ADVERTISER'S INDEX
Advertiser
Page #
Website URL
Altronix ............................................................ 27 .............www.securityinfowatch.com/10212790
ASIS International ........................................... 35 .............www.securityinfowatch.com/10484004
Assa Abloy Inc. ................................................. 7 ..............www.securityinfowatch.com/10212899
Avigilon ............................................................ 21 .............www.securityinfowatch.com/10215735
Axis Communications ...................................... 2 ..............www.securityinfowatch.com/10212966
BCD Video ........................................................ 19 .............www.securityinfowatch.com/10455642
Comnet............................................................. 23 .............www.securityinfowatch.com/10215705
Dortronics Systems, Inc.................................. 47 .............www.securityinfowatch.com/10213494
DSX Access Control Systems ......................... 59 .............www.securityinfowatch.com/10214208
FLIR Systems, Inc. ........................................... 17 .............www.securityinfowatch.com/10213696
Genetec ............................................................. 9 ..............www.securityinfowatch.com/10213771
HID Global Corporation ................................... 60 .............www.securityinfowatch.com/10213866
Honeywell Security Group ............................... 3 ..............www.securityinfowatch.com/10213896
Ingersoll Rand Security Technologies ......... 1, 11 ...........www.securityinfowatch.com/10215684
Inovonics ......................................................... 33 .............www.securityinfowatch.com/10213994
IQinvision ......................................................... 25 .............www.securityinfowatch.com/10214086
ISC West........................................................... 41 .............www.securityinfowatch.com/10823593
Linear Corp. ..................................................... 15 .............www.securityinfowatch.com/10215766
Mercury Security Corp. ................................... 13 .............www.securityinfowatch.com/10214361
MorphoTrak ..................................................... 43 .............www.securityinfowatch.com/10215933
Morse Watchmans .......................................... 31 .............www.securityinfowatch.com/10214428
PSA Security Network..................................... 45 .............www.securityinfowatch.com/10214742
Samsung Techwin America ............................. 5 ..............www.securityinfowatch.com/10215711
Secured Cities ................................................. 51 .............www.securityinfowatch.com/10752984
Security Specifiers .......................................... 53 .............www.securityinfowatch.com/10300750
Videx ................................................................ 39 .............www.securityinfowatch.com/10215538
SOC Design
(continued from page 27)
Equipment that requires frequent
manipulation, such as a keyboard,
mouse, PTZ control, audio volume
adjustment, and a telephone dial pad,
must be reachable without undue
Figure 2
28
SECONDARY
(Maximum)
24
SECONDARY
(Emergency &
Precise Adjustment)
20
16
12
PRIMARY
Desktop
8
4
0
20
18
12
8
4
0
4
8
12
8
20
CONTROL REACH
strain. Figure 2 shows the typical limits of reach. Items that require the
most frequent reach ��� keyboard
and mouse, for example ��� should be
located in the primary area.
If alarm monitoring is the workstation���s priority, the annunciation
screen should be centralized in the
primary field of view, and the keyboard for alarm acknowledgement
and response logging should be
within easy reach for typing. All regularly used control switches, such as
those for door locks and gate operation, should be reachable without the
operator having to bend and stretch.
For example, a gooseneck microphone
www.SecurityInfoWatch.com
CLASSIFIED
Professional
Certifcation Programs
The International Foundation for Protection Offcers provides
recognized credentialing programs. Experienced security
professionals with a demonstrated knowledge of protection
concepts and practices may attain one of the following
designations: Certifed Protection offcer (CPO); Certifed in
Security Supervision and Management (CSSM); Certifed
Protection Offcer Instructor (CPOI). Foundation membership
for individuals and corporations is also available. IFPO provides
unsurpassed cost savings on an array of educational and
training programs offered by the Foundation and our affliates. Pave
the way to professional development.
Visit www.ifpo.org
or contact adminifpo@earthlink.net
or call 239-430-0534 today!
Request information: www.securityinfowatch.com/10214049
enables the operator to speak in a
calm, clear voice without having to
lean forward or shout.
If the priority is video surveillance
monitoring, any pan, tilt and zoom
controls should be close at hand.
Camera views for alarm assessment
can be relegated to secondary positions.
SOC Layout
Nearly all of the previous tips have
been related to individual monitoring
and control stations. The overall SOC
layout is a function of the number of
workstations. In a large SOC, a video
wall may provide common display of
camera images for all workstations to
see. A supervisor���s station is placed
behind the others and, if possible, on a
raised platform for the best overview of
the monitoring and control functions.
There are other functions that
may be included in the SOC for situational awareness ��� secondary fire
alarm annunciation, elevator controls,
weather status display, and news and
traffic reports. SOC design should
consider all potential information
sources for the optimum operation of
the security function. ���
David G. Aggleton, CPP, CSC, is president
of Aggleton & Associates (www.aggleton.
com). He is actively engaged in the design
of SOCs as a component of security technology solutions to mitigate risk & vulnerability since 1978. He can be reached at
dave.aggleton@aggleton.com.
Analyzing Big Data
(continued from page 10)
policing and intelligence-led policing (ILP)
have evolved, based on methodologies for
assembling data from disparate sources and
tools such as GIS, applying analysis, and
using the results to guide decision making. In moving from a reactive mode to
proactive, the hope is effective anticipation, leading to the prevention or response
to predicted crime. As these techniques
become more refined and proven effective,
the increasingly limited dollars available for
public safety can be better targeted, including risk-based deployment of resources.
There appears to be no shortage of data
or statistics, but, until now, these predictive
efforts have been limited by available analysis
techniques, hindering law enforcement���s ability to interpret and use the data. It is easy to
see how big data analytics will also be a major
tool in fighting fraud, credit card theft and
identity theft. This will no doubt encompass
access control data, both physical and network and ultimately affect the way Physical
Security Information Management (PSIM)
systems are implemented.
To sum it up, we���re on the threshold of
something BIG. ���
Ray Coulombe is Founder and Managing
Director of SecuritySpecifiers.com, enabling
interaction with specifiers in the physical security and ITS markets; and Principal
Consultant for Gilwell Technology Services.
Ray can be reached at ray@SecuritySpecifiers.
com, through LinkedIn at www.linkedin.com/
in/raycoulombe or followed on Twitter @
RayCoulombe.
SECURITY TECHNOLOGY EXECUTIVE ��� April 2013
57