Beyond providing high quality images, can conventional CCTV actually help reduce crime or incident response times?
Is 24/7 control room monitoring an effective use of funding and resources or is there a smarter approach?
How can disparate agencies and groups effectively work together if they don’t use similar systems or a common operating picture and automatically share resources?
The GPAC System™ combines both video and sensor data for fixed and mobile applications in a multitude of industries.
It is very easy to use the GPAC System™ to integrate multiple suppliers’ cameras and sensors to share real-time and critical on scene data and information, thus extending infrastructure utilization and adding to the portfolio of innovative technology solutions to protect people, assets and communities.
Relief Response – Tool for Responders!
click for enlargement
The GPAC System(TM) is one of the most complete and user friendly systems available for managing critical incidents. Critical incident response systems are generally only as good as the quality of data they provide to up-the-line decision makers. The GPAC System(TM) improves on this by making the best quality and filtered data available in real-time to parties who need to be in the know.
Incident data generated by arrays of sensors placed in critical locations is automatically accessible. The system uses multi-vendor commercial-off-the-shelf (COTS) and non-COTS components (GOTS, MOTS), which makes for easy and rapid installation of legacy and most current available sensors. Sensors connect with the GPAC System(TM) over a network – no geographical limitation; data received is instantly categorized to determine the automated system response and up-line escalation. Sensor data and video activity is logged, ensuring integrity and accuracy of incident recording, thus reducing duplication of effort. This has the added benefit of reducing the need for a dedicated incident recorder; the recorded log is available in real-time to all with access to the system, stored for later usage in trainings, further post incident evaluations and as forensics for possible successful prosecutions etc. Continue reading