Now live camera shots can be viewed from anywhere with no special software. All you need is a laptop, or even a cell phone.
Ten years ago we had VHS tapes that were fuzzy to say the least .Now all that has changed and the images are as clear as HDTV.
In a typical 4 camera system in a multiple dwelling residence we will have an outside street view camera, an elevator camera, lobby camera, and a service entrance camera. Also, a DVR and monitor for local viewing, and storage of the images. Should there be an incident these images are invaluable to the authorities they can compare these to other incidents and this helps to apprehend the perpetrators. Parking lot, premise surveillance and employee activities are popular applications.
As the technology advances a static IP address is no longer necessary (with its associated 150 plus a month charges) a dynamic (regular) IP address is sufficient.
When selecting a camera system vendor it is important to see the quality of the work and check the references carefully, as many have found out that as soon as 3 months after the installation, the pictures fade out and the use of low quality components becomes apparent.
A professional company will also offer a service agreement for a nominal charge as the system should be checked for clarity several times a year.
In a security system the main enemies of the miscreant are time and sound. A well-planed system will allow the intruder only a few minuets of time until the arrival of the authorities, and the siren will alert other staff of the problem. A combination of perimeter devices, space motion detectors and glass sound discriminators will deny access to the premise to the unauthorized.
Camera systems and alarm systems can now work hand in hand with the cameras being triggered to record on an alarm.
Access controls are based on electronic credentials, which allow entry into the facility.
In the past access was by a physical key, which could easily be duplicated.
With current access controls systems the management company can dial into the system remotely and add or delete users. Unactivated credentials can be held on site and activated as necessary.
In high security applications the control is set up 3 ways:
1. With something you have, i.e. an electronic key fob, or swipe card.
2. With something you know -- idea numerical pass code.
3. Biometricly - with your thumb print.
Any combination of or all three of the above to allow entry.
After swiping your key fob you would hold your thumb on the reader while putting in your pass code. This, of course, is the ultra-high security mode.
The combination of an alarm system, cameras and an access control system will be able to secure all types of facilities
Protection Systems Inc. maintains services and installs all the intrusion and camera systems for the 3,200 New York City public schools for the department of education.
Paul Lust is the operations manager of Protection Systems Inc, Bayside, N.Y.
Thanks for Reading!
You've read 2 of your 3 guest articles
Register and get instant unlimited access to all of our articles online.
Sign up is quick, easy, & FREE.
Subscription Options
Sign up is quick, easy, & FREE.
Already have an account? Login here