TimeTech Magazine
August 2017 Issue
FLIR Application Story
The Smart Video Security Handbook
In this issue we look back on the
FLIR Camera Catches Shop-lifters
We give you a glimpse of the first
Team from our Cape Town and
last two issues with some added
red handed!
chapter and give you the opportu-
Pretoria branch!
A blast from the past, With a new look, stories and articles!
Meet the Team! Meet the Timeless Technologies
nity to own one yourself!
Tomorrows Technology Today
Page 1 l TimeTech Magazine
In this Issue: Pg. 2 - 3 Contents and Editors Pg. 4 - 5 Timeless Technologies & FLIR TK Scout Pg. 6- 7 Harry White Article Pg. 8 - 9 Timeless Talks Clients & Timeless Technologies Pg. 10 - 11 Control Room Design Pg. 12 - 13 TimeTech Tester Special & Davantis Pg. 14 - 15 Smarter Access Control Pg. 16 - 17 Synergise Pg. 18 - 19 Electric Fencing Pg. 20 - 21 4c Technology & Xanadu Pg. 22 - 25 FLIR Technical Notes Pg. 26 - 27 Betafence & MAD Pg. 28 - 30 Are Thermal Cameras Damaged by Solar Radiation Pg. 32 - 33 Thermal vs Night Vision Pg. 36 - 41 Outdoor Secutiy Comes of Age Pg. 42 - 43 Bona Electronic Solutions Pg. 44 - 45 An Analytical Brain Pg. 46 - 47 FLIR & Ionodes Pg. 48 - 49 FLIR Application Story Pg. 50 - 51 FLIR FC Series & Fang Pg. 52 - 53 Hatteland Display Pg. 54 - 55 YSG & IONODES Pg. 56 - 57 Timeless Talks Pg. 58- 59 Meet the Timeless Technologies Team Page 2 l TimeTech Magazine
Meet the brains behind the magazine
Lelanie Carrick My role in this magazine was adding a creative flare to an already - existing concept. I designed a gripping layout, hunted for the perfect images to be combined with the articles and created the over-all structure and look of the, now accomplished, TimeTech Magazine! I also assisted with retrieving the articles and made sure that what you read is worth while. I thouroughly enjoyed giving this issue a “face� and I hope that you - as the reader - will savour these pages and everything that they have to offer. They were evidently designed with passion, alot of love and an abundance of creativity.
SunĂŠ Diedericks As Communications Coordinator of Timeless Talks, working on this project with Timeless Technolgies: My part consisted of the collection of articles, advertisments, meeting with Timeless Technogies clients and making sure we approach the right industry and client base for this magazine. This magazine is not only to inform Timeless Technologies clients about what is happening in the industry but also to show what Timeless Technologies is currently busy with and to unite different companies in the industry to showcase what they are about. Watch this space...our November 2017 Issue is going to be bigger, better and bolder! Page 3 l TimeTech Magazine
Page 4 l TimeTech Magazine
The FLIR Scout TK is a pocket-sized thermal vision monocular for exploring the outdoors—at night and in low light conditions. The Scout TK reveals your surroundings and helps you see people, objects and animals over 100 yards (90 m) away. Simple to use, with still image and video recording, Scout TK is the perfect companion, whether in the back country or your own backyard. Contact Timeless Technologies if You are insterested in this project: www.timetech.co.za l sales@timetech.co.za l 021 975 3515 Page 5 l TimeTech Magazine
Harry White Talks Estate Security... I
ronically I have found over the years that a number of failings in the security infrastructure or protocols on security estates, are caused by the very same people we are trying so desperately to keep safe. We often hear security experts compare the various layers which are essential for a good security infrastructure with the layers of an onion, which fittingly becomes progressively softer and slighter towards the middle, but importantly has layers which continue all the way to the final layer, which resembles resident’s own security measures in and around their homes. It is a very good strategy to have multiple layers of security, if of course all these layers exist right the way down to the center. Unfortunately though, as security and estate management professionals, we are increasingly finding that the threats to most security estates are now better comparable to that of a coconut, with a few, nearly impenetrable layers on the outside. I say this, as more and more an expectation seems to exist that when living in a secure estate, one is immediately excluded from the threat of crime and doors, windows, motor vehicles etc. may simply be left wide open and vulnerable to crime . The consequence being that, not unlike the coconut, the inside of the fruit or the reward becomes very attractive to the criminal mind and we increasingly have to consider ways of how to make the outer layers more impenetrable. Video analytic software supported camera infrastructures, in combination with physical and electrical fences, now makes up the outer layer defenses of most of the top security estates. Also in these outer layers of defenses are security access control personnel, various access control systems/ software, armed response and access camera monitoring infrastructures.
Page 6 l TimeTech Magazine
Y
et all these measures and millions of manned patrols, but still they would not be Rands spent comes to nothing when able to make up all such security shortcomings. Mr. Jones thinks it’s a good idea for him to obtain an access disk for his child who “As a security and estate management now works on weekends for the local food professionals we must, in addition to delivery company and he or she can impress continuously growing our technical their peers by leaving the disk at work for all security capabilities, continuously remind the delivery personnel to use when making residents of the consequences they could a delivery to the estate. Mr. Jones justifies this be faced with if a crime of this nature or action on the basis that “this would just make any crime for that matter was committed things so much simpler for the poor delivery against a fellow resident, by someone they staff when they have to deliver to the estate!” allowed to enter the estate incorrectly, or by someone residing at their home.” Not a lot of imagination is required to see how this opportunity will be snatched up Continue to make those outside layers of your by a criminal mind. Not long after the disk security infrastructures impenetrable, but at has disappeared from the office, a house the same time make sure that you educate is robbed on the estate and all hell breaks your residents continuously in respects of the loose; how did they get in, let’s review all do’s and don’t, because sooner or later those perimeter cameras and the list goes on. very tempting juices inside that coconut, After launching investigations, reviewing all will cause someone to test that outer shell. perimeter cameras, access control logs and footage we finally find that the crime was Harry White committed by someone using an access card Estate Manager: Atlantic Beach Golf Estate registered against the name of Mr. Jones. Similarly there are a number of examples of how the irresponsible conduct by the very people we are trying to protect, can jeopardize their own safety. To combat security shortcomings caused by the irresponsible conduct of this nature, recent monitoring innovations like specialized helium balloons and drones fitted with specialized cameras, can be considered in addition to
Page 7 l TimeTech Magazine
Page 8 l TimeTech Magazine
Worldwide, the popularity of Aerostat systems are growing quickly. Why the need for an Aerostat system? It is a cost effective way to launch, monitor, and recover a payload designed for aerial surveillance, communication, and atmospheric monitoring. The patented Sky Doc™ Aerostat System is a unique product line designed to provide it’s handlers with superior durability in all types of weather conditions so that your payload can be up in the air and operational whenever you need it. Because of this, we’ve had customers from many different specialties and countries purchase systems to be used for their specialised needs. Aerostat Sky Doc™ Aerostat Systems are configured to individual needs and our helium aerostat platform was specifically designed to meet criterion requested by many operators of aerial specialised equipment and built with state of the art components to offer optimum performance and reliability.
Page 9 l TimeTech Magazine
Control Room Design... T
he design criteria for control rooms are as dynamic as the speed in change in the associated technology. Needless to say, the technology is only one part of the design criteria, but the ergonomics will always be the same. The reason for the latter is merely that the human factor and external body influences will always be the same, as the body does not change much over time. The reader immediately recognised that there are two parts to this chapter, in the design criteria for the control room. The first one will be, what design criteria do you need to follow due to technology enhancements? The second criteria stays more or less the same at all times, ergonomics, i.e. chair type, back support, arm support, operational time, etc. Referring to the above, we exclude the policies and procedures for now. The technology used in a control room today, could be divided into hardware and software. These items change and develop at a wrapped pace, and the outcome is
Page 10 l TimeTech Magazine
very favourable for control room operations. Just some of the items which are changing monthly are flat screens, powerful switching, IP signals, smart search, screen switching etc. The ergonomics will always be a standard, where you have to calculate the time frame which the operator will be able to view the screen effectively and the physical strain on a human body. There are definitely factors which put strain on the neck, the eyes, the hands and the back. These are the major aspects to the design and it needs to be investigated thoroughly.
The neck is influenced by the distance from the screen, the elevation and height of the screen on top, the lower section, and the horizontal position. The back is influenced by the type of chair used and the duration sitting in the chair during the shift. The eyes are influenced by the quality of light within the control room during daytime and night time. As well as the quality of the monitor used and minimal flickering and contrast levels. There are smaller and other type of “strains”, which must be considered as well, in ensuring effective control room staff. The individual needs to be screened in assuring that the customer does get the most effective operator for the task, at hand. The policies and procedures needs to be drafted and these items will ensure that all the operations, technical support and outputs are well managed, and that the customer receives value for money. The hardware used today is very different to that used a year ago, due to the wrapped speed of technological advances. Timeless Technologies is always on top of the latest trends and developments on continuous bases, and the influence of these developments contributes vastly to the design changes. Some of the technological advances are the, ”flickering” of the screen, quality of the image, illumination, the contrast of the display, the refresh rate of the pixels, the angle of view and the anti-burn in Of the image. The software considerations are valid as well. The latest black screen technology is being used more often. The trend towards decision making is moved towards the electronics as well and away from the human factor. We have come across various types (or versions) of software, where the intelligence is built into the controller. Due to various reasons, which will not be discussed now, the decision making of what to happens, who to report to and what to switch, etc. is more and more left to the rules as set up occurs. Therefore, the design criteria used in designing a control room has many aspects, and all of these must be considered in ensuring an outcome as determined by the customer. The question is always asked, “did your control room design team, considered all the aspects?”
Page 11 l TimeTech Magazine
Page 12 l TimeTech Magazine
Page 13 l TimeTech Magazine
Smarter Access Control... P
hysical access control technologies have, approximately, been around for the past thirty years or and in that time it hasn’t seen the rapid technology progress that,perhaps, CCTV technologies have. Sure, IP or cloudbased access control products are now readily available, but the development cycle has been slow, and the customer enddevices are still pretty much the same - an RFID card/reader, an intelligent controller and a lot of wired infra-structure. For the most part the primary technology leap has been to shift database servers into a cloud environment, and to take advantage of IP connectivity, but little else. Traditional access control architecture is based on the idea that security systems will remain closed standalone systems, interfacing only to security sensors and security devices, located within one or more specific buildings, operating on a limited set of cardholders and door data entered manually or imported into the system from
Page 14 l TimeTech Magazine
an external database. This was not an objective or a design choice—it was the only design option, given the technology-based constraints imposed on access control system manufacturers. The world outside of an access control system had little or nothing to offer in terms of security relevant information and communication. Today that outside world contains an abundance of information and communication options that are highly security relevant, and are now available through an organisation’s IT infrastructure and the Internet. Unfortunately today’s technology trends are producing much important technology that is not available to a system based on traditional architecture. Today two such trends are very relevant to security: Bring Your Own Device (BYOD) and The Internet of Things (IoT);
Bring Your Own Device (BYOD) Almost everyone has a personal smart device (i.e. mobile phone, smart-phone, a tablet PC) that is routinely used in the course of one’s personal and business life, and in a lot of instances they are resources that have cost an organisation very little to purchase and maintain, if at all. It’s an extension of your physical self, and is considered as such by many institutions such as banks for PIN verification, or even some residential estates, where you are sent an SMS by a tenant containing a unique PIN code for entry. Applying this trend and technology for access control use could be in the following ways: PIN based, QR Code, Bluetooth, NFC (near field communication), Smart-phone biometrics .Given the explosive growth in the use of personal smart devices and the continuing advance of their capabilities, BYOD is definitely a resource to consider. The Internet of Things (IoT) The Internet of Things (IoT) refers to a world where “things” (which can be smart devices or sensors on objects, people or animals) are
all potentially connected via the Internet, with the ability to collect and share data. As IoT technology continues to be developed and deployed, many more sources of security-relevant real-time information will appear. For example, where critical materials (including substances subject to control policies) require outdoor transport and temporary storage, policy-based asset protection rules can require that only authorized people be in proximity to the materials, and that the materials are not moved outside of defined boundaries (virtual fencing). Violations of the policy conditions would trigger an alarm and in turn could activate additional response measures. IoT technology holds the promise of closing security gaps and strengthening security response actions, but only if access control architecture is sufficiently advanced to take advantage of such technologies. Acknowledgements to Viscount Systems Inc. (www.viscount.com)
Page 15 l TimeTech Magazine
Page 16 l TimeTech Magazine
Page 17 l TimeTech Magazine
Are you Safe and Secure With Electric Fencing? “Over the last decade, electric fencing has become a must-have feature for every property. Not only does it act as a psychological and physical deterrent for criminals, but replaces alternative, more expensive barriers. Electric fencing is the very first line when it comes to protecting your home, not only in the sense that it is a deterrent, but also acts as a system that gives the wouldbe criminal a rather painful and very unpleasant highvoltage shock. Additionally, by using an electric fence, the attempted penetration of an electrically protected area is delayed, thus allowing adequate reaction time for security personnel to respond. South African regulations: According to governing bodies such as SABS, SANS and the government,
Page 18 l TimeTech Magazine
legislation was introduced to ensure that the public could not be fatally shocked when coming into contact with electric fencing. As set forth by the Electric Machinery Regulations and the Occupational Health and Safety Act, the maximum voltage set in South Africa is 10 000 volts. Additional safety features as per the law includes a clear and visible warning sign, consideration into location of neighbouring fences, no installation near power and communication lines, and general location of installation. There are also strict regulations with regards to materials used, and it is a good idea to brush up on these if you wish to commission an electrical professional. It’s always best to know your facts before spending your money.
What you want from an electrical contractor: Electric fences and products are relatively low maintenance and extremely cost effective as a security solution. When commissioning a contractor, keep the following in mind: time to initiate and complete the project, installation and maintenance, assurance of quality (in the form of guarantees) and certification from governing bodies. Unfortunately, not every electrical fence installation is of quality. It often happens that electrical contractors are commissioned on rush jobs, and therefore cannot guarantee optimum functioning. Â
The three main considerations are whether or not the fence secures the entire perimeter, does the fence installed and the fence they had in mind match, and does the fence comply with the regulations set forth by governing bodies? Additional aspects of “bad” fencing includes: poor earth grounding, using different types of metals, fence-posts that are too close together, wires are tied too tightly to fence-posts (which doesn’t allow elasticity), the fence was built on an old or existing fence, poor quality insulators were used, there are kinks in the wire, wires are too close together, there is no voltmeter, and there is an inadequate charger.
Maintenance The maintenance of your electric fence must be a top concern because malfunctioning gates can be costly and counteract the security measures that it serves as. The first aspect of maintaining electric fencing is to ensure the area around it is clean. This means removing shrubs, bush growth, small branches, leaves and twigs. This should be done at least once a month to ensure maximum functioning. It’s also a good idea to have line holding fences that keep the fence taut, and you should regularly check the voltmeter, which is used to check that a fence is working and to assist the fence minders to find faults.
When it comes to home security, it is better to be safe than sorry. When selecting a contractor to install and maintain electric fences, make sure you have done your research and commission a project that is well-communicated between you and the security provider. Take your time in making this decision, a rushed job is not always a resilient and durable one.” Mari Sciarappa Reference: http://www. homeideas.co.za/safeand-secure-with-electricfencing-2/
Page 19 l TimeTech Magazine
Page 20 l TimeTech Magazine
Page 21 l TimeTech Magazine
Page 22 l TimeTech Magazine
Page 23 l TimeTech Magazine
Page 24 l TimeTech Magazine
Page 25 l TimeTech Magazine
Page 26 l TimeTech Magazine
Page 27 l TimeTech Magazine
Are Thermal Cameras Damaged by Solar Radiation? Thermal imaging cameras can create high-contrast images, even in the darkest of nights. This makes them excellent tools for a wide variety of applications such as security and surveillance, maritime, automotive and many others. The purchase of a thermal imaging camera is a long term investment. Therefore it is important that you choose a reliable solution that will serve you for several years. Since most thermal imaging cameras are used in an outdoor environment, the first thing they need to resist are elements like water, wind and the sun. While it might be expected that rain and wind can damage a poorly designed or poorly assembled camera, the sun is also capable of damaging the sensitive thermal detector in certain thermal imaging cameras that are not designed to the standards that FLIR Systems maintains.
Thermal imaging cameras and the sun Although no one purchases a thermal imaging camera for looking at the sun, situations can occur where this happens. Just imagine a thermal imaging camera installed on a Pan/ Tilt. When panning or tilting the camera, the operator can be distracted and turn the camera in a direction so that it points directly at the sun. The chances of this happening are higher if the sun is just above the horizon.  What happens more often, especially with fixed installed thermal imaging cameras, is that the sun is moving through the field of view of the thermal imaging camera which is looking at the horizon. Although thermal imaging cameras are mostly used during the night, many users rely on thermal imaging cameras during daytime as well. After all, thermal contrast is extremely difficult to mask, so people hiding in shadows or bushes will immediately be seen in a thermal image. Thermal imaging cameras are also not blinded by glare from the sun. But even if the camera is not switched on during daylight, the lens might be looking directly at the sun. For some thermal camera systems this can “fry� the detector.
Page 28 l TimeTech Magazine
No permanent damage with FLIR Systems Vanadium Oxide detectors Unlike many other thermal infrared detectors, FLIR’s uncooled Vanadium Oxide micro-bolometer detector technology is immune to permanent damage when directly viewing the sun in normal video applications (i.e. the sun moves through the field of view of a fixed camera viewing the horizon). However, because of the extremely high amount of thermal energy radiated by the sun, some temporary effects can be observed when the sun is in the field of view of the thermal imaging camera. Protection mechanisms FLIR’s thermal imaging cameras incorporate several protection mechanisms that make them immune to permanent solar damage while also minimizing any temporary effects. First, the FLIR Vanadium Oxide ( VOx) uncooled arrays are housed right behind a short-pass filter that blocks wavelengths shorter than 7 micrometers. This helps to mitigate the effect from solar radiation because as you increase the wavelength you are looking at, the energy radiated from the sun (temperature approximately 6,000K) decreases.
FLIR Systems uncooled VOx micro-bolometer detectors operate in the long wave infrared spectrum
from
7.5-13.5
micrometers. The sun radiates the most energy at about 500
nanometres (the colour green in the visible light spectrum), but there is still plenty of energy once the longer wavelength infrared spectrum is reached. Hence, cutting off the lower wavelengths decreases the energy allowed to the detector. There is also an Anti-reflective coating on the detector surface that limits the energy absorbed from wavelengths outside the 7.5-13.5 micrometer range.
Page 29 l TimeTech Magazine
Another technique used to lessen the effects from the sun is found in the electronics of the detector. The bolometer contains an array of capacitors that change resistance when they absorb thermal energy. If a capacitor is ever overloaded with too much energy, it will eventually break down. Through electronic processes inside, the energy from normal sun exposure is dispersed and does not permanently damage the capacitors, which could result in bad pixels in the imaging array. Temporary effects: While FLIR has taken steps to lessen the effects of the sun on its uncooled cameras, visible,temporary effects may be observed when a camera images the sun. A ’ghost’ image of the sun is the most pronounced effect seen after prolonged exposure at the sun. The pixels that view the sun absorb higher levels of energy such that there is still a ghost image after the sun has moved. This is normal,temporary behaviour. The length of time the ghost remains is dependent on the focal length of the lens, the length of exposure, and the number of Flat Field Calibrations (FFCs) that occur after exposure. The FFC utilizes a shutter to recalibrate and re-zero the pixels approximately every 10 Minutes. For a stationary camera where the sun moves across the camera’s image, the duration of the observable ghost image is generally only a few minutes, with decreasing in
intensity over time and FFCs. FLIR Systems thermal imaging cameras: Immune for solar radiation In closing, FLIR Systems has designed its uncooled VOx microbolometer technology for solar immunity. FLIR’s cameras will not be damaged by direct imaging of the sun, for example, when the sun moves through the field of view of a fixed camera pointed at the horizon. Temporary image artifacts or ghosts may be evident, but they will disappear during normal Operation without operator intervention. Although this may seem obvious, it is Unfortunately not the case for all thermal imaging technology. Different manufacturers Offer different models with different types of uncooled micro-bolometer detectors. Vanadium Oxide is just one material that is used for manufacturing these detectors. Other arterials are Amorphous Silicon (α-Si) and Barium Strontium Titanate (BST ). Manufacturers using α-Si or BST technology are sometimes even specifying in their own user manuals that the cameras cannot be exposed to direct sunlight. Otherwise the camera will be permanently damaged and warranty will be void. When investing in a thermal imaging camera, for whatever application, you need to make sure that it will stay in operation for several years, without maintenance. Looking at the sun with the camera should not ruin it nor reduce its lifetime. Therefore uncooled Vanadium Oxide micro-bolometer detectors are the correct choice. Acknowledgement to Dr. A. Richards for valuable input and advice
Page 30 l TimeTech Magazine
Page 31 l TimeTech Magazine
Thermal vs Night Vision... Let’s start with a little background. Our eyes see reflected light. Daylight cameras, night vision devices, and the human eye all work on the same basic principle: visible light energy hits something and bounces off it, a detector then receives it and turns it into an image. Whether an eyeball, or in a camera, these detectors must receive enough light or they can’t make an image. Obviously, there isn’t any sunlight to bounce off anything at night, so they’re limited to the light provided by starlight, moonlight and artificial lights. If there isn’t enough, they won’t do much to help you see. Thermal Imaging Cameras - Thermal image’s are altogether different. In fact, we call them “cameras” but they are really sensors. To understand how they work, the first thing you have to do is forget everything you thought you knew about how cameras make pictures. FLIR makes pictures from heat, not visible light. Heat (also called infrared, or thermal, energy) and light are both parts of the electromagnetic spectrum, but a camera that can detect visible light won’t see thermal energy, and vice versa. Thermal cameras detect more than just heat though; they detect tiny differences in heat – as small as 0.01°C – and display them as shades of grey in black and white TV videos. This can be a tricky idea to get across, and many people don’t understand the concept, so we’ll spend a little time explaining it. Everything we encounter in our day-to-day lives give off thermal energy, even ice. The hotter something is the more thermal energy it emits. This emitted thermal energy is called a “heat signature.” When two objects next to one another have even subtly different heat signatures, they show up quite clearly to a FLIR regardless of lighting conditions. Thermal energy comes from a combination of sources, depending on what you are viewing at the time. Some things – warm-blooded animals (including people), engines, and machinery, for example – create their own heat, either biologically or mechanically. Other things – land, rocks, buoys, vegetation – absorb heat from the sun during the day and radiate it off during the night.
Page 32 l TimeTech Magazine
Because different materials absorb and radiate thermal energy at different rates, an area that we think of as being one temperature is actually a mosaic of subtly different temperatures. This is why a log that’s been in the water for days on end will appear to be a different temperature than the water, and is therefore visible to a thermal imagery. FLIRs detect these temperature differences and translate them into image detail. While all this can seem rather complex, the reality is that modern thermal cameras are extremely easy to use. Their imagery is clear and easy to understand, requiring no training or interpretation. If you can watch TV, you can use a FLIR thermal camera. Night Vision Devices - Those greenish pictures we see in the movies and on TV come from night vision goggles (NVGs) or other devices that use the same core technologies. NVGs take in small amounts of visible light, magnify it greatly, and project that on a display. Cameras made from NVG technology have the same limitations as the naked eye: if there isn’t enough visible light available, they can’t see well. The imaging performance of anything that relies on reflected light is limited by the amount and strength of the light being reflected.
NVG and other lowlight cameras are not very useful during twilight hours, when there is too much light for them to work effectively, but not enough light for you to see with the naked eye. Thermal cameras aren’t affected by visible light, so they can give you clear pictures even when you are looking into the setting sun. In fact, you can aim a spotlight at a FLIR and still get a perfect picture. Infrared Illuminated Cameras try to generate their own reflected light by projecting a beam of near-infrared energy that their imagery can see when it bounces off an object. This works to a point, but I2 cameras still rely on reflected light to make an image, so they have the same limitations as any other night vision camera that depends on reflected light energy – short range, and poor contrast. Contrast All of these visible light cameras – daylight cameras, NVG cameras, and I2 cameras – work by detecting reflected light energy. But the amount of reflected light they receive is not the only factor that determines whether or not you’ll be able to see with these cameras: image contrast matters, too. If you’re looking at something with lots of contrast compared to its surroundings, you’ll have a better chance of seeing it with a visible light camera. If it doesn’t have good contrast, you won’t see it well, no matter how bright the sun is shining. A white object seen against a dark background has lots of contrast. A darker object, however, will be hard for these cameras to see against a dark background. This is called having poor contrast. At night, when the lack of visible light naturally decreases image contrast, visible light camera performance suffers even more. Thermal imagery don’t have any of these shortcomings. First, they have nothing to do with reflected light energy: they see heat. Everything you see in normal daily life has a heat signature. This is why you have a much better chance of seeing something at night with a thermal imagery than you do with visible light camera, even a night vision camera. In fact, many of the objects you could be looking for, like people, generate their own contrast because they generate their own heat. Thermal imagers can see them well because they don’t just make pictures from heat; they make pictures from the minute differences in heat between objects. Night vision devices have the same drawbacks that daylight and lowlight TV cameras do: they need enough light, and enough contrast to create usable images. Thermal imagers, on the other hand, see clearly day and night, while creating their own contrast. Without a doubt, thermal cameras are the best 24-hour imaging option. Reference http://www.timetech.co.za/flir-thermal-imaging.htm
Page 33 l TimeTech Magazine
Outdoor Security Comes of Age Theft, sabotage, and terror attacks are on Politically-inspired actions are even more the rise at outdoor sites around the world. They target trasportation infrastructure, utility installations, corporate and governmental buildings, public gathering places, and more. Whatever the motivation for these attacks, from fanaticism to greed, they pose a clear threat to economic progress, social stability, and public safety. To cite just one example on the economic front, copper thefts from utilities in the US have more than tripled over the past five years. Losses are running at up to $1 billion per year. In one case a group of thieves made off with $68,000 worth of copper wire in 1,000-pound rolls from an outdoor storage space. A stunt like that takes determination and considerable resources.
worrisome. This book’s executive summary reffered to a 2012 break-in at the Y-12 National Security Complex at Oak Ridge, TN. Three peace activists, one of them an 82-year-old catholic nun,
cut through three fences, avoided dogs and guards from a 500-person security force, and made their way to a storage bunker containing much of America’s bomb-grade enriched uranium. They banged on the bunker walls with a hammer, splashed them with blood, spraypainted slogans, hung antiwar banners, and sang protest songs until the guards finally arrived - two hours after the break-in. Had the intruders been intent on an act of terror or mass destruction the consequences could have been catastrophic. Why didn’t Y-12’s elaborate security precautions protect it? One fact stands out. Y-12’s security officers admitter afterwards that their electronic intrusion sensors and video surveillance systems produced so many false alarms that they had stopped paying attention to them. If that sounds irrisponsible, consider the circumstances. Security systems using conventional measures, including video surveillance cameras with motion detection, produce hundreds of alarms per month.
Source: ( Smart Video Security Handbook, John. R, Danny.C, Thomas V.L. Video valley press. 2015)
Page 34 l TimeTech Magazine
This is not protection, it’s chaos. No wonder the guards stopped responding. There is no longer any reason any reason for this situation to exist. This chapter relates how smart thermal video security technology, the successor to video surveillance, can effectively protect outdoor assets and help security forces stop intruders before they act. Systems using this technology • • • • •
automatically and accuratelt detect, asses, and locate threats to outdoor assets display a thermal video image of the suspicious activity alert security personnel to the potential problem tell them where it is direct a visible-light camera to zoom in on the problem for a better view
Even better for those with limited resources, the superior performance of smart thermal video security solutions comes at an affordable cost. In the following pages we will look at the key features of smart thermal video security and discuss its advantages in real-world outdoor applications. We believe the case for making smart thermal video security the centrepiece of any strategy for protecting outdoor sites will prove overwhelming. Later chapters will address the technology behind the system, and provide tutorials on the best ways to implement it.
A new Model for Site Protection It’s relatively easy to protect an indoor space. Set your burglar alarm, lock the doors behind you, and go about your business. Door, window, and motion sensors will detect any break-in and either summon a guard to take action or notify a central station (CS) monitoring service to call for the police to investigate. Outdoor sites pose a much bigger challenge. Coverage areas are large and irregular, making deployment of sensors a challenge. Wind, rain, snow, and other environmental factors can interfere with detection. The bruteforce solution of blanketing the area with guards doesn’y make economic senses unless you’re protecting a military base.
Source: ( Smart Video Security Handbook, John. R, Danny.C, Thomas V.L. Video valley press. 2015)
Please contact info@timelesstalks.co.za if you would like your own FREE copy of this book! Page 35 l TimeTech Magazine
Conventional Video Surveillance Video coverage premises to solve those problems. However, visible-light video and perimeter sensor systems, which still account for the majority of installations, do not create a new security model. They are simply an add-on to the existing one. Such conventional video surveillance systems deply one or more cameras around a site. They are designed to let security guards in a central location enhance the scope of their vigilance by observing remote areas of a site ( usually multiple) moitors. Surveillance systems are essentially passive. Installing them is like giving binoculars to sentries in a tower: it extends their field of view, but does not fundamentally change how they detect or react to threats. Guards are still expected to keep unblinking watch over what they survey, either by eye or video feed. This is setting a security force up for a certain failure. After just a few minutes of staring at screens even the most conscientious guard begins to sufer from fatigue. We now know that video monitors go unwatched most of the time. Video surveillance systems are primarily useful as forensic tools. They record the on-screen activity, which may allow you to identify an intruder after the fact. But they don’t play an active role in keeping an intruder from wreaking havoc at your site.
Video Security More advanced video systems do create new model for site security. They use video analytics to detect movement in their field of vision, then alert guards to the possible presence of intruders. These are video security systems, as distinguished from the older surveillance systems. While surveillance setups are passive, the real-time detect-and-alert functionality built into the new security systems make them active contributors to the security function. They retain the forensic functionality of surveillance systems, but add the capability to initiate pre-emptive intervention in the even of an intrusion. The draw-back of visible-light video security systems, as we have noted, is their tendency to generate a flood of nuisance alerts. They are smart enough to detect moving objects in the video stream, but not smart enough to reliably distinguish between a human bent on mischief and an animal trotting through a site. With some visible-light systems an enterprising squirrel can set off a false alarm. To complicate the issue, animals aren’t the only things that move in an outdoor setting. In fact, everything moves, and everything can trigger an alert. Tree branches wave in the wind, clouds cast moving shadows, debris flies accross the ground. The subtle swaying of a pole-mounted camera can be interpreted as movement too. Another variable is wheather the camera can see at all. Visible-light cameras are highly susceptible to the vagaries of weather and lighting. Fog, rain, and noontime glare can build them. Reflections from puddles or even headlights passing through the scene can trigger alarms. At night, when most intrussions take place, the area must be evenly lughted to produce a good image and reliable detection, which can be costly. Fortunately, the smart thermal video technology now available has non of these shortcomings. It fully realizes the promise of video security.
Page 36 l TimeTech Magazine
Smart Thermal Video Security Unlike visible-light cameras, which capture direct and reflected light from a scene to form a picture, thermal cameras generate images based on the differing levels of heat emitted from various objects in the scene. Among their advantages: • They “see” in the dark • They work 24 hours l day with no need for costly artificial lighting • They ignore reflections, shadows, moving headlights, direct sunlight, and other light-based phenomena that can trigger alarms in a visible-light system • Because humans give off heat, thermal sensors are perfect “people detectors”, far more effective in spotting a person than visible-light models • They detect body heat as far away as 600 meters - a third of a mile • A single thermal camera can protect an area the size of a football field • Proper design makes them immune to the effect of wheather and other environmental factors At this point it is important to note that the primary function of a thermal camera is detection, not creating a high-resolution, crystal-clear picture. In fact, early models presented smeary, lowresolution images. Since the primary purpose of a thermal camera is to detect motion around the clock, improved resolution and visual quality may seem like a negligible advantage. When the improvement is this dramatic, however, there will be a positive effect on both the range of the camera and its motion detection performance...
Source: ( Smart Video Security Handbook, John. R, Danny.C, Thomas V.L. Video valley press. 2015)
Please contact info@timelesstalks.co.za if you would like your own FREE copy of this book!
Page 37 l TimeTech Magazine
Smart Thermal Video: Securing the Area To reiterate, by replacing visible-light cameras with the latest smart thermal models you turn a marginal asset into a powerful aid in protecting an outdoor site from intruders bent on mischief. Their heat-based imaging makes them much better at detecting suspicious activity, and their potential for sophosticated analysis and reporting is something you won’t find with visible-light units. This doesn’t mean that visible-light cameras are of no use. In fact, they are an important adjunct to smart thermal cameras within an integrated security system. When a thermal camera detects suspicious movement, it can direct a pan-tilt-zoom (PTZ) visible-light camera to take a closer look at the activity and display it in full-colour HD video for positive identification. Later we will look at how performance differences among various thermal camera models affect system effectiveness. Our concern here is with the bigger picture. What is the unique value proposition of a smart thermal video security system? In what applications has the technology been proven? How does it fit within an overall site security strategy?
Force Multiplier A well-designed thermal video security solution fulfills the primary goal of any security system: improve the efficiency and effectiveness of the security force. It feeds guards reliable, accurate information, alerting them when there is credible threat of unauthorized intrusion. Instead of being occasional watchers of continuous video feeds, guards become analysts and fast-response specialists who deal only with actionable situations. Smart thermal systems also act as force multipliers. For example, rather than having one guard sitting in a monitoring station and another on patrol, you can have the cameras feed information wirelessly through the cloud to an ipad or smart phone in a patrol car. The roving guard doubles as a mobile monitoring station. That is impractical with conventional security systems, due to their high level of nuisance alerts and the complexity of the task. Only a human observer can make the ulitmate determination on whether unusual movement or suspicious behaviour within an outdoor site constitutes a threat. If an apparent breach turns out to be real, only a security guard can neutralize it. By installing a smart thermal video security system you enable the security force to do that job better.
Page 38 l TimeTech Magazine
Strategic Implications Thermal video offers a quantum leap in accuracy and reliability over previous approaches. Such systems already protect thousands of different outdoor sites around the world. Security proffessionals working to protect assets from theft or the threat of vandalism, sabotage, or terrorism have found smart video security to be an effective answer to the threat of intrusion and disruption across a wide spectrum of vital economic and social areas. A few examples will indicate how well it adapts to different situations.
Energy Infrastructure Transformer substations and other unguarder components of the electrical grid are especially vulnerable to trespass. The billion-dollar annual loss from copper theft in the US is one instance. But utilities also face an increasing threat of vandalism and sabotage. This threat is being taken seriously. After an April 2013 incident when gunmen with .30 caliber sniper rifles caused over $15 million in damage to 17 transformers at Pacific Gas and Electric’s Metcalf Transmission Substation outside of San Jose, California, the Federal Energy Regulatory Commission ( FERC) ordered the North American Energy Reliability corporation (NERC) to draft the CIP 014 Critical Infrastructure Protection Standard. NERC CIP 014 requires transmission owners and operators to identify and protect critical transmission stations, substations, and control centres. A growning number of these facilities in the US and abroad are installing smart thermal video security systems to provide intrusion detection with a minimum of nuisance alerts. Petroleum refineries, particularly those in countries experiencing unrest, are also using smart video as a safeguard against intrusion by people bent on mischief, damage, and destruction. As a bonus it can provide early warning of overheating or fire.
Source: ( Smart Video Security Handbook, John. R, Danny.C, Thomas V.L. Video valley press. 2015)
Please contact info@timelesstalks.co.za if you would like your own FREE copy of this book!
Page 39 l TimeTech Magazine
Transportation Smart thermal video security is especially effective in addressing the complex security situations found in airports. In tests by the Transportation Security Agency (TSA) at the Buffalo Airport, a smart thermal system • • • • •
Successfully detected al 900 staged intrusions Sounded an alarm each time Displayed video of the problem Provided information on location, nearest camera reference numbers, date and time Controlled PTZ cameras to zoom in on and follow detected target
Mass transit and railway systems also benefit from smart thermal video security in the station and beyond. Systems have been developed to detect people on or around train and subway tracts in some of the world’s most critical rail facilities. In March 2012 the New York State Bridge Authority (NYSBA) installed sophisticated smart thermal video security systems on five of its bridges across the Hudson River. When a vehicle or boat that stops for too long or moves too slowely, the systems not only alert security staff, they provide information on the objects size, its exact location (through GPS registration), its direction, and its speed. The expansive, unfenced areas alongside the bridges are also secured against pedestrians approaching the structures. If this data indicates a security problem - someone preparing to trespass for whatever reason, including sabotage - officers can be dispatched to handle it.
Source: ( Smart Video Security Handbook, John. R, Danny.C, Thomas V.L. Video valley press. 2015)
Page 40 l TimeTech Magazine
Government and Commercial Structures Smart thermal systems provide 24-hour awareness of the approaches to courthouses, banks, data centres, and other vital buildings that terrorists may target.
Effective Protection for Outdoor Assets Smart thermal video technology is creating zones of security where none existed before, operating effectively in highly complex environments such as airports and train yards. It is reliable enough for central station (CS) monitoring, and flexible enough to be integrated with security operations center (SOC) functions. In short, a smart thermal video system should be part of any future plans for outdoor site security.
What about Indoors? Smart thermal video security has proven itself to be the most advanced technology available for detecting human intrusions onto an outdoor site with low nuisance alerts. Indoor security systems may be on the threshold of a similar leap forward. Indoor systems typically depend on door and window alarms, and on motion sensors inside the facility, to detect intrusions. But recently thieves have managed to get past these systems to steal tens of millions of dollars worth of drugs and other valuable goods from industrial warehouses, offices, and other buildings. A volumetric sensor - a smart video camera - would make these break-ins much more difficult, if not impossible. The technology can be adopted from the outdoor systems for which it was created. At this point the chief impediment to the use of a smart camera for indoor security is cost. Cameras of any kind are more expensive than the motion sensors they would replace. Smart video cameras are even more costly, with thermal models the highest priced of all. That may soon be less of an issue. For one thing, with the addition of cost-effective LED lighting, the less expensive visible-light cameras are adequet for security purposes at many indoor sites. For another, the relentless downward movement in the cost of virtually all electronics is already reducing the price of the cameras and of the smart processing technology that makes their intrusion detection so reliable. We’re at the point where it no longer makes sense not to have a smart video security system covering vulnerable indoor sites.
Source: ( Smart Video Security Handbook, John. R, Danny.C, Thomas V.L. Video valley press. 2015)
Read more in our next TimeTech Magazine Issue! Page 41 l TimeTech Magazine
The risks to the security of infrastructure and the safety of people has increased dramatically over recent years. Public officials and security personnel are expected today to provide effective solutions to combat a wide range of threats. To drive service, security and operational improvements, leveraging on new technologies which seamlessly integrate in a secure and manageable network environment is a necessity. Today’s security must satisfy a wide range of criteria. Security control systems should integrate parking management, video surveillance, biometric access control, door control, smoke detectors, fire alarms, X-ray scanning and user-friendly building management systems. In addition, and where the control of multiple sites is required, monitoring from a central point or remote location can be achieved.
On the left is Tinus Diederick from Timeless Technologies with Sean Bubb from Bona Electronic Solutions
Page 42 l TimeTech Magazine
There can be multiple decision makers involved in assessing any building requirements, and security, IT and facility management professionals each have unique responsibilities when it comes to implementing effective security solutions. Bona Electronic Solutions provides a range of solutions which can seamlessly integrate with current and future security requirements, that will work in concert with your organisations current and future requirements. Areas of Expertise • • • • • • • • • •
Banks Public Areas and City Surveillance Mining Retail Sector Industry: Commercial and Industrial Warehousing and Logistics Hospitals Government and Strategic Installations Pipelines, Oil Rigs and Refineries Military and Law Enforcement
Bona Electronic Solutions offers design, engineering, installation and system integration as well as service and maintenance for all electronic security solutions. We have strong alliances with many renowned product manufacturers and suppliers who have global representation. As a solution provider, we adapt to unique environments and together with our vast experience and extensive infrastructure, are able to meet any building security related requirement.
Page 43 l TimeTech Magazine
An Analytical Brain...
The phrenological mapping of the brain was one of the first attempts to correlate the mental functions of a human with specific parts of the brain and the logical, functional and executions of the limbs is to be seen as an extension of the brain. What does this mean, the decision as to an executable function is due to logical evaluation of the current scenario, and this leads to specific actions. Again you will say what does this have to do with video analytics? The answer is short and sweet! The human sapiens and their so called superior intelligence over species, is always on the verge of concurring the new world whereby mechanical hardware receives artificial neural capabilities in making decisions on our, human, behalf. Video analytics is the brain of the “machine” and various systems and sub-systems will be deemed the spinal cord and limbs, all to achieving the set outcome. Video Analytics or Video Content Analytics as it is used within the industry, as well is a term abused by many a manufacturer, could be misleading, especially when the term is misused as a “smart word” within the perimeter control environment. The most important, before we can embark on this venture of explaining all about Video Analytics or Video Content Analy-tics, is to understand what the definition is of such. Video content analysis or Video content analytics is the ability to analyse a video image by means of set criteria. Detection or determine the results could be intelligent and the volume inside the field of view can be seen as the electronic automated equivalent of the biological visual cortex. The ability to automate effectively is used in a very wide range of industries like, maritime, safety, security, automation, home automation, transport etc. Each of these industries calls for a unique bases algorithm and even the individual tasks within the individual industries calls for a bases + task unique algorithm. These algorithms could be installed as software on head-end and monitoring equipment or as hardware on the processing portion units. The algorithms of the Video Content Analysis allows for a huge amount of different functionalities, where...
Page 44 l TimeTech Magazine
Video Motion Detection and Advanced Video Motion Detection is one of the simpler forms where motion is detected within a fixed background scene. Human, Vehicle and Animal Detection and tracking are a more advanced feature and the complicated algorithm could only be done within the video analytics context. The accuracy of the system and the effectiveness of the analy-tics relies heavily on a good input video signal and the latter is achieved by using video enhancement technologies such as video signal denoising DSP, image stabilizing DSP, unsharpen masking techniques and even chrominance and luminance enhancing DSP units. Another key element within the Video Analytics concept is the artificial neural networks. It is computational models, which is inspired by the central nervous systems, which allows the mechanical features to do machine learning and recognize patterns. The ability to analyse the scene accurately at high speeds, due to high frequency input values, and to adapt to the changing logarithmic values, will be the deciding factor in what system works and what is second best. Considering the above, the platform is set for a system that will be able to execute the task at hand and to accurately respond to the set criteria, with a net result of saving money for the customer. In conclusion, the different algorithms, and the associated classifiers and filters, are the determining factors. The quality of the algorithm will be based on the correct mathematical technique for such an application. It will be impossible for the distributor or even integrator, needless to say the end-user, in which technique – or algorithm – or filter – or classifier to use for the desired application. This will lead to only one workable solution, trial and tested with the occasional shoot-out and proof of concept. This will be the determining factor in what system works and what not! Tinus Diedericks
Page 45 l TimeTech Magazine
Page 46 l TimeTech Magazine
Page 47 l TimeTech Magazine
Page 48 l TimeTech Magazine
Page 49 l TimeTech Magazine
Page 50 l TimeTech Magazine
Page 51 l TimeTech Magazine
About Hatteland Display...
Wilke from Timeless Technologies holding a Hatteland screen.
Hatteland Display is the leading technology provider of specialized display and computer products, delivering high quality, unique and customized solutions to the international maritime and industrial markets. The company represents innovation and quality to the system integrators world wide. Effective quality assurance and investment in sophisticated in-house manufacturing methods and facilities enable us to deliver Type Approved and Mil tested products. Our customer oriented approach, technical knowledge and dedication to R&D, make us a trusted and preferred supplier of approved solutions, which are backed up by a strong service network. Displays Series X As a leading manufacturer of display and computer hardware for the maritime segment, Hatteland Display continuously gauges and responds to market needs. Our commitment to develop specialized products for a multitude of on board ship systems continues, and with that the introduction now of a brand new product range called, Series X. With cast aluminium, compact (IP22) and sleek by design chassis, the units from this new range can be desk mount or console integrated. The design is modular, allowing for common modules to be used in various models and combinations. Together these design features bring about a range perfectly in synch to market cost expectations – along with that, the performance and type approval always expected in all Hatteland Display products. All sizes are available in display or panel computer formats, as well as various performance specifications to choose from. There are standard base models available which are listed on out internet page. The modules used in Series X, are all qualified having undergone and passed our extensive test program, which includes HALT testing. This means that the products are tested well outside the requirements in EN60945 and E10. The result is a more reliable product.
Page 52 l TimeTech Magazine
Page 53 l TimeTech Magazine
WHO WE ARE YSG Security Solutions is dedicated to providing top quality network security services and support to its clients. Our company specializes in designing and building intelligent security solutions for both public and privately owned companies, residential premises, educational facilities, and government agencies. With a client base as diverse as ours, we are often faced with the challenge of finding the perfect security solution to meet the needs of our client. This is a challenge we face enthusiastically. With our strong technical background, understanding of networking and intelligent security solutions it enables us to build sophisticated surveillance applications that are available anytime and from anywhere. YSG has a dedicated security team of field technicians, sales personnel, engineers and administrative support staff that work together seamlessly to ensure that our clients are kept abreast on all aspects of their projects and those projects are completed within all established timeframes. To make certain that our clients are receiving outstanding support and service, our team is researching a broad range of security solutions and receive ongoing training throughout the year.
Alarm Systems
Access Control
CCTV
Offsite Monitoring
Design & Upgrades
Perimeter Protection
www.ysgsecurity.co.za l sales@ysg.co.za l 087 238 0608
Page 54 l TimeTech Magazine
What we Do... Established in 2007, IONODES Inc. is a Canadian corporation specialized in the design, development and manufacture of high quality IP-based video transmission and data processing solutions optimized for use in video surveillance and security management solutions. IONODES’ product line includes a wide array of smart appliances, ranging from a complete line of H.264 IP video encoders & decoders, to more advanced server solutions for commercial, industrial and mobile applications. By providing its customers with smarter IP video surveillance technology allowing them to identify security threats quickly and in any environment, from vehicles to critical installations, IONODES believes it can contribute to making the world safer and therefore more peaceful. IONODES designs, develops and manufactures high quality IP-based video and data processing appliances optimized for use with many other well-known video, data and security management solutions such as Milestone XProtect®, Genetec© Omnicast™ and Security Center™. IONODES’ product line includes a wide array of smart appliances, ranging from a complete line of H.264 video encoders & decoders, to more advanced compact server solutions for commercial, industrial and mobile applications.
www.timetech.co.za/ionodes l sales@timetech.co.za l 021 975 3515
Page 55 l TimeTech Magazine
www.timelesstalks.co.za l info@timelesstalks.co.za 021 975 3515
Timeless Talks is constantly involved with various projects and services including Web design , Graphic Design, Photography, Social Media Marketing management, training, Communication and PR. Feel free to contact us for a tailor made solution for your business. Services are available to local and international clients.
The assumption is that most of us are tech savvy or social media educated but the fact is that if you do not work with the back-end on a daily basis then you have most probably not been utilising the full potential of the internet for your business and brand! The question is not how to use social media but why? Once this is understood the natural flow of effective and relevant communication will occur. We, at Timeless Talks, realises that you might not have the in-house time to utilise the online platforms to its full potential and therefore we can assist with monthly communication management, Design, websites and Social Media Marketing. Timeless Talks will represent your brand online by telling your story, spreading your news, promoting your product and building your audience on relevant media platforms such as Facebook, Twitter, LinkedIN, YouTube, Instagram, Electronic newsletter and we will create a package that best suits you or your companies needs!
Page 56 l TimeTech Magazine
The All-Rounder Package What you will get: 5 Social Media Posts per week (The collecting of content, sharing of posts on other site, Platforms: Facebook, Twitter, LinkedIn) l
Wix Website l A monthly Newsletter l
Once a month Event / On-site Photoshoot l 5 Hours Graphic Design Per month
Set Up: Set up of Social Media Platforms (Facebook, Twitter, LinkedIn Company Page) l Mailchimp Account with Sender Mail l Signature Design Extras: Includes Monthly worksheet l Printing Refrences for your Printing Needs
The Reserved Package What you will get: 2 Social Media Posts per week (The collecting of content, sharing of posts on other site, Platforms: Facebook, Twitter, LinkedIn)
l A monthly Newsletter l Once a month
Event / On-site Photoshoot l 3 Hours Graphic Design Per month
Set Up: Set up of Social Media Platforms (Facebook, Twitter, LinkedIn Company Page) l Mailchimp Account with Sender Mail Extras: Includes Monthly worksheet l Printing Refrences for your Printing Needs
The Selective Package What you will get: 3 Social Media Posts per week (The collecting of content, sharing of posts on other site, Platforms: Facebook, Twitter, LinkedIn)
l A monthly Newsletter l Once a month
Event / On-site Photoshoot l 3 Hours Graphic Design Per month
The Selective Package What you will get: 4 Hours Graphic Design Per month ( The print ready Files, 2 Rounds of Changes, We can assist with stock images for your designs)
Page 57 l TimeTech Magazine
The Alta du Toit Aftercare Centre is a centre where adults with intellectual disabilities receive physical and nursing care, and are developed to reach their full potential. We have more than 170 residential clients and close to 60 day care clients. They all take part in an established skills development programme to ensure optimal development throughout their adult lives. Aside from the work groups, clients can also participate in sports and social activities such as athletics, singing and dancing. The Centre is more than 38 years old and is situated in Boston, Bellville, serving communities in the Western Cape including persons from previously disadvantaged communities.
Namchar is a company focussing on the manufacturing and packaging of Namibian Charcoal and Briquettes, but also have a range of other products such as fire lighters, firewood, disposable BBQ’s and other consumables. The Brand NAMCHAR was started in 1996. Since it was bought over by our company in 2003 it has been growing exponentially and currently has a market share of almost 65% in the Western Cape Province of South Africa. Excellent quality and ease of doing business are the cornerstones our company has been built on. Page 58 l TimeTech Magazine
Hilo Aluminium strives to be part of the process from initial planning and architectural discussions to ensure the selection of the most suitable window or door from the wide variety of types and styles for your renovation, house or building project.
Our story started in 2014 when Gareth Castle amalgamated his long-standing passion for electronics and experience in the security solutions industry into a business. ​Gareth, a veteran with more than 11 years of professional experience in the security solutions industry established Integrated IP Solutions with the aim of creating a one stop solution that provides protection for your business and home. ​ We install a host of sophisticated products tailored to best suite your homes, small to large businesses and commercial outlets alike, by safeguarding your assets with fully integrated security systems. The integrated IP Solutions team are frontiers in the security and networking industry. An elite and skillful team that never fails to complete the delegated task with precision and always ensures client satisfaction and peace of mind.
Page 59 l TimeTech Magazine
Meet the Timeless Technologies Cape Town Team...
Tinus Diedericks - Director
Annette Diedericks - Finance Manager - Cape Town
Herman Snyman - Technical Manager - Cape Town
Hendri Verster - Sales Executive - Cape Town
Marieta du Toit - Secretary - Cape Town
Page 60 l TimeTech Magazine
Meet the Timeless Technologies Pretoria Team...
Luanne Stoop- Secretary- Pretoria
Wilke Pretorius - Sales Executive - Pretoria
Quintin Havemann - Technical Sales Executive- Pretoria
Page 61 l TimeTech Magazine
Our next issue will be sent out in November 2017 with NEW stories and articles to read! Page 62 l TimeTech Magazine