Megapixel Cameras: A lesson in Arithmetic

Few people would disagree that today’s society is hyper-focused on technology. The continuous evolution of mobile devices, and the introduction of higher resolution mobile phone cameras with higher processing power has helped to foster a consumer market accustomed to purchasing a new mobile device every two years.

describe the imageThe security industry is no different. Surveillance cameras are continuously evolving to offer higher megapixel resolution than previously thought possible. In fact, there are currently surveillance cameras on the market today that offer 20 megapixels of resolution, a feat thought impossible only a few years ago.

As a result, systems integrators and end users are often times eager to install and deploy in their facilities the latest and greatest technology now available in the market. They want the best quality video image coupled with several weeks of video storage time.

However, each increase in megapixel resolution, or the addition of surveillance cameras, onto a system directly impacts the network design and configuration and have a direct impact on the recording and storage capabilities. This affects how many days you can keep recorded video, as well as directly influences bandwidth and how fast the data can be written onto a disk.

Because of this, security professionals need to keep a few things in mind when designing a surveillance system that involves megapixel cameras and requires multiple days of video storage.

First, it’s important to weigh the benefits of a higher megapixel camera over the requirements for the server and storage system. A system designed with megapixel cameras can provide the benefits of a surveillance project with fewer cameras overall, because one camera, in some cases, can now do the work of two. The consequences on the storage and server side, however, are also important considerations. As the result of adding higher megapixel technology, the storage solution deployed might not be adequate, requiring more hard disk space, which can dramatically drive up the overall cost of the system.

In addition the number of cameras attached to a server is impacted. Servers are rated at the max bandwidth (data rate) that can be managed. The higher the megapixel, the higher the bandwidth, the fewer cameras that can be connected to a single server thus increasing the number of recorders required. Selecting a recorder with a higher bandwidth capability provides the ability for growth with future megapixel cameras.

Secondly, don’t forget to define the result you are trying to achieve with a higher megapixel camera. It is easy to get caught up in all the excitement surrounding the better picture quality of a higher megapixel camera. If the original project specifications require only a 2-megapixel camera and you are now exploring a 5-megapixel camera, make sure you fully evaluate the reasons you are moving to a higher megapixel camera and weigh the benefits over the cost of the entire system.

An appealing functionality of megapixel cameras is the ability to dynamically allocate the bandwidth in the field of view. Cameras can be set with face detection (not facial recognition – just recognizing it’s a face in the camera field of view) and allocate more bandwidth/resolution to the face area than the walls or the sky. This can help maintain a lower bandwidth out of the camera without compromising on the ability to identify a face.

Designing a surveillance system that involves megapixel cameras becomes a lesson in arithmetic. Recognizing this, the industry has several resources available that enable security professionals to calculate the appropriate storage required based on the megapixels of a camera.

If you are implementing a megapixel based system, check out the American Dynamics NVR Storage Requirement Calculator.


What questions do you have regarding Megapixel cameras and storage required? Please leave your question in the comments area below.


Making metadata work for you

Imagine walking into a library in search of a particular book, but not having access to a card catalog — actual or virtual — to search for that specific volume.  You could spend hours looking for the manuscript.

But if you have access to a card catalog, you can search by author, title or subject and then, via the Dewey Decimal System tag associated with that book, find it in a matter of minutes.

metadata in security systemsMetadata, which is often defined as data about data, or data about content, is what allows you to find that specific information. The book has been categorized on many levels, from more general author and title information to the number of pages, the publisher and the date it was published.

Video recordings also have the advantage of exploiting metadata. When video is recorded, there is a general file — a video that was recorded at XYZ Corp. That’s the data.  Breaking that down further through the metadata embedded in the image files can help those who are looking to retrieve specific video moments within that larger file.

The video is associated with a text-based database, making it searchable by words such as date, time or activity: Find the “blue car” “exiting” the “parking lot” in the video from “November 8.”

All the information that is part of the metadata can be applied to a video analytics system, making it easier, faster, and more accurate to search existing video or, more importantly, set up the analytics so it can respond proactively.

By specifying certain activities related to the metadata — always show when a vehicle enters the parking lot after business hours, or send an alert when someone opens a fire exit — the user experience is enhanced. No one has to spend time looking at live video, nor do they have to scan through hours of recorded images to find a key incident.

Through the use of metadata, whether employing cameras, DVRs or NVRs, searches are faster than ever as the systems pull from a database of information and can pinpoint the specific event. No longer is there the question of if you have downloaded enough of the video, or if you have missed part of the action.

Just like cataloging in the library, the proper use of metadata in a video surveillance and analytics system will allow easier searching by proper criteria, as well as distinguish dissimilar items and provide accurate location information. And that should give you more time to go to the library and pick up that new best-seller.


What are some of the unique things that you search for in your video footage, using your video management system? Let us know by leaving us a comment below.


Appliances: A new take on an old term

Whether it’s a washing machine, a food processor or a coffee maker, an appliance is intended to perform a pre-defined task — cleaning clothes, chopping vegetables, making your morning cup of Joe.

AppliancesLikewise, appliances in the high-tech security world are those devices that are dedicated to executing specific operations without being bogged down by dealing with non-essential tasks. After all, you wouldn’t want your washer to also brew the coffee or prepare a smoothie.

Still, in the video management world, the primary option presented to customers is to buy a computer or a server, which can and does perform many functions, and install video management software on it. This computer, which likely uses a Windows operating system, is also churning through all the activities related to running, updating and managing that OS, taking functionality away from its primary focus — video management — and channeling it into other operations. Additionally, it is vulnerable to the myriad viruses and bugs that come with a standard operating system.

But in an appliance-based scenario, there is no external operating system. So while you can’t play Angry Birds or check your Facebook status on your new NVR, you’re also more secure and likely to achieve higher performance levels from this task-focused machine. That can be a boon to the customer who now can invest in fewer NVRs to accomplish the necessary surveillance and recording jobs.

Creating an appliance can be done with new or existing hardware, and neither needs to be the latest model since there are no operating system requirements. Other advantages to going the appliance route is not having to worry about OS upgrades or the burden of becoming an OS-certified technician as the operating system middleman is eliminated. Everything needed to run the system becomes embedded in the off-the-shelf computer/server.

And for the IT department, which is increasingly meshing with the security sector, working with appliances is familiar territory.  They already are comfortable with appliances such as routers and switches, so adding a security appliance to the mix isn’t out of their comfort zone.

We can all imagine the quality that would result from the washer-coffeemaker combo.  For that same reason, using dedicated appliances in the security field is an effective tool to streamlining video management and ensuring that the process is as efficient as possible.


Are there other ways you have streamlined your video management processes? Let us know by leaving a comment below.


Day Night Camera | Protecting Assets & Investments 24/7

day night cameraIt seems like surveillance cameras are everywhere we look these days. They are in the public park, at the mall, in the grocery store parking lot, and outside our office buildings. The presence of cameras has become more acceptable in our society, with many people recognizing the value and safety they bring.

Of course, the first thing many people think of when they hear the words surveillance cameras is that they exist as tools to protect people from the bad guy. While that is one of the most important benefits security provides, it is not the complete picture. For many businesses and municipalities the use of surveillance cameras has evolved to extend beyond personal safety to also include the protection of property and assets.

This transition has become necessary in recent years as companies and government agencies alike are faced with tighter budgets and the need to protect current investments in people and infrastructure. A perfect example of this is the County of Maui, Hawaii and their desire to not only safeguard its citizens and employees, but in particular the county’s million-dollar fleet of vehicles, from police cruisers to maintenance vehicles to vehicles driven by its building inspectors.

Originally, the county implemented a surveillance system to protect its critical infrastructure, including Five County Administration Buildings and the Water Department facilities. Later it expanded the surveillance program to reach other areas of the county, such as outside vehicle parking lots and the exterior of facilities housing maintenance equipment. The County turned to surveillance cameras to monitor their property and assets to be able to clearly identify anyone caught on video stealing a vehicle, tires or syphoning gas, which has happened in the past.

Without a doubt, protecting vehicles in a parking lot can be one of the most challenging tasks at hand in the security industry. Not only does the surveillance system being used need to reliably function in the bright sunlight, but it also needs offer superior low-light performance for the nighttime or highly cloudy days.

The market has seen the further development of IP-based day night cameras in recent years as security manufacturers have leveraged sensor, encoding, and processing power from the automotive and other industries. The result is the introduction of cameras that provide consistent image quality in a variety of outdoor environments for continuous 24/7 surveillance.

For the County of Maui, a careful review process and trial run of multiple surveillance cameras led them to select the Illustra 610 day night camera from American Dynamics. In the end, it came down to finding a solution that offered a reliable, low-light performance at an effective price.  

As end users extend the use of their surveillance cameras from beyond protecting people to protecting property, IP day night cameras are becoming a fiscally responsible solution of choice. 

Read more about the County of Maui’s deployment of IP day night cameras in the government solutions area of the Tyco Security Products website.


What other applications are you using a day night camera for within your environment? 

Security: There is an app for that

mobile security appsIf there is a smart phone in your pocket, purse or briefcase, then chances are you are also someone who has downloaded an app—or 10 or 20, or probably even more.

As mobile networks have advanced since their inception in the 1980s, so too have the capabilities of the devices we use. It’s pretty much standard practice today to have a built-in camera, GPS capability and voice activation in our smart phones. Apple, creators of the iPhone, offers more than 650,000 apps, which have been downloaded more than 30 billion times. And Android, the other leader in this field, is close behind.

In the security world, creating apps to go with the smart phones that travel with us wherever we go helps to extend the capabilities of existing security products, whether it’s a video management system or the software tied to an access control product. But the key goal in creating these apps isn’t to replicate what security professionals or even homeowners are doing on their desktops, but rather apps should be about creating a value-added user experience.

In some instances, that may mean using these apps, developed with security in mind, for non-security purposes. A retailer, for instance, who already has security cameras in place and is able to monitor them via a smart phone app, could also use this same video for monitoring inventory as it moves in and out of the stockroom, or for evaluating staffing levels at certain times of the day. Manufacturers could use those same security-developed apps for supervising product flow in the factory, or movement of those items within the warehouse.

Of course, anytime security is involved, there is a concern about protecting the information. Fortunately, those who are developing apps for the security field are ensuring that the proper authentication processes are in place.

So where are we likely to see the app world heading in the next few years, especially when it comes to security? Consider the concept of near field communications (NFC) —a standard whereby smart phones in close proximity can carry out transactions or exchange data. Developers are also exploring the use of a single app to bring multiple, independent systems together on a single platform, such as connecting video monitoring, event management and access control. This is an example of a great value-added for the end user, which is what apps should be all about.


What non security related tasks are you performing with a security-developed app? Leave us a comment below with your examples.


Considerations for Video Analytics in Retail

There was a time, just a few years ago, when many people thought video analytics for the retail market would give them all the information they could possibly need by simply plugging in a camera and pressing record. The promises did not live up to the hype and video analytics never saw the rapid adoption by the retail market that was anticipated at the time. Today, however, expectations have been reset and video analytics systems have become more sophisticated and technologically advanced. Though it is still not a plug-and-play world, video analytics can significantly empower retailers when they invest in the proper video infrastructure and take the time to understand how they want use the analytics.

Video Analytics RetailThe biggest key to success is being able to pinpoint exactly what you are looking for out of a video analytics program. This is particularly important because different applications call for different equipment, setup, and data. For example, if the loss prevention department is interested in employee theft or fictitious transactions at the registers, cameras should be placed with a clear line of sight to the register. On the other hand, if management wants to analyze the behavior of how long people are standing in the queue and which end cap displays are most effective; a wide-angle lens covering a larger field of view may be more cost-effective.

Loss prevention and sales/merchandising are the two main applications for video analytics in retail. With loss prevention applications, retailers must define their requirements as specifically as possible; for example, whether they are attempting to eliminate shrinkage from internal theft, external theft, or both. They should also decide if there are specific behaviors, such as loitering, that store personnel want notifications about; or if management is looking to understand transaction inaccuracies in specific cash registers. This isn’t a loss prevention application

Since a video analytics system is set up to collect a lot of data, a natural inclination for retailers is to use some of that data to understand their customers’ behavior. The biggest challenges for retailers with merchandising applications are determining the specific scenarios they want data for, as well as in what form they want the data. Who will be using the data is just as important as what data they want to see.

For example, does the marketing department want quarterly reports of the effectiveness of promotional events or end caps? In this case, they most likely do not want to see video clips, but rather reports from the clips that tell them how often customers visited the end caps compared with the transactional sales of those items during the specific period.

One final consideration for choosing the right video analytics program is to make sure the supplier and installing company have longevity and experience in these complex programs and will be able to support  the needs of the organization. Video analytics companies are in large supply, but not all of them may be around in another five years. Therefore, taking the time to find a supplier that meets the organization’s needs and will be available for a long-term partnership is the final piece of the analytics pie.

Let us know how you are using video analytics in your retail establishment (or want to) by leaving a comment below.


Video Management Software: Sized to fit

skechers logoThere are many factors that can make a security project particularly challenging—the size, the timeline, the special needs of the client, just to name a few. When lifestyle and fitness shoe giant Skechers unveiled plans for its new 1.8-million-square-foot distribution warehouse in Rancho Belago, Calif., size was certainly an issue to be dealt with. The new facility was replacing five smaller, existing warehouses and was being built with long-term usage and future expansion in mind.

But the distribution warehouse also bears the designation as a foreign trade zone (FTZ), and that in and of itself required some creative planning from a security standpoint. Without a doubt, operating as a foreign trade zone requires additional security functionality since it is subject to U.S. Customs Service supervision and security requirements. Product in an FTZ requires continuous tracking as it comes and goes, for the purpose of determining delayed or reduced duty payments, as well as for logistical and tax benefits.

With so much activity both inside and outside the warehouse requiring the supervision of security staff, Skechers’ loss prevention team needed a solution that  provided an intuitive, user friendly interface along with the ability to instantly replay recorded video in the event of an incident.

Greg Drivas, Director of Loss Prevention for Skechers USA, and his integrator, Select Systems Technology, selected the American Dynamics’ victor video management system as the backbone of the distribution center’s digital video recording solution. Through victor, Drivas and his staff can view, manage and control recorded video from the five VideoEdge network video recorders that capture video from more than 100 cameras both inside and outside of the facility. victor is also tied in with the building’s access control system, so if someone exits through the wrong door, a video of the mishap is instantly brought up on the screen.

Employing a highly responsive, highly functional video management software platform, at the level victor provides, keeps Skechers in synch with its Compliance Department to meet specific foreign trade zone security requirements. But it also has provided side benefits by allowing Skechers’ management to tap into the video for internal studies on productivity and product movement.

Video management has proven to be a powerful tool to help handle large volumes of live, streaming video. At the same time, it’s imperative for a video management system to still be easy enough to use for even the least technical security officer to set up views and archive video.

Security practitioners have recognized the many security and operational benefits made possible by video management systems. Regardless of whether the project is large-scale, such as Skechers’ 1.8-million square foot facility, or a local grocery store with a handful of cameras, today’s video management systems provide end users with scalable, customizable solutions that are easy to use and can meet current as well as future needs.

Find out more about how Skechers secured its massive new distribution facility and derived operational benefits out of its video surveillance system by reading the complete Sketchers case study.

What features of a VMS do you find most useful, let us know in the comments section below.


Security Basics: Making the most of the security you have

Security basics checklistAs security professionals, our goal is to make sure our clients are up-to-date on not only the latest technology, but also have the tools to understand what supporting systems they can use to make everything work.

In a recent webinar, “The key security features you aren’t using but should be to keep your business safe and secure,” Steve Lewis, senior product manager for Software House, focused on getting back to basics, taking participants through the various best practices for making sure safety and security are at their highest levels and operating properly.

If you’re interested in reviewing some security basics, especially in the context of our evolving world and changing security threats, watch Steve’s archived webinar.

learn-about-utilizing-your-security-syst (function(){ var hsjs = document.createElement(“script”); hsjs.type = “text/javascript”; hsjs.async = true; hsjs.src = “//”; (document.getElementsByTagName(“head”)[0]||document.getElementsByTagName(“body”)[0]).appendChild(hsjs); setTimeout(function() {document.getElementById(“hs-cta-844e6a6f-f470-4b5d-aad9-baa3438917df”).style.visibility=”hidden”}, 1); setTimeout(function() {document.getElementById(“hs-cta-844e6a6f-f470-4b5d-aad9-baa3438917df”).style.visibility=”visible”}, 2000); })();


What underutilized security task do you perform that others may overlook? Let us know in the comments area.


Multicast video transmission vs. Unicast video transmission methods

describe the imageMulticast video transmissionWhen looking for the most effective way to manage video in a security system, there are two often-discussed video transmission methods: Multicast and Unicast. Both have their benefits, but which is best for security applications?

Multicast is a method of one-to-many transmission which is often deployed in IP applications of streaming media. Multiple viewers can simultaneously tap into a single transmission from one source.

Television programming is a perfect analogy. When you want to watch HBO you tap into the HBO feed on the cable network, not to a dedicated signal of HBO. If your cable box is authorized, you get access to the existing stream of HBO on the cable network.

To benefit from Multicast, multiple simultaneous views of the same stream are required. For customers who have multiple operators viewing the same live cameras, Multicast may be a benefit.

However, in most security applications, Network Video Management Systems (NVMS) are used to view recorded video much more than live video, like reviewing video from a specific date and time, around an alarm event, or reviewing video as part of an investigation. Since all recorders, including the most advanced multicast-based recorders, are based on Unicast video streaming for playback, there really is no gain on operation performance by utilizing Multicast network.

To realize significant benefits from Multicast transmissions, a multicast-enabled network must be constructed to enable single stream replication on the IP network, making it available for every user looking to view it.

Multicast stream can only be used on the Local Area Network. Operators communicating over a wireless connection or over the corporate WAN will communicate using Unicast stream by default, and will not gain from the Multicast capability. In addition, IT departments are wary about enabling Multicast on their network due to security reasons, not to mention the cost associated with it.

Is Unicast a better option?

With Unicast transmission, every user in the network who would like to view video will receive a dedicated video stream from the Video Management System (VMS). Compared to Multicast transmission, Unicast does utilize more bandwidth; however, these streams are only required between the source and the “viewer”, and do not affect the entire network (as a Multicast transmission would.)

With VMS implementation of advanced video compression technology and the ability to maintain symmetric bandwidth management of video, users can manage multiple high-quality video streams on a Unicast network without the deployment of Multicast transmission.

To summarize, Multicast transmissions do offer the benefit of lower bandwidth consumption, but comes with higher network construction cost.  Unicast provide cost-savings on the construction of Multicast-enabled networks while maintaining real-time, low latency, high-quality video with adequate bandwidth management for all users on the network.

At American Dynamics, we believe in empowering customers to invest in enhancing their security systems rather than investing in the construction of new IT equipment. VideoEdge is a Unicast-based network video recorder. Unlike Multicast-based digital video recorders that are dependent on the network to manage the video streaming (the Multicast network managing video transmission), VideoEdge utilizes advanced network management techniques that provide higher operational performance.

Note: Most recorders that are dependent on the multicast network to manage the streaming have different performance levels (e.g. 200 or 300Mbps write to disk, while operating on a multicast network compared to 100 or 150Mbps write to disk, while utilizing Unicast network.) The main reason is that these recorders are now tasked with the video management and are not capable of symmetric bandwidth management.

VideoEdge’s advanced networking architecture manages the video in real time. When a user requests video, live or instant playback, VideoEdge responds with no latency. This advanced architecture does not strain the system resources and, as a result, the rack-mount VideoEdge Network Video Recorder maintains full performance of 400Mbps write to disk, 400Mbps video streaming to client, with the Desktop maintainng 50/50Mbps, while providing metadata generation on all cameras. This is accomplished with no video quality degradation or frame-rate loss, all the time on all cameras.


Have any questions about Multicast or Unicast video transmissions; post them in the comments section below.

Technology for Safer Schools

safer schoolsViolence in American schools over the past two decades has resulted in the real need for an increase in security technology in the school setting. Federal government initiatives like Safe Schools, Healthy Students have been created to bring together school officials, law enforcement, and surrounding community leaders.

Along with federal grants, these initiatives have helped generate a national awareness for the increase of school security technologies to help keep our schools safe. Be sure to read Cheryl Shea’s blog post, “Technology for Safer Schools”, on the Tyco Security Products Blog to see what types of technologies are being deployed in the school setting and how manufacturers like Tyco Security Products are working to meet the specific requirements and limited budgets of this industry.

What are your areas of concern regarding school safety, let us know by leaving a comment.

Tyco Security Products