23 May 2023

Micron

Cover Story – Micron

David Henderson, Director of Industrial Segment, Micron Embedded Business Unit details the benefits AI-enhanced video, edge analytics and storage  Artificial intelligence has revolutionised video security by providing unprecedented control over situations. Security cameras that were once reactive devices used for investigative purposes can now offer real-time alerts, allowing users to take proactive action against threats.    With the adoption of AI functionality in camera devices, a richer dataset will be created and stored at the edge. Thus, edge storage is becoming a key element of cloud-based, AI-enabled video security applications.   Managing Editor Rebecca Spayne sits down with video application expert David Henderson from Micron Technologies to discuss the use cases and solutions for edge storage applications.  Technology innovations such as Artificial intelligence (AI) and the internet of things (IoT) are converging at the edge and enabling a wide range of new products, services, and applications for the video security industry. Could you please share more insights of the implications to storage industry?  The growing market of cloud-based video security solutions is accelerating the adoption of in-camera edge storage which brings the benefits of bandwidth reduction and better scalability since no physical recording systems are required. In addition, with the adoption of AI functionality in camera devices, a richer dataset will be created and stored at the edge. Thus, edge storage is becoming a key element of cloud-based, AI-enabled video security applications.  Can you give us some examples of the use cases?  The applications in which edge storage in AI-enabled devices can be utilized are endless, but these four are witnessing substantial growth due to their usage of AI and IoT:  Video Security as a Service (VSaaS)  Smart home  Mobile security  Video telematics  Video Security as a Service (VSaaS)?   VSaaS, a cloud-based video security solution, has become increasingly popular in recent years, mainly because of its ease of deployment. With no need for Network Video Recorders ( NVRs), servers, or complicated wiring, data is stored on the edge and transferred to the cloud as needed. This combination of edge and cloud means that collected data can be stored on the camera itself—on a microSD card—and then transferred to the cloud for easy access, saving precious bandwidth. A wide variety of AI analytics can also be applied to VSaaS solutions to provide users with smart data to proactively keep their premises safe and secure.   Smart home  The smart home market has witnessed significant growth over the past few years, greatly enabled by IoT.   Video security cameras and video doorbells have become key components of today’s smart home. Easy to install and easy to monitor, modern home security cameras and video doorbells provide homeowners with an affordable way to secure their homes, all while providing access to video from the palm of their hand. Edge storage on smart home devices makes DIY installation of cameras much easier, doing away with unnecessary, complicated wiring to a physical storage system. In addition, applying AI to smart home devices can reduce false alarms caused by user error or non-threatening triggers.  Mobile security  Body-worn cameras for mobile security applications have become increasingly popular in law enforcement and enterprise wearable camera sectors such as security agencies, retailers, warehousing, and logistics. Video and audio recordings are stored directly on an onboard microSD card and then streamed or managed centrally through integration with a video or evidence management system for an immediate response, incident management, or training purposes. AI-enabled body cameras can automatically capture vital events and help effectively mine data.  Video telematics  Video telematics combines video with vehicle data to improve fleet management. Built-in AI provides real-time analysis and alerts to drivers, increasing vehicle safety and collision avoidance. At the same time, data can be transferred via the cloud so that fleet managers can get a great degree of oversight over employees and assets. Edge storage in video telematics is a critical part of incident management for fleet managers.   As you described earlier, there is increasing demand for edge storage in AI-enhanced video applications, could you share with us what are the challenges for edge storage while it moves into AI-enabled applications?  The challenge is, storage workloads can significantly impact a memory card’s performance. With AI adoption in camera devices, the data storage workload will migrate from video data to a combination of video and AI metadata. The AI metadata storage will generate more random write operations. Because the storage workload of an AI-enabled camera device is different than a standard camera device (many more random write operations are seen in AI-enabled camera storage workloads), a memory card must contain a workload-optimized solution while it’s used in AI-enabled camera device.  Read more exclusives and news in our latest issue here. Never miss a story… Follow us on:  Security Buyer  @SecurityBuyer  @Secbuyer Media Contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Cover Story – Micron Read More »

Seagate

Ask the Expert – Seagate

Jermaine Campbell, Senior Sales Manager at Seagate identifies how next-gen storage and video management can open a whole new world for video surveillance  Modern video surveillance is more than crime detection. Cameras are combined with intelligent software for traffic optimisation, crowd control, social distancing, border control, and much more. This has led to an increased demand for the deployment of high-resolution cameras, video management systems and data storage solutions. The unique collaboration between Seagate and AxxonSoft aims to meet this demand head-on and level up video applications.  The digital world is exponentially growing. 221 zettabytes of data will be generated annually by 2026, according to the market intelligence and advisory firm IDC. Video surveillance plays a big role in driving this growth. However, the sheer volume of data isn’t solely responsible for this upsurge; the growing technological complexity of video applications and cameras has created a greater need for greater data resources.  Crowd monitoring, and the need to pick up speech, necessitates the use of state-of-the-art devices with a high enough bit rate to record the movement of a person’s lips. As a result, you need strong, future-proof storage solutions that can absorb incoming data without risking the loss of a single frame. Video surveillance has reached a new era, and software and hardware must follow this evolution. The use of analytics applications and metadata requires hybrid solutions that work across different edges to the core.  Seagate has always been at the forefront of these developments, as Jermaine Campbell, Senior Sales Manager at Seagate, pointed out. “We used to be a company that made hard drives limited to on-prem recording. Now we make solutions that support the scalability of cameras, allowing for the processing of massive amounts of data at any given time. Our story puts us on the same path as our ecosystem partners like AxxonSoft because their video management system must meet the same challenges.”  Storing data on-prem or in the cloud  The partnership between software-focused AxxonSoft and hardware-focused Seagate ensures that this video platform delivers maximum value to customers. AxxonSoft’s Axxon One intelligent VMS is a case in point. It can support as many as 100,000 IP devices, all simultaneously and in full HD resolution. “We want to ensure that our software complements the hardware and vice versa”, says Juri Knjazev, UK managing director at AxxonSoft. “That’s why we’re always looking ahead to add new features and build our video analytics. For instance, to support behaviour detection and Smart Forensic Search.”  There is on-prem and off-prem cloud storage thanks to Seagate’s Lyve Cloud. “Customers can rely on a single solution that gives them the option to either ingest information on-site, implement a hybrid solution where part of the data is stored in the background, or have a complete off-prem solution that puts data directly into Lyve Cloud,” said Juri Knjazev. “This is a unique proposition that we can offer our customers.”  Unlimited use of data without extra costs  Collaboration is the catalyst of success, and the uniqueness of this partnership lies in the way both systems collaborate. The Axxon One VMS automatically converts the data recorded by the surveillance cameras and sends the information directly to the cloud — in other words, there’s no need for additional in-between software. This is where Seagate comes in. Seagate’s Lyve Cloud quickly takes in enormous volumes of data from thousands of cameras — without the risk of losing frames.  Excessive cost is an all-too-familiar challenge for most companies. Seagate’s Lyve provides a cost-effective solution as it limits the costs of sharing, managing, and using data. Jermaine elaborated on this point. “Most cloud providers charge you every time you touch your data, regardless of whether you want to store or read it. They also make a distinction between little and big chunks of data. With Lyve Cloud, you pay once for the data you’ve uploaded. After that, you can limitlessly scale.”  Read more exclusives and news in our latest issue here. Never miss a story… Follow us on:  Security Buyer  @SecurityBuyer  @Secbuyer Media Contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Ask the Expert – Seagate Read More »

ASSA

Switching to Cloud Control

Tim Timmins from ASSA ABLOY Opening Solutions examines the growing shift towards cloud access management. How can organisations benefit — and what should they look for when choosing a cloud access control solution?  ASSA ABLOY Opening Solutions provides an exclusive From the Expert article highlighting the benefits of switching to cloud control for a more agile, flexible access management solution.  Efficiency, agility and convenience have become megatrends: They are important drivers across almost every area of global economic activity. Within security and access management, they play a major role in the rapid adoption of cloud infrastructure. Perhaps a third of security end-users already use cloud-based software to manage access to their premises, according to one industry report.   The motivations for cloud adoption are easy to understand. Managers want to operate from anywhere, at any time. This can be especially important in security, where unexpected issues are usually urgent — or time-sensitive, at least.  Cloud management simplifies budgeting and reduces IT expenditure: its simple subscription model prevents nasty surprises in the shape of unexpected hardware or support costs. The cloud “allows businesses to save the cost of having to own, maintain and manage their own data centres (servers, storage and networking) while still having the ability to provide full computing capabilities. Cloud computing is a key part of businesses’ digital transformations”.  According to the UK’s National Cyber Security Centre, cloud security services may also encourage good practice and improve resilience.  In an economic environment where change is a constant, security management must be agile and futureproof. Cloud access control provides this. For a small or medium-sized organisation, readiness to expand or pivot the use of space at any time is even more critical. The inherent scalability of a cloud solution offers a huge advantage for these businesses.  Cloud access management, the easy way to take control  The key question, then, is: what to look for in a cloud access management solution? The security of the cloud environment is non-negotiable. Whether self- or third-party hosted, the solution must keep data safe and software up to date.  To maximise the benefits from cloud adoption, I also recommend that customers consider 3 major factors, to ensure their chosen solution will offer the flexibility benefits they expect.  Flexible control for different security levels: areas in a building often have different security requirements. Where entrance doors or critical zones need real-time (online) monitoring including alerts, some other parts of a building might have lower demands for physical security. Here, autonomous devices can be installed faster and more cost-efficiently, with no need for network cables or hubs.   Don’t forget to check the device range: a modern access control solution should offer a wide range of digital locks, helping a business manage their workspaces and workflows with maximum efficiency. Growing organizations require a large and diverse choice of access control hardware. Doors, cabinets, gates, server racks and almost any other opening may need to be locked with a wireless or wired device.  A broad and futureproof choice of credentials: for user convenience, it makes sense to choose a system which supports all common RFID technologies, including iCLASSÒ and MIFAREÒ. However, the investment should be futureproofed, offering the chance to upgrade later to smartphone keys. Because many organisations still have legacy credentials in circulation, rolling out a shift to mobile access control will be more cost-efficient if mobile and RFID may be used simultaneously.  Flexible cloud-based access control boosts agility and efficiency  ASSA ABLOY’s Incedo™ Cloud access control ecosystem was developed to meet these needs. When they choose Incedo, organisations can secure almost any opening with autonomous electronic locks or in real time with online devices. They issue building users with credentials of their choice. And they manage everything from one place, via the flexible, scalable, intuitive Incedo platform.  Building users gain access via smartcards, mobile keys stored on their smartphone, or energy-harvesting smart keys. Incedo Cloud software manages doors and users securely — from anywhere.  Installation is easy, with no complex integrations required. The entire ecosystem is modular, designed for simple adoption and easy expansion at any time and in any direction. An Incedo system can include both wired and wireless locks, all natively integrated and covering almost any application: for a handful of doors or hundreds, a startup or a staff of thousands in multiple locations.  Incedo Cloud adopters can combine online and autonomous management. For example, controlling access to entrances, labs and server rooms in real time, with online management. Adding autonomous devices alongside these adds control for access to areas that previously have been uneconomical due to location, environment, or cost. Switching between online and autonomous management is seamless. The only difference is how credentials are managed, online or via updaters.  The widest possible choice of devices and credentials  On the Incedo platform, wireless locking is provided by an award-winning range of Aperio devices with built-in readers: the Aperio wireless handle, escutcheon, cylinder, security lock and server rack lock. Aperio devices can secure almost any interior or exterior door, including wooden doors, glass doors and fire doors. Because they are wireless, installation is quick and without disruption to walls or work. They also consume much less electricity during use than equivalent wired locks.  Also deployable within the same cloud-based system, PULSE key-operated digital cylinders are self-powered using energy harvesting technology — no wires, no batteries. They consume no power in use. The PULSE cylinder range includes door locks, cam-locks, furniture locks and padlocks which operate outdoors in any climate. Almost any mechanical or electromechanical cylinder can simply be switched for a PULSE device and connected to Incedo without wires or drilling.  Incedo systems can also include hardwired, high-security doors with ASSA ABLOY Signo readers. These upgrade door and identity security without compatibility worries. Signo readers are powered by Seos, with the highest encryption and authentication standards. Each one supports almost any RFID credential and is mobile-ready when installed — Bluetooth, NFC and Apple Wallet.  A shared Seos backbone ensures all credential types may be

Switching to Cloud Control Read More »

Scroll to Top