Radio frequency Identification
Police users in the Municipality of Padova have deployed over 300 Sepura SC20 radios for the city’s police force. These are the first Sepura radios to be deployed in the Padova region, with the radios being chosen to replace existing TETRA units after a successful user trial. Radio users will benefit from the SC20’s loud audio and robust design, while also being protected by the radios’ advanced functions; Man Down and Lone Worker applications will initially be deployed, while...
Safetrust, the globally renowned company in virtual credential solutions, has released touchless mobile access and WiFi options for the millions of HID iCLASS SE and multiCLASS SE readers deployed globally with their new SABRE MODULE. The 30-second plug-in makes the SABRE MODULE the fastest way to enable touchless mobile access at the door, turnstile or elevator, while using existing readers. SABRE MODULE touchless mobile access The SABRE MODULE enables hands-free authentication from a config...
Thermal cameras are not only used to safeguard property and people but also to protect mission-critical equipment. At manufacturing plants, maintenance teams want to aggregate data to continually evaluate an asset’s health and know if it is about to fail. Production managers are keen to catch process anomalies that result in faulty products or packaging before these products leave the production line. Safety managers need to detect excessive heat build-up on fuel, hazardous material, and...
Euralarm, the European association of the fire safety and security industry, has commented on the upcoming delegated act (DA) for internet-connected and wearable radio equipment, as part of the Radio Equipment Directive. The comments and proposals are given in view of the activation of the delegated act pursuant to article 3(3) of the RED (d, e and f) and cover the scope of the delegated act, the definition of ‘internet-connected devices’ and the implementation period. Relevant tec...
Getac Technology Corporation (Getac), a globally renowned company in rugged computing and IT solutions, has announced that it is bringing integrated LiFi (Light Fidelity) technology, powered by PureLiFi, to the rugged computing and IT software market for the first time ever. Integrated Light Fidelity technology The announcement means customers across a wide range of professional sectors will soon be able to enjoy the benefits of fully rugged reliability and innovative LiFi connectivity in a si...
Powercast Corporation, the globally renowned company in radio-frequency (RF)-based, over-the-air wireless power technology and solutions, has announced the launch of a new wirelessly-powered RFID Temperature Scanning System that enables businesses to easily and safely monitor employees' temperatures, as they work to re-open offices and get back to normal. RFID Temperature Scanning System The new system is comprised of a wirelessly-powered temperature-scanning fob for each employee, an RFID rea...
Listentech’s innovative ListenIR range of infrared hearing technology is now available from SigNET. Ideal for classrooms, performing arts studios, courtrooms, places of worship or anywhere where amplified audio needs to be private, the range includes lightweight IR transmitters and radiators, receivers and accessories, all designed to offer an exceptional end-to-end assistive listening experience in areas where strict privacy, zero overspill and effective ‘line of sight’ coverage is a must. Public address systems Said Tremayne Crossley, SigNET’s Sales Manager: “Listentech manufacture the best infrared assistive listening products on the market and we are delighted to be able to offer the range to our customers when they have a requirement for a wireless system.” SigNET is a manufacturer of audio products including the UK’s widest range of hearing loop systems, multiple award-winning voice alarm/public address systems and one of Europe’s most respected disabled refuge/emergency voice communication systems - all available through a specialist network of partners and distributors in the UK and overseas.
Safetrust, a globally renowned virtual credential solutions provider, has announced bringing Touchless Mobile Access and WiFi options to the millions of HID iCLASS SE and multiCLASS SE readers deployed currently with their new SABRE MODULE. Touchless Mobile Access The 30-second plug-in makes the SABRE MODULE the fastest way to enable touchless mobile access at the door, turnstile or elevator, while using existing readers. SABRE MODULE enables hands-free access authentication from a configurable distance As organizations transition back to the workplace, eliminating community touchpoints of legacy door readers is paramount for employee safety. Unlike traditional cards and key fobs that in practice are touched at the reader, the SABRE MODULE enables hands-free access authentication from a configurable distance. Dynamic credential management With dynamic credential management, administrators can instantly issue and reissue a secure mobile credential to employees or visitors with the click of a button, removing the need for face-to-face on-boarding and handling cards. “Lifetime warranty should mean for a lifetime,” said Jason Hart, Chief Executive Officer of Safetrust, adding “We independently developed the SABRE MODULE to extend the useful life of existing HID iCLASS SE and multiCLASS SE readers, by adding the connectivity and sensor features that were missing.” SABRE MODULE Jason further said, “By adding IoT technology to the reader, organizations can augment their traditional physical access solution and utilize the readers as network-connected sensors for touchless access, presence detection and remote management, in addition to being forward capable as industry standards continue to evolve.” The SABRE MODULE is WiFi-enabled and supports digital certificate 802.1x authentication, MQTT and SIA OSDP, allowing for full remote management of the traditional RFID reader, irrespective of the reader’s current wiring configuration. The module is made in the USA and comes with a lifetime warranty.
Security at educational institutions is a highly sensitive issue. No matter whether it is a kindergarten, school, university or private learning institute, concentrated learning requires a harmonious environment to focus on the essentials. High-end video technology can make a decisive contribution to protecting students from any kind of disturbance or untoward incident. Safeguarding schools In the past, schools and universities have repeatedly been the target of active shooter and terrorist attacks. The primary goal of educational institutions, owing to this constant threat, is to prevent ‘unauthorized access’ to the school grounds and to allow only authorized visitors. Further potential danger exists internally, such as cases of vandalism, bullying and violence by or among students, which are issues that may arise sometimes in school life. Of course, early smoke and fire detection are also important components for a safe learning and living environment. MOBOTIX video security solutions MOBOTIX has video security solutions for the education & science sector in its portfolio" In addition, the COVID-19 pandemic has brought new health protection requirements into focus. Video technology can provide reliable support in all these scenarios. "MOBOTIX has video security solutions for the education & science sector in its portfolio that makes school, learning and studying safe. These solutions are already in use around the world and have proven themselves to be very effective," said Thomas Lausten, Chief Executive Officer (CEO) of MOBOTIX AG. With its unique product portfolio consisting of hardware, software, services and intelligent partner solutions, MOBOTIX can precisely map the requirements of various industries. The latest technologies can be used to protect people, facilities and infrastructure in schools, universities or private educational institutions. Access and entry control Video technology from MOBOTIX helps to prevent unauthorized access and regulate access to buildings, or individual areas in a targeted manner. In addition, doors can be opened totally contactlessly, for example using RFID chip cards, access codes and identification of authorized personnel, based on face recognition technology. An overview in real time is possible and also helps in emergency situations, e.g. during evacuations to find out whether and which persons are where. At entrances and parking lots, vehicles can be automatically registered via the license plate and compared with databases. The identifying video technology can thus, efficiently restrict access to authorized vehicles or persons. MOBOTIX 7 open video system platform Using the new open video system platform, MOBOTIX 7, numerous camera apps can be used for intelligent video analysis. Among other things, the applications can register, for example, ownerless luggage, stolen furnishings, can track down suspicious persons, count people, recognize overcrowding situations or alert when one or more virtual blocking lines are crossed for burglary protection. The robustness of the MOBOTIX hardware also protects the video technology of MOBOTIX itself against vandalism. The use of thermal imaging cameras is also recommended in special areas. For example, an email can be sent to the building maintenance department if the system, which reacts to invisible heat radiation, detects increasing overheating in an IT server room before a dangerous fire breaks out. Campus security and perimeter protection The MOBOTIX M16 and M73 offer several simultaneous sensors in a robust, weatherproof design For outdoor applications, the MOBOTIX M16 and M73 offer several simultaneous sensors in a robust, weatherproof design. The wide range of interchangeable sensor modules can be configured to meet the exact requirements of the educational institution in question, with the aim to detect danger or any untoward incident in time and thus, effectively thwart them. For example, a floodlight could automatically shine if an unauthorized person enters the campus outside of opening hours. If desired, this could also be combined with an acoustic warning. Cyber-secure MOBOTIX video technology While the communication infrastructure in the education sector constantly improving, there are usually few resources (personnel, know-how) available for the maintenance of the technology. For this reason, the systems used must be stable and, if possible, maintenance-free and also protected against physical and digital attacks. MOBOTIX video systems are made in Germany. With an above-average ‘Mean Time Between Failures’ (MTBF) of more than 80,000 hours, the follow-up costs of a MOBOTIX system are reduced to a minimum. Resources for technology support can be saved. Due to their durability and robustness, they are predestined for use in education and science. "Particularly in the educational sector, the security of pupils, students, teaching staff, but also of equipment and facilities is of particular importance, real and digital. MOBOTIX has optimal solutions that are robust, reliable and cyber-secure. Solutions that help to make our educational institutions more convenient and secure," concludes Thomas Lausten.
Identiv, Inc. announced the launch of its frictionless, battery-less uTrust UHF Credentials that work with identification applications that require long-distance reading. Ultra high-frequency (UHF) technology is ideal for parking lot access and gate control, door entry in hospitals or gated communities, logistics, object and people tracking in emergency situations, real-time locationing, cafeteria access, and any hands-free environment, including medical or care facilities, club and resort membership, sport facilities, and universities. Long-read applications The credentials can be read through badge holders, handbags, pockets, and backpacks, supporting touch-free, highly hygienic physical access control. “For today’s most critical pandemic-era environments, Identiv is focused on providing solutions that support the safest, most hygienic physical access control,” said Stephane Ardiley, Director, Product Management. “Our new uTrust UHF Credentials harness ultra high-frequency technology for long-read applications - meaning your access card never has to leave your pocket as you enter gates, buildings, or controlled areas in schools, hospitals, or other hands-free locations. Beyond access control, uTrust UHF Credentials can be utilized in emergency situations or in the medical field for real-time people and object tracking.” Radio frequency identification cards uTrust UHF Credentials can keep track of people to increase personal safety and facility security Identiv’s uTrust UHF Credentials provide multiple options for durable, interoperable radio frequency identification (RFID) cards. UHF technology (operating in the 860 - 960 MHz frequency range) delivers outstanding performance for long-distance, multiple, reliable readings of credentials, including cards and tags. Leveraging the short wavelength of UHF technology, they are the ideal solution for reading people or items from a significant distance (i.e., more than 18 – 21 feet). uTrust UHF Credentials can keep track of people to increase personal safety and facility security, capture guest/visitor data, and can support 125 KHz low frequency (LF) and/or 13.56 MHz high frequency (HF) interfaces. The credentials are EPC Class-1 Generation-2, ISO/IEC 18000-63:2013, and RAIN UHF RFID-compliant and are compatible with a huge selection of second-generation UHF readers available on the market today, including handheld, stationary, or desktop readers. Time and attendance Offered in regular credit card plastic format (CR80) for corporate or government personnel, uTrust UHF Credentials are available in two models: ISO PVC UHF LF Card and ISO PVC UHF DESFire EV2 2K Card. Identiv’s cohesive collection of touchless solutions are focused on reopening public venues and workplaces as safely as possible. Identiv’s portfolio of credentials, ID cards, and smart cards are available in a variety of form factors for physical and logical access control, converged access solutions for building and computer access, transit payment, brand protection, time and attendance, cashless vending, and Internet of Things (IoT) applications. Solutions are available as single-technology, multi-technology, or credentials with a contact chip.
Suprema, a global provider of access control, time & attendance, and biometric solutions, has announced that the company’s Airfob Patch won the Judges’ Choice Award from SIA (Security Industry Association) New Product Showcase Awards. SIA New Product Showcase Awards Since its inception in 1979, SIA New Product Showcase Awards has been the security industry’s premier product awards program recognizing innovative security products, services and solutions. The awards program, in partnership with ISC West, presented this year’s winners in virtual format. The Judges’ Choice Award, which recognizes the most innovative product within the physical security category, was given to Suprema for its Airfob Patch. Airfob Patch Airfob Patch harvests power from the RF field signals transmitted from the reader and stores it until needed Airfob Patch is a retrofit adhesive-backed device that attaches to existing RF card readers to make them compatible with mobile credentials. When attached to existing card readers, Airfob Patch acquires credential compatibility, power, and OSDP or Wiegand communication with the reader and adds Suprema's Mobile Access credential capability. Airfob Patch harvests power from the RF field signals transmitted from the reader and stores it until needed. The wireless method of power and data transfer eliminates the need to splice a reader’s pigtail for installation. Bluetooth-based wireless communication “Airfob Patch is the world’s first mobile-to-RF-card signal translator, enabling mobile phones to communicate with the existing RF card readers via Bluetooth,” said Young S. Moon, the CEO of Suprema Inc, adding “Installation is as easy as adding a sticker. No wire, batteries or construction is required.” Suprema Mobile Access and Airfob Patch were developed by MOCA system, a Suprema affiliate company that began in 2019 to focus on mobile access card solution. MOCA system has developed solutions that use stable Bluetooth-based wireless communication method that are being evaluated for patents. “SIA congratulates Suprema Inc. for being selected as the recipient of the Judges’ Choice Award in SIA’s 2020 New Product Showcase,” said Don Erickson, the Chief Executive Officer (CEO) of SIA, adding “It’s this type of continual innovation and drive to succeed that advances the security industry and which contributes to the safety and security of our world.”
HID Global, a globally renowned company in trusted identity solutions, has announced the launch of its smallest embedded reader module, the OMNIKEY 5127CK Reader Core. The latest addition to the proven OMNIKEY family makes it possible for systems integrators, Original Equipment Manufacturers (OEMs) and other partners to embed RFID into devices with limited physical space to accurately authenticate people, reduce fraud and protect sensitive data in a contactless way. OMNIKEY 5127CK Reader Core OMNIKEY 5127CK Reader Core uses standard interfaces that make it ideal for embedding into constrained spaces and battery-powered devices. It enables everything from handheld devices, tablets, PCs and notebooks to keyboards, displays, monitors, and kiosks to be used across a range of applications in numerous vertical markets. “The OMNIKEY 5127CK Reader Core opens new market opportunities for partners seeking to incorporate a host of new physical and digital use cases that were previously difficult to add due to space restrictions on the devices,” said Steve Currie, Vice President and Managing Director, Extended Access Technologies with HID Global. Steve adds, “At the same time, we are also making it possible to further simplify development and integration of readers with our comprehensive reader core software development kit (SDK).” Easy integration and flexible connectivity The OMNIKEY 5127CK Reader Core accelerates time-to-market with numerous features for ease of integration The OMNIKEY 5127CK Reader Core accelerates time-to-market with numerous features for ease of integration, streamlined configuration and flexible connectivity. It includes modular approval certification for wireless devices, efficient power management (USB suspend/resume and remote wake up modes) and external off-board HF/LF and Bluetooth Low Energy (BLE) antennas or the option to design custom antennas that meet specific embedded requirements. Support for multiple frequency credential technologies For ultimate interoperability, the OMNIKEY 5127CK Reader Core supports multiple low and high frequency credential technologies within a single device and includes Apple’s Enhanced Contactless Polling (ECP) application to support credentials in Apple Wallet. It also supports the latest mobile access solutions via NFC or BLE technology, as well as iCLASS Seos, iCLASS SE, HID Prox, MIFARE Classic and MIFARE DESFire EV1/EV2 credential technologies.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilized by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing An Effective Action Plan When strategizing how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilizing doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organize a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategizing how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing Public Areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install Guard Booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A Brief History Of 3D Technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialization, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modeling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialization, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organizations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts." Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What Does This Mean For The Security Or Facility Manager Today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects. Example Benefits Of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example Benefit Of Reality Capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared. They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorization before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious Use Of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.
Within days, a rule will take effect that bans from U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and Dahua. The Federal Acquisition Regulation (FAR) rule implements the “blacklist” (or “Part B”) provision of the National Defense Authorization Act (NDAA), which is understood in the security industry as prohibiting dealers and integrators that do business with the federal government from selling Chinese-made video products to any of their customers (even for non-government projects). The rule, which is officially still interim, states: “On or after August 13, 2020, [federal] agencies are prohibited from entering into a contract, or extending or renewing a contract, with an entity that uses any equipment, system, or service that uses covered telecommunications equipment or services as a substantial or essential component of any system, or as critical technology as part of any system.” Federal rules Within days, a rule will take effect that bans U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and DahuaFederal agencies issuing the rule are the Department of Defense (DoD), the General Services Administration (GSA) and the National Aeronautics and Space Administration (NASA). GSA provides centralized procurement for the federal government. Because the COVID-13 crisis delayed issuance of the rule, the usual 60 days will not be allowed for public comment before the rule is implemented. However, public comments are welcome and will be addressed in subsequent rulemaking. “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giants. The rule also specifies that it applies to “certain video surveillance products or telecommunications equipment and services produced or provided by Hytera Communications Corp., Hangzhou Hikvision Digital Technology Company, or Dahua Technology Company (or any subsidiary or affiliate of those entities).” Hytera is a Chinese manufacturer of radio systems. Hikvision and Dahua are major international manufacturers of video surveillance equipment. Limits and prohibitions The rule states: “This prohibition applies to the use of … equipment or services, regardless of whether that use is in performance of work under a Federal contract.” In the industry, this clause is taken to mean that integrators that “use” any of the covered equipment are prohibited from selling to the government. “Use” presumably covers an integrator deploying the equipment in their own facilities and/or selling it to other customers. The rule also prohibits “service … related to item maintenance,” which in the case of a security integrator would include providing service contracts on previously installed systems. Security Industry Association (SIA) The Security Industry Association (SIA) comments: “Due to applicability [of the rule] to uses by entities with federal contracts even unrelated to their federal work, this broad interpretation is expected to have widespread impact on the contracting community across many sectors, as covered video surveillance equipment is some of the most commonly used in the commercial sector in the United States.” Security integrators that do business with the federal government have largely anticipated the new rule and already switched their Chinese camera lines for NDAA-compliant competitors. However, as SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns. Easing compliance burdens The interim rule adopts a “reasonable inquiry” standard when an offeror (government contractor) represents whether it uses covered equipment. “A reasonable As SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns. inquiry is an inquiry designed to uncover any information in the entity’s possession about the identity of the producer or provider of covered telecommunications equipment or services used by the entity. A reasonable inquiry need not include an internal or third-party audit.” SIA notes that this provision may be aimed at easing the compliance burden by suggesting that contractors only need to inquire based on what information they already possess. The 'blacklist' The new rule covers Paragraph (a)(1)(B), which has informally been referred to as the “blacklist” provision of the NDAA, the John S. McCain National Defense Authorization Act for fiscal year 2019. However, the “Chinese ban” provision [Paragraph (a)(1)(A)] already went into effect a year after the law was signed by President Trump (August 13, 2018). “Part A” covers use of Chinese-made products in fulfilling government contracts. A growing threat Seeking to justify the new restrictions, the FAR rule states: “Foreign intelligence actors are employing innovative combinations of traditional spying, economic espionage, and supply chain and cyber operations to gain access to critical infrastructure and steal sensitive information and industrial secrets. The exploitation of “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giantskey supply chains by foreign adversaries represents a complex and growing threat to strategically important U.S. economic sectors and critical infrastructure.” SIA has urged a delay in implementing the “Part B” provision, stating: “The federal government estimates that it will cost contractors well over $80 billion to fully implement this prohibition on the use of certain Chinese telecommunications and video surveillance equipment, yet endless delays in publishing the rule now mean that federal suppliers have just weeks to understand and comply with the new rule, which raises as many questions as it answers.” SIA continues: “Federal suppliers across a wide range of industries have increasingly concluded that Part B is unworkable without clarification of the scope and meaning of key terms in the provision, which the rule does not do enough to define. For example, Part B bans agencies from contracting with a provider that “uses” any covered equipment or service. This term is not clearly defined in law or regulation, yet contractors must certify compliance beginning Aug. 13, 2020.” The Part B rule, which only applies to prime contractors, enables agency heads to grant a one-time waiver on a case-by-case basis, expiring before Aug. 13, 2022.
For the security market, the ‘fine ranging’ capabilities of ultra-wideband (UWB) technology opens up a range of new uses based on the ability to determine the relative position and distance of two UWB-equipped devices with pinpoint accuracy – within centimeters. UWB is more accurate and secure, even in challenging environments full of interference, compared to narrow band wireless technologies. UWB technology transmits a large amount of data over short distances using a small amount of energy. It will be used in seamless access control, location-based services, and device-to-device services across industries including smart homes, cities, retail services, and healthcare. Increasing the accuracy of ranging measurements UWB technology will support any application that benefits from knowing the precise location of a connected deviceUltra-wideband is a mature radio technology that transmits information spread over a large bandwidth, as described by the IEEE 802.154 standard. A new, enhanced amendment to the standard – IEEE 802.15.4z – focuses on improvements to existing modulations to increase the integrity and accuracy of ranging measurements. Moving forward, UWB technology will support any application that benefits from knowing the precise location or presence of a connected device or object. This reflects a move from data communication to secure sensing. New capabilities of UWB are largely unfamiliar to the market, but a new Consortium – the FiRa Consortium – has a mission to educate the market, provide use cases, and promote UWB technology. Delivering interoperability across devices “With a consortium, we can better deliver interoperability across devices, software, and chipsets,” says Ramesh Songukrishnasamy, Director and Treasurer of the FiRa Consortium, and SVP & CTO of HID Global. “This creates a frictionless experience for the user, which is vitally important with a new technology. People are more likely to adopt emerging technology when it runs smoothly without interruptions or errors.” The FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive" An industry consortium can create a UWB ecosystem of interoperable technologies instead of individual companies launching products that consumers struggle to make work together, says Songukrishnasamy. “Simply, the FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive.” Founding members of the FiRa consortium ASSA ABLOY and HID Global, pioneers in secure access and identity solutions, are founding members of the consortium. Their technology manages access to physical and digital places, things, and identities. Another founding consortium member, NXP Semiconductors, is a pioneer in secure connectivity solutions for embedded applications. Other founding members are Samsung, which creates top-of-the-line TVs, smartphones, wearables, and other connected devices; and the Bosch Group, a global supplier of technology and services that is at the forefront of IoT innovations. Sony Imaging Products & Solutions Inc., LitePoint and the Telecommunications Technology Association (TTA) are the first companies to join the newly formed organization. Immune to radio frequency interference UWB is also immune to radio frequency interference, so it functions in high traffic settingsUWB introduces higher levels of accuracy in positioning capabilities and increased security for ranging data exchange compared to existing technologies. Fine ranging with UWB technology can localize devices and objects to 10 centimeters of accuracy with or without line of sight. UWB is also immune to radio frequency interference, so it functions in high traffic settings. These capabilities will enable a variety of use cases like secure, hands-free access control in hospitals, location-based services for ride sharing, and targeted marketing for retailers. FiRa will demonstrate UWB technology at upcoming trade shows. The FiRa Consortium aims to build on IEEE’s work with an interoperable high rate physical layer (HRP) standard, including defining an application layer that discovers UWB devices and services and configures them in an interoperable manner. The consortium also plans to develop service-specific protocols for multiple verticals and define necessary parameters for applications including physical access control, location-based services and device-to-device services. Promoting the adoption of UWB solutions As a consortium, FiRa is not just setting standards but actively championing use cases for UWB technology. Creating the consortium addresses the need to develop interoperability and implementation standards; brings key players together to create a rich UWB ecosystem; allows for the sharing of intellectual property; and promotes the adoption of UWB solutions. The FiRa Consortium is committed to educating and promoting new use cases" “Since UWB is a mature technology with new potential uses, there is a general lack of awareness of potential applications that take advantage of the technology,” says Songukrishnasamy. “The FiRa Consortium is committed to educating and promoting new use cases.” The FiRa name comes from Fine Ranging to highlight UWB technology’s use cases and distinction from older UWB technologies and solutions. Enhanced security in challenging environments Fine ranging powered by UWB can outperform other technologies in terms of accuracy, power consumption, robustness in wireless connectivity, and security, especially in challenging, high density environments. UWB previously served as a technology for high data rate communication and as such was in direct competition with Wi-Fi. Since then, UWB has undergone several transformations: UWB has evolved from an OFDM-based data communication to an impulse radio technology specified in IEEE 802.15.4a (2ns pulses with Time of Flight); and A security extension being specified in IEEE 802.15.4z (at PHY/MAC level) makes it a unique secure fine ranging technology. Moving from data communication to secure ranging allows ‘spatial context capability’ to be utilized by a variety of applications: seamless access control, location-based services, and device-to-device (peer-to-peer) services. Information is available at firaconsortium.org.
The mindset behind a new law to prohibit the use of facial recognition and other security-related technologies by San Francisco police and other city agencies is obvious in the name of the new ordinance: “Stop Secret Surveillance.” Ordinance To Stop Secret Surveillance The San Francisco Board of Supervisors passed the ordinance 8-1 with two abstentions on May 14, and there will be another vote next week before it becomes law. We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here" The irony of such a law emanating from northern California, where tech giants promote the use of numerous technologies that arguably infringe on privacy, is not lost on Aaron Peskin, the city supervisor who sponsored the bill. “We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here,” he told the New York Times. Regulating Facial Recognition Technology Although the facial recognition aspects of the ordinance have been the most publicized, it also targets a long list of other products and systems. According to the ordinance, "Surveillance Technology" means “any software, electronic device, system utilizing an electronic device, or similar device used, designed, or primarily intended to collect, retain, process, or share audio, electronic, visual, location, thermal, biometric, olfactory or similar information specifically associated with, or capable of being associated with, any individual or group.” Broadly interpreted, that’s a lot of devices. Includes Biometrics, RFID Scanners The ordinance lists some examples such as automatic license plate readers, gunshot detection hardware and services, video and audio monitoring and/or recording equipment, mobile DNA capture technology, radio-frequency ID (RFID) scanners, and biometric software or technology including facial, voice, iris, and gait-recognition software and databases. Among the exceptions listed in the ordinance are physical access control systems, employee identification management systems, and other physical control systems; and police interview rooms, holding cells, and internal security audio/video recording systems. The ordinance ban applies to city departments and agencies, not to the general public and exceptions include physical access control systems, employee identification management systems, and internal security audio/video recording systems Airport Security Not Part Of Ordinance The ban only applies to city departments and agencies, not to private businesses or the general public. Therefore, San Franciscans can continue to use facial recognition technology every day when they unlock their smart phones. And technologies such as facial recognition currently used at the San Francisco airport and ports are not impacted because they are under federal jurisdiction. Furthermore, the San Francisco police department does not currently use facial recognition anyway, although it has been deployed in places such as Las Vegas, Orlando, Boston and New York City. Safeguarding Privacy Of Citizens The ordinance appears to have a goal of avoiding government uses of technologies that can invade individual privacy, seeking to avoid worst-case scenarios such as an existing system in China that uses millions of surveillance cameras to keep close tabs on the Uyghurs, a Muslim minority population. Any new plans to use surveillance technology must be approved by the city government, and any existing uses must be reported and justified by submitting a Surveillance Technology Policy ordinance for approval by the Board of Supervisors within 180 days. Surveillance Technology Policy Banning use of facial recognition just when its capability is being realized is counterproductive But might such a ban on technology uses undermine their potential value as crime-fighting tools just when they are poised to become more valuable than ever? Ed Davis, a former Boston police commissioner, told the New York Times it is “premature to be banning things.” He notes: “This technology is still developing, and as it improves, this could be the answer to a lot of problems we have about securing our communities.” Technology development doesn’t happen in a vacuum and banning uses of facial recognition and other technologies just when their capabilities are being realized is counterproductive. We should be thoughtful, deliberate and transparent in how we embrace new technologies. However, discarding them out-of-hand using emotionally charged words such as “secret surveillance” does not promote the best use of technology to the benefit of everyone.
Almabani General Contractors has a long robust history which began when the founders established the company in Jeddah, Saudi Arabia, in October of 1972. They are a family-owned company that remains true to its founders’ spirit, covenants, innovation and perseverance. Almabani General Contractors For four and a half decades, Almabani have been building up their expertise to serve an ever more demanding and challenging construction need in the region. In a prosperous economy fueled by the oil boom, the company was positioned to participate in the execution of some of the most prestigious landmark projects in the Kingdom of Saudi Arabia. They have the highest classification in all civil and electrical works with in-house capabilities to develop design and value engineer solutions to cater to the customers’ needs. They have proudly executed projects from complex infrastructure works to heavy civil engineering structures. Engaged in highly competitive turnkey projects The company is engaged in highly competitive turnkey projects worth several billion dollars The company is engaged in highly competitive turnkey projects worth several billion dollars. To this end, Almabani continues to invest in quality, value engineering, proactive and talented people, endeavoring at all times to satisfy their customer’s expectations and to best serve the welfare of the society. Replacing decentralized access control systems Almabani General Contractors was using traditional decentralized access control & time-attendance systems in which they were facing the issue of excessive manual work and inaccurate data. Because of the poor quality of the existing biometric sensors, user fingerprints weren't recognized in the first attempt and the process was annoying and time-consuming. As the company is dealing with construction work, one of the major challenges for construction workers is accurate attendance marking despite dirty/stained fingers. Moreover, due to existing software limitations, many policies of access control and time-attendance couldn’t be implemented. As the existing system was decentralized, on-field employees faced issues while marking their attendance. Only basic reports could be prepared for attendance and access whereas they needed more customized reports because of various shifts and different contract workers. Moreover, third party integration was not possible in the earlier system. And last, but not the least, they were unsatisfied with support from the past supplier. Matrix access control and time-attendance solution Matrix solutions experts collaborated with the decision heads to understand the exact requirement and provide a cost-effective solution. After a comprehensive discussion, Matrix offered a centralized solution for all the locations. With the Matrix time-attendance and access control solution, the customer has overcome all the challenges. Now, it's possible for them to get control of all the locations from a single central location. Multispectral fingerprint sensor technology To stop inaccurate attendance marking, Matrix offered multispectral fingerprint sensor technology To overcome the problem of inaccurate attendance marking due to dirty/stained fingers, Matrix provided the multispectral fingerprint sensor technology which contains information about both the surface and the subsurface features of the skin. This technology gives a high throughput. They also acquired Palm Vein Reader for contactless authentication verification for the higher authorities. The solution from Matrix is fully customized with multiple shifts and attendance policies that can be applied to individual users. The smart mobile application for attendance marking and leave applications facilitate easy operation for users. Now, the customer is able to get the report of each employee with 200 different options. Auto-push technology With the auto-push technology, there is no need to transfer the data into the server. The data is automatically transferred to the server in real-time. The customer also got flexibility in terms of connectivity with 3G and WiFi options. The system from Matrix also provided the flexibility for easy integration with the third-party payroll system. Result: Accuracy in attendance management Centralized time-attendance and access control management High possibility of third-party integration User-friendly and fast process because of good quality sensor OEM support Contactless and advanced technology Flexibility in terms of integration, connectivity and credentials Products Offered: COSEC DOOR PVR – Palm Vein based Door Controller COSEC PATH DCFE – Biometric Fingerprint + RFID based Door Controller COSEC PATH DCCE – RFID based Door Controller COSEC PANEL LITE – Site Controller for Advanced Access Control Features COSEC LE PLATFORM – For 1500 + Users COSEC LE TAM – Time-Attendance Application Module COSEC LE ACM – Access Control Module COSEC LE ESS – Employees Self Service Module (Mobile App) COSEC INTEGRATION - Integration with In-house Payroll Software
Slovakian integrator, RYS, has recently deployed a system that provides a textbook example of how RFID access control can concretely improve people’s lives every day. Before automatic access control was introduced there, a Bratislava apartment building, known as ‘The Pentagon’, had suffered a reputation as a place to avoid. RFID access control system Drug dealers, vandals, and a similar criminal element were a chronic presence, leaving residents constantly feeling unsafe in their own homes. Idesco customer RYS was contracted to design and deploy an RFID access control system to better guarantee safety and enhance the residents’ quality of life. With over 30 years specialized experience in residential building access control, RYS designed a solution and chose Idesco to supply the over 100 RFID readers to be deployed. Currently, those readers control both ground floor access and section/hallway entrances on each floor. Elevator readers restrict residents’ access to their own floors. Access to only RFID tag-holding residents The system even restricts access to the building’s waste bins, ensuring their use only by its RFID tag-holding residents. Simultaneously, the entire system collects real time data about access events, including unclosed doors or unauthorized access attempts, to help strengthen prevention and control. Due to the building’s history of vandalism, RYS recognized the importance of choosing readers capable of withstanding malicious impacts, moisture and dust. Idesco optical tamper Idesco’s optical tamper proved better than many other readers whose manufacturers rely on mechanical tampers" Marcela Benuskova, RYS Assistant Project Manager, commented “Idesco’s optical tamper proved better than many other readers whose manufacturers rely on mechanical tampers. Whereas alarms should be sent whenever a reader is intentionally mishandled, mechanical tampers trigger false alarms more often than those cued optically.” Marcela continues, “The technical solutions Idesco and RYS implemented, combined with the efforts of an excellent crisis management team, triggered almost unbelievable changes inside that apartment building. Our access control not only strengthened crime prevention immediately, but also empowered law enforcement in discouraging unwanted or illegal activity.” Enhanced building security He adds, “As that building’s security increased, the market value of individual flats began trending upward. Today, the building’s residents feel safer and they have actually started thinking positively about their community’s future.” Marcela Benuskova with RYS closed by stating, “Idesco’s team is so nice to work with; they always respond fast, with a friendly, professional and positive attitude. Any technical question or problem gets looked at, given proper thought and action. They have always been open to, and repeatedly implemented, product changes we asked for.”
Rajant and Dejero’s Technology Springs into Action in the Battle Against a 420-Acre Wildfire on the Santa Barbara County Coast. A wind-driven brush fire triggered evacuations after breaking out along the Gaviota Coast in Santa Barbara County, California. On a sunny afternoon in mid-October 2019, the heat from the sun combined with winds gusting up to 40 mph through the quiet foothills of El Capitán Canyon, sparking a wind-whipped, vegetation brush fire in the overly dry desert hills. The blaze, dubbed the ‘Real Fire,’ quickly charred 420 acres while threatening more than 100 structures that sat along the Gaviota Coast before firefighters and emergency crews were aware of the fire and able to gain an upper hand on the wild blaze. Wind-Driven bush fire Coincidentally, Rajant and Dejero had just arrived in Santa Barbara for a demonstration with the Santa Barbara County Fire Department. Shortly after the fire broke out, word reached the emergency services and crews from the Santa Barbara County Fire Department, Cal Fire, the U.S. Forest Service, and other agencies who immediately dispatched their teams to contain the blaze before it spread further. The climate in the canyon at the time of the blaze was considered ‘critical fire weather’ with its dangerously dry grass and wind gusts. These conditions only encouraged the wind-driven bush fire to spread swiftly through the foothills on the north side of Highway 101 near El Capitán State Beach, California and east over the ridge. A good stretch of the 101 Freeway had to be shut down immediately—in both directions—and Amtrak routes through the area were canceled. Total communications solution At the peak of the fire, helicopters and fixed-wing aircrafts attacked the flames from the air with retardant and water drops Visitors at nearby ranches, campgrounds, beaches, and resorts were evacuated, and a warning was given to residents living in the nearby Dos Pueblos, Refugio, and Winchester Canyons. At the peak of the fire, helicopters and fixed-wing aircrafts attacked the flames from the air with retardant and water drops, while dozens of engines, along with bulldozers and hand-crews, fought it from the ground. At about that same time the fire broke out, teams from Rajant and Dejero, along with subject matter expert Bruce Arvizu from the Department Homeland Security, had arrived in Santa Barbara. Together, they were prepared to deliver a live safety demo to the Santa Barbara County fire chief on how the companies can together provide the total communications solution. Improved spectrum efficiency The planned public safety demo was also to show how the blending of Rajant’s technology with Dejero Smart Blending Technology (SBT) eliminates drops and gaps—a solution comprised of mesh radio communications, blended cellular, and satellite technologies to bridge the communication gap in remote locations where signals are often weak or lost. While LTE networks provide high bandwidth, lower latency, and improved spectrum efficiency, LTE can also become spotty and drop signals in remote locations and other areas. Dejero’s Smart Blending Technology (SBT) fills in these gaps in the Wide Area Network by seamlessly blending any available LTE with SAT comms to guarantee a connection for the responding teams. Signal continuity becomes even more challenging in valleys, around mountains, and along coastlines, which becomes mission critical when emergency services are responding. Continuous and reliable connection More than 200 firefighters were on site fighting the fire with reinforcing containment lines of helicopters Rajant’s mesh radio technology bridges the gaps in these local areas. When the three technologies are used together, a continuous and reliable connection is provided, ensuring that communications between the responding agencies and their teams in the field are not lost. Meanwhile at the El Capitán canyon, more than 200 firefighters were on site fighting the fire with reinforcing containment lines of helicopters and drones in the air and 30-ton bulldozers on the ground cutting out ‘catlines’ and uprooting vegetation, thus eliminating the fire’s fuel. By plowing through the flames, brush, and trees with the dozers, the emergency crews saved valuable manpower and shortened the fire’s reach and life. When fighting fires with bulldozers, it is critical for the commander in control to receive data from each dozer to manage fighting the fire collectively as a team and to track each dozer individually. Critical local data Rajant and Dejero quickly proposed to the fire chief the benefits of their combined technology at a time of crisis and asked to allow Rajant and Dejero to modify their presentation from a demo to a real life exercise. “Our county firefighters are willing to do whatever it takes to get that job done. When we do our after-action review, the successes and failures always come out. And we like to capitalize on our successes.” said Daniel Bertucelli, County Fire Captain Santa Barbara County Fire Department. Rajant BreadCrumbs® can be mounted to the bulldozers so the critical local data could be transmitted while other situational data and mapping could be revived in the field. Dejero SBT would power the Microsoft Tactical Truck and provide the bridge from the field to the command post over cellular and SAT networks, during this actual emergency situation. Combined firefighting attacks More than 400 acres had burned with no structures damaged and no reported injuries Notably, the SAT comms on the vehicle was to be powered by Kymeta’s flat-panel dish technology, enabling true ‘comms on the move’ to best leverage Rajant’s Kinetic Mesh®. The updated mission was green lighted. On Friday morning, Rajant and Dejero meet with the fire squad at the command control center. Rajant BreadCrumbs and camera systems were mounted to dozers while the Microsoft mobile comms truck, with the Dejero GateWay on-board, maintained a close, but safe, proximity to the dozers to provide LTE. The firefighters manning the bulldozers were able to communicate in the valley when normally they could not. Data was sent from the bulldozers to the van to the internet where the command control center could receive the video feed. The real-life demo was a success. The combined firefighting attacks on the blaze gained the upper hand and went from a 20-percent containment on Thursday evening to 50-percent by Friday afternoon. By Monday, the Real Fire was 100% contained. More than 400 acres had burned with no structures damaged and no reported injuries. Evacuations were lifted for all areas.
Sepura’s Italian partner GEG has donated vital critical communications equipment to an emergency hospital in Italy, to aid the country’s medical support during the COVID-19 outbreak. COVID-19 health facility The rapidly deployed Fiera di Bergamo hospital is situated in an event venue in Bergamo, the worst affected region in Italy and is managed by staff from a nearby permanent hospital. The facility was constructed in just a week, supported by private and corporate donations and volunteer support from the region. The facility comprises 142 beds including over 70 intensive care beds and access points for both ambulances and helicopters. As a mark of the community endeavor behind the construction, the canteen is being run by the locally-based Michelin-starred chef Vittorio Cerea, with his family volunteering to provide meals to the emergency staff. Sepura SC21 TETRA radios To ensure that all medical staff, logistic support and volunteers can communicate effectively, GEG have donated a complete critical communications system to the site, comprising of 50 Sepura SC21 TETRA radios, programming software and a TETRA base station from DAMM to provide the local network. The radios have been provided with individual battery chargers and belt clips to reduce the amount of contact with hands and to reduce the risk of cross contamination. For the control room, GEG have provided a desk mounted SRG3900, multiple charging units and desktop programming devices to ensure that the radios are correctly set up for emergency use. Training to radio fleet administration GEG also delivered training to all radio fleet administration staff on basic radio use After performing a full site inspection and installing the base station, GEG also delivered training to all radio fleet administration staff on basic radio use, including switching between talk groups and making full duplex calls. Ian Gotti, Sales Area Manager for GEG said, “Communication is particularly important in this environment, as many of the key workers in this highly pressured environment are not used to working together; on site there are member of both the Italian and Russian armies, volunteers from international emergency response and civil protection organizations, nurses and medical staff from all across Italy and many maintenance staff across site covering many functions.” He continued, “We are proud for GEG to have played our part in enabling Italy to fight back against the coronavirus and we stand with the emergency teams on the frontline that are providing the expert medical help patients desperately require.” TETRA radio communication systems Due to the protective masks worn on the mouth, communication over a critical communications device was the only available solution to the workers. The Sepura radios allow for a very quick configuration and programming of the fleet and also an efficient way to link the fleet to the control room which was vital in this situation. The radios have the additional advantage of being easy to clean and sanitize, capable of functions with minimal use of hands and provide guaranteed secure coverage even in the deepest parts of the building. Enhancing communications Victor Rodrigues, Strategic Account Director for Sepura said, “GEG have many years’ experience in selling TETRA systems into environments such as hospitals and it is a tribute to their dedication that the system was up running so quickly to support the emergency operation. We pass our best wishes to the medical staff on the frontline.”
Around 7,000 people pass through the Luminy faculty’s suburban campus every day. As part of a major project to modernise two buildings, university managers sought a retrofit-ready access control solution to upgrade security. Aperio locks University administrators selected Aperio locks to secure doors in the new buildings. With Aperio, facilities, the staff can deal with lost keys more efficiently. The laborious process of changing locks and reissuing keys — part of the daily workload with mechanical locking — vanishes. Luminy campus is equipped with 372 Aperio Electronic Cylinders & 42 Aperio Electronic Handles with built-in RFID readers The Luminy campus is now equipped with 372 Aperio electronic cylinders & 42 Aperio electronic handles with built-in RFID readers. Locks are integrated seamlessly, wirelessly and online with Luminy’s ARD access control system. One key goal was to deter theft, which was becoming a problem in teaching areas — especially those with computers. “Since we installed Aperio, we have not had a break-in,” says Cédric Lopez, Maintenance Manager at Luminy. Campus security and incident management In addition to theft deterrence, Aperio met broad, stringent criteria for the security upgrade. Staff and students carry individual access smart-cards. Doors and credentials are easily programmed and reprogrammed to accommodate everyone’s changing access needs. Luminy’s security team has complete control over access permissions and campus traffic — in real time. Because their new Aperio devices are integrated online, the staff can see a ‘live’ overview of the campus and respond proactively to incidents. Aperio is trusted to protect the most sensitive areas of the campus. “We have critical premises, including for the storage of chemicals, some with radioactive properties,” adds Lopez. Seamless integration with university’s scheduling system Aperio locks are built on an open platform for easy integration with the university’s scheduling system Aperio locks are built on an open platform, so they are flexible enough to integrate with the university’s room scheduling system. “Teachers are able to reserve their rooms. Students no longer have to wait for the teacher’s arrival, because they have access to the right rooms in defined time slots,” says Cédric Lopez. The credential students already carry automatically opens classroom doors, if they have pre-authorized access rights. For the facilities team, the ARD interface displays scheduling for all relevant rooms in real time. Aperio wireless technology Luminy site managers have already scheduled further real-time access control upgrades built around award-winning Aperio wireless technology. As Luminy staff discovered, the benefits of Aperio extend beyond just enhanced campus safety and student security. The Aperio for Universities Solution Guide explains how you can upgrade and streamline security at your campus. Learn more about Aperio® at https://campaigns.assaabloyopeningsolutions.eu/aperio-university
Three more UK police forces have jointly upgraded to Sepura SC20 TETRA radios, significantly improving their front line officers’ ability to communicate with colleagues. Bedfordshire Police, Cambridgeshire Constabulary and Hertfordshire Constabulary made use of their joint purchasing power to equip officers from across all three forces with the new SC20 TETRA radios. In all over 1,900 radios were purchased across the three forces, to work alongside their existing fleet of Sepura radios. SC20 TETRA radios By using the SC20 TETRA radios, officers will benefit from powerful, robust radios with loud, clear audio By using the SC20 TETRA radios, officers will benefit from powerful, robust radios with loud, clear audio, ensuring that critical voice communications can be clearly heard and understood, even in noisy environments. In addition the radios are applications ready, meaning that each force can in time develop bespoke applications to enable quick, secure access to critical data. A key advantage of the Sepura solution is that their radio programming solution Radio Manager can work across different Sepura products, meaning that the transition to new devices is as smooth as possible. Intuitive user interface Andy Gregory, Business Development Director at Sepura said, “After conducting trials, the response from the forces was that the SC20 benefitted from robust design, an intuitive user interface and loud audio, making it ideally suited to the users’ operational needs. The sale is significant to Sepura of course, as Cambridgeshire are Sepura’s ‘home’ force, and many of our staff live in Bedfordshire and Hertfordshire where the new radios are now being deployed.” Gary Maughan, Regional Sales Director for the UK and Ireland at Sepura added, “Sepura radios continue to be chosen by police organizations in the UK and across Europe as the leading TETRA device available on the market today. We are proud to work with our local forces as we do with all UK police forces, ensuring that they are equipped with the best communication solution possible.”