Complex technologies are redefining our working environment. Taking advantage of innovation and other emerging technology means harnessing the power of Birdi & Associates, Inc.’s systems integration specialists, who can help manage the inherent challenges in planning, construction, testing, deployment, and beyond. Our solutions provide results quickly and allow the end user to make decisions in real-time to maximize returns on existing IT investments and to extend their usable life.
B&A specializes in custom approaches to security systems and IT infrastructure for broad use within corporate offices, shopping centers, railway stations, airports, and other public places. Our capability ranges from concept design to implementation and integration of security systems. Our firm has a distinct advantage when installing the following electronic security systems:
Access Control Systems (ACS) is a combination software and hardware application. The software application controls identity credentialing and access levels. When a credential is presented to a card reader, the reader sends the credential’s information to a control panel with a highly reliable processor. The control panel compares the credential’s number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door or other access portal remains locked or inaccessible. If there is a match between the credential and the access control list, the control panel operates a relay that in turn unlocks the gate/door.
The hardware application controls the physical access to a specific location. An access control point can be a door, turnstile, rolling gate, elevator, or other physical barrier, where granting access can be electronically controlled through the placement of a card reader. Readers do not usually make an access decision; a card number is sent to an access control panel that verifies the number against an access list. In the case of a door, a magnetic door switch can be used. Generally only entry is controlled, however, in cases where exit is also controlled, a second reader is used on the opposite side of the door. Where exit is not controlled, a device called a request-to-exit (REX) is used. Request-to-exit devices can be a push-button or a motion detector. When the button is pushed, or the motion detector detects motion at the door, the door alarm is temporarily ignored while the door is opened. This security system is typically integrated into a CCTV program.
Automatic License Plate Recognition (ALPR) is designed to capture license plate information and store the data with the timestamp. Once the license plate information is captured, numbers can be filtered through law enforcement and other databases. Cameras, mounted to police vehicles or stationary structures such as gates or bridges, automatically take photos of license plates at the rate of hundreds per minute. The characters in the photo of the plate are then translated into letters and numbers and compared to law enforcement databases of registered vehicles known to be or suspected of being involved with crimes or infractions.
Video Management Systems (VMS) allows security camera operators to manage images and sort through video images based on time, date, and location. It allows users to customize video recording according to motion sensors. VMS collects video from cameras and other sources and records/stores that video to a storage device. VMS Provides an interface to both view the live video, and access recorded video.
Police 911 Computer Aided Dispatch (911 CAD) assists in automating the process of dispatching information to police and their vehicles. This system is used to increase the efficiency from the emergency call to the law enforcement response.BACK TO SERVICES