I’ve been posting about intelligent video lately and in lieu of yet another educational lecture (don’t be sad for too long, I’ll be returning to that soon) on the topic I thought a few article links about industry news and real world application examples would be helpful.
Security Products Magazine takes a look at the emerging role that smart phones will play with intelligent video with the article, “Animetrics App Uses Facial Recognition to Secure Smartphones”:
FaceR CredentialME AppLock enables the Android smart phone user to use facial recognition as the biometric authentication to unlock any application installed on the user’s Android device. CME AppLock provides the options of using a password or letting the device camera automatically take a picture of your face and thereby verify the user via face recognition to secure the user’s choice of applications.
Security Sales & Integration Magazine unveils the behind-the-scenes power of intelligent video with their article, “Algorithms Provide the Muscle Behind the Analytics”:
In order to power advanced image analytics, sophisticated algorithms have been developed that extend the software’s intelligence so that it more readily recognizes certain rules. A basic example of this is license plate recognition (LPR). License plates in some states and countries begin with a letter; algorithms are able to discern the letter B from the numeral 8. This is crucial when you have only milliseconds to execute the read.
Also from Security Sales & Integration, for more on license plate recognition check out “Integrated System Combines Vehicle Identification With Real-Time Video.”
From ASMAG.com, “Securing and Preserving Cultural Heritage“:
Until recently, wireless alarms were mostly called upon, hidden behind paintings or in exhibit cases, to protect collections. “But intelligent video can allow visitors to move freely within the space and alert the security personnel in the control room and the guard in the exhibit galleries only when someone attempts to touch or remove the protected object,” Lazuta said. “Protective zones are drawn around objects, and alerts can be sent also in the form of an e-mail or a text message.”
https://youtu.be/FE2kcF7KjgQ?si=inw4thEr2thxgGeL When it comes to security, you should never cut corners. Having something that you…
https://www.youtube.com/watch?v=X2_HXAv73FI Your March VoIP News Update is out now! This month we showcase an awesome…
It is certainly no secret that leading platforms such as Microsoft Teams have grown in…
https://youtu.be/7_EIZKXqG3w?si=nvWqq8EAe58AJ6Dp Over the years, we have seen several advancements in DECT technology, and with that,…
With all of this talk about tariffs, we wanted to provide you with some information…
https://youtu.be/y3X1PcrK6i8?si=qWPgzDNhhngcsk_a In today's world, security is one of the most important things to have for…