Cooking up a Bowl of Security

Cooking Up a Bowl of Security

When preparing to open Galileo III, a white-tablecloth Italian restaurant in Washington, D.C., within walking distance of the White House and the National Theater, Chef Roberto Donna let his imagination take hold, not only in the dishes he wanted to prepare for Washington’s movers and shakers, but also in how he could maximize the security surveillance system he knew he would need to protect his assets and help manage his business.

Donna is an award-winning chef, having been twice named Chef of the Year by the Restaurant Association of Metropolitan Washington and receiving the James Beard Award as Best Chef/Mid-Atlantic Region in 1996. He also competed and won in the Iron Chef TV series and has made numerous appearances on other cooking and news shows.

Working with ICI Systems, a technology integrator and IT services provider in the nation’s capital, Donna and ICI consultant Nabih Bedewi deployed a solution that covered the three key areas in Donna’s vision: security, table management and cooking demonstrations.

“When he was talking about plans for the restaurant and was bringing up these ideas, we said we could do all of this in Milestone,” said Bedewi, adding that he hadn’t seen a situation before where a client wanted such diverse options within a system. ICI has been working with Milestone Systems since 2008.

The backbone of the solution is Milestone XProtect Professional—surveillance software used for advanced video management, flexible scheduling, fast searching and video analysis—and XProtect Smart Client, which is used for remote access.

“In order to do all the things Roberto wanted, you usually need different platforms,” Bedewi said. “But using Milestone, we are able to provide a single platform for all forms of camera management.”

Within and on the restaurant property there are 25 PoE IP network cameras: Panasonic WV-NS202A PTZ iPro and the Panasonic BB-HCM715 indoor PTZ. Five cameras are used for traditional security, focused on the front and back entrances, the wine room and the offices. An additional three are for use within the kitchen; the rest are spread throughout the 80-seat restaurant and the two private rooms that serve an additional 45 patrons.

With a wine inventory estimated at $300,000, Donna wanted a solution that would ensure the safety of this valuable asset. Through Milestone, a camera in the room tracks and records based on motion detection. The home position is the door, so when someone opens the door and enters the room, the system begins to track the person and records the entire time he or she is in the room, then automatically cuts off 20 seconds after the motion stops. On the other five doors being monitored, contact sensors are tied into Milestone.

More than Just Security

While the system’s security functions are a necessary part of doing business, both Donna and Bedewi were more excited about the non-traditional opportunities.

“Fine cuisine is all about timing and food preparation,” Donna said.

By having cameras in the dining room that can be viewed via a flat screen monitor within the kitchen, featuring up to 16 views at one time, the chef is better able to time when to begin the next course so customers feel neither rushed
nor neglected.

The cameras are not hidden from view, said Donna, so most customers are aware of their presence. But there is no audio associated with the system, nor is the video recorded within the dining room when it is occupied. The cameras are aimed at the tables, not the people themselves.

Via a touch-screen monitor in the kitchen, the chef can call up an individual table on the screen and make decisions on timing, service and meal preparation. Just tapping an image on the monitor brings it to full screen for the kitchen staff to view, Bedewi said.

The table management system uses the Milestone Smart Client Live View to monitor the tables. There is no recording or scheduling with this function, although Milestone is configured to use scheduling and motion detection for all cameras during non-service hours (midnight to 10 a.m.). Even the table management cameras are recording for surveillance purposes during the off hours.

Donna, who doesn’t cook at the restaurant every day, said he also uses the system on his laptop and office computer to monitor all the video from the security surveillance, dining room and kitchen. From home, he is able to view activity within the kitchen and check on deliveries and when the staff arrive. With 22x optical zoom, Donna is able to observe cutting techniques and other fine details. From a practical standpoint, Donna said he’s used the system remotely to look for keys he thought he had left on his desk. And yes, they were there.

A Class Act

In addition to monitoring dining room activity, Donna is eager to deploy the kitchen cameras for his cooking classes and special meals. He has been doing classes for about 11 years, he said, and in February 2011 he was planning to start again at his new restaurant.

Three kitchen cameras will provide live feeds as Donna prepares the eightto 10-course meals in the Laboratorio, which is open on certain evenings for these special tasting meals. They will provide access codes in advance to people at home who want to view the meal preparation so they can then log in to
see Donna at work.

“It’s a great tool to use,” he said.

The video from the cooking classes will be recorded and archived, Bedewi said. No DVRs are used, just a highend PC for the Milestone server.

Donna conceded his busy schedule has kept him from exploring all the options that the Milestone platform can provide.

“I’m not a computer scientist,” he said, “but the people from ICI explained everything well, provided training and were responsive to my needs.”

Other chefs visiting Donna in Washington have already checked out his system and have been impressed by what it can achieve. “I recommend it to all my friends,” Donna said.

 

This article originally appeared in the July 2011 issue of Security Today.

Featured

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.