Emerging trends. Electronic Security Solutions Solution(s) considered for Security Access Control Systems Card readers Access control Personal Vehicles.

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Ascendent's Fusion 360 hybrid platform creates a true hybrid surveillance system by utilizing the advantages of Analog, Megapixel, and IP technologies.
Presentation Prepared For:. Remote Command Center Operations “Cloud” Technology Electric Car Charging Stations Interfaces to Customer’s Web Sites End.
The Cable Guys Inc. Drew Leach Tom McLoughlin Philip Mauldin Bill Smith.
XProtect® Expert 2013 Product presentation
GuardSec Corp a.s. Digital mobile surveillance service Martin Horký CEO GuardSec Group Mobile Monday Ukraine Birthday Awards Kiev, November.
MBIU PDR MBIU Preliminary Design Review. MBIU PDR Team Members and Presentation –Brian Weigner: Overview & Application –Claude Rossignol: CPU Board –Dan.
7.1 © 2007 by Prentice Hall 7 Chapter Telecommunications, the Internet, and Wireless Technology.
Secure Video Streaming Proxy Server A Proof of Concept Prototype Bora Güngören Portakal Teknoloji
Hype Cycle 2010 and Cloud Computing Sidra Inayat.
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Top 10 Strategic Technology Trends for 2013 A Channel Partners Slide Show … as highlighted at.
Big Data Open Source Software and Projects Unit 1: Introduction Data Science Curriculum March Geoffrey Fox
H.264 Remote Surveillance & Streaming Solution Darim 2010 Darim Vision Co., Ltd.
Brendan Cooney CSC 152. What is Input? Any data or instructions entered into the memory of a computer Data- unprocessed information Instructions- steps.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Presentation by Future Trends & Applications for Remote Surveillance.
CURRENT TRENDS IN DIGITAL ELECTRONICS– AN OVERVIEW
Using Motion Detection, Alerts and Alarms
Ecommerce … or electronic commerce refers to systems that support electronically executed business transactions. B2C B2B C2C In this section: Ecommerce.
GV-Control Center Overview
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Chapter 5 Input. What Is Input? What are the input devices? Input device is any hardware component used to enter data or instructions Data or instructions.
INPUT DEVICES. KEYBOARD Most common input device for a computer.
X-Informatics Cloud Technology February 25 and Geoffrey Fox Associate.
Input and Output © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
REMOTE SITE MANAGEMENT SOLUTION. AGENDA 2  About KoçSistem  Current Situation in Base Stations  Remote Site Management System: Sitelink  Sitelink.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective.
DCS-5230 Wireless N PTZ Network Camera Sales guide D-Link Confidential.
LATEST TECHNOLOGICAL DEVELOPMENTS IN THE FIELD OF SECURITY AND PRIVACY.
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
9/18/2015www.protocolnet.com1 PROTOCOL ONLINE SERVICES Pvt. Ltd., “To become a leader in Information Technology by providing entire spectrum of hardware,
Chapter 2: Information Technology and AISs
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
MIS3300_Team8 Service Aron Allen Angela Chong Cameron Sutherland Edment Thai Nakyung Kim.
Exploring the Network.
Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval from Gartner. Such approvals.
The world’s networking company SM © 2005 AT&T, All Rights Reserved. Hossein Eslambolchi, PhD. President -- Global Networking Technology Services & AT&T.
Paulo Mussi Augusto. Hype Cycle for Education, 2013 Innovation Trigger Peak of Inflated Expectations Trough of Disillusionment Slope of Enlightenment.
IP-based Integrated Security Solutions for Airport Operations and Security AirporTech Asia 2008 Danny Peleg.
Input By Hollee Smalley. What is Input? Input is any data or instructions entered into the memory of a computer.
Hosted by: June 23-26, 2003 New York City Copyright Managing Multiple Access & Entry Points.
C 3 : A Formula For Success Coverage, Customization & Collaboration Pete Peterson SVP, U.S. Sales, Tech Data.
Risk Management. What we offer? We provide IP video monitoring solutions for safety and security through our systems integration capabilities.
1 LOW CURRENT  FIRE & SAFETY………………………………. 1) Fire Alarm ( EDWARDS ) Smoke, Heat and GAS detectors connected to audible and visual devices to convey the.
Chapter 1: Applying Computer Basics – Lesson 1 © 2010, 2006 South-Western, Cengage Learning.
Telefónica Data Perú S.A.A. How will e-commerce affect the Transportation Industry Ing. Ricardo Lanfranco Varea Central Manager Sales & Marketing Telefónica.
Computer Science and Engineering Department The University of Texas at Arlington MavHome: An Intelligent Home Environment.
August Video Management Software ViconNet Enterprise Video Management Software Hybrid DVR Kollector Strike Kollector Force Plug & Play NVR HDExpress.
Copyright 2007 by Rombix. R CyClops is a computer vision solution which could integrate most of the Real World Computer Vision Application. Available.
History of Windows Operating System. Windows 1.0 Debuted in 1985 First version of Windows that was set up to use bitmap displays and mouse pointing devices.
Video Analytics Integration and Analytics. Introduction The functions of video analytics. The architecture of video analytics. The applications of video.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Google. Android What is Android ? -Android is Linux Based OS -Designed for use on cell phones, e-readers, tablet PCs. -Android provides easy access to.
Nexbase Invites You To Our Special Products
New and Evolving Technologies: Anything Goes
ICON Signals Event Alert Notification Platform Overview March 28, 2017
Smart Retail Digital Store.
Intelligent Video Surveillance – The End of CCTV
Top 10 Strategic Technology Trends for 2013
The Next Generation - UNIFIED
Future Technologies FTC 2016 Future Technologies Conference December 2016 San Francisco, United States.
CORPORATE PROFILE JUNE 2016
Artificial Intelligence Changes the Security Landscape
Top 10 Strategic Technology Trends for 2013
Lieberman Management Services
Copyright 2005 Prentice- Hall, Inc.
Utilizing the Network Edge
Presentation transcript:

Emerging trends

Electronic Security Solutions

Solution(s) considered for Security Access Control Systems Card readers Access control Personal Vehicles Biometric systems Fingerprint Iris Facial recognition Hand Geometry RIFD Cards Infra Red Sensors Magnetic & Capacitance sensors CMS Central Monitoring Systems Merchandise Protection Pressure mats Wireless Alarm Systems Home Security Solutions * Video Surveillance * Alarm systems * Door entry systems * CCTV * Access Control Systems Surveillance Devices * CCTV - Video (Closed circuit TV) * DVR * NVR Network Video Recorders * Air/Water Surveillance * Personal Surveillance * Vehicle Tracking System * Mobile Tracking System * Thermal Imagers * Unmanned Ariel Vehicles Perimeter Protection Devices Information Security Solutions * Buried Cable & Geo phone sensors * Microphonic cable disturbance sensor * Electro optical panoramic iintrusion detection system Fire Alarm Solutions * Fire Alarm Solutions * Fire Detection * Antivirus software * Firewall * Intrusion detection/ prevention * Network Security * Encryption / Decryption * Access Control for Computer * Database Management Office/Factory Security Solutions Car/Vehicle Security Solutions Mobile & PDA Security Solutions Computer data Security Solutions Motion protection system Water Leak Detection

Proposed Solution (pictorial representation – SW Architecture) Integrated surveillance system SensorCameraTransducers Integrated surveillance system Surveillance system over Cloud Ssaas – Security Software as a service Correlation for prediction

Use Case I Setup (Solution) for Critical Installation Refineries Airports Railway - metro

Secured Home Thermal Surveillance Information Sent Through Pc Information Received On Server Sent To User's Cell phone  Setup (Solution) for Residential Installation  Hosted on Cloud Use Case II

Why develop Intellectual Property? Proven, Licensable Sold & Supported independently Generate Customer “Pull” Center of Excellence Owned Standards based blocks Accelerate Product Development Sold part of services Special Application experience General Engineering Skills IP Re-Usable Blocks Codified Knowledge Codified Knowledge

IP Strategy Strategy 1 Strategy 2 Strategy 3 Expand current HW business Grow existing HW IP business with PHY & SW Develop New SW IP Develop new SW solutions Solutions for Mobile/ Consumer market Develop New Products Develop full prototypes for OEM/ODM customers.

Agenda followed for review Market Overview Explanation of proposed product/solution Effort/Cost estimate for product realization Competitors and How we can differentiate Revenue projections for 5 years

IP Channels Design Services companies IP Vendor Silicon Vendors OEM/ODM IP Customization Services

Activity Streams Wireless Power Social Analysis Group Buying Gamification 3D Printing Image Recognition Context-Enriched Services Speech-to-Speech Translation Internet of Things Natural Language Question Answering Big Data and Extreme Information Processing Management Social TV Video Analysis of Customer Service Computer Brain Interface Quantum Computing Human Augmentation 3D Bioprinting Internet TV NFC Payment Private Cloud Computing Augmented Reality Cloud Computing Media Tablet Virtual Assistants In-Memory Database Management Systems Gesture Recognition Machine-to-Machine Communication Services Mesh Networks : Sensor Cloud/Web Platforms Hosted Virtual Desktops Virtual Worlds E-Book Readers Consumerization QR/ Color Code Idea Management Biometric Authentication Mobile Application Stores Predictive Analytics Speech Recognition Location Aware Applications As of July 2011 Technology Trigger Peak of Inflated Expectations Trough of Disillusionment Slope of Enlightenment Plateau of Productivity time: Years to mainstream adoption: less than 2 years more than 10 years obsolete before plateau Source: Gartner (July 2011) Hype Cycle for Emerging Technologies, 2011

MIPI IPs Camera Tx Display Rx CSI-2 DSI-1 Application Processor SoC Co-Processor SoC D-PHY Base Band Processor SOC MPHY DIG RF RF PA Display Rx

Priority Matrix for Emerging Technologies, 2011 benefit high moderate low “Big Data” and Extreme Information Processing and Management 3D Printing Context-Enriched Services Internet of Things Internet TV Machine-to-Machine Communication Services Natural Language Question Answering 3D Bioprinting Hum an Augmentation Mobile Robots Quantum Computing E-Book Readers Hosted Virtual Desktops Location-Aware Applications Mobile Application Store Predictive Analytics Cloud/Web Platforms Private Cloud Computing QR/Color Code Social Analytics Wireless Power Augmented Reality Consumerization Social TV Virtual Assistants Mesh Networks: Sensor Activity Streams Biometric Authentication Methods Gesture Recognition Group Buying Idea Management Speech Recognition Gamification Image Recognition NFC Payment Speech-to-Speech Translation Virtual Worlds Computer-Brain Interface Video Analytics for Customer Servise Source: Gartner (July 2011) As of July 2011 years to mainstream adoption less than 2 years2 to 5 years 5 to 10 years more than 10 years transformational