Remote Video Camera Monitoring is Big Business in South Texas

  • By lemaster
  • 27 Apr, 2016

Video Camera Monitoring

What good is a video surveillance camera if no one is watching it?
This is a common question asked by business owners, managers and security directors. Traditionally, video surveillance systems provide a recorded image history and that’s about it. This does little to help companies protect themselves in “real time”, as the crime is occurring at their facility. That’s all changing…..and fast!

Remote video monitoring services are quickly becoming the service of choice for businesses that want to avoid the high cost of guards and patrol services, and use technology to protect their assets – and at a fraction of the cost of physical security. Using an offsite Security Call Center, the remote video monitoring service operators connect to video cameras at the customer’s facility and perform scheduled or random “patrols” and document the event in a report that is provided to the customer daily, weekly or monthly. Also, in the event that an unauthorized person or vehicle appears at the facility, operators at the call center can interpret video feed from the scene, and take action. Options available to the operator are:

  1. Remotely activate a siren
  2. Remotely activate a light
  3. “Talk down” through a loudspeaker with a pre-recorded message warning the intruder that they are trespassing on a secured location and to leave immediately.
Based on the situation, the operators can dispatch the authorities while the entire event is being recorded for evidence.

Who are some of the types of facilities and businesses that benefit from remote video monitoring:

  • Fenced storage areas
  • Oil field equipment storage sites, pad sites, producing well sites
  • Trucking and transportation facilities
  • Car dealers
  • Warehouses with valuable inventory
  • Multi-tenant office buildings and parking garages

To learn more about remote video monitoring go to:

http://www.securitytechnologyofsouthtexas.com/web/content/technology/live-video-monitoring

or call us toll free at (855) 688-2718

By proadAccountId-378954 01 Dec, 2017

   Many readers probably have some notion of the essential concept of what a "General Artificial Intelligence" (GAI) would be simply through pop culture and pop science exposure. A "GAI" would be capable of the type of problem solving that has eluded but intrigued computer scientists since before the inception of industrial computing; the very human ability to simply look at any problem and through trial and error and experimentation, simply "work things out".

               

           This, rather obviously, is not here yet. But billions of dollars have been poured into development of focused AI systems. Early chess computers took on humans and won, IBM's Watson took on the preeminent "Jeopardy" champion, and within the past few years, the worlds most logically complex game, Go, also went to a machine.

               

          These types of programs function on basically the same principles as any other piece of software, with the critical difference in that they have a limited ability to "learn". And they are most certainly in use today.

               

          IBM provides a long list of the current platforms Watson has been working on. The list ranges from using the Watson IOT to analyze billions of pieces of elevator data to tumor DNA to millions of pieces of available research. Some broad scope facial recognition software is also written with an AI environment to assist.

               

         The applications in the future are difficult to predict, but if we assume any improvement at all over time in AI, it is fair to assume that it will penetrate many, many industries just as the IOT has already and continues to do.

By proadAccountId-378954 01 Dec, 2017

The type of software used in facial recognition is typically built around a machine learning architecture. To be able to perform a task where the computer looks at camera images of human faces and matches it against a massive database of known faces, the software needs to have the ability to change itself as it learns the intricate, seemingly intuition driven, differences between human faces.  

               

          "Machine Learning" software is particularly important in the security operations of very large enterprises. In the last decade, Walmart and other large retailers have implemented facial recognition in their loss prevention efforts. If theft is documented by the system on one occasion, the face is cataloged, and should the suspect return, the cameras in the front of the store are able to start an alert for the human security to pay particular attention.

               

         This is of course just one part of an enterprise level security solution, and even the smartest system will still be generally outclassed by a highly competent team of human monitors. But as Google and the other tech giants continue to invest in machine learning software for a vast array of fields, we may see its presence in wider monitoring applications.  To learn more about how you can use analytic driven video surveillance systems to secure your home or business, call Security Technology of South Texas, Inc. at 855.688.2718  or at www.gostst.com .

 

 

Sources: IBM.com

Secuitymag.com

 

 

By proadAccountId-378954 01 Dec, 2017

 

         The opportunity for "do it yourself" home automation has been made more available by the relatively recent introduction of devices such as "Google Home" and Amazon's "Echo". This change is in many ways co-occuring with the trend for home security to be more tied to the user's smartphone and other devices serving as virtual extensions of themselves. Home and industrial security today commonly feature software suites and apps on which the user can instantly check up on their property. Doors can be locked or unlocked remotely, garage doors operated, lights switched, and systems activated or deactivated.

               

           Home automation can include various monitors which supply continuous monitoring and updating of the vital systems of a modern home. This can be tied into the app based security services. Cars have certainly had computers monitoring their systems for many years, and it seems only natural that an investment like a home should have its own "brain".

               

          These are all things happening in the industry now, and the future will likely show a progression in this area. As 5th generation telecom technology carries us through the 2020's, both bandwidth and physical chips will become ever cheaper, until everything, in the words of the director of the FCC, "from plant waterers to pill bottles" is in communication with the internet, and therefore the home.   For more information on SmartHome technology contact Security Technology of South Texas, Inc. at www.gostst.com  or toll free at 855.688.2718 .

By proadAccountId-378954 16 Oct, 2017
 5G (or 5th Generation mobile networks) is the set of telecommunication standards beyond current so-called 4G/LTE. Aside from increased bandwith, lower latency, and lowering the cost of implenting existing 4th generation tech, 5g encompasses hardware focused elements of web communication. Lower battery consumption, or better batteries, will naturally need to accompany a technology with greater speed and overall capability.

 As the "IOT" grows increasingly ubiquitous, a higher bandwith capacity is arguably the most critical component of a 5th generation network. We already have web-enabled technology hidden within our phones, cars, wearables, and etc. It is no stretch to say that in the near future, as the cost of microchips in general has decreased, "The Internet" has achieved a presense in the life of the average person that is almost impossible to dismiss.
METIS, the "EU flagship project" for the development of a 5g protocol has set the following definition for what they hope to create and implement. Because there is currently not any accepted standard protocol for 5G, these points do not necessarily point to anything exact yet.

 I have linked my source in the sources (ieeexplore.ieee.org ), but here is a basic breakdown.

.Data rates should exceed 100mbps for users in metropolitan areas--1gbps in industrial or office settings

.Better overall coverage, lower latency, and various wireless sensors allowing several hundreds of thousands of connections.

These central points should be considered the minimum requirements, and depending on a variety of circumstances, speeds may have potential of approaching 10gbps in more ideal settings.

 The technical details behind achieving the new network will of course be more or less entirely immaterial from the experience of the user. If we assume any rate of improvement in wireless communications technologies, and if those creating such tech are to be considered an authority on the subject, 5G will be a major leap, with improvememts eventually allowing the connection of essentially arbitraily large numbers of devices.

 STST makes use of a wide aray of "IOT"-like devices already, as do many other companies and industries. Mobile connections can be used as backups for hard-wired connections in security solutions, but are more critical when a system needs to include 24/7 personal video and control access to a user or users wherever they are. The security industry in general is likely to become increasingly centered around the usefulness and convencience of mobile communication tech, as many of us certainly seem to be already with our personal and social lives.

Sources:
http://ieeexplore.ieee.org/document/6815890/?reload=true&section=abstract
Wikipedia.com
Wired.com  

Image source: 
Kaspersky.com

If you would like more information on our “Connected Video System” for your gated entry, please contact Richard Youngman at Security Technology of South Texas, Inc. 210-446-4863 .

 

 



.
By proadAccountId-378954 07 Oct, 2017

Recently, Security Technology of South Texas Inc, installed a video surveillance for a local Home Owners Association that had been experiencing problems with people hitting the security gates at their community. We installed a Geovision IP video system with megapixel cameras and special license plate recognition cameras to capture the front and rear plate of every vehicle entering and exiting the property at multiple gates. Using remote cellular telemetry provided by Security Technology of South Texas the entire system is connected to the Internet and the customer can view all activity through the gates and identify unauthorized entries as well as “tailgaters” and vandalism at the gate.

 

Such was the case last week. At about 2:00AM  a vehicle pulled up to the gate and crashes through, causing thousands of dollars in damage. The customer easily retrieved the high quality overview video of the event along with the license plate information, and within a couple of hours a DMV (Department of Motor Vehicles) search was performed by the Sherriff’s department, and the intruder was apprehended shortly thereafter.

 

After the intruder was apprehended, the customer called us and said that the security system had basically just paid for itself.

 

If you would like more information on our “Connected Video System” for your gated entry, please contact Richard Youngman at Security Technology of South Texas, Inc. 210-446-4863 .

By proadAccountId-378954 12 Sep, 2017

 The use of drones for surveillance is no longer confined to the pages and scripts of sci-fi stories. While it is true that we have been using sophisticated camera systems combined with flight to spy across the Ocean at least since the development of the U2 program during the Cold War, it is the addition of modern “IOT” style tech to this equation that has opened the possibility for open (or closed) networks of semi-autonomous security devices to be used in securing important locations.

 The advent of the "smart-phone", for instance, brought with it some pretty serious improvements to the types of technologies you might want to strap to a drone. Global Positioning, high-efficiency LI-ion batteries, megapixel IP cameras, bluetooth and wifi ; As far as the hardware is concerned these are the same types of tech we already use in high-end "ground-level" security systems, such as IP cameras, decentralized computing and storage. The promise of a mobile platform such as a drone is not necessarily in its hardware, but in the possibilities afforded by moving the element of human observation and choice to where it is needed in the most efficient manner.

 It is the writer's opinion that these devices will eventually be absolutely essential in high security of the future, as the advantage that having a GPS/GLONAS based waypointing system and an LTE connection attached to a quadracoptor with a camera and a piece of software telling it what to watch for can gift overall operational security in large outdoor areas is significant. As a consumer, I can purchase a drone that can track me as I move, hit several points in a row and return to me, and fly several kilometers on one charge. There are features that allow some devices to return  "home" when faced with a battery with just enough life left to get to the charger.

 In some ways, it doesn't sound particularly incredible on paper. We have had cameras attached to flying machines for decades. Drones have been used to survey large swaths of farm and ranch land and to manually patrol other areas where a human element is needed as part of the security presence.

 It is more the marriage of the architecture of our cellular ecosystems to the increasingly affordable and scalable hardware that stands to be a game-changer for certain sectors of the industrial security market in the near future. STST has already implemented systems which can differentiate between human activity and other types of on-screen movement, and it is this sort of tech, working in tandem with global positioning routing software that could help realize a new standard for securing large areas during times where no one should be there.


   For more information on access control systems for your facility contact Security Technology of South Texas, Inc. at:   www.gostst.com or call (210) 710-5881

Sources:

-Aptonomy.com

-linearcollider.ca

-Amazon.com

By proadAccountId-378954 12 Sep, 2017

 To what extent any niche in the overall market will open up in response to some of these new possibilities is not certain right now. It could be that for some reason, consumer drone tech becomes unavailable in the near future. Economy of scale might not be dialed in just right. 

 Regardless of any of that, the fact remains that the technology to create a simple team of drones is more or less with us today. When the first murder by drone occurs, culpability could be all but impossible to prove. Using software not unlike that which Lyft uses to parse and sort passengers for pick up and drop off in tandem with  hardware for pattern detection, it could easily be possible for the type of person who typically gets their kicks “trolling” or otherwise harassing to get in too deep.

  And as for those who say that such an idea sounds like something from the future, I would not blame you. The media is full of ominous images of “intelligent” machines. From "The Terminator" to this year's, "Horizon:Zero Dawn", there is no shortage of human fear surrounding drones. 

 Sometimes even the imagery of the language we use to describe our “IOT” seems to evoke something more sinister. But the days of an AI “ecosystem” complex enough to take advantage of the machines in which it is embedded are certainly not upon us yet. 

 As I said before, the idea of using a UAS (Unmanned Aerial System) to oversee an area or complex is not a new one. Machines with the ability to recognize and respond to their surroundings have been a staple of the human imagination for thousands of years of recorded history; right alongside flight, so there is something very attention grabbing about mixing the two.  Naturally, there is a flurry of application to the FAA for permits for commercial drone use, and it is anticipated that new regulations concerning these types of devices will be necessitated as more and more people own them.

 To our universe, we are organizers and processors of information, its sensory and perceptual organs, if you can tolerate the metaphors. As a result, the responsibility for whether or not we write home-brew targeting software will be with us. With drone technology in its infancy, not much can be truly said. But with the exposure the devices are currently getting, I personally do not think it will be long before someone bolts a WalMart purchased assault rifle onto some consumer drone that thinks it is playing an AR game with whomever it is looking for.


   For more information on access control systems for your facility contact Security Technology of South Texas, Inc. at:   www.gostst.com or call (210) 710-5881


Sources:

-Amazon.com

-Sony.com

By proadAccountId-378954 23 Aug, 2017

The days of using on-site DVRs to record and store data has increasingly become a thing of the past in the industry of professional security. While many electronics and outlet stores still sell $500 DIY systems using this old technology, managing data using cloud hosting has become otherwise ubiquitous.

            Interoute.com defines it as “hosting on virtual servers which pull their computing resource from extensive underlying networks of physical web servers”. All  this means is that instead of using more expensive on-site computing power, the data is sent to the servers of a hosting company. In systems using computers to run high-end video analytics, however, it may still be necessary to use on-site servers.

                As a Brivo authorized dealer, Security Technology of South Texas has access to industry-leading cloud technologies. “Brivo OnAir” accomplishes the management of the large databases necessary in securing heavily-trafficked gates or with access control systems where many different people are using assigned key fobs. Video-footage for each recorded event is stored on Brivo’s computers, and accessible to the user  via desktop, smartphone, or other internet capable device.

                Finally, one of the most important advantages that cloud hosting offers is the protection and security of your data. Video stored on local disk space is not as secure, and hardware failure is always a possibility. The distributed computing of “the cloud” ensures all your data remains protected.

 

 

Sources:      

Interoute.com

Brivo.com

 

 

By proadAccountId-378954 10 Aug, 2017

   Although you will still see decades old analog cameras recording in 240p in many businesses, the security industry has benefited from the last  15 years of progress in computer analytics and networking technology more than most. “No longer will you need some kind of server to store the camera data, it will all be stored on the cloud from now on.” (proclaims the innovationenterprise.com). The move from onsite data storage to cloud based archiving has lowered the cost while increasing the amount, quality, and security of data.

                “The value of a security solution increases in relationship to the extent of its integration with other security and information technology components.” ( securitymagazine.com)  Adding in analytics devices can screen against false alarms by being “taught” over time to distinguish between an intruder and, for instance, an animal passing through. Highly integrated systems can create extensive metadata logs as well. Combining a system of key fobs with 1080p IP cameras and analytics allows an ecosystem of interconnected devices to perform tasks that would be unfeasible using outmoded technologies.

                The advent of the massive web of 4GLTE connected phones over the last decade permits quicker and smarter security solutions, particularly at the industrial level. It is increasingly possible to detect intrusion and dispatch police with a “video verified” break in in progress rather than simply have a grainy black and white recording to try and discern a face in after the fact, a fact which often piques the interest of business owners who may not have looked into security until a break in.

   For more information on access control systems for your facility contact Security Technology of South Texas, Inc. at:   www.gostst.com or call (210) 710-5881

 

Sources:

innovationenterprise.com

securitymagazine.com

               

By proadAccountId-378954 05 Aug, 2017

On July 30, Christus St. Vincent Regional Medical Center in Santa Fe, New Mexico underwent a full lockdown for over an hour. A nearby gang related shooting prompted the hospital to “[go] into lockdown mode until the situation [was] resolved and it's been determined that there is no danger to patients or visitors", according to Arturo Delgado, a hospital spokesman.

In the past, emergency lockdowns of this sort were achieved through the physical  act of locking all entrances to a complex, and often using human security guards to enforce the lockdown. A modern, state of the art access control system can dramatically reduce response times and overall security, “giving you the ability to lock all exterior doors with a couple clicks of a button, not allowing any entry whatsoever.” (action1st.com)

The ability to selectively limit access to certain areas through the use of key fobs (or even biometric scans) can of course also do much to limit lockdown emergencies from occurring in the first place. A log of who went where and when can be consulted later during any investigation, and is a further measure of protection from liability.

In a setting like a school or hospital, where there is typically a lot of traffic from the public, a professional access control system designed and installed “turn-key” can be the difference between a lawsuit and “crisis averted”.  

For more information on access control systems for your facility contact Security Technology of South Texas, Inc. at:   www.gostst.com or call (210) 710-5881

 

 

Sources:

- action1st.com

- sonitrol.com

- securityinfowatch.com

 

 

 

 

 

More Posts
Share by: