SlideShare a Scribd company logo
1 of 4
• Public lift sensor automatically reports damage.
• Viseum automatically reports decision support for first responders:
Any known offenders or suspect looking
individuals within this vicinity now?
Or within this vicinity over time related to the
lift sensor report?
• Public evacuated.
• Recorded video then used again for security
exploitation and judicial use.
Surveillance system-situational-awareness-people-surveillance
Surveillance system-situational-awareness-people-surveillance

More Related Content

More from Stuart Thompson Viseum Group Owner & President

More from Stuart Thompson Viseum Group Owner & President (17)

Viseum certified-technology-partner-program
Viseum certified-technology-partner-programViseum certified-technology-partner-program
Viseum certified-technology-partner-program
 
Face recognition-software-presentation
Face recognition-software-presentationFace recognition-software-presentation
Face recognition-software-presentation
 
Uk cctv-viseum-strategy-recommendations
Uk cctv-viseum-strategy-recommendationsUk cctv-viseum-strategy-recommendations
Uk cctv-viseum-strategy-recommendations
 
Viseum security-project-management
Viseum security-project-managementViseum security-project-management
Viseum security-project-management
 
Thermal radar-perimeter-surveillance-systems
Thermal radar-perimeter-surveillance-systemsThermal radar-perimeter-surveillance-systems
Thermal radar-perimeter-surveillance-systems
 
Temporary CCTV redeployable-cctv
Temporary CCTV redeployable-cctvTemporary CCTV redeployable-cctv
Temporary CCTV redeployable-cctv
 
Safe city-people-vehicles
Safe city-people-vehiclesSafe city-people-vehicles
Safe city-people-vehicles
 
Rapid deployment-cctv-intelligent-cctv-trailer
Rapid deployment-cctv-intelligent-cctv-trailerRapid deployment-cctv-intelligent-cctv-trailer
Rapid deployment-cctv-intelligent-cctv-trailer
 
Police force
Police forcePolice force
Police force
 
Perimeter surveillance-systems
Perimeter surveillance-systemsPerimeter surveillance-systems
Perimeter surveillance-systems
 
People surveillance-systems-command-control-and-communications
People surveillance-systems-command-control-and-communicationsPeople surveillance-systems-command-control-and-communications
People surveillance-systems-command-control-and-communications
 
Panoramic security-camera
Panoramic security-cameraPanoramic security-camera
Panoramic security-camera
 
Baggage handling-innovation-examples
Baggage handling-innovation-examplesBaggage handling-innovation-examples
Baggage handling-innovation-examples
 
Viseum thermal-security-camera-comparison
Viseum thermal-security-camera-comparisonViseum thermal-security-camera-comparison
Viseum thermal-security-camera-comparison
 
Viseum technology-and-support-strengths
Viseum technology-and-support-strengthsViseum technology-and-support-strengths
Viseum technology-and-support-strengths
 
Viseum surveillance-technology-credentials
Viseum surveillance-technology-credentialsViseum surveillance-technology-credentials
Viseum surveillance-technology-credentials
 
Viseum security-site-survey
Viseum security-site-surveyViseum security-site-survey
Viseum security-site-survey
 

Recently uploaded

الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 

Recently uploaded (20)

الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 

Surveillance system-situational-awareness-people-surveillance

  • 1. • Public lift sensor automatically reports damage. • Viseum automatically reports decision support for first responders: Any known offenders or suspect looking individuals within this vicinity now? Or within this vicinity over time related to the lift sensor report?
  • 2. • Public evacuated. • Recorded video then used again for security exploitation and judicial use.

Editor's Notes

  1. Viseum excels – and so do its security operators – by showing what’s going on within an evolving situation. Viseum automatically produces key information – so that the first emergency responders’ actions are the right ones. Take this example of an elevator failure in The Shard of London… In what is the tallest and one of the most iconic buildings in Europe, there are many scenarios that can be programmed in and Viseum will automatically and immediately analyse each and every one. This particular failure could be entirely innocent and random and Viseum can confirm this by automatically checking through every pre-programmed scenario. In a first example, Viseum confirms the elevator sensor report was a typical wear and tear breakage, and that there isn’t now – and neither has there been – any suspect activity near the lift equipment, or any known offenders detected anywhere near The Shard for at least 6 months. However, in a worst case scenario, this could be a plot involving numerous terrorists who converge on the building – and here Viseum confirms the elevator sensor report to be suspect and alerts security staff with a recorded video of a man seemingly tampering with an elevator panel several days previously and then making a rapid exit from the building. The alarm is then raised, the public are evacuated and emergency services are sent to the site. Viseum then goes immediately into its lockdown mode for further analysis of the situation.  
  2. Continuing our example, Viseum software continues to automatically scout for suspect individuals, now actively supporting the well-informed CCTV security operators. In this case, Viseum helps identify 4 known offenders suspected of being involved in terrorist activities and located within the yellow zone. Now operating hand-in-hand with CCTV security operators, Viseum software continues to follow where the 4 suspects go and reviews where they have been. Two of these individuals were already close to the Red Zone, walking towards The Shard from opposite directions, but both were then seen to turn round once they realised the alarm had been raised. CCTV security operators confirm that these 2 suspects should be cautiously approached by security forces. The other 2 suspects are confirmed to be lower risk, and Viseum software continues to following them as a precaution. With the incident under control, Viseum recreates the event using recorded evidence from the whole area. This will confirm whether there were any other associates involved and every action by the suspected terrorist plotters, as well as all the actions of police and security staff, will have been meticulously recorded in forensic detail for security exploitation and subsequent judicial use. So, in these scenarios – and more importantly in reality – Viseum and the Safe City become synonymous.