AXIS OS features different firmware tracks depending on your needs. The active track provides access to the newest state-of-the-art features and functionalities, including bug fixes and security patches. In other words, in the active track, we focus on continuous software development. In the long-term support (LTS) track, we don’t add any new features. The focus is to improve cybersecurity and stability.
Alarm overlay is a type of metadata overlay. An alarm overlay is used in recorded and live video to draw the operator's attention to things that happen in a scene, such as an individual who lingered in a specific area too long. An alarm overlay can consist of different elements, but typically it includes a bounding box that appears or changes color when the alarm is triggered.
Through our AXIS camera application platform (ACAP), you also have access to a long list of tested, well-documented application program interfaces (APIs). These APIs are optimized for Axis devices and let you take full advantage of Axis hardware and software. Together with software development kits (SDKs) based on open-source components, they facilitate interoperability, scalability, and easy migration of your apps to execute on Axis devices.
A detection profile for radar in surveillance use cases. Best used for objects moving up to 55km/h (34 mph). Detects whether an object is a human, a vehicle, or an unknown object.
A broad concept used to label manufactured machines, computers, systems, and software that solve complex tasks while demonstrating seemingly intelligent traits. Deep learning and machine learning are subsets of AI.
A type of iris, which is electrically controlled by the camera, to automatically regulate the amount of light allowed to enter.
Axis Secure Remote Access is a technology that allows a smartphone or PC client to access Axis network cameras when the client and the cameras are located on different local networks. Axis Secure Remote Access significantly simplifies the installation of remote access to surveillance systems. Once enabled, it’s automatically configured and removes the need for manual port-forwarding and router configuration.
Barrel distortion correction (BDC) is a lens correction that digitally corrects barrel distortion, where the image of a square object has sides that curve out. Using sliders, users can pull the edges of the image to make the image appear flat rather than curved.
A bounding box is a type of metadata. A bounding box can help the operator to detect important details or draw the operator's attention to what happens in the scene.
The discipline of using algorithms to analyze images and videos to help computers understand and interpret what's happening in a scene.
Corridor format is a feature that lets users turn the camera view 90 degrees to give a vertical view (portrait) at, for example, 9:16 ratio rather than a horizontal view (landscape) at, for example, 16:9 ratio. With corridor format, you can use the full view of the camera to overlook narrow scenes such as retail store aisles, highways and freeways, school hallways, and train station platforms.
The protection of computer systems and services from cyberthreats. Cybersecurity practices include processes for preventing damage and restoring computers, electronic communications systems and services, wire and electronic communications, and stored information to ensure their availability, integrity, safety, authenticity, confidentiality, and nonrepudiation.
Sometimes referred to as day/night functionality. A camera with day-and-night functionality can pick up light in the near-infrared (NIR) wavelength range and produce images. In cameras with true day-and-night functionality, the IR-blocking filter is mechanically removed at night. As a result, the camera's overall light sensitivity is increased. Cameras of all shapes and sizes (such as fixed, fixed dome, and PTZ cameras) can offer day-and-night functionality.
A type of iris, which is electrically controlled by the camera, to automatically regulate the amount of light allowed to enter.
A refined version of machine learning that uses so-called convolutional neural networks to process data. The algorithm learns to extract and combine features in a data-driven manner. DL is suitable for complex challenges, such as image classification, language processing, and object detection, where it's difficult to write rules to describe the solution. Instead, the deep learning network is trained iteratively using numerous examples, which usually have been labeled by a human expert.
An umbrella term for integrated chipsets designed for deep learning algorithms. In other words, DLPUs are AI accelerators integrated on application-specific integrated circuits (ASIC) or systems-on-chip (SoC) with data memory and architecture dedicated to accelerating deep-learning inference, allowing for more granular object classification.
Dynamic Host Configuration Protocol is a protocol for automatic assignment and management of IP addresses.
A digital signal processor is an audio processor that provides advanced sound compensation, which optimizes the sound to fit specific scenarios. In Axis network speakers, several sound optimization techniques such as frequency optimization, loudness compensation, and dynamic range control are built into the speakers themselves to deliver better audio quality in any environment.
Devices with echo cancellation can recognize sounds that the built-in loudspeaker produces as echoes and remove them.
Axis Edge Vault provides a hardware-based cybersecurity platform that safeguards the Axis device. It forms the foundation that all secure operations depend on and offers features to protect the identity of the device and safeguard its integrity from the factory. The platform relies on cryptographic computing modules and system-on-chip security to protect sensitive information from unauthorized access. Features include secure boot, signed firmware, secure keystore, Axis device ID, and signed video.
Edge-to-edge technology is a way to make IP devices communicate directly with each other. It offers smart pairing functionality between Axis network cameras and Axis audio products such as network speakers, audio bridges, and amplifiers.
Electronic image stabilization (EIS) provides smooth video in situations where a camera is subject to vibrations. Built-in gyroscopic sensors continuously detect the camera’s movements and vibrations, and they automatically adjust the frame to ensure you always capture the details you need. Electronic image stabilization relies on different algorithms for modeling camera motion, which are used to correct the images.
All electronic devices release electromagnetic energy. Electromagnetic compatibility (EMC) approvals are based on two parts: emission and immunity. Emission refers to the ability of electronic equipment to function satisfactorily without emitting too much electromagnetic energy that can disturb other equipment in that environment. Immunity refers to the ability of electronic equipment to tolerate the influence of electromagnetic energy from other electronic products.
Evidence management systems and evidence management software are both abbreviated EMS. Both terms are associated with body worn cameras. An evidence management system comprises the whole solution of integrated hardware, software, and storage. Evidence management software manages recordings and metadata from body worn cameras.
In Axis products, an event trigger is typically a detector of digital signals, audio signals, or physical events such as movements or a change in light. Users can set up rules for what should happen when one or more triggers are met. Usually, the word trigger is sufficient, and the word event can be left out. In newer Axis software and products, we use the term condition instead of trigger.
When a camera is installed in a potentially combustible environment, such as chemical processing plants, or near gas pipelines, it must meet very specific safety standards. It is the explosive environment that must be protected from potential ignition from the camera and other equipment. One way to make a camera explosion-protected is to use a heavy-duty enclosure that is designed to contain any internal explosion - resulting from sparks igniting gases or vapors - from releasing the energy externally. Another way is to reduce the energy inside the camera to safe levels, so that it is incapable of igniting a potentially combustible environment.
Focus recall is a feature that allows you to save focus areas to which the PTZ camera automatically returns when it moves into that view. This feature is especially useful in challenging lighting conditions, where the camera would have trouble finding focus. To use focus recall, you click a button when you’re satisfied with the focus of the current view, and the camera creates a focus recall area. Later, the camera automatically recalls the previously set focus for that view.
The frame rate is the frequency at which a video stream is updated. We measure frame rate in frames per second (fps). When there's movement in the video stream, you need a high frame rate to maintain good video quality.
The frequency response is the frequency range that a system (or any part of it) can respond to.
Transmission of data in two directions simultaneously, such as in a telephone conversation.
Gatekeeper is an analytics feature that makes the camera react to movement and move to that position automatically. After a few seconds of inactivity, the camera returns to its home position. Typically, the gatekeeper is used to monitor a gate or a specific area. The gatekeeper can also trigger other actions (such as reading a license plate or recording video) in the same camera, in other cameras, or in the VMS.
Transmission of data in two directions, in one direction at a time, as in a walkie-talkie system.
An i-CS lens is an intelligent CS-mount lens that allows for quick and easy installation. The i-CS lens has three motors, which enable automatic and remote control of generic features such as zoom, focus, and aperture. This way, you can repurpose the lens for different cameras and use cases.
A network protocol that protects the network from unauthorized clients. The network infrastructure is protected through the use of managed switches and RADIUS servers. The 802.1X client in the device authenticates the device on the network.
IK ratings specify degrees of protection against external mechanical impact, measured in joules. The degree of protection ranges from IK01 up to IK10. The requirements, which include parameters for impact energy, mass, and drop height are specified in the international standard IEC/EN 62262. See also IK08/IK10.
IK ratings are defined as a code, which consists of the letters IK followed by two digits that represent testing requirements on impact energy, mass, and drop height.
IK08 rated products are protected against 5 joules of impact, the equivalent of 1.7 kg dropped from 300 mm above the product.
IK10 rated products are protected against 20 joules of impact, the equivalent of 5 kg dropped from 400mm above the product.
An image sensor is a device that captures light and converts it into digital signals to form an image. The image sensor consists of photosensitive diodes, photosites, which converts the light into electrons. The electrons are, through several conversions, interpreted as pixels. Once an image is formed, it’s sent for processing in a stage that determines, among other things, the colors of each individual pixel that make up an image.
A set of smart features built into our speakers. It enables boundless integration possibilities and includes, for example, sensors, digital signal processing (DSP), and audio management software.
Electric and electronic equipment deteriorate or malfunction when water or dust enters the device. The IEC has developed the ingress protection (IP) ratings, which grade the resistance of an enclosure against the intrusion of dust or liquids. The ratings are widely used throughout industry. See also IP66/IP67.
IP 66: An IP classification for dust tightness and protection against powerful water jets.
IP 67: An IP classification for dust tightness and protection against brief immersion in water.
Together, with TCP, the Internet Protocol is the principal protocol in most of today's networked applications. For a server to operate on the internet, it must have its own, individual, public IP address. There are two versions, IPv4 and IPv6, where IPv4 still provides the majority of the service today. The main difference between the two is the size of the address space, which is substantially larger in IPv6.
A mode that allows the user to select a color range to represent different temperatures in a scene. Each color in an isotherm palette corresponds to a specific temperature value. The user can choose between black-and-white ranges, color ranges, or a mix between the two. The same input (measured thermal radiation) can result in different visual appearance depending on how each pixel value is mapped to a color range.
The Axis Lightfinder technology delivers high-resolution, full-color video with a minimum of motion blur even in near darkness. Because it strips away noise, Lightfinder makes dark areas in a scene visible and captures details in very low light. Cameras with Lightfinder discern color in low light better than the human eye. In surveillance, color may be the critical factor to identify a person, an object, or a vehicle.
The low-voltage directive provides broad objectives for the safety of electrical equipment. It ensures that products are safe to use without risk of personal injury or property damage. It's valid for the EU, and it's included in the CE mark.
AXIS OS features different firmware tracks. In the long-term support (LTS) track, we don’t add any features. The focus is to improve cybersecurity and stability. In the active track, we continue to add features in addition to improving on cybersecurity and stability. If the firmware track has the features you need, we recommend that you choose the LTS track.
Machine learning is a subset of artificial intelligence (AI) that allows computers to build their own logic for making predictions and determinations. Machine learning algorithms are either supervised or unsupervised. Without machine learning, a computer needs humans to create algorithms.
An umbrella term for integrated chipsets designed for machine learning algorithms. In other words, MLPUs are AI accelerators integrated on application-specific integrated circuits (ASIC) or systems-on-chip (SoC) with data memory and architecture dedicated to machine learning.
Multicast DNS is a protocol that can be used to discover network video products using Mac computers, but it can also be used as a discovery protocol for new devices in any network.
Data that describes and gives information about other data (typically primary data, such as the video or audio stream from an Axis device). Metadata makes it easier for systems and people to find, track, and analyze instances of data.
Message Queuing Telemetry Transport is a standard messaging protocol for the internet of things (IoT). It was designed for simplified IoT integration and is used in a wide variety of industries to connect remote devices while leaving a small code footprint and requiring minimal network bandwidth.
NEMA 4X is equivalent to IP56 and provides a degree of protection of the equipment, inside the enclosure, against the ingress of solid foreign objects, the ingress of splashing or hose-directed water, the forming of ice, and corrosion.
The National Electrical Manufacturers Association (NEMA) is a US-based association that provides standards for electrical equipment enclosures. NEMA has launched their own standard NEMA 250 worldwide. NEMA has also adopted and published a harmonizing IP standard, ANSI/IEC 60529, through the American National Standards Institute (ANSI).
Noise reduction is used to reduce ambient background noise.
One of five pillars of information assurance. Nonrepudiation provides proof of the origin, authenticity, and integrity of data. It assures the sender that the message was delivered and provides proof of the sender's identity to the recipient. Neither party can deny that a message was sent, received, and processed.
A software component that authenticates the ownership of an Axis device over the cloud together with an owner authentication key, which is shipped with the device. The one-click cloud connection service is used by select partners such as Genetec, Telcred, Total Security, IDODI, etc. This feature is available only to select partners.
Open Network Video Interface Forum (ONVIF) provides and promotes standardized interfaces for effective interoperability of IP-based physical security products. ONVIF is a registered trademark.
Open source means that developers have access to the source code of a certain software application. Developers can use, study, change, and then distribute their version of the software. A characteristic and benefit of open-source software is the development method, which includes distributed peer review and process transparency.
Axis OptimizedIR provides a unique and powerful combination of camera intelligence and sophisticated LED technology, resulting in our most advanced camera-integrated IR solutions for complete darkness. In our pan-tilt-zoom (PTZ) cameras with OptimizedIR, the IR beam automatically adapts and becomes wider or narrower as the camera zooms in and out to make sure that the entire field of view is always evenly illuminated.
The Open Supervised Device Protocol (OSDP) is an access control communications standard developed by the Security Industry Association (SIA) to improve interoperability among access control and security products.
A conceptual model that describes data communication between open systems. The model consists of seven layers. To provide a service, each layer uses the services of the layer immediately below it. Each layer must follow certain rules, or protocols, to perform services.
P-Iris is an automatic and precise iris control developed by Axis. It involves a P-Iris lens and specialized software that optimize image quality.
PBX is short for private branch exchange. It’s a telephone system within an enterprise that switches calls between users on local lines while allowing all those users to share a certain number of external phone lines. This way, you don't have to set up individual external phone lines for each user.
PoE classes ensure efficient power distribution by specifying the amount of power that a powered device will require.
A concept (unique to Axis) for adding connectivity to Axis cameras. An interface box between the camera and switch provides the ports and adds a communication layer on top of the network.
Reader is a device for the input of credentials and forwards the credential to the access control system for authentication and authorization.
RFID is short for radio-frequency identification. It’s an identification technology that uses radio signals, (i.e., the electromagnetic or electrostatic coupling in the radio frequency (RF) portion of the electromagnetic spectrum) to identify an object, an animal, or a person.
Road monitoring – A detection profile for radar in traffic use cases. Best used to track vehicles moving at up to 105 km/h (65 mph) in urban zones, closed zones, and on suburban roads. This mode should not be used for the detection of humans or other types of objects.
A scene profile consists of a group of settings that are combined in a way that suits a particular scenario. When the user selects a scene profile, the camera automatically optimizes the exposure time, white balance, aperture, sharpness, contrast, and noise to suit that scenario.
AXIS Camera Application Platform (ACAP) allows you to install plugin-style apps on your Axis devices. This way, you can customize the feature set of your Axis devices and systems while maintaining a high degree of interoperability and scalability. The application programming interfaces (APIs) and ACAP software development kits (SDKs) are based on open-source components and support developers, at Axis and partner companies alike, in creating apps for a vast array of scenarios.
Secure boot is a boot process that consists of an unbroken chain of cryptographically validated software, starting in immutable memory (boot ROM). Being based on signed firmware, secure boot ensures that a device can boot only with authorized firmware.
A slot for a small form-factor pluggable (SFP) transceiver. This type of transceiver supplies network devices, such as a switches or routers, with a fiber optic network connection.
The sharpdome feature offers innovative mechanics that make the entire dome rotate, in contrast to a conventional dome where the camera rotates inside the dome. Pan-tilt-zoom (PTZ) cameras with sharpdome are versatile, with a field of view that extends above the camera horizon. This means that refractions and other optical effects are kept to a minimum.
Signed firmware is implemented by the software vendor signing the firmware image with a private key, which is secret. When firmware has this signature attached to it, a device will validate the firmware before accepting and installing it. If the device detects that the firmware integrity is compromised, it will reject the firmware upgrade. Axis signed firmware is based on the industry-accepted RSA public-key encryption method.
The Session Initiation Protocol (SIP) is a protocol that initiates, maintains, and terminates multimedia sessions between different parties. Usually, these sessions consist of audio, but sometimes they consist of video. The most common applications of SIP include internet telephony for voice and video calls and instant messaging over IP networks.
Sound pressure level (SPL) is an objective measure of sound loudness. SPL is used to describe how loud a sound a product is producing. The higher the SPL, the louder the sound. It is a reference level, where 0 dBSPL equals the threshold of hearing, 120–140 dBSPL is painful, and 140 dBSPL equals irreparable hearing damage. To get the SPL, you measure the atmospheric pressure caused by a sound wave over a specified period of time. It's expressed in dBSPL.
Spatial behavior is the way objects move within a scene.
In video analytics, you can set up rules for detecting and handling both unexpected or desired spatial behavior. Through rules that pair spatial behavior-based conditions with actions, your systems or staff can be made aware and respond appropriately.
A supervised input, or supervised I/O, allows you to detect tampering in external alarm systems. Beyond the active or inactive state, it's possible to detect if the wire has been cut or shortened.
Short for Transmission Control Protocol/Internet Protocol. A reference model used to understand protocols and how communication takes place. The model consists of four layers, which correspond to the seven layers in the OSI model. Each layer must follow certain rules, or protocols, to perform services.
Data about the environment that is transmitted from a remote device, such as a sensor. Temperature and energy usage can be examples of telemetry data.
In the case of MQTT, telemetry data shows how products are used (e.g., where, how often, with which software and hardware).
Thermal cameras detect objects using the infrared radiation (heat) emitted by all objects. Temperature calibrated thermal cameras – called thermometric cameras – can measure absolute temperatures while surveillance optimized thermal cameras show relative temperatures. All types of thermal cameras have excellent object detection capabilities regardless of light conditions – even in complete darkness.
When using thermometric guard tour the camera needs to be installed on a positioning unit to be able to move between preset positions. It then measures temperatures in predefined polygonal detection areas. It’s possible to add up to 256 presets with 10 detection areas per preset for large-scale temperature monitoring. With thermometric guard tour, you also don't have to control the camera manually every time you want to do a video tour of the premises. Instead, you can play the guard tour. You can play the guard tour on command and at scheduled times.
TPM is short for Trusted Platform Module. A TPM is a component that provides a set of cryptographic features suitable for protecting information from unauthorized access. The private key is stored in the TPM and never leaves the TPM. All cryptographic operations requiring the use of the private key are sent to the TPM to be processed. This ensures that the secret part of the certificate remains safe even in the event of a security breach.
Two-way audio (also known as duplex audio) is a feature that allows Axis devices to both pick up and broadcast sound. For example, if you have an IP camera with two-way audio, you can listen in and, if the need arises, speak with visitors or intruders in real-time.
Universal Plug and Play is a protocol that allows Microsoft operating systems to automatically detect resources on a network.
VAPIX is a registered trademark and our own open application programming interface (API). It enables the integration of our products into a wide range of solutions and platforms.
A varifocal lens provides a wide range of focal lengths, as opposed to a lens with a fixed focal length, which only provides one.
Video management software (VMS) is a central part of video management and is used to monitor, analyze, and record video from video encoders and network cameras.
An algorithm that amplifies voice content relative to other sounds with the purpose of making speech more perceptible.
VoIP is short for voice over IP. It’s a group of technologies that enables voice communication and multimedia sessions over IP networks.
Axis cameras with wide dynamic range (WDR) technology make the difference between seeing important forensic details clearly and seeing nothing but a blur in challenging light conditions. Scenes with dark and bright areas spell trouble for image usability and clarity. This contrast in lighting is referred to as a wide dynamic range or a high dynamic range. Our WDR technology is more capable of handling these difficult lighting conditions, allowing you to place your cameras more freely.
The Axis Zipstream technology preserves all the important forensic details in the video stream while lowering bandwidth and storage requirements by more than 50%. Zipstream includes intelligent algorithms, which ensure that relevant forensic information is identified, recorded, and sent in full resolution and frame rate.