April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

Federal | Agencies | Legislative

Swimlane Achieves Integration With McAfee® ePolicy Orchestrator® Through The McAfee Security Innovation Alliance

LOUISVILLE, Colo., Dec. 7, 2017 -- Swimlane, a leader in Security Automation and Orchestration (SAO), announced today that it has achieved technical integration of its SAO platform with McAfee ePolicy Orchestrator (ePO™) technology, enabling customers to deploy more robust security solutions and better protect their assets from ever-evolving cyber threats.

As a member of the McAfee Security Innovation Alliance, Swimlane plays a critical role in the program's mission to accelerate the development of interoperable security products and simplify product integration within complex customer environments, delivering joint customers better value and more protection against the growing threat landscape. With this integration, Swimlane and McAfee address a rising industry need to shorten response times from security events and more easily remediate compromised systems, leading to a simplified Threat Defense Lifecycle.
"Swimlane streamlines operational efficiency, lowers incident response times, and improves security by integrating with best-of-breed solutions like McAfee ePO," said Cody Cornell, CEO and founder of Swimlane. "Through integration with McAfee ePO, Swimlane and McAfee now provide our joint customers with highly automated incident response and interoperability with other security platforms. By automating the workflow and response, Swimlane and McAfee joint customers can now respond faster and more consistently to a broad range of advanced attacks that are targeting their endpoints."
Swimlane helps organizations get the most out of existing resources by automating time-intensive, manual processes and operational workflows in real time. An API-first architecture, extensive out-of-the-box integrations and pre-packaged templates allow organizations to quickly enable orchestration across their entire security infrastructure. Swimlane delivers powerful analytics, real-time dashboards and key performance reporting to maximize the incident response capabilities of over-burdened and understaffed security operations teams.
With the integration of McAfee ePO technology, customers can now automatically initiate incident response workflows to address alarms. Importing configuration data from the McAfee ePO database into Swimlane delivers consolidated event details tied to potential endpoint attacks. This data can be correlated against additional event details pulled from multiple platforms for rapid investigation and triage. Swimlane can also apply tags from the McAfee ePO console to specific endpoints for immediate policy enforcement to help facilitate faster incident response and a greater return on investment from the entire security infrastructure.
"We're pleased to see Swimlane complete McAfee compatibility testing with ePO to meet multiple use cases that will help joint customers address threats faster and more efficiently," said D.J. Long, head of McAfee Security Innovation Alliance. "With this integration, joint customers will reap the benefits of reduced operational costs, greater protection and improved compliance."
About Swimlane
Swimlane was founded to deliver innovative and practical security solutions to organizations struggling with alert fatigue, vendor proliferation and chronic staffing shortages. Swimlane is at the forefront of the growing market for security automation and orchestration solutions that automate and organize security processes in repeatable ways to get the most out of available resources and accelerate incident response.
www.swimlane.com
Swimlane and the Swimlane logo are trademarks of Swimlane LLC in the United States and other countries.
McAfee, ePolicy Orchestrator, ePO and the McAfee logo are trademarks of McAfee, LLC in the United States and other countries. Other names and brands may be claimed as the property of others.
McAfee technologies' features and benefits depend on system configuration and may require enabled hardware, software, or service activation. Learn more at www.mcafee.com. No computer system can be absolutely secure.  Cost reduction scenarios described are intended as examples of how a given McAfee product, in the specified circumstances and configurations, may affect future costs and provide cost savings. Circumstances and results will vary. McAfee does not guarantee any cost reduction.

ThoughtWorks Names New Board of Directors Members

Today, ThoughtWorks, a global software development and digital transformation consultancy, is proud to name three new members to its Board of Directors: Jane Chwick, William G. Parrett and Dr. Anita Sands.
This announcement comes as ThoughtWorks is approaching 25 years of revolutionizing software design and delivery, while advocating for positive social change. The three new members, with their variety of experience across multiple industries, strengthen ThoughtWorks leadership as the company continues down the path of double digit growth.
“Each individual brings a unique perspective to our board,” said Guo Xiao, Chief Executive Officer, ThoughtWorks. “Jane Chwick’s proven record creating and implementing high-value, long term strategic initiatives will benefit our next phase of growth. Bill Parrett’s global business experience is a perfect fit for the increase in cross border collaboration clients are demanding and our global footprint. And Dr. Sands, with her extensive experience driving technology innovation and organizational change, will provide great insights into how we can become better change agents for our clients in their strategic transformations. I have great confidence that under their guidance, ThoughtWorks will become the partner of choice for enterprise organizations grappling with complex digital transformations.”


About the Members of the Board
Jane Chwick
Ms. Chwick was a partner at Goldman Sachs where she had a 30-year career in technology, most recently as Co-Chief Operating Officer of the technology division. In this role, she was responsible for financial and business planning, setting the technical strategy and management of an 8,000-person organization within the firm. Ms. Chwick was also the Co-founder and Co-CEO of Trewtec, Inc., providing Corporate Directors, CEOs and Chief Technology Officers with vital information they need to improve their oversight of a company's technology function. Ms. Chwick currently serves as a director of Voya Financial, a financial, retirement, investment and insurance company; People’s United Bank, the largest regional bank Headquartered in New England; and MarketAxess, the leading fixed income electronic trading platform for institutional investors and dealers.

William G. Parrett
Mr. Parrett is a former Senior Partner of Deloitte & Touche USA LLP, a public accounting firm. Mr. Parrett retired in 2007. From 2003 to 2007, he served as the Chief Executive Officer of Deloitte Touche Tohmatsu (DTT). Prior to serving as Chief Executive Officer of DTT, he was Managing Partner of Deloitte & Touche USA since 1999. Mr. Parrett joined Deloitte in 1967 and served in a series of roles of increasing responsibility. Mr. Parrett currently serves as a director of The Blackstone Group L.P., an investment and advisory firm; Thermo Fisher Scientific Inc., a provider of analytical and laboratory instruments and products; Conduent Corporation, a business process services company. Additionally, Mr. Parrett is Past Chairman of United Way of America and of the United States Council for International Business.

Dr. Anita Sands
A Fulbright and O'Reilly Scholar, Dr. Sands began her banking career in 2004, handling derivatives analysis at Canadian Imperial Bank of Commerce, Canada's fifth largest general bank. She then joined the even larger Royal Bank of Canada and was the youngest-ever Senior Vice President at the Royal Bank of Canada as the Head of Innovation & Process Design. After moving to New York City to work as Head of Transformation for Global Technology and Operations at Citigroup, she joined UBS Wealth Management, where at the age of 33, she was appointed Chief Operating Officer responsible for technology, operations and corporate services. Currently, Dr. Sands is on the board of directors of three public companies including Symantec Corporation, a member of the F500, and the world’s leader in Cyber-Security; Service Now, an enterprise SaaS service management company; and Pure Storage, a leading innovator in the enterprise storage space. She is also an active investor and serves on the advisory board of Grand Central Tech—a leading New York-based technology incubator - as well as the Dean’s Advisory Board at Heinz College, CMU. She is a member of the Advisory Board at DocuSign and Accompany, as well as a member of the Digital Advisory Board at Box.

 

About ThoughtWorks
We are a software company and a community of passionate, purpose-led individuals. We think disruptively to deliver technology to address our clients' toughest challenges, all while seeking to revolutionize the IT industry and create positive social change.

Cook County Official Joins Cyber, DHS and National Security Leaders to Unveil First-Ever "Voting Infrastructure Security Plan"

CHICAGO, Dec. 7, 2017 -- Today, DEFCON – the world's largest, longest running hacker conference – joined forces with the University of Chicago's Harris School of Public Policy to host an event on cybersecurity and U.S. elections infrastructure. The event featured a panel of leaders from the cyber industry, the U.S. Department of Homeland Security (DHS), and the national security community. It also featured the release of an "Election Security Plan" authored by Noah Praetz, Director of Elections with the Cook County, IL Clerk's Office.

Mr. Praetz's Election Security Plan represented the first-of-its-kind to be put forth by a local official since news broke that Russia attempted to infiltrate voting networks in at least 21 U.S. states during the 2016 election. The plan outlines several strategies for stakeholders to better defend, detect, and recover from cyber threats aimed at voting equipment, systems, networks and databases. Specifically, it describes "a challenging, comprehensive, yet achievable list of actions" for both federal leaders to support the more than 9,000 voting jurisdictions around the country, as well as the responsibilities of state and local officials.

"This is a critical time when Americans need to be reassured that their vote is secure – and I am proud that my election administration colleagues at the state and local level are the ones serving valiantly on the front lines," said Praetz, underscoring the need for local action backed by federal support. "Like good servants, these officials will tell you they can continue to hold the line.  But they need to be fortified by resources from the federal government, and they need guidance in terms of what line they even can hold."

Today's event comes at a time when leaders are increasingly referring to election security as a national security priority. In early 2017, the U.S. Department of Homeland Security designated elections as a critical infrastructure subsector, giving the federal government more authority to take action. Sean McCloskey from the DHS's Office of Cyber Security and Communications participated in the event, highlighting DHS's current role with the Elections Security Task Force. Less attention has been placed, however, on the perspectives of state and local officials.

"Recently, we've seen a groundswell of bipartisan national security and cyber leaders uniting to frame the problem and highlight what Russia or other nefarious actors could do to our democracy," said Jake Braun, a cybersecurity lecturer at University of Chicago and DEFCON Voting Village representative who emceed the event. "Now its encouraging to see state and local leaders like Mr. Praetz – and many others who helped influence his plan – coming together to offer solutions. With the full funding and resources to do their job, there's no question they can better secure our democracy for 2018 and beyond."

The event, which was held at the historic International House on University of Chicago's campus, represented the third in a series of high-profile events hosted by DEFCON to build awareness around cyber vulnerabilities facing our democracy. Earlier this year, in response to Russia's cyberattacks in 2016, DEFCON hosted a "Voting Village" demonstration at its annual conference in Vegas. The Village assembled 25+ pieces of election equipment – including voting machines and pollbooks still widely used in U.S. elections today – and made them accessible to 1000+ hackers who were encouraged to test the technology and expose cyber vulnerabilities for educational purposes.

full report on the Voting Village's findings is available online.

View PDF
Media Contact:
Jaclyn Houser
517-420- 4372
or [email protected]

The Global Passenger Security Equipment Market Is Expected to Reach $79,042 Million in 2023, from $43,398 Million in 2016, Growing at a CAGR of 8.9% from 2017 to 2023


LONDON, Dec. 6, 2017 -- Passenger Security Equipment Market by Transport Infrastructure (Airports, Train Station, Bus Stations, and Seaports) and Type (Baggage Inspection System, Explosive Detection System, Video Surveillance, Intrusion Detection and Prevention System, Fire Safety & Detection System, People Screening Systems, and others) - Global Opportunity Analysis and Industry Forecast, 2017-2023
Download the full report: https://www.reportbuyer.com/product/5228628

The global passenger security equipment market is expected to reach $79,042 million in 2023, from $43,398 million in 2016, growing at a CAGR of 8.9% from 2017 to 2023. Passenger security refers to a technique, which helps them protect from accidentals harms, crimes, and other threats. Such procedures help the government to avoid any crimes and allow passengers to travel from one place to another without any harm. Honeywell International, Orbocomm, and L-3 Communications are some of the leading key players of the passenger security equipment market.
Increase in terror attacks on public transport infrastructures drives the passenger security equipment market growth. Further, rise in demand of biometrics technologies for identity verification by the government also fuels the market growth. However, high installation cost is anticipated to hinder the passenger security equipment market during the forecast period.
Based on type, the global passenger security equipment market is categorized into baggage inspection system, explosive detection system, video surveillance, intrusion detection and prevention system, fire safety & detection system, people screening systems, and others. The people screening systems segment dominated the global passenger security equipment market, in terms of revenue, and is expected to maintain this trend.
Honeywell International, Orbocomm, L-3 Communications, Kapsch, Siemens AG, Rapiscan Systems, Rockwell Collins, Safran Group, Raytheon Group, and Smiths Group are some of the leading key players of global passenger security equipment market.
KEY MARKET SEGMENTS
BY TRANSPORT INFRASTRUCTURE
Airports
Train Stations
Bus Stations
Seaports
BY TYPE
Baggage Inspection System
Explosive Detection System
Video Surveillance
Intrusion Detection and Prevention System
Fire Safety & Detection System
People Screening Systems
Others
BY REGION
North America
U.S.
Mexico
Canada
Europe
UK
Germany
France
Rest of Europe
Asia-Pacific
China
Japan
India
Rest of Asia-Pacific
LAMEA
Latin America
Middle East
Africa
KEY PLAYERS
Honeywell International
Orbocomm
L-3 Communications
Kapsch
Siemens AG
Rapiscan Systems
Rockwell Collins
Safran Group
Raytheon Group
Smiths Group
The other players in the value chain include (profiles not included in the report):
Anixter
Avigilon
Harris
HID Global
Lockheed Martin
Northrop Grumman
Download the full report: https://www.reportbuyer.com/product/5228628
About Reportbuyer
Reportbuyer is a leading industry intelligence solution that provides all market research reports from top publishers
For more information:
Sarah Smith
Research Advisor at Reportbuyer.com
Email: [email protected]
Tel: +44 208 816 85 48
Website: www.reportbuyer.com

Raytheon and Pivotal to accelerate cloud migration and speed software development for the Federal Government

SAN FRANCISCO, Dec. 5, 2017 -- Raytheon Company (NYSE: RTN) and Pivotal Software, Inc., today announced that Raytheon has joined the Pivotal Ready Partner Program to assist the Department of Defense to develop software capabilities to more rapidly bring new technology to the military. The agreement establishes an important relationship that will help the DoD migrate legacy applications to the cloud and accelerate software development and delivery timelines.

"This partnership marks the end of 'business as usual' for defense contractors," said Todd Probert, vice president of mission support and modernization at Raytheon Intelligence, Information and Services. "The software enabled battlefield of the future demands new tools for the modern warfighter. Raytheon's deep mission knowledge and expertise in systems and software combined with Pivotal's innovative processes, tools and speed will change the way our military harnesses the power of technology."


Pivotal Cloud Foundry brings a software-led digital transformation to its customers. Through its cloud-native platform, Pivotal has helped hundreds of commercial customers, and recently the DoD, modernize their legacy systems, significantly improving delivery time and generating millions in cost savings.


"Today we are seeing government organizations embrace software as a strategic asset to rapidly respond to change, and Pivotal is helping enable that shift," said Nick Cayou, vice president, global alliances at Pivotal. "Since moving at startup speed is on the minds of every government organization, the collaboration between Pivotal and Raytheon will help customers drastically improve cycle time and go from idea to production software in days and weeks, not months and years."


About Pivotal Software, Inc.
Pivotal's cloud-native platform drives software innovation for many of the world's most admired brands. With millions of developers in communities around the world, Pivotal technology touches billions of users every day. After shaping the software development culture of Silicon Valley's most valuable companies for over a decade, today Pivotal leads a global technology movement transforming how the world builds software.
About Raytheon
Raytheon Company, with 2016 sales of $24 billion and 63,000 employees, is a technology and innovation leader specializing in defense, civil government and cybersecurity solutions. With a history of innovation spanning 95 years, Raytheon provides state-of-the-art electronics, mission systems integration, C5I™ products and services, sensing, effects, and mission support for customers in more than 80 countries. Raytheon is headquartered in Waltham, Massachusetts. Follow us on Twitter.

Votiro Earns Common Criteria Certification to Provide Superior Cybersecurity to Governments Worldwide

Votiro, global leader in content disarm and reconstruction technology, a solution that protects organizations against undisclosed, zero-day exploits and other ongoing cyber threats, announced today that it has received the Common Criteria Certification from the Australian Signals Directorate (ASD), following evaluation by BAE Systems, a provider of some of the world's most advanced, technology-led defense, aerospace and security solutions.  This new certification will allow Votiro to deliver its products, including its Advanced Content Disarm and Reconstruction technology, to government offices worldwide, demonstrating the reliability of their technology.
Common Criteria Certification provides independent, objective validation of the reliability, quality, and trustworthiness of IT products, and is a standard that customers can rely on to help them make informed decisions about their IT purchases.  It's also a requirement of hardware and software devices used by the federal government on national security systems.
To achieve common criteria certification, Votiro's technology went through a rigorous process lead by a third-party lab, recognized by the National Voluntary Laboratory Accreditation Program (NVLAP) to ensure it met the security requirements based on predefined Evaluations Assurance Levels (EALs). Votiro was granted Evaluation Assurance Level (EAL) 2-- the highest evaluation for software-demonstrating to governments worldwide that they can place their trust in Votiro's secure technology.
The certification was obtained through the Australasian Information Security Evaluation Program (AISEP), overseen by the Australasian Certification Authority. This certification is recognized among the twenty-seven countries, including the US and Canada, that have signed the Common Criteria Recognition Arrangement (CCRA), making it an exceptional measure of security for the international commerce of IT products.
"Hackers are continuously evolving and improving their tactics," said Aviv Grafi, CTO of Votiro.  "The Common Criteria's strict standards help ensure that governments worldwide are equipped with the most secure technologies on the market, allowing them to stay one step ahead of the hackers. We are proud to have earned this highly esteemed certification, which will allow us to expand our customer base around the world."
About Votiro
Votiro provides organizations with protection against undisclosed and zero-day exploits utilized in cyber-attacks. The company's Secure Gateways provide robust protection using patented Advanced Content Disarm and Reconstruction technology to sanitize files from potential cyber-threats. Founded in 2010, Votiro has sales offices in the United States, Singapore, and Australia and an R&D center in Tel Aviv, Israel.
For more information, visit http://www.votiro.com.

Concurrent Technologies Corporation Wins Contract to Support the Federal Emergency Management Agency's Identity, Credential, and Access Management Program

The Federal Emergency Management Agency's (FEMA) Office of the Chief Information Officer (OCIO), Cyber Security Division, Identity, Credential, and Access Management (ICAM) team has awarded Concurrent Technologies Corporation (CTC) a one-year contract worth nearly $1.8 million to support a technology that CTC developed on previous FEMA contracts. The Accountability Tracking System (ATS) is a mobile, electronic validation system used to identify personnel during emergency response situations.

 

ATS (officially called the Federal [and Mutual Aid] Emergency Response Official Accountability Tracking System or F/ERO ATS) has become a baseline of the FEMA enterprise system. ATS was first used on a large scale during the 2017 Presidential Inauguration, where it provided a validation capability to DC Homeland Security and Emergency Management Agency personnel, enabling unescorted facility access. ATS was also recently used for the FEMA response to hurricanes in Texas, Florida, and Alabama, as well as in the U.S. Virgin Islands and Puerto Rico, where it tracked FEMA employees going on and off commercial and Navy ships deployed for disaster relief.

 

CTC is the prime contractor on this effort and will provide production, sustainment, and integration support for ATS, as well as support for FEMA disaster deployment and credential issuing and logistics.

 

"We are proud of CTC's work on this system; it exemplifies a core principal of creating breakthrough technologies that are successfully transitioned to meet real-world requirements or challenges," said Edward J. Sheehan, Jr., CTC President and CEO. "We look forward to continuing to support ATS, which plays an important role in disaster and other emergency responses."

 

 

CTC began providing expertise on this technology in 2010. This contract runs through September 14, 2018.

 

"We're very happy to continue to support and optimize the system that we developed," said Michael Glace, CTC Advisor, Information Technology. "While the original software tracked personnel based on their credentials, we're now able to track personnel as well as equipment assigned to them and help direct them where they need to be. This technology can be used anywhere that accountability tracking is needed.

 

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services organization. Together with our affiliates, Enterprise Ventures Corporation and CTC Foundation, we leverage research, development, test and evaluation work to provide transformative, full lifecycle solutions. To best serve our clients' needs, we offer the complete ability to fully design, develop, test, prototype and build. We support our clients' core mission objectives with customized solutions and strive to exceed expectations. For more information about CTC, visit www.ctc.com.

Oil drilling in ANWR moves ahead as part of Senate tax bill

Republicans took a major step forward early Saturday in their decades-long fight to open a piece of the Arctic National Wildlife Refuge to oil drilling.

Included as part of the sweeping tax reform bill passed by the Senate in a 51-to-49 vote is a highly controversial provision to allow energy exploration in a 1.5 million-acre swath of ANWR known as the “1002 area,” which lies along the coast. In total, ANWR spans more than 19 million acres.

The drilling provision was seen as key to getting Sen. Lisa Murkowski, Alaska Republican, on board with the tax bill.

“Opening the 1002 Area and tax reform both stand on their own, but combining them into the same bill, and then successfully passing that bill, makes this a great day to be an Alaskan,” she said in a statement after the measures passed. “I thank all of the senators who spent time learning about our opportunities and needs, and who joined us tonight in voting for Alaska. We are grateful for their support and eager to take the next steps for this pro-jobs, pro-growth, and pro-energy legislation.”

Drilling in ANWR has become of the most high-profile fights in history between energy advocates and environmentalists. Those who favor oil drilling say only a small portion of the pristine area will be affected, and that exploration can be done safely; environmentalists maintain that opening any piece of ANWR to drilling sets a dangerous precedent, and they contend that an ecologically disastrous spill is inevitable.

The issue has split Republicans. Sen. Susan Collins of Maine has previously voted against ANWR drilling, as has Sen. John McCain of Arizona. Both supported the measure Saturday.

There’s also notable Republican opposition in the House, which has already passed its own tax measure without an ANWR provision.

Ahead of Saturday’s vote, a dozen House Republicans wrote to House Speaker and Senate Majority Leader Mitch McConnell urging them to remove ANWR drilling from any tax-reform efforts, arguing that there’s simply no need to drill in such a sensitive area.

“After years of debate, the Arctic Refuge stands as a symbol of our nation’s strong and enduring legacy,” reads the letter, signed by Rep. Brian Fitzpatrick of Pennsylvania, Rep. Dave Reichert of Minnesota and other Republicans. “Any development footprint in the Refuge stands to disrupt this fragile, critically important landscape.”

Environmental groups vowed to continue their opposition, and a host of lawsuits are expected if the provision is signed into law by President Trump.

“Sen. Murkowski’s big sellout to the oil industry must be stopped. An international treasure and America’s conservation legacy are at stake. We’ve been fighting to protect the Arctic National Wildlife Refuge for more than 30 years. We won’t let it end like this,” said Jamie Rappaport Clark, president and CEO of the environmental group Defenders of Wildlife.

Approaching video forensics with fresh intelligence

New AI technology that mimics the human brain can help law enforcement and intelligence organizations rapidly identify patterns, objects and faces in large amounts of archived and live streaming video

 

Video is a critical element in crime prevention and investigation, yet current law enforcement systems are increasingly unable to cope. The sheer volume of surveillance material captured and stored every day is staggering, and set to rise dramatically. Adding more cameras to gather more information will only ever be useful if processes to search and analyze the mountain of data keep pace. As it stands vital information may be missed because the vast majority of video is simply never viewed. 

 

Information technology firm Cisco estimates than in 2021 it would take more than 5 million years to watch the amount of video traffic across the globe – each month. Market researcher IHS forecasts that 127 million surveillance cameras and 400,000 body-worn cameras will ship this year, in addition to the estimated 300 million cameras already deployed. By 2020 it is predicted there will be more than 1 billion cameras operated by smart cities worldwide, providing 30 billion frames of video per day. Internet video surveillance traffic alone increased 71 per cent in 2016 according to Cisco, and is set to increase sevenfold by 2021. Globally, 3.4 per cent of all video traffic crossing the internet will be video surveillance.

 

Give that a major problem for surveillance operators is directed attention fatigue, where the brain naturally alternates between periods of attention and distraction, it would require a superhuman effort to identify and classify all these images. What is required is a system that is never distracted and can work in conjunction with people to reduce errors, which is what artificial intelligence-driven video systems promise. 

 

AI in video surveillance can potentially deliver four times the performance of conventional video search – in contrast to human vigilance, which studies have shown can degrade by 95 per cent after about 20 minutes.

 

The cost of deep learning

 

Since 2012, when AI video analytics took off, the systems trained to recognize objects and facial IDs from different types of image have proved expensive to run and slow to compute, and require large datasets to generate results. These systems, which are based on convolutional neural networks (CNNs), employ an AI technique known as ‘deep learning’. They excel at churning through data but lack the ability to refine and react to streams of information gathered from the surrounding environment – which the human brain is extremely good at.

 

What’s more, CNNs exhibit limitations including poor noise immunity, particularly when random pixels appear in an image due to noisy sensors or lens contamination. They can serve false classifications if the network becomes confused – for example by someone wearing glasses, or if it cannot find a new face in a crowd without a large set of labelled images relating to that face being added to the database. The network parameters of CNNs need careful adjustment, and even then the accuracy rate for correct image classification may not be sufficient for video surveillance applications.

 

Spiking neural networks

 

A relatively new approach is the spiking neural network (SNN), which simulates and models the different aspects of the human brain’s operation much more closely than a CNN.

 

For instance, a police department that is looking for a suspect in live video streams does not have thousands of images of that suspect; nor does it have weeks to train a CNN system. In an SNN-based system, it can find patterns and people in videos in milliseconds and from a single image – which, importantly, can be as small as 24 x 24 pixels: it doesn’t need to be high definition. The system excels in recognition in low-light, low-resolution, noisy environments, making it ideal for the large amount of previously installed video surveillance systems.

 

Unlike current CNN technologies that require extensive pre-labelled datasets and expensive cloud-based training and acceleration, an SNN system can be implemented in software with traditional computer processors (CPUs) and trained on-premises. The one-shot technology learns in real time and requires only modest processing power – typically a Windows- or Linux-based x86 desktop computer or server – as well as consuming little energy.

 

This enables a greater number of law enforcement organizations to capitalize on the opportunities offered by AI. It means AI algorithms can be used with legacy systems without requiring expensive hardware or infrastructure upgrades, and it can be deployed in the field in highly secure environments that may not have cloud connectivity.

 

Tasks that seemed impossible for machines just a few years ago are becoming almost routine, and SNN technology has perhaps the greatest potential to bring valuable new capabilities into mainstream automated video surveillance today.

 

About the author:

Bob Beachler is Senior Vice President of Marketing and Business Development at BrainChip. He can be reached at: [email protected]

General Dynamics Awarded U.S. Army Mission Training Support Contract

FAIRFAX, VA. - General Dynamics Information Technology, a business unitof General Dynamics (NYSE: GD), was awarded the Mission Training Complex Capabilities Support contract by the U.S. Army Contracting Command. The
multiple award, indefinite delivery, indefinite quantity contract has a ceiling value of approximately $975 million with a five year ordering period.

 Work under the contract will consist of simulation and training support including live, virtual, constructive and first-person gaming exercises.
Additional support will include technical, logistical and administrative services for designated mission training complexes.

 "As a leader in mission-command and integrated training capabilities,
General Dynamics is well positioned to support the active Army and the
National Guard in strengthening readiness," said Rich Farinacci, vice
president and general manager of General Dynamics Information
Technology's Professional Services and Training Solutions sector.

 For more than ten years, General Dynamics has supported the Army's
mission training complexes with integrated training capabilities. The
company continues to be a trusted partner in supporting the Department
of Defense and other federal agencies as a primary source of training,
network and system engineering, installation, maintenance and logistical
services.

 For more information about General Dynamics Information Technology,
please visit www.gdit.com [1].



Links:
------
[1] https://gdit.com/

Pages

 

Recent Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...
PureTech Systems is a technology leader in the use of geospatial video, focusing on perimeter security.  When combining geospatial capabilities with video analytics and PTZ camera control, managers of critical facilities can benefit by allowing the video management system to aid them in the process...