Our most popular articles in 2017 reflected changing trends in the U.S. security market, from deep learning to protection of mobile workers, from building automation to robotics. Again in 2017, the most read articles tended to be those that addressed timely and important issues in the security marketplace. In the world of digital publishing, it’s easy to know what content resonates with the market: Our readers tell us with their actions; i.e., where they click.
Let’s look back at the Top 10 most-clicked articles we posted in 2017. They are listed in order here with the author’s name and a brief excerpt.
1. Las Vegas Massacre Demands Reevaluation of Hospitality Sector Security
The Oct. 1, 2017, sniper attack from a 32nd-floor room at Mandalay Bay, overlooking 22,000 people attending a country music festival, has been compared to “shooting fish in a barrel.” When the bullets rained down, there was nowhere to hide. The attack came from outside the “perimeter” of the event, so any additional screening of attendees would not have prevented it. There are also implications of the Las Vegas massacre for the hospitality industry. Hotels and resorts such as Mandalay Bay have not generally embraced technologies like the explosives scanners or X-ray machines used at airport terminals, at least not in the United States.
2. Deep Learning Algorithms Broaden the Scope of Video Analytics [Zvika Ashani]
Until recently there have been minimal applications of Machine Learning used in video analytics products, largely due to high complexity and high resource usage, which made such products too costly for mainstream deployment. However, the last couple of years have seen a tremendous surge in research and advances surrounding a branch of Machine Learning called Deep Learning. The recent increased interest in Deep Learning is largely due to the availability of graphical processing units (GPUs). GPUs can efficiently train and run Deep Learning algorithms
The last couple of years have seen a tremendous surge in research and advances surrounding a branch of Machine Learning called Deep Learning |
3. Home Security Systems: Why You Need to Upgrade From 3G to 4G Technology [Missy Dalby]
The current communication method for most home security systems is via CDMA and 3G (GSM) technologies. With the emergence of faster, better, and stronger 4G LTE technology, carriers are migrating away from old technology standards and methods towards new, more efficient ones. As such, the older technology is going dark, and soon. Manufacturers of cellular modules have stopped making them. At the end of 2018 they will stop letting customers add systems utilizing 3G radios to their channels.
4. Diving into AI and Deep Learning at NVIDIA’s San Jose Conference [Larry Anderson]
Video analytics applications fall under NVIDIA's “AI City” initiative, which they describe as a combination of "safe cities" (video surveillance, law enforcement, forensics) and "smart cities" (traffic management, retail analytics, resource optimization). Depending on the application, AI City technology must function in the cloud, on premises and/or at the edge. NVIDIA’s new Metropolis initiative offers AI at every system level, from the Jetson TX2 "embedded supercomputer" available at the edge, to on-premises servers (using NVIDIA’s Tesla and Quadro) to cloud systems (using NVIDIA’s DGX).
5. Physical Security Evolves to Protect Mobile Workers [Annie Asrari]
With an increasing number of employees traveling and working remotely, the days of a dedicated worker who commutes to and from a single location every day of the week are just about over. Security professionals must take a second look at their policies and procedures for employee safety. To protect employees in this new mobile world, where people, assets and brand reputation threats may face higher than normal levels of safety and security risks, businesses must focus less on securing physical, four-wall perimeters and instead take a global approach to security that focuses on protecting traveling, remote and lone workers.
Businesses must take a global approach to security that focuses on protecting traveling, remote and lone workers |
6. New Security Technologies Driving Excitement on Busy ISC West Day One [Larry Anderson]
ISC West in Las Vegas kicked off April 5 with an expanding focus on new technologies and new applications, including some that go beyond any narrow definition of security. “Technology is disrupting the market and executives are taking our solutions beyond security,” says Moti Shabtai, CEO and President of Qognify. “They are starting with security and quickly moving to other risk and business continuity issues in the organizations. They want a clear return on investment (ROI), which we can deliver if we move from covering a limited island of ‘security’ issues and give them the value of also managing risk, safety, and operations.”
7. Optimizing Building Automation for Good Return on Investment [Minu Youngkin]
Smart buildings are on the rise around the world, not only because a growing number of companies are considering their environmental impact, but also because of the dramatic cost savings that can be realized through integration. In every building that has an integrated security and access control system, an opportunity awaits to also integrate the building’s energy use, water use, ventilation and more. The key is to effectively convey the tremendous potential of this new technology to the end user.
A good way to predict trends [at the upcoming ISC West show] is to look at what’s happening in some larger, adjacent technology industries, such as IT and consumer electronics. Major trends on these fronts are the most likely to influence what new products will be launched in the electronic security industry. Proof in point is H.264, an advanced compression technology ratified in 2003 and adopted as the new standard by the consumer industry a few years later. By 2009, it became the new compression standard for the video surveillance industry as well.
Violence will continue to challenge the healthcare sector in the future |
Violence will continue to challenge the healthcare sector in the future. Domestic violence, child abuse, behavioral health, drug and alcohol abuse will all continue to challenge hospital staff in the Emergency Department, Women’s Health, and behavioral health areas. The Hazard Vulnerability Assessments (HVA) along with facility wide risk assessments helps in defining risk severity and identifying historical patterns of violence.
10. Robot Revolution: Uncovering the Real Value of Security Robots [Steve Reinharz]
The security coverage that a robot offers in the case of a shopping mall can be easily overshadowed by the fact that the machines seem to serve to entertain the population. Instead, security robots can best be utilized for more high-level roles, such as in critical infrastructure sites, corporate campuses and educational facilities, where wide, expansive spaces require continuous protection. In these locales, security can be difficult to achieve, as cost, location and lack of resources make the logistics of deployment difficult.