Timetech Magazine Issue 04 2015

Page 1


Pg 5 Is it worth risking?

Pg 7 50 shades of grey Pg 10 Thermal distances Pg 11 Introducing Mechatronics

Pg 19 xxx

Pg 21 The business of Risk Pg 25 How airports evolve security systems Pg 27 Safety in mind

contents

Pg 15 Shopping mall safety

Pg 29 Commercial Business Security and Risk Solutions Pg 33 You cant hide your heat… Pg 37 Event security planning phases Pg 39 Thermal security protecting the home turf Pg 43 Best of both worlds

Pg 45 Video surveillance for gaming and casinos Pg 47 FLIR protecting BASF Pg 51 Image matters… Pg 56 New by Ionodes – Skyview Pro Pg 58 Security solutions in community schemes Pg 61 3 Clever ways to use video surveillance… Pg 63 Technical Buzz words Pg 66 Turning up the heat for a great cause!

Pg 72 Social Responsibility


11

9 37

17

43

33 66

The Timetech Magazine is compiled by Timeless Talks, a division of the Timetech Group. The magazine is circulated quarterly and communicates industry news by the Timetech group, their partners and clients. Editorial & Layout Anèl Steyn Timeless Talks info@timelesstalks.co.za www.timelesstalks.co.za @timelesstalks



Is it worth risking? Year-end rush is upon us and instead of keeping the pace in a healthy manner we tend to fade in the chaos of “getting things done”. We enter this period where we are professionally and personally most vulnerable, because when we fade, we drop the ball and we take risks we should not be taking… we take urgent last minute phone calls in rush hour, we do not double check if the garage door completely closed when we left home, we splash our holiday plans over social media… We simply do not think. This year made me think. Talk about splashing out personal details, well here you go. If your child is suddenly at legal age to have social media profiles, you start to think! Suddenly you start receiving Facebook Requests from thirteen year old friends of your child, and you realise how out of control this really is. I certainly don’t want my children being friends with non-family related people my age on Facebook! So yes, I declined. A large part of my life is spend online, and it took me a while to balance work and home. The solution for me was to not have serious high tech mobiles and tablets at home and no easy access to graphic design programs to insure I don’t risk precious family time. I did the same with chocolate but that was less easy to manage . Working in the security and surveillance industry has also taught me that the “cloud” is an amazing contribution to our current way of life but with it come risk and also responsibility. I browsed through a school album of mine last week and I was yet again stunned about every photo, because my mother took time back then to write a little description with every photo. Her little notes continue through all my albums until after I left school. We had fewer photos back then, but ironically we had so much more memories. I am ashamed to admit that my children have hard drives, memory sticks, and cloud based photo albums. And yet again, is it really worth the risk? I risk losing those precious photos and risk exposing our life to the public on social media platforms.

by Anèl Steyn

We are all guilty of falling in the trap of “connectivity”. And we are all vulnerable and at risk because of it. We “check” in online when we enter a restaurant, venue or mall, we tag friends, we take selfies and we do all of this without keeping an eye on our drink that can be spiked, our bag that can be snatched, our child that wonder away. We play in the hands of criminals, simply because we risk it all for a moment online. And the selfie we posted will end up in the cloud, never to be developed, never to be remembered in 40 years. Is it really worth the risk? Some might think I am a hypocrite because I work in the high tech surveillance industry and run a social media marketing service platform and yet I raised these concerns. Fact is, social media, the cloud and connectivity are the nr 1 super hero of the century but with all super powers come responsibility. Use it right. So what do I plan for the holidays? We will be developing photos, buying old school photo albums and writing memorable notes. We will be checking in with family and not social media and we will be doing this at a venue unknown to the public.  I wish you and your loved ones a safe, blessed, precious and timeless festive season!

www.timetech.co.za

page 5



50 shades of grey by Tinus Diedericks Wow, what a topic to talk about! As these words as mentioned above, with very different meanings, are spoken daily by people in all walks of life, from children to adults, from school areas to the workplace and even around the supper table, if not in front of the telly. No, you are wrong, I can see what you think and it is not about that “steaming” topic. I would like to talk about something completely different, but with the same headline sentence. No age restriction at all! Is it possible? Yes, read for yourself! Today, there are many thermal camera types and the most general and most commonly used criteria are the so called “quality” of the image! How many times have I come across a sale where the customers have said, “Look how beautiful is this image, compared to…..” But, what does “Quality of the image” mean, is it the nice image, is it the crisp and clear image, and is it a function of the camera or analytical software or the monitor even? Within the thermal imagery domain, it is very, very important to understand the grey scale of the different type of detectors/cameras. The thermal detector comprises of pixels in a horizontal and vertical array and it is positioned at equal distances from one another.

The detector material commonly used in all microbolometers within all thermal cameras is manufactured from Vanadium Oxide. Each and every pixel within a detector has a 14Bit code. Some manufacturers use 8 bits = 256 and another camera manufacturer uses all 14 bits which will give you 16384 scales of grey. What does this mean? To keep it simple, the one type camera can “see” 256 different types of grey per pixel within a temperature range and the other can “see” 16 384 different types of grey within a the same temperature range. This has a direct influence on the software detection capability or the so called video analytics. This is even more important when you have a scene where a human body and the background represent the same contrast as seen by your eyes. You cannot see the difference but the algorithm from the video analytics could, hence the reason why some analytics will detect better than others.

To explain it even in simpler terms, please have a look at the following images.


See the Unseen PathFindIR™ II Night Vision System

PathFindIR is a powerful thermal night vision system that lets you see road hazards clearly in total darkness, detecting and alerting you to nearby vehicles, people, and animals. sales@timetch.co.za | www.timetech.co.za | 0861 TIMETECH


Now, as you can see above, the higher the number, the lessor amount of difference in contrast quality you will be able to see, next to one another. Needless to say, the difference between a greyscale of (2 to the power of 8 = 256) and (2 to the power of 14 = 16 384) is very big and the subtle difference between adjacent grey colours are of utmost importance. The selectivity can mean that you can either detect accurately or not. I have seen systems where the detection occurs and the eye cannot even see the individual being detected.

You can “see” the difference with Digital Detailed Enhancement Software. The heated lines is available in the first block, a little bit more detail is shown in the second block and even more detail in the third block. There are so much more information available within a grey image, but dependent upon the detector type and make, it will be possible to have a much better image displayed and much better detection will be possible. This is very important for video analytics as we need the selectivity and detail on the detector and due to the vast amount of data, for each pixel, it is much better to implement the video analytics on the camera DSP. This will ensure very detailed detection over long distances and the added value you get is that you can get much more information from a camera which in turn gives you a wider angle than the opposition. What does this confusing sentence mean?

Conclusion To conclude, if your detector and video analytics cannot “distinguish” between “clutter” and real activity, which will be driven by the selectivity and sensitivity of both mentioned items in combination, your detection will be bad or incorrect. Therefore, the more grey scales available, 2 to the power of 14 per bit = 16 384, the more images will be distinguished within the grey scale, the more and better detection will be the result, especially on perimeter fence detection systems.

Waves

Simply put, you can detect at 600m with a 50mm lens, just as well due to the advances on the pixel information. Other manufacturers need a 100mm camera lens to do the same detection at the same distance. As you know, a 50mm gives a much wider angle image on the horizontal plane than that of a tele focal 100mm lens of 4º field of view!

Snow

www.timetech.co.za

page 7


www.timetech.co.za

page 67


Mechatronics in surveillance

by JP Pepler

What is Mechatronics? It is a collaborative combination of mechanical systems, electric and electronic control systems, precision engineering, informatics (programming), optics, automation and robotics, to name a few. Mechatronics is more so a term explaining the multi-disciplinary process that guides development from scratch to generate engineering system solutions, which would be nearly impossible to solve with the basic principles engrained only by the disciplines set out by either mechanical, electrical- or computer science. It is an ever-growing, fast developing discipline taking on and contributing to the massive technological era the world has entered. The highly technological aspect offered by this variant of engineering, already provide the critical input required by an unlimited amount of industries, including the security industry. Smart investors globally have realised that since the industrial revolution and the internet revolution, mechatronics has become the driving force behind the third wave, the smart technology revolution. Genesis of Mechatronics: The term “Mechatronics� was introduced in 1971 by a Japanese electronics company, Yaskawa Elektric Corporation. It was known as the design and construction of electronic components fused with precision mechanisms. The term was protected as a trade name and only released by Yaskawa in 1982. It is often confused with electro-mechanical engineering, but has since generally taken over that line of study with all the additional aspects now incorporated. Mechatronics as a recognised engineering course has only been incorporated in the South African tertiary syllabi over the last 10 years. Mechatronics in the industry: As can be seen, the work of a Mechatronic Engineer is not limited to a specific industry whatsoever. Industries involved, but not limited to: Telecommunication / Networking / Programming Systems are communicating with each other more so now than ever. One could have the kettle boiling, the robotic vacuum cleaner or lawnmower running and the dishwasher set, by a user-friendly mobile device application. Crazy, right? The technological advancement for devices being able to communicate with each other or all to a single control device is not a futuristic thought anymore.



Programming is not limited to that which “we cannot see� either. PLCs (Programmable Logic Controller) and touch screen HMIs (Human Machine Interface) are programmed to physically enable bi-directional 24V DC voltage and even wireless signals which control a variety of relays and elements making some serious machinery move about. Medical - In hospitals and medical facilities there is an extremely high demand for patient monitoring and diagnostic equipment. Data analysis from sensors enables the medical staff to engage a problem before it even occurs.

Agricultural - Systems which enhance the quality of product as well as better and faster production is crucial with the increasing population, food security issues and natural disasters like drought which could cripple communities. Applications of Mechatronics to the security field:

Appliances - Most appliances we use on a daily basis, for example fridges and microwave ovens, consist of control systems including electrical, mechanical work done and an electronic interface with the end user.

With the access to ideas and concepts not limited to any specific industry the possibilities are endless. Particularly for customised surveillance and reaction systems in industry as well as your home. I believe the Mechatronics approach could help support and develop the industry. One is able to monitor a complete security system by the use of a mobile application and vice versa use another device to monitor the camera of your mobile device.

Automotive - The ultimatum for cleaner and greener vehicles has the world in uproar. As the industry is heading for a more electrical and electronic method, Mechatronics will play an essential role. Modelling and simulation is also extremely important for the safety factor. Driverless cars have recently been introduced as prototypes at trade fairs. Food/manufacturing industry - This is a widespread section since there is a copious amount of elements at play. Almost every single product you buy has passed its way through some form of automated machine system. For each unit the designer picks from the mechanical-, electrical-, electronic-, video-, control-, pneumatic-, heat- or even hydraulic design components for the manufacture, and set-up his functional unit. Industrial automation - Coming from the previous point, all these machines manufacturing and producing products, often need inspection systems to ensure the quality is within a set amount of parameters, also products need to move from one machine to another which is not always as simple as never-ending conveyors. This in turn opens up space for robotic pick and place systems. The automation industry removes human error and productivity factors.

The private security industry in South Africa has grown to the largest worldwide. By the factors mentioned above it is clear that this barely heard of line of work will contribute immensely to the growing need for safety and security in our country.

By incorporating thermal camera imaging with specialised airborne and ground monitoring remotely operated vehicles, the response time and tracking of intruders will become effortless with the help of the analytical software used. My vision: It is not about reinventing the wheel, but rather enhancing it. I do not plan to invent something revolutionary which will change the world, but rather an innovative and systematic combination of the mind-blowing technologies scientists and experts worldwide design on a daily basis from the wonderful elements earth has to offer. Keep your eyes peeled for the technological system which will alter our daily lives‌ JP Pepler jp@timetech.co.za

www.timetech.co.za

page 13


marketing@timetech.co.za


Shopping mall safety by Tiaan Diedericks There is without a doubt an increasing need for security services within South Africa. This becomes even more evident when looking at the increasingly violent wave of mall robberies that have plagued the country for the past two years. While mall robberies mostly consisted of petty theft and pickpocketing a few years ago, it has evolved and been replaced by serious offenders who aren’t afraid of using violence. The statistics clearly prove that organized crime has taken over the mall robbery trade and that the severity of the situation cannot be understated. This year numerous malls have been victims of violent robberies. sacrime.info Although the trend amongst criminals to target shopping malls have been a concern for the South African society for many years, it is the increasingly enthusiastic and sophisticated approach these criminals are showcasing in recent months that have caused great concern amongst the police and security companies. Robberies do not merely occur during the holiday and peak shopping seasons but are consistently being perpetrated throughout the year. The meticulous planning, specifically targeted stores and sophisticated firepower these robbers bring to bear is evidence of the fact that the perpetrators are part of a group of professional criminals and not mere ‘thieves of opportunity’ that are struggling for money. www.ewn.co.za

According to the Consumer Goods Council of South Africa (CGCSA) 2013 saw 16.8 million rand in financial losses just from jewelry store robberies alone and recently the Jewelry Risk Initiative Forum has stated that aggravated robberies have become a national threat to the jewelry trade as a whole. Not only jewelry and cellular stores are under threat however. The Consumer Goods Risk Initiative (CGRI) has stated that the armed robberies in shopping malls have increased by 60% since 2012 and that statistics show that this spike isn’t a temporary trend but a sophisticated change within organized crime that is here to stay. www.cgcsa.co.za The Gauteng police spokesperson, Lieutenant Colonel Lungelo Dlamini has confirmed that the trend amongst mall robberies does show an increasing sophistication amongst the perpetrators and that inside information is playing an increasingly prominent role. He states that malls all around the country should increase their security in the wake of this organized onslaught and that staff screening should be improved before employment. Dlamini also emphasized the importance of shopping malls to upgrade their closed circuit cameras by saying “If the footage we have of the mall robberies was not of such poor quality, we would have an easier time identifying the robbers and we could apprehend them quicker.” www.enca.com

Establishments that are regarded as especially vulnerable to these career criminals include cellular and jewelry stores. Their goods seem to be of specific interest to the perpetrators as electronics and jewelry usually seem to take prevalence over cash. Violence is a mere tool for these criminals to get what they want and any opposition to their efforts will testify to that. The Bedford Centre shooting in January 2014 saw www.timetech.co.za page 15 seven people wounded during such an Image reference: http://www.lundhalsey.com/images/Security-Images/Security-Room-01.jpg occurrence.



With the holidays upon us, here are a few guidelines shoppers could use to keep themselves and their loved ones safe this festive season: • Shoppers need to make sure that they know where security staff is within the mall and what their general patrol routes are in case they are needed in the event of an emergency. • Children should be kept under parental supervision at all times. • Parents should also point out the malls’ security staff to their children so that they would know who to turn to in case they got lost. • The children should also know their parent’s cellphone number so that security could contact them. • Checking one’s car if it is locked is an effortless but valuable routine. Coinciding with this, shoppers should regularly deposit their shopping bags in the boots of their vehicles instead of on the back seats to avoid smash-and-grab incidents. • To prevent pickpocketing, shoppers should keep their valuables in their handbags and keep their handbags closed as a petty thief would much rather seek out a target with an open invitation and access to their belongings than get potentially caught zipping open someone’s handbag. • Another less known but just as common threat is identity theft occurring over unsecured Wi-Fi hotspots. Shoppers should take care when accessing free Wi-Fi hotspots in public places because a small lack in the encryption software of the establishment could lead to cyber criminals getting access to their personal information. The sophistication of these scams has been increasing as rapidly as the technology they utilize and even a mere outdated version of one’s security software is a flaw that could be exploited. Timeless Technologies implores shoppers to always be vigilant during this holiday season and to take the necessary precautions against this wave of violent mall robberies. Please note that all of us are responsible for our own safety and that of others. Sources: www.cgcsa.co.za www.enca.com www.ewn.co.za sacrime.info

www.timetech.co.za

page 17



www.timetech.co.za

page 44



The Business of Risk



www.timetech.co.za

page 23


Securing What Matters – Securing Boundaries

Over the years Betafence has evolved from a fence manufacturer to a Total Solution Supplier of Perimeter Security. Every security situation is different and that is why Betafence security solutions can meet the most divergent of needs. Betafence always proposes the most suitable approach based on the specific situation, the security level required and the risk assessment. In these often troubled times, the need to feel safe has become fundamental. While respecting the desire for freedom, we offer protection of everything people value.

National Sales & Head Office: T: + 27 21 868 7300 F: + 27 21 868 7301 Gauteng Sales: T: +27 11 314 8034 F: +27 11 314 3646 info@betafence.co.za 0861 BFENCE (0861 233 623) www.betafence.co.za


How Airports Evolve 10-Year Old Security Systems I want to elaborate on system evolution and shed light on the features within Security Center that allow airports to easily evolve their security platform over the course of decades. 1: Smooth System Upgrades - Airports have been running CCTV systems for years. As technology has evolved, so too have their needs. Many are still using analog systems, with a combination of hybrid and IP systems bought over time which they have implemented during airport expansions. Some have added standalone video monitoring stations, or have unified security and operational systems to maximize operator efficiency. Here are some examples of how upgrades are facilitated with GenetecTM:

3: Support for the Latest Innovations The pace at which GenetecTM develops and releases security innovations is always for the benefit of its customers. Some airports have had GenetecTM software for well over a decade and are still amongst the early adopters when new technologies and features are released onto the marker. Today, even their 10 year old GenetecTM systems allow them to:

• Most of the existing hardware and infrastructure can be kept, limiting forklift upgrades • Compatibility is ensured with existing products and all future cutting-edge systems from the market • Downtime during the migration is minimized

• Add massive amounts of cost-effective storage as required for expansions and applications • Implement body wearable cameras to extend coverage in the field • Respond to public privacy concerns with face-blurring video analytics

2: Flexible System Scalability - Airports have aggressive and long-term expansion plans, sometimes spanning decades. This is coupled with frequent changes in operations that optimize the premises to improve passengers' journeys. The selected security management system must allow these changes to happen smoothly, one component at a time, with minimal system reconfiguration and with complete transparency for the operation and maintenance teams. To enable this, GenetecTM solutions offer a simple configuration interface, flexible architecture and support for the latest IT technologies and best practices.

The transportation industry is constantly evolving. Advancements in technologies coupled with new regulations are encouraging the industry to tighten policies and adopt measures to better secure facilities. For instance, more airports are joining forces mass transit organizations and regional police departments to increase collaboration and enhance city-wide security. GenetecTM FederationTM feature is helping to enable this collaboration.

Reference: http://www.genetec.com/about-us/news/blog/how-airportsevolve-10-year-old-security-systems#.VmWQVr_tv0Y

www.timetech.co.za

page 25



Safe, safe baby! By Jeanette Wrigley Safety is a culture on its own and we apply this culture in our everyday lives. We have this protective instinct to keep us safe from harm’s way and so will react and practice different safety measures to go home to our families in one piece. In the building industry this is apparent in every phase of a project and it is important in maintaining a positive and healthy attitude towards safety. Safety is an investment and it can provide real benefits towards the company and each individual by keeping a project on track and reducing near misses and injuries and reducing the risks of litigation and legal actions. A strong safety record is good for any company’s image and reputation and sits well with insurance companies. However, to achieve such level of safety it is a team effort and takes commitment from young and old, from CEO’s to cleaners, IT nerds to grease monkeys, men and woman, workers and benchers or water boys, participation is key! Safety should be part of your every day job and work scope. Building construction remains a very dangerous job and environment and one should take in account that the most fatalities has been recorded in this industry. So we should all take the time and consider what is more important to us, impressing our peers by taking chances and put ourselves at risk just to be cool with the “in” crowd or do we make an effort in putting measures and procedures in place and make ourselves the company everybody wants to work with and for. Here are 12 steps that we can consider in making our construction site safer to work on: Start at the top: Safety has to start from the top structure of the company and filter down. LEAD BY EXAMPLE Appointment safety reps: Management will get a better idea of the work site and its pitfalls if a labor worker gets this appointment. The safety rep can also be the link for any safety related issues between work force and management. EVERY PERSON IS RESPONSIBLE FOR SAFETY Recognize success, but hold everyone accountable Every person is accountable for his or her own safety and they coworkers around them. It takes discipline to make a success and achieving all safety goals. Recognition of good safety hours and practices shows the employees that management values safety and the all the contributions it makes to the success of the company. GIVE RECONITION WHERE IT IS DESERVED Plan your project Every project starts with planning and this can contribute to the safety of all jobs carried out. GOOD PLANNING LEADS TO MINIMAL OR NO SAFETY HAZARDS

Subcontractors and safety Make sure sub-contractor have a good safety record and they have to adhere to company safety regulations. COMPANY HIRING SUB-CONTRACTORS IS RESPONISBLE FOR RELAYING SAFETY PROCEDURES TO THEM Train workers for safety Safety is not common sense. Workers must be trained to use safety equipment in the correct manner and apply the correct piece of safety equipment when needed. TRAINING AND EMERGENCY DRILLS IS KEY! Focus on fall management Falls remains the leading cause of injuries and death. A detailed fall management plan or procedure should be developed for each project and communicated to all involved. PRE-JOB MEETING ABOUT FALLING HAZARDS IDENTIFIED WOULD BE A GOOD WAY OF FOLLOWING PROCEDURE Combat substance abuse In the construction and mining business we work with very complex equipment and sometimes work at heights. Therefor we need to combat substance abuse that will influence the safety of the work site and fellow workers. PUT IN PLACE MEASURES TO COMBAT SUBSTANCE ABUSE LIKE RANDOM TESTING Evaluate each project phase for safety Job and safety planning is very important for each phase of the project. Everybody involved in each phase must be made aware of all the hazards and how to eliminate them. CONDUCT A JOB SAFETY ANALYSIS BEFORE ANY JOB PROCEEDS. Make safety an everyday topic It is imperative to have toolbox talks on a weekly basis and even daily basis before the day’s activities. REVIEW THE JOB SAFETY ANALYSIS IF THE JOB HAS CHANGED DURING THE DAY AND HAVE A TOOLBOX TALK SURROUNDING THE CHANGES. Review accidents and near misses Never say never…accidents do happen even when you have out all the plans in place to avoid it. In the event of an accident or near miss there should be an investigation launched and all the procedures should be reviewed. This helps to make sure the company understands the financial implications associated with accidents on the projects as well as the impact on the company’s insurance costs. TAKE THE NECESSARY CORRECTIVE ACTION TO PREVENT FUTURE ACCIDENTS AND NEAR MISSES Zero tolerance When it comes to safety there should be no mucking around. For every action there should be a re-action. SAFETY IS A VERY SERIOUS TOPIC AND SHOULD NOT BE TAKEN UP LIGHTLY To conclude, it is every individual’s duty to perform every job given to the best of their ability in the safest manner possible. THINK BEFORE YOU DO!

www.timetech.co.za

page 27



Commercial Business Security and Risk Solutions by Richard Dellbridge How safe are you, your employees and your visitors within your work environment? What is your risk exposure and what applications do you have in place to reduce your risk portfolio exposure? This is a rather open-ended conundrum that has many applications, interpretations and a question that attracts vast budget variations depending on how determined you are to close the gaps and lock down your business and/ or public space facility. Surveillance and Access Control solutions are more than often the last item on the list when it comes to building a corporate facility, typically seen as a grudge purchase, whereas Fire Detection and Public Evacuation Solutions are seen as legal necessities. From a general compliancy perspective, especially where PCI Audits are concerned within financial institutions, the Access Control System and the integrity of the database information is vitally important. From a general compliancy perspective, especially where PCI Audits are concerned within financial institutions, the Access Control System and the integrity of the database information is vitally important. Business facilities are becoming increasingly more aware of the value and importance of surveillance cameras being utilized to generate a visual audit trail, which compliments an Integrated Access Control System to help address workplace and Public Sectors’ compliance, Health and Safety Policies.

With the financial crunch looming within 2016, organisations within the public sectors like shopping centres, casinos, banking environments, universities, etc. are becoming increasingly more exposed to public accidents and anomalies which

Can easily result in costly litigation and out of court settlements. By utilizing the latest analytics technology, the risk exposure can be drastically reduced with visual aids facilitating authentic audit trails which are being made more readily available to facility and property management staff alike. With technology advancements at our fingertips these environments are able to take full advantage of utilizing advanced High Definition cameras, extended storage facilities, event driven black screen monitoring, self-learning intelligent software solutions, etc. Gone are the days of massively overpopulated control rooms with countless control room ‘cctv operators’ aimlessly staring at a myriad of monitors in the hope that they may see an incident occurring. This is rapidly becoming a figment of past legacies. Control rooms are becoming far more efficient with reduced operating costs. Whilst Surveillance cameras can be a vital resource for monitoring staff and public safety and compliance, companies and public entities must also consider the Code of Ethics in terms of Surveillance areas being covered, and not only the personal exposure, but also the exposure of information that could compromise personal and financial information integrity. As Surveillance becomes more common in the both Public and Private Sectors, before installing a CCTV system, businesses and property owners must consider the ethical use of cameras to ensure they comply with South African privacy laws with the auspices of the POPI (Protection of Public Information Act) residing over us.

www.timetech.co.za

page 29


Hatteland Display is the leading technology provider of specialized display and computer products, delivering high quality, unique and customized solutions to the international maritime, residential commercial developments and industrial markets / control rooms. ww.timetech.co.za sales@timetech.co.za

Image reference: http://www.lundhalsey.com/images/Security-Images/Security-Room-01.jpg


Control rooms are becoming far more efficient with reduced operating costs. Whilst Surveillance cameras can be a vital resource for monitoring staff and public safety and compliance, companies and public entities must also consider the Code of Ethics in terms of Surveillance areas being covered, and not only the personal exposure, but also the exposure of information that could compromise personal and financial information integrity. As Surveillance becomes more common in the both Public and Private Sectors, before installing a CCTV system, businesses and property owners must consider the ethical use of cameras to ensure they comply with South African privacy laws with the auspices of the POPI (Protection of Public Information Act) residing over us. The law requires employers and public facilities management using CCTV cameras to inform staff and the public that cameras are in use. This may necessitate an explanation as to the reasons why the cameras are in place. CCTV cameras should not to be installed purely for the sake of observing staff or public open spaces - there must be justification for the presence of cameras, for example monitoring Work, maintaining safety in and around public escalators, Health and Safety Policies, overseeing the operation of machinery. Cameras need to be seen as a management tool to ensure that staff are where they should be, to ensure that Health and Safety Measures are complied with and finally to assist in the reduction of security related crimes. Having camera footage available to verify incidents or check an employee was following company policy and safety procedures can be a valuable resource, particularly for workplaces operating in hazardous environments or working alone in remote areas. In the Corporate Sector, It is a company’s responsibility to ensure all staff members understand the risks and hazards in their workplace environment and know how to manage them. It is also important for a company to consult on and communicate their surveillance policy and procedures so that employees fully understand how the CCTV footage is being used. Many companies are integrating a Surveillance policy into their employment contracts with the understanding that the cameras are not there to ’catch you out’, they are there to assist you in your everyday work life. They can be utilized in a positive manner to improve efficiency, promote Health and Safety, etc.

Within the Corporate Sector, during the consultative process of installing surveillance for the first time, more and more companies are not only relying on the consultancy of external experts, but are involving staff in the initial stages of installation to ensure they feel a part of the process and understand the reasons why a monitoring system is being installed. Signage must also be clearly visible in and around the areas where cameras are present. As a technologically growing country, South Africans are becoming more savvy in terms of ‘what is out there’, and what technology there is available to us to make our workplaces and public spaces not only more efficient, but Health and Safety Compliant at the same time. Surveillance systems are rapidly moving away from the ‘after the fact’ use, to becoming a pro-active tools in the management process. Surveillance and Access Control technology is becoming more affordable from a budgetary perspective with advancements from companies like AXIS Communications, Hikvision and Bosch introducing high end products that are not only meeting with the general day to day requirements, but high end solutions too. Companies like FLIR integrating their Thermal Imaging Range with Analytics Developers like Davantis are making phenomenal inroads in all forms of perimeter monitoring amongst many other practices.

These are all major contributing factors that encompass an ‘all-in’ approach, one that will ensure that security and peace of mind remains top of the list. With technology advancements increasing at every turn, and with solutions becoming more affordable, both the Private and Public Sectors are becoming more aware of the importance of Surveillance and Access Control Solutions forming an integral part within the Security, Health and Safety Portfolios. Maybe in the future Surveillance and Access Control will share the same status that Fire and Public Address and Evacuation currently occupies, a practice that will ensure that Surveillance Cameras hardware manufacturers and Software Developers will always remain at the top of their game, continuously striving for the next level of excellence within a rapidly growing industry. Richard Dellbridge richard@is-sa.co.za

www.timetech.co.za

page 31



You can’t hide your heat… As professionals, it is incumbent upon us to stay abreast of the latest technological developments in our field. Unlike the human eye, thermal imagers don’t use visiblelight to make a picture, they use heat. This gives thermal security cameras distinct advantages over low-light and daylight cameras when lighting is impractical, too expensive or where long-range performance is required. Why do I care?

face it: if an intruder is so close to your infrared illuminated camera that you can identify him, you’re going to be looking for a new job and he’s probably eating at your snack bar. Use a thermal camera, and identify your intruder when he is in handcuffs. Thermal security cameras are useful in circumstances that relegate other camera technologies to fighting for second-place. Large facilities commonly have to deal with unfenced and unlit perimeter areas for economic reasons. Thermal cameras can see far enough to make this a non-issue, and they can do it for less money than it would take to install the infrastructure required for lowlight and infrared illuminated cameras.

The short answer to this question is…range. And, in this business, range equals time: time to react, time to adjust, time to respond. Thermal security cameras detect the minute differences in heat that are all around us, all the time. This heat energy is easier to detect over longer ranges than visible light, giving thermal cameras a distinct advantage. But that’s not where the thermal advantage ends. Not only can thermal security cameras see from further away, they are not vulnerable to the most common countermeasure open to someone trying to avoid detection with a camera that depends on visible, or reflected, light: camouflage. Why? Simple: you can’t hide your heat. The thermal security camera picks out the intruder easily. Sure, you might say, but with the infrared illuminated camera you can identify your intruder better than with the thermal camera. True, but

How does it work? This may seem unbelievable, but really – this isn’t rocket science; it comes down to some basic physics. We see reflected light. Infrared illuminated cameras, night-vision devices, and the human eye all work on the same basic principle: light energy hits something and bounces off it; a detector then receives it and turns it into an image. The ability a given detector – be it in an eyeball, or a camera – to create that image is directly related to the amount of light available.

www.timetech.co.za

page 33



At night there isn’t any sunlight to bounce of f any thing, so we’re limited to starlight, moonlight and artificial lights. If there isn’t enough, it’s hard to see. Infrared illuminated cameras compensate for this by transmitting energy that bounces off whatever is in the camera’s view and making a picture out of that. Thermal cameras have nothing to do with reflected light energy: they see the heat given off by every thing under the sun (literally!). Every thing you see in normal daily life creates heat energy – day and night, in good weather and bad. Just think: as you are sitting there reading this article, you are making a perfect thermal signature all by yourself. What’s more the signatures of people, cars, buildings and all the other things seen by thermal security cameras generally have better contrast at night than during the day. They work just fine during the day – as long as there is the tiniest bit of temperature contrast between a target and its background, you can see it – but, they work great at night. And nighttime, as we know, is when the we need them most! Reference: FLIR Security Application Note - "You can't hide your heat"

www.timetech.co.za

page 45


www.byerssecurity.co.za


Event planning security phases Planning and Managing Major-Event Security The best practices resulting from this study are adaptable to a variety of circumstances and special events. Local jurisdictions must decide how to apply them, taking into consideration the nature of the events and available resources, but one best practice applies across the board: use a formal, three-phase planning process, with timelines and accountability built into each phase. Phase I: Pre-Event Planning: Phase I usually begins 12 to 18 months before the event. It involves the lead agency receiving authorization from its local governing body, establishing its mission, reaching out to collaborate with partners to help secure the event, meeting regularly with team members and partners, and developing detailed security plans and contingency plans. Phase II: Managing Security during the Event: Phase II begins just before spectators, officials, crowds, media, and others assemble at the event sites. For some events, people begin to gather days beforehand. Tasks include comprehensive communications monitoring; reporting; and ensuring that key operations are functioning properly, such as the communications command center, credentialing, and access control posts. Phase II also involves checking the readiness of field and support areas such as mobile field forces to deal with crowd control, intelligence support, arrest processing, emergency medical services (EMS)/medical support, and more. Phase III: Post event Activities: The final phase, which begins when the event is over, includes conducting a comprehensive review of successes, lessons learned, and areas needing improved security. It also involves accounting for all equipment and other resources and paying bills for the security.

Executive Team Major-event security planning begins with the creation of an executive team. Headed by the overall event security director representing the lead law enforcement agency, this team involves top command level personnel from all partners in securing the event. Major tasks include the following: Identifying all functional areas that must be planned, creating subcommittees to handle those areas, and issuing timelines—who will plan what by when. Reviewing subcommittee operational plans (for example, current resources, resources needed, plan to obtain additional resources, and so on) to ensure that they are comprehensive, consistent, and realistic, and that contingency plans are in place for each major function Determining any changes needed in routine policies, practices, or laws (for example, does the union contract permit 12-hour shifts to cover a major special event?) Source: http://www.policechiefmagazine.org/magazine/index.cfm?fuse action=display_arch&article_id=1347&issue_id=122007

www.timetech.co.za

page 37 44



Thermal cameras protect home turf Affordable, high-performance thermal security cameras have revolutionized the video security industry. Their flexibility, performance, and low total cost of ownership have made them viable security imaging solutions for a broader range of applications than ever imagined. Case in point: Brigham Young University is now using thermal security cameras to look after their newly renovated football field. The 28 year-old sod was removed, a new drainage system installed, and new grass laid down in early 2009. The renovation took approximately five months to complete and cost over $1 million, so University administrators and campus police turned to thermal security cameras to safeguard this significant investment in their state-of-the-art facility Securing The Home Field Visible light cameras were quickly shown to be an imperfect solution. With roughly half of every day happening after the sun drops below the horizon, this leaves large facilities under secured for large portions of the day. Conventional CCTV cameras – even ones purporting to be “lowlight” – need an outside source of illumination if they’re going to create an image after dark. This exposes one of their primary tactical limitations, namely that they can’t generate images of intruders beyond the range of their illumination source. This typically limits their effectiveness to a few hundred feet, when the environment may require surveillance capability that stretches for miles. The threats to the field at BYU’s LaVell Edwards Stadium range from thrillseeking trespassers jumping the fence to get on the field after hours, to low frequency, high-impact vandalism perpetrated by rival fans or other illintended trespassers.

Naturally, the answer to the field’s security wasn’t as simple as just locking down the stadium. BYU has been looking for a viable detection method for several years. The job of keeping trespassers off the field was complicated by the stadium being open to the public during daylight hours for people who want to run the stadium’s stairs, and the need to secure the facility’s perimeter, but keep the field itself accessible to maintenance crews and grounds keepers. The task of securing the field fell to BYU’s campus police. As part of their process for determining the best security technology to use, they temporarily installed a thermal security camera from FLIR Systems on a tripod in the stadium press box. “We resolved three trespasses in the first week,” said Sgt. Wayne Beck, Security Systems Coordinator for the BYU campus police. “It’s a sure-fi re way of catching people.” After determining that a mix of thermal security cameras would provide the mix of 24/7 imaging quality and range performance, Sgt. Beck and the Brigham Young University team integrated the camera’s video outputs onto their existing security network, and tied everything together with a video analytics package.

www.timetech.co.za

page 39


Enquiries: marketing@timetech.co.za | www.timetech.co.za


The analytics allows operators to set up predetermined alarm areas that are active at different times of day. For instance, during daylight hours, the perimeter and stands are open, and maintenance crews can access the field. Later in the afternoon, the stands are open but access to the field is closed and the field itself is alarmed. When school officials close the stadium for the day, they activate the automated surveillance and alarm system, which encompasses the entire facility. If human activity is detected in a denied zone during any of these periods, alarms are triggered that alert campus police to respond accordingly. Once command center personnel receive an alarm, police dispatchers send officers to the scene. While these officers are enroute, dispatchers can bring up and direct optical PTZ cameras to the violated area in order to gather more tactical information the responding officers will need once they arrive onscene.

24/7 Video Security Coverage Thermal security cameras let people see what their eyes can’t: invisible heat radiation emitted by all objects regardless of lighting conditions. They see the heat given off by everything under the sun. Everything we encounter in daily life creates heat energy, called a “heat signature,” that thermal cameras can see clearly, detecting the minute temperature differences between objects, and turning them into video that displays on almost any TV monitor. Because they see heat, not light, thermal cameras are effective law enforcement tools in any environment. They can easily detect intruders and other potential hazards to the security of people and infrastructure in any weather, as well as all day and all night. Reference: FLIR Application story, protect the home turf with Thermal

Support Infrastructure Economically, the costs involved in the design, installation, operation, and upkeep of a support infrastructure of lighting towers and illuminators quickly outstrips the acquisition cost of a network of thermal security cameras. Because they’re not dependent on any visible light, thermal security cameras don’t need auxiliary lighting to work, so they can provide effective virtual perimeters for a fraction of the cost of visible-light imagers. Conventional CCTV cameras – even ones purporting to be “lowlight” – need an outside source of illumination if they’re going to create an image after the sun goes down, leaving them with built-in limitations that are both economic and tactical. Their main tactical limitation is that they can’t generate images of intruders or targets beyond the range of their illumination source. This typically limits their effectiveness to a few hundred feet, when the tactical situation may require surveillance capability that stretches for miles. And, with roughly half of every day happening after the sun drops below the horizon, this leaves large facilities under-secured for large portions of the day.

www.timetech.co.za

page 41



FLIR FC R Series best of both worlds The FC-Series R features on-board, non-contact temperature measurement capabilities for fire detection, safety, and thermal monitoring of substations, waste disposal, and valuable equipment. FC-Series R combines state-of-the-art image detail and on-board video analytics. FC-Series R provides reliable detection and flexible alarming options by email, web and mobile apps, edge image storage, digital outputs, or VMS event notifications. FLIR FC-Series R Features On-board temperature measurement & alarms • Calibrated for fire detection, safety, and thermal monitoring of equipment • On-screen temperature value displays • Up to four temperature measurement tools – spots or boxes • Flexible integration tools allow temperature data and alarms to be integrated into a wide variety of external monitoring and control systems Feature-rich edge analytics Powerful on-board analytics capable of classifying human or vehicle intrusions • Multiple alarm notification options, including email, digital outputs or VMS alarms • Ideal for use with third-party analytics, including those provided by FLIR’s partners around the world • Camera configuration via web interface, FSM PC application or mobile apps • ONVIF compliant – interoperable with most video management systems

Rugged industrial design Durable enclosure protects camera from dust, water, and is submersible up to one meter • Thermal cameras with both IP66 and IP67 ratings. Plus it’s shock, vibration, and corrosion-resistant • Multiple fields of view and resolution options; supports optimal camera selection and deployments • PoE, AC and DC inputs, analog and network outputs “Why not use the same cameras to do both? FLIR FC R Series and A-Series Fixed and Pan Tilt Series cameras can be installed almost anywhere to monitor critical equipment and other valuable assets. They will safeguard plants and measure temperature differences to assess the criticality of the situation. This allows users to see problems before they become costly failures, preventing downtime and enhancing worker safety. They can also be used for Security & Surveillance. Security professionals around the world have been using FLIR thermal cameras for perimeter and critical asset security for years. Facility operations and safety personnel have been using FLIR cameras to gather non-contact temperature measurements and condition monitoring data for decades.” Asmag.com

www.timetech.co.za

page 43


Security Systems IP Surveillance Video Analytics Thermal Security Systems IP Surveillance Video Analytics Cameras Thermal Cameras Early Warning Detection Internet Access Points Intercom Systems Audio and Visual Early Warning Detection Internet Access Points Intercom Systems Audio and Visual Gareth Castle 083 206 5743 | 0861 555 325 | info@iipsolutions.co.za


Video Surveillance for Gaming and Casinos Video Surveillance for Gaming and Casinos Video surveillance plays a pivotal role within the gaming industry. In casinos, where the threat of criminal activity is as high as the stakes at the card table, it's important that facilities are properly monitored. The flow of people and money is constant, upping the risk of incident. But with the proper surveillance such worries are stifled, and the thrill and enjoyment of the gaming experience prevails. How Casino Surveillance can be Beneficial • Easy installation – Since IP cameras function on a network, they're extremely flexible and can be installed almost anywhere. There's no need for coaxial cables. Simply mount cameras in the desired locations and establish a connection to the network video recorder. • Crowd control – In casinos, where large throngs of people are a constant, video surveillance can keep watch for suspicious activity, and disruptions. • Monitor suspicious players – There's always the threat of gamblers looking to beat the system through methods of cheating and hustling. Strategically placed cameras provide clear views of gaming tables, allowing the security department to closely monitor individual players. • Prevent theft – Surveillance cameras can deter crime by putting the fear-of-getting-caught into the minds of thieves, and also aid authorities in identifying criminals during investigations. Employee theft is another major concern that can be prevented with proper video surveillance. • Lower fights and violence – Large crowds, high stakes gambling, and alcohol can at times lead to testy situations. Video surveillance allows employees to quickly dispatch security workers to the scene upon detection of a tussle. • Remote monitoring – IP surveillance technology enables the security department to monitor footage and operate cameras from remote locations.

Risky Elements of Gambling CCTV Privacy – Security cameras are accepted in public areas such as the gaming floor, bars, entrances and exits. But surveillance in private areas such as bathrooms is seen by most as a violation of privacy. Questions to Consider when Configuring Gaming Security Cameras Casinos have high security needs, and the proper surveillance setup is extremely important to keep a gaming facility, and its guests, safe and secure. Consider the following factors when establishing your video surveillance system: • What are the security risks in your facility? • What types of security systems do you currently have in place? • Is your facility well-staffed with security officers? • Have there been instances of cheating at the gaming tables? • Have there been instances of fighting in the casino? • Is the casino constantly busy, occupied by large masses of people? • Are the cashier areas carefully monitored? • Has stealing been an issue in the facility? • Are there high stakes tables that warrant special attention? • Have there been problems with employee theft within the facility? Setup Advice for Video Surveillance at Casinos Place cameras at entrances and exits to capture footage of all users of the facility. Properly monitor open areas like the gaming floor so the security department can spot unusual activity. Maintain surveillance of individual gaming tables to watch for instances of cheating and suspicious behavior. Prevent theft by utilizing high surveillance in areas where large amounts of currency are exchanged or stored. Reference: https://www.videosurveillance.com/gamingcasinos.asp

www.timetech.co.za www.timetech.co.za www.timetech.co.za

page 13 page 47 page 45


"GLO-Portal is a Community Management System (CMS) custom developed to enhance management and communication in Residential Communities“ Proudly brought to you by GLOVent Solutions

www.glovent.co.za 086 101 7424 info@glovent.co.za


FLIR thermal imaging cameras help secure the perimeter at BASF In 1865, Friedrich Engelhorn founded the initially small scale chemical company 'Badische Anilin- & Soda-Fabrik AG'. The company grew over the years into the world's leading chemical company nowadays known under the name 'the BASF Group' with a portfolio ranging from oil and gas to chemicals, plastics, performance product and agricultural products. With over 200 chemical production plants, several hundred laboratories, technical centers, workshops and offices, the BASF headquarters in Ludwigshafen, Germany, is the largest integrated industrial complex in Europe, covering an area of over 10 square kilometers. With large amounts of potentially dangerous chemicals coming and going and numerous highly classified chemical processes going on it goes without say that perimeter security is a big issue. The difficult task of protecting the entire perimeter of the complex is the responsibility of Klaus Altmeyer, Head of Technical Security at BASF Ludwigshafen. "We take the perimeter protection very seriously, so we want to make sure that we use the best detection tools modern technology has to offer. That is why we have incorporated thermal imaging cameras in our perimeter protection program."

At first Altmeyer investigated the use of visual light CCTV cameras, combined with advanced video analytics software. "But in my experience automatic video detection does not work in outside conditions, at least not to the high standards we have here at BASF. In bad lighting conditions the video footage from CCTV cameras simply do not provide enough contrast for automatic intruder detection. Then I learned that FLIR Systems was marketing a new product: thermal imaging cameras for perimeter security. I made contact with Bertrand VĂślckers from FLIR Systems and he demonstrated this new product. I immediately realized that this was exactly the type of sensor I was looking for.“ CCTV cameras rely on color contrast and are therefore dependent on the presence of enough light to generate high contrast footage. Thermal imaging cameras record infrared radiation, which is emitted by all objects as a function of their temperature. The temperature difference between a human body and its surroundings allow thermal imaging cameras to provide high contrast images that the video analysis software can use to accurately detect intruders regardless of lighting conditions.

"The system has to be able to detect every single intruder, no matter what the lighting conditions are", Altmeyer explains. "But that is easier said than done, for the perimeter of the complex is about 20 kilometers in length and it borders several different types of terrain. On one hand there is the river Rhine, on the other side there are motorways and another part of the perimeter borders the city. To defend such a diverse perimeter we need to employ a wide variety of detection tools, such as ground sensors, fence sensors, motion detectors and such. But in some areas many of these tools are simply not satisfactory. They might produce too many unwanted alarms, due to vibrations caused by heavy traffic, for instance, or the layout might not leave enough room for them to be installed, or environmental factors make their use impractical. We therefore needed a long range detection to provide improved perimeter security."www.timetech.co.za Peace tool of mind through cost effective specialised security

www.timetech.co.za www.timetech.co.za

page 13 solutions page 47 page 47



Depending on the requirements of a particular location with regard to field of view the FLIR SR324 or SR-334 was used. If the advanced video analytics software detects movement on the thermal footage these cameras produce, CCTV cameras on a pan and tilt platform are automatically pointed at the location of the intrusion, to give the guards in the control room the best possible view of the situation. “ During the daytime we can use those CCTV cameras to identify the subject. If the alarm is triggered during the night, we send out walking patrols with dogs to investigate." Easy installation and low maintenance Installing the FLIR thermal imaging cameras was relatively easy and the system requires little to no maintenance, according to Altmeyer. "We already had masts in place for the CCTV cameras, so all we had to do was to affix the thermal imaging camera, plug in the power cable and the fiber optics cable that transports the thermal video footage to the central control room. No additional infrastructure was required. We've been using these thermal imaging cameras from FLIR Systems for years now, operating 24/7, and not once did we have a technical problem. No maintenance was needed until now."

"The unwanted alarm rate is also very low", Altmeyer explains. "Thermal imaging cameras rely on thermal contrast instead of color contrast, so the video analysis software can very accurately distinguish between an actual intruder and flying birds or shimmering water, for instance. The only unwanted alarms we had in all these years were actually welcomed by the guards. When specialists of our environmental department come to take water samples at the river bank then the alarm goes off. But this is actually a good thing, the control room guards assure me, for this confirms that the system really works." Mobile thermal imaging The success with the FLIR SR-Series fixed mounted thermal imaging cameras has also lead to the purchase of mobile hand held thermal imaging cameras of the FLIR HS-Series. "We have bought two of these cameras for the guards to take with them when they investigate an alarm at night. The guards can use the thermal imaging camera to see whether there really is an intruder and where that intruder is, allowing them to prepare for the encounter. This not only helps with the early detection of intruders, but also enhances employee safety.“ "I am very happy with the overall performance of the FLIR Systems thermal imaging cameras", concludes Altmeyer. "I am convinced that thermal imaging might also be a solution for the security issues that some other BASF sites are facing.

www.timetech.co.za www.timetech.co.za

page 47 page 49



With Thermal Cameras, Image Matters. The simple fact is: not all thermal security cameras are created equal. Simply comparing manufacturer's specification sheets won't give you the information you need to get the most effective imagers for you money. For many security professionals, the process of evaluating thermal cameras for purchase or recommendation is a new endeavor that exposes them to a whole new set of specifications and performance parameters that they are unfamiliar with. This unfamiliarity makes them vulnerable to the vagaries of slick marketing literature. So, how can you get the right cameras? Don't leave it up to an analysis of specifications; see the camera's image quality for yourself, because image quality matters. The quality of the images a given camera produces is a function of a number of factors including detector resolution, optics, and image processing.

How Is A Thermal Camera’s Resolution Measured, And Why Do I Care? The detector is the heart of any thermal security camera. It’s the part that gathers the infrared energy and allows the creation of an image made from this energy. A thermal camera’s detector plays the same role as the CCD detector chip in a standard video camera – whether it’s on a pole outside of a nuclear facility or in your handi-cam at home. The detector’s resolution is the number of individual detector elements found on that chip, usually measured in horizontal and vertical dimensions. The low-end options for thermal resolution typically offered are the 160×120 detector or the 320×240 detector formats, but the standard is quickly becoming the 640×480 detector. There’s good reason for this. A detector’s resolution is the first vital element in determining a camera’s ability to generate a highquality image (more on image quality in a minute). The more detector elements a detector has (meaning, the higher its resolution), the more energy will be gathered, and the more detail you’ll be able to see in the image. Also, if you were to compare a camera with 640×480 resolution and a camera with 320×240 resolution that use the same size of lens, you’ll find that the 640’s angular field of view will actually be wider, yet will also detect threats from farther away. In the real world, this means that you’ll be able to cover the same amount of area with fewer cameras using 640 resolution, and still be able to detect intruders from farther away. In other words: lower cost with better performance. Let’s take two notional thermal cameras that use the same uncooled VOx detectors and 35 mm lenses as an example. The 320 camera will have a 13°×10° FOV, while the 640 camera will have an 18°×14° FOV. This will give you a nearly 40% increase in coverage area, while still being able to detect a person from nearly 50% farther away.

A 640x480 infrared detector like this packs all of its imaging power into an area less than 12mm across.

www.timetech.co.za

page 51


marketing@timetech.co.za www.timetech.co.za/Tekno-systems.htm


The tactical and economic benefits of increased resolution are measurable and undeniable. The detector’s pixel pitch is a specification that should be readily available from the manufacturer, as it is an important piece to the puzzle in predicting image quality and range performance. Typically measured in micrometers, or “microns,” when you’re looking at a camera’s pixel pitch, keep in mind that lower numbers are better – the smaller the pixel pitch, the more image detail you’ll get in a smaller package.

First let’s look at a couple of examples of the better image quality provided by FLIR images. These image pairs were taken with a FLIR F324 and an Axis Q1921. Both have 320 resolution and they use similar lenses (a slight difference in the angular FOV can be noticed), and both are using their “out of the box” image settings. No optimization was done to either camera, and none of the images have been manipulated in any way other than to re-size them for publication.

Security Application Note Security Application Note This time, let’s compare uncooled VOx cameras with 100 mm f/1.6 lenses; one camera has 25 micron pixels, and the other has 17 micron pixels. All other things being equal, the 17 micron camera will detect a person from over 22% farther away than the camera with 25 micron pixels. Just as important, however, the 17 micron camera will produce more detailed, higher contrast images that will get better results from analytics and VMD packages. These technical factors aren’t enough to maximize a thermal camera’s performance. The technical factors like detector type, lens design, detector resolution, and pixel pitch will make sure you get the most thermal energy into the system’s electronics as possible, but what the camera does with that information is vitally important as well. That’s where image processing comes in. A thermal camera’s internal image processing software can help bring out object edges and enhanced details that can make the difference in final image quality. Image Quality – Isn’t It Really Just Pretty Pictures? NO! As with the technical attributes mentioned earlier (detector type, f/number, resolution, pixel pitch, and image processing), the benefits of what may be superficially regarded as a subjectively better image have objective and measurable benefits.

This set of images was taken at 6PM. The FLIR image (on the left) has greater contrast, shows more small details (take particular note of the areas outlined in red), and is in focus throughout the entire depth of the image. These points are notable because this is one of the times of day that can be most challenging for thermal imagers. Remember that thermal cameras don’t just make pictures from heat; they make pictures from tiny differences in heat. There are two times of the day in which items within an image are most likely to have the smallest differences in temperature (isothermal): just before the sun goes down, when things have been soaking up the sun’s rays all day and have reached a critical point of solar loading, and in the middle of the night, when everything has radiated off its stored energy and cooled to a similar degree. Both conditions are called points of “thermal crossover.”

www.timetech.co.za

page 53



FLIR cameras keep imaging well during periods of thermal crossover, ensuring that you will continue to get solid coverage in the most challenging environmental conditions. The image from the Axis camera has noticeably poorer contrast and significant areas of lost detail which could lead to faulty alarms and missed threats, while the image at right has not. The other side of the coin is even more dramatic. These images were taken at midnight, when things have become more uniformly cool. Again, the FLIR maintains its image contrast and detail, while the Axis image has suffered noticeably on both counts and produces a flat, washed-out image. Conclusion The sophisticated physics and engineering involved with making a thermal camera are impressive; the work required to squeeze every last bit of performance out of the technology is daunting. You can learn a lot about different products by studying the manufacturer’s camera specs and having in-depth discussions with their applications engineers and integration teams. Reference: Security Application Note, FLIR – With thermal cameras image matters

www.timetech.co.za

page 55




Security Risk Solutions in the Community Scheme Environment by Ilario Orlandi The demand for residing and investing in community schemes such as sectional title complexes is rapidly expanding. Secure developments are considerably more popular than freehold living, as security is one of the top priorities for home owners and potential purchasers/investors. It is of utmost importance that the governing body of scheme regard security risk solutions on top of their priority list. Majority of schemes are equipped with security features such as electrical fencing, cameras, security lighting, security guard’s stations etc.

When the safety elements and effectiveness of the scheme is reviewed, management should ensure that the equipment is at least periodically maintained and tested. Security lighting should be sufficient and strategically placed in areas not reachable. Security Guards should be appropriately trained and certified. The security guard can only be effective if they comply with the schemes Standard Operating Procedures (SOP) and Access control policy.

It is advised that one makes use of unique codes for each person’s remote, access tag, biometric use in order to be able to monitor access and egress. It is not During the past few years more and more schemes have recommended to make use of keys that can be forged. implemented additional advanced security measures over The scheme’s management should also ensure, prior to and above the standard features. These advance systems effecting any security improvements, that the relevant include Biometric Access Systems, ID and Licence scanners authorization as required by the schemes management and Thermal Camera’s with the Biometric Access System rules or constitution is obtained and that the expense is probably being the most common security feature due to within the allowed budget. its effectiveness. All residents, owners and management play a vital role in It is highly recommended that the first priority of any ensuring that a scheme is crime free. I am a firm believer scheme should be to have the perimeter and entrance in the “Broken Window” Theory. The broken window points properly secured. The standard perimeter walls are theory advocate that serious and violent crime can be no longer a secure deterrent on it’s own. Electric fencing reduced in an urban area through strict enforcement of and CCTV camera’s should also be considered for lesser crime such as graffiti ,vandalism ,broken windows, perimeter walls. I have encountered a few schemes with litter etc. A scheme management should act perimeter walls secured to the maximum, where there is immediately to rectify graffiti, broken window, prevent an extreme lack in access control at the entrance areas, litter and report crime. this then defeats the reason for spending large amount of capital to secure perimeter fencing. Access control is Neighbours can be a person’s first line of defence, useless if security guards are not performing their duties. residents within a scheme can form a block watch to A lack of security measures at access gates, allows for assist in crime prevention. A “whatsapp” group works bypassing and/or tail gaiting. These factors need to be well for communication between neighbours in order to taken into account when security measures are reviewed. notify all members in the event of an emergency, unusual or suspicious activity. Emergency numbers Scheme management should consider conducting a should be distributed regularly amongst residents. Security Survey, audit and assessment on a regular basis in order to identify the weak points and consider enhancing In conclusion, various options of security are available to the security of the scheme. Certain smaller crime free schemes. It is important that the management of schemes may conduct a walk-through security assessment schemes identify the required measures to be taken in while other larger schemes, especially those experiencing order for the scheme to be protected and prepared. an increase in crime may consider the assistance of a Good security is an integration of several interrelated professional consultant. When measurements are concepts, action and items which tend to be mutually considered, it is important to take into account the supporting and to have a multiplier effect. feasibility, effectiveness, consequences and cost of implementation, it is also recommended to always consider the Four D’s approach: Detect, Deter, Delay www.timetech.co.za page 58 and Deny.


Ripple Effect Property Management is an established property-managing firm in the Western Cape since 2002. We currently manage over 30 Sectional Title Schemes and homeowners associations with a total of over 1500 units. Our Portfolio includes residential as well as retirement and Medical centres. Ripple Effect has an excellent record of accomplishment in the management of residential title schemes. We provide professional, high quality services guiding the Body Corporate in ensuring that its affairs and the property are well managed. Ripple Effect concentrates on the efficient collection of monthly levies with a particular focus on minimizing arrears, to ensure the financial health of the scheme. Our Company offers a professional and dedicated service to you as a property owner and assure you of our best at all times. For a quotation or any sectional title / HOA assistance please do not hesitate to contact Ripple Effect. General Manager: Ilario Orlandi Tel 021 595 4199 ilario@rippleprop.co.za

Ripple Effect Property Management will be able to attend to the following and more : ((( Sending out monthly levy statements to all owners ((( Collection of all levies ((( Paying of all Municipal accounts and any other accounts as approved ((( Paying of salaries and wages ((( Handing over of owners for non – payment of levies to the attorney and the following – up thereof

((( Preparation of Schemes accounts and debtors age analysis to Trustees ((( Attending all Trustees and Annual General Meetings ((( Arranging insurance for the Scheme and submission and follow – up of any insurance claims ((( Sending out of correspondence as when necessary. ((( Attending to all maintenance issues and the submission of quotes to trustees ((( Managing of the Shemes bank account i.e. investing surplus monies in an interest bearing account ((( Preparation of annual budget and arranging financial audits.



3 Clever Ways to Use Video Surveillance to Enhance Customer Service While there are many ways to improve customer service, retailers' budgets are tight. So considering using existing loss prevention solutions, such video surveillance technology could be an economical option to enhance customer service. Here are three clever ways companies can leverage their physical security investments to reduce losses associated with poor customer service:

Alert Sales Personnel to Customers at Displays Adding sensors to high-value display cases, specialty demonstration rooms or specific items in your store can enable automated alerts to store managers or employees. This allows available personnel to 1- know that someone might need their assistance, and 2- be able to quickly respond to a customer, without even being nearby at the time that the alert is received.

Extend Surveillance Monitoring to Customer Service Managers With an advanced video management system, retailers are in a position to securely offer video access to departments outside the loss prevention realm. For customer service managers, having video access could help them keep a tighter watch on employee performance or even facilitate ongoing training efforts. Granular user permissions ensure they only have access to cameras and video capabilities related to their job.

Integrate Retail Analytics into Existing Video Surveillance Platforms An integration between the video surveillance system and the retail analytics system provides valuable in-store data such as people-counting and shopping trends. Real-time store traffic reports can be generated by the system to help store managers determine appropriate staffing requirements for various times of the day/week. Reference: http://www.genetec.com/about-us/news/blog/3-clever-ways-to-use-videosurveillance-to-enhance-customer-service#.VmWNm7_tv0Y

www.timetech.co.za

page 61


marketing@timetech.co.za


Technical buzz words explained‌ Lens Calculator The lens calculator is used to help predetermine proper lens selection prior to installation. This Calculator helps calculate the field of view (FOV) or area size that is visible through the lens from a certain elevation, for a certain distance and at a certain degree. It thus determines what the focal length of the lens of the camera needs to be to get the desired field of view. The focal length of the lens in turn determines its angle of view, and thus also how much the subject will be magnified for a given photographic position. Wide angle lenses have short focal lengths, while telephoto lenses (narrow angle of view) have longer corresponding focal lengths. The focal length of an optical system is a measure of how strongly the system converges or diverges light. For an optical system in air, it is the distance over which initially collimated rays are brought to a focus. A system with a shorter focal length has greater optical power than one with a long focal length; that is, it bends the rays more sharply, bringing them to a focus in a shorter distance. In most photography and all telescopy, where the subject is essentially infinitely far away, longer focal length (lower optical power) leads to higher magnification and a narrower angle of view; conversely, shorter focal length or higher optical power is associated with a wider angle of view. On the other hand, in applications such as microscopy in which magnification is achieved by bringing the object close to the lens, a shorter focal length (higher optical power) leads to higher magnification because the subject can be brought closer to the centre of projection. Camera lens focal lengths are usually specified in millimetres (mm), but some older lenses are marked in centimetres (cm) or inches.

F-Stop In optics, the f-number (sometimes called focal ratio, fratio, f-stop, or relative aperture) of an optical system is the ratio of the lens's focal length to the diameter of the entrance pupil. It is a dimensionless number that is a quantitative measure of lens speed, and an important concept in photography. The number is commonly notated using a hooked f, i.e.f/N, where N is the f-number. The word stop is sometimes confusing due to its multiple meanings. A stop can be a physical object: an opaque part of an optical system that blocks certain rays. The aperture stop is the aperture setting that limits the brightness of the image by restricting the input pupil size, while a field stop is a stop intended to cut out light that would be outside the desired field of view and might cause flare or other problems if not stopped. In photography, stops are also a unit used to quantify ratios of light or exposure, with each added stop meaning a factor of two, and each subtracted stop meaning a factor of one-half. The one-stop unit is also known as the EV (exposure value) unit. On a camera, the aperture setting is usually adjusted in discrete steps, known as f-stops. Each "stop" is marked with its corresponding f-number, and represents a halving of the light intensity from the previous stop. This corresponds to a decrease of the pupil and aperture diameters by a factor of 1/ or about 0.7071, and hence a halving of the area of the pupil.

CCD A charge-coupled device (CCD) is a device for the movement of electrical charge, usually from within the device to an area where the charge can be manipulated, for example conversion into a digital value. This is achieved by "shifting" the signals between stages within the device one at a time. CCDs move charge between capacitive bins in the device, with the shift allowing for the transfer of charge between bins.The CCD is a major piece of technology in digital imaging. In a CCD image sensor, pixels are represented by p-doped MOS capacitors. These capacitors are biased above the threshold for inversion when image acquisition begins, allowing the conversion of incoming photons into electron charges at the semiconductor-oxide interface; the CCD is then used to read out these charges. Although CCDs are not the only technology to allow for light detection, CCD image sensors are widely used in professional, medical, and scientific applications where high-quality image data is required. In applications with less exacting quality demands, such as consumer and professional digital cameras, active pixel sensors (CMOS) are generally used; the large quality advantage CCDs enjoyed early on has narrowed over time.

www.timetech.co.za

page 63


Technical buzz words explained‌ Focus Ring In the field of photography, a focus ring is a device or mechanism the user has to adjust the focus of the lens of a camera by hand. Before the advent of autofocus, all cameras had manually adjusted focusing. The focus itself may be adjusted in a variety of ways. Larger view cameras and the like slide the lens closer or further from the film plane on rails; on smaller cameras, a focus ring on the lens is often rotated to move the lens elements by means of a helical screw. Other systems include levers on the lens or on the camera body.

Composite Video Composite video (one channel) is an analogue video transmission (without audio) that carries standard definition video typically at 480i or 576i resolution. Video information is encoded on one channel, unlike the slightly higher-quality S-video (two channels) and the even higherquality component video (three or more channels).Composite video is usually in standard formats such as NTSC, PAL, and SECAM and is often designated by the CVBS initialism, for colour, video, blanking, and sync, or simply as video.

Pal Phase Alternating Line (PAL) is a colour encoding system for analogue television used in broadcast television systems in most countries broadcasting at 625-line / 50 field (25 frame) per second (576i). Other common colour encoding systems are NTSC and SECAM. This page primarily discusses the PAL colour encoding system. The articles on broadcast television systems and analogue television further describe frame rates, image resolution and audio modulation.

Sync pulse

There are a number of ways in which focus may be determined. Simplest is using a distance scale and measuring or estimating distance to the subject. Other methods include the rangefinder, which uses triangulation to determine the distance. On other cameras, the photographer examines the focus directly by means of a focusing screen. On the view camera, this ground glass is placed where the film will ultimately go, and is replaced by a sheet of film once focus is correct. Twin lens reflex cameras use two lenses that are mechanically linked, one for focusing and the other to take the photograph. Single lens reflex cameras, meanwhile, use the same objective lens for both purposes, with a mirror to direct the light to either the focusing screen or the film. Focusing screens, in their simplest form, consist of a matte glass or plastic surface on which the image can be focused. Other devices, such as split-image prisms or microprisms, can help determine focus.

Synchronizing pulses added to the video signal at the end of every scan line and video frame ensure that the sweep oscillators in the receiver remain locked in step with the transmitted signal, so that the image can be reconstructed on the receiver screen. A sync separator circuit detects the sync voltage levels and sorts the pulses into horizontal and vertical sync. The horizontal synchronization pulse (horizontal sync HSYNC), separates the scan lines. The horizontal sync signal is a single short pulse which indicates the start of every line. The rest of the scan line follows, with the signal ranging from 0.3 V (black) to 1 V (white), until the next horizontal or vertical synchronization pulse.

The format of the horizontal sync pulse varies. In the 525-line NTSC system it is a 4.85 Âľs-long pulse at 0 V. In the 625-line PAL system the pulse is 4.7 Âľs synchronization pulse at 0 V . This is lower than the amplitude of any video signal (blacker than black) so it can be detected by the level-sensitive "sync stripper" circuit of the receiver. Vertical synchronization (Also vertical sync or VSYNC) separates the video fields. In PAL and NTSC, the vertical sync pulse occurs within the vertical blanking interval. The vertical sync pulses are made by prolonging the length of HSYNC pulses through almost the entire length of the scan line. The vertical sync signal is a series of much longer pulses, indicating the start of a new field. The sync pulses occupy the whole of line interval of a number of lines at the beginning and end of a scan; no picture information is transmitted during vertical retrace. The pulse sequence is designed to allow horizontal sync to continue during vertical retrace; it also indicates whether each field represents even or odd lines in interlaced systems (depending on whether it begins at the start of a horizontal line, or mid-way through).


Technical buzz words explained… Colour Burst Colour burst is an analogue, composite video signal generated by a video-signal generator used to keep the subcarrier synchronized in a colour television signal. By synchronizing an oscillator with the colour burst at the back porch (beginning) of each scan line, a television receiver is able to restore the suppressed carrier of the chrominance (colour) signals, and in turn decode the colour information. The most common use of colour burst is to genlock equipment together as a common reference with a vision mixer in a studio using a multi-camera setup.

Chrominance Chrominance (chroma or C for short) is the signal used in video systems to convey the color information of the picture, separately from the accompanying luma signal (or Y for short). Chrominance is usually represented as two color-difference components: U = B′ − Y′ (blue − luma) and V = R′ − Y′ (red − luma). Each of these difference components may have scale factors and offsets applied to it, as specified by the applicable video standard. In composite video signals, the U and V signals modulate a color subcarrier signal, and the result is referred to as the chrominance signal; the phase and amplitude of this modulated chrominance signal correspond approximately to the hue and saturation of the color. In digital-video and still-image color spaces such as Y′CbCr, the luma and chrominance components are digital sample values. Separating RGB color signals into luma and chrominance allows the bandwidth of each to be determined separately. Typically, the chrominance bandwidth is reduced in analog composite video by reducing the bandwidth of a modulated color subcarrier, and in digital systems by chroma subsampling.

Luminance Luminance is a photometric measure of the luminous intensity per unit area of light travelling in a given direction. It describes the amount of light that passes through, is emitted or reflected from a particular area, and falls within a given solid angle. The SI unit for luminance is candela per square metre (cd/m2). A non-SI term for the same unit is the "nit". The CGS unit of luminance is the stilb, which is equal to one candela per square centimetre or 10 kcd/m2. Luminance is often used to characterize emission or reflection from flat, diffuse surfaces. The luminance indicates how much luminous power will be detected by an eye looking at the surface from a particular angle of view. Luminance is thus an indicator of how bright the surface will appear. In this case, the solid angle of interest is the solid angle subtended by the eye's pupil. Luminance is used in the video industry to characterize the brightness of displays. A typical computer display emits between 50 and 300 cd/m2. The sun has luminance of about 1.6×109 cd/m2 at noon. Luminance is invariant in geometric optics. This means that for an ideal optical system, the luminance at the output is the same as the input luminance. For real, passive, optical systems, the output luminance is at most equal to the input. As an example, if one uses a lens to form an image that is smaller than the source object, the luminous power is concentrated into a smaller area, meaning that the illuminance is higher at the image. The light at the image plane, however, fills a larger solid angle so the luminance comes out to be the same assuming there is no loss at the lens. The image can never be "brighter" than the source.

References: John E. Greivenkamp (2004). Field Guide to Geometrical Optics; James R. Janesick (2001). Scientific charge-coupled devices Smith, Warren Modern Lens Design 2005; "Pal systems – Television measurements" . Publication date September 1999. Tektronics Incorporated Gupta, R. G. (2006). Television Engineering and Video Systems; Wharton, W.; Douglas Howorth (1971). Principles of Television Reception Chaves, Julio (2008). Introduction to Nonimaging Optics; Wikipedia

www.timetech.co.za

page 65




About Braai Polar Why Braai Polar? Other than the obvious of being able to say we hold the Guinness World Record for one of the hardest braai (BBQ) titles there is, we will be raising funds to establish a platform for Bi Polar awareness in South Africa. Our aim is to establish an interactive website that will allow parents to instantly connect with other parents that have children with this condition, to allow adults with this condition to find answers, and for partners and family members to find hope. Offering workshops at schools and at institutions, to help people understand that they do not have a disease, they have a condition, it is treatable and it is live-able! I was diagnosed with Bi Polar 3 Years ago and when I wanted to find out more about it, there was NO BODY to talk to. No one I could call and that was frightening. Why is there Help so readily available for narcotics and alcoholism, even obesity, but not for a condition that is literally life destroying if you don’t understand it. If you understand it you will have the power to control it and have half a chance of a normal life. What is Bi-Polar Bipolar disorder is a mental disorder characterized by extreme shifts in mood, as well as fluctuations in energy and activity levels. During these abnormal shifts, the patient commonly finds it difficult to complete everyday tasks. Bipolar disorder is a serious condition that can destroy relationships, undermine career prospects, and seriously affect academic performance. The American Psychological Association says that these emotional shifts can become so overwhelming that individuals may choose suicide. Signs and symptoms of bipolar disorder may appear at any time during a person's life, but will usually do so during their teen years or young adulthood. Although diagnosing bipolar disorder has improved considerably over the last three decades, many sufferers still live with the illness without a proper diagnosis, and consequently no proper treatment.

Richard Knoetze - The Record Setter The only thing that Richard is more passionate about than braai, is his family. From Cape Town with a status as an Adventure Braai Master, He has taken part in World BBQ Championships, held the Western Province title a few times and competed on a national level. Recently the Top 15 Western Cape for Ultimate Braai Master season 3. Always up for an adventure and a cause. He was diagnosed with Bi Polar 3 years ago, and is making this a personal quest and a massive push at helping children with Bi Polar through his own experience. Pieter Van Dalen - The Supporter Pieter was one of the Original Ama Chop Chop Braai Masters in the 2001 BBQ World Champs. Has dedicated his working career to helping his community in various projects that eventually saw him do a term in Parliament. Dedicated to this cause with Richard and is also part of Team Braai Polar, and they will be taking on Ultimate Braai Master season 4 in 2015, as well as embarking on the “Off the Grid” Local braai documentary. Braaiboy Every sport needs a superhero, and when it comes to braaing, I’m your man. Having braaied every day for the last 6+ years, my tongs have seen some of South Africa’s most beautiful scenery and met some amazing people. You’ll find me braaing in between the Jacaranda trees in Pretoria, along the beaches of Durban, through African landscapes, in Vegas hotel rooms… in fact anywhere you would/could find a chop and some coals.

www.timetech.co.za

page 68


From Left: Braaiboy, Pieter van Dalen and Minister of Social Development Western Cape, Mr. Albert Fritz officially opening Braai Polar 2015!


How will it work? Braai Polar Waterfront will take place from 14-20 December 2015 at the V&A Waterfront Cape Town. This is an official Guinness world record event and is an attempt to do 120 hours/5 days for “The Longest Timed Braai Marathon� unaided by a single person.

The event will also feature celebrity chefs & Braai Masters from around the province as well as Live entertainment by musicians and comedians. Braai Polar will also feature a Braai Expo which is the start of a vision to expand to an annual Braai Expo Festival as of 2016. All food cooked during the record attempt will be sold to raise funds for Bi Polar awareness in South Africa as well as given to selected Children's charities that are in need.


Braaing night and day! The Braai Polar event is streamed live on YouTube and also has Thermal coverage With FLIR Thermal cameras by Timeless Technologies.

During the Event One of the basic rules of the GWR (Guinness World Record) is that all food cooked on the braai be consumed. We will be inviting the public to come and sample the food as well as having braai demonstrations over the 4 days. For example; • How to make beer bread on the braai, • Perfect braai chicken, • How to clean your grid, • Spice demonstrations etc. These demonstrations are not only entertaining but will also be allocated to various sponsors once again ensuring maximum exposure for you. We will also be hosting talks on Bi Polar. One of our charity drives is to invite children's homes and the aged, to collect food parcels from us which once again will be handed over by corporate sponsors. There will also be an opportunity for product demonstrations for any outdoor related products, But both Richard and Pieter will continuously be interacting with the public. In the evenings we will be hosting the S.A.P.S, Fire Department as well as Paramedics, again under corporate sponsorship and as you well know this will generate huge media response and coverage by the local papers and radio. Once sponsorships have been confirmed we will be able to provide additional entertainment and are looking at possibly having a family day. There will also be a daily raffle drawn from the public who make donations and we encourage sponsors to provide prizes for this which again gives you maximum exposure for your brand. www.braaipolar.co.za

www.timetech.co.za

page 71


Sonskynfees 2016 in support of

Timeless Talks is proud sponsor of The social media, graphic & web design for Sonskynfees www.sonskynfees.co.za


The Alta du Toit Story Alta du Toit Aftercare is a safe haven where adults with intellectual disabilities can live and work. Provision is made for physical and medical care to our clients and they all take part in established skills development programmes to ensure optimal development throughout their adult lives. We want each of our clients to reach his/her full potential, so all our service programmes are based on the premise “in the best interest of the client”. Alta du Toit, whom the school in Kuilsriver and our Aftercare Centre were named after, was born on 04 September 1954. Two years later she was diagnosed with Down’s Syndrome. Alta’s parents, the Late Reverend Daan du Toit and his wife Mrs Alta du Toit, identified a need for a centre in the Northern Suburbs with facilities for people with intellectual disabilities. Although the path to fulfilling this dream was full of twists and turns and initial resistance, the “Alta du Toit Training Centre” opened in Bellville East in July 1964. The training centre was declared an official State-owned organisation in 1975. The training centre was transferred from Bellville East to Kuils River in in 1983, and was later officially named the Alta du Toit School. As Alta and her friends grew older, another need came to the fore – only children to the age of 18 years could be accommodated in the school, and there were no facilities for adults (18 years and older) with intellectual disabilities. Various alternatives were considered to address this problem, and eventually it was decided to start with an “aftercare” residential programme on the premises of the old “Sunshine Home” in Lincoln Street, Boston in Bellville. The Alta du Toit Aftercare Centre was officially opened in April 1978 with the aim to accommodate adults with intellectual disabilities for “further care and development during their adult lives”. The clients of our centre are mostly from the Cape Metropolitan area, but some of them come from communities in the West Coast, Boland and Overberg regions. Currently we offer full residential care in four hostels, and also offer development and therapeutic service programmes for clients visiting us on a daycare basis.


How you can help – Help us to help our clients with special needs

Would you like to make a donation, or sponsor one of our clients from an economical lessprivileged family situation? Our Centre and clients receive the basic disability State grants, but these are not sufficient to meet the monthly operational budget – we therefore have to charge monthly fees to address the shortfall in unit costs. Normally such fees would be payable by the parents and families of our clients, but an ever-increasing number of parents cannot contribute, and those clients must be subsidized in order to remain in our programme structure. Every Rand earned by an event goes directly into the programs and services for the clients we serve.

Event Sponsorship

Becoming an event sponsor not only provides much-needed funding to our programs and services, but also gives wonderful branding opportunities to your business or organization. Sponsors receive pre-and post-event recognition in marketing materials and the event websites.

What’s in it for me?

Alta du Toit Aftercare is a registered Non-profit Organization (NPO-011-891) and all donations made to us by South Africans (companies and individuals ) are partly tax deductible, as per the South African Income Tax Act.

Contacts:

Tel: 021 913 2106 | 021 912 2760 Fax: 021 913 3658 etienne@altadutoit.org.za marina@altadutoit.org.za lelani@altadutoit.org.za mariaan@altadutoit.org.za www.altadutoit.org.za BANK DETAILS Bank: ABSA Bank Branch code: 632005 Account number: 390 1414 24 Account name: Alta du Toit Aftercare

www.timetech.co.za

page 71



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.