Cooking up a Bowl of Security

Cooking Up a Bowl of Security

When preparing to open Galileo III, a white-tablecloth Italian restaurant in Washington, D.C., within walking distance of the White House and the National Theater, Chef Roberto Donna let his imagination take hold, not only in the dishes he wanted to prepare for Washington’s movers and shakers, but also in how he could maximize the security surveillance system he knew he would need to protect his assets and help manage his business.

Donna is an award-winning chef, having been twice named Chef of the Year by the Restaurant Association of Metropolitan Washington and receiving the James Beard Award as Best Chef/Mid-Atlantic Region in 1996. He also competed and won in the Iron Chef TV series and has made numerous appearances on other cooking and news shows.

Working with ICI Systems, a technology integrator and IT services provider in the nation’s capital, Donna and ICI consultant Nabih Bedewi deployed a solution that covered the three key areas in Donna’s vision: security, table management and cooking demonstrations.

“When he was talking about plans for the restaurant and was bringing up these ideas, we said we could do all of this in Milestone,” said Bedewi, adding that he hadn’t seen a situation before where a client wanted such diverse options within a system. ICI has been working with Milestone Systems since 2008.

The backbone of the solution is Milestone XProtect Professional—surveillance software used for advanced video management, flexible scheduling, fast searching and video analysis—and XProtect Smart Client, which is used for remote access.

“In order to do all the things Roberto wanted, you usually need different platforms,” Bedewi said. “But using Milestone, we are able to provide a single platform for all forms of camera management.”

Within and on the restaurant property there are 25 PoE IP network cameras: Panasonic WV-NS202A PTZ iPro and the Panasonic BB-HCM715 indoor PTZ. Five cameras are used for traditional security, focused on the front and back entrances, the wine room and the offices. An additional three are for use within the kitchen; the rest are spread throughout the 80-seat restaurant and the two private rooms that serve an additional 45 patrons.

With a wine inventory estimated at $300,000, Donna wanted a solution that would ensure the safety of this valuable asset. Through Milestone, a camera in the room tracks and records based on motion detection. The home position is the door, so when someone opens the door and enters the room, the system begins to track the person and records the entire time he or she is in the room, then automatically cuts off 20 seconds after the motion stops. On the other five doors being monitored, contact sensors are tied into Milestone.

More than Just Security

While the system’s security functions are a necessary part of doing business, both Donna and Bedewi were more excited about the non-traditional opportunities.

“Fine cuisine is all about timing and food preparation,” Donna said.

By having cameras in the dining room that can be viewed via a flat screen monitor within the kitchen, featuring up to 16 views at one time, the chef is better able to time when to begin the next course so customers feel neither rushed
nor neglected.

The cameras are not hidden from view, said Donna, so most customers are aware of their presence. But there is no audio associated with the system, nor is the video recorded within the dining room when it is occupied. The cameras are aimed at the tables, not the people themselves.

Via a touch-screen monitor in the kitchen, the chef can call up an individual table on the screen and make decisions on timing, service and meal preparation. Just tapping an image on the monitor brings it to full screen for the kitchen staff to view, Bedewi said.

The table management system uses the Milestone Smart Client Live View to monitor the tables. There is no recording or scheduling with this function, although Milestone is configured to use scheduling and motion detection for all cameras during non-service hours (midnight to 10 a.m.). Even the table management cameras are recording for surveillance purposes during the off hours.

Donna, who doesn’t cook at the restaurant every day, said he also uses the system on his laptop and office computer to monitor all the video from the security surveillance, dining room and kitchen. From home, he is able to view activity within the kitchen and check on deliveries and when the staff arrive. With 22x optical zoom, Donna is able to observe cutting techniques and other fine details. From a practical standpoint, Donna said he’s used the system remotely to look for keys he thought he had left on his desk. And yes, they were there.

A Class Act

In addition to monitoring dining room activity, Donna is eager to deploy the kitchen cameras for his cooking classes and special meals. He has been doing classes for about 11 years, he said, and in February 2011 he was planning to start again at his new restaurant.

Three kitchen cameras will provide live feeds as Donna prepares the eightto 10-course meals in the Laboratorio, which is open on certain evenings for these special tasting meals. They will provide access codes in advance to people at home who want to view the meal preparation so they can then log in to
see Donna at work.

“It’s a great tool to use,” he said.

The video from the cooking classes will be recorded and archived, Bedewi said. No DVRs are used, just a highend PC for the Milestone server.

Donna conceded his busy schedule has kept him from exploring all the options that the Milestone platform can provide.

“I’m not a computer scientist,” he said, “but the people from ICI explained everything well, provided training and were responsive to my needs.”

Other chefs visiting Donna in Washington have already checked out his system and have been impressed by what it can achieve. “I recommend it to all my friends,” Donna said.

 

This article originally appeared in the July 2011 issue of Security Today.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3