Intelligent video: Five cool things you can do with video analytics

    With network video cameras continuing to replace analog installations, I have seen a growing trend for adding on valuable extra functionality. As the images captured have become more detailed, cameras are also becoming much, much smarter. Video analytics has come a long way since I started in this industry – with applications ranging from motion […]

      Video surveillance for small businesses – not just for catching bad guys

      One of the best things about working with small businesses is seeing the wide variety of scenarios where technology can be such a help to owners and managers, and then how a simple investment ends up having a myriad of other uses. One of my favorite examples is that from Elise Ogden and Amy Telzrow, […]

        Video surveillance cameras: Not just for security anymore

        It used to be that video surveillance was considered just a security application. Organizations would use cameras to ‘keep an eye on things’ in mainly a defensive or preventive posture. In large companies, those using video surveillance would typically hold a security role. Today, the capabilities of video make it a useful tool for a […]

          Herta looks to Deep Learning techniques to improve facial recognition

          Axis partner Herta develops and designs facial recognition software solutions. It is specialized in the simultaneous detection and identification of multiple subjects in crowded scenarios such as airports, train and metro stations, sports stadiums, shopping malls. It offers solutions for videosurveillance, access control and marketing requirements. We had a chance to sit down with Herta […]

            Standard cyber protection

            Computer networks are constantly under attack. However, only a small number of these attacks are successful. The majority of cyber-attacks are opportunistic, not targeting a specific victim, but just poking and prodding by scanning for open networks/ports; trying easy-to-guess passwords; identifying unpatched network services or sending phishing emails. The attackers don’t want to spend any […]