Research & Testing
Telaeris, a handheld badge verification and emergency mustering solutions provider for physical access control systems (PACS), has announced its XPressEntry software integration with Maxxess eFusion access control software. XPressEntry - eFusion integration Maxxess access control customers can now use a variety of XPressEntry compatible handheld badge readers to quickly muster employees during an emergency evacuation, verify identity, perform medical screenings at entry points, record entries...
Klaus P. Hruschka, Head of Technology Sales at sensor specialist HENSOLDT, has been appointed to the board of trustees of the Fraunhofer Institute FKIE (Fraunhofer Institute for Communication, Information Processing and Ergonomics) in Bonn-Wachtberg. As a renowned institute for application oriented research and practical innovation in information and communication technology, the FKIE works in close cooperation with strategic partners on the entire processing chain of data and information. The...
Bugcrowd, the crowdsourced security company, released its 2020 Inside the Mind of a Hacker report, the study to date on the global hacking community. Among the report’s key findings, human ingenuity supported by actionable intelligence of the Bugcrowd platform were found to be critical ingredients to maintaining a resilient infrastructure. AI-powered solutions not enough In fact, 78% of hackers indicated AI-powered cybersecurity solutions alone aren’t enough to outmaneuver cyber a...
Digital Guardian announced that it has released a new research report, The DG Data Trends Report, which assesses the risk of sensitive data loss during the COVID-19 crisis. The research is based on aggregated and anonymized data from nearly 200 customers of Digital Guardian’s Managed Security Program around the globe. It represents a wide range of organization sizes and industries, including financial services, manufacturing, healthcare, and business services. As they continue to work fro...
The COVID-19 crisis causes a burden for companies that have to finish their testing and certification programs because of standards that will be superseded. Examples are the EN 60950-1:2006 and EN 60065 that are used for conformity testing of fire and security products for the Low Voltage Directive 2014/35/EU. Euralarm, therefore, urges to postpone the end date of the co-existence period of the EN 60950-1:2006 and EN 60065 with nine months. Test houses and notified bodies affected by COVID-19...
Feenics has announced that its Keep by Feenics cloud-hosted access control platform is now certified and approved for government and federal agency use in Personal Identity Verification (PIV) credentialing and Physical Access Control Systems (PACS). FIPS 201-2 Evaluation Testing Feenics attained its listing on the GSA Approved Products List (APL) for all versions of Keep after completing the Federal Information Processing Standard (FIPS) 201-2 Evaluation (sometimes called FICAM) Testing Progra...
Pelco Learning Center (PLC) is an online platform that gives clients access to training content 24 hours a day, seven days a week. Users can smoothly manage their organization’s required certifications for key Pelco products, while increasing their knowledge of Pelco’s solutions to ensure their company is fully leveraging all that they have to offer. Other key benefits include: Organized eLearning content in a single location Tracked progress and performance More efficient learning and development time Reduced support time and cost during troubleshooting Improved buying experience for end users and resellers Access the PLC Portal to gain access to a wide range of practically beneficial training content and certification courses to maintain the competitive edge in the industry by harnessing all that Pelco has to offer.
Quantum Corporation announced it has entered into an agreement with Western Digital Technologies, Inc., a subsidiary of Western Digital Corp., to acquire its ActiveScale object storage business. The addition of the ActiveScale product line and talent brings object storage software and erasure coding technology to Quantum’s portfolio, and enables the company to expand in the object storage market. The acquisition demonstrates Quantum’s commitment to innovation and growth, extending the company’s leadership role in storing and managing video and unstructured data using a software-defined approach. Quantum and Western Digital are committed to executing a smooth transition for customers and key stakeholders, with Quantum providing post-closing continued support for ActiveScale products and a strong commitment to invest in - and enhance - the ActiveScale product line. Key technologies for managing video Industries like advanced driver assistance systems are generating huge amounts of similar data The transaction is expected to close by March 31, 2020, subject to the satisfaction of customary closing conditions. Financial terms of the transaction were not disclosed. Quantum expects the initial financial impact of the transaction to be neutral to slightly accretive to current business operations and additional guidance will be provided with the release of the fiscal Q4 2020 financial results. Video and other forms of unstructured data are growing exponentially in every industry. IDC forecasts this type of data will represent over 80% of all the world’s data by 2022*. Examples of this unstructured data include video and images for entertainment, surveillance and security, marketing and training, and more. In addition, industries like genomics research, advanced driver assistance systems, geospatial exploration, and more are generating huge amounts of similar data. Hierarchical file system structure This content requires high-speed capture and processing (typically done with a file system like StorNext), then is generally retained for many years or decades. Object storage software has a number of attributes that make it particularly well-suited for a wide range of datasets: Massive Scalability: Store, manage and analyze billions of objects, and exabytes of capacity. Highly Durable and Available: ActiveScale object storage offers up to 19 nines of data durability using patented erasure coding protection technologies. Easy to Manage at Scale: Because object storage has a flat namespace (compared to a hierarchical file system structure) managing billions of objects and hundreds of petabytes o capacity is easier than using traditional network attached storage. This reduces operational expenses. Object storage software for active archives Quantum has a history of success delivering object storage and has been selling and supporting the ActiveScale product line for over five years. Object storage can be used as an active-archive tier of storage – where StorNext file storage is used for highest performance ingest and processing of data, object storage acts as lower cost online content repository, and tape acts as the lowest cost cold storage tier. In a diverse range of industries spanning media and entertainment, genomics and life sciences, autonomous vehicle research, and university research, ActiveScale can serve a number of use cases: Object storage in media production: Object storage is used as a long-term content repository for video content, in movie and TV production, in sports video, and even for large corporate video departments. Customers in movie and TV production require very high performance ingest, edit, processing, rendering of their video files, which typically is done with a file system like StorNext. Once content is finished, it is preserved in an object store, with StorNext data management handling the data movement between file and object tiers. Storage for video surveillance Object storage for enterprise archiving and long-term retention: As object storage has matured, all leading backup applications can now backup data to an object target, and enterprise IT departments are looking at object storage as a long-term content repository. Object storage for genomics and life sciences: Genomics sequencing and other life sciences research generates a massive amount of data, that must be processed and analyzed quickly (typically with a clustered file system like StorNext), then archived on object storage. Object storage for video surveillance: Object storage is also used as a tier for multi-petabyte surveillance infrastructure. Video is typically captured and recorded on higher-performance servers, then archived on object storage. Certified third-party object stores As Quantum returns to a growth path, we will be evaluating strategic acquisitions that bolster our technology portfolio" To serve the needs of these use cases and others, Quantum StorNext is certified with many leading public and private object stores today. With the addition of the ActiveScale product line, Quantum will remain committed to maintaining an open ecosystem of certified third-party object stores, with StorNext providing the ability to move data to these third-party object tiers. “As Quantum returns to a growth path, we will be evaluating strategic acquisitions that bolster our technology portfolio,” says Jamie Lerner, President and CEO, Quantum. "Object storage software is an obvious fit with our strategy, our go-to-market focus, and within our technology portfolio. We are committed to the product, and to making ActiveScale customers successful, and we look forward to engaging with them to solve their most pressing business challenges around storing and managing unstructured data. Erasure-coded object store software “With the addition of the engineers and scientists that developed the erasure-coded object store software, we can deliver on a robust technical roadmap, including new solutions like an object store built on a combination of disk and tape." "With Quantum’s resources, technical expertise and focus on solving customers’ challenges with managing video and other unstructured data, we believe ActiveScale will enable new value for customers,” said Phil Bullinger, Senior Vice President and General Manager of Western Digital’s Data Center business. “Western Digital and Quantum are each committed to continuity of support for existing ActiveScale customers.”
DICE Corporation is proud to announce and welcome Avi Lupo as the company’s Executive Vice President. Lupo will play a leading role in the company, contributing to high-level organizational decisions, product development and new business opportunities. He will also be integral in establishing new sales and marketing expansion strategies for the company’s growing cloud video recording technology, CloudEye. “We are very happy to have Avi on our team,” said President and CEO Cliff Dice. “As one of the leaders in research and development for the security industry, we continue to experience tremendous demand for our products and solutions. Avi’s background in video and commitment to broadening industry expectations will bring a fresh perspective and approach to what we do at DICE Corporation.” Interactive security technology Lupo formed strategic alliances that introduced Video as a Service (VaaS) to the security industry With over 30 years of management experience in the security industry, Lupo comes to DICE Corporation from Kent Technologies in Miami, Florida, where he served as the company’s President and CEO. As a provider of video and security services for a wide range of industries, Lupo led the organization in developing robust preventive and interactive security technology, including camera, surveillance, facial recognition and remote guarding services throughout North America. Prior to his time at Kent Technologies, Lupo served as the CEO of FST21 America, a security technology company with offices in Israel and the U.S. and served as Co-Founder and President of OzVision Global, a developer of advanced video solutions in the international security monitoring market. Video as a Service Among his many accomplishments, Lupo formed strategic alliances that introduced Video as a Service (VaaS) to the security industry, establishing industry standards. “I am honored to be part of such an innovative company and growing team of professionals,” Lupo said. “I see DICE as a leader in the future of the security industry, and I look forward to contributing to the vision and expansion of the company.”
The Security Industry Association (SIA), the trade association representing more than 1,000 companies and organizations developing and delivering security solutions, thanks the National Institute of Standards and Technology (NIST) for its thoughtful and diligent work producing a report evaluating the performance of current facial recognition technology across demographic groups. Facial recognition is a fast-advancing technology in a constant cycle of improvements and is widely adopted across the public and private sectors. Reports from non-biased organizations like NIST are immensely valuable. SIA commends NIST for encouraging research organizations to examine this issue comprehensively, rather than publish incomplete research in order to generate attention. Benefits for homeland security Demographic differentials are lessening due to high-performing algorithms producing fewer errors Facial recognition solutions offer tremendous benefits for homeland security and public safety applications, and the clear advantages of this technology necessitate that steady improvements be made and documented to ensure that the public can trust this technology’s public benefits. The NIST report found that demographic differentials are lessening due to many of the high-performing algorithms producing fewer errors. The report also emphasized that many facial recognition use scenarios require trained humans to remain integral to the process. Whether in an investigation of a potential crime or identifying an individual at a port of entry, SIA believes trained personnel are critical to the successful deployment of this technology. Facial recognition processing algorithms In light of the NIST report, SIA encourages its members and all facial recognition technology companies to strive to eliminate bias from within facial recognition processing algorithms, and SIA encourages such firms to enlist diverse data sets when testing their algorithms. “The NIST study provides clear data that can help shape advances in facial recognition,” said Don Erickson, CEO of SIA. “SIA encourages collaborative efforts by member companies and involving key stakeholders with the goal of improving facial recognition algorithms and eliminating significant accuracy variation or potential bias. Our members look forward to a strong continued working relationship with NIST and its scientists as these technologies improve and go even further in protecting human lives.”
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announced that it will unveil new headquarters in the City of London, in the autumn of 2019. The announcement follows a period of accelerated growth for Genetec in the United Kingdom, with a significant and sustained increase in EMEA revenues over the last five years. Some of the company’s flagship customers in the UK include the Royal Borough of Windsor and Maidenhead, Twickenham Stadium and the University of Hull. Paul Dodds, Country Manager, UK & Ireland, commented: “At a time when Brexit has seen many organizations reconsider their presence, Genetec is unequivocal about the role of the United Kingdom as a critically important part of the global economy. As such, we’re delighted to be opening a central London headquarters to better meet the needs of our channel partners, end users, and prospects.” Public safety applications We work with local partners to provide training, compelling educational experiences, and state-of-the-art support The new headquarters will incorporate an expanded state-of-the-art training facility, and a new ‘Genetec Experience Center’ housing innovative solutions from Genetec and its large ecosystem of technology partners. Furthermore, the office will house a dedicated research and development team focused on justice and public safety applications for law enforcement, emergency responders and local government. Michel Chalouhi, VP of Global Sales, added: “The new London headquarters will give us the perfect platform to continue to execute our UK strategy and sustain the excellent year-on-year growth that we’ve achieved globally over the past years. The security market is growing and changing rapidly. We are constantly facing new challenges, so we need to ensure we work with our local partners to provide up-to-date training, compelling educational experiences, and state-of-the-art support. Our base in London will help us do that, thanks to its fantastic location, facilities, and links.”
Qualitest, the largest independent software testing and quality assurance company, announced that Yoav Ziv will be joining its executive leadership team as its first Chief Transformation Officer. In this new role, Mr. Ziv will focus on operationalizing and evolving a strategic framework for the organization, while identifying and implementing a range of initiatives that will speed growth and add further value for Qualitest’s clients. Mr. Ziv joins the company from Amdocs, where he served as General Manager of its largest account, a global communications and media provider. Prior, he served as Head of Amdocs’ Testing Business Unit where he transformed a traditional testing organization into a market-leading DevOps driver with more than 3,000 global professionals. Expert in using operations methods Mr. Ziv is also a transformation specialist and a renowned expert in using operations methods that improve organizational performance, such as Lean, Theory of Constraints, DevOps and other operational research practices. The creation of the new role of Chief Transformation Officer is a substantial step forward for Qualitest"Commenting on the appointment, Norm Merritt, CEO at Qualitest, said: “The creation of the new role of Chief Transformation Officer is a substantial step forward for Qualitest. We are committed to making significant investments in our people, processes and footprint that reinforce our delivery excellence and our position as an employer of choice. I’m delighted to welcome Yoav to the team to continue to drive our momentum forward.” Identifying sustainable growth strategies Yoav Ziv added: “I’m looking forward to joining the Qualitest team at such an important time as it continues to invest and expand across multiple regions and industries. There is real potential for the future as we focus on driving long-term growth by helping the world’s most innovative brands transform their testing efforts into strategic, quality engineering operations.” Yaron Kottler, Qualitest’s Chief Operations Officer said: “Yoav brings with him an impressive track record of identifying robust and sustainable growth strategies for complex, global professional services organizations. He has a deep understanding and knowledge of today’s industry landscape, as well as proven leadership skills and the ability to transform multifaceted strategies into meaningful results, ultimately fortifying our customers’ success and enhancing our growth.” Based in New York, Yoav will start with Qualitest on 1 September and will be a member of its executive leadership team.
IHS Markit projects that the market for physical electronic access control solutions has grown to over $5.2 billion in 2018. The market has experienced stable and predictable growth rates that have hovered around 6 percent over the past several years. Electronic locks remain both the largest and the fastest growing product type in access control, representing nearly 40% of the global market size for all access control equipment. Impact Of Technological Developments While market growth rates have been consistent, technological developments have dramatically impacted the market in 2018. The most prominent trend involves mobile credentials, which are poised to revolutionize the longstanding business model for access control system sales. The mobile credentials market was still in its infancy in 2018, but many end-users are already anticipating a transition to these credentials by installing compatible readers in their systems. By 2020, over 10 percent of all new readers sold in the market will be compatible with mobile credentials. Access Control As A Service Other trends to watch in 2019 and beyond include Access Control as a Service (ACaaS), which allow end-users to avoid the need to invest in costly on-site IT infrastructures to support their access control equipment. ACaaS solutions will be particularly popular to support small and mid-sized projects that service less than fifty doors. In addition, Bluetooth Low Energy (BLE) beacons will support geopositioning in an increasing number of the world’s most advanced access control systems. Through geopositioning, the exact location of specific personnel can be identified at any site in real-time. The top fifteen access control vendors represent more than half of the total size of the global access control market, but there are pockets of opportunity for new vendors, particularly to accommodate small and mid-sized projects. The mobile credential and ACaaS markets will also be highly competitive in 2019 and should attract an influx of new market entrants.
Part 3 of our Intercoms in Security Series: Zenitel’s Call Access Panel manages intelligible critical communications through a security operations center or control room Greater connectivity, security software enhancements, more customization, and better sound quality are some of the enhancements driving the intercom market.An advantage now offered on Code Blue’s emergency speakerphones include self-diagnosing software that monitors the status of the phones and their components — microphones, buttons and speakers — and delivers instant notifications if there is ever an issue. Code Blue phones also come with full duplex capabilities with echo cancelling, sometimes known as open duplex, which allows the caller and first responder to communicate simultaneously and eliminates buzzing and static. IP-Based Networking Systems Code Blue also builds its phones to open standards like Session Initiation Protocol (SIP), which allows calls to be easily processed with a wide variety of systems and software solutions, says David Fleming, Chief Design Officer for Code Blue Corp.Networking has impacted the intercom market, with the advent of IP-based systems. The corporate network now makes it possible to share information and to control units from a few yards to thousands of miles away, according to Bruce Czerwinski, U.S. General Sales Manager, Aiphone Corp. For example, central command center guards can monitor and allow entrance to any networked satellite or unmanned facility 24/7. Multi-Site Communications Networks have also spawned mobile apps that allow roaming guards to use smartphones and devices to maintain total control of an intercom system while away from the master station and on the Wi-Fi. And network paging is another recently added communications tool, valuable for routine announcements or emergency instructions. "Voice is becoming the killer app for serving the safety and security needs of employees and customers" “We’re now able to offer large-scale multi-site communications using intercom systems,” says Czerwinski. “That’s not just connecting a few buildings on opposite sides of a campus quad, but all those separated by state lines, even across the country.”As markets and customers served by intercom products continue to evolve with new needs requiring new solutions, intercom companies continually poll the market and develop new and interesting solutions for these needs.All-In-One Physical Access Control SolutionBecause intercom manufacturer 2N’s products are often used as part of a physical access control system, convenience and security are key attributes. Bluetooth technology will be employed heavily. 2N has just introduced its Bluetooth access control reader for both standalone access control and integrated into 2N’s VERSO door station.The technology is based on Bluetooth Low Energy (BLE) technology, which offers long-range detection (up to 10 metres), low energy consumption and ‘banking’ level security. It can be combined with other technologies — near field communication (NFC) and radio-frequency identification (RFID) — for an all-in-one solution.Mobile Video App For Door Intercoms 2N has also launched a mobile video app/service. It enables a consumer’s smart device to be used as an interface to the door intercom, allowing video calls from anywhere in the world, door access control, and as an ‘always on’ video and audio surveillance system. Notifications can be launched automatically; for example, if someone approaches the homeowner’s door, porch, or surrounding area. A low-cost all-in-one door station — Base — has been released for the residential and small business space, including HD video, audio, and door control but in a simpler-to-install and lower-cost format. Zenitel’s Customer Intercom Station Kit enables customers to build their own stations In the spring, 2N is releasing a Z-wave networked door control solution that’s easy to install and extends the reach of an access control system.Off-The-Shelf Communication DevicesJim Hoffpauir, President of Zenitel North America, says the intercom company offers a choice of either off-the-shelf communication devices or components to enable customized stations to be built based on a customer’s aesthetics or form and/or function needs. Users also must be heard and be understood, says Hoffpauir. “We spend millions of dollars in research and development on the intellectual property that defines and sets the standard for intelligible voice audio in the communications industry,” he says. “And we focus on embedding that capability with strategic alliances in access control, video and unified communications.”“Voice is becoming the killer app for serving the safety and security needs of employees and customers,” says Hoffpauir. “We want to create new interoperable solutions such as our networked HD Video Door station that acts as a communication device as well as an access control station.” It has two-way communication for 24/7 video identification and support for IP phone or unified communications through SIP. Intelligible Critical Communications Solutions Zenitel’s Call Access Panel manages intelligible critical communications through a security operations center or control room. The panel has a small footprint with pre-programmable buttons for instantaneous emergency or mass notifications to all intercom stations or IP public address, alarms, or horns. And it is SIP-compatible for unified communications. Changes in hardware and software are transforming the intercom market, as are changes in how systems are combined and configured. There is also a trend toward more discernment in terms of audio quality and system performance. Including an evaluation ‘scorecard’ in a request for proposal (RFP), for example, can ensure there is a clear way to evaluate systems being considered. “We are teaching the market there can be a legitimate scorecard on intelligibility,” says Dan Rothrock, SVP of Global Strategic Alliances, Zenitel North America. “You may not know you have bad audio until something bad happens, and it’s too late.” Read part 4 in our Security Intercoms series here
Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file Since the late 1990s, iris recognition technology has been used in banks and airports as a means of identity authentication. Today, its use is widespread in government facilities, schools/research centers, correctional/judicial facilities, healthcare and others. There are a number of reasons for its rising popularity, but first, a brief overview of the technology is in order. Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file in the system to verify and authenticate identity. The iris pattern has the most desirable properties for verification compared to other biometrics because of its uniqueness, stability over time and relatively easy accessibility. It also has the highest accuracy among all biometrics. Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology 1. Ease of use Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology. In fact, it’s as simple as taking a selfie. In the enrollment process a camera captures a detailed image of the iris and the system’s biometric software makes a template or 'map' of the person's iris pattern for storage in the system. To verify identity later, an individual simply looks at the iris reader from a comfortable distance, and the system compares the patterns in the individual's iris against the templates stored in the database. If there's a match, the individual’s identity is verified. 2. Cost Whether used in security or business applications, iris readers are proving cost effective – particularly from a lifecycle perspective. There are no cards to be replaced when worn out or lost; no RFID blocking sleeves are necessary to prevent hacking; and operations can be streamlined through reduced time and labor. Some systems allow scanning of up to 30 people per minute from a distance of several feet. And because no contact with the camera is required, either for enrollment or authentication, wear and tear on the cameras and contamination issues are greatly reduced. In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card 3. Vulnerability It has been said that using lower-accuracy access systems such as cards/readers for facility access is the equivalent of locking a car door – easily compromised. Stolen cards can be duplicated or the information contained in the card can be used to hack into other areas of a facility. These vulnerabilities can lead to a less secure environment and put the safety of employees, visitors and assets at risk. Iris readers can overcome many of these concerns and help ensure a higher level of security. There are no cards to be lost, loaned or duplicated, and iris information cannot be falsified. An iris cannot be shared or stolen, and iris readers cannot be fooled by makeup, hair or clothing changes. 4. Identity Authentication In common access control systems, access is authorized either by the reader/controller or by the reader/server based on presentation of a pre-programmed access card by the individual. Neither decision is dependent upon any type of identity recognition. Without physical identity verification, the reader does not have the ability to confirm that the user is in fact the individual assigned to that card. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card. However, because cards can be stolen, loaned, lost or duplicated, that link is both tenuous and vulnerable. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers. Iris recognition access control systems on the other hand require authenticated identification before allowing access. The individual is uniquely and permanently linked to their iris. Some readers even work in outdoor environments as well as through eyeglasses, sunglasses, and contact lenses. 5. Multiple uses As an identity management solution, iris readers have been deployed in mainstream security locations in addition to environments as diverse as federal, state and local law enforcement, correctional facilities, travel and border security, healthcare and financial services as well as sports and entertainment venues. Outside security applications, organizations that are investigating ways to update and improve business procedures are considering the efficiency and productivity gains with the use of biometrics. Examples include protecting against insurance fraud, maintaining time and attendance records, and even ensuring a patient gets the right medication in a hospital. And, because of the non-contact interface – the user simply looks into the iris reader – the technology is often selected for applications where the user is gloved, such as in pharmaceutical manufacturing or in a construction site or port, or in environments where users wear protective clothing. A benefit of iris recognition systems is the capability for integration with other security systems to improve access control security 6. Integration Another benefit of iris recognition systems is the capability for integration with other security systems to improve access control security and provide greater operational efficiencies. For example, available today are IOM Android® tablets that fuse access control readers, biometrics, keypads, intercoms, cameras and more. These iris biometric-embedded tablets combine the accuracy and convenience of iris recognition with the functionality and customization of a mobile computing platform for increased security levels. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies 7. Throughput Efficiency in system usage is critical for high volume throughput in applications such as airports/border crossings. It’s also critical in maintaining efficient throughput in facility access or at large public venues where lengthy delays could lead to user dissatisfaction and ultimately security vulnerabilities. To overcome these obstacles, new systems on the market offer high speed, making it possible for users to simply walk through a checkpoint without the need to stop and look into a reader. Iris recognition’s accuracy rates also contribute to ease of throughput. It’s extremely low FAR (False Acceptance Rates) and FRR (False Rejection Rates) are superior to those of other biometric modalities, making it better positioned for widespread usage. Iris recognition has proven to be a game changer in both physical and logical security. Its strong authentication capability also has potential for the home security market in devices such as biometric locks, Bluetooth devices and even cloud-based security. As costs come down, innovations will abound and the seven things you now know will help you navigate the future of biometric security.
Penetration testing of physical security systems is used to evaluate if a company’s security measures operate as intended. From a technology angle, penetration testing (pen testing) assesses whether the totality of the systems operate as designed, rather than testing each individual component. Does the system work with the officers, the policy and procedures that are in place? A session at ISC East, Nov. 20 in New York, will address the need for and benefits of penetration testing (also known as red teaming). The session, titled “We Sneak into High Security Buildings and Get Paid for It,” will be presented by Michael Glasser, President, Glasser Security Group. He has two decades of experience providing security design strategic planning, implementation oversight, auditing and penetration testing. “Penetration testing determines whether people and systems are providing the protection you think they are,” says Glasser. Various system components should come together into a solution that works for the client. People, technology and architecture are all components of successful security systems. His motto: “Stop guessing and starting testing." Test-driving security systems “You can compare it to driving a car,” says Glasser. “You want to be sure the brakes work and the engine works, but then somebody has to test-drive the car.” Stop guessing and starting testing" The concept of penetration testing goes back to the Cold War, when the military had “Red Teams” and "Blue Teams,” competing squads that used their skills to imitate attack techniques enemies might use. More recently, the term “pen testing” has become common in the cybersecurity industry, often referring to “white hat” hackers that test the effectiveness of cybersecurity measures. Applying the concept to physical security in corporate America brings the concept full circle. “People think their controls work, but they realize they really need to see if it all works together,” says Glasser. Pen testing in corporate America “You can go to any military base or nuclear power site and you see pen testing,” says Glasser. “But often it doesn’t happen in corporate America.” Sometimes physical pen testing is approached as an extension of cybersecurity testing because addressing physical threats is an element in cybersecurity, too. “It’s the same service, except to make sure the physical house is in order,” says Glasser. Glasser’s session will be among the SIA Education@ISC East presentations scheduled at the education theaters on the show floor at ISC East, Nov. 20-21 at the Javits Center in New York. The process If you believe the movies, Glasser’s job is all fun and excitement, like a “bunch of kids having fun.” The reality is more mundane, he says. “People think it’s fun, but it’s work, not fun.” The process is front-loaded with weeks of research and surveillance to determine possible vulnerabilities before attempting a break-in. Research is based on threat modeling: What is a company worried about? Who is the bad guy? What do they want to do? What are the threats? The process is front-loaded with weeks of research and surveillance to determine possible vulnerabilities Among other tools, Glasser uses Open Source Intelligence (OINT), which is collection and analysis of information gathered from public, open sources, such as media, the Internet, public government data, etc. Glasser comes from a physical security industry family – both his mother and father were employed in the security industry – and he attended his first ISC East show in the 1990s when he was 11 years old. As a security consultant and security expert witness for more than 20 years, he has previously spoken at GSX and various ASIS International events.
From New York to California, city and state governments throughout the United States are second-guessing the use of facial recognition technologies by police departments and other government entities. San Francisco was among the first major cities to issue a ban on ‘secret surveillance’ tools such as facial recognition. Now backlash against public use of facial recognition appears to be gathering steam, and some technology trials have faced additional scrutiny. Oakland, California, has joined San Francisco in banning use of facial recognition. Oakland’s diverse population has led to concerns about facial recognition systems that are prone to misidentify people of color. Limiting the use of facial recognition technology The policy would limit use of live facial recognition to situations of credible terrorism threatsNearby Berkeley, California, is considering its own prohibition of facial recognition systems by city government. Somerville, Massachusetts, has banned city departments from buying or using facial-recognition technology for any purpose. A Detroit civilian oversight board and the Board of Police Commissioners are reviewing a formal policy that would require other evidence to be used along with biometric search results to confirm a suspect’s identity. The policy would also limit use of live facial recognition to situations of credible terrorism threats. At the state level, Massachusetts and Michigan are considering moratoriums on use of facial recognition, and a bill in California would forbid police use of facial recognition in body cameras. There is a law in Illinois that requires companies to get consent from customers before collecting biometric information. Installing cameras and facial recognition system Lockport Schools in western New York state have recently drawn attention to their planned use of facial recognition. The school system plans to install dozens of surveillance cameras and a facial recognition system using $1.4 million of a state grant. The Aegis system (by SN Technologies in Canada) creates an ‘early warning system’ that informs staff if it detects individuals who are not allowed in the schools. The school system plans to install dozens of surveillance cameras and a facial recognition system The system will screen every door and also use object recognition to detect 10 types of guns. An initial implementation of the program this summer is meant to troubleshoot the system, train officials on its use, and discuss procedures with law enforcement in the event of an alert. Full implementation is planned in the fall. Abuse of facial recognition system However, New York State Education Department has asked Lockport Schools to delay use of facial recognition technology on students pending further evaluation, and a bill introduced in the New York State Assembly would halt use of the technology for a year for further study. The city of Orlando and Orlando Police Department are testing facial recognition technology to address public safety Abuse has also been a concern. A report from Georgetown Law’s Center on Privacy and Technology details widespread abuse of the New York Police Department’s facial recognition system, including image alteration and use of non-suspect images. The charges raise questions about the propriety of how expanding technical capabilities of facial recognition systems are implemented. Testing facial recognition for public safety The city of Orlando, Florida, and Orlando Police Department are testing facial recognition technology to address public safety, partnering with Amazon Web Services. One pilot ended in June 2018, and the most recent ended on July 18, 2019. Orlando has no immediate plants regarding future pilots. Light bulb-sized cameras were affixed to traffic signal poles along the city’s palm-tree-lined avenues. If a camera ‘sees’ someone, it sends a live video feed to Amazon’s facial ‘Rekognition’ system, cross-referencing the face against persons of interest. Only images of Orlando police officer volunteers were used for the test. Recently Congress has become attentive to privacy concerns and, now, the Senate is considering a bill that would limit businesses from collecting and tracking facial recognition data without consent.
Coming off a successful ISC West show, Honeywell is sharply focused on product development, with an emphasis on advanced software. “We have a strong new product pipeline this year – more than two times the number of products than we’ve released in the past several years,” says Luis Rodriguez, Director of Product Marketing, Honeywell Commercial Security. “At ISC West, we received a lot of interest in how AI and new security systems are changing the market.” Although uses for AI are still emerging in security, Honeywell sees an important role for AI in building a connected system to ensure the safety and security of a building, and more importantly, its occupants. AI allows end users to go beyond monitoring activity on a surface level to really understand the scene – from who exactly is in the area to what they might be doing. As more data is processed over time, AI will continue to build on its learnings to help deliver a more accurate assessment of potential threats each time. Machine Learning-Based Analytics End users should explore the use of machine learning-based analytics as machine learning is more advanced than AI-based systems, says Rodriguez. “When speaking to dealers and integrators, end users should also inquire about the detection accuracy of systems that use AI or machine learning technology, particularly around false positives and negatives.” Honeywell seeks to develop integrated security systems that provide the earliest detection “Additionally, end users should always ask to conduct site testing so to understand how well-suited the machine learning-based system is to the particular user’s native environment,” adds Rodriguez. “The testing will help identify the exact needs of their site.” Honeywell is reinvesting in its video portfolio, both in hardware and software innovation, as well as partnering with the top experts in the IT and education industries to stay ahead of customer demand. Honeywell seeks to develop integrated security systems that provide the earliest detection, enable the fastest response, centralize decision making, and allow customers to manage it all from anywhere. Solutions For Vertical Markets Honeywell Commercial Security is focused on supporting vertical markets that have specific security needs such as education, banking and finance, and pharma. Each has unique nuances that call for tailored security approaches. “As Honeywell continues to develop its suite of security solutions for the future and identify personalized systems for each vertical, AI such as analytics, deep learning and facial recognition will play an integral role during research and testing,” says Rodriguez. Honeywell is developing video and audio analytics technology capable of studying crowd behaviour as well as detecting guns, gunshots An example is the education market, where eliminating human delay in reporting potential threats to law enforcement and creating faster systems that help omit single-point failures are key to protecting schools and ensuring students’ safety. To address those challenges, Honeywell is developing video and audio analytics technology capable of studying crowd behavior as well as detecting guns, gunshots and fights, says Bruce Montgomery, Business Development Manager, Honeywell Commercial Security. Testing Technology For Sports Security The software is able to visualize, automate planning, design and efficiency analysis of a video surveillance system"A partnership with University of Southern Mississippi’s National Center for Spectator Sports Safety and Security (NCS4) is testing technology such as MaxPro Video, Pro-Watch Access Control and UNP Mass Notification in the National Sport Security Laboratory and in connected real-world environments. “The analytics data gathered from these environments will help inform future security innovations,” says Montgomery. Another Honeywell partnership is with JVSG, whose CCTV Design Software offers a new way to design more affordable and higher quality video surveillance systems. Integrators and distributors are now able to add a range of models from Honeywell’s portfolio of Performance Series IP Cameras into their system design from the software’s database. “The software is able to visualize, automate planning, design and efficiency analysis of a video surveillance system,” says Jeremy Kimber, Director of Enterprise Global Product Management, Honeywell Security and Fire. The program is used by more than 7,000 CCTV designers in more than 130 countries around the world and is downloaded more than 60,000 times every year.
Students of all ages in state schools are entitled to a safe learning environment. If students don't feel safe, they are not able to stay focused during classroom lessons and activities. That’s why Narre Warren South. P-12 College has upgraded its security with the installation of a sophisticated SALTO access control and ID pass system. Located south east of Melbourne, Australia, Narre Warren South P-12 College is a unique school on one campus with two sub schools, Primary, (Prep to Year 6) and Secondary, (Years 7 to 12). It follows the P-12 Curriculum which is designed to provide diversity and pathway opportunities, ensuring students maximize opportunities that exist after school and ensure people achieve their learning goals in a fun and supportive learning environment. Mechanical Key System The College previously used a mechanical key system for its security needs Home to over 2000 students and 200 staff, cultural diversity is a feature of the College with at least 50 ethnic groups being represented speaking 68 languages. A third of the College’s student population come from families where the language background is other than English. The College previously used a mechanical key system for its security needs; however this was increasingly complicated to manage as keys multiplied, and it was difficult to guard against key duplication and copying. Another negative was the cost of re-keying and replacing locks to maintain security if keys were lost or not handed back. Security Arrangements The College also had a number of challenges when it came to managing and limiting traffic flow through the staff car parks, both inside and outside school hours. To alleviate such problems, the College decided to look into upgrading its security arrangements and called in local security specialists Eclipse Security Systems. Director Greg Flood takes up the story. “We met with Brett Dyer, (the College’s Property and Maintenance Manager), and explained how SALTO solutions are in use around the world in educational environments including universities, university housing, schools, research institutes, academies, kindergartens and more where they provide security, access control and campus management.” Cost-Effective Package Brett liked the fact that SALTO could offer a solution that was education proven" “Replacing keys with smart access control would give the school much more control over its security. For instance installing smart online wireless locks on main entrance doors would enable the school to incorporate these doors into its lock down procedure. At busy student drop off and pick up times in the morning and afternoon, the school gates could be automated to improve traffic flow and ease congestion.” “And since Narre Warren South P-12 like almost all state schools hire out their sports, meeting facilities etc to third party groups outside of school hours, the new access control solution would make it much easier to manage access for such short term visitors. Brett liked the fact that SALTO could offer a solution that was education proven and offered a secure, flexible way to have all the above benefits and more in a versatile, cost-effective package that was future proof and gave a great return on the schools investment dollars.” Scheduled Automatic Locking Most external doors have a mix of offline and online SALTO XS4 escutcheons" “The removal of the old system and the upgrade to smart locks was smooth and straightforward, and we’ve now retro-fitted in excess of 100 doors and automated a number of perimeter gates. Most external doors, plus the addition of a number of internal office doors across all the blocks, have a mix of offline and online SALTO XS4 escutcheons, as well as control units and wall readers.” “The most important thing for us is to ensure that we are doing everything we can to safeguard our children. Our new access control system furthers this goal” says Brett Dyer. “We went with Greg’s recommendation of SALTO for its functionality and value for money. We particularly like how easy it is to use and program, especially the issue and management of contactless smartcards for external user groups." "The scheduled automatic locking and unlocking of external doors and gates is a huge time saver, and so far we’re pleased with the product and the capabilities it now gives us.”
To grasp the current manufacturing trends and seize the Zeitgeist of Industry 4.0, a new smart IoT industrial park in Hangzhou has been put to use by Dahua Technology, a video surveillance solution provider. Dahua Smart (IoT) Industrial Park occupies in total 512 acres in Fuyang district of Hangzhou, about 20 minutes’ drive from Dahua headquarters, designed to host 6000 staff (by 2017, 4500 people have been working/living in the 262 acres of phase one area). With topnotch technologies, personnel, materials and other benefits, Dahua’s smart industrial park will bring productivity and quality to a brand new level. Efficient Information Integration The automatic production solution based on integrated information system not only grants a higher productivity that significantly shortens the delivery cycle time for Dahua customers, but also a greater flexibility to specialized requests and ever-changing reality.The employment of software such as ERP, PLM, PDM, MES, APS and WMS helps to achieve information integration The employment of software such as ERP, PLM, PDM, MES, APS and WMS helps to achieve information integration, which, combined with industrial cameras, RFID sensory technologies and automation technologies, can integrate personnel, logistics, works, engineering projects and finance from respective sections of production(preparation, assembly, testing, packaging, inspection, shipment), rendering the whole process visible, traceable and digital. The mounter serves as a good synecdoche to illustrate the incredible efficiency of the whole production system. The concerning high-end devices (including mounter, printer, automated optical inspection equipment, Ersa reflow soldering tools, etc.) provided by ASM (originally Siemens) achieve a speed among the fastest in the world. Fast Processing According to IPC standard, X4iS, the latest high-speed mounter can process 125,000 components per hour, or 35 per second. X35multifunctional mounter can do 54000 components per hour, or 15 per second. A production line in X series can enhance the productivity by 2.7 times while reducing the consumption of energy by 52%, comparing to the original production line in D series under the same conditions. Dahua Smart Industrial Park provides the great benefit of internal synergy The faster speed also applies to the development of new molding, since Dahua Smart Industrial Park provides the great benefit of internal synergy, allowing the end-to-end vertical supply chain with marketing, R&D and manufacturing efficiently integrated. The advanced organizing system is supported by topnotch equipment, such as MAKINO high-speed graphite processing machine, GF CNC, GF WEDM-LS machine, Hexagon 3D Nikon projectors and electronic displays. With a processing accuracy of +/-0.002 to +/-0.005MM, while also supporting CAD / CAM / CAE collaborative development and simultaneous manufacturing, these machines enable Dahua to develop new mechanical molding in as short as 7 days.Higher quality results in less likelihood for products to malfunction especially when they are used in critical situations Time- And Cost-Saving Solution By far, this developing system has already produced high precision molding for Lechange Robots, monitoring cameras in TP1-TC6 series, G20 intelligent head-gears, smoke alarm for fire detectors, etc., all of which proving the effectiveness of the system in shortening the development cycle and keeping the competitive edge with new products in the business. Higher quality saves lots of time and economic costs for clients. Even more importantly, higher quality results in less likelihood for products to malfunction especially when they are used in critical, not-allowed-to-go-wrong situations. Dahua’s products are guaranteed with a higher quality for two reasons: first, Dahua has set a high standard of accuracy in production; second, with a reliability lab at the production end, Dahua has put together an effectively closed loop for quality control in the manufacturing process. Accuracy has always been one vital index defining the manufacturing ability because it directly sets the limit to quality and range of products to be produced. Again, take the mounter mentioned above for example: it can process components, in metric size, as small as 03015(0.3x0.15mm), with a +-0.025mm SMD precision (within the 3-stigma range), boasting world leading performance and capable of covering basically all types of components used in the industry.Dahua industrial camera plays an important role in IoT, providing a closed loop for quality control in the manufacturing process Enhanced Vision And Intelligent Analytics Dahua industrial camera plays an important role in IoT, providing a closed loop for quality control in the manufacturing process, in which all materials, personnel and devices are connected and products are traceable to the specific production line and precise time it got made. Boasting a variety of functions, Dahua industrial cameras are used in different sections of production, enabling automatic assembly, high-precision graphic inspection and product flaw inspection. Through high-definition machine vision, Dahua industrial cameras automatically and precisely locate the components, limiting the assembly error to micron level. Equipped with enhanced vision and intelligent analytics algorithm, the industrial camera can spontaneously detect and recognize flaws in the performance and outlook of products, thus promising not only the volume of cameras production but also the steady quality of each and every one of them.In the future phase, this industrial park is expected to be more intelligent to enable a safer society and smarter living Safe Society And Smart Living Reliability must be put to test, in R&D as well as in manufacturing process. The reliability lab at the production end serves to assure quality by randomly taking products from production lines and put them into reliability tests simulating falling, high/low temperature, worn-out conditions, which are conducted by industry leading testing equipment in the lab. Thus what’s conceived in R&D is confirmed from the production line, the synergy of both ends promising better products (for common use or specialized needs). This lab is also responsible for testing all the raw materials. Thanks to the aforementioned information integration, all tests are automatically conducted, recorded and traceable. In conclusion, Dahua Smart (IoT) Industrial Park is endowed with the latest and world leading manufacturing equipment/system boasting high level automation and intelligence, which is essential to satisfy the ever higher demands from clients in terms of delivery time, specialized use and quality. There is still great potential to this new smart industrial park. It is literally only in its phase one. And in the future phase, it is expected to be more intelligent, to realize client-centered flexible production and to enable a safer society and smarter living.
ip.access has announced a collaboration with Imaginet, a provider of IT network and security solutions, to implement a rapidly deployable disaster response network in Makati City, the Philippines. Makati City, part of the Metro Manila region, is the main financial hub and has a population of 6 million people. Built on a drained mangrove swamp, the city’s infrastructure is at a high risk for significant damage in the event of an earthquake, typhoon or other natural disasters. In the event of a disaster it is likely that communications infrastructure would be affected – hindering efforts to direct the population to safety and locate people trapped in collapsed buildings. To improve the city’s preparedness for natural disasters, the local Disaster Risk Reduction & Management Office (DRRMO) worked with Imaginet to implement a rapidly deployable mobile network. Deployed via four command vehicles, the network will allow first responders to communicate with the population and report back to the central command office.The ip.access team has an inherent understanding of disaster situations, with extensive experience working in harsh environments Ensuring Disaster Preparedness Basing the network on 2G technology, to ensure that signals would be capable of penetrating collapsed buildings and enabling communication through SMS messaging, ip.access was tasked with designing, installing and testing the network in a tight six-week window. Following a successful commissioning period, the four command vehicles were first deployed in December 2017. Commenting on the partnership, Blair Duncan, CEO at Imaginet, said, “This was a challenging technical undertaking. As such, we needed confidence that we were working with a partner that could deliver a high quality solution. In that respect ip.access were an ideal partner – the team has an inherent understanding of disaster situations, with extensive experience working in harsh environments. We knew that we could rely on them to equip our vehicles with the robust and reliable radio network the DRRMO requires should a disaster strike.” Small Cell Solutions Nick Johnson, CTO at ip.access added, “We have a wide range of award winning commercial off-the-shelf (COTS) small cell solutions that can be easily integrated and operated within a wide range of specialist deployment scenarios – including in disaster response settings.” “Communication is critical in a disaster situation, so the fact our proven solutions deliver five nines availability with exceptional reliability makes them ideal for applications like the vehicle-borne network in Makati City.” Due to the success of the vehicles, the Makati City DRRMO is now looking to increase its fleet to nine vehicles to enable more flexibility and more robustness in its disaster readiness.
Concern for safety of the lab staff prompted IHEP to seek a more securely automated system The Institute of High Energy Physics (IHEP), the Chinese Academy of Sciences (CAS) is a comprehensive research base with its main efforts focused on high energy physics, R&D of advanced accelerator technologies, advanced synchrotron radiation technologies and applications. Advanced Scientific Research Facility technologies and high-tech products with sophisticated science and technologies like radio frequency, UHV, microwave, precision magnet fabrication, etc. The developmental fields cover accelerator technology, nuclear medical instrument, nuclear instrument and meter technology, industrial automation technology, information technology, precision machining, etc. IHEP contains 11 laboratories. The research efforts are centered on high energy physics, cosmic ray and high energy astrophysics, theoretical physics, accelerator physics and technology, synchrotron radiation and free electron laser and nuclear analysis technology and application, etc. Large scientific tools include Beijing Electron Positron Collider (BEPC), Beijing Spectrometer (BES), Beijing Synchrotron Radiation Facility (BSRF) and Beijing Free Electron Laser (BFEL.). Solution Beijing Access Control Technology “We were seeking an advanced method of managing access control and for higher security,” said Li Tie Hui of The Accelerating Control Center in China. Access to restricted lab areas was being manually managed by staff – individuals requiring access to the lab had to physically use a key located in a central control unit. The key then had to be returned to its location and all staff had to evacuate the lab in order for the lab operations to initiate. The lack of a sophisticated security procedure generated a high risk of people remaining in the lab and potential exposure to radiation. Concern for safety of the lab staff prompted IHEP to seek a more securely automated system. "Convenience, safety and process automation were key considerations when we selected HID products" Solution Beijing Access Control Technology Co., a local access control solutions provider, won the project out of nine bidders to exclusively develop an advanced safety and security system featuring HID RFID access control technology integrated with networked security, custom software, video surveillance, and a fire prevention/detection system. HID ProxPro® Card Readers “Convenience, safety and process automation were key considerations when we selected HID products. We had HID cards and readers at other IHEP facilities and knew those existing products were providing the kind of security needed at the lab,” said Hui. Manual access to each door of the lab is now accompanied by an HID reader with sound and a separate LCD. The HID® reader outputs an identification number that furnishes the customized system with a higher level of security and shows the identification of the entrant, time of day and how many people remain and/ or exit in and out of the restricted lab area, displaying their names on the LCD screen. Once a departure confirmation is complete by flashing on a “departure confirmation” reader, the remaining name on the LCD screen disappears. HID access control technology controls entry into the lab, prohibiting anyone from entering while the lab is operating. In addition, HID ProxPro® card readers were modified to overcome power disturbances created by the radioactive lab environment, delivering a reliable solution for the environmental challenges at the Institute of High Energy Physics
Two models of MOBOTIX IP camera were selected for the wind tunnel, as advised by R. Pierre Digital NEWTON S.r.l. is an independent testing laboratory established in 2000, recognized and certified by international bodies such as Accredia, FIA - Fédération Internationale de l’Automobile, SFI-USA, SNELL-USA, Italcert, Istituto Masini, TÜV Rheinland International, TNO and SNCH - Société Nazionale d’Homologation et de Certification for tests of motorcycle helmets and auto racing helmets (Formula 1 and WRC), children’s helmets for kart racing, HANS devices for Formula 1 drivers, devices to protect the head, eyes (goggles, masks, and visors) and body (riding, bike, and touring helmets) and for certification tests on high-performance seats. Wind Tunnel Project In addition, the Ministry of Infrastructure and Transport considers the laboratory’s equipment to be suitable for all tests required by Regulation 22 concerning helmets and visors for motorcycle drivers and for some of those concerning the approval of two- or three-wheeled motor vehicles. The Newton laboratory has recently completed the installation of a 280kW subsonic wind tunnel: this is a closed return, Göttingen-type wind tunnel, designed to be used with either an open or a closed test chamber, depending on the specific testing program. The electric power needed is produced by a generator integrated into the structure. Thanks to the testing activity carried out within the laboratory, products obtain the certifications required by various Italian authorities (which vary according to the sector to which the tested product belongs) in order to be considered adequate, and consequently put on the market. “The idea of building an actual wind tunnel came about mainly to deal with the problem of ventilation inside the helmets,” explains Luca Cenedese, director of Newton. In fact, it seems that having solved the problem of head protection parameters, today there are large international groups focusing mainly on the study of comfort, concentrating mostly on thermal stresses and the analysis of how these phenomena affect the reaction and concentration abilities of automobile, motorcycle, and bicycle racers. “In existing wind tunnels, everything was focused on the machine, not on the helmet. So we decided to prepare by building ourselves a medium-sized wind tunnel that could also satisfy these new requirements. Today, with a wind speed of about 250 km per hour, we test helmets, bicycles, magnetic sirens for police cars and also traditionally large objects - for example subway cars or high-velocity train cars - that by utilising the principle of aerodynamic similarity, are proportionately reduced in scale,” continues Cenedese. Comparing Data And Images Built a few years ago, the Newton wind tunnel has now found approval from old and new clients from different sectors. The wind tunnel allows continuous and very effective activity. To obtain the greatest performance and offer something extra to our clients, Newton needed to identify a system that would permit keeping track of all inspection and test activities. “We work with the engineers who come to our laboratories during the testing phase to design and modify the prototypes currently being made while the product is being tested. Some tests last for many hours: we soon realised that we would have had surprising results if we had had a system available that allowed continuous recording.” "Network-integrated cameraswere needed that could not only communicate with each other but also be accessible remotely" The software used for tests inside the wind tunnels produce an enormous amount of numerical data: that is, numbers relating to performance that characterize an object, especially force, pressure, and temperature. The experts at Newton have augmented this type of numerical information, produced and processed by a PC, with a second, new perspective: the display of images produced by MOBOTIX cameras during the products’ testing phase. And thanks to the combination and comparison of numerical data and images, Newton can now provide its clients with much more accurate measurements, achieving levels of qualitative detail never before seen. Need For Network-integrated Cameras The years dedicated to this type of activity and the studies carried out in the Newton laboratories led to the awareness that the measurement of data, in and of itself, is very simple. Rather, the real problem is managing the amount of data produced by the system, which is quite often very difficult to read and make intelligible, so as to understand the various phenomena that occur in the products tested in the wind tunnel. To deal with this need, the idea was therefore to integrate the images by using video surveillance cameras. An idea that can now be described as a real pilot project, in other words a one of a kind application. “We could not rely on images taken with traditional movie cameras, because the test sessions often last for many hours and we needed images that would allow us to observe the phenomena from many angles at the same time. In addition, network-integrated cameras were needed that could not only communicate with each other but also be accessible remotely.” Two models of MOBOTIX IP cameras were chosen: one with a 360-degree view, and one AllroundMono model Quality, Timeliness And Immediacy With MOBOTIX Thanks to the support and advice of distributor R. Pierre Digital, two models of MOBOTIX IP cameras were chosen: one with a 360-degree view placed on the ceiling, perpendicular to the product test position, to offer a panoramic view; and one AllroundMono model, positioned at the side but movable as needed, which offers different details and angle shots within the same shot. Thanks to the high quality of the images from the two MOBOTIX cameras, the Newton engineers can guarantee the end user that they can take very timely action in the test phase of their products, managing any anomalies and malfunctions in real time and making the necessary changes. The advantage of MOBOTIX IP cameras is that they are also accessible remotely: a very significant plus since many of Newton’s clients come from abroad, and often some of their staff follow the product test operations remotely, thanks to a system access login offered to the client. “By combining data and images, we achieved surprising results in the test phase. When we analyze the data, if we see that the data changes, we go to retrieve pictures of the moment when the data changes and we can immediately understand the phenomenon. For example, during a test on a bicycle and a cyclist, the team’s engineers were simultaneously checking the numerical data regarding the bicycle’s efficiency and, from the images produced by the camera, the position of the cyclist at the moment when the efficiency was greatest. We are not information systems engineers, and in this sense, we were helped a lot by not having to use image management software: the images are processed on board the cameras and the result compared to other systems is surprising”, concludes Cenedese.
Airbus Defense and Space aims to validate the use of smartphones in different operational situations Airbus Defense and Space and its partner RIKS (the State Infocommunication Foundation), the technical operator of Estonia’s national Tetra network, is performing a field trial of the Tactilon Agnet smartphone application - formerly known as TSA - for two months. Voluntary civil defense and governmental organizations want to confirm Tactilon Agnet’s ability to fulfill the operational requirements for typical mission-critical communication. The field trial combines the use of public broadband networks and Tetra services. Airbus Defence And Space Solutions For the field trial, Airbus Defense and Space has provided a service cloud environment and delivered an RCS9500 integrated radio dispatching system, an automatic vehicle location solution, a Tetra base station, several Tetra radios, and different types of smartphones equipped with the Tactilon Agnet application. The application enables smartphone users to make instant group calls (push-to-talk feature) and send messages to Tetra users as if they were equipped with Tetra devices. Challenging Test Environment During the field trial, Airbus Defense and Space and RIKS aim to validate the use of various types of smartphones in different operational situations. In addition, both Airbus Defense and Space and RIKS want to collect information about how mission-critical Tetra communication features have to be operated in an LTE environment. To push the LTE-based Tactilon Agnet application to its limits, RIKS has set up, in cooperation with commercial operators, a challenging and complete test environment that includes not only a regular LTE network on the 800 and 2600 MHz frequencies, but that also includes a mobile LTE base station that is connected to the core network via broadband satellite link. Demand For Broadband Group Communication “As we observe an increasing demand for broadband group communication with multimedia features among mission critical users, Airbus Defense and Space offers a unique solution called Tactilon Agnet. It provides fully-fledged, seamless and secure integration of Tetra radio users with those who use Tactilon Agnet on their smartphones,” explains Olivier Koczan, Head of Secure Land Communications at Airbus Defense and Space. He points out that RIKS and Airbus Defense and Space are “clearly on the verge of introducing mission-critical communication features of the next generation”. Estonia’s public safety organizations have communicated within a nationwide Tetra network from Airbus Defense and Space since 2007. In 2015, the company delivered critical communication solutions enabling the use of LTE networks, which will also be used to test the Tactilon Agnet application. This solution provides high availability and secure access through commercial LTE network services.
Round table discussion
Finding the exact right technology to solve an end user’s problem is challenging, but the rewards are great when an integrator gets it right. A wide range of available product types, price levels and added features increases the likelihood of identifying a technology to solve any problem. But with so many technology and product choices in the marketplace, identifying that one solution can be akin to finding a needle in a haystack. We wondered whether a vast range of product choices is always a good thing. We asked this week’s Expert Panel Roundtable: Are security integrators and end users overwhelmed by “too many choices” related to security equipment and systems? How can they make sense of it all?
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload