Tips on how video surveillance can improve productivity in heavy industry
A common security problem plaguing the oil and gas production companies in the booming South Texas oilfield is securing the many entrances to the thousands of active oil and gas leases. With multiple oil companies and associated vendors accessing these busy sites 24/7, security and site integrity can quickly get out of hand. In the past, the only means of providing log in/log out of vehicles and gate control was by use of costly personnel stationed around the clock.
http://securitytechnologyofsouthtexas.com/wp-content/uploads/2018/04/srvc-virtual-gate-e1524580596970.jpg200200handyrandyhttp://securitytechnologyofsouthtexas.com/wp-content/uploads/2018/04/STST-Logo_Mst_rgb_wName.svghandyrandy2018-01-29 20:34:302018-06-18 17:55:43Remote Video Surveillance and the South Texas Oilfield
Thermographic or Infrared (IR) cameras create images using IR radiation as apposed to the visible light used in conventional cameras. Basically, what this means is that they are able to “see” heat as it radiates from an object and then display the differences in heat within its picture as various shades of grey in black and white video. Thermal cameras are therefore able to see through objects when a heat source is inside, require no light, and are not affected by things like smoke or dust.
When talking about the modern security system, the hottest item always seems to be the cameras. Now capable of extremely high res video, real-time analysis and video processing, and more. But in many cases, having a solid access control system is even more important. Without successful control of who can go where and when, having visual data can quickly become meaningless.
http://securitytechnologyofsouthtexas.com/wp-content/uploads/2018/04/biometrics.jpg335595handyrandyhttp://securitytechnologyofsouthtexas.com/wp-content/uploads/2018/04/STST-Logo_Mst_rgb_wName.svghandyrandy2018-01-03 22:56:172018-06-18 17:55:58The Future of Access Control
Hiring a company to place and manage a human guard post(s) tends to be compared as the alternative to remotely managed surveillance systems. They are generally more expensive, and also add the element of risk associated with using man instead of machine.
Many readers probably have some notion of the essential concept of what a “General Artificial Intelligence” (GAI) would be simply through pop culture and pop science exposure. A “GAI” would be capable of the type of problem solving that has eluded but intrigued computer scientists since before the inception of industrial computing; the very human ability to simply look at any problem and through trial and error and experimentation, simply “work things out”.
The type of software used in facial recognition is typically built around a machine learning architecture. To be able to perform a task where the computer looks at camera images of human faces and matches it against a massive database of known faces, the software needs to have the ability to change itself as it learns the intricate, seemingly intuition driven, differences between human faces.
The opportunity for “do it yourself” home automation has been made more available by the relatively recent introduction of devices such as “Google Home” and Amazon’s “Echo”. This change is in many ways co-occuring with the trend for home security to be more tied to the user’s smartphone and other devices serving as virtual extensions of themselves. Read more
http://securitytechnologyofsouthtexas.com/wp-content/uploads/2018/04/homeautomation.jpg349620handyrandyhttp://securitytechnologyofsouthtexas.com/wp-content/uploads/2018/04/STST-Logo_Mst_rgb_wName.svghandyrandy2017-12-01 22:21:542018-05-31 16:57:57Security and Home Automation
5G (or 5th Generation mobile networks) is the set of telecommunication standards beyond current so-called 4G/LTE. Aside from increased bandwith, lower latency, and lowering the cost of implementing existing 4th generation tech, 5g encompasses hardware focused elements of web communication. Lower battery consumption, or better batteries, will naturally need to accompany a technology with greater speed and overall capability.
http://securitytechnologyofsouthtexas.com/wp-content/uploads/2018/04/5G.png8001067handyrandyhttp://securitytechnologyofsouthtexas.com/wp-content/uploads/2018/04/STST-Logo_Mst_rgb_wName.svghandyrandy2017-10-16 22:16:502018-05-31 16:59:135G and Beyond: The Future of Networking
Security Technology of South Texas 1820 Grandstand Drive San Antonio, TX 78238 (210) 710-5881 • Toll Free (855) 688-2718