Monday, December 14, 2015

FingerTec UAE 2016

 FingerTec in Healthcare Chain of UAE
From its inception in 1975, NMC Healthcare has evolved into an integrated healthcare company with a wide network of hospitals, medical centres, and pharmacies across the UAE. Over the years, NMC Healthcare has earned reputation as a world-class medical institution synonymous with genuine care, concern and commitment.The NMC Group has many offices, medical centers, hospitals etc. across the UAE. Headquartered in Abu Dhabi, the Human Resource department wanted a centralized attendance and overtime report to be available whenever required in the HQ. The challenge was that they have many offices spread across UAE. The hospitals and the HQ hold the majority number of staff, whereas in other locations, the staff was less. Rotating shifts within the healthcare centers and hospitals were also a factor to take into account when implementing this system.

Saturday, December 12, 2015

Ten Top Business Intelligence Trends to Expect in 2016

Ten Top Business Intelligence Trends to Expect in 2016

Business intelligence continues to be one of the fastest-moving areas in the enterprise, and the techniques that organizations are using to drive adoption and get value from their data are multiplying. Those are among the conclusions of a new report from Tableau Software.
“Among these trends are an increasing appetite for more advanced analytics to answer deeper questions, and new approaches emerging for governance of self-service BI,” the firm noted.
As part of its report, Tableau also offered its predictions on the top trends in business intelligence for 2016. They are:
Governance and self-service analytics become best friends
“Organizations have learned that data governance, when done right, can help nurture a culture of analytics and meet the needs of the business. People are more likely to dig into their data when they have centralized, clean, and fast data sources, and when they know that someone (IT) is looking out for security and performance.”
Visual analytics becomes a common language
“As data usage grows, even more people will turn to data with both professional and personal questions. And employers will look for candidates who can think critically with data. Visual analytics will serve as the common language, empowering people to reach insights quickly, collaborate meaningfully, and build a community around data.”
The data product chain becomes democratized
“In 2016, people will seek empowerment across the data continuum, especially as more millennials enter the workforce. For business users to stay iterative, they must be able to shape certain data on the fly.”
Data integration gets exciting
“In 2016, we’ll see a lot of new players in the data integration space. With the rise of sophisticated tools and the addition of new data sources, companies will stop trying to gather every byte of data in the same place. Data explorers will connect to each data set where it lives and combine, blend, or join with more agile tools and methods.”
Advanced analytics is no longer just for analysts
“Non-analysts across the organization are becoming more sophisticated. They’ve come to expect more than a chart on top of their data. They want a deeper, more meaningful analytics experience.”
Cloud data and cloud analytics take off
In 2016, more people will transition to the cloud thanks, in part, to tools that help them consume web data. Early adopters are already learning from this data, and others are realizing they should. And more companies will use cloud analytics to analyze more data faster. They’ll come to rely on it just like any other critical enterprise system.”
The Analytics Center of Excellence (COE) becomes excellent
“Through enablement programs like online forums and one-on-one training, the centers empower even non-experts to incorporate data into their decision-making. Over time, these centers enable data to inform workflow across the entire organization.”
Mobile analytics stands on its own
“Mobile analytics has grown up and moved out. It’s no longer just an interface to legacy business intelligence products.”
People begin to dig into IoT data
“As the volume of IoT data grows, so does the potential for insights. Companies will look for tools that allow users to explore the data, then share their findings in a secure, governed, and interactive way.”
New technologies rise to fill the gaps
“There are a number of new technologies in the BI ecosystem. As these go to market, we’ll see gaps that need to be filled. There will be new companies to do just that. Hadoop accelerators, NoSQL data integration, IoT data integration, improved social media—each of these provide an opportunity for a new company to start up.”

Sunday, December 6, 2015

comprehensive list of security systems models produced by an OEM

Below are a few of the OEMs that I have discovered for the brands we service and sell at my company. Though not a comprehensive list of all models produced by an OEM, I have verified each in a group as virtually identical by cross-installing firmware or Windows server applications and/or by using a common client or CMS program to access each.

PCOpen is the OEM for at least three near-identical, Windows-based models:

  • OpenEye OE4/OE5 (OpenEye is PCOpen's own brand)
  • Honeywell Fusion
  • Toshiba Surveillix

PCOpen Notes:

  • These used to be compatible with each other's client software, but PCOpen coded a software check that started blocking that several years ago.
  • I have cross-installed the server software on these to convert one brand to another to harmonize all units for a given customer. PCOpen now has checks in the installer to prevent this, but it can be defeated.


Dynacolor is the OEM for a large number of near-identical, embedded Linux models:

  • Speco Technologies TN, TL, and TH-series
  • OpenEye OE1/EasyDVR series
  • CCTV Outlet
  • Ernitec
  • Many more

Dynacolor Notes:

  • I have cross-installed firmware on some of these on our test bench (it just has to be from the same OEM series like the DG600, etc.)
  • With a little effort, you can get Dynacolor's CMS software working with the OpenEye EasyDVR since OpenEye doesn't offer any client other than the in-browser client.
  • Older models like the Speco T-series have an ActiveX that is not Windows 7 compatible, but if you have the customer try to connect to a newer model line like the OpenEye EasyDVR (they don't have to actually login, just allow the ActiveX downloads), the ActiveX .ocx will be replaced by a Win7-compatible version. Their Speco T-series will now work.


AVer is the OEM for at least two near-identical, Windows-based models:

  • AVer/AVermedia
  • Speco PCPro

AVer Notes:

  • The PCPro can have its software replaced by newer versions of the AVer software and use the same license key


Mystery "white-label" OEM:
I have not identified the OEM for the following models, but I believe all of these are of a common origin as I they all use the same (typically unbranded) client software as the now-discontinued USAG units we used to sell

  • USAG
  • Intellix
  • Ganz Digimaster
  • CCTVONE
  • Exelon PM
  • Vitek VT-E
  • Hunt HSR-Series
  • Samsung SDE-120

Original CCTV equipment manufacturer

(From Wikipedia)
An original equipment manufacturer, or OEM, manufactures product or components that are purchased by another company and retailed under that purchasing company's brand name.[1] OEM refers to the company that originally manufactured the product. When referring to automotive parts, OEM designates a replacement part made by the manufacturer of the original part.[2]

Contents
1 Confusing and contradictory definitions
2 Automotive parts
3 Economies of scale
4 Origin of term
5 See also
6 References

[edit] Confusing and contradictory definitionsCounter-intuitively, the term OEM may refer to a company that purchases for use in its own products a component made by a second company.[3] Under this definition, if Apple purchases optical drives from Toshiba to put in its computers, Apple is the OEM, and Toshiba would classify the transaction as an "OEM sale".

Contradictory usage
An even more confusing, contradictory definition is a company that sells the product of a second company under its own brand name.[4]

Alternatives to contradictory or confusing use
Instead of OEM, companies may label themselves resellers.

Companies who buy parts and then resell those parts with some amount of additional value added along the way (such as assembly, customer support, or continued maintenance) may be better termed value-added resellers (VARs) or resellers.

Best CCTV Manufacturer 2016

AvTech (Taiwan) www.avtech.com - manufacturer
Win4Net (Korea) www.win4net.com, www.triumsecurity.net - real manufacturer but buy DVR's from STL www.stl-cctv.com
STL (Korea) - manufacturer 
Rifatron (Korea) www.rifatron.com - manufacturer 
Dahua (China) www.dahuasecurity.com - manufacturer 
HikVision (China) www.hikvision.com - manufacturer 
TVT (China) en.tvt.net.cn - manufacturer 
Aver (Taiwan) www.aver.com - manufacturer
JuFeng (China) www.jufenginfo.com - manufacturer (Dahua) copycat
Xenon (China) www.xenon.cn - manufacturer (Dahua) copycat
HangBang (China) www.hbgk.net - manufacturer (Dahua) copycat
Sanan (China) www.sanan-cctv.com - manufacturer (Dahua) copycat
LB-Tech (China) www.an-tone.com.cn - manufacturer (Dahua) copycat
Swann (China) www.swann.com - manufacturer (Dahua) copycat
Lorex (USA) www.lorextechnology.com - OEM (Not sure who) looks like a (Dahua) copycat
Longse (China) www.longse.com - manufacturer (Dahua) copycat
Servision (Israel) www.servision.net - manufacturer 
ProVision (Israel) www.provision-isr.com - OEM of TVT
Q-See (USA) www.q-see.com - OEM of TVT
HKVSTAR/UNIFORE (China) www.hkvstar.com - ?????
Provisual (USA) www.provisualusa.com - OEM ????
QVIS (USA) www.qvissecurity.com - OEM ???
MagicRadar/Tiebet (Taiwan) - Manufacturer

Smart Home 2016

Smart Home

Intersec 2016 will for the first time present the concept of Smart & Safe Home Automation through its international platform. The technology has seen rampant growth and development. The market in the GCC has not only begun to realize the benefits in terms of comfort, security, and luxury, but also in terms of energy saving and increasing property value, thus all these realizations will continue to lead to a booming market in the GCC.
Emphasis will be on various technologies such as KNX, X10, Zigbee, En-Ocean, Bluetooth and Z-wave.
According to KippReport; Middle East is approximately ten per cent of the expected Smart home market, which is expected to grow to more than $55.8 billion by 2020. Whether it is temperature, lighting, AV control, security or parking system, the modern home is controlled by your fingertips.
The global smart home market has an exhaustive product portfolio. The smart homes market has been segmented by product into energy management systems, HVAC control, entertainment control, security and access control. The energy management system is further segmented into smart devices and lighting control solutions. Different security & access control product solutions included are intrusion detection system, video surveillance, motion sensors, touch screen, and keypads.
Industry leaders like Schneider by PELCO, Fermax, Assa ABLOY, Honeywell, Xtralis, CP Plus are already on board for the new concept and will showcase razor edge technology at Intersec 2016.


Don't miss the Smart Home LIVE Demonstration area in Hall 1-G11 to discover smart solutions for your business.

Infinova is a leading Global Security Products Manufacturer

001.jpg
"Infinova is proud to be associated with Intersec 2016 as a Gold Sponsor of the show for four consecutive years now. Infinova has been part of Intersec since more than 11 years and growth of this show year on year has been incredible. Similar has been the growth for Infinova which has achieved several milestones in these years which includes acquisition of well-known renowned brands such as March Networks and Swann Communications." Quoted by Mr. Milind Borkar- Vice President Sales and Marketing- Indian subcontinent, Middle East and Africa.

 

Infinova is a leading Global Security Products Manufacturer, headquartered in Monmouth Junction, New Jersey, USA.  Committed to technology, quality and reliability, Infinova delivers end-to-end Digital as well as Analog Surveillance Solutions. We specialize in offering Integrated Video Surveillance Solutions with a constant endeavor to deliver cutting-edge technology. Our Integrated Solution Portfolio comprises of IP & Analog cameras, Specialized Cameras, Video Management Software, Encoders/Decoders, NVR's and DVR's, Video Analytics, Traffic Management Solutions, Financial and Retail Surveillance Solutions, Fiber Optics Transmitter/ Receiver, Industry Specialized Application Software and Custom Integrations. Infinova offers products which are delivered across diverse industries worldwide.

Infinova will be demonstrating its 4K Camera, H.265 Cameras, Megapixel IP cameras, Thermal Cameras, Server and Storage Solutions and Infinova NVR at Intersec 2016. You can find us at Saeed Hall 1, Booth # D11.

Infinova is in constant endeavor of producing groundbreaking technology. Watch out our New and Exciting products at the show.

 
002.jpgHD Explosion-Proof 2 Megapixel IP PTZ Camera
This camera is fully-developed and specially designed for use in flammable and explosive hazardous areas. The system uses 316 stainless steel construction body to ensure its explosion-proof solidity in hazardous areas. It has an absolute operating temperature range of -40°F~140°F (-40°C~60°C). This camera is properly sealed to prevent the intake of flammable dust and ensure strong corrosion-resistant capabilities. The camera supports H.264/M-JPEG dual-stream encoding and three simultaneous video streams. It's embedded with 20X HD zoom camera module with resolution up to 1920×1080@30fps. CCOE and IECEX approved.

 
 
HD 12 Megapixel Smart IP Fixed Camera- 4K Technology
003.jpgInfinova's VS110-D7 series HD 12 megapixel IP fixed camera supports 4K image and provides richer and more accurate details, so as to guarantee the accuracy of intelligent analysis in a more effective, secure, professional and reliable way. VS110-D7series supports high -resolution image signal output (3840×2160@30fps or 4000×3000@20fps), provides top sharpness and color reproduction and acquires richer and more accurate details. It has 1/1.7" CMOS sensor. VS110-D7series features rich intelligent functions including damage prevention detection (to save camera lens from being shielded or deviating), loitering detection, (key areas protection), line -invasion detection (boundary protection), retro gradation detection (to avoid going in the opposite direction), queen length detection and head counting The camera can be applied to various high-end businesses, as the accuracy of each function is above 90%. VS110-D7 series supports convenient Auto Back Focus and is easily to be debugged and installed .It is mainly designed for municipal construction and intelligent buildings and is widely used in sports center, conference and exhibition center, museums and hotels.
 

8MP 180°HD Panoramic Dome Camera
004.jpgVP120-A605 series 8MP panoramic camera adopts 1/3" progressive scan CMOS senor, and built-in high DOF lens, which allow image output resolution up to 8MP@25fps. The camera boasts of 180° panoramic surveillance. With Self-help image fusion algorithm, a multiple of images are stitched seamlessly into a complete image. No fracture or ghost is available at the junctures. The camera supports PTZ panoramic linkage, and provides SDK and supports integration of the third-party software platform with Infinova software platform. Any zone selected in the panorama view will link the PTZ camera to enlarge, shrink and deviate, so as to rapidly locate details under the big scene. An overall surveillance solution combining GMS and close-ups and amplification can be realized by grasping local and panoramic information. VP120-A605 series camera is suitable for highways, roads, public security, airports, railways, ports, oil fields, parking lots, stadiums, entertainment centers, subways, large department stores, star hotels, prisons, conference halls, exhibition centers and other high-resolution surveillance applications.

 
H265 HD Megapixel Smart Starlight WDR IP Box Camera
005.jpgInfinova's VT210-A2-A0 series H265 HD Megapixel Smart Starlight WDR IP Box Camera allows image output resolution up to 1920×1080@60fps. The camera provides excellent resolution and color reproduction, acquires richer and more accurate details and guarantees intelligent analysis accuracy in a more effective way, which caters for different application needs. VT210-A2-A0 series boasts of rich intelligent functions, such as wire cross detection, regional invasion detection, field of view change detection, defocus detection, too dark detection and too light detection. The camera applies to various high-end businesses. VT210-A2-A0 series camera is designed for safe city, rail transit and municipal construction. Particularly, it is widely used in city public security, highway, metro, station, exhibition hall, etc.

 
HD 2Megapixel Intelligent Tracking Network PTZ Dome Camera
007.jpgInfinova VS130-B series megapixel IP domes provide our users a set of full digital, high definition, high frame rate, high signal-noise ratio live image collection system. This series dome is embedded with a 20x or 30x HD integrated camera module, supporting H.264/M-JPEG dual code, three simultaneous HD video browsing and control, with a resolution up to 1920x1080@30fps. The dome features multiple smart analysis functions such as cross-line detection, warning area detection, motion detection, lens block, etc. The accuracy of each intelligent analysis is above 90%; it also supports intelligent tracking, smart capturing, smart analysis scene to the satisfaction of various high-end commercial applications. Its humanized GUI interface enables our users to perform PTZ control easily via network and accurate configuration of camera parameters. Infinova VS130-B series network dome camera also carries regular dome functions of preset, pattern, autopan, autoscan, timely tour, tour, etc.

 

H.265 HD 2Megapixel Starlight Intelligent IR Network PTZ Dome Camera
08.jpgVT231-A2-A3 series is our newly introduced high definition infrared network dome camera that supports 1920x1080@30fps HD network video output. It adopts H.265/H.264/M-JPEG encoding and its output provides excellent definition and color revivification degree which enables the acquisition of rich and accurate details so as to effectively guarantee smart analysis accuracy. The cameras carry smart functions and support wire cross, instruction as well as scene change, defocus, too-dark and too-bright detecting. With its safe, professional and reliable smart analysis, it can satisfy various upmarket applications. This product adopts large power LED infrared lamps, infrared wave length 850nm, long night vision distance up to 120m, strong illumination. The IR lamps can turn on or off automatically based on environmental lighting conditions or can be adjusted manually. The IR illumination allows flexible adjustment so as to reduce IR lamp calorific value and extend its service life. User-friendly GUI interface design allows users to perform dome PTZ control easily via network and to configure detailed camera parameters settings. At Web interface users can perform dome camera settings and operations by using a mouse which is more convenient than the traditional keyboard control. It also supports area zoom and image PTZ function. VT231-A2-A3 series dome cameras also feature general dome functions such as preset, pattern, autopan, autoscan, time tour and normal tour.

Monday, November 23, 2015

Industry Experts make their predictionon what 2014 hold for security technology trends

The dawn of a new year promises to bring a bevy of new products and innovations to the physical security industry. End users continue to migrate away from legacy security systems towards technologies that enable them to be more proactive in mitigating their risks. Last year’s investigation into the bombing at the Boston Marathon showed the potential waiting to be unlocked in using big data analytics to comb through troves of video evidence. The ability to remotely access and control security systems from mobile devices also continues to rise in prominence. SIW recently reached out to industry experts across several product categories to get their take on what 2014 holds for security technology.
Video Surveillance
Predictions by Fredrik Nilsson, general manager, Axis Communications:
1. Security goes all IP, beyond just video. IHS Research predicts that 2014 is the year IP video revenues finally surpass analog. This technology shift has been inevitable because end-customers and integrators alike enjoy much better functionality, scalability, and total cost of ownership while having the option to choose the best-in-class technologies that are right for their specific application. These are the exact same reasons we’ll see more systems shifting to open IP technology, especially access control. Not only will this afford much more flexibility in the solutions they use, but also finally deliver on IP’s promise of true system integration between video, access control, intrusion detection, alarms and the like.
2. Technology makes IP in small systems a reality. While IHS predicts 2014 is the revenue tipping point for IP over analog, in the same August SIW.com article, Principal Analyst Jon Cropley said that less than 20 percent of the cameras shipped in 2012 were network cameras. Nearly three-quarters of new cameras installed remain analog. In an all-digital world, it’s a stat that would shock many outside of the security industry. But we know that a major reason for analog CCTV’s continued life is the small and mid-sized systems market.
IP is essentially the de facto choice today for systems of 32 cameras or more because of all the benefits that digital technology brings. Systems between 17 and 32 cameras have been shifting to IP technology thanks to continued price decreases, ease-of-use and ease-of-install. However the 16-camera-or-less market has been dominated by analog because of perceived barriers of cost and complexity.
The good news is that edge-based technology – such as in-camera SD card storage and/or NAS devices – eliminate the need for the most expensive part of an analog system, the DVR. This makes going IP a cost-conscious move for small systems. For those analog users who still have life in their analog cameras, they can leverage video encoders with the same embedded edge storage capabilities and intuitive software to bring their systems to IP. And with hosted video adoption continuing to rise each year as more and more integrators understand when leveraging the cloud makes sense for their customer, the small system market is ripe for converting to IP in 2014.
3. New life for old infrastructure with bridge technologies. The shift to IP video is a forgone conclusion. However, not all customers are ready to make the leap to all IP – especially if they are currently using adequate analog CCTV systems. Yet these customers will soon face a mid-life crisis with their DVRs.
While the lifespan of a typical analog camera is eight years or more, it’s not uncommon for the DVR to fail in half that time. This is the mid-life crisis of the DVR – and it presents a great opportunity to use IP technologies and establish a migration plan. Instead of replacing the failed DVR with a new one, more users will turn to technologies that can bridge the gap to IP, such as video encoders and coax-to-Ethernet converters. These devices range from single port to multi-port blade solutions.
Powerful video encoder solutions today start at just $80 per channel. We expect that more and more end users will be prepared to work with their integrator partners to build these migration strategies that provide some of the benefits of IP today while preparing for when their analog cameras fail or they have the budget to upgrade to network cameras – and the vastly improved image quality, usability and intelligence they bring.
4. Moore’s Law lives on as vision gets even better. In the last two years, we’ve seen dramatic imaging improvements in IP cameras thanks to the predictable innovation curve known as Moore's Law. IP cameras can see color in near darkness without supplemental lighting and through both blinding light and into dark shadows thanks to improved Wide Dynamic Range technologies. They also continue to deliver entertainment-quality video (HDTV and better) across all different form factors – from PTZ domes to covert pinhole cameras. These imaging innovations that were first launched in high-end surveillance cameras will continue to move downstream in 2014 and become more affordable for all installations as the technologies have become more established. We have Moore’s Law to thank for that. 
5. Spotlight on cybersecurity as IT involvement continues to grow. Toward the end of 2013, Axis put the finishing touches on a research project that examined the involvement of IT professionals in their company’s video surveillance initiatives. The research, which was conducted by the Enterprise Strategy Group, showed that 91 percent of IT pros surveyed claimed they are involved in surveillance to some degree. It’s clear that their influence on surveillance projects is growing, specifically at mid- and enterprise-sized organizations, and common IT best practices like cloud storage replication and using data for business intelligence are impacting surveillance projects.
As IT becomes more involved, the topic of logical security will grow. With cyberattacks garnering more and more attention across the globe, integrators will be tasked to prove that their IP-based surveillance systems will meet IT’s security criteria, as well as their bandwidth, resiliency and quality parameters. In 2014, it will be important for integrators and physical security practitioners to understand IT’s concerns and help them overcome any hesitation through proper network optimization and cyber security measures. The good news is that today’s professional IP video devices can be optimized to limit bandwidth disruption and come with the same exact IT security protocols as any other node they would put on their network. 
Access Control
Predictions from John Fenske, vice president of product marketing identity and access management, HID Global:       
1. Increase in demand for more secure, open and adaptable solutions. As the security landscape continues to evolve in new and complex ways, progressive organizations and thought leaders are adopting a new attitude about change, and viewing it as an opportunity for improvement and value rather than an interruption or distraction. 
Proactively making changes today will ensure that an organization’s access control solution can adapt to future threats and take advantage of opportunities and applications beyond access control.  Future high-value applications might range from cashless vending, time and attendance, and secure print management to secure network logon as part of a fully interoperable, multi-layered security solution across company systems and facilities.  By using solutions that are based on industry standards such as OSDP bidirectional communications, and incorporating dynamic rather than static technologies, security becomes independent of hardware and media, and the infrastructure can more easily evolve beyond current abilities with the adaptability to combat continuously changing threats.    

The industry is still evolving, however, as not everyone shares this attitude.  In a survey of integrators and users, HID Global found that less than 50 percent have upgraded their systems in the last year, and more than half have not upgraded in the past three years.  Respondents were given a list of top technology best practices, and while 75 percent felt they were important or very important, half felt they were not implementing them well or at all.  Similarly, 93 percent agreed that a list of top policy best practices were important or very important, but nearly 40 percent said they were not implementing them well or very well.  We expect these numbers to shift as strategies for change become better understood and the industry embraces the opportunities that change can bring.
2. Mobile access control will continue to roll out in stages. During 2014, we expect to see the first phases of mobile access deployments in which smartphones will function similar to that of a card transaction today, with limitations due to technology and business ecosystems.  In subsequent phases, the phone’s onboard computing power and multimedia capabilities will be leveraged to overcome limitations and provide a more functional and rich user experience. Looking forward, the connectivity of smartphones will be used to perform most tasks that today are jointly executed by card readers and servers or panels in traditional access control systems.  This includes verifying identity with rules such as whether the access request is within a permitted time and, using the phone’s GPS capability, whether the person is actually in the vicinity of the door.  The user can then be validated using a cloud application and granted access via a trusted message over secure communication to the door.
In this new paradigm, mobile devices (rather than an access control system) make the access decisions, and doors (rather than cards) present their identity. This role reversal, sometimes called duality, changes how access control solutions are offered.  Organizations will be less dependent on the expensive infrastructure required for connecting servers, panels and readers – just electronic locks that respond to a mobile device’s encrypted “open” command. This simplified and more economical model with enable the industry to secure more assets; interior doors, filing cabinets, storage units and other areas that have been prohibitively expensive or complex to secure in the past.

3. Continued migration of intelligence to the door. Physical security and access control solutions continue moving to IP-based architectures that are easier to deploy and maintain. In addition, a standards-based IP architecture facilitates the integration of a physical access control system (PACS) with other systems that can share the same network.  A major benefit of this approach is the ability to move intelligence to the door, which streamlines system monitoring, management and reporting via standard web browsers.  By migrating to true open architecture IP-based intelligent controllers, users also can simplify future infrastructure enhancements and modifications since they can invest in hardware platforms that are not tied to proprietary protocols and software. 
IP-based access control is moving beyond host-controller communications to include controller–module and controller-reader communications as well.  Additionally, we will see a move to untethered connectivity in this networked access control environment.  Wireless intelligent locksets are the first step, and will become more prevalent as new, lower-cost, energy-efficient models are introduced to the market.  Mobile access control using smartphones is also on its way, which will leverage these devices’ wireless connection to act as both the key and processor, and become the rules engine for making access control decisions.  It will be possible to build and deploy readers (and locks) without any significant intelligence or connectivity capabilities and, because of the interoperability benefits of open-architecture IP-based intelligent controllers, users will have a broad range of controller and reader platforms to choose from, including basic readers and wireless intelligent readers that provide access to multiple credential technologies.
4. Visitor management systems to move beyond traditional applications. Visitor management systems are now widely adopted in the corporate environment, and they are increasingly spreading to other institutions, agencies and campuses. For instance, in the hospital environment, paper systems are being replaced with registration systems that are capable of screening, badging and tracking all visitors or, at a minimum, critical areas such as pediatric wards, as well as “after hours” periods when staff is reduced. These visitor management systems include key features such as support for the HL7 interface control so visitors can be matched to a variety of key real-time information about patient status and room numbers, ensuring no visitor is ever sent to the wrong patient room. 
Another example is federal agencies, which are migrating to systems that can quickly process visitor access while ensuring that all security procedures and policies are followed in accordance with HSPD-12. These systems read and process PIV cards in support of HSPD-12, and also can scan and process TWIC cards using OCR scanning, as well as Common Access Cards (CACs) using 2D bar code scanning.  The most effective systems feature simple-to-deploy middleware software that seamlessly integrates with the PACS and validates PIV credentials, which enables agencies to use PIV card data to better manage crossover visits from other agency employees. 
Video Management Systems
Predications from Gadi Piran, president, OnSSI:
1. Mobility. While mobility became a primary consideration for solutions initiatives in 2013, in 2014 it will become an absolute necessity. Communication via mobile devices has grown to the point where we rely on it for many elements of daily life, both at home and for business. For video surveillance, mobility means remote access to images from any smartphone or tablet, with the ability to control the system remotely as well. In 2014, users will demand better delivery via mobile, with multiple streams over low bandwidth – a solution we are now offering with Ocularis. We have to give users the technology to move out of the control room and into the field without sacrificing functionality – this is what the current population of technology consumers expects in every area of life and of business, and providers who do not make this utility possible will find themselves left behind.
2. Simplicity/Cost. Costs will continue to come down while VMS system user interfaces will become more intuitive and easy to use. These trends will gain momentum as 64 bit technology penetration expands, enabling more efficient utilization of the system and faster response times, even when streaming megapixel cameras.
3. Hybrid solutions. As long as there are still analog cameras in the field, there will be a need for hybrid systems to incorporate them on the network and to enable easier, more cost-efficient migration to IP. A new breed of integrated appliances now coming to market are providing best-in-breed turnkey video surveillance management and recording solutions that are suited to a wide range of applications. These plug-and-play devices will make it easier for the next generation of adopters to incorporate video management systems into their security and risk management programs, with the added bonus of simplified migration from analog to IP functionality.
4. Integration of manufacturer partners. Open-architecture technologies will enable continued close collaboration between providers, further expanding the functionality of video surveillance solutions.
Home Security Systems
Predictions from John Knox, president of the Electronic Security Association:

1. The continuing development of do-it-yourself wireless systems. It’s still early in the development of these devices, but thermostats and light bulbs are just the beginning. We’re going to see continued emergence of DIY for home security, video surveillance, smoke and carbon monoxide detection, and other home functions. This is going to challenge traditional companies to keep up with technology, but it’s also going to present customers with a choice. Do they want to get the newest technology at a higher price and deal with installing, maintaining and securing it themselves? Will they want to leave it to professionals with a track record of quality installation and customer support? Or will they sit back awhile and wait for prices to come down before finally deciding which road they want to take? Consumers also are going to have to decide how sophisticated they really want their homes to be. Not every consumer is going to want to pay top dollar for a talking smoke alarm. A large number will be satisfied with effective safety and security that doesn’t cost a fortune, and is easy to monitor and maintain.
2. Home automation. Home automation definitely offers the greatest opportunity for growth, and it also gives us a chance to expand the market for home security. We need to educate consumers that using the latest technology to protect their property and their families is more important than having a lamp that you can turn on with your phone. If they can afford both, that’s fine, but we need to help them understand that safety and security are bigger priorities than bells and whistles. And with the sunset of POTS lines and 2G technology, there are huge opportunities for upgrading existing systems.

Intrusion Detection
Predictions from Tim Myers, product line director, intrusion, Tyco Security Products:
1. The popularity of interactive services/interactive-enabled hardware will continue to rise. With the help of the smartphone, consumers are becoming accustomed to having remote, on-demand access and control of many different elements of their lifestyle on their smartphone. With Internet-enabled devices such as an intrusion alarm system as part of the connected home,  homeowners are able to control and receive information from other systems such as energy management and lighting, as well as have access to other security devices like wireless locks and residential camera systems.
2. Increasing acceptance of wireless intrusion technology in commercial applications. More sophisticated wireless offerings available on the market today provide more secure transmission methods, increased range and reduced battery consumption, making wireless security systems significantly more attractive for commercial applications. Featuring sophisticated 128-bit AES encryption, these systems prevent the wireless signal from being “sniffed” or hacked, so the signal cannot be overtaken through the air. More robust protection against signal interference, along with increased range, offers improved noise immunity from interference from other appliances or systems while improved range means increased distances between panel and sensor without the use of repeaters. Hybrid systems, which make use of both hardwired and wireless peripherals along with a full range of cellular and IP communications technologies, will also continue to be a driving force in the market as wireless systems ramp up in popularity.
3. Increase in alarm verification technologies/requirements for false alarm reduction. Budget strapped municipalities won’t be loosening requirements for alarm verification anytime soon, so the industry has responded with a few different solutions. Along with increasingly sophisticated sensor hardware, these verification methods are helping to mitigate the false alarm challenge. Visual verification occurs when an alarm signal activates a camera with built-in motion detection. The camera records a video clip and sends it to the monitoring center or law enforcement for action.  
Audio verification methods, such as two-way audio, allow the monitoring center to speak to the person on the other end, as well as hear what is going on. Another, newer type of audio verification is constantly recorded audio, which captures the 15 seconds before an alarm was generated and the 10 seconds after the alarm for increased about the incident.
Sequential detection is programmed into the alarm system, telling it how to respond to certain behaviors. The system itself can verify an alarm if more than one zone on a premise has been disturbed. For example, it will trigger an alarm if the front door is opened and a motion detector is tripped a few seconds later.
4. The industry is shifting to more reliable, sophisticated communication protocols. In an industry still grappling with decline of the traditional POTS system for alarm communications, the pending sunset of the 2G cellular spectrum means another shift in technology. At the same time, communications via IP andGPRS are gaining traction and reliability and will continue to lead the way as the industry analyzes how large of a leap to make — to 4G or straight to LTE — on the cellular side.
5. A growing appetite for localized touchscreens and applications. With consumers growing accustomed to the clean, user friendly interfaces on a number of devices, expectations for these same intuitive, touchscreen interfaces are also now prevalent with residential security technology. Together with mobile applications that provide anywhere, anytime accessibility, touchscreens are also becoming a modern, aesthetically pleasing addition to the residential security landscape that provides users local access to their devices.

History of Home Security

History of Home Security

Home security products date back much farther than many think. Kings and nobles who lived in castles in England during medieval times had home security systems. Armed guards would patrol their premises and they would often have moats dug around the castle to make it more difficult for intruders to attack them. They were not as high-tech and advanced technologically as they are today, but they were still very effective. Unfortunately, these two options would just be ridiculous in today's society no matter how awesome having a moat dug around a two bedroom ranch house would be. Home security equipment has evolved greatly over time, especially with the discovery of electricity.
In 1853 the first patent on electro-magnetic alarms was granted to a man in Massachusetts named Augustus R. Pope. His designs were then used by businesses at the time in the more wealthy homes of New York City residents. The design was simple by today's standards but groundbreaking at the time. Magnetic contacts were installed on the windows and doors of homes. When they were tripped they would send a signal through the electromagnetic wiring and sound an alarm that was in the house. They could not contact the local authorities like home security systems can today, but they were still effective in deterring break-ins from occurring and "prevention" is the name of the game in security. These rudimentary systems were very popular with the wealthy residents of New York City at the time.
Later, more advanced electromagnetic alarm systems were developed and installed in businesses that had a large amount of valuables like jewelry. Some of these businesses even had safes installed that had alarms with a direct connection to the nearest police department. These were the first instances of systems that could alert authorities to intruders in a place of business. They were later installed in homes of the extremely rich and other homes as they became more and more affordable. This is a far cry from the wireless connections that >security systems have today to alert the proper authorities of break-ins or fires in homes in just seconds. Response time has increased greatly since then, and police and fire departments can now respond in minutes to any problem in your home or place of business.
As time went on, the technology for home security devices improved greatly. The invention of the telephone was a great boost for the industry. The communication system could be used to help increase the speed in which the local authorities could be contacted to respond to a call. The invention of the home security camera was an even bigger boost for the industry.
Technology in home security saw its biggest jump in the 1980s. According to DisasterCenter.com, Home break-ins became more prevalent during the last half of the 20th century, and more and more middle class homeowners sought a way to help protect their home. Security companies that specialized in protecting businesses responded to this call and designed systems that were less ornate than the systems that they used for businesses that would still be effective in homes. They also made them much more affordable.
Today having a home security system is practically a necessity for any homeowner who wishes to help protect their home and their belongings effectively. If you have not taken the steps to help protect your home yet you should contact us to have a home security system designed that will fit your needs and your budget.