NEC Developing Facial Recognition Platform for Star Alliance Frequent Flyers

facial recognition, FAA, airlines (image)#NEC Developing Facial Recognition Platform for Star Alliance Frequent Flyers | #TpromoCom #FacialRecognition #Airline #Security | The opt-in platform will allow passengers of Star Alliance’s member airlines to move through various checkpoints without the need for a passport or a boarding pass, using only biometric authentication to enter lounges or pass through boarding gates and check-in kiosks at participating airports.

The proposed system is expected to launch in the first quarter of 2020. Star Alliance members will be able to let their passengers use a mobile device to enroll in the program, and the latter will only need to do so once to enable biometric authentication when flying with any Star Alliance airline at an airport that supports the biometric technology.

To read this news story, click here!

Global in scope, airline oriented (image)

Human Investigation Management – ISIO
Human Investigation Management – ISIO. Find out more by clicking!
Please follow and like us:

N95 Masks and the Coronavirus: More Production Underway

Honeywell producing N95 face masks (image)

N95 #Masks and the #Coronavirus: More Production Underway | #TpromoCom #Pandemic | To address growing demand of masks during the outbreak of the coronavirus disease, COVID-19, Honeywell is quickly ramping up production and making millions of the N95 masks in the United States.

We are expanding manufacturing operations in a factory in Smithfield, Rhode Island, which also produces UVEX safety glasses.

To read more of this informative news article, click here.

divider bar (image)

Verdafero, Alarm Dealers and Security Integrators (image)and

Alarm Companies Play Major Role in Protecting Corporate Utilities | #Verdafero #AlarmSystem #Security #PowerFailure | Building security and management is becoming an ever increasing challenge as hackers and other bad actors grow in their ability to penetrate IT networks. Monitoring a variety of building utilities augments building management efforts while assuring the security and well being of critical business data. Find out more by watching this video: https://youtu.be/wPkRlZgGGe4

Please follow and like us:

Incident Management Protocols – Covid19

ISIO logo (image)

Incident Management Protocols – Covid19 | #ISIO #COVID19 #EmergencyManagement | Regardless of size of the region of interest, be it a country or company, the HR and Security must work together by assessing their own incident reporting from the ground to fully comprehend their own narrative.

Security success to limit the Covid19 collateral damage will depend on the level of situational awareness of the people on the ground and their reaction speed. The security officers on the ground are first line of defence.

Furthermore, they are also the ones that gather information from the people on the ground.

1. Find a person of concern
2. Establish who they have been in contact with

Considerations for Protocols

    • The HR manager may be notified of a person that is on sick leave.
      The reason of the sickness needs to be qualified and validated.
      Hopefully, the person discloses the truth of their sickness.
    • If the person has contracted covid19, then, the security manager
      must now use access control and cctv to trace the interactions
      the person had with others.
    • One may need to install analytical software with facial recognition
      software to assist in the search.
    • There may be thermal detectors installed in the cctv software but that
      will only be effective once a person’s condition goes into full-blown
      status. The objective of the tracing of others is to detect the social
      interaction chain of people!
    • The cctv and access control records of the last 14 days since the sick
      person reported must be viewed
    • The tracking must be from entry from just outside perimeter
      security. Perhaps, the person arrived at work with different people
      from different departments and separated once they walked through
      perimeter security
    • The people that interacted with the person of interest, now have to be
      put on the top of the health monitoring list for at least 14 days.
    • The Security Manager cannot simply rely on the cctv or access
      control technology because not all areas are under surveillance. They
      would need to go on the ground to critical situational interview
      possible people of concern that interacted with the sick person.
      However, people may not be forthcoming with information for
      various reasons mentioned herein.

Getting the most out of incident management software or incident reporting

The practitioner must read the situation using critical thinking outside and inside the box. The mission is to gather all-the-information from the people on the ground which calls for deception detection and critical situational interviewing because people do lie, hide information for a number of reasons. Quick Situational Security Awareness interviewing using critical thinking is key!

Do view this entire protocol document and others besides guidance
articles on ISIO.

Alison online courses (image)Free study courses, pay only for the certificates.

 

Please follow and like us:

Government Mandates Require Energy Consumption Reports

Security dealers and Integration firms need to look closely at the recurring revenue opportunities that await them if they but look at their present client list. Local and state governments in some locales have or soon will pass legislation that mandates the submission of periodic energy consumption reports. It’s imperative for these clients to have the means of tracking consumption over a period of time in order to comply.

The following is an example where the city of Minneapolis now requires energy consumption reports:

The energy use intensity of larger commercial buildings in Minneapolis declined by 5.5% | #Verdafero #EnergyConsumption #Government #Monitoring | As more Minnesota cities take steps to require building energy benchmarking, evidence suggests that the state’s first such policy is helping to nudge energy consumption lower. https://lnkd.in/ebiAym6

You can offer the necessary data through your Central Station Services! In a word, “Stop leaving money on the table” when you sell central monitoring station service. In the case of existing customers, reach out to them so they know you have it, and do it regularly so when their own city of residence demands such a report, they will think of you!

So, where can you go to integrate your CMS with smart meters in order to provide this data. In addition, you can provide real-time monitoring services so your client can be alerted to abnormal conditions that can occur in any utility, be it electrical, natural gas, heating oil, and other utilities. Real-time conditions are acted on by your CMS as well as automatic PUSH data to your client’s mobile device.

Find out more about it by watching this video:

Verdafero provides a Cloud-based SaaS (Software as a Service) designed to provide Security Dealers and Integrators with the means to monitor utility usage.

To find out more, download this white paper: Using Utility Monitoring & Analytics as a Security Business Driver.

Verdafero (image)

Please follow and like us:

Risk of heightened cyber crime on “as a service” models

Risk of heightened cyber crime on “as a service” models | #TpromoCom #Cyber #CyberSecurity #CyberCrime | Cipulse 2020, is the annual threat landscape report from Cyberint a provider of threat intelligence-led detection.  

Security World Market (image)

It reveals the growing e-crime economy, the increasing prevalence of attacks in the financial services, retail, and government sectors, and in-depth analyses of adversarial tactics, techniques, and procedures (TTPs) used against the different regions and industries.

According to the Cyberint the financial industry is the most targeted industry worldwide, accounting for more than one third of all targeted attacks, and the retail industry is the third most targeted worldwide, behind manufacturing in the Americas and government targets in APAC and EMEA.

Banking trojans top the most prevalent malware families observed during 2019, and the volume of attacks is increasing due to the sale of “As a Service” platforms allowing less sophisticated attackers access to more complex tools for as low as several US dollars a month.

To read the remainder of this news article, click here.

[image] TpromoCom provides affordable websites & blogs.
TpromoCom provides copywriting services, websites & blogs, Social Media Services, and more. Call us at 330-956-9003, or email TpromoCom@CyberServices.com.

 

Please follow and like us:

Artificial Intelligence in the News – 26Nov2019

The current trend in tech, no matter what the venue, is Artificial Intelligence (AI) | #TpromoCom #ArtificialIntelligence #AI #HealthCare | Fashionable and trendy, the use of AI in society is looked upon as progressive and modern, not to mention smart and intelligent. No matter what the facts may be–whether AI’s the savior or the destroyer of mankind–everyone wants it, and they want it now.

The Future is Now! (image)

The future is now!

One of the reasons why corporations and governments across the globe are sure to continue their efforts to develop AI is the fact that this tech is capable of reading, sorting, assessing, analyzing, and logically, systematically reporting on huge quantities of data–commonly called Big Data.

But, will corporations and governments stop with Big Data? Let me take a guess… “No!” and let me tell you why, because AI is capable of so much more.

–Allan B. Colombo

The following is a quick look at AI in the news:

divider bar (image)

Can Artificial Intelligence Cure What Ails The Healthcare Industry? | Personal healthcare experiences often spark pioneering cures, and Pinaki Dasgupta, CEO of Hindsait, is no exception. After two immediate family members weathered serious health issues, Dasgupta brought his digital expertise in manufacturing to the healthcare industry. Click Here!

divider bar (image)

Stanford-led snapshot of artificial intelligence reveals challenges | A periodic review of the artificial intelligence industry revealed the potential pitfalls of outsourcing our problems for technology to solve rather than addressing the causes, and of allowing outdated predictive modeling to go unchecked. As part of Stanford’s ongoing 100-year study on artificial intelligence, known as the AI100, two workshops recently considered the issues of care technologies and predictive modeling to inform the future development of AI technologies. Click here!

divider bar (image)

Top Artificial Intelligence (AI) Predictions For 2020 From IDC and Forrester | IDC and Forrester issued recently their predictions for artificial intelligence (AI) in 2020 and beyond. While external “market events” may make companies cautious about AI, says Forrester, “courageous ones” will continue to invest and expand the initial “timid” steps they took in 2019. Click Here!

divider bar (image)

Can Artificial Intelligence Learn to Learn? | As businesses integrate Artificial Intelligence into their systems, technology professionals are looking at a new frontier of AI innovation. This is in the area of Meta-Learning. Meta-Learning is simply learning to learn. We humans have the unique ability to learn from any situation or surrounding. We adapt our learning. We can figure out how we can learn. To acquire this kind of flexibility in learning, AI needs Artificial General Intelligence. Click Here!

divider bar (image)

Artificial Intelligence: Humans could one day marry robots and ’emotionally’ bond with AI | PEOPLE will increasingly bond with artificial intelligence (AI) in the coming years and give the green light to marriage between man and machine, a philosopher has spectacularly claimed. The bizarre prediction was made by Dr Maciej Musiał from the University of Adam Mickiewicz in Poznan, Poland. Click Here!

Western Magazine Digest (image)
A great source of information related to our nation’s historic beginnings.
Please follow and like us:

UAV’s in Conventional Security: Will It Happen?

TpromoCom (image)
Professional Content and Social Media Services
UAV’s in Conventional Security: Will It Happen? | #TpromoCom #Drone #UAV #Security | The use of Unmanned Aerial Vehicles (UAV’s) in conventional security is almost a given when you stand back and look at the solution itself and what it can do to assist corporations as well as municipalities. Possibly one of the biggest hurdles that lie ahead of us, however, is public perception of its use and the intent behind those using it.

The following are a collection of news items that center on the use of UAV’s (i.e. Drones) in a variety of settings. The first is an article in #SDMag that touches on the current state of the industry in conventional security. Frankly, it’s well done and thoroughly researched. Case studies provide an in-depth look at how it’s being used, and surprisingly enough, we learn from Ford Motors that their use of drones has more to do with assisting security personnel than replacing them. Take a look. –Al Colombo

divider bar (image)

SDM Magazine (image)
The Security Industry Is Ripe for Disruption & Drones Might Be What Does It | #TpromoCom #Drone #Security #Safety | The security industry’s use of drones has exploded in the past 12 months, making adoption lightning-fast for an industry known as a bit of a dinosaur. If you haven’t started offering drone solutions for your customers, you’re already late. Click It!

divider bar (image)

Army Tech (image)
Alpha 800 Unmanned Aerial Vehicle (UAV) | #TpromoCom #Army #Drone #UAV | Alpha 800 unmanned aerial vehicle (UAV) is manufactured by Alpha Unmanned Systems (AUS). The unmanned rotorcraft is configured to perform multiple tasks including reconnaissance, surveillance, inspections, and delivery of emergency supplies.

The medium-range platform is designed for surveillance and target acquisition and is capable of detecting surface targets in all weather conditions. Click It!

divider bar (image)

Defense One (image)
Did the White House Use Drone Killing Technology? | #TpromoCom #WhiteHouse #Drone #Kill | At about 3 a.m. on Monday morning, a small quadcopter drone, or unmanned aerial vehicle, crashed on the White House lawn. White House officials said that the drone, by itself, was unarmed and didn’t represent a threat. Authorities quickly located the owner, a government employee, who has managed (so far at least) to convince the Secret Service that he made an innocent mistake flying his drone outside of the White House in the wee hours of the morning. Click It!

divider bar (image)

Government Executive (image)
The Endless Aerial Surveillance of the Border | #TpromoCom #Border #Police #Security | New reports suggest that drone activity at the southern border is spreading to nearby cities, erasing the line between police procedures and immigration enforcement.

A collaboration between journalism students and the Electronic Frontier Foundation, a civil-liberties group, probes this deceptively simple question. Click It!

divider bar (image)

Wall Street Journal (image)
Tackle Box for the Modern Fisherman: Rod, Reel, Drone | #TpromoCom #Drone #Fishing #Angler | Anglers use the flying machines to drop bait where the big fish swim; ‘Lots of things could go wrong.’

When fisherman Robbie Riches laments the ones that got away, he means his $1,000 drones. Click It!

divider bar (image)

Drone Life (image)
European Drone Regulations: The EASA High Level Conference at Amsterdam Drone Week | #TpromoCom #EU #Drone #Regulations #Event | Europe’s leading drone conference, Amsterdam Drone Week, takes place December 4 – 6: and the EASA High Level Conference on drones meeting there could have a major impact on the global drone industry. Click it!

divider bar (image)

Human Investigation Management – ISIO
Human Investigation Management – ISIO. Find out more by clicking!

Please follow and like us:

Chinese AI unicorns target smart cities & public security

Security World Market (image)

Chinese AI unicorns target smart cities & public security | #TpromoCom #AI #Military #Chinese | According to research company, Memoori, in a bid to be at the forefront of the technology, China is pouring billions of dollars into companies that are researching AI technology, with video analytics and IoT platforms for smart cities being two of the prime applications.

Memoori estimates that China accounts for approx. 31% of global physical security revenues and says that it is now the biggest single country market for physical security products having increased its share by almost 50% in the last 7 years.

Video surveillance equipment has been the major contributor here, with the market growing rapidly through a boom in new construction and safe city projects in the public sector. Hundreds of cities in China, large and small, have jumped on the smart cities bandwagon, as advocated by Beijing, and have established budgets to support such initiatives.

To read the remainder of this story, click here.

Human Investigation Management – ISIO
Human Investigation Management – ISIO. Find out more by clicking!
Please follow and like us:
Social Share Buttons and Icons powered by Ultimatelysocial
error

Enjoy this blog? Please spread the word :)