-level project with the same automaker. For this project, MSM's PortalTrack software manages the printing and encoding, reading, and analytics for an estimated 500,000 supplier totes that will be read at the receiving dock doors at the automotive manufacturer.
German manufacturer, Rittal deployed Xerafy's durable, high-temperature RFID tags in its paint shop operations, in order to track Work-In-Process (WIP) and automate stock tracking, and re-ordering with SAP. Rittal manufactures switch cabinets, air conditioning systems, and server and network cabinets. The lack of Work-In-Process (WIP) visibility into its painting processes led to manual stock checking and sub-optimal employment of its resources. Material purchases were based on historical estimates, rather than real-time usage and the company lacked information on temporary material stock. The company wanted 100% WIP visibility, along with automated material tracking. Rittal also wanted the ability to generate purchase orders, based on real-time data, while eliminating manual processes associated with stock checking and inventory management. RFID technology It was clear from the start that RFID would be Rittal's first choice for achieving its operational goals It was clear from the start that RFID would be Rittal's first choice for achieving its operational goals, but it needed transponders that could withstand the high temperatures and chemicals utilized in its production processes. RFID would provide a more robust solution than barcode labels (that would not withstand its manufacturing processes), without requiring line-of-sight reading. The company turned to IdentPro, the German RFID/RTLS integrator and solution provider, with broad experience in deploying the technology in challenging environments. IdentPro provided a complete software solution, SAP integration and rugged RFID tags from Xerafy. “Rittal chose IdentPro because IdentPro would deliver a complete solution, including the required control software and integration with our SAP systems, rather than selling just the RFID components,” said Denise-Anabel Gomolla, Supply Chain Manager - Works Management, Rittal, adding “RFID readings were 100% from the first day.” Xerafy Micro X-II On-Metal RFID tags For the rugged tags, IdentPro turned to Xerafy. Xerafy has an unparalleled range of tags for the type of unique and specialized requirements present at Rittal. The Xerafy Micro X-II On-Metal RFID tag was the perfect fit for Rittal's solution. The tags are designed for exposure to extreme heat and repeated exposure to caustic fluids. Prior to RFID, Work-In-Process was not tracked down to the single item. Raw material purchase orders were based on historical data, rather than actual need. Stock visibility was also limited. The target of the project was to install an automated feedback system, for the painting process that would allow for precise data on WIP and subsequently, also provide real-time data for need-based material purchasing. Enhanced stock transparency An additional benefit of the RFID system would be improved stock transparency. Rittal has deployed Xerafy Micro X-II tags at one of its facilities, along with IdentPro identMX readers with integrated antennas, the IdentPro RFID Control Unit (which serves as the middleware), and the IdentPro RFID Server for business logic and SAP interface functions. All of the readers are connected via Ethernet with the RFID Control Unit, IdentIQ, which consolidates the data and forwards it to the RFID server. The server comprises a web-based front end for managing and monitoring the RFID readers, business logic for monitoring dialogues, and the interface to Rittal's SAP system. Tags mounted on product hangers The Xerafy tags are able to withstand the 200°C process temperatures and have provided 100% read rates The tags are mounted on product hangers and married to the production order number of each product, via a barcode scan. As the hangers pass through 22 RFID read points, on the nearly 10-km-long production line, the data is forwarded to SAP. This integration automatically generates purchase orders, based on real-time production data, as well as updating interim stock and product location data. The Xerafy tags are able to withstand the 200°C process temperatures and have provided 100% read rates. Rittal has been able to optimize materials planning, as a result of the RFID deployment, which has saved time and reduced costs. Reader integrated with antenna and PoE Using a reader with an integrated antenna and PoE kept installation costs and effort to a minimum, and made the system maintenance free, both factors that significantly reduced the total cost of ownership (TCO) of the system for Rittal. The company now plans to implement the solution at additional plants. “We love Xerafy's range of special metal tags, which never let us down in any of our projects,” said Michael Wack, the Chief Executive Officer (CEO) at IdentPro, adding “Especially for demanding production environments, the extended heat resistance and extra robustness of their tags come in handy. We have also experienced a very good size/performance ratio with tags from Xerafy.”
Integro's latest heavy-duty portable power equipment is industrial IoT-ready, thanks to source-tagging with embeddable Xerafy RFID. Industrial IoT innovation With its Paramount Kit, Integro LLC, a globally renowned company in power distribution solutions, brings industrial IoT innovation to portable power and other industries, by making it possible to reliably read an RFID tag from portable power equipment. Hubbell, a globally renowned company in electrical devices, is also launching its line of wiring devices, with embeddable Xerafy RFID tags in its equipment. It will offer its full range of wiring devices, from 15A to 400A, with this technology. Patents to read RFID tags for inventory management The company holds two specific patents to read RFID tags, which are molded into electrical assets for inventory management Integro is a thermoplastic and rubber molder of custom electrical cable assemblies, with its products used in Airfield Lighting, Shipbuilding, Mining, Power Utility, Steel Fabrication, Portable Power and LED Lighting markets. The company holds two specific patents to read RFID tags, which are molded into electrical assets for inventory management purposes. The tags are permanently molded into electrical connectors, in order to ensure that they will not become dislodged or damaged in the roughest environments, where operating conditions require safety and reliability. Xerafy’s Pico On Plus RFID tags selected “We feel the Integro system of molding permanent RFID tags into electrical assets and our custom-designed inventory management programs are ideal for heavy industrial and electrical markets,” said John Bogart, the President of Integro. Integro selected Xerafy’s Pico On Plus RFID tags, after some comprehensive product evaluations, which focused on read range and size. Integro’s John Bogart concludes, “Xerafy’s Pico-On Plus RFID tags offer the best performance-to-size ratio available that withstands harsh or hazardous environments.”
Round table discussion
Residential security and smart homes are rapidly changing facets of the larger physical security marketplace, driven by advances in consumer technology and concerns about rising crime rates. During the COVID-19 pandemic, many people spent more time at home and became more aware of the need for greater security. As workplaces opened back up, returning workers turned to technology to help them keep watch over their homes from afar. We asked this week’s Expert Panel Roundtable: What are the trends in residential security in 2021?
Since the advent of the physical security industry, access control has been synonymous with physical cards, whether 125 kHz ‘prox’ cards or the newer smart card alternatives. However, other credentials have also come on the scene, including biometrics and even smart phones. Some of these choices have distinct cost and security advantages over physical cards. We asked this week’s Expert Panel Roundtable: How soon will the access control card become extinct and why?
Cost is a reality to be managed. No matter how powerful or desirable a technology may be to a customer, the sale often comes down to the basic question: Can I afford it? And affordability extends not just to the purchase price, but to the cost of technology over its lifespan. In addition to advances in technology capabilities, the security industry has also achieved inroads to make its offerings more worth the cost. We asked this week’s Expert Panel Roundtable: What is the physical security industry doing to make more affordable and cost-effective technology solutions for end users?