Bosch Telemetry Receivers (13)
Browse Telemetry Receivers
Telemtry receiver products updated recently
End users can add security, safety and business intelligence – while achieving a higher return on investment at their protected facilities – with live streaming video. It can be deployed effectively for IP video, network video recorders (NVRs) and body-worn cameras. The growing use of streaming video is resulting in vast technological developments and high-end software that promotes reduced bandwidth, high scalability and lower total cost of ownership (TCO). Here’s how users can add value to security with live streaming video and what they should look for in the procurement of technology solutions. Questions are answered by Bryan Meissner, Chief Technology Officer and Co-Founder of EvoStream. Q: What is live streaming video and how does it apply to physical security? BM: In its simplest and most popular form, video streaming allows users to watch video on PCs, laptops, tablets and smartphones. According to GO-Globe, every 60 seconds more than 400 hours of video are uploaded and around 700,000 hours watched. The key to effective video streaming is for the platform to be able to adapt to the limits of the internet or network connection so the viewer gets an unbridled experience without buffering or signal loss. Live video streaming in security applications leverages a variety of connected devices, appliances and services including the cloud, mobile platforms, IP cameras and NVRs, becoming an enabling technology for more effective, real-time data capture at the protected premises. It reduces bandwidth costs and infrastructure operating requirements by streaming directly from cameras, mobile devices, drones, body worn units and loT devices to browsers, phones and tablets. The best solutions optimize the experience for the user and permit image capture and retrieval from Android, iOS, browser platforms or directly from cameras or NVRs—streaming to wherever the user desires. Quality live streaming applications provide clear, real-time images and retrieve high-resolution video that can be used for evidence, identification, operations management or compliance regulation and control. The most cost-effective solutions offer minimal hardware requirements, lower overall operating expenses and promote high scalability – even integration with many legacy security management platforms. Q: What are some challenges of live streaming video and how are those being addressed by new technology? BM: Live streaming video can present challenges when a solution isn’t designed specifically for the security infrastructure. End users need to look for forward-thinking software and firmware solutions which offer reduced bandwidth requirements, high scalability and a lower total cost of ownership (TCO) or they will be disappointed with the results and costs of maintaining services for end users. The most competent live video streaming lets users integrate with and run on any platform, appliance or device The technology is changing rapidly, so only providers who focus on innovation can keep pace and future-proof the user and their facility. To be most effective, video needs to be able to stream consistently and reliably to and from a host of different devices, platforms, browsers and mediums, on-premises servers or the cloud. Video footage needs to be obtained quickly and deliver critical metadata, with built-in cyber safeguards and hardening such as automatic encryption and authentication. Q: What do end users need to look for in solutions for effective video streaming? BM: Implementing a live streaming video platform should result in greater efficiency and reduced operational costs. Live video streaming to and from a variety of connected devices, appliances and services requires sub-second latency from image capture to delivery. It also needs to be as open and agnostic as possible – spanning multiple technologies, standards and protocols and giving the user enhanced flexibility for their specification. The most competent live video streaming lets users integrate with and run on any platform, appliance or device including standalone servers, server racks, public, private and hybrid clouds and other distribution channels using the same application programming interface or API. Streaming should also support the latest codecs, such as H.264 and H.265 along with widely specified protocols for the distribution of that video. Q: What are some of the trending technological developments in live streaming video applications? BM: Traditional video streaming consumes exorbitant amounts of bandwidth and users pay for video routed through their servers. Some of the latest capabilities, such as peer-to-peer streaming, HTML5 media players, metadata integration and cost-effective transcoding via RaspberryPi enhance overall processing and ultimately strengthen the user experience. Peer-to-peer is a critical, emerging component in effective video streaming. With peer to peer, video does not go through servers but instead streams directly between the camera and the end-user’s phone, for example, eliminating that cost of bandwidth from the platform while still permitting exact control of content. Users stream live from cameras to any device, with the ability to authenticate and approve peering from the back-end infrastructure while enabling low-latency HTML5 without incurring excessive platform bandwidth costs. The explosion of live streaming video in IP video cameras, NVRs and body-worn cameras is driving a new category of high-end software offering reduced bandwidth, high scalability and lower TCO. It prepares users for new technology and the loT, eliminating the largest cost driver of hosted live streaming platforms – bandwidth. Applications that offer peer-to-peer streaming and other feature sets can help future proof the end-user’s investment and strengthen the value proposition for viewing or retrieving live or archived video effectively.
Everybody has been hooked on the discussions about Analog HD or IP systems, but shouldn’t we really be thinking about WiFi and 5G connectivity, removing the need for expensive cabling? Are wireless networks secure enough? What is the potential range? Even the basic question about whether or not the network is capable of transferring the huge (and growing) amount of data required for High Res Video, which will soon be quadrupled with the advent of 4K and higher resolutions. The Future Of Video Surveillance Monitors We have seen a massive uptake in 4K monitors in the security industry. While they have been relatively common in the consumer market, they are only now beginning to really take off in the CCTV market, and the advances in Analog HD and IP technology mean that 4K is no longer the limited application technology it was just a few years ago. Relatively easy and inexpensive access to huge amounts of storage space, either on physical storage servers or in the cloud, both of which have their own positives and negatives, have really helped with the adoption of 4K. Having said that the consensus seems to be, at least where displays are concerned, there is very little need for any higher resolution. So, where next for monitors in CCTV? 8K monitors are present, but are currently prohibitively expensive, and content is in short supply (although the Japanese want to broadcast the Tokyo Olympics in 8K in 2020). Do we really need 8K and higher displays in the security industry? In my own opinion, not for anything smaller than 100-150+ inches, as the pictures displayed on a 4K resolution monitor are photo realistic without pixilation on anything I’ve seen in that range of sizes. The consensus seems to be, at least where displays are concerned, there is very little need for any higher resolution Yes, users many want ultra-high resolution video recording in order to capture every minute detail, but I feel there is absolutely no practical application for anything more than 4K displays below around 120”, just as I feel there is no practical application for 4K resolution below 24”. The higher resolution camera images can be zoomed in and viewed perfectly well on FHD and 4K monitors. That means there has to be development in other areas. Developments In WiFi And 5G What we have started to see entering the market are Analog HD and IP RJ45 native input monitors. While you would be forgiven for thinking they are very similar, there are in fact some huge differences. The IP monitors are essentially like All-In-One Android based computers, capable of running various versions of popular VMS software and some with the option to save to onboard memory or external drives and memory cards. These are becoming very popular with new smaller (8-16 camera) IP installs as they basically remove the need for an NVR or dedicated storage server. Developments in the area of WiFi and 5G connectivity are showing great promise of being capable of transferring the amount of data generated meaning the next step in this market would maybe be to incorporate wireless connectivity in the IP monitor and camera setup. This brings its own issues with data security and network reliability, but for small retail or commercial systems where the data isn’t sensitive it represents a very viable option, doing away with both expensive installation of cabling and the need for an NVR. Larger systems would in all likelihood be unable to cope with the sheer amount of data required to be transmitted over the network, and the limited range of current wireless technologies would be incompatible with the scale of such installs, so hard wiring will still be the best option for these for the foreseeable future. There will be a decline in the physical display market as more development goes into Augmented and Virtual Reality Analog HD Options Analog HD options have come a long way in a quite short time, with the latest developments able to support over 4MP (2K resolution), and 4K almost here. This has meant that for older legacy installations the systems can be upgraded with newer AHD/TVI/CVI cameras and monitors while using existing cabling. The main benefit of the monitors with native AHD/TVI/CVI loopthrough connections is their ability to work as a spot monitor a long distance from the DVR/NVR. While co-axial systems seem to be gradually reducing in number there will still be older systems in place that want to take advantage of the benefits of co-axial technology, including network security and transmission range. Analog technologies will eventually become obsolete, but there is still much to recommend them for the next few years. Analogue technologies will eventually become obsolete, but there is still much to recommend them for the next few years Another more niche development is the D2IP monitor, which instead of having IP input has HDMI input and IP output, sending all activity on the screen to the NVR. This is mainly a defense against corporate espionage, fraud and other sensitive actions. While this has limited application those who do need it find it a very useful technology, but it’s very unlikely to become mainstream in the near future. Augmented Reality And Virtual Reality Does the monitor industry as a whole have a future? In the longer term (decades rather than years) there will definitely be a decline in the physical display market as more and more development goes into AR (Augmented Reality or Mixed Reality depending on who’s definition you want to take) and VR (Virtual Reality). Currently AR is limited to devices such as smartphones (think Pokémon Go) and eyewear, such as the ill-fated Google Glass, but in the future, I think we’ll all have optical implants (who doesn’t want to be The Terminator or RoboCop?), allowing us to see whatever we decide we want to as an overlay on the world around us, like a high-tech HUD (Heads Up Display). VR on the other hand is fully immersive, and for playback or monitoring of camera feeds would provide a great solution, but lacks the ability to be truly useful in the outside world the way that AR could be. Something not directly related to the monitor industry, but which has a huge effect on the entire security industry is also the one thing I feel a lot of us have been oblivious to is the introduction of quantum computers, which we really need to get our heads around in the medium to long term. Most current encryption technology will be rendered useless overnight when quantum computers become more widespread. So, where does that leave us? Who will be the most vulnerable? What can we do now to mitigate the potential upheaval? All I can say for sure is that smarter people than me need to be working on that, alongside the development of the quantum computer itself. Newer methods of encryption are going to be needed to deal with the massive jump in processing power that comes with quantum. I’m not saying it will happen this year, but it is definitely on the way and something to be planned for.
Today, almost every employee carries with them a smart device that can send messages, capture, and record images and increasingly live-stream video and audio, all appended with accurate location and time stamping data. Provide a way for staff to easily feed data from these devices directly to the control room to report an incident and you have created a new and extremely powerful ‘sensor’, capable of providing accurate, verified, real-time multi-media incident information. You need only to watch the television when a major incident is being reported. The images are often from a witness at the scene who recorded it on their device. It is madness that it has until now been easier for people to share information around the world via Facebook and YouTube etc, in a matter of minutes, than it is to transmit it to those that need to coordinate the response. The Public As An Additional Security And Safety Sensor In the UK, a marketing campaign designed by government, police and the rail industry is currently running. Aiming to help build a more vigilant network on railways across the country and raise awareness of the vital role the public can play in keeping themselves and others safe, the ‘See It. Say It. Sorted’ campaign urges train passengers and station visitors to report any unusual items by speaking to a member of rail staff, sending a text, or calling a dedicated telephone number. Essentially, the campaign is asking the public to be an additional safety and security sensor. However, with the help of the latest mobile app technology, it is possible to take things to a whole new level and this is being demonstrated by a large transport network in the US. This organization recognized that the ideal place to begin its campaign of connecting smart devices to the control room as an additional sensor, was by engaging its 10,000 employees (incidentally, this is approximately twice the number of surveillance cameras it has). These employees have been encouraged to install a dedicated app on their cellphones that enables them to transmit important information directly to the control room, as well as a panic button for their own safety. This data can be a combination of images, text, audio, video and even live-streaming, to not only make the control room aware of the situation but give them eyes and ears on the ground. For the control room operator, the insights being fed to them from this ‘sensor’ have arguably more value than any other as they provide pinpoint accurate and relevant information Combating Control Room Information Overload For the control room operator, the insights being fed to them from this ‘sensor’ have arguably more value than any other as they provide pinpoint accurate and relevant information. For example, if an alert comes in about a fire on platform 3, the operator doesn’t necessarily require any of the information from the other sensors, nor does he need to verify it’s not a false alarm. He knows that the information received has been ‘verified’ in-person (it is also time and location stamped) and that there is an employee located in the vicinity of the incident, who they can now directly communicate with for a real-time update and to co-ordinate the appropriate response. Compare this to a 24/7 video stream from 5000 cameras. It is in stark contrast to the typical issue of sensors creating information overload. The employee only captures and transmits the relevant information, so in essence, the filtering of information is being done at source, by a human sensor that can see, hear, and understand what is happening in context. So, if an intruder is climbing over a fence you no longer need to rely on the alert from the perimeter alarm and the feed from the nearest camera, you simply send a patrol to the location based on what the person is telling you. Furthermore, if the control room is operating a Situation Management/PSIM system it will trigger the opening of a new incident, so when the operator receives the information they are also presented with clear guidance and support regarding how to best manage and respond to that particular situation. Transport networks are using staff and the public as additional safety and security sensors Application Of Roaming Smart Sensors To be clear, this is not to suggest that we no longer need these vitally important sensors, because we do. However, one major reason that we have so many sensors is because we cannot have people stationed everywhere. So, in the case of the US transit company, it has been able to add a further 10,000 roaming smart sensors. This can be applied to other industries such as airports, ports, warehouse operations, stadiums, and arenas etc. Now, imagine the potential of widening the scope to include the public, to truly incorporate crowdsourcing in to the day-to-day security function. For example, in May, it was reported that West Midlands Police in the UK would be piloting an initiative that is asking citizens to upload content relating to offences being committed. Leveraging Existing Hardware Infrastructure Typically, when introducing any form of new security sensor or system, it is expected to be an expensive process. However, the hardware infrastructure is already in place as most people are already in possession of a smart device, either through work or personally. What’s more, there is typically an eager appetite to be a good citizen or employee, just so long as it isn’t too much of an inconvenience. Innovations in smart mobile devices has moved at such a pace that while many security professionals debate if and how to roll-out body-worn-cameras, members of the public are live-streaming from their full HD and even 4K ready phones. The technology to make every employee a smart sensor has been around for some time and keeps getting better and better, and it is in the pockets of most people around the world. What is different now is the potential to harness it and efficiently bring it in to the security process. All organizations need to do is know how to switch it on and leverage it.
The 2021 Electronic Security Expo (ESX), presented by Electronic Security Association (ESA), releases the full educational line-up for its upcoming virtual experience, which will take place online from June 15-17. In addition to the main stage presentations and virtual networking opportunities, the three-day virtual event includes 24+ educational sessions across four tracks, designed specifically for security professionals. Specific business challenge In keeping with the event’s theme, ‘Security Inspired,’ sessions will touch on new technologies and services that empower one and the team to grow their business and remain competitive. Attendees who are looking to address a specific business challenge or opportunity can look to the Solution Sets – a collection of sessions that are tailor-made to deliver relevant insights and actionable guidance that take the business to the next level, including: Sales growth Video monitoring The future is now Customer experience Employee focus Financial performance Process optimization Best possible program Changing competitive landscape The ESX 2021 virtual experience program includes more than 46 speakers representing the entire electronic security and life safety ecosystem from companies, such as Alarm.com, ADT, Bosch Security and Safety Systems, CPI, Loud Security, Rapid Response Monitoring Services, Ring, Stanley Security, and many more. "We're excited to bring our community together next month for best practice and idea sharing, anchored by a stellar speaker and session lineup," said George De Marco, Chairman, ESX. "Now more than ever, it is imperative for security professionals to take advantage of opportunities that drive growth and profitability, improve the customer experience, and prepare them for the future. ESX is focused on providing the best possible program for our community and we're confident that they'll walk away energized and inspired ready to take on today’s changing competitive landscape."
Bosch introduces the new Flexidome multi 7000i camera family offering IR and non-IR models that provide 12- or 20-megapixel resolution to deliver highly detailed multi-directional overviews. These overviews are combined with built-in Artificial Intelligence (AI) to support predictive solutions in wide-area coverage applications such as intersections, public spaces, and retail. Each image sensor, offering 3- or 5-megapixel resolution, runs built-in AI that adds metadata to video feeds to convert video data into actionable insights. It helps customers anticipate unforeseen events and prevent them from happening. Generating valuable insights The cameras offer maximum flexibility since every image sensor can be configured independently with up to 16 video analytics rules, enabling customers to decide what to focus on per scene. The Flexidome multi 7000i cameras offer a unique approach that ensures the cameras support sustainable business practices with remote maintenance, configuration, and device management. Camera trainer, based on machine learning, enables system integrators to tailor IVA to detect objects The cameras’ built-in Intelligent Video Analytics (IVA) and camera trainer, both forms of AI, use metadata to add sense and structure to captured video footage. Camera trainer, based on machine learning, enables system integrators to tailor IVA to detect objects or situations that matter most to their customers. These analytics generate valuable insights to support predictive solutions that help operators react before a possible threat or unwanted situation occurs. Automatic person detection These insights can help city planners improve experiences by identifying bottlenecks that compromise the flow of people or cars through public spaces or at intersections. In retail applications, the cameras can deliver insights that help to recognize customer footfall hotspots to inform the positioning of high-margin products to increase sales. All Flexidome multi 7000i cameras offer a single, robust enclosure that houses four independent, high-resolution Automatic Varifocal (AVF) lenses with image sensors offering 3- or 5-megapixel resolution for a detailed multi-directional overview. By using the zoom capability of the lenses, the camera can provide automatic person detection over distances up to 130 meters (430 feet). Balancing uneven exposure The Flexidome multi 7000i cameras offer four image sensors yet have a single IP address The image sensors have a multi-exposure high dynamic range of up to 120 dB reducing shadows and balancing uneven exposure to easily distinguish objects and facial features of pedestrians. All IR models have an integrated 360-degree infrared feature which enables image capture in pitch-dark conditions over a distance of up to 30 meters (98 feet). The Flexidome multi 7000i cameras offer four image sensors yet have a single IP address, only require a single Video Management System license, and can be installed with just one cable. Each of the four image sensors can be independently set up using three-axis movement along a circular track, allowing the capturing of images from practically every angle. This results in maximum convenience, less cabling, shorter installation and set-up time, and therefore reduced costs. Extensive user management The Flexidome multi 7000i cameras are secure by design. They offer a systematic approach centered on a built-in Secure Element hardware with Trusted Platform Module (TPM) functionality, safely storing all certificates and cryptographic keys needed for authentication and encryption. The approach offers extensive user management to ensure only authorized users have access to data, supports a Public Key Infrastructure set-up, and provides software sealing to detect changes in the cameras’ configuration settings. The secure element also supports RSA encryption key lengths of up to 4096 bits, ensuring data safety well beyond 2030.
Effective visitor management must go beyond meeting and greeting visitors who enter the reception area of any business or public building. It must enhance building security, protect facilities and employees, and improve users' and visitors' overall experience. Bosch's just released easy-to-use, browser-based visitor management software offers all the benefits for enhancing the visiting process and integrates seamlessly with the access management system 3.0.1. Visitor management software The user-friendly dashboard of the visitor management software provides receptionists with a quick overview of past and upcoming appointments to help receptionists and security managers to organize their day. They can see the number of expected and checked-in visitors and visitors to check out. Having this information at hand ensures an efficient reception process and a smooth visitor experience. In the onboarding view, receptionists can create, change, and add visitor data and assign pre-defined sets of authorizations such as regular visitor or VIP. This pre-authorization assignment enables visitors to move around the building easily while ensuring that sensitive areas remain protected. Efficient registration process With a streamlined check-in process, a visitor will enjoy a safer more enjoyable visit Thanks to the flexible configuration options, the onboarding view can be adjusted to individual requirements and legal needs, ensuring all necessary data and information can be added to the visitor's profile. Employees can pre-register their visitor via the web-based host view, ensuring receptionists are informed ahead of any visitor for a quick and efficient registration process. Employees complete and save visitor details on the web-based form so the data is readily available to the receptionist. With data entry complete, the receptionist can focus on the most important tasks to complete the visitor registration process such as getting documents signed and taking a photo for a visitor badge. With a streamlined check-in process, a visitor will enjoy a safer more enjoyable visit. Digital signature pad With a self-registration kiosk, first-time visitors can check-in as soon as they arrive, shortening contact and wait times at the front desk. An intuitive user interface at the kiosk enables visitors to manually enter their data or scan a passport or ID. Additional integration options enable a visitor to take a digital photo for a temporary badge and sign required documents on a digital signature pad. Recurring visitors can use the fast check-in option by entering their visitor ID. The kiosk collects data to meet security and safety requirements for an effective way to enhance the visitor management experience.
Artificial Intelligence: Understanding Its Place In Physical SecurityDownload
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Protecting Your Data Against Physical ThreatsDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload
- Optilan To Implement Telecoms And CCTV Services For Seagreen Wind Farm Project
- Softil Foresees MCC Over LTE Communications Playing A Major Role In Operations In The Mining And Transportation Industry
- eyevis UK Video Wall Successfully Secures Oxford Street London Store For Five Years, 24/7
- Siklu MmWave Technology Deployed In Cambridge City Center For CCTV Surveillance System