Union Budget Shows Commitment towards ‘Make in India’ and Smart City

In the Union Budget 2020 Nirmala Sitharaman, Finance Minister of India had unveiled a series of far-reaching reforms, aimed at energizing the Indian economy through a combination of short-term, medium-term, and long term measures. This is a growth oriented budget with a long term commitment towards Make in India, Digital India, Mission Smart Cities, Technology Empowerment, Structural Reforms and Entrepreneurship. It is clear that customs duties were hiked to push the ‘Make in India’ agenda. While keeping the long term commitment of Make in India especially in electronic industry, the…

Read More

Security Technologies Top Trends for 2019

Broadband Adoption in the Critical Communications Industry With the growing appetite for broadband-enabled data applications, and the increasing possibility of spectrum allocation in many parts of the world, the market for private/ hybrid broadband networks for private mobile radio (PMR) users will continue to expand across multiple sectors. As a result, the critical communications industry will move towards a mix of broadband-capable network solutions e.g., private long term evolution (LTE) or the various operating models possible with commercial and private LTE. It is unlikely that users will adopt broadband solutions…

Read More

Security Technologies Top Trends for 2019

Licensed Mobile Radio Trends Overview Licensed mobile radio (LMR) deployments continue to increase globally, despite the emergence of LTE solutions onto the world stage and 5G on the horizon. Government and commercial sectors increasingly rely on LMR for secure, instant and reliable voice communications, so cost-optimized digital technologies, TETRA, P25, TETRAPOL and other major digital LMR technologies continue to attract investment. The United Kingdom, a pioneer of LTE technology, announced only in 2018 that it would extend its nationwide Airwave TETRA network to at least 2022 to provide mission critical…

Read More

Security Technologies Top Trends for 2019

SaaS Driving Next Generation Emergency Response By – Alex Richardson The transition toward SaaS, a shift, while very much underway in the consumer and commercial sectors, has been picking up pace significantly over the last year in the public safety sector. Historically, agencies in the United States in this case, had been very hesitant to deploy solutions via anything other than on premises. A confluence of factors is catalyzing this shift, and it was evident at shows such as International Wireless Communications Exhibition (IWCE) and International Association of Chiefs of Police (IACP),…

Read More

Security Technologies Top Trends for 2019

Electronic Access Control Systems: Year-end Review and Forecast IHS Markit projects that the market for physical electronic access control solutions has grown to over $5.2 billion in 2018. The market has experienced stable and predictable growth rates that have hovered around 6 percent over the past several years. Electronic locks remain both the largest and the fastest growing product type in access control, representing nearly 40% of the global market size for all access control equipment. While market growth rates have been consistent, technological developments have dramatically impacted the market in…

Read More

Security Technologies Top Trends for 2019

App Stores for the Security Industry An increasing number of vendors are marketing app ecosystems for video surveillance cameras. This is a further manifestation of increased processing power at the edge and a de-centralized architecture. However, apps for video surveillance cameras are not a new concept. The revival of app based ecosystems has synced with the resurgence of interest in video analytics, fueled by deep-learning technological advances. This means many of the new apps available for compatible cameras are based around deep learning video analytics. This was not the case for…

Read More

Security Technologies Top Trends for 2019

Deep Learning Analytics at the Edge In 2018 deep learning analytics were nearly all processed either on a server or in the cloud, not at the edge. However, 2019 will be the year of the embedded deep learning application specific integrated circuit (ASIC) system on a chip (SOC). Due to the power requirements of current GPU hardware, deep-learning analytics have typically had to run on servers. However, the transition of deep learning out to the edge has already begun. NVIDIA offers the Jetson embedded computing platform that allows edge-based inferencing.…

Read More

Security Technologies Top Trends for 2019

Deep Learning Analytics at the Edge In 2018 deep learning analytics were nearly all processed either on a server or in the cloud, not at the edge. However, 2019 will be the year of the embedded deep learning application specific integrated circuit (ASIC) system on a chip (SOC). Due to the power requirements of current GPU hardware, deep-learning analytics have typically had to run on servers. However, the transition of deep learning out to the edge has already begun. NVIDIA offers the Jetson embedded computing platform that allows edge-based inferencing.…

Read More

Security Technologies Top Trends for 2019

Where are all the GDPR Prosecutions? In last year’s ‘Trends for 2018’ whitepaper we discussed the impact GDPR was likely to have on the video surveillance industry. One year on, we assess the situation going into 2019. Even those reading this from outside the EU will no doubt have seen a flurry of GDPR related emails asking them to update their marketing preferences for various mail lists around May 2018. For many, this will have been the limit of their experience with GDPR. Judging by the large number of emails…

Read More

Security Technologies Top Trends for 2019

Cybersecurity is More than a Political Football Cyber security was one of the buzzwords of 2018. Something of a political football throughout the year, some western brands looked to cybersecurity to differentiate their offerings from products and solutions supplied by Chinese competitors. That said, there are real threats that need to be addressed in the cybersecurity market. As devices become increasingly connected and networked, every node on the network has the potential to provide access to a bad actor. Furthermore, the highly resourced and cyber-advanced vendors such as Microsoft and Adobe…

Read More