NVT Transmitters & Controllers(9)
TBus is a backbone communications architecture for NVT’s range of IP transmission devices. TBus supports all forms of coax and UTP cable, as well as 18/2, 2-wire (un-twisted wire), and STP (shielded twisted-pair) in any combination of star, peer-to-peer, or daisy-chain cabling topology. TBus delivers 56VDC power for remote transceivers as well as their remote PoE devices (IP cameras, etc.) Loads of up to 1 amp are possible, supporting high power PoE+ devices up to 50 watts. TBus supports advanced 128-bit AES encrypted network speeds of up to 200Mbps. Data distances of 8,000ft are possible on RG59/U. NV-ET1801 - TBus™ Single Port PoE+ TransmitterNV-ET1804 - TBus™ Four Port PoE+ TransmitterNV-ER1804 - TBus™ Four Port ReceiverNV-ER1808i - TBus™ Eight Port Receiver HubNV-ER1816i - TBus™ Sixteen Port Receiver HubAdd to Compare
Network Video Technologies (NVT) has released a new Ethernet over Coax solution positioned to support coax-based legacy CCTV installations that are migrating to IP. The Model NV-EC1701 Ethernet over Coax EoC Transceiver is a compact media converter that allows 10/100 BaseT Ethernet and PoE power to be transmitted up to 2,500 ft (750 m) using new or existing coax cable. Transceivers may be linked together using BNC "T" adaptors, forming a bus-architected network that supports up to (4) EoC transceivers and IP/Megapixel cameras.48VDC class 2 power is delivered to one transceiver, which distributes PoE to up to four remote transceivers, and their IP/PoE cameras, or other devices. Camera loads of up to 45 watts are supported. These devices are quick to install, simple to use and network transparent, with no transceiver IP or MAC address configuration required. Three status LEDs indicate power, link, and activity for its RJ45 and coax ports."With the introduction of the NVT EoC product, we are providing our customers with a cost-effective opportunity to deploy IP cameras over installed coax cable, at distances and power levels well above conventional PoE." says Guy Apple, NVT's Marketing VP. "Our advanced transmission and power technology provides ultra-robust full-duplex connectivity for all IP cameras, including megapixel, affording an easy transition to IP."As with all NVT products, the NV-EC1701 is covered by a limited lifetime warranty, and are UL and cUL listed, and CE, RoHS, and WEEE compliant. They are also backed by NVT's award winning customer service.Add to Compare
The NVT Model NV-ET1804 TBus PoE+ Transmitter is a compact bus-architected media converter that delivers 10/100 BaseT Ethernet and PoE+ power via coax, UTP or 2-Wire or Shielded Twisted Pair cable. These transmitters are extremely simple to use, with no IP or MAC addressing required. Status LEDs indicate power and link connectivity/quality/activity for RJ45 and TBus ports. The NV-ET1804 TBus Ethernet Transmitter is backed by NVT’s award winning customer support, Limited Lifetime Warranty and advance replacement. Features:• Transmit 10/100/PoE+ BaseT, over Coax 8,000ft* over RG-59U; 2,000ft over 2-Wire/UTP; 1,300ft over Shielded Twisted-Pair*• Use with either the NV-ER1804 (4-Port), the NV-ER1808i (8-Port) or the NV-ER1816i (16-Port) Ethernet Receivers• Powers PoE, PoE+, or High Power PoE cameras (or other PoE devices), up to 50 watts• Easy configuration, no PC required• Status LEDs include: Power (Blue), Link Data (Green), Link Quality (Red/Amber/Green), RJ45 PoE (Green)• Transparently supports all networking protocols (UDP, TCP/IP, HTTP, Multicast etc.) • Advanced 128-bit AES encrypted transmission and PoE+ power technology• Built-in transient protection; industrial temperature range *Distance and number of devices supported may lower due to limited power supply capacity and wire voltage-drop, or data-rate limiting due to the selected wire’s high-frequency signal attenuation. See manual or IP Distance Calculator at nvt.com.Add to Compare
NVT NV-EC1701U-KIT3 transmission system has the following features: Transmit 10/100 BaseT full duplex Ethernet up to 1,000ft (305m) over 4-pair cat5; 750ft (228m) over 18/2 (or similar 2-wire cable); 500ft (150m) over shielded twisted-pair 56VDC is distributed over 2-wire cable to all connected IP devices Powers PoE entry stations (or other PoE or PoE+ devices), up to 50 watts One NVT Eo2TM transceiver at the network-end can support multiple remote Eo2TM transceivers and connected devices Up to four Eo2TM transceivers can be rack mounted on an NV-RMEC16U Eo2TM Rack mount tray kit, connecting up to 16 entry stations or other devices Easy configuration, no PC required Transparently supports all networking protocols (UDP, TCP/IP, HTTP, Multicast with IGMP, etc.) Advanced 128-bit AES encrypted transmission and PoE+ power technology Built-in transient protection; Industrial temperature rangeAdd to Compare
The NVT Model NV-ET1801 TBus PoE+ Transmitter is a compact bus-architected media converter that delivers 10/100 BaseT Ethernet and PoE+ power via coax, UTP or 2-Wire or Shielded Twisted Pair cable. These transmitters are extremely simple to use, with no IP or MAC addressing required. Status LEDs indicate power and link connectivity/quality/activity for RJ45 and Tbus ports. The NV-ET1801 TBus Ethernet Transmitter is backed by NVT’s award winning customer support, Limited Lifetime Warranty and advance replacement.Add to Compare
Browse Transmitters & Controllers
Telemtry transmitters and controllers products updated recently
If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property. Any security system that you employ must therefore meet the most demanding commercial requirements of today’s offices, and tomorrow’s. This means thinking beyond a basic intrusion system and specifying a comprehensive solution that integrates smart features like access control, video management and intelligent video analytics. Because only then will you have security you can trust, and detection you can depend on. Reliable Entry Management Access control systems have been developed that guarantee reliable entry management for indoors and outdoors Access control is becoming increasingly important for ensuring the security of office buildings, but as the modern workplace evolves you’re unlikely to find a one-size-fits-all solution. Today, it’s commonplace to control entry to individual rooms or restricted areas and cater to more flexible working hours that extend beyond 9 to 5, so a modern and reliable access control system that exceeds the limitations of standard mechanical locks is indispensable. Access control systems have been developed that guarantee reliable entry management for indoors and outdoors. They use state-of-the-art readers and controllers to restrict access to certain areas, ensuring only authorized individuals can get in. With video cameras located within close proximity you can then monitor and record any unauthorized access attempts. The system can also undertake a people-count to ensure only one person has entered using a single pass. Scalable Hardware Components As previously mentioned, there is no one-size-fits-all system, but thanks to the scalability of the hardware components, systems can adapt to changing security requirements. For example, you can install Bosch’s Access Professional Edition (APE) software for small to medium-sized offices, then switch to the more comprehensive Access Engine (ACE) of the Building Integration System (BIS) when your security requirements grow. And, because the hardware stays the same, any adaptations are simple. APE’s ‘permanent open’ functionality allows employees and guests to enter designated areas easily and conveniently The APE software administers up to 512 readers, 10,000 cardholders and 128 cameras, making it suitable for small to medium-sized buildings. With functions like badge enrollment, entrance control monitoring and alarm management with video verification it provides a high level of security and ensures only authorized employees and visitors are able to enter certain rooms and areas. Of course, there will always be situations when, for convenience, you need certain doors to be permanently open, such as events and open days. APE’s ‘permanent open’ functionality allows employees and guests to enter designated areas easily and conveniently. Growing Security Needs You switch to the Bosch Building Integration System (BIS), without having to switch hardware (it stays the same, remember?). This is a software solution that manages subsystems like access control, video surveillance, fire alarm, public address or intrusion systems, all on a single platform. It is designed for offices with multiple sites and for large companies with a global presence. Bosch Building Integration System (BIS) manages subsystems like access control, video surveillance, fire alarm, public address or intrusion systems, all on a single platform The BIS Access Engine (ACE) administers up to 10,000 readers and 80 concurrent workplace clients per server, and 200,000 cardholders per AMC. An additional benefit to security officers is the ability to oversee cardholders and authorizations through the central cardholder management functionality and monitor all access events and alarms from every connected site. For consistency, multi-site cardholder information and access authorizations can be created on a central server and replicated across all connected site servers, which means the cardholder information is always up to date and available in every location. Intrusion Alarm Systems Bosch B Series and G Series intrusion control panels can also send personal notifications via text or email Securing all perimeter doors is vital when protecting employees, visitors and intellectual property. Doors are opened and closed countless times during business hours, and when intentionally left open, your office is vulnerable to theft, and the safety of your employees is compromised. For this reason, intrusion control panels have been developed with advanced features to ensure all perimeter doors are properly closed, even when the system is not armed. If a door remains open for a period of time (you can specify anything from one second to 60 minutes), the system can be programmed to automatically take action. For example, it can activate an audible alert at the keypad to give employees time to close the door. Then, if it is still not closed, it will send a report to a monitoring center or a text directly to the office manager, and when integrated with video it can even send an image of the incident to a mobile device. Customized Intrusion Systems What about people who need to access your building outside of working hours, like cleaning crews? Your intruder system allows you to customize the way it operates with a press of a button or swipe of a card. This level of control enables you to disarm specific areas, bypass points and unlock doors for cleaning crews or after-hours staff, whilst keeping server rooms, stock rooms and executive offices safe and secure. Bosch B Series and G Series intrusion control panels can also send personal notifications via text or email. You can program the panel to send you opening, closing, and other event alerts, which means you don’t have to be on-site to keep track of movements in and around your facility. Video Management System A video management system will add a next level of security to your access control system Every office building has different video security requirements depending on the location, size and nature of the business. Some offices may only need basic functions such as recording and playback, whereas others may need full alarm functionalities and access to different sites. A video management system will add a next level of security to your access control system. For example, the video system can provide seamless management of digital video, audio and data across IP networks for small to large office buildings. It is fully integrated and can be scaled according to your specific requirements. The entry-level BVMS Viewer is suitable for small offices that need to access live and archived video from their recording solutions. With forensic search it enables you to access a huge recording database and scan quickly for a specific security event. For larger offices, embellished security functions for the BVMS Professional version can manage up to 2,000 cameras and offers full alarm and event management Full Alarm And Event Management For larger offices, embellished security functions for the BVMS Professional version can manage up to 2,000 cameras and offers full alarm and event management. It’s also resilient enough to remain operative should both Management and Recording Servers fail. Large multi-national companies often need access to video surveillance systems at numerous sites, which is why BVMS Professional allows you to access live and archived video from over 10,000 sites across multiple time zones from a single BVMS server. When integrated with the BVMS Enterprise version multiple BVMS Professional systems can be connected so every office in the network can be viewed from one security center, which provides the opportunity to monitor up to 200,000 cameras, regardless of their location. Essential Video Analytics Video analytics acts as the brain of your security system, using metadata to add sense and structure to any video footage you capture If your strategy is to significantly improve levels of security, video analytics is an essential part of the plan. It acts as the brain of your security system, using metadata to add sense and structure to any video footage you capture. In effect, each video camera in your network becomes smart to the degree that it can understand and interpret what it is seeing. You simply set certain alarm rules, such as when someone approaches a perimeter fence, and video analytics alerts security personnel the moment a rule is breached. Smart analytics have been developed in two formats. Essential Video Analytics is ideal for small and medium-sized commercial buildings and can be used for advanced intrusion detection, such as loitering alarms, and identifying a person or object entering a pre-defined field. It also enables you to instantly retrieve the right footage from hours of stored video, so you can deal with potential threats the moment they happen. Essential Video Analytics also goes beyond security to help you enforce health and safety regulations such as enforcing no parking zones, detecting blocked emergency exits or ensuring no one enters or leaves a building via an emergency exit; all measures that can increase the safety of employees and visitors inside the building. Intelligent Video Analytics Intelligent Video Analytics have the unique capability of analyzing video content over large distances Intelligent Video Analytics have the unique capability of analyzing video content over large distances, which makes it ideally suited to more expansive office grounds or securing a perimeter fence. It can also differentiate between genuine security events and known false triggers such as snow, rain, hail and moving tree branches that can make video data far more difficult to interpret. The final piece in your security jigsaw is an intelligent camera. The latest range of Bosch ’i’ cameras have the image quality, data security measures, and bitrate reduction of <80%. And, video analytics is standard. Be prepared for what can’t be predicted. Although no-one can fully predict what kind of security-related event is around the corner, experience and expertise will help make sure you’re always fully prepared.
The term “smart city” gets thrown around a lot nowadays, but as different technologies that strive to be defined in this way are adopted by different countries globally, the meaning of this phrase gets lost in translation. The simplest way to define a “smart city” is that it is an urban area that uses different types of data collecting sensors to manage assets and resources efficiently. One of the most obvious types of “data collecting sensor” is the video camera, whether that camera is part of a city’s existing CCTV infrastructure, a camera in a shopping mall or even a police car’s dash camera. The information gathered by video cameras can be used with two purposes in mind, firstly: making people’s lives more efficient, for example by managing traffic, and secondly (and arguably more importantly): making people’s lives safer. Live Streaming Video All The Time, Everywhere In the smart and safe city, traditional record-only video cameras are of limited use. Yes, they can be used to collect video which can be used for evidence after a crime has taken place, but there is no way that this technology could help divert cars away from an accident to avoid traffic building up, or prevent a crime from taking place in the first place. However, streaming live video from a camera that isn’t connected to an infrastructure via costly fiber optic cabling has proven challenging for security professionals, law enforcement and city planners alike. This is because it isn’t viable to transmit video reliably over cellular networks, in contrast to simply receiving it. Video Transmission Challenges Transmitting video normally results in freezing and buffering issues which can hinder efforts to fight crime and enable flow within a city, as these services require real-time, zero latency video without delays. Therefore, special technology is required that copes with poor and varying bandwidths to allow a real-time view of any scene where cameras are present to support immediate decision making and smart city processes. The information gatheredby video cameras can beused to make people’s lives more efficient, and to make people’s lives safer There are many approaches to transmitting video over cellular. We’ve developed a specialist codec (encoding and decoding algorithm) that can provide secure and reliable video over ultra-low bandwidths and can therefore cope when networks become constrained. Another technique, which is particularly useful if streaming video from police body worn cameras or dash cams that move around, is to create a local wireless “bubble” at the scene, using Wi-Fi or mesh radio systems to provide local high-bandwidth communications that can communicate with a central location via cellular or even satellite communications. Enhanced City Surveillance Live video streaming within the smart and safe city’s infrastructure means that video’s capabilities can go beyond simple evidence recording and evolve into a tool that allows operations teams to monitor and remediate against incidents as they are happening. This can be taken one step further with the deployment of facial recognition via live streaming video. Facial recognition technology can be added on to any video surveillance camera that is recording at a high enough quality to identify faces. The technology works by capturing video, streaming the live video back to a control center and matching faces against any watch lists that the control center owns. Importantly, the data of people who aren’t on watch lists is not stored by the technology. Identifying Known Criminals This technology can work to make the city safer in a number of ways. For example, facial recognition could spot a known drug dealer in a city center where they weren’t supposed to be, or facial recognition could identify if a group of known terror suspects were visiting the same location at the same time, and this would send an alert to the police. Facial recognition technology captures and streams live back to a controll center, matching faces against any watch lists that the control center owns In an ideal world where the police had an automated, electronic workflow, the police officer nearest to the location of the incident would be identified by GPS and would be told by the control room where to go and what to do. Most police forces aren’t quite at this technological level yet, and would probably rely on communicating via radio in order to send the nearest response team to the scene. As well as this, shopping malls could create a database from analog records of known shoplifters to identify criminals as soon as they entered the building. This would be even more effective if run co-operatively between all shopping malls and local businesses in an area, and would not only catch any known shoplifters acting suspiciously, but would act as a deterrent from shoplifting in the first place. Live Streaming For Law Enforcement As mentioned above, live streaming video from CCTV cameras can help the police fight crime more proactively rather than reactively. This can be enhanced even further if combined with live streaming video from police car dash cams and police body worn cameras. If video was streamed from all of these sources to a central HQ, such as a police operations center, the force would be able to have full situational awareness throughout an incident. This would mean that, if need be, officers could be advised on the best course of action, and additional police or other emergency services could be deployed instantly if needed. Incorporated with facial recognition, this would also mean that police could instantly identify if they were dealing with known criminals or terrorists. While they would still have to confirm the identity of the person with questioning or by checking their identification, this is still more streamlined than describing what a person looks like over a radio and then ops trying to manually identify if the person is on a watch list. The smart, safe city is possible today – for one, if live video streaming capabilities are deployed they can enable new levels of flow in the city. With the addition of facial recognition, cities will be safer than ever before and law enforcement and security teams will be able to proactively stop crime before it happens by deterring criminal activity from taking place at all.
The use of drones has increased dramatically in the last few years. Indeed, by 2021, the FAA says the number of small hobbyist drones in the U.S. will triple to about 3.55 million. With that growth, drone capabilities have increased while costs have decreased. For example, the DJI Phantom 4 can deliver a 2-pound payload to a target with 1.5m accuracy from 20 miles away for the less than $1000.00. This is an unprecedented capability accessible to anyone. This new technology has created an entirely new security risk for businesses and governments. Drone Security Risks Already, rogue groups such as ISIS have used low cost drones to carry explosives in targeted attacks. Using this same method, targeting high profile locations within our borders to create terror and panic is very possible. Security professionals and technologists are working furiously to address the gaps in drone defense. Currently, the most common technologies in use for drone detection are video, acoustic sensors, radio, and air surveillance radar. Each of these has advantages, but they also have flaws that make it difficult to detect drones in all conditions. Both optical and thermal cameras, as well as acoustic sensors, do not operate in severe weather such as fog and snow. And while radio and air surveillance radar cover a wide area of detection, they suffer from high installation costs and limiting technical challenges, such as being unable to detect low flying drones on autopilot. Compact Surveillance Radar (CSR) Compact Surveillance Radar (CSR) is a security technology addressing the problems with other types of detection. CSR, like traditional radar, has the benefit of being able to detect and track foreign objects in all weather conditions, but at a fraction of the size and cost. The compact size allows the radar to be mounted on existing structures or even trees, providing extensive perimeter defense almost anywhere that you can imagine. CSR can also filter out clutter such as birds by using an advanced algorithm reducing the number of false alarms. While the use of CSR and the other detection technologies are legal in the US and in most locations throughout the world, the response mechanisms are generally not. Current regulations in the US prohibit the use of jamming or GPS spoofing in all cases except for a few federal agencies Regulations Limiting Drones Current regulations in the US prohibit the use of jamming or GPS spoofing in all cases except for a few federal agencies. This makes it difficult to stop the damage that drones can cause. The FAA has put into place new regulations that limit some uses of drones. However, in most cases it is still illegal for even state or local governments to stop or interfere with drones other than to locate the operator and have them land the drone. In 2016 the first law to neutralize a drone in the United States was passed in Utah to respond to drones in wildfire areas because of their interference with airborne firefighting. This law may very well provide a model for other states dealing with drones in situations where people’s lives are being put at risk by drones. At the federal level, much effort is being put into evaluating the regulations and technology surrounding the misuse of drones. In the 2016 reauthorization bill for the FAA, Section 2135 included a pilot program for the investigation of methods to mitigate the threat of unmanned aircraft around airports and other critical infrastructure. There are many federal agencies that are evaluating the use of a variety of technologies to respond to this threat. Both optical and thermal cameras, as well as acoustic sensors, do not operate in severe weather such as fog and snow Effective Countermeasure Technologies The most effective countermeasure for drones is jamming, currently off-limits to the private sector. This includes stadiums, convention centers, and other large gathering areas. A number of companies are developing new response technologies that do not require the use of jammers or hacking. Several companies have developed net guns that shoot a net at an approaching drone. These are only effective at less than 100m and frequently miss the target, especially when the drone is approaching at high speed. Several other companies have taken this method a step further, with drones that capture other drones. Once a radar detects a drone, another defense drone is launched and flies to the point of detection. Then, using video analytics it homes in on the drone and fires a net to disable the drone and take it to a safe location. While this drone capturing technique is still in its infancy, it shows a great deal of promise and will not be restricted in the same fashion as jamming. However, even this solution is difficult under current regulations, as all commercial drones in the US must be under direct control of a human operator within their line of sight. This effectively means that a drone operator is required to be on-site at all times to protect a facility, event, or persons. One thing is for certain, technology will continue to adapt and security companies will continue to invent new methods to protect their facilities and the people they are sworn to protect.
More good news for exhibitors on the second day of the Global Security Exchange (GSX) in Las Vegas. Brisk attendance continued early in the day, and then slowed somewhat in the afternoon, but most comments from exhibitors were positive. Exhibitors such as Lenel were “thrilled” with the show, and noticed the steady, good traffic and lots of sales leads. Lenel’s position at the front of the hall probably helped. New developments in mobile credentialing are a big trend at GSX, and Lenel’s BlueDiamond mobile credentials are traveling on a new path, so to speak. The access control company is introducing the idea of “Pathways” as a way of automatically signaling intent to a Bluetooth-enabled smart phone to open a door. A recognizable “pathway” is programmed into the phone, based on signals from nearby readers and locks and also geolocation signals. The system recognizes when a user travels along the pathway and automatically signals the correct door(s) to be opened along the way without the user having to touch his smart phone.A recognizable “pathway” is programmed into the phone, based on signals from nearby readers, locks and also geolocation signals Providing A Lightweight Alternative “When you trigger a pathway, it’s signaling intent to open the door,” says Greg Berry, Vice President Mobile Credentialing, Global Security Products, for United Technologies, parent company of Lenel. “Pathways are customized to a user’s needs and are the common places you are going all the time.” A user who walks the same path daily to the door of an office will find that door opens automatically. Previously using mobile credentials has been “slightly more work than using a badge,” says David Weinbach, Manager of Identity and Product Innovation for Lenel. “Now with Pathways, it’s less work than using a badge.” Specifically, a user no longer has to take out his phone and push a button to signal intent. “Rather than trying to emulate the badge, you create an experience that is better than the badge,” adds Berry. “We want to change the paradigm and turn the market on its ear.”New browser-based clients are being released with each new version of OnGuard software Other news from Lenel includes the release of more mobile and browser-based clients for OnGuard to be used for greater convenience alongside the Window-based clients. Providing a “lightweight” alternative enables some of the functionality of the Windows client in a format that is easy to access on the go. New browser-based clients are being released with each new version of OnGuard software. Cloud-hosted systems using Microsoft Azure are also among the plans for OnGuard, which ultimately will offer on-premises and cloud options. There’s not much comment from the Lenel folks about their parent company United Technologies’ plan to acquire S2 Security, which was announced days before the show. They would only say that the acquisition is waiting for regulatory approval, and that the expectation is that the two companies’ products will be complementary, given S2’s focus on the SMB (small and medium-sized business) market and Lenel’s strength at the enterprise level. The acquisition strategy is to grow both businesses. More details to come about the new combined company. Modern Network Infrastructure NVT Phybridge, a PoE connections company located near the back of the hall, also reported steady booth traffic on Day 2. “There are lots of customers and partners here,” said Steven Fair, Executive Vice President. “We are pleased with the quality of people, but not overwhelmed with the quantity.” FacePRO AI facial recognition is used for real-time searches of terror suspects or criminals throughout a location NVT Phybridge, which provides IP networking products for the telephony industry as well as security, is focused on networking concepts at GSX, in particular the changing requirements for network infrastructure in the age of IoT. We are pleased with the quality of people, but not overwhelmed with the quantity.” Fair uses the term “Modern LAN” to describe the new, changing requirements and in consideration of the specific networking needs of each edge device, whether cameras, sensors, or door access control devices. “Start with the edge device — what does it need from the network? What are its needs and have there been any innovations to enable you to connect to the network more economically?” asks Fair. There is also a green aspect to designing network infrastructure. Can existing equipment, such as coaxial or single twisted-pair cabling, be used, and thus save on disposal costs of the used cabling as well as lowering installation costs? Among NVT Phybridge’s offerings that can serve the changing networking needs in the IoT era is Smart Path PoE, which offers smart power, smart network access and secure connections. The CLEER family of products provides ethernet over existing coaxial cabling to enable easy transition from analog to IP cameras. The PoLRE products supply ethernet and power to travel over a single unshielded twisted pair cable with reach over 400 meters. The products have been used recently to transition a series of cruise ships from analog to IP video without having to replace cabling and spending only two days in dry dock for the installs. A New Focus Away From AI Panasonic is looking to apply AI-based capabilities to vehicle recognition in the near future, with the ability to identify vehicle characteristics Deep learning and artificial intelligence (AI) seem to be taking a lower profile at this show, perhaps signaling the end of the hype. Companies that mention AI point to specific products that use the technology and are currently available. For example, Panasonic is featuring its FacePRO AI-based facial recognition system. The system uses face images captured from video — grabbing up to 30 to 35 faces a second as video is recorded. The system saves the best of those face images, eliminating extensive duplication, as thumbnails, which are linked to the video footage where the faces appear. To find video in which a face appears, the operator merely drags-and-drops the thumbnail image and commands the system to “go fetch” video that contains that face. The system then produces a timeline showing where the face appears in the feed from each video camera on the premises, so an operator can track the movements of a suspect throughout a facility. The tool helps to simplify and shorten the workflow of locating a suspect in real-time and is affordable for a wider range of uses beyond the traditional airports or high-end applications. The FacePRO software is offered on any Panasonic camera, and works with a separate FacePRO server that is integrated with the video recorder. The system can be added easily to existing systems and is useful for such applications as real-time searches for terror suspects or other criminals throughout a location. Panasonic is also looking to apply AI-based capabilities to vehicle recognition, too, in the near future, with the ability to identify vehicle characteristics such as color, type of vehicle and direction of travel. On the VMS side, Panasonic is transitioning its Video Insight software to a modular approach, tailoring solutions for a growing range of vertical markets, such as transportation and retail, all using “plug-ins” that enhance operation of Video Insight software. No additional license fees are involved That’s just a sampling of what I saw on Day 2 of the show. I have more to share in a final show report, including what I see tomorrow on the final (shortened) day.
In early 2017, the Colombian government made its state-of-the-art Army Aviation Logistics Center (Spanish acronym, CLAVE), fully operational. Designed and built by the U.S Army Corps of Engineers, CLAVE is an over 9,000 square meter facility designed to provide support for the transportation, storage, distribution, and security of the Colombian Army’s aeronautical equipment. To comply with international standards for aeronautical logistical activities, the implementation of a high-level security system was required, and this included deploying a complete IP CCTV surveillance system of over 100 cameras to monitor the entire center and its surroundings. Requirement was for implementing an IP CCTV system that utilizes the coaxial wiring in their new facility. However, barriers posed by long reach requirements between the cameras and surveillance control center, and the financial costs associated with installing IDF closets to support the cameras at distances greater than those supported by standard Ethernet switches (328ft, 100m) – caused CLAVE to seek out a solution based on the principles of the Modern LAN, allowing them to deploy the new IP CCTV system quickly, efficiently, and affordably.Not only did the NVTP solution take the signal and transmit it through the wiring, but it also provided power to the camera" NVT Phybridge CLEER24 The Colombian Army was introduced to the NVT Phybridge CLEER24 (Coax Leveraged Ethernet Extended Reach) managed switch solution, by Colombian distributor SAC. The award-winning CLEER24 solution provides Ethernet and PoE+ over Coax with up to 2,000ft (610m) reach. In just 3 quick and easy setup steps, the plug-and-play switches transformed the cabling into the power-packed IP platform needed to support the new IP cameras for distances up to 2,000ft (610m) – 6Xs farther than standard Ethernet, with no need for costly IDF closets. “In our case where distance limitations were a critical issue, NVT Phybridge made all the difference when other solutions on the market could not,” said Paula Rosana Murillo, Business Development Coordinator at SAC. “Not only did the NVTP solution take the signal and transmit it through the wiring, but it also provided power to the camera.” Cost-Saving Security Solution CLAVE was able to smoothly and flawlessly deploy 109 cameras across the entire facility, with virtually no disruption to operations and saving tens of thousands of dollars while doing so. For the integrator, this was a professionally enriching experience, “NVT Phybridge, through its Colombian distributor SAC, facilitated access to technical training and support – ensuring the proper usage of these products and allowing the integrator to have greater confidence in the implementation of NVTP technology,” commented Oscar Triviño, Project Manager in charge of the CLAVE facility construction. “The implementation of the NVTP solutions generated savings in wiring, electrical infrastructure, and manpower that were estimated at $56,000USD – with the connection of all cameras to the power source being achieved in the most effective way possible.”NVT Phybridge technology ensured the quality of all the video content, fully taking advantage of the quality, state-of-the-art cameras used in the project" IP Surveillance And Remote Monitoring With CLEER24 technology, the customer was able to take full advantage of Modern LAN principles, fast-track their IP camera deployment, while eliminating risk and creating a robust platform that can be managed remotely: no Coax replacements, no service outages, no security risks, no network complexity, and no wasted budgets. “NVT Phybridge technology ensured the quality of all the video content, fully taking advantage of the quality, state-of-the-art cameras used in the project and providing an immensely satisfying result for the Colombian Army.”
A transportation agency needed to modernize its analog CCTV systems and cameras to improve surveillance capabilities. But planning the coax infrastructure replacement raised many concerns and barriers, causing delays to the project. NVT Phybridge was trusted to rapidly enable the established cabling to support the new Axis IP devices exactly when and where the agency wanted them. “The NVT Phybridge technology allowed this customer to improve investigations and safety much faster and more cost-effectively than planned.” Steven Fair, EVP, NVT Phybridge. The agency wanted to upgrade its analog CCTV systems and devices to newer, IP-enabled surveillance technology across multiple transit facilities spread throughout a vast metropolitan area. The driving requirement for the upgrade was twofold: to improve safety and security monitoring of riders 24/7, and to capture much higher-resolution video recordings for investigation of events. Ethernet Over Coax System The agency wanted to upgrade its analog CCTV systems and devices to newer, IP-enabled surveillance technology The main challenge was physically replacing the existing coax with a new Ethernet infrastructure needed to support IP. The process would be lengthy, complex, costly, and disruptive to transit operations and rider services across hundreds of sites. Additionally, physical construction to replace the cabling and address IDF closet and reach requirements would impact transit customers’ access to services, and posed safety hazards to thousands of public transportation users each day. The transportation agency learned about NVT Phybridge Long Reach Ethernet over Coax IP-enabling solutions from their savvy Axis partner. A no-obligation proof of concept was arranged at one of transit stations, and in 3 simple setup steps the award-winning, plug-and-play NVTP EoC switch transformed the existing coax into a power-packed PoE/IP platform able to connect the new CCTV and IP cameras 6Xs farther than Ethernet—up to 2,000ft (610m)—with no IDF closets required along the way. NVTP completely eliminated the complexities and frustrations that had delayed the infrastructure upgrade for too long. Because NVTP innovations use the same repeatable, predictable, and scalable deployment methodology across every location, upgrading each of the many transit facilities would be simple and fast. The NVTP EoC switches fast-tracked the infrastructure upgrade, saving significant project time and costs by avoiding coax replacement Effective IP Surveillance And Security The agency’s decision to trust NVTP and Axis with the extensive security upgrade was right. The NVTP EoC switches fast-tracked the infrastructure upgrade, saving significant project time and costs by avoiding coax replacement. The partner was also able to accelerate the endpoints deployments with a simple swap-out of the existing analog cameras for the Axis IP cameras. The agency’s new, powerful IP-based surveillance capabilities were up and running in record time at each location. The combined power of NVTP and Axis innovations rapidly enabled this agency to improve investigations and safety much faster than originally planned—without disrupting transit operations, impacting riders’ services, or wasting coveted budgets. Pleased with the result of the first several facilities upgrades, the transportation agency has decided to move forward with the remaining upgrades across their entire area using NVTP switches and Axis IP devices to get the job done right.
H.265 High Efficiency Coding: Video Compression For Security ApplicationsDownload
How To Overcome The Storage Challenges Of Adopting Surveillance AIDownload
Physical Security Supports A Future-Proof Cyber Security StrategyDownload
- Everbridge Wins Contract To Support Deployment Of Australia’s Nation-Wide Early Warning System
- Idesco Security Key Management Service Secure Evotec’s Systems Against Cargo Thefts
- Siklu’s Etherhaul MmWave Radios Enhance Surveillance Network For Burnley Town Centre
- Siklu MmWave Technology Deployed In Cambridge City Center For CCTV Surveillance System