When it comes to security systems you may have heard the term “edge technology,” “edge analytics,” or “edge devices.” What exactly do these terms mean and why are they important? When talking about security systems “the edge” is typically used when referring to video surveillance components. Every security system integrator and industry professional will likely have their own definition of what it means, but in summary “edge technology” refers to surveillance devices that operate, analyze, and record at their source versus transmitting all that information over a network to the system’s core. In traditional surveillance systems there is a central server where recorded data from peripheral devices is stored and analyzed. In an edge-based system cameras perform these functions locally.
Why is this pertinent information? Depending on your specific situation using edge-based technology can provide more efficient surveillance processes and enhance the overall effectiveness of your security system. As every situation is subjective a licensed security systems integrator should always be consulted when determining what type of components will serve your business best. At Perfect Connections, Inc. our licensed security system integrators are committed to providing comprehensive security systems that exceed your expectations. We have been installing comprehensive security systems at businesses throughout northern and central New Jersey for the past 23 years. We know how to assess your security needs and implement relevant technologies that will help keep business running as usual.
Surveillance components that can be considered on “the edge” are IP cameras, video encoders, and network attached storage (NAS) devices. These devices have recently become more advanced and their capabilities that were once unique to the central server of the security system continue to improve. According to Steve Gorski, general manager at Mobotix, “Edge-based surveillance solves the bottleneck problem by using the camera to decentralize intelligence and video data.” This means the cameras themselves are more intelligent and effective.
Edge-based technologies allow for higher image resolutions and the ability to compress them without the loss image quality. Even with the use of high resolution IP cameras becoming more commonplace, in a traditional system, the images still have to travel to the central server to be stored and typically compressed; this is where image quality can be lost. Edge technology helps reduce the need for exorbitant storage space on the central server as many edge devices are capable of storing data locally on SD memory cards or NAS devices. Traditionally these types of storage options were primarily used as backups for the system, but they can now be implemented as the main recording devices in smaller applications. Cutting down on the need for centralized storage will reduce the need for high bandwidth consumption, ultimately cutting costs.
According to Fredrik Nilsson, general manager for Axis Communications, “It’s estimated today that a staggering 99 percent of all recorded surveillance video is deleted before it’s ever seen.” How does that make surveillance useful? It really doesn’t except for use in forensic investigations or after the fact viewing, but with edge-technologies providing intelligence and analytics at the source, detection capabilities increase which creates a more effective system. With smarter edge devices that can detect patterns, motion, facial recognition, license plates, camera tampering, and people count, you can avoid potential catastrophe that could be caused by deleting recordings to free up space. These types of analytics provide a platform for real-time viewing that can even be streamed to mobile devices, which are also often considered part of “the edge” realm. The ultimate goal always being prevention and proactive approaches rather than delayed after the fact reactions.
With any technology “the edge” is a work in progress and will continue to evolve. It seems edge devices are primarily implemented in smaller applications where the camera need is less than 20. One of the reasons being a server-based surveillance system can run more analytics per camera because of the CPU power, so the more cameras you have the more processing power you’ll likely need. For smaller facilities and businesses with remote locations that need surveillance, edge devices are a viable option as they provide real-time analytics, can store footage locally, and don’t require a ton of bandwidth consumption.
At Perfect Connections, Inc. we are committed to providing security system solutions that fit your specific needs. Our team of licensed integrators has been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992. We realize that just because a new technology is available that doesn’t mean it is the appropriate solution to every problem. Our integrators work with you to learn your needs and will design a custom system that addresses your subjective security risks.
If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.
Image Credit: Image by Todd Huffman-Flickr-Creative Commons
We use our smartphones and other mobile devices for many functions in our daily lives. It’s almost impossible to go through an entire day without seeing someone tapping, scrolling, or swiping through their phone, never mind using your own phone. We’ve created a mobile environment where convenience lies in the palm of our hands.
When you’re starting any kind of project, what’s one of the first things you do? In all likelihood you go to your computer, smartphone, or mobile device and open up a search engine. You run search after search to find what you’re looking for. In our connected world of the IoT (Internet of Thing) we are, at least partially, reliant on what we can find online. You can find information on virtually anything. This includes anything from how to properly stain a deck to how to choose which security system integrator is the best.
As a property manager you have a lot of people that depend on the safety and security of the real estate you oversee. Whether or not you own the properties you rent, or work with a landlord in managing their properties, a bulk of the responsibility lies on your shoulders. Your main goal is to attract responsible patrons, keep them, and build your brand. How can you do that if the property you oversee is publicly perceived to be too risky or unsafe? That’s the problem, if there has been an incident at a property that you own the public tends to remember and will likely steer clear of that address.
As a business owner protecting your facility is always a top concern. Are you getting the coverage you need? If you have a comprehensive security system you’re already in a good position. However, a security system is only as good as the sum of its parts. One of the most crucial parts of a security system is the surveillance aspect. Surveillance systems are the eyes that keep watch over your business even when you can’t.
In the wake of home automation, smart home, or connected home technology you may have come across the term Z-Wave technology. What is it?
If you have a security system you might already understand the consequences of a false alarm. It is not something to be taken lightly and can have serious implications. False alarms can happen for any number of reasons and it’s important to understand why and how best to avoid them. No security system is perfect, and false alarms are bound to happen, but as end users and integrators it is our duty to try to minimize them. At
Does your security system, or part of it, rely on your company’s internet network? Or are you considering a system that is at least partially dependent on network connectivity? If so, what happens if that network fails or is compromised? Fortunately nowadays the chances of your network dropping or losing connection is pretty slim, in fact the probability of most Internet Service Providers (ISPs) experiencing an outage is about
When you think motion detectors (or sensors) you might picture a heist scene from the movies where a thief has to perform acrobatics in order to avoid a web of alarm triggering laser-beams surrounding a priceless gem. While that narrative is not necessarily complete fiction, it’s not exactly how motion detection is implemented in the real world. In modern day applications security system integrators use motion detectors to sense unwarranted movement within or outside of a home or facility. Motion detectors are typically implemented as an essential part of a comprehensive security system meant to help detect an intruder. There are different types of detectors and their applications are not necessarily synonymous.
Healthcare facilities pose a unique security situation. By nature they hold a lot of risk other organizations don’t necessarily have to deal with. Most healthcare facilities are open to the public and provide care for a vast array of people on a daily basis. Many facilities also house expensive and often sought after narcotics or medications. Also, recent changes to healthcare policies are having an effect on everyday operations and their implications may not be fully realized yet. These factors combined with the unpredictability of patient and public behavior make healthcare facilities particularly sensitive environments that require special attention when it comes to security.