SMART CITIES TO SMART VILLAGES: DRONES HAVE BECOME INDISPENSABLE!

Could you remember when you saw a drone the last time – hopefully in a wedding! As the latest fad, grand weddings suddenly appear incomplete without drones doing aerial photography. Almost everyone today is familiar with the term ‘drone,’ and everyone does likely remember the kids flying toys as the earliest airborne drones. It is becoming an increasingly popular way to refer the small (usually) helicopter-like devices that are being flown as ‘drones.’ The word ‘drone’ is used not only to cover a $15 hobby aircraft that a child flies,…

Read More

Study Evaluates Effects of Race, Age, Sex on Face Recognition Software

How accurately do face recognition software tools identify people of varied sex, age and racial background? According to a new study by the National Institute of Standards and Technology (NIST), the answer depends on the algorithm at the heart of the system, the application that uses it and the data it’s fed – but the majority of face recognition algorithms exhibit demographic differentials. A differential means that an algorithm’s ability to match two images of the same person varies from one demographic group to another. Results captured in the report,…

Read More

BOSCH Camera-Based Life-Saver

Microsleep, distraction, a seatbelt left undone – many things that happen inside a vehicle can have far-reaching consequences. To avert critical driving situations and possibly also accidents, it is planned that cars will in the future use their sensors not simply to monitor the road but also the driver and other passengers. For this purpose, Bosch has developed a new interior monitoring system featuring cameras and artificial intelligence (AI). “If the car knows what its driver and occupants are doing, driving will become safer and more convenient,” said Harald Kroeger,…

Read More

AI & ML: Steps Ahead of Video Analytics – Revolutionizing the Security & Surveillance Business

Surveillance and security in traditional sense is now moving forward – in leaps and bounds. Gone are the days when people were using analog cameras. Analogs are rapidly being replaced by digital cameras which enable video analytics to perform on an incoming digital stream. Also, between 2005 and 2010, there was a massive push to standardize the interface between the camera, and the software that talks to it over an ethernet cable. ONVIF – the Open Network Video Interface Forum – meant to provide and promote standardized interfaces for effective…

Read More

Access Control Systems: Its Time to Move with the Times!

An access control system (ACS) is an ultra-critical component in the chain of electronic security – however in India, even many large organizations do not give access control the credit that is due. This article enumerates ten must-have features that any modern access control system should possess. While designing security systems, we are especially attracted to projects which consist of access control systems (ACS) – because only the discerning customer considers access control as a ‘security requirement’ rather than a ‘time & attendance’ requirement. In many premises, the convenience of…

Read More

The Frictionless Future of Face Recognition

A Day in the Busy Life of A Traveler in 2020 At 5:30 a morning, her smartphone alarm drags Elise from a deep sleep, and into another busy day. The device unlocks when she looks at it with eyes barely open. At a shake of her head, the phone goes to ‘snooze.’ Two snooze cycles later, Elise stumbles to the kitchen where the coffee maker lights up with recognition to brew her favorite coffee. The radio, following suit, tunes to her favorite news program. Grabbing her briefcase, Elise heads out…

Read More

Is the Public Cloud Secure?

While deciding amongst a public, private or hybrid cloud offerings, any organization considers the involved security risks as one of the most important parameters. The prefix ‘Public’ alone can make some people think that public cloud is not as secure as a hybrid, or a private offering. But is that really true – or is the public cloud secure enough for your organization’s data? Let’s try to analyze this question and arrive at an answer post validation of some facts. However, before we do the analysis let’s give a brief…

Read More

Corporate Security in the Age of IoT

Internet has undoubtedly been one of the most significant developments in humanity’s technological journey since the industrial revolution. Rapid advances in telecommunication, especially wireless coupled with software application development, has led to the proliferation of internet to almost all facets of human activity. The ‘Internet of Things’ or ‘IoT’ amalgamates the strengths of network, wireless, miniaturised hardware, software, and cloud to create an even greater medium that pushes the frontiers of day-to-day usage of technology in a multitude of facets of human life. Simply put, the IoT is a computing…

Read More

Revolutionizing Trade-Related Surveillance with SURVEIL-X

NICE Actimize’s next-generation SURVEIL-X solution fundamentally changes surveillance detection to help FSOs detect all forms of risky behavior and better comply with global regulations. Traditional surveillance technology is adept at detecting obvious market abuse, but it doesn’t commonly address the ‘unknowns.’ That’s why regulators around the globe are adopting next generation surveillance technology in growing numbers, and advising financial services organizations (FSOs) to do the same. To meet this demand, NICE Actimize has introduced SURVEIL-X, the industry’s first AI-powered, cloud-native, true holistic trade-related surveillance solution that detects all forms of…

Read More

Securing IP Surveillance Cameras in the IoT Ecosystem

The security for devices connected to the Internet of Things (IoT) has been a hot topic, and Internet Protocol (IP) surveillance cameras, in particular, have been the subject of growing scrutiny. IP cameras have become a top target for hackers because of their relatively high computing power and good internet traffic throughput. A case in point was the incident toward the end of 2016 where a Linux-based botnet called Mirai was used to facilitate the largest distributed-denial-of-service (DDoS) attack in history. As a result, packet flow experienced outbursts of up…

Read More