What factors should you consider for optimal video analytics performance?

    AI continues to be hailed as the technology that will augment and improve human performance in many sectors and the video surveillance industry is no exception. AI-based analytics is increasingly being used to quickly process large amounts of data and trigger actions. These functions help to support a security team when monitoring large and changing […]

      Back to the future: continuous recording within grasp (once again)

      Outside of the security sector, the perception that many people have of video surveillance is shaped by what they’ve seen in movies and TV shows; cameras always recording, with the footage saved onto video tape and stored until whichever detective or private investigator wants to review an incident. There’s some truth in this perception, of […]

        A perfect IIoT tool for integrators: how will you use it to innovate?

        Axis is all but synonymous with network-based surveillance cameras. The same operational efficiency, open APIs, and edge computing that built a world-leading position in that sector can be used for industrial internet of things (IIoT) solutions, helping integrators and end-users improve productivity, safety, and quality while reducing waste and downtime. Ask anyone about robots, and […]

          Future-proofing video surveillance investments with edge analytics

          You’ve probably heard of ‘edge analytics’ (or ‘analytics on the edge’) in relation to video surveillance. Put in its simplest form, it relates to increasingly powerful video analytics taking place on the ‘edge’ of the network, i.e. in the camera itself. My colleague Andres Vigren’s recent post provides a great introduction. As with any new […]

            How IP intercoms can enhance video surveillance systems

            Customer attitudes and demands have continued to shape the security sector, driving ongoing market and industry changes. As a result, new use cases have emerged for security and safety, related to building access, communication and control across a variety of sectors. These have set the scene for security professionals to rethink how intercom technology is […]