Friday, November 15, 2013

IP Camera 101 for Today’s Security Guard

Enter Technology

 Today’s security professional is a far different person than the security guard of yesteryear.  Gone are the days when padlocks and fences were sufficient to keep intruders at bay and a guard’s duties consisted of making patrols and admitting authorized workers with the wave of a hand. The adoption of IP cameras heralds a new era. At many facilities, guards need a working knowledge of IP cameras and Video Management Software.
The growing prevalence of IP devices also marks the tearing down of the wall separating the IT department from the security department.  The very fact that IP security system devices reside on an organization’s local area network (LAN), link the two.  And when you come down to it, it's all about catching intruders, whether they're virtual intruders like hackers or phyisical intruders like thieves or terrorists gunmen. So aren’t IT and Security  charged with the same tasks - risk management, response, and the ever-present need to be on guard?
However this doesn’t mean IT and security should require the same skills. Just because an individual knows how to install a firewall doesn’t mean she knows how to assess IP camera technology.  So more and more we're seeing  the responsibility for choosing an IP camera system to the security department.

 “Hiring” an IP network

Today’s security guard doesn’t work alone.  He, or she, has an IP network at his/her fingertips.  But when it comes to “populating” that network some IT / IP savvy comes into play. And that brings us to exactly what security personnel need to know in the 21st century.

Cameras????

Before a security official can decide on the cameras he needs, he must determine what he needs to see, or rather how clearly he needs to see it.

  • ·         Does he just want to detect that an individual is on the premises?
  • ·         Does he need to recognize that individual as a known employee? 
  • ·         Or does he need to see a stranger’s facial features for the purpose of forensic identification?

Once he’s determined that, he needs a basic understanding of resolution to help him make the best choice.

 Resolution

 In digital imaging, the smallest element of a picture is called a pixel. Pixels are usually square and arranged in a two dimensional grid. The resolution of a camera or lens is usually expressed in terms of the total number of pixels in a frame. An image with a resolution of 1280 x 1024 is a frame containing a count of 1280 pixels from left to right and 1024 from top to bottom. Work out the math and we have a frame composed of 1,310,000 pixels. And since every 1,000,000 pixels is expressed as 1 megapixel. We are looking at a resolution of 1.3 megapixels.
    IP camera resolution
  •   If the purpose is mere detection of the person with no notice given to his facial featureschoice should be a camera that supplies at least 5 pixels/foot.
  • If the purpose is to recognize an employee or a known visitor,  since the mind tends to  “connect the dots” when it comes to recognition, the choice should be a camera with at least  50 pixels/foot
  •  But when it comes to identifying a stranger,  facial characteristics must be clear in order to compare them to a database of offenders. In this case,  a minimum of 70 – 80 pixels/foot is recommended.




Light????????

Now he needs to assess the location where the camera will be mounted.  

Day/Night Cameras

Will he be placing some of his cameras in areas that are fully lit during business hours, but minimally lit after hours? If so, he will need a day/night camera.

Day/night IP camera

Most cameras have an IR filter over the lens to filter out the infra-red waves of the light spectrum. Day/night cameras automatically set them aside when the lighting is low so that more light can hit the sensor.







Other day/night cameras switch to black and white mode which increases light sensitivity. 
day/night IP camera
 Some can operate in as little light as 0.05 Lux (for the sake of comparison, the light level of a fully lit office is 500 lux, and the light on a full moon night is 0.270)





Cameras with Wide Dynamic Range (WDR)
Will some cameras be in areas of contrasting light, where the field of view includes well-lit areas as well as darker ones? Examples of such places might be the main entrance of a hotel at night where guests are crossing over from the relative darkness of the street to the bright illumination of the lobby, or the parking area or garage where the bright headlights of cars constantly alter the range of light.
wide dynamic range IP camera

In conditions where there is a significant range of light variation, a regular camera cannot change its shutter speed or iris settings to adjust.  However, a camera with Wide Dynamic Range (WDR) capability uses a special technique called multi-frame imaging to capture the light variations and heighten the details in the area of view.

Lens????

To talk about a camera without considering a  lens would be telling half the story.

megapixel camera lens
A Megapixel  Lens  will be of particular importance if he has selected megapixel cameras since the  quality of video depends on the clarity of the lens and its ability to capture the most light possible in poorly lit areas.






A Varifocal Lens will give him flexibility when he needs to adjust the focal length in differing conditions.  Focal length is expressed in millimeters (mm) and to determine 
varifocal lens
his particular needs, he must take into consideration the width of an area and the distance of its object from the camera.










A good rule of thumb is the  lower the number (mm) lens, the larger the area it takes in, but with less magnification. Conversely,  the higher the number ( mm), the smaller the field of view, but with more magnification.

Video Management Software?????

Whether it’s the case of a single office building, a flowing hospital setting, or a multi-building college campus, the security department needs software to control,  manage, amd get the most from their cameras.  

Video management software (VMS) can be installed on any Windows computer and its applications tailored to meet many situations. At its most basic, VMS will allow guards and administrators to stream live video
Video Management Software
from each camera separately or simultaneously on a video wall or divided monitor.






Another useful feature in a large facility is carousel viewing in which the
VMS
security officer can determine which cameras are included in a rotating cycle. A live feed will be highlighted and featured for a set period of time before giving way to the next camera’s field of view. This allows the guard on duty to view different areas or sections without the monotony brought on from trying to view the whole screen of windows at once.




With the right VMS, the guard on duty can
  • Record and retrieve video,  
  • Control PTZ cameras with a joystick
  •  Add digital PTZ function to a live feed.

Video management software can also be set to automatic functions like monitoring alarms and issuing alerts. And should police need any recorded video for forensic investigation, most VMS programs will allow security to find and retrieve specific recorded events without going through the archive

The Takeaway???????????

An ambitious security guard should take it upon himself to continually update his computer skills, for who knows what degree of technical will be required in the future. As more and more organizations adopt The Cloud, the day may soon be upon us when IT and Security may find themselves sharing the same office.



 Anyone interested in more information on IP cameras, lenses, or video management software is invited to contact Kintronics, Inc., the experts in Security solutions. Call one of our sales engineers at 914-944-3425,  check out our website, www.kintronics.com. Or just state your needs on one of our information request forms

Tuesday, October 8, 2013

IP Door Access Control: Retiring the Key Ring

In our previous post we looked at how the security industry's adoption of IP cameras changed the lonely night watchman into a technology-savvy security officer. Today we take a  look at how IP door access control has made his set of keys all but unnecessary.

The night watchman’s scheduled rounds were marked not only by his flashlight’s circle of light but by the sound of his keys as he unlocked and relocked each door as he made his rounds





With IP door access control in place, a key is of no use since each door’s lock  is controlled by the intelligent card reader mounted at thedoor. The reader contains all the intelligence that is needed to read and validate any company access card presented to it by any employee authorized to use that particular entrance. The guard just swipes his proximity credential  in front of the IP reader. Validation is instant and the lock is de-activated.


Accountability

At one time, night watchmen had to verify they were carrying out their duty by logging in at certain points of their patrol, by signing their name and noting the time. IP door access control software automatically captures this information when the guard swipes his credential, not only validating that the officer has passed through this site, but providing a timetable for any forensic investigation that may arise in the future.


 Being connected to the company’s  ethernet  network and powered by PoE  means there is no need for a central control panel box or even a power outlet. So the security guard has none of the connection problems or power outages faced by ye olde night watchman. 

Employee Access

Today’s video management software means the security guard  no longer has to check each worker’s ID badge or rely on recognition. Although a guard is usually present to provide manual entry if required, his presence is not required thanks to access control software.
Once administrators have customized the software to specify the entrance an employee is authorized to use, and during what hours, it sends that information to the reader mounted at that door. The reader processes the commands stores the information so that when the employee presents her credential, it deactivates the lock if she's authorized (or doesn't, if she's not.)
This allows the security guard to stand  apart from the process, and not  have to put up with anger, frustration  or arguments if entry is denied. The matter is beyond his control.

 Visitor Management
Visitor Management software can automate lobby security, freeing up security personnel for other
duties. No longer is it necessary for hospitals to use security guards to greet and process visitors at the information  desk or for school’s to station a guard in the entrance lobby to verify a parent coming for a scheduled teacher conference.  Using Visitor security management software installed on a PC, hospital volunteers or school clerical staff can confirm a visitor's identity, capture information from his photo ID and issue a temporary visitor’s pass with hardly any typing and print professional quality visitor badges withing seconds.


Remote Access Control

The Ultimate Security Triumvirate: IP camera + IP Access Control + IP intercom


Some guard duties involve manual control of locked entrances as in the case of a bank vault or safety depositroom , a high security prison, or a loading dock after regular business hours. Whereas Ye Olde Night watchman was forced to go to the door, the security officer of today can monitor, converse with, and grant entry to those seeking entry without leaving his desk, thanks to IP connectivity.



Although easy to install, several devices and types of software must be installed.
      ·         IP camera with two way audio
·       An   IP intercom to be connected to the video in and video out connectors of the IP camera
·         Video Management Software to provide doorbell notification
·         Electric Door lock and IP access control software.

 Using these configured items, let's look at scenario in which a bank employee seeks admittance to the vault.

  1. She rings the bell on the intercom. 
  2. The sound comes to the guard through his computer's speaker
  3. The employee appears on his monitor
  4. He converses with her via his computer’s mic 
  5. Satisfied with her identity, he deactivates the electric lock via the access control software.


If the guard needs to monitor the surrounding area before granting entry, a standalone IP camera is used but often such a camera is not positioned to capture the entrant's face. If the guard needs a head on view, an inter-cam might be a better choice.

Simply put, the inter-cam is an integrated unit consisting of a wide angle lens IP camera inside an intercom.
Since the camera can be focused on the area a visitor would stand when using the intercom, it can provide a clear view of the person’s face.
The Inter-cam includes an interface box for connecting it to the ethernet so it’s included on the network along with the IP access control, and can be controlled by the same video management software. So, as soon as the guard confirms the vistor’s identity, he can deactivate the lock right from his station.

And so, thanks to IP technology, the security guard's life is easier, yet more complex. More complex because as noted in the previous post, he does need basic technical knowledge about IP technology and video management software; easier because he does not have to spend so much energy patrolling the facility.
And as far as his welfare is concerned the news is good and bad. Good because an IP camera allows him situational awareness, no longer venturing into the unknown dangers ye olde night watchman faced investigating intruders in the dark. Bad because with all that technology at his fingertips he’s going to gain weight if he doesn’t get up and walk once in a while!

To learn more about how IP cameras, IP door access control, and IP intercoms and inter-cams can improve your facility's security, call 914-944-3425 to speak to one of Kintronics sales engineers or just fill out an information request form on http://www.kintronics.com/RequestInfo.htm


Monday, September 30, 2013

Where Have All The Night Watchmen Gone?




One rarely hears the term night watchman anymore. But up until the 1980’s, this was the name today’s security personnel answered to.The common image of a night watchman was a man, keys jangling on his belt along with a whistle, as he made his rounds through a deserted facility, following the lonely beam of hisflashlight. Advances in technology have all but retired his (or her) flash light but these same advances have added to the requirements and knowledge needed to become a night watchman, oops, a security officer.

IP Cameras Call for a Tech-Savvy Breed of Security Officers

Today’s organizations and institutions, whether they hire their own security personnel or contract with a security agency, are turning to IP technology to expand their security.
What this means for security guards, especially those in supervisory positions, is that they need to have a basic technological understanding of and familiarity with IP cameras, monitors, video management software, PCs and servers. And since the world of technology expands constantly, they need to keep abreast of changes.
Many organizations are also seeing a subtle blending of IT and Security operations. Let’s take a look at three specific sectors.

Hospitals

How ironic is it that hospitals, places that provide care and healing are also experiencing a surge of violence and theft?  But think about it - a hospital provides fertile ground for both.

  • ·         Emotions can run high in crowded Emergency Rooms, accelerated by long waits and tight quarters.
  • ·         Upstairs, frustrated  relatives seek instant answers to questions that rely on lengthy testing.
  • ·         Back downstairs, the pharmacy, although under lock, and with access procedures in place, offers temptation to trespassers, or even employees with a drug habit or in need of money.
Having to monitor all the corridors and departments of a hospital presents a challenge. Ye Olde night
watchman would have needed to expend a lot of shoe leather. Today, thanks to the remote connectivity offered by IP networks and Video Management Software (VMS), today’s guards can monitor it all from the security desk.

Department Stores

In the watchman era, a plainclothes “store detective” might wander the floors all day, posing as a browsing customer.  Today’s theft  prevention officer can view live camera feeds from the women’s department,
IP camera view
housewares, toy department, cosmetics, and menswear without leaving her desk. And in the case of a large chain with many locations, thanks again to network connectivity and VMS, the corporate security officer at the flagship store or the company headquarters can view every one of its stores either as a live feed or recorded video.
This is possible because every IP camera has its own unique IP address, and resides on its own node on the company’s Ethernet network, just like any other device. So if a branch manager in Peoria, Illinois can  connect to the purchasing department in the corporate office in Chicago, or download an evaluation form from the flagship store in Los Angeles, the security department can use the same network to monitor sites.

Schools

It used to be that vandalism, burglary, and extensive graffiti were the major problems schools  faced.  But, for reasons, yet to be fathomed, schools from kindergarten through university, have become a destination for sick individuals bent on wiping out innocent victims.
The presence of watchmen patrolling the corridors would only add to the stress level of students. But by adding IP cameras to the school ‘s network a security officer  can sit in his office and keep careful but discrete watch over the gym, cafeteria, corridors, classrooms, parking lots and playgrounds. Should an intruder approach, security can be forewarned. Careful IP camera vigilance might also help in warding off bullying that often goes un-noticed by teachers and administrators.

Video Management Software Makes for A Safer Security Officer


The night watchman treaded on a path of uncertainty each time he made a patrol. He could never be sure what was just beyond the beam of his flashlight. 

Adding  Video Management Software (VMS)  to the IP camera system  takes some of the inherent danger and uncertainty out of the night watchman’s job, and affords the Security Officer a chance to organize and prepare for an incident as it unfolds.
What this means for today’s security officer is he/she needs to be trained on navigating the software to take advantage of its many features and options such as

Virtual Patrols

VMS allows security to “patrol” several areas at once without leaving his PC or control station. Live footage
Video management software
from cameras in select locations can be viewed on one split screen monitor, each in its own little segment of the screen, or preset to scroll through the frames. This means the guards can take more virtual tours and fewer walking ones. 

·         Should a school security guard spy an open exit door in the empty gym or cafeteria on his virtual tour, he can alert another guard closer to the area while he scrolls through cameras in the surrounding areas searching for any intruders.
·         In a hospital, viewing a scene of escalating tempers might prompt the viewing officer to not only send several of his men to the scene, but also to call in the police.

·         In a shopping mall, a large gathering of youths might warrant the dispatching of several guards to the area.

Motion Detection, Cross Line Detection, and Alerts 

Cameras equipped with Cross line detection or motion detection can be programmed to automatically send an alert  to the monitoring screen. Both applications are similar in that they detect moving objects. The difference is that motion detection concerns itself with movement in a predetermined area while cross line detection sets up a virtual tripwire which when crossed by a moving object will send an alert. The officer at the  PC will be alerted when that particular camera’s viewing pane is suddenly highlighted, outlined, flashes, sounds an alert, or all four. The alert signal is programmed at set-up.
Subsequent cameras can be selected to follow the progress of the intruder, and depending on the software, the alert may automatically alert the police. Meanwhile it allows on-site staff to know what they will be facing so they coordinate and respond to the situation.

 And so today's security personnel has to be technology-savvy. Savvy leads to superior security. Not only does it make a guard's job safer but it expands his presence, and that expanded presence makes for safer facilities and businesses.

Next post we'll explore how IP-based Door Access control and IP-based Intercoms would also have lightened Ye Olde Night watchman's load.

Meanwhile, if you're interested in finding out more about how IP-based security products can make your workplace a safer place, Kintronics sales engineers are available at 914-944-3425 to answer your questions or design a system for you. Filling out a form at request info is another option.



Thursday, September 5, 2013

A Facelift for the Eye in the Sky


Back in the early years of Las Vegas, casinos coined the phrase “Eye in The Sky” to characterize their surveillance operations.In those days, surveillance consisted of a few men on squares of plywood set across neighboring rafters. Armed with binoculars, they scanned the floor below for any activity that hinted of cheating. 


While you’re wondering how effective this was, I’m worrying about how many security guys fell from the rafters. Talk about a windfall.


But seriously, surveillance operations are much safer these days, and much more in favor of the casino. it’s not just the surveillance camera that greets you upon entry and those myriad others that catch you as you search for the magical machine that will make you a millionaire.  




More and more casinos are turning to Facial Recognition Technology to improve their odds against cheaters, and counterfeiters. So if you’ve been in a casino anytime within the past six or seven years, odds are your face came under scrutiny as well.


Biometrics

Facial Recognition Technology (FRT), developed at MIT, falls under the heading, biometrics. Biometrics is the science that measures and analyzes biological data. As a technology, biometrics uses these biological markers for the purpose of authenticating a person’s identity. Biometrics makes use of unique characteristics such as fingerprints, retinas, irises, DNA, and voice, speech, and facial patterns.
Biometric systems developed for forensic or authentication consist of three core components:
  • ·         A scanner or reader
  • ·         Software to convert the features into code and match points.
  • ·         A database for storing and comparing the biometric data for comparison

FRT relies on facial patterns. Casinos use surveillance cameras in tandem with a scanner and FRT software to obtain an image of anyone they suspect of engaging in illicit activities.

So how does this FRT work?

The quick and dirty version

FRT enables users to select a frame from surveillance camera footage and extract the face from the background  for comparison to other individuals, or to be entered into a data base to be used for subsequent matching. 










The more detailed version

FRT is based on knowledge of face patterns, the various uphills and downhills that go into making every face unique. Ninety of these nodal points have been identified, the most pronounced being the distance between the eyes, depth of the eye sockets, shape of the cheekbones, width of the nose, and length of the jaw.


Most FRT systems make use of the eye area. They start with a live image captured by an
 IP surveillance camera and use an algorithm to locate the face and extract it from the background.








Next, a template of the eye area is created. After marking specific points, and measuring the distance between them, the data is translated into a unique code, and stored in a data base containing the same type of information about other individuals.




In the case of casino security, the data base stores the facial information of known card counters, cheats, counterfeiters, or blacklisted individuals who have been ejected from the premises previously.
Casinos share this information among themselves, or get it from law enforcement agencies.







FRT in Action

The Trump Casinos consider FRT an invaluable part of their casino surveillance units, telling CBS news that they first installed it at Trump Marina in Atlantic City. Three days later it enabled the casino to zero in on eight baccarat cheats.

A demonstration followed. From the surveillance room, the surveillance director sat at his computer and pointed out a mustachioed man in a San Francisco 49ers football jacket sitting at a blackjack table. He used
his keyboard to aim an IP camera, concealed in the casino ceiling. He then zoomed the lens to get a tight shot.






After freezing the frame, he transferred the man’s image to another computer monitor and typed in several category codes: white, male, 21, and blackjack.
Within seconds the computer returned 386 potential matches, displaying them nine at a time. 







After reviewing them all, no match was found, but had there been, the man would have been either escorted out the door, or watched closely until he revealed himself to be cheating, at which time he would have been arrested.

In Service to the Customer

Casinos primarily use Facial Recognition Technology to distinguish between customers who come in to have a good time while trying out their luck against the odds, and those who enter with the purpose of employing dishonest means to cheat them of their money. But more and more of them are using FRT to spot their VIPs and high rollers the moment they set foot into the building.
Databases at these establishments have taken to storing biometric data for their most frequent visitors who gamble large amounts of cash each visit. Using extremely fast responding software, hosts and hostesses are able to swoop in from the wings with an effusive welcome and to offer them whatever extra services will make their stay an enjoyable one.           
  

Privacy Issues

Privacy advocates see Facial Recognition Technology as yet another encroachment. Casinos defend the practice, pointing out that their main objective in using it is to protect their own assets while providing an even playing field for the vast majority of customers, who are honest and play by the rules.


The Ontario Lottery and Gaming Corporation that oversees gambling in the Canadian province, employs a combination of IP cameras and FRT software to screen every visitor entering Ontario’s twenty seven casinos. But the Privacy Commissioner, in an interview with the Canadian newspaper Globe and Mail maintained  that “privacy is the default condition,” and assured the readership that all images of visitors who fail to match are instantly deleted.





Or as the Trump Marina’s surveillance director put it:

 "An honest person has nothing to worry about. It’s the cheaters, the people who are being watched, they have a different take in it. Their way of life is being compromised."






For more information about IP cameras and Facial recognition software call Kintronics at 914-944-3425 or visit their website to fill out a request information form.




Thursday, August 22, 2013

In pursuit of Lifelike sound

So far, I have not had the pleasure of owning a Bose sound system but have friends who do, or in the case of one, did  -  before it was stolen from his car. And although I write about pitch, frequency, and sound waves here, it’s in connection with IP network attached paging  and intercom systems and portable PAs, I knew little else about Bose other than its iconic stature; Bose, one of those brands where just the name says it all - like Rolex or Apple.

Bose. I never realized it was the name of a gentleman whose dissatisfaction with existing stereo equipment gave spark to a quest for equipment that could deliver the quality of sound he was looking for. He passed away on July 12, 2013.


Amar G. Bose was born in Philadelphia to an Indian father and an American mother. His father had left India after being imprisoned for opposing British rule. At age 13, he organized his friends into a team to help him in his radio repair business so it appears that from early on, young Bose was destined to  connect entrepreneurship with delivering music.

His passage to founding Bose Sound Systems followed a winding path. After four years at MIT, for which his father borrowed $10,000, he journeyed to New Delhi on a Fulbright Scholarship, then back to MIT for a doctorate in electrical engineering. Had he arrived at the  Bose Systems point in his life? Not quite. A two year stint teaching at MIT turned into a professorship that lasted forty-five years.


However in 1956, frustrated at not being able to find any stereo systems that could replicate the sound of a live performance, he set out to design his own. He knew from his college courses that 80% of what we hear in an indoor concert setting is indirect sound; meaning it bounces off the ceiling and surrounding walls rather than directly travelling to our ears. He dug deep into psychoacoustics, the scientific study of how we perceive sound, and applied it to speaker technology, intent on coming up with a sound system that would deliver what he called “lifelike sound”. His research bore fruit with the 901 Directly/Reflecting speaker system, one of the first to utilize the space in the room. It remained the unparalleled standard for 25 years.


 The Bose Corporation recycles most of its profits into research in the area of acoustic engineering, and Amar G. Bose held  more than two dozen patents. But ironically, although Bose acoustical products are responsible for the crystal clear sound in such places as Olympic stadiums, Broadway theaters, and the Sistine Chapel, the company has also engineered products for the purpose of reducing sound:

  • ·         a noise cancellation system to protect their hearing while travelling in space shuttles,
  • ·         noise cancelling headphones for pilots and the military
  • ·         non-linear control theory research that  contributed to an electromagnetic active control suspension for automobiles that provides sound control when driving on bumpy roads.
While Kintronics does not offer Bose Products, they do carry several different types of sound systems.

·         Portable PA and sound systems from Anchor Audio and Califone

Anchor PA Systems
Beacon by Anchor Audio


·        IP Network Attached Paging Systems and IP intercoms from DigitalAcoustics.

PA over IP



All are easily configured and feature excellent clarity of sound. So if you are part of a school system in need of a new portable PA for the new school year, or a hospital, corporation, or educational institution, looking for a scalable intercom system that attaches easily to your Ethernet network, a Kintronics sales engineer is available to answer your questions at 914-944-3425. Alternately, if you fill out an information request form, someone will respond to you. 

Tuesday, August 6, 2013

Edge Storage

Edge Storage
Over the course of our last couple of posts we took a look at Video Management Software (VMS) and how it provides efficient, comprehensive video recording and storage. In this post we will explore a way to complement it: edge storage. Comparable terms you may be familiar with include onboard recording and local storage.
Many of the latest IP cameras from Axis , IQinVision, and Sony offer edge storage which allows a network video device such as a camera or video encoder to create, control and manage recordings either locally to an SD/SDHC card or to network  shares like Network Attached Storage (NAS) . Edge Storage can be add value to an IP camera system in a few ways
Redundancy
Edge storage can serve as a partner to central storage, either recoding in tandem or as a back-up.  If the central system happens to be down due to a network disruption,  hardware malfunction, or  central system maintenance, a camera equipped with edge storage will continue to store its video (fail over recording).  And if used in conjunction with VMS, the missing video clip can be merged to the central system once the network is back up.
But the security of fail over recording isn’t the only advantage of adding Edge Storage equipped cameras to your IP camera system:
Remote Locations
In remote locations such as fire outposts or ATM kiosks, where network connectivity is not available, cameras with edge storage can be used to manage recordings and save them to an SD/SDHC card. The video on the card can be transferred to a central system periodically. It can also be of use on trains and other rail bound vehicles where video can be recorded to edge storage and transferred to the central system when the train stops at a depot.
Compensation for Low Bandwidth
In situations where the network’s bandwidth is low, streamed video can suffer in terms of clarity and definition. Using edge storage can compensate by supplying high quality video of incidents recorded locally that can be imported should the need for forensic use arise.
Cost Effectiveness
IP Cameras equipped with edge storage, depending on your purpose, can eliminate the need for a DVR, NVR, PC, or an onsite server.

If you’d like to find out if edge storage is right for you, our sales engineers can answer all your questions. Call us at 914-944-3425 or visit our website http://www.kintronics.com/neteye/neteye.html   Or if you prefer, fill out this information request form, http://www.kintronics.com/RequestInfo.htm and we will respond promptly.

Friday, July 26, 2013

Ocularis VMS - Something for Everyone

In our last post we provided an overview of Video Management Software (VMS) and promised to return for a closer look. For that we turn to Ocularis from ONSSI.  ONSSI stands for On-Net Surveillance Systems Inc., and they provide a range of software solutions to support IP camera systems ranging from the entry level Occularis PS to the enterprise version, Ocularis ES.
What is Ocularis VMS?
As a comprehensive video management system, Ocularis combines powerful network video recorders (NVR) with physical security information management (PSIM) functionality. As a video and event management platform, it allows streaming, recording, and managing cameras at multiple sites.   It is totally scalable since an unlimited number of cameras may be added at any time.
Ocularis distinguishes itself by providing a collaborative environment in which video and alerts from across the network can be consolidated into meaningful events that to be shared across the IP network and used to build a case file of video evidence.  Once any Ocularis Video Management software is installed it can be viewed from any workstation, as well as over the internet, either using Ocularis client software or a web browser (with optional Ocularis X)
What Can Ocularis VMS Do for You?
Before examining the different Ocularis versions, let’s look at the common features shared across the board.:
·         User-friendly touch screen interface with multi-screen support
·         Map-based integration of cameras and  camera-views  with preview windows
·         Unlimited number of viewing panes for individual cameras, carousel views, hot spots, web image (html) and alerts
·         Pane menu control for  changing cameras on the fly, clearing panes, clipboard copying, and manual push video alert
·         Interactive overlay controls (IOC) for instant investigation allowing playback, optical and digital PTZ as well as 360 degree lens parsing.
·         IOC for instant investigation during live monitoring
·         Auto detection of cameras
·         Support for MPEG4, MJPEG, H.263, H.264 as well as ONVIF and PSIA standards

Which Ocularis VMS is Right For You?

Ocularis PS is a small system solution that delivers high quality, dependable video.  It supports up to 25 cameras per server, but by adding additional servers, can provide unlimited  scalability. Security personnel can monitor the premises live or view recorded video.


Ocularis PS is an ideal application for
·         Standalone schools
·         Hospital campuses
·         Chain franchises
·         Residential buildings






Ocularis IS combines all the features of PS with an efficient event management platform. IS supports up to 64 cameras per server.  It offers multiple video recording servers at multiple sites with the option of either local or network storage; map navigation with active camera previews; and shared event handling among multiple operators.
Ocularis IS can be readily integrated with third party vendors’systems for access control, license plate recognition, and content video analytics. When used with these, IS can be used to detect and analyze events and send pro-active alerts to security personnel across the organization thereby providing better security and quicker responses.


Ocularis IS is an ideal application for
·         Municipal or public safety organizations
·         School districts
·         College campuses
·         Retail operations with centralized headquarters
·         Chains with franchised locations





Ocularis CS is scalable for an unlimited amount of cameras.  It offers all the previously described features plus optional access to video and alerts from multiple Ocularis systems and wall video-equipped central command centers. Likewise police command centers can use its easy-to-use map-based interface to access video from multiple Ocularis systems in the same locality.


Applications for Ocularis CS include
·         Transportation authorities
·         Clusters of police precincts
·         Municipalities with access to hospitals and schools






Ocularis ES is designed with IT-oriented organizations in mind. It includes all the functions of the Ocularis suite of VMS plus a central video recording management utility. Much of the complexity of managing hundreds, even thousands of cameras at multiple sites is simplified by CS’ provision of a single access point to the entire recording server array. This single access point makes possible batch operations and easy configuration of system-wide storage, cameras, and recording .
To prevent video data loss, Ocularis ES allows the set-up of multiple failover recording servers that begin recording instantly should a hardware failure occur.


Ocularis ES is perfect for
·         Complex city-wide or public-safety environments with a large number of simultaneously viewing clients.







If you’d like more information about any of the Ocularis Video Management Software versions detailed here, or about compatible IP cameras, Kintronics sales engineers will be glad to answer any of your questions . You can contact them at 914-944-3425 or visit http://www.kintronics.com/neteye/Softsite32.html. Or if you prefer, just fill out http://www.kintronics.com/RequestInfo.htm and a Kintronics engineer will contact you with the specified information.