Skip to main content

Camera capabilities in focus on Axis booth

Surveillance camera technology has come a long way over the last 20 years as visitors to the Axis Communications booth here at ITS America 2016 San Jose will see. The company invented the network camera in 1996, making it possible to connect a video camera directly to a computer network (commonly referred to as IP video). The shift from analog to IP has changed the global security market. According to Axis, with network cameras being based on open IP standards, authorised users can get secure and flexible a
June 14, 2016 Read time: 2 mins
Anthony Incorvati of Axis
Surveillance camera technology has come a long way over the last 20 years as visitors to the 2215 Axis Communications booth here at ITS America 2016 San Jose will see. The company invented the network camera in 1996, making it possible to connect a video camera directly to a computer network (commonly referred to as IP video). The shift from analog to IP has changed the global security market. According to Axis, with network cameras being based on open IP standards, authorised users can get secure and flexible access to their video and analytics via a computer or mobile device from anywhere - resulting in increased efficiency. And unlike its anaog predecessor, IP video provides superior image usability in challenging low- and back-light conditions, camera intelligence and open standards.

Here in San Jose, Axis is demonstrating its latest innovations in IP video technology by showcasing cameras with zoom capabilities and discussing new technologies such as wide dynamic range – forensic capture, electronic image stabilisation, and Axis’ zipstream technology - a technology that reduces bandwidth and storage without sacrificing image quality. “It is these types of intelligent camera capabilities that make it possible to alert traffic management centres and other users automatically when there is an incident, enabling faster redirection of traffic and dispatch of emergency services,” says Anthony Incorvati, business development manager at Axis Communications. “These types of analytics are also being used to collect important data to support planners and engineers for future projects.”

For more information on companies in this article

Related Content

  • Tighten up on cyber security before hackers infiltrate ITS infrastructure
    October 19, 2015
    This year’s ITS World Congress in Bordeaux will have three sessions dedicated to cyber security and the issue will also be addressed under connected and automated vehicles categories. Jon Masters finds out why. American security researchers Charlie Miller and Chris Valasek attracted international press coverage recently when they demonstrated how they could hack into and take control of a vehicle from a remote laptop. While the implications are clearly serious for vehicle manufacturers, highway and transpor
  • Towards intelligent road infrastructure
    October 8, 2021
    A digital transformation is happening in the world today and the result is that Europe’s transport infrastructure, and also the car industry are experiencing revolutionary changes. Jēkabs Krastiņš looks at the challenges and plots the road ahead.
  • ITS needs continuity at the policy-making level
    February 1, 2012
    ITS needs to be sold to politicians in plainer terms and we need to be encouraging greater continuity at the policy-making level says Josef Czako, chairman of the IRF's Policy Committee on ITS. At the ITS World Congress in New York in 2008, the International Road Federation (IRF) held the inaugural meeting of its Policy Committee on ITS. The Policy Committee's formation, says its chairman, Kapsch's Josef Czako, reflects an ongoing concern over the lack of deployment of ITS technology on roads in anything li
  • Keeping cyber criminals from your website
    November 10, 2017
    If a hacker can penetrate your website, they can do business as you. Joe Dysart explains how you and your customers may not discover the fraud for some time. In the latest twist on identity theft, hackers are clandestinely taking over business websites - and then brazenly billing visiting customers as if the sites are their own.