By leveraging each other‘s technologies as companies sharing the dormakaba banner, LEGIC and Farpointe Data are at the forefront of the new expanding market for secure mobile credentials. LEGIC‘s 6000 series reader ICs and the mobile service LEGIC Connect are at the heart of Farpointe‘s new, award-winning Conekt mobile smartphone access control solution. Farpointe’s first Conekt products are the K-BLE mobile access credentials and K-SMART3 electronic access readers with...
Matrix Comsec is to participate in the NPPC (National Pharmacy Preceptors Conference) 2018. Matrix will be exhibiting their communication and security solutions along with other enterprise grade solutions. IP Solutions For Modern Enterprises From the Telecom domain, Matrix will be exhibiting the newly launched pure IP solutions for modern enterprises - PRASAR UCS and the smart video IP deskphone - SPARSH VP710 at the event. The company will also be exhibiting SARVAM UCS and Media Gateways. So...
March Networks, a global provider of advanced video surveillance and video-based business intelligence solutions, is pleased to announce its complete lineup for Global Security Exchange (GSX) 2018. In addition to the company’s industry-leading solutions for financial, retail and transportation organizations, March Networks will showcase its newly launched Software as a Service (SaaS) offering for quick service restaurant (QSR) and convenience store (c-store) franchisees, as well as its se...
The Global Security Exchange (GSX) seems smaller this year, which is not surprising given the absence on the show floor of several big companies such as Hikvision and Assa Abloy (although their subsidiary HID Global has a big booth). A trend affecting the number of companies exhibiting at GSX 2018, and other trade shows, is industry consolidation, which is impacting the show even beyond the fewer exhibitors this year in Las Vegas. GSX is the new branding for the trade show formerly known as ASIS...
Edesix, a provider of Body Worn Camera (BWC) solutions, will showcase its new integrated security technology on the Genetec stand at Security Essen 2018, the world's most important trade fair for security in Germany. Edesix has an integrated technology partnership with Genetec which enables Edesix Body Worn Cameras, and associated VideoManager software, to integrate seamlessly with Genetec Security Center. This integration offers streamlined wearable security management, support and storage for...
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organizations, which obstacles to a fast or easy transition. We asked this week’s Exper...
AES Corporation, global manufacturer of long-range wireless private mesh radio alarm communication products and services, is pleased to announce the appointment of Tim Lyon as the new Regional Sales Manager covering all of the New England, New York, New Jersey, and Pennsylvania territory. AES Corp. New Regional Sales Manager Lyon brings over 16 years of successful sales operations and security experience to AES. In his new role, he is responsible for engaging new business development efforts, building upon existing customer relationships, and supporting all sales programs for AES-IntelliNet and IntelliNet 2.0 related products in the Northeast region of the United States and Canada. Tim has attended training programs at Cardone University, Holden Advisors, and the Brookside Group Jim Burditt, AES Vice President of Sales, commented, “I’m excited to have Tim join our outside sales team. Although he will travel throughout the territory, he will also be spending time at AES Peabody corporate headquarters working closely with our inside sales team as well. We look forward to him making an impact in the Northeast region.” Security and Safety Solutions Expert Prior to joining AES, Tim worked in Account Executive and Territory Manager roles for a Fortune 500 company providing safety, security, and operational efficiency solutions for large scale systems and communities in the healthcare industry. Earlier in his career, he worked in the construction field as Sales Director for his family owned business. Tim recently relocated to the Boston area with his family after residing on the West Coast for more than 7 years. He has attended training programs at Cardone University, Holden Advisors, and the Brookside Group. “I’m happy to be here and part of the AES Team,” said Tim. “I look forward to meeting and working alongside our Customer Partners to help grow their alarm monitoring business and maximize their return on investment in AES patented technology.”
DoorBird will present its innovative IP video door intercoms at two trade shows in the US in September 2018: CEDIA Expo in San Diego, September 4-8, booth 1111, and Global Security Exchange (formerly the ASIS Annual Seminar and Exhibits) in Las Vegas, September 23-27, booth 971. The newly launched DoorBird D2101KV equipped with one call button and an integrated keypad will be presented for the first time at the CEDIA Expo and Global Security Exchange. The new model from the German manufacturer is the first DoorBird product to combine a doorbell with an integrated keypad for access control applications, e.g. for gate control, commercial spaces and office buildings. Multifunctional Keypad Using the DoorBird app, PIN codes can be generated and assigned from anywhere in the world to grant access to visitors. The user can also send HTTP requests to home automation systems to, for example, arm security systems or control motorized shades. Also on display at the DoorBird booth is the company’s line of products for multi-tenant applications. The D21DKV and D21DKH models include a multifunctional keypad, RFID reader and LCD screen which are configurable via the DoorBird app. DoorBird is an official ONVIF member and has an open API interface for integration with home automation, access control and alarm systems Searchable Resident Directory The LCD screen can show a searchable resident directory. The D2101V, D2102V and D2103V IP video door intercoms are equipped with one, two and three individual call buttons, respectively, to send push notifications to tenants’ smart devices. All three units come in different colors and finishes, and can be individually customized. DoorBird is an official ONVIF member and has an open API interface for integration with home automation, access control and alarm systems. Some of the compatible systems include Control4, Crestron, Savant, URC, RTI, KNX, Fibaro, Zipato, Loxone, Bang & Olufsen, AVM, Nuki, August and Kisi.
Berlin-based manufacturer, Bird Home Automation Group, has expanded its product portfolio with the launch of the new DoorBird D2101KV IP video door intercom. The new model is equipped with one call button and a multifunctional keypad which makes it ideal for single-family homes, hotels and commercial spaces that require a safe and efficient access control solution. The D2101KV IP video door intercom is the first DoorBird product that combines a doorbell with an integrated keypad. The backlit call button operates as a doorbell or an automatic door opener within individually set time windows. With 12 backlit buttons, the multifunctional keypad enables secure access control for single-family homes and business premises, e.g. health care facilities and law firms. Built-in RFID Reader And 4D Motion Sensor The new D2101KV offers all the DoorBird functions one would expect. Features such as visitor history and push notifications to a smart device or IP phone are available. In addition, PIN codes, scheduling and permissions for the integrated keypad can be comfortably managed in the DoorBird app. The user can generate and assign PIN codes from anywhere in the world to grant access to the premises to visitors or service providers. The integrated keypad can also send HTTP requests to home automation systems to trigger events, e.g. arming burglar alarm or controlling motorized shades. Like the existing DoorBird D21x models which up to now included either call buttons or an integrated keypad, the D2101KV comes in stainless steel. The weatherproof housing contains high-quality components such as a HD 180° wide-angle, hemispheric lens camera, and a two-way echo and noise cancelling audio system. The model also has a built-in RFID reader and a 4D motion sensor. These features combined with the integrated keypad make the D2101KV a powerful IP video door intercom and access control solution.
HID Global, global provider of trusted identity solutions, announced that it has won the 2018 RFID Journal Live! Best New Product award for its new Mini Tamper-Evident Beacon, the industry’s first Bluetooth beacon to provide anti-theft protection for IoT-based location services and conditioning monitoring applications. “The latest addition to our IoT services for asset management addresses the escalating need to protect sensitive assets and equipment in more connected and intelligent environments,” said Marc Bielmann, Vice President and Managing Director for Identification Technologies at HID Global. “This accolade validates HID’s evolution in our identification and sensing technologies portfolio, which is focused on driving more secure, intuitive and efficient operations.” HID Mini Tamper-Evident Beacon HID’s Mini Tamper-Evident Beacon can be fully integrated into HID Location Services and HID Condition Monitoring Enabled by Bluvision, HID’s Mini Tamper-Evident Beacon can be fully integrated into HID Location Services (for item management) and HID Condition Monitoring (for managing the operational performance and health of equipment). Once integrated, real-time alerts and notifications can be sent when a beacon has been damaged or removed from an asset. John Sailer, Chief Operating Officer of Bluvision added, “The beacon packs a cost-effective solution into a small form factor to reduce risks and increase security using innovative conductive technology that enables the revolutionary deployment of tamper-evident IoT ecosystems. The combination of its size and security capabilities is what makes the beacon highly desirable to customers.” Inventory And Asset Tracking HID’s Mini Tamper-Evident Beacon is ideal for managing critical, proprietary and high value assets across three primary use cases: HID Location Services to track assets, inventory and equipment with 1-2-meter accuracy using real-time location services. HID Location Services to monitor gateways or portals, and to know when assets are near specified areas using proximity-based location services. HID Condition Monitoring to track the temperature, motion and vibration of vending machines, HVAC systems, equipment and motorized machinery to help determine the health and performance for more data-driven maintenance. The new Bluetooth beacon was selected by a panel of independent judges who recognized the most groundbreaking solutions that deliver business value, reduce cost and improve efficiencies.
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organization's security, while enhancing user convenience.Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics Challenges For Biometric Authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal among older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realize the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimizing performance through a combination of new technology and algorithms, while ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimizing Capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data.The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness Detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimizes performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimizes performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted Performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template Matching Modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical Access Control Integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy Considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
Hytera Communications Corp. Ltd., Hytera America, Inc., and Hytera Communications America (West), Inc. (collectively, "Hytera") has filed a petition at the US International Trade Commission (ITC) requesting review of a Final Initial Determination issued on July 3, 2018 by ITC Administrative Law (ALJ) Judge MaryJoan McNamara that features in Hytera's Digital Mobile Radio (DMR) products sold in the US infringe patents of Motorola Solutions, Inc. (MSI). Hytera Files Petition at US ITC Hytera's position remains that its products sold in the US do not infringe MSI's patents, and that the initial determination is incorrect. MSI originally asserted seven patents in its complaint but later withdrew three. ALJ McNamara ruled that a limited number of claims in the four remaining patents at issue are infringed, but also determined that MSI did not satisfy the technical industry prong of the domestic industry requirement as to another of its patents and did not find Hytera to have violated the statute with respect to that patent. During proceedings in this case, before the period for factual discovery ended, Hytera had produced for the ALJ's consideration documents and source code related to several new designs. In addition to asking the ITC to reverse the ALJ's initial determination, Hytera has also petitioned the Commission to affirm that these latest products are not infringing. Hytera is confident that our designs for our next-generation DMR product portfolio do not infringe any of the asserted patents of MSI" Digital Mobile Radio Products "Hytera is confident that our designs for our next-generation DMR product portfolio do not infringe any of the asserted patents of MSI," said Tom Wineland, Vice President of Hytera Communications America (West), Inc. "MSI did not oppose our new designs based on six of the asserted patents." In June of 2018, Hytera announced a new range of features for its digital mobile radio (DMR) portfolio, including its mobile radios, portable radios, and repeaters. These new features include extending full-duplex calling into repeater-mode operation (RMO) and direct-mode operation (DMO), enlarging full-duplex coverage beyond trunking mode without requiring extra hardware. Hytera also extended its over-the-air programming capability to conventional repeater operation, allowing individual radios to be reprogrammed remotely. Furthermore, optimized push-to-talk (PTT) functionality allows users to talk instantly after PTT even before a call is established. Hytera Portable Radios and Repeaters Hytera's new features for digital mobile and portable radios and repeaters promote higher productivity "Hytera's new features for digital mobile and portable radios and repeaters promote higher productivity, help improve the safety of users, and offer a better user experience," added Hytera's Wineland. "They boost Hytera’s leading position in providing innovative, versatile, high-quality DMR solutions that also present a compelling value to our dealers and customers." Hytera's petition before the ITC remains confidential by terms established by the Commission, which typically completes reviews within 120 days. Since the Commission has not issued its final decision, there is presently no constraint on the import or sale of any of Hytera’s products. Hytera also learned in May of 2018 that the US Patent and Trademark Office's Patent Trial and Appeal Board has accepted three Hytera petitions to invalidate MSI's patents based on prior art. "Hytera looks forward to the disposition of this case at the ITC and to resolving the series of nuisance litigations our competitor has filed against us," adds Wineland. "Hytera is focused on innovation and prefers to compete fairly in the marketplace rather than in the courtroom. Hytera is confident that our products do not infringe."
Hospital Wattwil opened the doors to its new inpatient wing in March 2018. The 88 patient beds in total are being fitted with LEGIC technology in the final completion stage. This innovative service offers comfort, security and efficiency for the patient and hospital operator. A monitor is installed at every patient bed. The patients can identify themselves using an RFID smartcard or bracelet and log into their bed computer at any time. Innovative Smartcard Technology Information such as menus, services and other special hospital information can be accessed through the hospital’s extranet. The resulting costs can be easily and instantly debited from the card’s account. Cabinets by the patient’s bed and the lighting and curtain controls can also be accessed using the smartcard. All of this makes the processes at the hospital much easier. Patients learn how to use the system intuitively and welcome this helpful and smart technology. System expansion with personalized treatment information and appointments or transfer to smartphones and tablets is already being planned System expansion with personalized treatment information and appointments or transfer to smartphones and tablets is already being planned: another step towards a digital hospital. Wattwil has already taken the first step with digital patient files. The processes are being increasingly automated. This reduces paper processes and guarantees efficient process management. Integrated hospital security The system was integrated, and the project was completed by the company Ondamedia, which has the necessary experience in this field. Advantages for the end user: Easy to use thanks to the intuitive user interface All the information is available at every patient bed Different applications in the hospital using one system Highly reliable and secure information André Juszko Head of Technology / Medical Technology, Hospital Wattwil commented - “With the technology from LEGIC we have every opportunity to integrate more applications at the hospital in future.”
Communication makes the world much, much smaller - but it also becomes critical to everyone. Once life-enriching communication technologies are embraced, not only do we like and enjoy the benefits, but we also become hooked on it day and night. "There is no doubt that the transportation industry is benefiting from always available communications, making sure drivers, mechanics, dispatchers are always connected and can exchange information when necessary," says Sagi Subocki, Vice President of Products and Marketing for MCC technology leader Softil. "However, for the most part until now, the transportation industry has had to rely on the traditional radio or simply standard mobile phones to perform all communications tasks. That's about to change with the advent of Mission Critical Communications over LTE and 5G as defined in the 3GPP Release 13-15 standard," adds Subocki. Mission Critical Communication Over LTE MCC over LTE offers push to talk, push to video, text and multimedia chat, as well as location information for groups and point to point communications Mission critical communication (MCC) over LTE offers push to talk, push to video, text and multimedia chat, as well as location information for groups and point to point communications. Think about a driver who can push a button and instantly talk to all drivers within a 50-mile radius, for example, to inform them of road conditions, accidents, road works and other incidents. In the event of a breakdown, the truck driver can quickly obtain help from experts using video chat, which makes a driver's life a lot easier. Using the same MCC over LTE capabilities, the driver can see the location of all other drivers using the same radios, can engage in chat sessions with nearby garages and much, much more. And let's not forget that MCC over LTE communications can be prioritized over regular public mobile voice and data traffic, which can help in the case of accidents and natural disasters. Advanced Communication Solutions In Mining While different from the transportation industry, mining's reliance on advanced communication technologies might be even greater than the needs of the transportation market. Subocki explains: "Mission critical push to talk and push to video with guaranteed, prioritized delivery might well make the difference for mining workers. The ability to ask for urgent assistance simply at the push of a button is crucial in the day-to-day operations of an oil rig and a diamond mine." But the benefits of MCC over LTE don't stop there. As MCC over LTE communication is delivered over modern, very capable, rugged smartphones, these devices can be used to interface and collect data from all available sensors - air quality, temperature, radiation, presence of dangerous gases - all this information can be obtained automatically via MCC over LTE integration with IoT and can be used to increase safety. Drones In MCC Over LTE In addition to engaging with all sensors, MCC over LTE communications can include drones which would provide video feeds whenever necessary In addition to engaging with all sensors, MCC over LTE communications can include drones which would provide video feeds whenever necessary - and the 3GPP MCPTT Release 16 standard will extend mission critical communication to include robots, which might be priceless. "Think about the implications of sending an MCC enabled robot to investigate a mine explosion and you'll see the future of MCC over LTE and 5G communications in the mining industry," adds Subocki. Market Value And Outlook A report from ABI Research found the total mission-critical communications market for base stations, repeaters, handsets and infrastructure in 2022 will be US$10 billion. The North American market continues to account for more than half of this world market with the rapidly growing Asia-Pacific region in second place with a 20 percent market share. Public-safety radio was the ancestor of critical communications providing mission-critical voice services and continues to represent over half of this market, followed by the industrial, transportation and utility segments. However, the need for mobile broadband data has also entered the equation driving critical communications systems to evolve to digital radio for data handling and spectrum efficiency. As a result, critical communications systems are slowly evolving from the current TETRA, Digital Mobile Radio (DMR) and Project 25 (P25) to coexist and interoperate with Long Term Evolution (LTE)-based systems. Softil's MCC Over LTE Leadership Softil is a leader in Mission Critical Communication over LTE solutions for developers. Historically, Softil always focused on the full embrace of open communication standards - starting from close participation in the work of the appropriate SDOs, then developing best-of-breed APIs and implementation of the relevant standards, and most importantly, paying utmost attention to the interoperability of the offered solution by active participation and leading all relevant industry-wide interoperability testing events. Softil actively participates in development of the MCC over LTE standards in 3GPP, as well as interoperability testing at the ETSI Plugtest Events. Most importantly, Softil 3GPP Release 13-15 compliant client SDK implementation had been already commercially deployed on the market - in Korea, Softil powers latest and greatest implementation of the MCC over LTE-R communication devices installed on the newest high-speed train line, such as one connecting Incheon airport to PyongChang during the Olympic games.
Completed in 2017, the Adana Integrated Health Campus is a state-of-the-art hospital complex in Turkey comprising three specialized clinics with a total capacity of 1,550 beds. Located in Adana - the country’s fifth-largest city - the over 318,000 square-meter facility is a public-private partnership project realized in cooperation with the Ministry of Health to serve patient populations from the surrounding Adana, Hatay and Osmaniye provinces. The Adana Integrated Health Campus prides itself in offering the highest level of care through specialized physicians and advanced equipment. The Main Hospital offers an Oncology Hospital as well as a Cardiology and Cardiovascular Hospital with a 367 bed capacity. The Maternity & Pediatrics Hospital have 349 beds and the General Hospital 584 beds. Before opening to the public, the project already won several awards, including Best Healthcare Project and World’s Largest Seismic Isolated Health Campus. IP-Based Video Surveillance System When it came to choosing a security and safety solution for their high-profile health facility, officials in Adana wanted to integrate the most advanced hardware on a single platform covering four areas: video surveillance, access control, fire alarm plus public address and voice alarm. Bosch won the contract as the one-stop provider with the capacity to unify all systems via its Building Integration System (BIS) through different interfaces. The installation was completed by the Bosch partner Ateksis. The IP-based video surveillance system consists of 2,000 cameras for monitoring critical indoor and outdoor areas Due to the size and complexity of the modern campus, this level of integration proved a true test for the Bosch Building Integration System (BIS). The IP-based video surveillance system consists of 2,000 cameras for monitoring critical indoor and outdoor areas such as entrances and corridors. Managed on the Bosch Video Management System (BVMS), live feeds from high-definition FLEXIDOME, DINION IP starlight, and AUTODOME IP starlight cameras are monitored on-site through a single control room. Providing fire safety, BIS controls roughly 45,000 detection points, including 30,000 fire detectors, plus manual call points and interface modules across the campus. Use Of RFID Tags To Prevent Baby Kidnapping For an extra level of integration, the hospital’s telephone switchboard is integrated into the public address and voice alarm system via BIS to enable public announcement and/or fire alarms from the nurse desks for immediate evacuation of patients and their relatives. And to safeguard the Maternity Clinic against ‘pink code’ cases (baby kidnapping), the Bosch access control integrates RFID tags on newborn babies to trigger alarms. By implementing a complete solution on a single platform from the start, Adana Integrated Health Campus sets the standard for exemplary patient safety in a system marked by low overall cost of ownership, maintenance costs, and failure rate. In the bigger picture, the state-of-the-art campus proves the end-to-end capabilities of Bosch Building Technologies and serves as a showcase for the next level of healthcare and integrated security.
March Networks, a pioneer in the delivery of video surveillance and video-based business intelligence solutions to the cannabis industry, is pleased to announce that one of Canada’s largest cannabis producers has selected its complete cannabis video solution to provide security, loss prevention and operational insights for its retail dispensaries. The publicly-traded producer, with multiple brands and a global presence, chose the March Networks solution based on its proven reliability, ability to support thousands of locations, and its Searchlight business intelligence software. March Networks Searchlight provides organizations with valuable information on customer service, risk mitigation, corporate compliance and other operations through the integration of surveillance video, point-of-sale (POS) transaction data and customer data analytics. The solution delivers an enhanced level of tracking and compliance by correlating video with the RFID data in the Searchlight softwareEnhanced Level Of Tracking “Early on, we recognized the security and operational requirements of the tightly-regulated cannabis market and evolved our offering to uniquely address those needs,” said Peter Strom, President and CEO, March Networks. “Today, we are proud to be the solution of choice for cannabis operators, including this leading Canadian-based producer in advance of the legalisation of the country’s recreational marijuana market in October.” Just last week, the government of Ontario – Canada’s largest province by population – opened up the sale of marijuana to private retailers, reversing a previous decision that would have seen sales limited to government-run outlets only. Across the United States, March Networks currently works with multiple cannabis operators, providing intelligent video solutions for dispensaries and cultivation facilities. In states like Colorado, where radio frequency identification (RFID) tagging from seed to sale is mandated by law, the solution delivers an enhanced level of tracking and compliance by correlating video with the RFID data in the Searchlight software. The producer will be able to centrally manage the entire system and easily schedule software updates using March Networks Command Enterprise Server software Deploying NVRs And 3D Analytics Sensors In addition to March Networks Searchlight, the Canadian cannabis producer will deploy the company’s hybrid network video recorders (NVRs) in each retail store, as well as integrated 3D analytics sensors to gather valuable metrics on customer traffic and wait times. The producer will be able to centrally manage the entire system and easily schedule software updates using March Networks Command Enterprise Server software. The powerful video management software is an ideal solution for organizations with multiple distributed locations, providing capabilities such as mass device management and LDAP integration to enable secure multi-level user access and authentication. It also delivers remote system health monitoring to ensure video is always there when needed – a critical feature to help ensure cannabis operators remain compliant with video surveillance requirements at all times.
It began with a desire to help students fit in. Officials in Maine School Administrative District (MSAD) 58 introduced uniform bar-coded plastic ID cards to replace their existing color-coded punch cards so that students eligible for free lunches would not easily be identified by their friends. “In the past, students used punch cards to buy their lunches,” said Angel Allen, Technology Director for both MSAD 58 and neighboring district, MSAD 9. “The different colors identified their economic status for other students to see. It was not a good thing.” Some students chose not to eat rather than be embarrassed by the color of their card. The issue is a significant one. Between 40 and 60 percent of students in MSAD 58 qualify for a reduced lunch program, according to Allen. The district, which sits in a rural area of Franklin County, Maine, covers 500 square miles and serves 1,000 students through five schools. Using ID cards was not new to the Maine school administrators. Sister district, MSAD 9, had been using ID cards as visual identity for its staff for a long time, according to Allen, but “the old system was a beast.” Direct-to-Card Printer/Encoder MSAD 58 began using ID cards printed on a new Fargo DTC300 Direct-to-Card Printer/Encoder for the hot lunch program in the fall of 2005, with the lunch director printing the cards. A second printer was purchased in 2006 and is operating out of the superintendent’s office to create staff ID and lunch cards. MSAD 58 continues to expand its use of ID cards: It created a debit system in which parents can apply money to the card so their children can charge against it rather than carrying money to school. ID cards without photos are used for substitute teachers, volunteers and parents who enter the schools. Students and faculty can check out library materials using their ID cards. Students without drivers’ licenses have even used their school ID cards for identification on school trips. In 2006, thanks to her experience in MSAD 58, Allen added a Fargo DTC400 printer to MSAD 9 Building access solutions “We also use the ID cards as medical emergency cards,” said Allen. “They are particularly useful on field trips to identify students with allergies, diabetes or asthma and to provide emergency contact numbers.” In 2006, thanks to her experience in MSAD 58, Allen added a Fargo DTC400 printer to MSAD 9. The district is printing RFID cards for staff ID and building access. There is also a DTC300 for the student lunch program. “My experience in MSAD 58 introduced me to Fargo,” said Allen. MSAD 9 includes nine schools and serves 2,500 students. Here, the ability to print on two sides of a card was important, as administrators wanted a bar code on the back to work with the district’s time card system and door access program. In addition, the district is initiating a new lunch program, and a library program is in the works. Software integration “In MSAD 58, we began printing small, key chain ID cards from perforated card stock,” said Allen. “Each includes the student’s name and a bar code. Being able to carry their ID card on a key chain helps prevent students from losing their cards.” Nevertheless, a $1 replacement fee is charged each lost card, although the fee was never meant to build revenue. “It’s just enough to aggravate the students,” Allen said. TAll students carry the same plastic ID card. Information on their lunch status is contained in a bar code on the back of the card. “Now, everyone has the same card,” said Allen. “The bar code number is scanned into the cafeteria software, and only the computer can distinguish who is eligible for a reduced lunch from those who are not.” Fargo printers are well known for their ability to print bar codes with the level of clarity to be read by scanners Student ID cards “The big thing with schools is technology,” said Jennifer Clancy, ID Wholesaler Marketing Manager (www.idwholesaler.com), who sold Allen the printers. “In Angel’s case, she is creating a system where the student ID is a stored-value card for the lunch program using a bar code. Fargo printers are well known for their ability to print bar codes with the level of clarity to be read by scanners. Schools nationwide are instituting policies where a visible ID is required of students, faculty and staff at all times. With a visible ID, there is no excuse for a person to be somewhere he or she is not supposed to be. Individuals can be better identified and dealt with by the existing school protocols.” Requirements for the ID cards differ between high school and elementary school students. High school students are required to carry their ID cards at all times. In the elementary schools, students grab their ID cards from a rack on the wall outside the lunch room each day before lunch. Cards are scanned by the cashier and put back in a basket, so someone can replace them in the rack after lunch. “Younger kids can’t be responsible for remembering to bring their card every day,” Allen said. School security system Employees, especially those with multi-school assignments, such as administrators, supervisors, plant operations, maintenance, food service and transportation personnel are required to display their identification card at all times when performing duties for the school system. “Schools that have a student photo ID program in place are starting to expand the use of the cards to applications such as library checkout, lunch program management, equipment checkout, access to computers, student activity passes and bus access,” said Clancy. “More advanced schools are moving to cashless vending, lunchroom use or activity attendance.” Allen, who is responsible for the technology in both MSAD 58 and MSAD 9, envisions expansion of the ID card program, especially the RFID technology component for access control. “We try things in one place and then take them beyond,” she said. “That’s the cooperative nature of our districts.” But for now, simply using ID cards to help students fit in during lunch is a huge step forward.
HID Global, a global provider of trusted identity solutions, has announced that HID is the world’s first ticketing solution provider to be certified to deliver more secure, lower cost, faster contactless tickets based on an open standard called Calypso Light Application (CLAP). CLAP-certified SOMA Atlas Public transportation authorities around the world no longer need to accept lower security, incompatibility and slower speeds or be locked into a proprietary low-end ticket system. HID’s CLAP-certified solution, SOMA Atlas, is now recognized by the Calypso Networks Association (CNA) as providing interoperability and greater flexibility to transportation operators. “HID Global is bringing a new level of trust to low-cost contactless tickets for public transportation by supporting an open standard that will overtake the proprietary memory cards commonly used for low-end tickets, such as single trip tickets,” said Cesare Paciello, Vice President, Ticketing & Transport with HID Global. “Being the first ticket provider in the world to achieve Calypso Light Application certification positions HID strongly to lead the way to enable mid-sized and smaller public transportation networks to do next-generation automated fare collection.” Contactless CLAP Ticketing Recognized widely and deployed in many countries for secure, fast and flexible ticketing, Calypso is an open standard of contactless ticketing, suitable for multiple applications, especially public transportation in which Calypso cards and NFC mobile phones are used. To extend the success of the Calypso standard and help solve the incompatibility of low-cost tickets, a worldwide group of transport operators in the Calypso Networks Association, a not-for-profit standards body, ratified a set of specifications for the Calypso Light Application standard. CLAP tickets have the same security as high-end tickets, such as sports season tickets, but at a lower cost CLAP tickets have the same security as high-end tickets, such as sports season tickets, but at a lower cost than typical Calypso tickets. CLAP is also simple to deploy because, unlike proprietary memory cards, the use of CLAP tickets does not require development work to be integrated into an Automated Fare Collection (AFC) System. Automated Fare Collection System To become the first ticketing solution provider to receive the CLAP certification, HID had to pass the technical evaluation that was conducted by Elitt, a CNA-accredited laboratory. HID has been working with Calypso technology since 2014, resulting in the development of the SOMA Atlas, an OS architecture that combines the multi-application capabilities of the KIAT operating system with the Calypso 3.1 standard. HID achieved its first Calypso certification in July 2016 with SOMA Atlas V1, which proved to be one of the fastest products of its kind. RFID, Key Management and Smart Card Tokens As the next logical step in its evolution of an open standards-based approach, HID’s ticketing and transportation team in Italy developed the CLAP-certified SOMA Atlas OS architecture to broaden the customer acceptance of more secure ticketing by small to mid-sized transportation operators. Known as the ticketing solution provider that delivered millions of tickets for the 2018 FIFA World Cup, HID provides end-to-end ticketing solutions, including transportation ticketing terminals, data capturing software, key management capabilities, RFID paper tickets, smart card tokens, smart wristbands, among other components. Its multi-application operating systems can be integrated with existing hardware.