Intelligence on the Edge - Do you have an App for that?

Intelligence on the Edge

Do you have an App for that?

In video surveillance, the concept of centralized intelligent systems and intelligence on the edge is an on-going conversation, as both solutions have pros and cons depending on specific user needs and applications. Now, there’s a new paradigm to consider that will change the way we look at intelligence on the edge and in the process, revolutionize video security and surveillance. Simply put, it’s the ability to download Apps onto cameras. This is a game changer for several reasons.

Although the use of Apps is part of most people’s everyday lives, this is a new concept for professional surveillance cameras and devices. Apps enable devices to deliver specific features and capabilities to surveillance cameras on an as needed basis. This presents a highly cost-efficient means to deploy advanced features that were previously only available on a system-wide scale.

Third-party companies are using standard APIs to develop applications that add even more value to surveillance cameras with open platforms, such as Samsung’s WiseNetIII IP cameras. This allows cameras to be quickly, easily and cost-effectively customized with additional features and functionalities. As a result, camera-based apps provide a leading-edge yet simple solution to create innovative video surveillance and security systems tailored for users’ specific needs and applications.

For an idea of just how this will revolutionize video security, consider the way Apps have enhanced our smartphone and tablet experiences, transforming the way we interact with our devices on a daily basis. Like video surveillance cameras, today’s smartphones and tablets are incredibly powerful devices that provide a multitude of features and functionalities right out of the box.

In theory, one could simply turn on their smartphone or tablet and get incredible value from using the factory configuration and pre-loaded applications.

In reality, however, that’s not how we use these devices. Instead, users customize their experience by selecting those third-party apps that will add or enhance the features of their device that matter most to them. With a seemingly unlimited number of Apps available, there’s something for everyone—and that’s the beauty of apps. No matter what you’re looking for, whether it’s something to boost your productivity or help you unwind, you’re sure to find an App that does what you want.

Each of these Apps are available for a tiny percentage of the device’s original purchase price. This ability to quickly, easily and cost-effectively personalize technology allows smartphones and tablets to deliver even greater value to end users.

The security industry is now on the verge of a similar seismic shift thanks to these new camera-based Apps. Available Apps are limited at this point because the concept is still in its infancy. However, there are numerous Apps currently in development that will be available in the near future.

As with the smartphone/tablet model, camera-based Apps allow users to personalize their video surveillance experience to improve the effectiveness of their systems and maximize their return on investment. Apps represent an innovative, economical way for users to ensure their video surveillance systems meet their specific system needs, compliance and/or regulations, and more with the flexibility to add specific features that deliver enhanced intelligence at the edge when and where they want.

Cloud connectivity, video direct to storage, people-counting, intrusion detection, queue management, license plate recognition, face capture and recognition, and transit and cargo recognition represent just a small percentage of the advanced functionality and intelligence camera-based Apps can bring to the edge. End users have the freedom to deploy their ideal combination of edge Applications to match their specific requirements. And best of all, users can rest assured knowing that camera manufacturers will be testing and certifying Apps on their devices, so they can have confidence that the App will perform the intended function without hampering any of the built-in features and functions of the host device.

The concept of placing Apps directly onto cameras doesn’t just push the boundaries of professional surveillance and security system capabilities - Apps may completely redefine how systems are conceived and deployed. The ability to further enhance today’s high performance, feature-rich cameras on an individual basis is truly monumental. If the smartphone and tablet model is any indication, camerabased Apps will revolutionize video security and surveillance. In the very near future, when talking with users about customizing a video surveillance solution to meet their specific needs, expect to hear security resellers say, “We’ve got an App for that!”

This article originally appeared in the March 2015 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3