Presentation is loading. Please wait.

Presentation is loading. Please wait.

Emerging trends. Electronic Security Solutions Solution(s) considered for Security Access Control Systems Card readers Access control Personal Vehicles.

Similar presentations


Presentation on theme: "Emerging trends. Electronic Security Solutions Solution(s) considered for Security Access Control Systems Card readers Access control Personal Vehicles."— Presentation transcript:

1 Emerging trends

2 Electronic Security Solutions

3 Solution(s) considered for Security Access Control Systems Card readers Access control Personal Vehicles Biometric systems Fingerprint Iris Facial recognition Hand Geometry RIFD Cards Infra Red Sensors Magnetic & Capacitance sensors CMS Central Monitoring Systems Merchandise Protection Pressure mats Wireless Alarm Systems Home Security Solutions * Video Surveillance * Alarm systems * Door entry systems * CCTV * Access Control Systems Surveillance Devices * CCTV - Video (Closed circuit TV) * DVR * NVR Network Video Recorders * Air/Water Surveillance * Personal Surveillance * Vehicle Tracking System * Mobile Tracking System * Thermal Imagers * Unmanned Ariel Vehicles Perimeter Protection Devices Information Security Solutions * Buried Cable & Geo phone sensors * Microphonic cable disturbance sensor * Electro optical panoramic iintrusion detection system Fire Alarm Solutions * Fire Alarm Solutions * Fire Detection * Antivirus software * Firewall * Intrusion detection/ prevention * Network Security * Encryption / Decryption * Access Control for Computer * Database Management Office/Factory Security Solutions Car/Vehicle Security Solutions Mobile & PDA Security Solutions Computer data Security Solutions Motion protection system Water Leak Detection

4 Proposed Solution (pictorial representation – SW Architecture) Integrated surveillance system SensorCameraTransducers Integrated surveillance system Surveillance system over Cloud Ssaas – Security Software as a service Correlation for prediction

5 Use Case I Setup (Solution) for Critical Installation Refineries Airports Railway - metro

6 Secured Home Thermal Surveillance Information Sent Through Pc Information Received On Server Sent To User's Cell phone  Setup (Solution) for Residential Installation  Hosted on Cloud Use Case II

7 Why develop Intellectual Property? Proven, Licensable Sold & Supported independently Generate Customer “Pull” Center of Excellence Owned Standards based blocks Accelerate Product Development Sold part of services Special Application experience General Engineering Skills IP Re-Usable Blocks Codified Knowledge Codified Knowledge

8 IP Strategy Strategy 1 Strategy 2 Strategy 3 Expand current HW business Grow existing HW IP business with PHY & SW Develop New SW IP Develop new SW solutions Solutions for Mobile/ Consumer market Develop New Products Develop full prototypes for OEM/ODM customers.

9 Agenda followed for review Market Overview Explanation of proposed product/solution Effort/Cost estimate for product realization Competitors and How we can differentiate Revenue projections for 5 years

10 IP Channels Design Services companies IP Vendor Silicon Vendors OEM/ODM IP Customization Services

11 Activity Streams Wireless Power Social Analysis Group Buying Gamification 3D Printing Image Recognition Context-Enriched Services Speech-to-Speech Translation Internet of Things Natural Language Question Answering Big Data and Extreme Information Processing Management Social TV Video Analysis of Customer Service Computer Brain Interface Quantum Computing Human Augmentation 3D Bioprinting Internet TV NFC Payment Private Cloud Computing Augmented Reality Cloud Computing Media Tablet Virtual Assistants In-Memory Database Management Systems Gesture Recognition Machine-to-Machine Communication Services Mesh Networks : Sensor Cloud/Web Platforms Hosted Virtual Desktops Virtual Worlds E-Book Readers Consumerization QR/ Color Code Idea Management Biometric Authentication Mobile Application Stores Predictive Analytics Speech Recognition Location Aware Applications As of July 2011 Technology Trigger Peak of Inflated Expectations Trough of Disillusionment Slope of Enlightenment Plateau of Productivity time: Years to mainstream adoption: less than 2 years more than 10 years obsolete before plateau Source: Gartner (July 2011) Hype Cycle for Emerging Technologies, 2011

12 MIPI IPs Camera Tx Display Rx CSI-2 DSI-1 Application Processor SoC Co-Processor SoC D-PHY Base Band Processor SOC MPHY DIG RF RF PA Display Rx

13 Priority Matrix for Emerging Technologies, 2011 benefit high moderate low “Big Data” and Extreme Information Processing and Management 3D Printing Context-Enriched Services Internet of Things Internet TV Machine-to-Machine Communication Services Natural Language Question Answering 3D Bioprinting Hum an Augmentation Mobile Robots Quantum Computing E-Book Readers Hosted Virtual Desktops Location-Aware Applications Mobile Application Store Predictive Analytics Cloud/Web Platforms Private Cloud Computing QR/Color Code Social Analytics Wireless Power Augmented Reality Consumerization Social TV Virtual Assistants Mesh Networks: Sensor Activity Streams Biometric Authentication Methods Gesture Recognition Group Buying Idea Management Speech Recognition Gamification Image Recognition NFC Payment Speech-to-Speech Translation Virtual Worlds Computer-Brain Interface Video Analytics for Customer Servise Source: Gartner (July 2011) As of July 2011 years to mainstream adoption less than 2 years2 to 5 years 5 to 10 years more than 10 years transformational


Download ppt "Emerging trends. Electronic Security Solutions Solution(s) considered for Security Access Control Systems Card readers Access control Personal Vehicles."

Similar presentations


Ads by Google