Home > Event Management, Intelligent Video, Peak Performance, PSIM, Trends > The deluge of data: It’s not just stuff, it’s information!

The deluge of data: It’s not just stuff, it’s information!

Psim_event_2 The physical security industry has had a love hate (mostly hate) relationship with the concept of data.  We like to think in terms of events (door openings) or video streams.  It usually doesn’t cross our minds that those things are actually data.  Especially if it is digitized on a hard drive or through a video encoder.  If only we could get it through our thick skulls (thickened by doing things pretty much the same way for the last 700 years), then we could realize the tremendous benefits of data management.

What did you do the last time you were faced with millions and billions of bits of information?  You organized it and made sense out of it and made use of it with computer software.  Applications like word processors and Internet browsers take that overwhelming volume of data and turn it into pictures of your kids, emails to your boss, or magazine columns like this one.  It is the most natural thing in the world and one of the most common ways we add value to our personal lives and to our business.  So why not do the same with access control, video surveillance, event management?

If you had been a part of the SecurityDreamer PSIM technology summit in Bethesda Maryland on June 4th, you would have come to an epiphany or two about the power and potential of the data at our disposal.  That deluge of data is ready to be organized by some very cool software available today from companies like those that sponsored the event. Vidsys’ situation management console that aggregates and correlates data from dozens of sources; Cernium’s analytics digest video into action packed moments of interesting information; Vialogy’s software translates just about any kind of sensor into a data source; Axis Communication’s network cameras turn video images into data at the source; and Cisco’s video transmission and management infrastructure speeds the flow of access and video event data across any network.

You have all the tools at your disposal to turn the “stuff” of security into information for your business.  So do it already!

Advertisements
  1. June 10, 2008 at 10:13 am

    Hunt Business Intelligence has a keen sense of where the evolving converged security industry needs to focus. Steve, you, made it fun, interesting, collaborative and challenged people to put a bloom on your PSIM rose. This is evidenced by the growing number of companies casting their lot . No question that PSIM matters. Steve’s spawned the 5th A, and the power of analysis. There are many applications (6th A..) that can leverage the fact that everything and everyone will be an IPv6 address (7th…) on the network, it’s in full swing on the logical side already. The HuntBI events are a very cool way (and one of the very few) to get into these discussions and I look forward to continuing the conversation. Thanks to all involved.

  2. June 10, 2008 at 8:10 pm

    Thanks, Sal. The other A’s Sal referred to are Authentication, Authorization, Administration and Audit – the four fundamental categories of security. Adding analysis (and applications) are modern ways to extract maximum value from any security investment.

  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: