Smart Connect Named “Business Partner of the Future” at IBM Insight Conference 2015

Posted on

On October 25, 2015 IBM kicked off its annual data and analytics conference, Insight 2015, which featured Smart Connect as the “Business Partner of the Future.” The Insight Conference is a yearly opportunity for IBM to feature the progress achieved through its partnerships and collaborations with other companies in the advancement of its big data […]

Posted in Uncategorized

Automated Protection

Posted on

Beyond providing high quality images, can conventional CCTV actually help reduce crime or incident response times? Is 24/7 control room monitoring an effective use of funding and resources or is there a smarter approach? How can disparate agencies and groups effectively work together if they don’t use similar systems or a common operating picture and […]

Posted in ApplicationsTagged , , No comments yet

Instant Integration

Posted on

“To connect to, and bring to life every device so that computers work for people.” – Resident Dreamer! What if you can automate access to, monitor, control, configure, check status of: cameras, traffic lights, motion sensors, processes, fire/safety equipment, chemical sensors, alarms, panic buttons, pumps, valves, all devices that would otherwise be connected to a specific […]

Posted in ApplicationsTagged , , , , , , , , , , No comments yet

Critical Incident Response

Posted on

Relief Response – Tool for Responders!   The GPAC System(TM) is one of the most complete and user friendly systems available for managing critical incidents. Critical incident response systems are generally only as good as the quality of data they provide to up-the-line decision makers. The GPAC System(TM) improves on this by making the best […]

Posted in ApplicationsTagged , , No comments yet

Physical Intrusion Detection (PID) in a Box

Posted on

Most physical security solutions, as in building, infrastructure, home security solutions, send out alerts after a breach – window broken, would be perpetrator jumps the fence – after the intrusion has occurred. Physical Intrusion Detection solutions (pIDS) should be able to cater for and detect when would be perpetrators are “casing the joint”, or undertaking […]

Posted in ApplicationsTagged , , , No comments yet

Seamless Threat Response

Posted on

Threat mitigation and response systems need to be flexible in order to adequately manage the diverse situations in which they are likely to be deployed. A critical aspect of providing this flexibility is the ability of a system to incorporate legacy, current and new components. The GPAC System™ is one of the best and most […]

Posted in ApplicationsTagged , No comments yet

Drones: Useful Tools, not Killing Machines

Posted on

Unmanned vehicles that function without the need for a person to be on board are one of the biggest technological advances of recent times. While we’re some way off seeing driverless cars on the streets, unmanned ground vehicles (UGVs), unmanned combat aerial vehicles (UCAVs), unmanned surface vehicles (USVs), autonomous underwater vehicles (AUVs), and several types […]

Posted in ApplicationsTagged No comments yet

The Virtuous Drone

Posted on

Take out the politics and emotion, and it becomes clear that with reasonable controls and policies, UAVs contribute to the net well-being of society – or they will if we allow it. By Ives Brant Drones are coming to the sky near you. If this conjures up an image of a Predator UAV (unmanned aerial […]

Posted in ApplicationsTagged No comments yet

GPoz Overview

Posted on

The GPAC (General Purpose Automation Controller) System™ is a true Programmable Automation Controller (PAC) as described by ARC Web. This blog brings you stories about the GPAC System™, documenting the multitude of uses and applications. Clients find the GPAC System™ to be the “swiss army knife”  for integrating diverse hardware, data collection and monitoring operations – it […]

Posted in OverviewNo comments yet