Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory


Motorola
March 2006, IT infrastructure in security

The security industry is no stranger to two-way radio communication, having been a traditional user and one for which the technology has been specifically developed since its original military application. Despite innovations that have spawned myriad alternative communication devices, two-way radio has held its ground as the most efficient and robust technology in mission-critical situations.

One of the prime factors for its ubiquity is the instantaneous nature of two-way radio communication and the fact that it supports simultaneous group communication. At the push of a single button, users have immediate access to a specific user group or individual, improving response times and ensuring the right message reaches the right people. Two-way radio communication also cuts communication costs drastically, as users do not pay per call.

With over 65 years of experience in meeting the mission-critical requirements of public safety, government and enterprise customers worldwide, Motorola has established itself as a provider of innovative wireless solutions that provide a range of voice, data and video communications: seamlessly.

The addition of a range of innovative features to Motorola's two-way radio devices has provided greater functionality to improve response times and enhance user security. For example, the Professional Series GP and GM range of portable and mobile radios all offer five-tone signalling, which allows radios to be programmed to transmit critical information such as identifying the caller and the call status, allowing users to prioritise in an emergency situation.

Pre-recorded messages can be sent to a defined group of people using the emergency signalling feature and a 'lone worker' function prompts the user to respond to a signal at regular intervals, which is ideal for guards at remote sites. Failure to respond to the signal results in the radio entering emergency mode and sending an alert to the control room.

There is also a whisper mode for discreet communication and a mute option for silent alarms to be sent to the control when backup is required. Complementing this is a range of accessories which include inconspicuous earpieces and microphones for VIP protection; an emergency footswitch, which allows the user to transmit an alert without taking his hands off the steering wheel and a visor-mounted microphone for hands-free communication.

The radios are also designed to withstand harsh usage and tough work environments, having been tested according to international military standards.

High-speed linking

For remote site monitoring and CCTV applications, Motorola's Canopy system is a cost-effective, fixed wireless broadband platform that can be used to interconnect CCTV equipment and relay images to a central control station.

Operating in the licence-free 5,4 GHz band, Canopy offers a robust and scalable platform that promises one of the lowest total costs of ownership and can substantially reduce infrastructure and operating costs. Its simple network design and built-in installation and deployment assistance makes it easier and quicker to get up and running than most access systems and, in most cases, it can be installed in less than 24 hours, which makes Canopy ideal for emergency situations.

It also overcomes many of the obstacles associated with deploying traditional high-speed access technologies - such as cost, cabling, terrain and interference - as it requires no existing infrastructure.

The system comprises three core components: an access point, a subscriber module and a backhaul unit. The access point links to one or more subscriber modules in a point-to-multipoint configuration. It is connected via an Ethernet cable to a computer, server or network inside a building. Point-to-point links can be established by means of backhaul units to cover greater distances. Reliability is greatly enhanced because the integrated antennas obviate RF cables, which are frequently the cause of malfunctioning due to the ingress of moisture. Canopy is scalable for meeting user needs with each access point capable of serving up to 200 subscriber modules.

Apart from delivering superior performance using a modulation scheme that improves the quality of data delivery and mitigating interference from other systems, Canopy also offers security with over-the-air encryption that scrambles data bits and helps prevent interception.

As workforce mobility increases, technology will need to become increasingly mobile, providing seamless access to information and people. It is for this reason that wireless technology will continue to flourish and Motorola remains committed to developing solutions that help people work more quickly and efficiently.

For more information contact Nikes Patel, Motorola, 011 800 7800, www.motorola.com


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Surveillance-class hard drive
    November 2014, WD South Africa, IT infrastructure in security
    WD Purple now shipping in 6 TB capacities to excel in IoT fog surveillance environments, they are aimed at existing home and small business security system environments with up to eight hard drives and up to 32 high-definition (HD) video cameras.
  • Networking best practices
    November 2014, IT infrastructure in security
    IT managed security systems have become increasingly common as part of a broader security infrastructure and have enabled IT specialists and installers to deliver a more integrated service.
  • New enterprise security appliance
    November 2014, Duxbury Networking, Products, IT infrastructure in security
    A new enterprise security appliance has been launched by Duxbury Networking designed to offer comprehensive network security through the integration of multiple security features into a single device.
  • Unpacking the unfashionable infrastructure
    October 2014, Mustek Security Technologies, IT infrastructure in security
    Good security is about more than a solution or an endpoint; it is about having a sound infrastructure in place that is able to support and communicate with the technology.
  • Master Power solar solutions
    September 2014, Industrial (Industry), IT infrastructure in security
    Master Power Technologies has launched a new range of photovoltaic solar solutions to complement its current range of products for use in industrial applications in hot, arid regions, or wherever utility power is expensive or unreliable.
  • Keeping an eye on your data
    September 2014, IT infrastructure in security
    A report by IDC revealed that half of global big data in 2012 came from surveillance. This statistic goes some way to illustrating the scale of the challenge organisations that use surveillance face in both storing and managing it.
  • WD expands NAS storage offerings
    September 2014, IT infrastructure in security
    WD Red now in 6 TB capacities; NASware 3.0 increases NAS system bay count support to eight bays; New WD Red Pro deepens reach into medium to large NAS market.
  • Tips to reduce network congestion
    August 2014, IT infrastructure in security
    IP security footage can travel on the corporate network, but is often banned because it takes so much bandwidth – especially video footage. Exinda offers some tips on improving the performance of your WAN.
  • Guaranteed cellular detection
    August 2014, Enterprise Solutions, IT infrastructure in security
    The CellDetect Solution rests on a few pillars namely prevention, detection, localisation and neutralisation supported by intelligence (research), technical knowledge and training.
  • Hi-tech solutions for new Miro head office
    August 2014, Miro distribution, CCTV, Surveillance, IT infrastructure in security, Case Studies
    Wireless IP convergence company Miro recently installed a converged networking and security solution at its new head office to cater for house security, safety and stock control.
  • Security and cloud computing
    July 2014, Technews Publishing, Security Services & Risk Management, IT infrastructure in security
    Who hasn’t heard of cloud computing, but how secure is your cloud provider and your data, and who is responsible for your data once in the cloud?
  • More than the camera
    July 2014, Syntech, IT infrastructure in security
    WD Purple drives are designed and built with surveillance in mind to ensure faster access, smooth and seamless functionality, and robust operation in a highly demanding environment.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.