CES 2013: An Infrastructure and Visual Revolution

Which technologies could one day influence the security world?


This is logical as infrastructure/service providers are focused on providing usable spectrum and storage to customers on a recurring revenue basis. With partner devices and solutions permitting intelligent use of the infrastructure’s resources, the creation of an ecosystem becomes the most powerful way to scale a growing service-based business.

 

1. Cloud Computing for the Masses

If last year’s CES showed a strong cloud adoption trend, this year established cloud computing as a standard. From services to lifestyle, the CE industry used cloud-delivered content, apps and intelligence just as the security industry continues adoption of hosted video and access control.

Need to manage your passwords? One unique USB-connected stick connects to a cloud-based password management program using fingerprint-activation. Only you can access your data, and if someone else makes multiple unsuccessful attempts, the content is automatically deleted. This could have great potential for the sharing of evidentiary video.

The cloud also became a way to brainstorm an issue at CES. Through a sophisticated keyword search engine, networked users either typed or voiced suggestions and ideas, and the cloud-based solution delivered back content matching the discussion. The effect is like having an expert on your team continually conducting searches based on previous research with results appearing and evolving in real time for all team members to see. The applications for security and intelligence for this tool are vast.

However, the way the cloud is used in consumer and small business devices and apps is the most significant. The Input-Analysis-Output cycle became a reality with many products and services at CES 2013. Data was fed into a cloud-based app, or “accumulator,” then processed and analyzed content was delivered to users via devices like smart phones, tablets, vehicles and appliances. The apps’ input could be sensor inputs of various types, processed in the cloud.

These inputs can track facial expressions for market research or be used to better serve autistic patients by interpreting their gestures. In the business of digital health, consumers can access and build a secure medical database about themselves to minimalize the constant questions posed to the often-unavailable caregiver.

There was even a fork that vibrated if you ate too fast!

In all cases, data is analyzed in the cloud, and the app then reports in detail — a wonderful way of dealing with the “big data” we have created in a security system. We’ve been enjoying the benefits of video content analysis (VCA) in the security industry, but now a new, disruptive model emerges that builds on this very powerful way of dealing with too much information in a short period of time: Cloud Processing.

 

Steve Surfaro is Strategic Channel Manager for Axis Communications. To request more information about Axis, please visit www.securityinfowatch.com/10212966.