Autonomy's Intelligent Scene Analysis System (iSAS) provides video analytics that enable you to identify items, objects, and events within a video. The solution helps users of any CCTV system detect important activity that may indicate a potential threat, an illegal action, or a situation where help is required. The system can be trained to detect virtually any type of scene that an organization would like to detect.
Autonomy iSAS integrates with new or existing CCTV installations and can be used retrospectively. A straightforward interface eliminates the need for training. iSAS can be configured to help an organization detect a suspicious scene. For example, a single system could simply alarm a user, play a pre-recorded message over a loud speaker, or begin the recording of images (pre-recording is also an option). Another example, in multi-level systems, such as town centers, iSAS can be configured to send live, suspicious images to an operator's master unit. As well as holding a full set of suspicious image management options, the operator can also continue the training of each system to improve overall performance.
Industry statistics show that up to 85 percent of on-screen information is lost within 15 minutes of the system operator being logged on. Additionally, most CCTV systems are less than 30 percent efficient. Autonomy iSAS takes up a high percentage of this loss to dramatically improve the efficiency of any CCTV system. The system identifies specific or potential incidents to operators for verification, action, or both.
Some examples of suspicious events include:
A person entering or exiting a restricted area
A vehicle moving in an unauthorized direction or lane
An abandoned item
A traffic accident
A person loitering or running
A vehicle moving too fast or in a dangerous manner
Autonomy iSAS can be applied to any new or existing CCTV system and can be trained by any proficient system operator, without requiring specialist input from Autonomy. iSAS adds a new dimension to the application of CCTV, whether on motorways, or in town centers, airports, stadiums, or train and bus stations.
Summary: ...dissemination of statistical information relating to the economic and social life of Ireland. It is also responsible for coordinating official statistics produced by other public bodies and for developing the statistical potential of administrative records. Currently, the CSO is based in three locations...
Summary: ...calls a taxi or takes a bus as usual but then submits the coupons as payment. The driver attaches the coupons to a special trip form that contains details about the vehicle, driver, and trip. This trip form, along with the standard “waybill” (a required document for all public transportation rides)...
Summary: ...were realized in the district of Colmschate; and at the moment there is a new housing development being built, called the Vijfhoek (meaning pentagon). Furthermore the town council has started with an urban renewal program concerning the edge of the town centre, known as the ring of canals-project. The...
Summary: ...and departments. There have been many specific instances where Autonomy’s technology has proved invaluable to Cheshire Constabulary. The Operational Policing department recently resolved an incident that involved a series of abandoned 999 calls which were tying up police resources. The department was...
Summary: ...Georgiou Case Study. The iPad also reduced training requirements, since staff had already been using iPhones, and were familiar with the Apple operating system. With the help of Office Information Australia, a local Autonomy iManage partner, Georgiou has begun introducing the new technology first to managers....
Summary: ...was trying to extend to its customers. With that in mind the company decided to invest in a business process automation solution comprising document imaging and data capture. The Solution After reviewing many potential vendors, An Post selected Inpute Technologies to implement the solution using Autonomy...
Summary: ...training schedules—all from within the portal. “We have more than 350 active dealers that sell our products. If they need information on our products, sales training, technical support information from our knowledge base, or where to watch a training Webinar, they can now access all of this information...
Summary: ...In 2005, the Center for Digital Government rated Napa County third in the nation in its population category for applying information technology to serve citizens more effectively. Among the excellent examples of technology in action at Napa County is the municipality’s extensive use of business process...
Summary: ...SAP implementation in Croatia and processes between 400,000 and 500,000 invoices per year. The removal of paper handling from this process eliminates errors from lost or mismatched documents; INA now have a complete audit trail for orders and invoice payments enabling them to demonstration conformance...
Summary: ...we owned, as well as support our present cases,” Martin says. The solution also needed to accommodate both paper and electronic records. “HP TRIM was the most complete fit for our needs.” Implementing the solution was straightforward. “Set up went easily,” Martin notes. HP led a training session...
Summary: ...now can share and post dynamic information to an extent not possible before. “Before the portal, very few members had the resources to really have a strong Internet presence. Now, they are leveraging the full potential of the Internet as a communication tool and as a learning vehicle,” says Webb....
Summary: ...KT Case Study. Interwoven WorkSite document management software let Korein Tillery provide its attorneys and their co-counsel with secure and Aaron Zigler, Attorney, Korein Tillery Korein Tillery is a plaintiffs’ class action law firm known for its consumer protection and ERISA practice as well as its...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...of monitoring video feeds. Intelligent Scene Analysis System (ISAS) provides an advanced solution that helps you identify important activity such as a potential threats, illegal actions, or situations that require additional help. ISAS integrates with any new or existing CCTV installation and improves...
Summary: ...activity such as a potential threat, an illegal action or a situation where help is required. In fact, the system can be trained to detect whatever the user requires. ISAS integrates with any new or existing CCTV installation and improves effi ciency in a wide variety of situations including:
...
Summary: ...Protector Continuously monitors an area to detect removal of assets/valuable property from the scene. It “learns” a scene and issues automatic real-time alerts when objects are removed. Training and Configuration Virage iSAS can be applied to any new or existing CCTV system for real-time or retrospective...
Summary: ...are under 24/7 surveillance to ensure that critical client data is preserved and protected against any potential threats. The hosted data is protected by biometrically controlled doors, exterior and interior CCTV cameras, glass breaks, motion detectors, alarm panels, audible alarms, lights and silent...
Summary: ...in the system which might signify a threat. Profiling – Using implicit and explicit profiling techniques, Halo automatically creates an individual profile of the information usage of each user. The system can then identify user’s current interests to refine search accuracy without any manual input...
Summary: ...seamlessly with existing management systems to reduce manual input and deliver genuine ROI. The whole system can be managed from a single intuitive interface customizable to system requirements with optional SDK and minimal additional training. Autonomy Virage’s open architecture also allows seamless...
Summary: ...parameters An intuitive interface using drag and drop-down features ensures ease of use with minimal additional training. Transaction data can be overlaid on CCTV footage, and users can search multiple feeds through a single interface or narrow options down to a single camera. Integrated with world-leading...
Summary: ...personal information over the phone without the customer present • Accessing restricted or unauthorized applications • Transferring of information from one application to another (Copy/Paste) The ability to interpret the meaning of all interactions also enables Autonomy ICE to recognize potential...
Summary: ...size Automatic set up with user-defined alarm codes and actions Generates real-time alerts across a range of media, such as email or instant messaging Automatic video and data transmission across ADSL, LAN, WAN, Intranet and Internet for remote system management Instantly generates automatic reports of...
Summary: ...series of workflows are automatically initiated to review and identify any potential issues. A set of messagebased tools enables one-step approval or escalation, depending on the appropriate action. All actions create an event record that is recorded and fully auditable, to demonstrate compliance and...
Summary: ...Autonomy's Top Ranked Hosted eDiscovery for Financial Institutions. The hosted data is protected by biometrically controlled doors, exterior and interior CCTV cameras, glass breaks, motion detectors, alarm panels, audible alarms, lights and silent alarms, inspiring the utmost customer confidence in its...
Summary: ...VERS. Data centers are located around the globe to meet jurisdictional requirements, and are protected by biometrically controlled doors, exterior and interior CCTV cameras, glass break and motion detectors, alarm panels, audible alarms, lights, and silent alarms. Product Brief Cloud Based Solutions Archiving...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...procedures, Virage iSAS enables organizations to anticipate and detect potential threats or illegal action, instantly and automatically, and take proactive preventative action against any security concerns. Ideally suited to complex multi-camera environments such as airports, major transport networks...
Summary: ...automatically manage all information within corporate governance policies, monitor employee access to secure information, and ensure regulatory compliance across all systems and repositories. The Threat of Internal Data Theft The doubling of data crime from 2007 to 2008 indicates current measures are...
Summary: ...False-positives are items incorrectly flagged as suspicious, reducing valuable time available to investigate truly suspicious activities. Lexicon- and keyword-based monitoring methods are inherently flawed in that they only catch a percentage of the actual incriminating communications that have taken...
Summary: ...Establishing a best practice enterprise classification scheme (US English). Where the records have a short retention period (3–7 years), the simplest conversion strategy is to manage parallel systems, with little or no retrospective conversion. Where records will remain active over 5–10 years, provided...
Summary: ...This fully automated process takes the onus off of custodians and data stewards to identify and preserve the Electronically Stored Information (ESI) that they consider to be potentially relevant, while alleviating the risk of lost or misplaced data that could accompany such a manual process.
...
Summary: ...people and processes need to be put in place, education and training programmes need to be set up to ensure that staff fully understand the risks of non-compliance and what they need to do to avoid it, and available technology needs to be exploited to support these changes. Among the plethora of potential...
Summary: ...resolution and fraud prevention. A phrase of interest can be entered along with metadata to further enhance the results by limiting items based on speaker, emotion, dates, caller ID data and duration. Ad hoc searching is also available in the active recording to examine other concepts that may be pertinent...
Summary: ...blogs, datasets, bit streams, file streams, news streams, Web parts and Web pages. 10 The risks and consequences of record keeping failures, such as financial losses, brand and reputational damage or legal actions are well known and examples can be found almost daily, in any newspaper, audit report or...
Summary: ...70- or “SAS70”-compliant. These data centers are under 24/7 surveillance and protected by biometrically controlled doors, exterior and interior CCTV cameras, glass break and motion detectors, alarm panels, audible alarms, lights and silent alarms. Based on a unique, split-cell architecture with grid-based...
Summary: ...IT resources. A well-managed cloud service means that the service provider proactively monitors and tests for all potential vulnerabilities and detects all possible threats. If the vendor’s reputation depends on their security, their IT can be more secure than your own. 4. Guaranteed Service With Service...
Summary: ...hardware that has now failed and cannot be repaired. The replacement hardware is very different from the legacy equipment, including the CPU, hardware abstraction layer, and mass storage drivers, as well as a number of heterogeneous drivers required to boot the network host bus adapters (LAN, SCSI, FC,...
Summary: ...This prevents users from retrieving valuable information and it exposes the enterprise to significant compliance risk. Such technologies begin to calculate the relevance of each document at indexing time; however, if at the beginning of the calculation a particular result appears to be irrelevant, the...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.
There do not seem to be any press releases related to this page in 2013 at the moment, please visit the news section on www.autonomy.com for the latest news.
There do not seem to be any press releases related to this page in 2011 at the moment, please visit the news section on www.autonomy.com for the latest news.