Category: About Technology

How ALPR Works

How Automated License Plate Recognition (ALPR) Works

Automated License Plate Recognition Camera

You may not have realized it, but Automated License Plate Recognition (ALPR) technology is all around us. It is used for toll collecting, to control access to parking lots and even to capture criminals. The technology has improved over the years and has become more economical.

Besides the analytic software that converts the image to computer characters, the system requires a good IP camera. It also requires proper lighting and the correct physical placement of the camera.

The analytic conversion software is similar to optical character recognition (OCR) software.  ALPR is available as a standalone LPR system or included as an option with some IP camera video management systems.

Continue reading “How ALPR Works”

How IP Powered Speakers Work

IP powered speakers connect to a PoE type network switch.

PA-powered speakers illustration

The speakers include built-in amplifiers. They use PoE, so no additional power connections are required. Just plug the speaker into your network switch.

Each speaker can be addressed individually by the paging software. You can make a page to a single speaker, a group of speakers, or to all the speakers on the network.  These IP powered speakers are very easy to install and provide excellent flexibility.

Continue reading “How IP Powered Speakers Work”

How Does Facial Recognition Work?

Facial recognition systems are now available as part of video recording software systems.

The Technology for Facial Recognition

Facial recognition

There are two primary methods for capturing and matching facial information.

The first measures various features of a person’s face, such as the distance between the eyes, or the position of the mouth to the nose.  These geometric measurements or vectors are then stored in a database for later comparison.

The second method is far more complex.  It captures the full facial image and uses as much information as it can. It then uses various computer algorithms, including machine learning, to build a set of definition data.  This statistical database increases the reliability, as well as the cost of the system. 

Continue reading “How Does Facial Recognition Work?”

What is the Best IP Camera Recording System

There are NVRs and VMS Recording Systems, but what is best for your IP camera system?

video recording servers-ocularis

The video recording system is a key part of the total IP camera system. There are many solutions available, but what is the best one for your application?

Most NVRs, video management software systems, or even a cloud system will provide basic video recording. But, if you want to support many cameras at multiple sites, you need a more advanced system.

This article helps you determine the best recording system for your application. It compares simple systems that are used for a handful of cameras, to complex systems that can handle thousands of cameras at multiple sites. Your total system requirements will determine the best video recording system.

Continue reading “What is the Best IP Camera Recording System”

What is an Explosion Proof Camera?

explosion proof IP camera

An explosion-proof camera includes a special enclosure. The camera and enclosure can be used in a hazardous potentially explosive environment. This means that the camera system will not cause an explosion, rather than survive an explosion outside the enclosure.

The camera and enclosure used in these environments are designed to prevent ignition of the surrounding gases or dust. They will either contain any explosion within the device or prevent sparks exiting the device and triggering an explosion.

Normally, we don’t worry about sparks.  For example, a household light switch may emit a small, harmless visible spark when switching. In an ordinary atmosphere, this arc is of no concern, but if a flammable vapor is present, the arc might cause an explosion. Explosive environments can be found in a number of places such as oil and gas tankers, chemical processing plants, hospital operating theaters, aircraft refueling, and hangers, coal mines or oil refineries, sewage treatment plants, grain handling, sugar refineries, and printing industry.  These environments can contain flammable gases such as acetone, propane, methane, hydrogen, or coal dust.  

Continue reading “What is an Explosion Proof Camera?”

Access Control Software

Cloud Versus On Site License for Access Control

cloud-access control

Many software applications are offering cloud-based, subscription software rather than on-site (or on-premise) license software.  For example, Microsoft 365 and Adobe provide cloud-based, subscription plans. Recently Door Access Control software has become available in the cloud.

What exactly does this mean and what is better for you? The article compares the two methods and provides pros and cons that can help you decide what is best.

What is the difference between cloud and on premise software? On site software is the classic model of providing a perpetual license that allows you to run the software on your own computer.  Cloud software runs on a remote server and is provided under a monthly or yearly subscription plan.   For example, there is on premises door access software called Pure Access Manager The cloud application is called Pure Access Cloud.

Continue reading “Access Control Software”

Cloud Archiving Systems

Optical Jukebox Library in the Cloud

cloud archiving illustration

We define archival information storage as a mechanism for writing data that can’t be modified or erased, storing information for a very long time (over 50 years), and providing easy retrieval. Information archiving has evolved over the last century; from paper to microfilm, and then to optical discs in jukebox libraries.

Optical discs were introduced in the early 1980s.  The Write Once Read Many (WORM) 12-inch discs, introduced by Sony and other companies, provided archiving media that allowed organizations to archive their paper information to optical storage.

CD-ROM discs were introduced by Philips and Sony in 1985. A couple of years later Sony introduced DVD-discs and Magneto-Optical discs.  Jukeboxes or Libraries were designed to handle over 500 discs, creating a complete archiving storage system.  Blu-ray discs were introduced by Sony in 2003, and became the archiving media standard.

Continue reading “Cloud Archiving Systems”

Comparison of IP Intercoms

Pros and Cons of Different types of IP Intercoms

Intercom Door man in field concept

There are two types of intercoms.  The first type connects many intercoms to a number of central computer stations, while the second type connects one intercom to many smartphones or VoIP phones.

In general, IP intercoms can be used to notify you that someone is at the door or provide communication between many locations (like schoolrooms) and a central office.  The intercoms are all wired to the local area network.

These complete systems enhance your total security, assuring a safe environment in this uncertain world.  Here is a comparison of the different systems available.

Continue reading “Comparison of IP Intercoms”

Surge Protectors for Network Attached Devices

network-lightning-protection

How to Protect Your IP Security Systems from Power Transients

Surge protectors protect network-attached devices from power transients. Lightning is only one of the many power disturbances that can damage these IP devices.

There are a number of surge protectors available that can be used to minimize the damage from these power transients.

Surge protectors protect network-attached devices from power transients.  Lightning is only one of the many power disturbances that can damage these IP devices.   There are a number of surge protectors available that can be used to minimize the damage from these power transients.

Anything that’s attached to your network, can be affected by power surges.  For example, your computer, door access system, IP camera, network switch, and router can be affected if there is a power spike.  Transients can occur not only on the power lines but also on the data connections.  Surge protectors, from Ditek, are used to suppress the effect of these power spikes.

Here’s a summary of the surges and spikes that can occur, and how you can protect your equipment.

Continue reading “Surge Protectors for Network Attached Devices”

How IP Intercoms Communicate with Smartphones

IP Intercoms for Mobile Applications

By Bob Mesnik

IP intercom illustration

Smart IP intercom devices are making it easier to control access to your home, business, school, or any other organization.  They use your smartphone to see the person at the door, talk to them, and allow entry (or not).

There are single-button intercoms and multi-tenant intercoms. Both versions have built-in IP cameras. The IP intercom systems can use local intercom servers as well as remote cloud servers to provide the communication path between the intercom and the smartphone. These systems utilize various protocols such as VoIP SIP protocol, audio over IP, IP video, or other protocols to establish the connection between all the devices.

Smart IP intercom devices are making it easier to control access to your home, business, school, or any other organization.  They use your smartphone to see the person at the door, talk to them, and allow entry (or not).

There are single-button intercoms and multi-tenant intercoms. Both versions have built-in IP cameras. The IP intercom systems can use local intercom servers as well as remote cloud servers to provide the communication path between the intercom and the smartphone. These systems utilize various protocols such as VoIP SIP protocol, audio over IP, IP video, or other protocols to establish the connection between all the devices.

Here’s how the latest IP intercoms work.

Continue reading “How IP Intercoms Communicate with Smartphones”