SlideShare a Scribd company logo
1 of 14
Download to read offline
EENA 2021.
.User Experience and User Interfaces
in a Mission Critical Control room .
Our Team
PERSONAL INTRODUCTION
Luca Cannizzaro
Sales & Business Development
Manager
Luca.cannizzaro@weytec.com
+39 02 58431417
AGENDA
1. Our Team
2. Main Challenges in a Control Room
3. Tailor-Made User Interface
4. Real-Time Performance
5. Trustful and Future-Proof Solutions
6. Minimize Security Risks
7. … at a Reasonable Price
8. Q&A
MAIN CHALLENGES IN THE CONTROL ROOM
More stakeholders to
collaborate with
More
disparate
systems
Access Control, Video
Surveillance, Intrusion
Detection, Fire Safety
Radio comm,
Intercom, phone
system,…
CAD, Allerting
systems, Maps,…
Administrative
Systems, White Space,
Social Media
Pressure on Operator
Lack of Effectiveness & Efficiency
What you had planned…
MAIN CHALLENGES IN THE CONTROL ROOM
What you got…
MAIN CHALLENGES IN THE CONTROL ROOM
What can happen………
Situation (Risk) Implication Solution
MAIN CHALLENGES IN THE CONTROL ROOM
Problem
Jeopardized work satisfaction
for the operators
▪ Staff fluctuations
▪ Absences due to health
problems
▪ Individual & flexible workplace
setups
▪ Ease of use
▪ Real-time performance – as if
the source is under the desk
Increased risk of operational
errors
▪ Lack of trust from stakeholders
▪ Loss of reputation, both
personal and organizational
▪ Loss of life, assets,
infrastructure, operational
integrity
▪ Tailor-made solutions
▪ Instant access to all sources
▪ Ease of use
▪ Shared collaborative views
System outages ▪ Separated sources and displays
▪ User and role management
▪ Redundant solutions
What you need…
MAIN CHALLENGES IN THE CONTROL ROOM
▪ Ergonomic user interface
▪ Easy and intuitive access to all designated
information and systems
▪ Supporting the operators who bear the
responsibility for making the right decisions
▪ Fast and easy switching, collaboration and
sharing – with a single touch or by moving the
mouse
▪ Multiple individualized user or event driven
layouts and presets
▪ Easily control of third-party systems from any
workplace with a single keystroke
TAILOR MADE USER INTERFACE
Prefer a remote solution but fast as if the sources were under the desk
▪ Seamless latency - so low that it is not even
noticeable by the operators, as if the PCs were
under the desk
▪ Access all the various systems from anywhere –
any workplace, any control room, any site
▪ Free seating within and between control rooms
▪ Business Continuity between sites
▪ User and Role Management
REAL-TIME PERFORMANCE
▪ Integrate different applications (legacy, current &
future) and IT environments
▪ Standard-based solutions – non-intrusive, without
interfering with customer PCs
▪ End-to-end quality assurance – from development
to maintenance and support
▪ Long term availability and support
▪ Future proof - i.e: 4K at the workplace & on the
video wall,…
TRUSTED & FUTURE-PROOF SOLUTION
Housing Sources in System Room
▪ Access the sources only via an
authentication device
(standalone or via a KVM
system)
▪ Access rights management –
with personal and role-based
rights
▪ Restricted access levels
Authentication
▪ Try to keep Independent and
separated networks on different
subsystems.
▪ Preventing potentially infected
computers in lower-security
environments from compromising
systems in higher-security
environments
▪ Preferably use a KVM system for
the operators. one console to
operate on different subsystems
Network Independence
▪ Protect IT assets and data from
unauthorized access
▪ Restrict and control physical
access to USB ports
▪ Centralized, efficient & cost-
effective maintenance
procedures
MINIMIZE SECURITY THREATS
▪ Low investment costs – using standard-based solutions
▪ Reduced IT maintenance cost
▪ Optimized deployment of operators (e. g. reduce staff during night shifts)
▪ Reduced employee absences due to operator friendly working environment
▪ Real-estate savings – by reducing the footprint at the workplaces and in the system room
… AT A REASONABLE PRICE
We cordially invite you to
visit ..us at booth 14.
Questions?.
Luca Cannizzaro
Sales & Business Development
Manager
Luca.cannizzaro@weytec.com
+39 02 58431417

More Related Content

What's hot

Cloaking is the new perimeter
Cloaking is the new perimeterCloaking is the new perimeter
Cloaking is the new perimeterTempered
 
Outsourcing small cell deployment - How process automation tools can enable ...
Outsourcing small cell deployment -  How process automation tools can enable ...Outsourcing small cell deployment -  How process automation tools can enable ...
Outsourcing small cell deployment - How process automation tools can enable ...David Chambers
 
Next-Generation Closed-Loop Automation - an Inside View
Next-Generation Closed-Loop Automation - an Inside ViewNext-Generation Closed-Loop Automation - an Inside View
Next-Generation Closed-Loop Automation - an Inside ViewLaurent Ciavaglia
 
Netop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNetop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNanna Wang
 
CapabilitiesBrochure
CapabilitiesBrochureCapabilitiesBrochure
CapabilitiesBrochureTodd Dehn
 
CapabilitiesBrochure_11x17_2014
CapabilitiesBrochure_11x17_2014CapabilitiesBrochure_11x17_2014
CapabilitiesBrochure_11x17_2014Davis Merrey
 
CapabilitiesBrochure_11x17_2014
CapabilitiesBrochure_11x17_2014CapabilitiesBrochure_11x17_2014
CapabilitiesBrochure_11x17_2014Stewart Paul
 
Solekai Digital Living Pitch
Solekai Digital Living PitchSolekai Digital Living Pitch
Solekai Digital Living PitchMarco Thompson
 
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingTIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingSaraPia5
 
Scaling small cell deployment - Why current tools are inadequate
Scaling small cell deployment - Why current tools are inadequateScaling small cell deployment - Why current tools are inadequate
Scaling small cell deployment - Why current tools are inadequateDavid Chambers
 
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity SoftwareSlash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity SoftwareReal-Time Innovations (RTI)
 
Evolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business AgilityEvolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business AgilityRed Hat India Pvt. Ltd.
 
Edge Computing & AI
Edge Computing & AIEdge Computing & AI
Edge Computing & AIPaul O'Hagan
 
Extended & Reliable WI-FI at Congresium International Convention & Exhibition...
Extended & Reliable WI-FI at Congresium International Convention & Exhibition...Extended & Reliable WI-FI at Congresium International Convention & Exhibition...
Extended & Reliable WI-FI at Congresium International Convention & Exhibition...4ipnet
 

What's hot (18)

The Automation Continuum
The Automation ContinuumThe Automation Continuum
The Automation Continuum
 
Joseph Witt
Joseph WittJoseph Witt
Joseph Witt
 
ACUTA 2012 10 Remove Desk Phone
ACUTA 2012 10 Remove Desk PhoneACUTA 2012 10 Remove Desk Phone
ACUTA 2012 10 Remove Desk Phone
 
Cloaking is the new perimeter
Cloaking is the new perimeterCloaking is the new perimeter
Cloaking is the new perimeter
 
Outsourcing small cell deployment - How process automation tools can enable ...
Outsourcing small cell deployment -  How process automation tools can enable ...Outsourcing small cell deployment -  How process automation tools can enable ...
Outsourcing small cell deployment - How process automation tools can enable ...
 
Et software brochure
Et software brochureEt software brochure
Et software brochure
 
Next-Generation Closed-Loop Automation - an Inside View
Next-Generation Closed-Loop Automation - an Inside ViewNext-Generation Closed-Loop Automation - an Inside View
Next-Generation Closed-Loop Automation - an Inside View
 
Netop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNetop remote control 12.5 Brochure
Netop remote control 12.5 Brochure
 
CapabilitiesBrochure
CapabilitiesBrochureCapabilitiesBrochure
CapabilitiesBrochure
 
CapabilitiesBrochure_11x17_2014
CapabilitiesBrochure_11x17_2014CapabilitiesBrochure_11x17_2014
CapabilitiesBrochure_11x17_2014
 
CapabilitiesBrochure_11x17_2014
CapabilitiesBrochure_11x17_2014CapabilitiesBrochure_11x17_2014
CapabilitiesBrochure_11x17_2014
 
Solekai Digital Living Pitch
Solekai Digital Living PitchSolekai Digital Living Pitch
Solekai Digital Living Pitch
 
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingTIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
 
Scaling small cell deployment - Why current tools are inadequate
Scaling small cell deployment - Why current tools are inadequateScaling small cell deployment - Why current tools are inadequate
Scaling small cell deployment - Why current tools are inadequate
 
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity SoftwareSlash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
 
Evolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business AgilityEvolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business Agility
 
Edge Computing & AI
Edge Computing & AIEdge Computing & AI
Edge Computing & AI
 
Extended & Reliable WI-FI at Congresium International Convention & Exhibition...
Extended & Reliable WI-FI at Congresium International Convention & Exhibition...Extended & Reliable WI-FI at Congresium International Convention & Exhibition...
Extended & Reliable WI-FI at Congresium International Convention & Exhibition...
 

Similar to Efficient Control Room User Experience

2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...Jürgen Ambrosi
 
Adder control room 2018
Adder control room 2018Adder control room 2018
Adder control room 2018rfserranobcn
 
Remote IT Mangement
Remote IT MangementRemote IT Mangement
Remote IT Mangementtsilber
 
cosy131 Catalogue (remote access for automation)
cosy131 Catalogue (remote access for automation)cosy131 Catalogue (remote access for automation)
cosy131 Catalogue (remote access for automation)IEABODI2SnVVnGimcEAI
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO
 
Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...
Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...
Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...Splashtop Inc
 
Kisi Lockdown for Access Control Overview
Kisi Lockdown for Access Control OverviewKisi Lockdown for Access Control Overview
Kisi Lockdown for Access Control OverviewBernhard Mehl
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldQuest
 
Challenges with Cloud Security by Ken Y Chan
Challenges with Cloud Security by Ken Y ChanChallenges with Cloud Security by Ken Y Chan
Challenges with Cloud Security by Ken Y ChanKen Chan
 
Ensuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementEnsuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementQuest
 
Hosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsHosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsPete Valentine
 
Imprivata Secure Walkaway
Imprivata Secure WalkawayImprivata Secure Walkaway
Imprivata Secure Walkawayrichardebowers
 
Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsCTI Group
 
RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...
RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...
RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...John Whaley
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server securityxband
 

Similar to Efficient Control Room User Experience (20)

Synergy Integrations Brochure
Synergy Integrations Brochure Synergy Integrations Brochure
Synergy Integrations Brochure
 
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
 
Adder control room 2018
Adder control room 2018Adder control room 2018
Adder control room 2018
 
Remote IT Mangement
Remote IT MangementRemote IT Mangement
Remote IT Mangement
 
Minicom - Remote Data Center Management
Minicom - Remote Data Center ManagementMinicom - Remote Data Center Management
Minicom - Remote Data Center Management
 
cosy131 Catalogue (remote access for automation)
cosy131 Catalogue (remote access for automation)cosy131 Catalogue (remote access for automation)
cosy131 Catalogue (remote access for automation)
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - Presentaciones
 
Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...
Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...
Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...
 
Kisi Lockdown for Access Control Overview
Kisi Lockdown for Access Control OverviewKisi Lockdown for Access Control Overview
Kisi Lockdown for Access Control Overview
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile World
 
Challenges with Cloud Security by Ken Y Chan
Challenges with Cloud Security by Ken Y ChanChallenges with Cloud Security by Ken Y Chan
Challenges with Cloud Security by Ken Y Chan
 
ESET Enterprise
ESET EnterpriseESET Enterprise
ESET Enterprise
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
 
Ensuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementEnsuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint Management
 
Hosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsHosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed Applications
 
Imprivata Secure Walkaway
Imprivata Secure WalkawayImprivata Secure Walkaway
Imprivata Secure Walkaway
 
Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management Solutions
 
RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...
RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...
RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
Plejd leaflet 20140924_small
Plejd leaflet 20140924_smallPlejd leaflet 20140924_small
Plejd leaflet 20140924_small
 

More from EENA (European Emergency Number Association)

EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA (European Emergency Number Association)
 

More from EENA (European Emergency Number Association) (20)

EENA 2021: Industry session - Drones in emergencies (2/3)
EENA 2021: Industry session - Drones in emergencies (2/3) EENA 2021: Industry session - Drones in emergencies (2/3)
EENA 2021: Industry session - Drones in emergencies (2/3)
 
EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA 2021 - Improving public safety with smart cities and Internet of Things ...EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA 2021 - Improving public safety with smart cities and Internet of Things ...
 
EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA 2021 - Improving public safety with smart cities and Internet of Things ...EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA 2021 - Improving public safety with smart cities and Internet of Things ...
 
EENA 2021: Keynote - The European legislative framework on emergency communic...
EENA 2021: Keynote - The European legislative framework on emergency communic...EENA 2021: Keynote - The European legislative framework on emergency communic...
EENA 2021: Keynote - The European legislative framework on emergency communic...
 
EENA 2021: Keynote - Maintaining physical and mental capacity to perform duti...
EENA 2021: Keynote - Maintaining physical and mental capacity to perform duti...EENA 2021: Keynote - Maintaining physical and mental capacity to perform duti...
EENA 2021: Keynote - Maintaining physical and mental capacity to perform duti...
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
 
EENA 2021: Keynote – Cybersecurity
EENA 2021: Keynote – CybersecurityEENA 2021: Keynote – Cybersecurity
EENA 2021: Keynote – Cybersecurity
 
EENA 2021: Staff retention in PSAPs (1/3)
EENA 2021: Staff retention in PSAPs (1/3)EENA 2021: Staff retention in PSAPs (1/3)
EENA 2021: Staff retention in PSAPs (1/3)
 
EENA 2021: Staff retention in PSAPs (2/3)
EENA 2021: Staff retention in PSAPs (2/3)EENA 2021: Staff retention in PSAPs (2/3)
EENA 2021: Staff retention in PSAPs (2/3)
 
EENA 2021: Remote call-taking (3/3)
EENA 2021: Remote call-taking (3/3) EENA 2021: Remote call-taking (3/3)
EENA 2021: Remote call-taking (3/3)
 
EENA 2021: Remote call-taking (1/3)
EENA 2021: Remote call-taking (1/3)EENA 2021: Remote call-taking (1/3)
EENA 2021: Remote call-taking (1/3)
 
EENA 2021: Remote call-taking (2/3)
EENA 2021: Remote call-taking (2/3)EENA 2021: Remote call-taking (2/3)
EENA 2021: Remote call-taking (2/3)
 
EENA 2021: Industry session - Public Warning Solutions by Genasys (2/5)
EENA 2021: Industry session - Public Warning Solutions by Genasys (2/5)EENA 2021: Industry session - Public Warning Solutions by Genasys (2/5)
EENA 2021: Industry session - Public Warning Solutions by Genasys (2/5)
 
EENA 2021: Industry session - Public Warning Solutions by Celltick (3/5)
EENA 2021: Industry session - Public Warning Solutions by Celltick (3/5)EENA 2021: Industry session - Public Warning Solutions by Celltick (3/5)
EENA 2021: Industry session - Public Warning Solutions by Celltick (3/5)
 
EENA 2021: Industry session - Public Warning Solutions by Everbridge & one2ma...
EENA 2021: Industry session - Public Warning Solutions by Everbridge & one2ma...EENA 2021: Industry session - Public Warning Solutions by Everbridge & one2ma...
EENA 2021: Industry session - Public Warning Solutions by Everbridge & one2ma...
 
EENA 2021: Industry session - Public Warning Solutions by Frequentis (5/5)
EENA 2021: Industry session - Public Warning Solutions by Frequentis (5/5) EENA 2021: Industry session - Public Warning Solutions by Frequentis (5/5)
EENA 2021: Industry session - Public Warning Solutions by Frequentis (5/5)
 
EENA 2021: Industry session - Public Warning Solutions by F24 (4/5)
EENA 2021: Industry session - Public Warning Solutions by F24 (4/5)EENA 2021: Industry session - Public Warning Solutions by F24 (4/5)
EENA 2021: Industry session - Public Warning Solutions by F24 (4/5)
 
EENA 2021: Non-emergency numbers (4/4)
EENA 2021: Non-emergency numbers (4/4)EENA 2021: Non-emergency numbers (4/4)
EENA 2021: Non-emergency numbers (4/4)
 
EENA 2021: Non-emergency numbers (3/4)
EENA 2021: Non-emergency numbers (3/4)EENA 2021: Non-emergency numbers (3/4)
EENA 2021: Non-emergency numbers (3/4)
 
EENA 2021: Non-emergency numbers (2/4)
EENA 2021: Non-emergency numbers (2/4)EENA 2021: Non-emergency numbers (2/4)
EENA 2021: Non-emergency numbers (2/4)
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Efficient Control Room User Experience

  • 1. EENA 2021. .User Experience and User Interfaces in a Mission Critical Control room .
  • 2. Our Team PERSONAL INTRODUCTION Luca Cannizzaro Sales & Business Development Manager Luca.cannizzaro@weytec.com +39 02 58431417
  • 3. AGENDA 1. Our Team 2. Main Challenges in a Control Room 3. Tailor-Made User Interface 4. Real-Time Performance 5. Trustful and Future-Proof Solutions 6. Minimize Security Risks 7. … at a Reasonable Price 8. Q&A
  • 4. MAIN CHALLENGES IN THE CONTROL ROOM More stakeholders to collaborate with More disparate systems Access Control, Video Surveillance, Intrusion Detection, Fire Safety Radio comm, Intercom, phone system,… CAD, Allerting systems, Maps,… Administrative Systems, White Space, Social Media Pressure on Operator Lack of Effectiveness & Efficiency
  • 5. What you had planned… MAIN CHALLENGES IN THE CONTROL ROOM
  • 6. What you got… MAIN CHALLENGES IN THE CONTROL ROOM
  • 7. What can happen……… Situation (Risk) Implication Solution MAIN CHALLENGES IN THE CONTROL ROOM Problem Jeopardized work satisfaction for the operators ▪ Staff fluctuations ▪ Absences due to health problems ▪ Individual & flexible workplace setups ▪ Ease of use ▪ Real-time performance – as if the source is under the desk Increased risk of operational errors ▪ Lack of trust from stakeholders ▪ Loss of reputation, both personal and organizational ▪ Loss of life, assets, infrastructure, operational integrity ▪ Tailor-made solutions ▪ Instant access to all sources ▪ Ease of use ▪ Shared collaborative views System outages ▪ Separated sources and displays ▪ User and role management ▪ Redundant solutions
  • 8. What you need… MAIN CHALLENGES IN THE CONTROL ROOM
  • 9. ▪ Ergonomic user interface ▪ Easy and intuitive access to all designated information and systems ▪ Supporting the operators who bear the responsibility for making the right decisions ▪ Fast and easy switching, collaboration and sharing – with a single touch or by moving the mouse ▪ Multiple individualized user or event driven layouts and presets ▪ Easily control of third-party systems from any workplace with a single keystroke TAILOR MADE USER INTERFACE
  • 10. Prefer a remote solution but fast as if the sources were under the desk ▪ Seamless latency - so low that it is not even noticeable by the operators, as if the PCs were under the desk ▪ Access all the various systems from anywhere – any workplace, any control room, any site ▪ Free seating within and between control rooms ▪ Business Continuity between sites ▪ User and Role Management REAL-TIME PERFORMANCE
  • 11. ▪ Integrate different applications (legacy, current & future) and IT environments ▪ Standard-based solutions – non-intrusive, without interfering with customer PCs ▪ End-to-end quality assurance – from development to maintenance and support ▪ Long term availability and support ▪ Future proof - i.e: 4K at the workplace & on the video wall,… TRUSTED & FUTURE-PROOF SOLUTION
  • 12. Housing Sources in System Room ▪ Access the sources only via an authentication device (standalone or via a KVM system) ▪ Access rights management – with personal and role-based rights ▪ Restricted access levels Authentication ▪ Try to keep Independent and separated networks on different subsystems. ▪ Preventing potentially infected computers in lower-security environments from compromising systems in higher-security environments ▪ Preferably use a KVM system for the operators. one console to operate on different subsystems Network Independence ▪ Protect IT assets and data from unauthorized access ▪ Restrict and control physical access to USB ports ▪ Centralized, efficient & cost- effective maintenance procedures MINIMIZE SECURITY THREATS
  • 13. ▪ Low investment costs – using standard-based solutions ▪ Reduced IT maintenance cost ▪ Optimized deployment of operators (e. g. reduce staff during night shifts) ▪ Reduced employee absences due to operator friendly working environment ▪ Real-estate savings – by reducing the footprint at the workplaces and in the system room … AT A REASONABLE PRICE
  • 14. We cordially invite you to visit ..us at booth 14. Questions?. Luca Cannizzaro Sales & Business Development Manager Luca.cannizzaro@weytec.com +39 02 58431417