Posts Tagged ‘SIA Technology Insights’
Find articles published in the SIA Technology Insights journal, a twice-annual journal focusing on emerging security technologies, and authored by SIA members.
The Rise of the Machines
Robots can terminate tedious tasks for security personnel Suppliers of air, land and sea robots appear to be in full agreement that these technologies will liberate people from routine guarding tasks, which are repetitive, mundane and at times dangerous, so they can shift their attention to more critical, intelligence-based work. Who would not rally around…
Keep Reading »Combining Man and Machine
Robots can help human guards to be more effective It may seem like science fiction to envision a world in which robotic devices are commonplace, but it is more realistic than one might think. Robots that leverage artificial intelligence (AI) are already in use in a wide variety of markets and applications. In manufacturing, robots…
Keep Reading »Know a Lot About History, Know a Lot About Security
Data from cameras and other systems can increase understanding of events and contribute to a holistic approach to school security Safeguarding campuses is a complex, multi-faceted process. The stringent requirements and security challenges of higher education and K-12 facilities propel users to seek out advanced insights to facilitate quick responses and more informed decision-making. It…
Keep Reading »SIA Technology Insights – Spring 2017
The security capabilities of drones, the role of artificial intelligence in security, and biometric technologies that include such advanced modalities as voice recognition and gait analysis. Even the articles about more “traditional” aspects of physical security, such as video surveillance, access control and intrusion detection, are vastly different than what would have been written a few years ago and feature analyses of how IT connections, mobility, analytics and comprehensive integration are turning devices into
powerful security solutions.
The Real Benefits of Artificial Intelligence
How ‘Computer vision’ powered by AI could radically change video surveillance When people think of artificial intelligence (AI), they tend to think of either Skynet – a dark, malicious entity – or C-3PO – a bumbling though harmless droid. But both images misunderstand the concept of AI and what it means to the world.…
Keep Reading »VMS: The Next Generation
Facilities can now extend video management systems to provide a more complete security solution Since video surveillance was first used as a security tool, the control room and security operations have undergone a transformation, several times over. Video and video management systems (VMS) have evolved. Whereas once the view from video footage was fixed, low-quality…
Keep Reading »An Eye for Fraud
Iris recognition technology offers one of the most effective ways to prevent medical identity theft and false claims In 2013, according to the FBI, insurance fraud totaled $80 billion. These costs are borne by insurers, but the companies typically pass them on to providers, who, in turn, may pass them on to patients. At the…
Keep Reading »By the Power of Ethernet
PoE gives smaller facilities more access control options Physical electronic security for non-enterprise applications is now as simple as tapping into the nearest Ethernet connection to power and control doors via web browser and low-voltage access and egress devices. There are a variety of cost-effective, code-compliant, low-power solutions for electronic access control of door openings…
Keep Reading »Law & Order & Video
Police and prosecutors need enhanced case management systems In the security sector, while information is great, what we strive for is clear and actionable data. Both seeing and understanding are vital. To that end, we continue to deploy more cameras in physical security systems and collect and share more data than ever before. But this…
Keep Reading »Out of Many, One
Integrating components of a security system can vastly improve effectiveness When end users call on a security integrator to install or upgrade a system, the basic requirements of the system may already be defined. While these may seem to address all of the needs and wants, the user may be looking at each type of…
Keep Reading »