SlideShare a Scribd company logo
1 of 54
Planning for Outdoor
Video Surveillance Projects
Today’s
Moderator
David Martin
Physical Security
Specialist
LENSEC
Webinar
Sponsor
About LENSEC
• Based in Houston, TX
• Since 1998
• IP Video Management Solutions
• System Design
• Installation & Project
Management
Perspective Video Management Software (VMS) ™
LENSEC is committed to empowering our clients and partners to prevent or mitigate physical security risks.
We want to help protect people and assets as well as improve operations through our evolutionary and
intuitive technology. We can do this by providing expertise in security and software development.
Our Mission
Webinar
Logistics
• Q&A at the end
• Questions for the panelist
• Audio from attendees muted
• Poll questions
• Survey
Keith Harris
Marketing Manager
LENSEC
Today’s
Panelist
• Degree in Broadcasting & Photojournalism
• 27 Years Working in Photography & Video Production
• 6 Years in Physical Security Market
• Expertise in Training Techniques for Video Surveillance
Training
Goal
Planning for Outdoor Video Surveillance Projects
Our goals are …
Environmental Concerns
Transmission of Video & Data
Rugged Edge Devices
Power Considerations
Remote Camera Locations
Site Survey
The site survey is most important for properly
evaluating needs at a project location
Pay attention to the big picture, but think about the
small details
Try to picture the entirety of the project
You may not get easy access to the site again
Understanding the projects puzzle pieces early on will
determine the success of the entire process
Outdoor Video Surveillance Projects
Poll
Question
Poll Question #1
What are the two most important
factors in determining an outdoor
camera position?
Remote Camera Locations
Site Survey – Design
Thinking about site design starts
with the initial customer
conversation
Google Earth is a good tool for
outdoor projects
IPVM Camera Calculator
Take Pictures
Camera Views
Installation Views
Outdoor Video Surveillance Projects
IPVM Camera Calculator: http://ipvm.com/calculator (members only)
Remote Camera Locations
Site Survey
Scenario 1 – No Infrastructure
Scenario 2 – Limited Infrastructure (pavilion/maintenance shed/bathroom)
Scenario 3 – Solid Infrastructure (office/recreation center/fleet garage)
Outdoor Video Surveillance Projects
Remote Camera Locations
Scenario #1 – No Infrastructure
Edge Device Position
Network
Transmission
Outdoor Video Surveillance Projects
Remote Camera Locations
Scenario #2 – Limited Infrastructure
Edge Device Position
Network
Transmission
Outdoor Video Surveillance Projects
Remote Camera Locations
Scenario #3 – Solid Infrastructure
Edge Device Position
Network
Transmission
Outdoor Video Surveillance Projects
Remote Camera Locations
Site Survey – Poles
Existing Pole Survey
New Pole Positions
Proper Hardware
Cherry Picker
Outdoor Video Surveillance Projects
Remote Camera Locations
Wired Transmission
Existing Trench/Conduit
New Trenches
Outdoor Video Surveillance Projects
http://www.homewyse.com/services/cost_to_dig_trench.html
Remote Camera Locations
Site Survey – Poles
Number of Cameras per pole – four maximum
NEMA enclosure with Rugged Equipment
POE Power Supply
Network Switch
Transmission path (wired or wireless)
Auxiliary adapters (fiber, network bridge, cellular
transmission, etc.)
Edge Recording
Outdoor Video Surveillance Projects
Remote Camera Locations
Wired Transmission
Outdoor Rated Cable
Conduit
Outdoor Video Surveillance Projects
Poll
Question
Poll Question #2
Why is Line of Sight important in a
wireless transmission?
Remote Data Transmission
Wireless Transmission
Line Of Sight
Fresnel Zone
Outdoor Video Surveillance Projects
http://www.proxim.com/products/knowledge-center/calculations/calculations-fresnel-clearance-zone
Remote Data Transmission
Wireless Transmission
RF Environment
Outdoor Video Surveillance Projects
Remote Data Transmission
Wireless Point To Point Transmission (P2P)
Outdoor Video Surveillance Projects
Remote Data Transmission
Wireless Point to MultiPoint Transmission (P2MP)
Outdoor Video Surveillance Projects
Remote Data Transmission
Wireless Mesh Transmission
Outdoor Video Surveillance Projects
Remote Data Transmission
Wireless Mesh Transmission
Outdoor Video Surveillance Projects
Remote Power
Power – AC Power
Power at Device
POE Injectors
Test it – Don’t trust it
Scheduled Power
Voltage Drop
Outdoor Video Surveillance Projects
http://www.calculator.net/voltage-drop-calculator.html
Remote Power
Power – Battery
Plan To Recharge
Long Term Maintenance
Outdoor Video Surveillance Projects
Remote Power
Power – Solar
Temporary or Permanent
Geographic Location
Good Solar Exposure
Power Draw
Battery Bank
Outdoor Video Surveillance Projects
http://energy.gov/maps/solar-energy-potential
Camera Placement
Layers of Security
Outdoor Video Surveillance Projects
Camera Placement
Choke Point
Driveway
Gate
Outdoor Video Surveillance Projects
Poll
Question
Poll Question #3
Why does distance between the
camera and target area matter?
Camera Placement
Wide Shot / Tight Shot
Wide = Large Area of Coverage / Limited Detail
Tight = Limited Area of Coverage / Higher Detail
Outdoor Video Surveillance Projects
Camera Placement
Field of View
Distance To Target
Width Of Target Area
Outdoor Video Surveillance Projects
http://www.lensec.com/tutorial/calculator.html
Camera Placement
Blind Spots
No Coverage
Future Phase
Outdoor Video Surveillance Projects
Camera Placement
Entrances / Exits
Cover Them All?
Set Your Priorities (e.g. – Main Entrance vs.
Loading Dock)
Outdoor Video Surveillance Projects
Camera Placement
Building Mounting Positions
Soffits
Corners
Wall Penetration
Mounting Hardware
Outdoor Video Surveillance Projects
Camera Placement
Pole Mounting Positions
Mounting Hardware
Lighting (avoid glare)
Pole Position (existing vs. new)
Outdoor Video Surveillance Projects
Equipment Choices
Camera Types
PTZ
MP Cameras
180 Degree Cameras
Outdoor Video Surveillance Projects
Equipment Choices
Camera Types
Pixels Per Foot
Resolution vs. Coverage Area
Outdoor Video Surveillance Projects
http://www.iqeye.com/sites/all/themes/iqinvision/calc/pixels_per_foot/
General Detail
Forensic Detail
High Detail
Equipment Choices
Camera Features
Weatherproof
Vandalproof
Infrared
Outdoor Video Surveillance Projects
Environmental Considerations
Crime Prevention Through Environmental Design
Outdoor Video Surveillance Projects
Outdoor Video Surveillance Projects
Environmental Considerations
Lighting
Outdoor Video Surveillance Projects
Training
Goal
Planning for Outdoor Video Surveillance Projects
Our goals are …
Environmental Concerns
Transmission of Video & Data
Rugged Edge Devices
Power Considerations
Questions
Q&A
Contacts
David Martin
LENSEC
(512) 318-3829
dmartin@lensec.com
Keith Harris
LENSEC
(512) 913-3907
kharris@lensec.com
Thanks for Attending
Today’s Webinar

More Related Content

What's hot

Defending our datacenters (BICSI 2016 ASEAN conference)
Defending our datacenters  (BICSI 2016 ASEAN  conference)Defending our datacenters  (BICSI 2016 ASEAN  conference)
Defending our datacenters (BICSI 2016 ASEAN conference)Jeffrey Lam
 
10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance InstallationShein Myint Aung
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...EnergySec
 
Campus Technology Day Campus Security Review
Campus Technology Day Campus Security ReviewCampus Technology Day Campus Security Review
Campus Technology Day Campus Security Reviewwebhostingguy
 
SQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateSQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateAlex Kwan
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleEnergySec
 
Identity Based Lifecycle Management for a Trusted IoT Supply Chain
Identity Based Lifecycle Management for a Trusted IoT Supply ChainIdentity Based Lifecycle Management for a Trusted IoT Supply Chain
Identity Based Lifecycle Management for a Trusted IoT Supply Chaintomkat58
 
Making SIP Migration Easy
Making SIP Migration EasyMaking SIP Migration Easy
Making SIP Migration EasyIntelePeer
 
Secure calling for IP telephony - webinar 2016, English
Secure calling for IP telephony - webinar 2016, EnglishSecure calling for IP telephony - webinar 2016, English
Secure calling for IP telephony - webinar 2016, EnglishAskozia
 
redwire video verification
redwire video verificationredwire video verification
redwire video verificationnokelley
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewChristine MacDonald
 

What's hot (20)

Defending our datacenters (BICSI 2016 ASEAN conference)
Defending our datacenters  (BICSI 2016 ASEAN  conference)Defending our datacenters  (BICSI 2016 ASEAN  conference)
Defending our datacenters (BICSI 2016 ASEAN conference)
 
10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
 
Campus Technology Day Campus Security Review
Campus Technology Day Campus Security ReviewCampus Technology Day Campus Security Review
Campus Technology Day Campus Security Review
 
Adaptive Trust for Strong Network Security
Adaptive Trust for Strong Network SecurityAdaptive Trust for Strong Network Security
Adaptive Trust for Strong Network Security
 
Whitepaper perimeter protection
Whitepaper perimeter protectionWhitepaper perimeter protection
Whitepaper perimeter protection
 
SQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateSQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone Update
 
OTT for Mobile Devices
OTT for Mobile DevicesOTT for Mobile Devices
OTT for Mobile Devices
 
IoT13: Electric Imp showcase
IoT13: Electric Imp showcaseIoT13: Electric Imp showcase
IoT13: Electric Imp showcase
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
 
Et software brochure
Et software brochureEt software brochure
Et software brochure
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
 
Identity Based Lifecycle Management for a Trusted IoT Supply Chain
Identity Based Lifecycle Management for a Trusted IoT Supply ChainIdentity Based Lifecycle Management for a Trusted IoT Supply Chain
Identity Based Lifecycle Management for a Trusted IoT Supply Chain
 
Hugo Fiennes - Security and the IoT - Electric Imp
Hugo Fiennes - Security and the IoT - Electric ImpHugo Fiennes - Security and the IoT - Electric Imp
Hugo Fiennes - Security and the IoT - Electric Imp
 
Making SIP Migration Easy
Making SIP Migration EasyMaking SIP Migration Easy
Making SIP Migration Easy
 
checkpoint
checkpointcheckpoint
checkpoint
 
Secure calling for IP telephony - webinar 2016, English
Secure calling for IP telephony - webinar 2016, EnglishSecure calling for IP telephony - webinar 2016, English
Secure calling for IP telephony - webinar 2016, English
 
redwire video verification
redwire video verificationredwire video verification
redwire video verification
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration Review
 
Adaptive Trust Security
Adaptive Trust SecurityAdaptive Trust Security
Adaptive Trust Security
 

Similar to Step Into Security Webinar - Planning for Outdoor Video Surveillance Projects

Wearable Photogrammetry - What to Wear for Work #COMIT2017
Wearable Photogrammetry - What to Wear for Work #COMIT2017Wearable Photogrammetry - What to Wear for Work #COMIT2017
Wearable Photogrammetry - What to Wear for Work #COMIT2017Comit Projects Ltd
 
Gem iCon Provides Campus Wide Security & Wi Fi
Gem iCon Provides Campus Wide Security & Wi FiGem iCon Provides Campus Wide Security & Wi Fi
Gem iCon Provides Campus Wide Security & Wi Fitycollc
 
Whitepaper networkvideo safecity
Whitepaper networkvideo safecityWhitepaper networkvideo safecity
Whitepaper networkvideo safecityAndrea Sorri
 
Whitepaper networkvideo safecity
Whitepaper networkvideo safecityWhitepaper networkvideo safecity
Whitepaper networkvideo safecityAxis Communications
 
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus Keith Harris
 
FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-
FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-
FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-Emmanuel Anim
 
Ip Based distributed surveillance system
Ip Based distributed surveillance systemIp Based distributed surveillance system
Ip Based distributed surveillance systemKamal Lamichhane
 
Internship report - Copy1
Internship report - Copy1Internship report - Copy1
Internship report - Copy1Riya Dashoriya
 
Samsung Security cameras
Samsung Security camerasSamsung Security cameras
Samsung Security camerasHaitham Youssef
 
CCTV Surveillance System, attacks and design goals
CCTV Surveillance System, attacks and design goals  CCTV Surveillance System, attacks and design goals
CCTV Surveillance System, attacks and design goals IJECEIAES
 
Blaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera SolutionsBlaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera SolutionsBlaze Automation
 
COMIT Community Day Autumnn 2018 - Trellisworks ipcctv
COMIT Community Day Autumnn 2018 - Trellisworks ipcctvCOMIT Community Day Autumnn 2018 - Trellisworks ipcctv
COMIT Community Day Autumnn 2018 - Trellisworks ipcctvComit Projects Ltd
 
Video Surveillance Report
Video Surveillance ReportVideo Surveillance Report
Video Surveillance ReportMihika Shah
 
"Using Deep Learning for Video Event Detection on a Compute Budget," a Presen...
"Using Deep Learning for Video Event Detection on a Compute Budget," a Presen..."Using Deep Learning for Video Event Detection on a Compute Budget," a Presen...
"Using Deep Learning for Video Event Detection on a Compute Budget," a Presen...Edge AI and Vision Alliance
 
Lijin thomas security project manager
Lijin thomas security project managerLijin thomas security project manager
Lijin thomas security project managerlijin thomas
 

Similar to Step Into Security Webinar - Planning for Outdoor Video Surveillance Projects (20)

Wearable Photogrammetry - What to Wear for Work #COMIT2017
Wearable Photogrammetry - What to Wear for Work #COMIT2017Wearable Photogrammetry - What to Wear for Work #COMIT2017
Wearable Photogrammetry - What to Wear for Work #COMIT2017
 
Gem iCon Provides Campus Wide Security & Wi Fi
Gem iCon Provides Campus Wide Security & Wi FiGem iCon Provides Campus Wide Security & Wi Fi
Gem iCon Provides Campus Wide Security & Wi Fi
 
Whitepaper networkvideo safecity
Whitepaper networkvideo safecityWhitepaper networkvideo safecity
Whitepaper networkvideo safecity
 
Whitepaper networkvideo safecity
Whitepaper networkvideo safecityWhitepaper networkvideo safecity
Whitepaper networkvideo safecity
 
Siva_resume
Siva_resumeSiva_resume
Siva_resume
 
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
 
FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-
FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-
FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-
 
Ip Based distributed surveillance system
Ip Based distributed surveillance systemIp Based distributed surveillance system
Ip Based distributed surveillance system
 
#FiaComit ibeacons
#FiaComit ibeacons#FiaComit ibeacons
#FiaComit ibeacons
 
Internship report - Copy1
Internship report - Copy1Internship report - Copy1
Internship report - Copy1
 
Samsung Security cameras
Samsung Security camerasSamsung Security cameras
Samsung Security cameras
 
Samsung Techwin Hanwha
Samsung Techwin HanwhaSamsung Techwin Hanwha
Samsung Techwin Hanwha
 
CCTV Surveillance System, attacks and design goals
CCTV Surveillance System, attacks and design goals  CCTV Surveillance System, attacks and design goals
CCTV Surveillance System, attacks and design goals
 
Blaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera SolutionsBlaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera Solutions
 
COMIT Community Day Autumnn 2018 - Trellisworks ipcctv
COMIT Community Day Autumnn 2018 - Trellisworks ipcctvCOMIT Community Day Autumnn 2018 - Trellisworks ipcctv
COMIT Community Day Autumnn 2018 - Trellisworks ipcctv
 
DVO FAQ - Streaming Video
DVO FAQ - Streaming VideoDVO FAQ - Streaming Video
DVO FAQ - Streaming Video
 
Video Surveillance Report
Video Surveillance ReportVideo Surveillance Report
Video Surveillance Report
 
bc_techguide_33334_en_0811_lo.pdf
bc_techguide_33334_en_0811_lo.pdfbc_techguide_33334_en_0811_lo.pdf
bc_techguide_33334_en_0811_lo.pdf
 
"Using Deep Learning for Video Event Detection on a Compute Budget," a Presen...
"Using Deep Learning for Video Event Detection on a Compute Budget," a Presen..."Using Deep Learning for Video Event Detection on a Compute Budget," a Presen...
"Using Deep Learning for Video Event Detection on a Compute Budget," a Presen...
 
Lijin thomas security project manager
Lijin thomas security project managerLijin thomas security project manager
Lijin thomas security project manager
 

More from Keith Harris

Step Into Security Webinar - Threat Assessments for K-12 & University Campuses
Step Into Security Webinar - Threat Assessments for K-12 & University CampusesStep Into Security Webinar - Threat Assessments for K-12 & University Campuses
Step Into Security Webinar - Threat Assessments for K-12 & University CampusesKeith Harris
 
Step Into Security Webinar - Securing Campuses for the New School Year
Step Into Security Webinar - Securing Campuses for the New School Year Step Into Security Webinar - Securing Campuses for the New School Year
Step Into Security Webinar - Securing Campuses for the New School Year Keith Harris
 
Step Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in SchoolsStep Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in SchoolsKeith Harris
 
Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at SchoolsStep Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at SchoolsKeith Harris
 
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...Keith Harris
 
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...Keith Harris
 

More from Keith Harris (6)

Step Into Security Webinar - Threat Assessments for K-12 & University Campuses
Step Into Security Webinar - Threat Assessments for K-12 & University CampusesStep Into Security Webinar - Threat Assessments for K-12 & University Campuses
Step Into Security Webinar - Threat Assessments for K-12 & University Campuses
 
Step Into Security Webinar - Securing Campuses for the New School Year
Step Into Security Webinar - Securing Campuses for the New School Year Step Into Security Webinar - Securing Campuses for the New School Year
Step Into Security Webinar - Securing Campuses for the New School Year
 
Step Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in SchoolsStep Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in Schools
 
Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at SchoolsStep Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
 
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
 
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
 

Recently uploaded

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 

Recently uploaded (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 

Step Into Security Webinar - Planning for Outdoor Video Surveillance Projects