Home Archive by category Najave II (Page 8)

Najave II

The Future Is Computer Vision – Real-Time Situational Awareness, Better Quality and Faster Insights

Over the past few years, organizations across the globe have moved from piloting to operationalizing enterprise-wide computer vision solutions at scale. Breakthrough technologies that were destined to take 5 to 10 years to appear in the market are being implemented today, and this trend of adapting to the latest advanced technologies shows no sign of stopping.

Nigel Steyn, Sales CTO, Computer Vision Edge IoT, Dell Technologies

Years ago, computer vision was just a clever science fiction innovation, but now it’s a reality that is quickly becoming a part of the enterprise landscape.

In essence, computer vision uses AI and machine learning to make sense of digital video, images, audio and even biometric data, and provides insights and conclusions. With data gathered from both cameras and edge based IoT sensors dotted around a building, campus or an entire city, for example, computer vision technology applies algorithmic models to learn about visual data and turn it into information for decision making.

According to Forrester, 80% of organizations expect the number of AI use cases to increase in the next two years.[1] These data-driven organizations are implementing computer vision to improve the customer experience, gain operational efficiencies and ultimately drive new revenue streams. Indeed, IDC says that organizations that are considered data analytics innovators are two times more profitable than their peers.[2]

It all makes sense. Reliable, accessible data helps business and operational leaders make better decisions, strengthens security, gives companies a competitive edge and can transform how organizations deliver products and services.

The missing link: a real-time federated approach

Video intelligence is not new. Most companies, public spaces and even today’s schools are outfitted with video camera systems. What’s standing in the way of translating video into real-time actionable insights, however, is managing the volume, velocity and variety of data, as well as connecting the dots on that data.

While common approaches to data curation and analytics send data to a central platform for processing, doing so can create tremendous amounts of traffic across a network. There’s also latency involved with large data flows traveling back and forth, which is a significant issue if time-sensitive decisions must be made based on the data.

In order to overcome these challenges, some organizations are implementing real-time federated learning models (Figure 1) which allow for the data to be more efficiently processed and stored, for the most part, at the network edge. The idea is to build algorithmic models on a central server, which is often in the cloud, and keep data at the edge where it’s used. Send a model to the edge, train it with the local data, and then send back only the results to the central server for aggregation. In turn, the central model can be improved and sent back to the edge for enhanced local inferencing.

Figure 1. A Federated Learning Model: The flow of information in a federated model keeps data in place from each edge device while enabling secure data sharing of metadata, results and models across users, devices, data centers, and the cloud.

Today’s visual data models are also designed with typical end users – at the edge – in mind. Having data scientists on hand to perform analyses has largely been replaced with standardized models and drag-and-drop workflows for a “create your own” analytics package. An analytics model marketplace has emerged where companies that are investing in computer vision technology but don’t have in-house AI or data science expertise can incorporate models into their operations.

There are significant advantages to the real-time federated approach:

  • You ingest visual data once and can allow multiple applications access to the information.
  • The model that remains on the central server is not tied to specific data; models can be shared with others without security risks.
  • Because training takes place at the edge, network costs are lower and there’s no need to maintain a centralized data lake.
  • The data marketplace democratizes computer vision for the masses, enabling the sharing and monetization of pre-trained models aligned with specific use cases.

Computer vision’s impact today

Computer vision touches our everyday lives. You probably use computer vision without realizing it. Does your smartphone have facial recognition that lets you unlock the device or authenticate to online banking sites? That’s computer vision. Consider modern cars with embedded cameras. Visual data used from the cameras as well as other sensors gives modern cars the ability to parallel park themselves. Adaptive cruise control regulates a car’s speed while leaving a safe gap between itself and other vehicles, and the accident avoidance system applies the brakes when a car is too close to an object in front of it.

From a business perspective, you can find applications of computer vision across nearly every vertical – retail, transportation, healthcare, manufacturing and energy, to name a few. And you can apply computer vision across those verticals to achieve substantial outcomes, such as personal and facility safety, improved customer experience, operational efficiencies, sustainability and revenue generation. With good visual data and constantly improved models, airports can be run more efficiently, stadium customer service can be customized for each spectator and the healthcare industry can detect tumors more accurately and quickly.

Where is computer vision heading?

To answer this question, let’s look at Figure 2, which depicts the maturity curve of analytics. Over the past few years, many organizations have moved from using Computer Vision as a means to retrieve just descriptive and diagnostic results to being able to be more predictive in their approach, where the models help to predict likely outcomes.

Figure 2. Analytics Maturity Curve

 

Data-driven organizations are now deploying prescriptive solutions that are driving tangible benefits, outcomes and near real-time actionable insights. As these solutions become more adaptive, they will bring dramatic improvements to the performance of systems and automated processes, as well as decision making. And that’s when a real-time continuous improvement loop will be possible, where a model is constantly retraining itself. The later stages of the analytics maturity curve will see processes occur with little or no human interaction or decision making, with resources reaching their destination proactively.

The computer-vision-enabled car will automatically integrate with smart city traffic control systems to avoid and help alleviate traffic congestion, and it will connect with parking information to be guided to the most efficient spot based on its destination. With real-time computing at the edge and an updated model being pushed to the car, your car will “know” how to drive safely whether it’s in a senior community neighborhood or on a high-speed freeway.

Moving forward with a computer vision strategy

Adopting a computer vision solution requires proper testing and validation. Anyone can run compatibility tests and validate an application on a platform in a silo. The trick is to validate multiple applications that are working together on a platform at scale, which support the “ingest once, work on many” concept, and that span the full solution architecture from edge to core to cloud.

A computer vision model design should be validated to ensure the models work properly with specific real-world computer vision applications. Validated design solutions are tested and optimized for each use case. They’re also right-sized to the environment in which they will run, which takes the guesswork out of how much storage, compute and other specs you’ll need for proper purchasing. Opting to conduct real-world testing in-house can put a strain on resources but there are third-party options available. Dell Technologies, for example, offers lab-validated solutions from a curated pool of more than a hundred technology, AI and service partners.

Where validation addresses the technical elements, computer vision is also about the business. Each organization looking to adopt computer vision technology or bring their current implementation to the next level should focus on the insights they want to gain in order to run their business and improve processes. With computing done at the edge, previous boundaries and limitations are lifted. We can now deliver better quality insights, faster and at scale, so organizations should first focus on the outcomes they want to achieve in the areas of safety, customer experience, operational efficiencies, sustainability and generating additional revenue

Computer vision technology provides deeper insights than you can get just from data. Now you can complement that data with visual information, making the data much richer and more useful, and maintain a competitive edge in this new era of how organizations operate and serve customers.

For more information:

 

[1] Forrester report: “Overcome Obstacles To Get To AI At Scale,” January, 2020. https://www.ibm.com/downloads/cas/VBMPEQLN.

[2] Computer Vision 030421 pdf. IDC report: “The Data-Forward Enterprise: How to Maximize Data Leverage for Better Business Outcomes,” May, 2020. DOC #US46264420.

Intercoms in the post-pandemic era

Security has evolved with the pandemic. Video surveillance, for example, now has fever detection, mask detection and social distancing functions. Access control, meanwhile, now allows contact tracing if an infected individual has visited an end user entity.

In a similar vein, intercoms are also seeing new innovations in the wake of the pandemic. “Covid has unquestionably led to increased demand for intelligent access control solutions, including smart intercoms, because architects, planners and property managers are looking for ways to help occupiers maintain physical distancing and hygiene practices. The value of technology to manage access to buildings or floor levels for colleagues, invited guests and deliveries is becoming more widely recognized now,” said Tomas Vystavel, CPO of 2N.

That said, below we take a look at some of the new trends in intercoms that suit end user needs during and post-pandemic.

1. They are going contactless: Intercoms, like other security devices, are increasingly going contactless amid the pandemic. “In multi-tenant commercial buildings and residential spaces, there are major concerns of potential hotspots developing and spreading illness throughout the facility. This has prompted a migration to more touchless devices and sensors to help control resident and visitor traffic,” said Brad Kamcheff, Marketing Manager of Aiphone. “By installing an intercom equipped with a sensor, an individual can request access by simply gesturing in front of the device to initiate communication with the person inside. For a truly touchless experience, an electric hinge integrated into the door system eliminates the need to touch a door handle.”

2.They enable occupancy management: Limiting the number of people who can occupy an end user entity has become quite common amid the pandemic. Already, many security devices have occupancy management functions. Now intercoms can play a role in this regard, too.

“Video intercoms can be used to manage the number of people gathering in one space. For example, in an educational setting, it’s critical for campus staff to see how many people are requesting access at the door – as well as who is at the door. If a person is requesting access into a science laboratory where only limited occupancy is allowed, a video intercom provides a safe way to confirm there are not too many people entering at once,” Kamcheff said.

He added: “Through a video intercom, staff will be able to determine how many visitors might be accompanying a student requesting dormitory access, for example. Or a visitor to a medical center can be appropriately screened. For communal areas where employees and visitors might gather, such as lobbies, gyms and other recreational facilities, additional social distancing and occupancy management might be necessary—enabling staff to further leverage the capabilities of an IP intercom system.”

3. There is increased demand for audio intercoms between glass germ barriers: This is because people need the ability to be face-to-face on either side of the glass and properly hear each other. “Such barriers used to be fairly exclusive to ticket taking windows, but now we’re seeing glass germ barriers being installed in doctor’s offices, coffee houses, ski resorts and anywhere people need to be able to communicate safely through a barrier, without reducing the effectiveness of the barrier itself,” Kamcheff said.

Catering to users’ needs

There has also been a trend where intercoms are more and more designed to the specific needs of certain users. “Driving this change is a greater sensitivity and awareness that all systems are not the same and they do need to be tailored for individual customer needs. As such, we’re seeing architects and engineers request new solutions and technologies. This includes technologies, such as video intercoms that integrate with T-Coil features for the Deaf and hearing impaired. Additionally, a two-way video solution for those who use American Sign Language (ASL) to communicate and request access, as well as updating stations to comply with the Americans with Disabilities Act (ADA),” Kamcheff said.
Installation tips
Features aside, quality installation of intercoms isi also necessary to guarantee a good user experience. That said, there are certain things systems integrators should know when installing intercoms. According to Vystavel, SIs should focus on security, flexibility and convenience.

“On security, system integrators should look for excellent security standards, not just a good user experience. We have our own 2N operating system to provide users with the highest levels of security and personal data protection. By flexibility, I mean integration options, for example with VMS or home automation. We are seeing growing customer demand for this,” Vystavel said.

“And on convenience, integrators obviously favour solutions which make their life easier. 2N, for example, has introduced services to facilitate the easy integration and administration of our devices via the internet. We have also introduced a project configuration tool, 2N Project Designer, which is a step-by-step guide for our partners to help them put together a complete door communication and access control solution very simply. This can save significant amounts of their time when planning both commercial and residential projects,” Vystavel added.

Also, the SI should also keep the future in mind. “Working with the end user to determine their possible expansion needs gives them the ability to recommend a system with room to grow. We often see intercom systems installed from the beginning at full capacity, then after a few months, we receive a request for additional locations. This is frustrating for both the end user, who has a new system that’s no longer meeting needs, and the integrator who wants to serve their customer but can’t. When implementing an intercom, an integrator should fully understand the system capabilities and limitations so they don’t run into any issues that can be avoided,” Kamcheff said.

Interview: Mariela Madjarova, CEO, Teletek Electronics

I am extremely happy that my and our team’s year-long efforts are successful year after year. In the past 7 years, our average revenue growth is 18%. We are operational in over 85 markets. It can be done only with the dedicated work of all employees. Currently, Teletek Electronics work with more than 190 highly motivated and qualified specialists.

 a&s Adria: Ms. Madjarova, please present yourself to our readers: your education, business experience, what department and area are you in charge of within Teletek?

Madjarova: I am Mariela Madjarova, Chief Executive Officer of Teletek Electronics and I have been managing the company for more than 11 years. I graduated in Chemical Engineering at the University of Chemical Technology and Metallurgy in Sofia and a number of additional qualifications: Marketing and Finance in Japan, Marketing and practice in the UK, and the MBA in Entrepreneurship at the New Bulgarian University. When I started working for Teletek Electronics 29 years ago, I was the only salesperson in a small company in the security sector. Over the years, I have passed through various positions in the company, which I think has made me an excellently prepared candidate for the position of Executive Director.

a&s Adria: For 30 years now, Teletek Electronics is manufacturing a complete range of alarm and fire alarm equipment. What were the most important milestones on your way to success? In stats, how many employees do you have now, how many products did you produce, and in how many countries do you sell them?

Madjarova: We have come a long way in these 30 years – from a small local company with several products to an internationally known manufacturer of intruder and fire alarm solutions! It was and still is a real challenge for a Bulgarian company to answer to fast-developing technologies, to keep constant high quality and win and keep its position on the world market.

I am extremely happy that my and our team’s year-long efforts are successful year after year. In the past 7 years, our average revenue growth is 18%. We are operational in over 85 markets. It can be done only with the dedicated work of all employees. Currently, Teletek Electronics work with more than 190 highly motivated and qualified specialists. We are proud of our own R&D department – experienced hardware, firmware, and test engineers work on the company’s new developments. As result, we have more than 650 own developed products – intruder & fire alarm devices. This is how we succeed in answering the constantly growing needs of our customers and preserving our serious positions in this dynamic market. We continue to invest in new developments and innovations of existing products and solutions.

a&s Adria: How has your company dealt with the effects of the pandemic during these two years? What did you have to undertake to keep your business going and employees safe?

Madjarova: We have succeeded and we continue to succeed in this situation! Of course, it was extremely difficult to find the balance between company and business results and our team’s health and safety. We had to implement quickly a completely different organization of working and production processes. For us, the pandemic had a positive impact – the team became more motivated and I am proud to say that in the last 2 years we have managed to develop a number of new products.

a&s Adria: Many producers and vendors are reporting a global shortage of micro-chips and problems with the transport of electronic parts, as well as an increase in pricing of energy and components. How do you, as a producer settled in Bulgaria, deal with these issues? Are you forced to postpone deliveries and increase the price of your products?

Madjarova: The situation is more than critical. We use over 4000 different components. There are between 200 and 500 parts in each of our products and if one is missing, the product cannot be produced. At the same time, one component cannot be replaced by another that you manage to find on the market – each one is specific, the software has been written for it and in order to change it, new development must be made. We are currently processing several products because we cannot find the necessary components in any way. We have an increase in costs by over 20% – mostly because of the components, but also because of the price of electricity, fuels, transport, but we can not pass it on to customers. Everything made of plastic or metal has risen permanently, and we use them in almost all products. The situation is quite absurd at the moment.

a&s Adria: Do you think that problems with manufacturing and transport from Asia will cause buyers to turn more to closer, European manufacturers such as yourself? Do you see this as an opportunity for Teletek to gain more market share?

Madjarova: I believe that more and more buyers will prefer proven and certified European manufacturers, not only because of the problem with the production and deliveries but mainly of the quality of the devices and systems. If a single device does not work properly or cause false alarms, it significantly increases the cost of replacement, maintenance, and seriously affects the image of the installer’s company. More and more installers and system integrators prefer reliable solutions from proven manufacturers. I think this is an opportunity not for Teletek only but for every company with high-quality products.

a&s Adria: What products from both intrusion detection and fire alarm product range would you select as the most sold ones and why is that?

Madjarova: Our addressable fire alarm systems – Simpo and Iris are the best sellers. Flexible, intelligent, EN54 certificated, the systems include a wide range of devices and have enhanced integration and networking capabilities to meet the needs of small to larger buildings and installations. For intruder alarm range is our Eclipse series with its wired and hybrid solutions. The additional option for work on a time schedule is great for offices and warehouses as it allows autonomous management of the system following a work schedule set in advance.

a&s Adria: Last year you marketed IRIS8 as the “most powerful and sophisticated intelligent addressable fire alarm panel in Teletek Electronics portfolio”. What features make it your flagship product?

Madjarova: IRIS8 is an expandable addressable fire alarm control panel. Intelligent and technically advanced, it has enhanced integration and networking capabilities to meet the current and future needs of small to larger buildings and installations. The initial purpose of iRIS8 is to be used for fire alarm warning but due to its flexible design, it can be modified to carry out many other functions like control and indication applications, with direct integration into intelligent buildings through MODBUS protocol. The available configuration varies from 1 to 8 detection loops. iRIS8 can network up to 64 panels, making it ideal for the largest sites including schools, hospitals, multi-site retail/supermarkets, critical infrastructure, and major commercial and industrial facilities. iRIS8 supports two protocols for communication in order to provide a vast range of devices and cope with the most demanding projects. Combined with the modular structure and the networking features there is no project which can’t be realized with iRIS8.

a&s Adria: You also had some improvements in the latest IRIS/Simpo versions?

Madjarova: We are constantly working on improvements for Simpo and Iris. The latest versions have an addition of Mimic panel, serial connection of Evac panels, support of ESPA444 protocol, “Class Change” is now with the selectable tone, “Silence Sounder” can now be performed by zones using inputs, similar to Evac cycle the panel now have Alarm cycle (for voice evacuation purpose).

a&s Adria: “There is a transformation of the intruder alarm system from a traditional signaling device, to a much more interactive system,” said Omdia analyst, Anna Sliwon-Stewart. The development of enhanced connectivity options, from 2G to 4G and even 5G, alongside the integration of disparate systems, has enabled intruder alarm systems to be more than simply a security necessity. There is an increased demand for security systems to interact with each other across access control, video surveillance, and intruder devices (for instance, alarm triggering corresponding video footage). Do you offer or work on this new generation of intruder alarm systems?

Madjarova: Currently we are testing a new protocol for our Eclipse series and new wireless series PAX which we are planning to launch within H1 2022. Both series in combination with Observer software that allows the integration of third-party video cameras and video verification by both an intruder and fire alarms will be the best solution for any medium to large site. We continue to develop a brand new wireless solution, a new mobile application, and cloud-based services.

a&s Adria: In November, you have released the Home ProTTEct mobile application. What is it intended for and what are its major features?

Madjarova: Home ProTTEct is a mobile application for management and monitoring of all the intruder alarm systems manufactured by Teletek Electronics: ECLIPSE and BRAVO series. The application is simple, user-friendly, and native, developed for both Android and iOS, in accordance with the latest requirements of both platforms. The main features of the Home ProTTEct are Remote System control – user can Arm and Disarm his system/s remotely; Multi-system control – the application can manage multiple systems; System status indication – the user can see the last event and the alarm status in the system list of the application; System sharing– a user can share his system by generating a QR code through the Home ProTTEct app, so another user can add this system as well;  Partial arming – the user can also set the system in two different partial arm states – Stay or Sleep Arm; Detector management – the user can manage(enable/disable) the detectors/zones of the system when needed; Push notifications in case of any event in the system; Alarm snooze algorithm, etc. The application supports two methods for adding a new system – Manual – by entering your user credentials manually and by scanning a QR code – the code is generated by the Ajax SP Server (Cloud). We continue to work on the development of the application and we will add new features by the end of 2022.

a&s Adria: You also offer a range of other software. What are they used for?

Madjarova: We have several software solutions:

  • ProsTE, a software package for programming of Teletek Electronics intruder and fire alarm panels. The software allows fast and user-friendly programming.
  • Observer – software for local monitoring of Teletek Electronics addressable Fire Alarm Systems – Iris, Iris Pro, and Simpo and Intruder Alarm Systems – Eclipse and Bravo. The software also allows remote access, administration, and video verification of the connected systems.
  • Guard View is centralized monitoring software compatible with all popular alarm receivers and support communication formats like DSC SurGard, Electronics Line, SIA/ Contact ID, LARS, KP Electronics, FSK, Enigma, and others. This software is dedicated to the security companies that provide services like monitoring security systems.

a&s Adria: What European and international standards are your products in compliance with? And what is the scope of those certificates?

Madjarova: We stand out with the high and consistent quality of our products. They meet the EN54 and EN50131 standards and are audited every year by authorized laboratories. We offer not just a range of products, but complete solutions – from alarm systems for the home to high-technology integrated systems for large buildings. Teletek Electronics’ products fully comply with the European and International Standards. As proof of its high manufacturing quality, the Company was also awarded ISO 9001:2015, issued by the authorized body SGS.

a&s Adria: Teletek has many successful projects across a lot of vertical markets. Can you present some of your most complex and representative case studies in the last couple of years?

Madjarova: We are proud that over a million buildings worldwide are protected by our systems. Our technology is used in places like the Parliament of Moldova, City hall of Lisbon, Piraeus Banк- headquarter and branches in Greece; Lufthansa Technik Sofia base, the building of the Defense Ministry and the NATO’s headquarters in Sofia, The Maakri – Kvartal complex in Estonia’s capital Tallinn, Vila Galé Hotels – Portugal; Regalia Gold Hotel – Nha Trang, Vietnam, etc.

a&s Adria: What global trends will define the fire alarm and intrusion detection industry in years ahead and what can we expect from Teletek when it comes to new technologies and opening new markets and offices?

Madjarova: We live in the era of fast-developing high technologies, particularly in the field of electronics. One of the most important technological trends is the integration of all security systems (intruder alarm systems, fire alarm systems, access control, video surveillance, etc.) and the potential for connecting with other building systems in order to give the customer a single system for simplified management of several subsystems. Other trends are moving towards hybrid and wireless solutions, mobile connectivity, communication modules, automatization, Internet of Things. Security systems integration, smart home, and home automation are hot topics, they allow the customer to manage with their mobile phone the alarm and other systems in the home, such as the heating, the electricity, the lightning. We continue to develop high-performance products and solutions, combining our profound technological experience, strong production capacity with the latest trends, and the energy and passion of our people.

a&s Adria: Your opinion on the Adriatic region security market, are there enough projects and investments to recover the market from the pandemic? What are your plans for Southeast Europe?

Madjarova: Adriatic Region is a fast-changing market with stable growth in the field of security technologies. Until recently, the region was highly price-oriented and the price was a leading factor in choosing a security system. With the entry of foreign investors and large investment projects in construction, the market is changing. Factors such as quality, reliability, certification, the manufacturer are leading in choosing a system. The entry of more complex and intelligent systems on the Adriatic market requires training and development of knowledge of installers and technicians. Part of our policy in the region is to help our partners and their clients with training and qualifications. I believe the investments in the construction business, along with expertise, experience, and knowledge of the installers, will lead to steady growth in the security market over the next few years.

6 key trends that define today’s intercoms

Intercoms are important devices that control access to buildings. Overtime, they have evolved into advanced devices that meet end users’ various needs. This note identifies some of the latest trends in intercoms.

Intercoms are an important part of a building’s security. They may be overlooked compared to video surveillance and access control, yet they are no less important. In fact, according to Grand View Research, the global video intercom devices market size was valued at US$17.82 billion in 2018 and is anticipated to expand at a compound annual growth rate of 12.8 percent from 2019 to 2025.

More and more, intercom solutions have evolved into more than just mere indoor and outdoor stations where the visitor initiates a call and the resident presses a button to let them in. Remote management and integration with other systems are now possible, thanks in large part to intercoms’ migration to IP. Below we identify some of the latest trends in intercoms.

Video-based

Video intercoms have become more prevalent compared to their audio counterparts. “Video-based intercoms are the future. With IP, you have features like HD, incredible audio quality and a huge range of integration options. HD video intercoms are already being widely used in both residential and commercial property,” said Tomas Vystavel, CPO of 2N.
Yet, that is not to say audio intercoms have become obsolete. In fact, there is still a significant segment of the market that uses audio intercoms. It all depends on the application for which the intercom is used. “Audio-based intercoms are high in demand in places where communication and announcements are critical. For example, in the educational space where classroom communication and general announcements are vital to a school functioning, or in hospitals where nurses and patients must be able to communicate,” said Brad Kamcheff, Marketing Manager of Aiphone.

Control from anywhere

Control from anywhere has become a major trend in intercom solutions. “Control from anywhere – enterprise solutions are getting popular where servers (control systems) are placed in locations with redundancy. Cloud based intercom systems will be the future,” said Arya Varma, MD of TKH Security & Airport Solutions Asia.
“Remote access and monitoring are without a doubt the biggest trends from the past few years, as it allows constant eyes on a facility. These abilities are especially in demand when it comes to federal or government buildings where entire divisions might be offsite, due to the pandemic,” Kamcheff said. “For example, if a visitor accesses the building and uses an intercom to call the office, it is immediately rerouted to the individual working remotely with no lapse in communication. This seamless connectivity directly improves the visitor, or customer experience. This also gives the appearance the building is more occupied than it seems, therefore also acting as a crime deterrent.”

Mobile applications 

Closely related to control from anywhere is the use of mobile devices for control and management. “If you’re at work, for example, but you’re having food or packages delivered to your residence, you can remotely allow access to whomever needs it,” Kamcheff said. “Another benefit of mobile applications is they allow for easier turnover in multi-tenant or condo facilities. Facility management will only have to reset the software for the unit’s door station and remove, or give, access to those who require a change. There is no need to cancel key cards or worry about returns or copies.”

Intercoms in the post-pandemic era

Integration with other security systems such as video surveillance has also become more common. When integrated with video surveillance, for example, unauthorized or suspicious persons can be identified, and an alarm can be sent. “Already intercom integration with various access control and video management solution is a must for most of the projects. Integration with VMS for video analytics is already happening,” Varma said.

Wireless

Conventionally, IP intercoms are connected by Ethernet cables. This can be made wireless by Wi-Fi. Further, cellular technologies such as 4G and even 5G will also become more dominant. “More than wireless intercom, 4G- or 5G-based intercom communication will get popular when data transfer gets cheaper, locations are remote and connectivity by cable is challenge. This trend is not really visible now but will happened in future,” Varma said.

Disease control and prevention

Intercoms have also evolved to suit users’ pandemic needs. For example, they’ve become more contactless and can now play a role in occupancy management.

Verticals suited

Needless to say, intercoms are commonly seen in apartment and multi-tenant buildings. But they can benefit the commercial sector as well.

“Intercoms can be beneficial to nearly all commercial industries, including the educational, office and medical sectors,” Kamcheff said. “For example, a government building can utilize the remote monitoring capabilities of a video intercom to answer call requests from onsite visitors, while staff might be offsite. A hospital can deploy an intercom to improve patient/staff communication, and to eliminate excess room visits. For example, a nurse can use a video intercom to interact with a patient who might be sick with COVID-19 and answer questions they have without having to take unnecessary chances by entering a room. A school can use an intercom to communicate with students, guiding them through proper steps before entering a facility, such as a reminder to take a temperature or wear a face mask.”

Politicization and Polarization of Industry

US President Joe Biden has signed the Secure Equipment Act which will have a major impact on the security and telecommunications industries. Under it, the US Federal Communications Commission (FCC) will no longer consider applications for licenses submitted by companies marked as “security threats”. This primarily applies to Chinese producers.

Written by: Mirza Bahić, Journalist, a&s Adria; E-mail: redakcija@asadria.com

The consequences will be certainly game-changing, both in the telecommunications and security industries, and the reason for it is rather simple. The blacklist of companies includes five Chinese technology giants, with at least two major security players: Hangzhou Hikvision Digital Technology and Zhejiang Dahua Technology, alongside Huawei, ZTE, and Hytera Communications. Yes, Hikvision and Dahua are no longer welcome in the government-funded projects in the States. This, along with a ban on Huawei which gets more media spotlight is a first-rate technological turnaround that could have global implications.

How Was the Act Passed?

The Secure Equipment Act was passed almost unanimously in the US Senate in October 2021. The House of Representatives supported it with 420 votes in favor and only four against as an indicator of unity in the views of the two largest American political groups (Democrats and Republicans) at least when it comes to the status of Chinese technology companies. In March 2021, the FCC announced that five Chinese companies that supposedly pose a threat to US national security had been singled out. It was explained that this was in line with the 2019 National Defense Authorization Act whose important segment involved the protection of the telecommunications network in the States. However, at that time there was no legal obligation to reject the applications of these companies for the inclusion of their technologies in the operation of telecommunications networks. The situation is somewhat different today because by declaring the equipment of Chinese companies “suspicious” in terms of their security, it will no longer be possible for them to be used in the network systems in the United States.

“The Secure Equipment Act is now the law of the land and will ensure that insecure equipment from Huawei, ZTE, and other untrustworthy entities can no longer be inserted into our communications networks. This gear poses an unacceptable risk to our national security”, said Federal Communications Commission Commissioner Brendan Carr. And that’s not all – the FCC is already looking for ways to revoke previously approved licenses for Chinese companies. As expected, official reactions from China came soon afterward, saying that the United States was accusing Chinese companies without evidence in order to prevent their expansion.

Will Hikvision and Dahua be able to do business in the US?

Despite global difficulties and disruptions in the supply chain caused by the pandemic crisis, Chinese manufacturers are, in fact, weathering the ongoing global economic storm. After a slow recovery during the first coronavirus wave in the first quarter of 2020, the banned Chinese companies have actually achieved good results and even growth in the last 18 months. Their margins were slightly lower in 2021 than the maximum reached in late 2020, but the only unknown in the future forecast of their growth is the potential impact of Biden’s Secure Equipment Act. What are its possible implications? To begin with, these regulations would not only have a huge impact on the operations of Chinese security companies in the U.S. but could also significantly impact suppliers who use the OEM products of these companies.

In October, US retail giants Home Depot and Best Buy withdrew video surveillance systems from Chinese manufacturers Lorex and Ezviz. Lorex is a subsidiary of Dahua Technology, while Ezviz is a brand of video surveillance cameras owned by Hikvision. Following this act, Lorex removed the logos of five U.S. retail partners from its website. Representatives of the Home Depot platform stated that they immediately stopped selling Lorex products as soon as this issue was brought to their attention. Although the new regulations do not lay down the dynamics according to which the disputed technology should be removed, organizations using banned technologies are likely to be granted a transition period to remove the equipment and start using only video surveillance devices and technology compliant with the National Defense Authorization Act (NDAA) and FCC’s decisions.

Numerous challenges for end-users

The enactment of the NDAA alone represented a major event in the U.S. security sector as the American vendors had to quickly reorient themselves and start looking for replacement components to ensure compliance with applicable regulations. System integrators, planners, and end-users have faced the challenge of having to find compatible cameras that do not use banned components. In addition to the existing factors of price, quality, deadlines, and industry standards, suppliers and system integrators in the US must now address an additional source of concern – compliance of their products with new regulations on the so-called secure equipment.

The situation in the US security market is further aggravated by the ubiquity of Chinese components in video surveillance equipment. This could force many organizations and schools to immediately start planning to replace their existing camera systems and related security equipment. This also means that manufacturers now have to procure new chipsets and other legally compliant components, while integrators and end-users will have to modify their existing camera systems and the entire supply chain they rely on.

According to the American media, many companies are already forced to look for new suppliers, which requires additional efforts to strike a balance between physical availability and regulatory compatibility of security systems. An additional problem is the need to organize the training of entire teams in order to ensure proper configuration of the systems and their installation. For system integrators who already have to balance the price and quality of the products they use, this will be a new and, for some, insurmountable challenge in maintaining their competitiveness in the U.S. market.

Early implementation marked by scandals

Shortly after the signing of the Secure Equipment Act, a curious security scandal erupted in the States, showing that its implementation on the ground will not go smoothly, at least initially. At least three American federal agencies, including the military, procured video surveillance equipment from Chinese manufacturers which the federal government had blacklisted earlier.

According to the TechCrunch portal, various agencies spent thousands of dollars on the purchase of video surveillance equipment manufactured by Lorex, a subsidiary of the Chinese company Dahua Technology. Dahua was previously added to the list of companies covered by economic sanctions against China. According to the US authorities, Dahua was supposedly linked with activities aimed at helping the Chinese government exert pressure on the Uighur ethnic minority in Xinjiang. However, after the ban took effect, evidence emerged that the federal agencies had procured Lorex equipment through their contractors. According to available information, the Drug Enforcement Administration (DEA) purchased nine Lorex hard drives for surveillance systems in May 2021. The Drug Enforcement Agency (DEA) spokeswoman Katherine Pfaff said that the purchase was made through the state procurement portal operated by the General Services Administration – GSA Advantage. For now, there is no information on whether Lorex equipment has been withdrawn from use.

The GSA did not state why the banned security products were made available for purchase after the ban took effect. It has just been said that the process of improving the system has started, including the launching of a new portal with verified commercial products in line with the 2019 bans.

The Defense Finance and Accounting Service (DFAS), which operates as an agency within the U.S. Department of Defense, also purchased Lorex video surveillance cameras through its New York vendor in July 2021. The same thing was done by the U.S. military which procured video surveillance systems and recording equipment between 2019 and 2021.

What now?

What will be the consequence of the newly passed regulations? First, it is highly likely that the contractors that supply banned equipment to state institutions will lose their contracts. On the other hand, representatives of the security industry argue that contractors and subcontractors working with the state were given too little time to allow the full implementation of the current ban on the use of Chinese technology before the law actually came into force. The Information Technology Council published a statement in which they claim that due to the extended time required to introduce rules for such far-reaching requirements, contractors may not be able to consistently meet all the objectives of the enacted law. On the other hand, Lorex, which found itself in the media spotlight, states that its products are intended exclusively for consumer and business use, and neither for the federal government agencies nor for the projects funded by the state. The same applies to contractors who are covered by the regulations of the National Defense Authorization Act. They add that they guarantee that they do not and will not sell their equipment to any person or organization covered by the current bans.

The Future

Regardless of the scandals, the current events are an excellent illustration of the complexity of implementing these bans in the field, especially if we know that they represent a precedent of sorts in the security industry. An additional burden around the neck of American integrators, distributors, manufacturers, and, finally, end-users is the fact that companies whose products are covered by the new regulations are among the strongest security and technology players in the world. The time ahead will show if this will lead to major disruptions in the security market, although it can already be said that, regardless of the outcomes, the industry will remain permanently changed by these events.

Dahua operates in accordance with applicable regulations

In response to the recently passed Secure Equipment Act, Dahua Technology called on all parties to check its credibility when it comes to its commitment to cyber security. Its statement reads as follows:

“As we have stated publicly and consistently, Dahua Technology does not and never has represented any type of threat to the U.S. We respect the right of the U.S. government to regulate the market as it sees fit. However, we are a publicly traded corporation that exists to serve our fiduciary duty to our shareholders, and our corporate responsibility to our customers, employees, and other stakeholders. We are neither owned nor controlled by any government. Our company does not and has not acted in ways that are contrary to the foreign policy interests of any countries in which we operate. We keep practicing what we preach that enables a safer society and more intelligent life and conduct our business operations being compliant with all applicable laws and rules.

We understand that in today’s security industry, cybersecurity is the biggest challenge. We have provided remedies to correct those issues with our customers. Dahua takes cybersecurity very seriously by implementing a 7-module cybersecurity baseline into our product design. We have created Dahua Cybersecurity Center (DHCC) to solve cybersecurity issues and aims to provide more robust and secure products/solutions for customers. At the same time, we have established a Cyber Security Institute to ensure the security technology research, product security R&D and delivery, and the establishment of a security emergency response team and procedures.

Dahua Technology also attaches great importance to personal data and privacy protection. Complying with applicable laws and regulations, such as GDPR, EDPB’s guidelines, and ETSI EN 303645’s Cyber Security for Consumer Internet of Things, Dahua Technology has received Protected Privacy IoT Product Certification and ETSI Certification from TÜV Rheinland, as well as ISO 27018 and ISO 27701 Certification from the BSI, which help in demonstrating its capability in managing personal information and compliance with privacy regulations around the world”.

Hikvision opts for a legal fight

Hikvision has decided to fight the latest moves by the US government in a legal arena. The company has filed a complaint to the US Federal Communications Commission stating that the Commission does not have the legal authority to exclude Hikvision technology from the equipment approval process. The reason for this is the fact that Hikvision does not offer network equipment for broadband internet. At the same time, the Secure Equipment Act itself did not expand the list of types of equipment that are prohibited under the Secure and Trusted Communications Networks Act of 2019. As the focus of the new regulations is exclusively put on communication networks, and not on peripheral devices such as those offered by Hikvision, the Chinese company states that its video surveillance cameras and network video recorders are not connected with the function of providing broadband Internet access service. Since Hikvision’s technology does not constitute “communication equipment or service”, it was requested for it to be removed from the blacklist.

At the same time, the company hired American FTI Consulting to do a quality assessment of cyber security technology used for cameras and network video recorders of this manufacturer. The results of the assessment showed that these devices did not pose a risk to the end-user in any environment and application. FTI Consulting has established that the communication between the devices and Hikvision’s servers takes place in accordance with the normal mode of operation. In addition, testing and analysis did not reveal any standard forms of the Common Vulnerabilities and Exposures (CVE) with any device, and the same goes for the possibility of an unauthorized party to get access to the video signal.

 

 

Don’t Rely on a Wake-up Call: Hotels Have No Room to Compromise on Fire Protection

Hotels can be complicated sites to protect. Busy kitchens, extensive electrical installations plus regular repair and maintenance work all increase the likelihood of fire incidents. Add to these the presence of an ever-changing population of residents who may smoke, be careless around call points and detectors, or have varying mobility, and the picture becomes increasingly complex.

No two hotels are the same. Some are high-rise and purpose-built with hundreds of guest rooms and a host of leisure, retail and dining spaces. Others may be sprawling resorts with isolated beachfront villas or remote log cabins. Smaller, boutique hotels pose different challenges, and further complications arise when the hotel is within a historic building.

It’s clear that there is rarely scope for a ‘one size fits all’ solution. Nevertheless, there are some requirements applicable to all hotel fire protection. We will explore some of these next.

False Alarm Management

The causes of false and unwanted fire alarms in hotels can include cigarette smoke, shower steam, the accidental triggering of manual call points, and even contractor activity. Against a backdrop of these and many other possible triggers, how do hotels minimise fire risk, ensure staff and guest safety, avoid undue panic and disruption, whilst also limiting damage to profits and reputation?

A high-performance fire system will offer comprehensive false alarm management generally using cause and effect programming, as well as detection and verification methods to help prevent false alarms.

AlarmCalm false alarm management is available as standard on Advanced’s Axis EN and MxPro 5 solutions and delivers unprecedented control of verification and investigation delays. By dividing sites up into virtual false alarm ‘building areas’ independent of fire zones, users gain more precise control of false alarm management and reduction strategies that exactly fit the needs of each part of a building.

To highlight some of the solutions to the challenges faced within hotels, Advanced has published AlarmCalm Complete False Alarm Management for Hotels.

Phased Evacuation

Selecting a fire panel brand with the ability to process complicated cause and effect is crucial to effectively manage the evacuation process.

When configured correctly, cause and effect programming, can help ensure that the people most in danger from a fire are evacuated first. Meanwhile, the flow of others in the building can be kept at a manageable level and safe escape routes maintained. This is especially the case for systems featuring the latest sounders that support recorded messages or varied tones.

 Easy Identification of Fire Events

Large, multi-storey hotel complexes can make it difficult for fire and rescue services arriving on site to find and monitor the spread of fire. This can hamper decision-making, increase reaction time and affect assessments of how to tackle the blaze.

TouchControl

In smaller boutique hotels, where space can be at a premium and aesthetics are important, fire panel location can be contentious. It is a challenge to integrate fire protection discreetly whilst maintaining up-to-the-minute status and control.

For these scenarios, Advanced offers the TouchControl repeater panel. Ideal for use in public areas, thanks to its discreet, low-profile design, the panel complements a wide range of interiors and is capable of displaying hotel notices, messages or advertisements when in standby mode. However, upon detector activation, the display instantly reverts to show fire system status via clear maps and plans of the site and the zone/area in fire. The screen itself has the added benefit that it can be operated by firefighters even when wearing gloves.

The ability to locate powerful fire system technology within high-traffic areas without detracting from high-quality interior decor gives fire system specifiers and installers new scope to combine design appeal with fire safety for full protection of people and property.

BMS Integration to Support PC Graphics

Fire systems within larger hotel premises are often required to integrate with BMS (building management systems) to communicate with third-party solutions. By consolidating data from multiple applications onto one system, end users have full oversight of an entire complex, improving reporting, information management and decision-making.

Advanced’s EN 54-approved Axis EN, MxPro 5 and UL 864-approved Axis AX panels all easily integrate with a site’s BMS via a simple fire protection interface. Once connected, end users with access to Advanced’s PC graphics package can view the status of their entire site via maps and plans.

In summary, well-considered, well-implemented fire protection solutions can transform the experience of hotel residents and staff alike. In making fire protection a priority and specifying the best equipment for each hotel’s particular needs from the outset, it is possible to maximise safety, minimise disturbance, protect reputations and enhance hospitality.

 

STOP DANGEROUS BATTERY FIRES IN DATA CENTERS BEFORE THEY START

Unscheduled downtime at data centers can cause serious financial, operational and reputational damage.  Many operators aim to avoid them altogether, often making UPSs a critical role in the infrastructure. Operators also have to manage the risk of failure and potentially serious danger  of the lithium-ion batteries found inside?

The rise of lithium-ion batteries

Uninterruptible power supply systems (UPSs) are key to data center operations yet on-site power remains the most common cause of outages[1]  and most downtime incidents are likely preventable. And as the power source, Lithium-ion batteries are steadily superseding their valve-regulated lead-acid (VRLA) counterparts – and rightly so[2]. Looking at a 10-year period, li-ion batteries cost 31% less than traditional VRLA batteries because of the lower maintenance and replacement costs[3]. They are up to 70% smaller and 60% lighter, and generally work reliably at higher temperatures than VRLA batteries, making them the ideal onsite candidate for UPS application in data centers[4].  On the other hand, the capital expenditure of li-ion batteries is double than VRLA batteries[5], which means that the cost of a potential failure is much higher from day one.

Thermal runaway – the chain reaction of batteries

Another concept managers of data centers must be aware of is thermal runway, essentially a nearly unstoppable chain reaction of defective batteries. Initiated by mechanical or thermal failures – abuse, overcharging or internal short circuit– the battery cell starts to decompose, which increases temperature, which in turn increases the rate of decomposition. The result is a self-feeding heating rate within the cell that increases until the cell loses stability, ruptures, and all remaining thermal and electrochemical energy is released into the surroundings[6],  resulting into quickly escalating and catastrophic, often explosive fire, that is extremely hard to extinguish.

The problem with li-ion battery fires

According to a study from the Underwriters Laboratories (UL) Firefighter Safety Research Institute, li-ion battery fires present serious challenges:

  • Releases explosive gases and vapors during thermal runaway,
  • Forms and disperses a vapor cloud, and
  • ineffectiveness of fire suppression.

Thermal runaway fires can have grave consequences: toxic gas leaks, fires, explosions – they could bring an entire data center facility to a halt.

Enter the Li-ion Tamer®

„It is nearly impossible to stop an advanced thermal runaway process, and the consequences could be catastrophic” explained Siniša Pintarić, Business Development Manager – Honeywell Fire & PA/VA Solutions. „This is why the goal here is to look for very early signs of battery failure and to be able to stop the process before it becomes a problem.”

Li-ion Tamer® is designed to provide enhanced safety for battery systems and can be installed at a wide range of integration points throughout data centers.

Off-gas begins as gases that are generated inside individual cells due to exothermic reactions which begin to occur as a result of internal problems in the battery or external abuses. The release of these gases is the first stage of a battery failure which can self-propagate until the battery begins to smoke and go into fully developed thermal runaway. The ability to detect the gases provides a signal capable to providing early warning of the eventual cell failure and can enable actions which can help mitigate the effects of the battery failure.

Li-ion Tamer® is designed to detect and protect from individual modules all the way to room level integrated solutions.

 

Click here to find out more about our solutions for data centers.

[1] https://uptimeinstitute.com/about-ui/press-releases/uptime-institute-11th-annual-global-data-center-survey

[2] https://www.cibsejournal.com/technical/battery-technology-vrla-or-li-ion-batteries/

[3] https://www.se.com/ww/en/work/solutions/system/s1/data-center-and-network-systems/trade-off-tools/lithium-ion-vs-vrla-ups-battery-tco-calculator/, see 10-Year TCO Breakdown

[4] https://datacenterfrontier.com/lithium-ion-batteries-offer-new-alternative-data-center-backup-power/

[5] https://www.se.com/ww/en/work/solutions/system/s1/data-center-and-network-systems/trade-off-tools/lithium-ion-vs-vrla-ups-battery-tco-calculator/, see 10-Year TCO Breakdown / Capex segment

[6] https://www.batterypoweronline.com/news/thermal-runaway-understanding-the-fundamentals-to-ensure-safer-batteries/

 

What happens in Balkan Bet Casino, stays in Balkan Bet Casino A UNV LED Project

Balkan Bet , one of Serbia ‘ s largest casino chains , was founded in 2000 and took its name from the location of the first open payment point in the Balkan Hotel. Nowadays, Balkan Bet owns more than 120 branches throughout Serbia.

As part of its core business, the company has its own production and offers good odds for sporting betting. In addition, more than 350 standard games for football matches and more than 400 special games for other sports are on offer at any given time.

In addition to betting, Balkan Bet also has slot machines; there are also bars in the pleasant ambience of the restaurant offering a wide range of drinks at affordable prices.

Balkan Bet decided to upgrade the current display equipment to a more advanced LED solution indoors and outdoors starting off with one pilot store. For the indoor LED screen, apart from the normal LED screen with 2 square meters, Balkan Bet also required a cuboid structure with seamless connection between four rectangle screens, around 5 square meters in total. For the outdoor LED screen, waterproof and higher brightness is a must. Thus UNV adopts IP65 Module Ingress protection and higher brightness to guarantee it steady and adaptive in outdoor environment. What’s more, customer also asked for a very high quality product as well as easy maintenance due to the installation environment.

Uniview and its distributor recommend Indoor fine pixel LED MW7225-M, cost effective module from XM series and outdoor routine pixel LED MW7504 in KS series.
Indoor cost-effective fine pixel pure module LED solution, MW7225-M, adopts precision manufacturing materials like top brand LED bulbs, power supply & control system and passes 680 strict tests during LED production with extensive certifications to ensure stability and reliability.

Thanks to the non –cabinet design, the module LED solution can be installed directly on the wall with steel frame for ultra-thin application and acquire better heat dissipation. Meanwhile, the compact and standard module size guarantees flexible splicing. Since the module unit size is smaller, the splicing can be flexible enough to realize the 90 ° included angle splicing.

Real seamless splicing and perfect display effect provides customer Immersive visual experience. To better protect eyes of viewers, UNV LED is equipped with eye protection technology, image enhancement and low brightness with high gray scale.

Besides, complete front maintenance mode and hot plug highly improve maintenance efficiency and make installation more convenient.
In Balkan Bet four side LED wall project, two image receiver sending boxes are used to realize display two different image on both side of the four side wall, fully meet the requirement of partner.

In Summary, as a pioneer and leading global manufacturer of IP video surveillance, UNV also aims to be Global Professional Display Product and Solution provider.
More information please visit www.uniview.com. If you have any business query, please contact huangluyu@uniview.com.

Security 50: Top technology trends of 2021 (and 2020)

By: William Pao

Technology-wise, many flourished this year. Yet none received the kind of interest, enthusiasm and inquiries than cloud, whose momentum is set to continue in the near term. But is it really the cure-all solution that addresses users’ ongoing security challenges? Is it the perfect technology that makes users’ problems go away? This note discusses cloud and other prevalent technologies of 2021.

Cloud in security, in the forms of video surveillance-as-a-service or access control-as-a-service, is picking up steam. According to MarketsandMarkets, the VSaaS market is expected to grow from US$2.2 billion in 2020 to $4.7 billion by 2025, at a CAGR of 16 percent.

Indeed, a lot of users migrated to cloud due to its various benefits. “The platform-centric VSaaS model reduces user costs, simplifies application management, and makes the infrastructure more flexible and extensible. It is not only suitable for centralized video surveillance, but also for centralized equipment operation and maintenance management and centralized alarm processing,” said Pan Lingyu, VSaaS Product Director of Dahua Technology.

“VSaaS truly allows for end users of all industries and operational sizes to have an advanced surveillance solution that can both meet their security needs and is easy to maintain in the long-term, and which can prove to be the most cost-efficient throughout the system lifecycle. The partnership and service model that VSaaS enables for end users, manufacturers, and integrators also creates much more lasting relationships and retention rates, while also ensuring that customers can access the best features and functions that fit their operation and knowing that a trusted partner is there to support them if any issues or concerns arise,” said Danielle VanZandt, Industry Analyst for Security at Frost and Sullivan.

Further, cloud adoption has been accelerated during the pandemic. “Cloud migration for data analysis and forensics has been pushed faster than I originally expected. The pandemic pushed companies to start looking at occupancy rates in buildings, seating arrangements and many other health related topics. Cloud in general has allowed for faster development of those products and faster distribution and access to those as well,” said Jason Glover, VP of Sales at BCD.

“VSaaS is not a new concept and has been a trend in the security industry for many years. But recently it has become much more popular since the online operations requirement have grown because of the pandemic. Meanwhile, the development of mobile Internet, IoT and 5G technologies also accelerates applications of VSaaS,” said Keen Yao, VP of Hikvision. “The cloud-based VSaaS applications enable users to view real-time security events through app and to accomplish remote inspection tasks. This brings vast benefits in efficiency, flexibility, cost-effectiveness, and security. From small business markets to enterprise level, we can see the strengthened trend that more and more businesses are leveraging the VSaaS applications.”

Cloud stands out, but is it the panacea to all your security challenges?

Yet this is not to say cloud is the perfect solution that addresses all user needs. In fact, a recent asmag.com “Technologies that Impact Security” survey finds VSaaS ranked only slightly above the average level for suitability and maturity.

“The cloud offerings of established major video surveillance vendors generally form a small part of their businesses. Cloud-specialist offerings from newer vendors are really only just starting to challenge the scale of many of the incumbent vendors. Presently we believe many cloud video surveillance offerings have not yet matured,” said Josh Woodhouse, Lead Analyst and Founder of Novaira Insights, and Jon Cropley, Principal Analyst at Novaira Insights. “Cloud remains a high growth area, but from a small base.

Indeed, there are certain challenges to cloud adoption. Storage in cloud for an extensive period of time, per certain industry requirements, can be quite expensive, not to mention some industries don’t even allow remote storage. There are also privacy and cybersecurity concerns, as well as other issues.

“Cybersecurity concerns that cast doubt over cloud-based video were also compounded when hackers exploited a remote backdoor exposing 150,000 Verkada cameras in the spring of 2021,” said Joon Jun, President of IDIS Global Business Division. “There are practical challenges to overcome, too, since most VSaaS vendors offer only a small range of 2MP cameras that won’t be fit for purpose for a range of applications. For instance, a 2MP fisheye or panoramic camera is not going to give security managers the performance they need to reliably detect, investigate and prosecute crime. A lack of specialist cameras, as well as more popular ‘work-horse’ models such as 5MP and 8MP PTZs, will limit deployments to indoor settings that don’t require wide-area coverage.”

As a result, hybrid solutions have become the preferred choice for many users. “Hybrid solutions make the best use of cloud, on-premise and edge computing environments in relation to the customer need. There are many factors that will influencer a customer’s decision, both internal and external. The specific nature and functionality needed from the security solution, policies and regulation relating to data processing and protection, cybersecurity, resources for system use, management and maintenance, and many more considerations will influence the most appropriate mix of environments. Ultimately, we believe that most surveillance solutions will be based on a hybrid model,” said Ray Mauritsson, CEO, Axis Communications.

“At this point, most of the access control ecosystem does rely on some form of hybrid cloud solution. For instance, device provisioning requires the cloud as does firmware distribution. Control and access management are usually implemented partially local on-premises and partially in the cloud. Low latency and high reliability are paramount, but remote monitoring, control and analytics are also increasingly important. Our platforms are open to support these and other use cases,” said Vince Wenos, SVP and CTO of Allegion.

And this hybrid cloud model is expected to remain popular in the near future. “Cloud is here to stay. I think some of the laws and rules/regulations need to catch up to cloud. There are some areas in the world that won’t allow video surveillance data to be moved to the cloud for example; that does not stop the management of those systems from being cloud-based. I really believe that on-prem management of the directories, users, etc. will all move to the cloud and the on-prem storage will remain intact for the time being,” Glover said.

Other top technology trends 

Besides cloud, other technologies also dominated the security scene in 2021. And they are set to influence security in the near term. We discuss these technologies below.

AI in video surveillance

Ranking high, in terms of both maturity and suitability, on the asmag.com survey is AI, which continues to receive inquiries from customers and whose growth is set to continue.

“Interest in AI video has ramped up considerably since 2019. With many facilities shut or partially open security managers had more time to assess AI and deep-learning based software. Early adoption was hampered by premature launches, with some vendors over promising. But today algorithms have significantly improved,” Jun said. “For instance, when we first launched our AI solution we were achieving 96-97 percent accuracy, but today the latest iteration of IDIS Deep Learning Analytics is delivering 98 percent precision. By the start of 2021, our systems integrators and end-users were expressing confidence that AI would not only improve security operations but have the ability to deliver value to wider stakeholders.

“The demand for AI has exploded in recent years, which is expected to continue in 2022. By embedding AI into end, edge and cloud scenes, more and more AI-based devices will be widely applied in related fields and various industries. With the evolution of AI technology, AI-based analytics will gradually be applied to low-end products, and user experience will be significantly improved,” said Yin Jun, VP of R&D Center at Dahua Technology.

“AI – or more accurately deep learning – is definitely an area where we see growth and innovation, and where there is significant customer demand. The benefits of deep learning will not only enhance the capabilities of surveillance solutions designed for safety and security, but open up new use cases in operational efficiency and effectiveness,” Mauritsson said.

And more and more, AI will be moving to the edge, driven by more capable camera SoCs that support complex algorithms. “Increasingly powerful edge computing has become available for security cameras now, and this makes us believe edge computing stands a good chance of ‘putting AI everywhere,’” Yao said. “Automatic number plate recognition, automated event alert, people counting, heat mapping, illegal parking detection, and hard hat detection, as well as a number of other AI applications, are becoming popular in the security market. With increased edge computing and optimized AI algorithms, it will become normal to see security cameras shoulder more intelligent tasks in the near future.”

“The latest generation of chipsets which will become more widely available in the market in 2022 allow for greater edge processing. Some vendors have already integrated these chipsets into their latest camera lines. Other vendors will soon follow suit. There continues to be development in ecosystems which allow for a range of AI-based applications to be installed on cameras. This is not a new concept. Yet, the improvement in analytics performance combined with higher processing capability of the latest chipsets, now make this concept more attractive to integrators and end-users,” Woodhouse and Cropley said.

Touchless technologies

Touchless solutions are still in high demand as impacts of the pandemic are still felt in various sectors. “Increased biometrics integration and touchless technologies remained very popular throughout 2021 as many end users began to figure out their return-to-work strategies and how to restart more normalized operations in the pandemic era,” VanZandt said. “Changing customer sentiments away from shared touch points, as well as a rise in more remote security operations and management solutions also created new operational models for internal security teams via integrated remote and on-site operations.”

Cybersecurity

Cybersecurity and related solutions also took the center stage. “With the intensification of attacks from ransomware and killware, the entire industry will need to increase its efforts to protect systems, devices and customers. While cloud and network security technologies are advancing and being rapidly deployed, the technologies for device-level security will not be far behind as we head into 2022 and beyond. Embedded hardware authentication, and the technologies needed to provide it, will become much more prevalent in the next few years,” Wenos said.

“There will also be an increasing focus on data security and data protection. Cyberattacks are on the rise and the damage is now enormous. Here, I see MOBOTIX as a pioneer in the industry. Cybersecurity ‘Made in Germany’ is part of the MOBOTIX DNA. We only install high-performance and high-quality electronic components. This principle is consistent right through to the digital world,” said Thomas Lausten, CEO of MOBOTIX. “Cybersecurity enjoys the highest priority at MOBOTIX and is lived and implemented throughout the MOBOTIX Cactus Concept. Data security with regard to the German Data Protection Act (DSGVO) is also elementary for MOBOTIX.”

Digitization and integration

Technologies which augment video surveillance to provide value beyond security are important. “Video analytics are the typical example; yet, specialist IoT hardware have a role to play in the market. For example, environmental sensors integrated into the surveillance system can add new types of data streams to lead to new applications and value creation,” Woodhouse and Cropley said.

This integration trend is also being driven by the pandemic which has forced users to cut down labor-intensive processes and digitize workflows, a trend that is continuing. “It’s hardly surprising that there’s demand across the world to integrate video with a wider range of third-party systems – including intruder and fire detection, frictionless and touchless access control and visitor management, popular databases such as Microsoft Active Directory, and sector specific systems such as Point-of-Sale (POS) in retail and logistics and manufacturing operations software,” Jun said.

You can read the content related to SECURITY 50 at this link

Adria Security Summit powered by Intersec Returns to Zagreb as a Timely and Welcome Guest

Having heralded the recovery of security and related industries with the latest live edition of the Adria Security Summit powered by Intersec in Belgrade, it’s time for the Summit to go west, again. This is why Adria Security Summit powered by Intersec 2022 returns to the Croatian capital of Zagreb on October 5-6 2022. This time, the venue is the Zagreb Fair complex, Pavilion 7. On this occasion, the Summit will serve as a business hub for both companies from the Adriatic region as well as for those hailing from other parts of the globe.

During this two-day event, we want to, once again, contribute to speeding up the recovery of the regional and global security and other industries and promote networking, the exchange of experiences and expertise, as well as the forging of new business alliances.

Yes, all of those features that the Adria Security Summit has become known for as a regional and a continental B2B hub. The specific benefits provided by the Summit include contributing to the business performance of regional companies, supporting the entrance and expansion of global companies in the local markets, and boosting the foreign investments made by international companies in the sectors we cover.

This is why we are expecting to see more than 100 exhibitors from the region and the rest of the globe, and 3000+ participants, 3000+ meetings, and 20+ media and strategic partners we have had so far.  We want to turn these pluses into seals of quality of our event that has so far branched beyond the borders of security into the equally important worlds of IoT, ICT, smart solutions, and other disruptive and emerging technologies.

The organizer of the Summit is a&s Adria magazine, with the support of the Messe Frankfurt company. It is a monthly publication whose articles cover many cutting-edge topics that come to prominence as part of the live events we organize. Our participants read it to stay up-to-date with the latest in security and related industries.

This is why we are inviting you to keep a watchful eye on all news relevant to the coming Adria Security Summit 2022 in Zagreb, as a place at which we will celebrate our industries and push them forward with smart business networking and the promotion of innovation.

Stay tuned and regularly check our website for more information. Information is readily available at www.adriasecuritysummit.com.