An acoustic sensor is a built-in microphone that has no support for streaming audio but instead uses the data to detect and measure sound waves, converting the soundwaves into digital data for analysis only. For example, our camera analyzes the data and produces the metadata such as sound levels, object classifications, and so forth. An acoustic sensor does not produce any audio to be used in a camera system for listening to or for the recording of audio. Instead, the microphone component is used only to generate data, not to stream audio.
Alarm overlay is a type of metadata overlay. An alarm overlay is used in recorded and live video to draw the operator's attention to things that happen in a scene, such as an individual who lingered in a specific area too long. An alarm overlay can consist of different elements, but typically it includes a bounding box that appears or changes color when the alarm is triggered.
Through AXIS Camera Application Platform (ACAP), you have access to a list of tested, well-documented application program interfaces (APIs). These APIs are optimized for Axis devices and let you take full advantage of Axis hardware and software. Together with software development kits (SDKs) based on open-source components, they facilitate interoperability, scalability, and easy migration of your apps to execute on Axis devices.
A detection profile for radar in surveillance use cases. Best used for objects moving up to 55km/h (34 mph). Detects whether an object is a human, a vehicle, or an unknown object.
A broad concept used to label manufactured machines, computers, systems, and software that solve complex tasks while demonstrating seemingly intelligent traits. Deep learning and machine learning are subsets of AI.
A type of iris, which is electrically controlled by the camera, to automatically regulate the amount of light allowed to enter.
A framework for added functionality and intelligence at the edge. AXIS Camera Application Platform (ACAP) is a well-established open application platform that allows partners and developers to develop applications for a wide range of use cases and segments, supported by many cameras, speakers, intercoms, and radar products. ACAP allows users to download and install Axis and third-party applications in Axis products.
Axis device ID is a device-unique certificate with corresponding keys that can prove the authenticity of an Axis device. The Axis device is factory-provisioned with an Axis device ID that is stored in the secure keystore. Axis device ID is compliant with IEEE 802.1AR (IDevID, Initial device identifier), which defines a method for automated, secure identification.
Axis Edge Vault (Edge Vault) provides a hardware-based cybersecurity platform that safeguards the Axis device. It forms the foundation that all secure operations depend on and offers features to protect the identity and integrity of the device. The platform relies on cryptographic computing modules and system-on-chip security to protect sensitive information from unauthorized access. Features include secure boot, signed OS, secure keystore, Axis device ID, and signed video.
Axis Lightfinder technology delivers high-resolution, full-color video with a minimum of motion blur even in near darkness. Because it strips away noise, Lightfinder makes dark areas in a scene visible and captures details in very low light. Cameras with Lightfinder discern color in low light better than the human eye. In surveillance, color may be the critical factor to identify a person, an object, or a vehicle.
AXIS OS is the Linux-based operating system, purpose-built for Axis devices, which enables long-term value, cybersecurity, and world-class integration.
The AXIS OS active track is the most updated and feature-progressive track of AXIS OS and is suitable for customers who want access to the newest features and improvements. New products are launched on this track which means the most immediate access to any new features and updates.
The AXIS OS lifecycle is the overall software support lifecycle for AXIS OS-based products. The AXIS OS lifecycle in AXIS OS-based products includes different stages and levels of software support including feature growth, bug fixes, and security patches, and is tied together to the actual product lifecycle. Each lifecycle includes the following three tracks: AXIS OS active track, AXIS OS long-term support (LTS) track and AXIS OS product-specific support (PSS) track.
The focus of the AXIS OS long-term support (LTS) track is to keep the products well integrated with third-party equipment or software, and still get necessary bug fixes and cybersecurity updates. An LTS track has a fixed feature set, and a new track is issued every two years and maintained for five years. No new products or features are added to the LTS track.
The AXIS OS product-specific support (PSS) track is a rare track for when a product requires support after an LTS track expires. The products on this track continue to receive necessary bug fixes and cybersecurity updates. Each product sits on its own track and the track is not connected to other product tracks. Non-AXIS OS products have similar support tracks.
Axis Secure Remote Access is a technology that allows a smartphone or PC client to access Axis network cameras when the client and the cameras are located on different local networks. Axis Secure Remote Access significantly simplifies the installation of remote access to surveillance systems. Once enabled, it’s automatically configured and removes the need for manual port-forwarding and router configuration.
Barrel distortion correction (BDC) is a lens correction that digitally corrects barrel distortion, where the image of a square object has sides that curve out. Using sliders, users can pull the edges of the image to make the image appear flat rather than curved.
A bounding box is a type of metadata overlay. It´s used in recorded and live video to draw the operator´s attention to what is happening in a scene. It typically includes a rectangular box that appears when an object or attribute of interest appears.
A storage process where you save and maintain your data offsite, which can only be accessed through the internet. This means that you can access the data you have put in a cloud storage from any location and can also grant access permission to anyone you want to share it with. It is a very secure of storing data that also provides a good backup.
The discipline of using algorithms to analyze images and videos to help computers understand and interpret what's happening in a scene.
Corridor format is a feature that lets users turn the camera view 90 degrees to give a vertical view (portrait) at, for example, 9:16 ratio rather than a horizontal view (landscape) at, for example, 16:9 ratio. With corridor format, you can use the full view of the camera to overlook narrow scenes such as retail store aisles, highways and freeways, school hallways, and train station platforms.
The protection of computer systems and services from cyberthreats. Cybersecurity practices include processes for preventing damage and restoring computers, electronic communications systems and services, wire and electronic communications, and stored information to ensure their availability, integrity, safety, authenticity, confidentiality, and nonrepudiation.
Sometimes referred to as day/night functionality. A camera with day-and-night functionality can pick up light in the near-infrared (NIR) wavelength range and produce images. In cameras with true day-and-night functionality, the IR-blocking filter is mechanically removed at night. As a result, the camera's overall light sensitivity is increased. Cameras of all shapes and sizes (such as fixed, fixed dome, and PTZ cameras) can offer day-and-night functionality.
A type of automatic iris that is electrically controlled by the camera to automatically regulate the amount of light that is allowed to enter.
A refined version of machine learning that uses so-called convolutional neural networks to process data. The algorithm learns to extract and combine features in a data-driven manner. DL is suitable for complex challenges, such as image classification, language processing, and object detection, where it's difficult to write rules to describe the solution. Instead, the deep learning network is trained iteratively using numerous examples, which usually have been labeled by a human expert.
An umbrella term for integrated chipsets designed for deep learning algorithms. In other words, DLPUs are AI accelerators integrated on application-specific integrated circuits (ASIC) or systems-on-chip (SoC) with data memory and architecture dedicated to accelerating deep-learning inference, allowing for more granular object classification.
Device management is the process of monitoring, handling the configuration of devices, and maintaining devices throughout their lifecycle, including their software, security, and performance. Device management software facilitates the tracking of device software versions, updates, troubleshooting, and obtains essential details about device health, warranties, and product discontinuation.
Device software typically refers to the programs or operating systems that run on electronic devices such as computers, smartphones, tablets, and other hardware. It includes the software that enables the device to function, software to manage hardware resources, and software to run applications. This can encompass everything from the operating system itself to the device drivers, firmware, and other software components that facilitate communication between the hardware and the user or other software.
Dynamic Host Configuration Protocol is a protocol for automatic assignment and management of IP addresses.
A digital signal processor is an audio processor that provides advanced sound compensation, which optimizes the sound to fit specific scenarios. In Axis network speakers, several sound optimization techniques such as frequency optimization, loudness compensation, and dynamic range control are built into the speakers themselves to deliver better audio quality in any environment.
Devices with echo cancellation can recognize sounds that the built-in loudspeaker produces as echoes and remove them.
Axis Edge Vault provides a hardware-based cybersecurity platform that safeguards the Axis device. It forms the foundation that all secure operations depend on and offers features to protect the identity of the device and safeguard its integrity from the factory. The platform relies on cryptographic computing modules and system-on-chip security to protect sensitive information from unauthorized access. Features include secure boot, signed firmware, secure keystore, Axis device ID, and signed video.
Edge-to-edge technology is a way to make IP devices communicate directly with each other. It offers smart pairing functionality between Axis network cameras and Axis audio products such as network speakers, audio bridges, and amplifiers.
Electronic image stabilization (EIS) provides smooth video in situations where a camera is subject to vibrations. Built-in gyroscopic sensors continuously detect the camera’s movements and vibrations, and they automatically adjust the frame to ensure you always capture the details you need. Electronic image stabilization relies on different algorithms for modeling camera motion, which are used to correct the images.
An elevator door state detector is ACAP software that detects the door's state based on the live image of Open or Closed and then sends a message event to the customer in metadata format.
All electronic devices release electromagnetic energy. Electromagnetic compatibility (EMC) approvals are based on two parts: emission and immunity. Emission refers to the ability of electronic equipment to function satisfactorily without emitting too much electromagnetic energy that can disturb other equipment in that environment. Immunity refers to the ability of electronic equipment to tolerate the influence of electromagnetic energy from other electronic products.
Evidence management systems and evidence management software are both abbreviated EMS. Both terms are associated with body worn cameras. An evidence management system comprises the whole solution of integrated hardware, software, and storage. Evidence management software manages recordings and metadata from body worn cameras.
In Axis products, an event trigger is typically a detector of digital signals, audio signals, or physical events such as movements or a change in light. Users can set up rules for what should happen when one or more triggers are met. Usually, the word trigger is sufficient, and the word event can be left out. In newer Axis software and products, we use the term condition instead of trigger.
Ex is the short form of "explosion protection" and refers to measures and techniques taken to prevent or minimize the risk of electrical equipment causing explosions in potentially combustible environments in which flammable substances such as liquid, gas, vapor, or dust are present. This involves ensuring that electrical devices are designed, certified, and installed according to specific standards and regulations to prevent ignition sources, limit the release of energy during an explosion, or isolate the hazardous area from the rest of the hazardous area. Examples include explosion-proof equipment, intrinsic safety barriers, and pressure relief venting systems.
Explosion protection refers to measures and techniques taken to prevent or minimize the risk of electrical equipment causing explosions in potentially combustible environments in which flammable substances such as liquid, gas, vapor, or dust are present. This involves ensuring that electrical devices are designed, certified, and installed according to specific standards and regulations to prevent ignition sources, limit the release of energy during an explosion, or isolate the hazardous area from the rest of the hazardous area. Examples include explosion-proof equipment, intrinsic safety barriers, and pressure relief venting systems.
An explosion-protected camera is certified for use in hazardous environments (for example, oil refineries, chemical plants, underground mines, sawmills, and food processing plants) where flammable substances (liquid, gas, vapor, or dust) may be present. It is the potentially combustible environment that must be protected from potential igniters such as arcs, sparks, and/or heat from the camera. In other words, the camera cannot be a source of ignition. Explosion protected does not mean that the camera can withstand an explosion.
An explosion-protected device is electrical or electronic equipment that is certified for use in hazardous environments (for example, oil refineries, chemical plants, underground mines, sawmills, and food processing plants) where flammable substances (liquid, gas, vapor, or dust) may be present. It is the potentially combustible environment that must be protected from potential igniters of electrical equipment, such as arcs, sparks, and/or heat. In other words, the device cannot be a source of ignition. Explosion protected does not mean that the device can withstand an explosion.
An explosion-protected speaker is certified for use in hazardous environments (for example, oil refineries, chemical plants, underground mining, sawmills, and food processing plants) where flammable substances (liquid, gas, vapor, or dust) may be present. It is the potentially combustible environment that must be protected from potential igniters such as arcs, sparks, and/or heat from the speaker. In other words, the speaker cannot be a source of ignition. Explosion protected does not mean that the speaker can withstand an explosion.
Focus recall is a feature that allows you to save focus areas to which the PTZ camera automatically returns when it moves into that view. This feature is especially useful in challenging lighting conditions, where the camera would have trouble finding focus. To use focus recall, you click a button when you’re satisfied with the focus of the current view, and the camera creates a focus recall area. Later, the camera automatically recalls the previously set focus for that view.
Axis cameras with wide dynamic range (WDR) technology make the difference between seeing important forensic details clearly and seeing nothing but a blur in challenging light conditions. The difference between the darkest and the brightest spots can spell trouble for image usability and clarity. Forensic WDR effectively reduces visible noise and artifacts to deliver video tuned for maximal forensic usability.
The frame rate is the frequency at which a video stream is updated. We measure frame rate in frames per second (fps). When there's movement in the video stream, you need a high frame rate to maintain good video quality.
Transmission of data in two directions simultaneously, such as in a telephone conversation.
Transmission of data in two directions, in one direction at a time, as in a walkie-talkie system.
Hard-coated refers to a durable layer applied to the surface of a dome, providing enhanced protection against mechanical wear. This layer helps maintain the dome's clarity and integrity over time, ensuring optimal image quality and camera performance.
Hazardous areas (or locations) are potentially combustible environments. Depending on where you are in the world, they are divided into zones or divisions, defined by the probability that hazardous substances (gas, dust, fibers, or vapors) will be present in an ignitable concentration in the surrounding atmosphere.
Horizon straightening is a feature in multisensor cameras that compensates for any physical tilt of the camera. By straightening the horizon and removing distortion, the feature enhances the viewing experience and provides an image that is perceived to be straight. Objects that are vertical in real life stay vertical also in the image.
An i-CS lens is an intelligent CS-mount lens that allows for quick and easy installation. The i-CS lens has three motors, which enable automatic and remote control of generic features such as zoom, focus, and aperture. This way, you can repurpose the lens for different cameras and use cases.
This IEEE standard for secure device identity defines a method for how to automate and secure the identification of a device over a network. A standardized device identity, stored during product manufacturing in a tamper-protected cryptographic computing module (TPM 2.0, Secure Element), facilitates interoperable secure device authentication and simplifies secure device deployment and management in IEEE 802.1X and HTTPS networks.
A network protocol that protects the network from unauthorized clients. The network infrastructure is protected through the use of managed switches and RADIUS servers. The 802.1X client in the device authenticates the device on the network.
IK ratings specify degrees of protection against external mechanical impact, measured in joules. The degree of protection ranges from IK01 up to IK10. The requirements, which include parameters for impact energy, mass, and drop height are specified in the international standard IEC/EN 62262. See also IK08/IK10.
IK ratings are defined as a code, which consists of the letters IK followed by two digits that represent testing requirements on impact energy, mass, and drop height.
IK08 rated products are protected against 5 joules of impact, the equivalent of 1.7 kg dropped from 300 mm above the product.
IK10 rated products are protected against 20 joules of impact, the equivalent of 5 kg dropped from 400mm above the product.
An image sensor is a device that captures light and converts it into digital signals to form an image. The image sensor consists of photosensitive diodes, photosites, which converts the light into electrons. The electrons are, through several conversions, interpreted as pixels. Once an image is formed, it’s sent for processing in a stage that determines, among other things, the colors of each individual pixel that make up an image.
A set of smart features built into our speakers. It enables boundless integration possibilities and includes, for example, sensors, digital signal processing (DSP), and audio management software.
Electric and electronic equipment deteriorate or malfunction when water or dust enters the device. The IEC has developed the ingress protection (IP) ratings, which grade the resistance of an enclosure against the intrusion of dust or liquids. The ratings are widely used throughout industry. See also IP66/IP67.
IP 66: An IP classification for dust tightness and protection against powerful water jets.
IP 67: An IP classification for dust tightness and protection against brief immersion in water.
IP ratings (ingress protection) are defined as a two-digit code where the first digit is the level of protection against the intrusion of solid foreign objects and the second digit is the level of protection against the intrusion of water.
IP66 – the product is dust-tight and powerful jets can’t harm the product.
IP67 – the product is dust-tight and continuous submersion in water can’t harm the product.
Together, with TCP, the Internet Protocol is the principal protocol in most of today's networked applications. For a server to operate on the internet, it must have its own, individual, public IP address. There are two versions, IPv4 and IPv6, where IPv4 still provides the majority of the service today. The main difference between the two is the size of the address space, which is substantially larger in IPv6.
A mode that allows the user to select a color range to represent different temperatures in a scene. Each color in an isotherm palette corresponds to a specific temperature value. The user can choose between black-and-white ranges, color ranges, or a mix between the two. The same input (measured thermal radiation) can result in different visual appearance depending on how each pixel value is mapped to a color range.
A light-emitting diode (LED) indicator has illuminated components used to show the status of a function, a battery, or electronics. An LED indicator lets you easily see if the camera is active or not, making it ideal for use within surveillance in retail, transport, and particularly healthcare environments where privacy is paramount.
The low-voltage directive provides broad objectives for the safety of electrical equipment. It ensures that products are safe to use without risk of personal injury or property damage. It's valid for the EU, and it's included in the CE mark.
Machine learning is a subset of artificial intelligence (AI) that allows computers to build their own logic for making predictions and determinations. Machine learning algorithms are either supervised or unsupervised. Without machine learning, a computer needs humans to create algorithms.
An umbrella term for integrated chipsets designed for machine learning algorithms. In other words, MLPUs are AI accelerators integrated on application-specific integrated circuits (ASIC) or systems-on-chip (SoC) with data memory and architecture dedicated to machine learning.
Multicast DNS is a protocol that can be used to discover network video products using Mac computers, but it can also be used as a discovery protocol for new devices in any network.
Data that describes and gives information about other data (typically primary data, such as the video or audio stream from an Axis device). Metadata makes it easier for systems and people to find, track, and analyze instances of data.
Message Queuing Telemetry Transport is a standard messaging protocol for the internet of things (IoT). It was designed for simplified IoT integration and is used in a wide variety of industries to connect remote devices while leaving a small code footprint and requiring minimal network bandwidth.
The collection and summary of useful data for effectively managing several devices or users from one central system or location. Such data could include device inventory, audio, video, events, system status, and any other useful metadata.
A solution that allows you to manage your device, content, or users in several locations from one system or location. For example, with AXIS Camera Station, you can combine camera live and recorded views from several locations into one overview. AXIS Optimizer also has a multisite management feature with which you can create a centralized management of license plate list and search. A multisite management system also helps you save cost, while increasing your system's management efficiency.
NEMA 4X is equivalent to IP56 and provides a degree of protection of the equipment, inside the enclosure, against the ingress of solid foreign objects, the ingress of splashing or hose-directed water, the forming of ice, and corrosion.
The National Electrical Manufacturers Association (NEMA) is a US-based association that provides standards for electrical equipment enclosures. NEMA has launched their own standard NEMA 250 worldwide. NEMA has also adopted and published a harmonizing IP standard, ANSI/IEC 60529, through the American National Standards Institute (ANSI).
Noise reduction is used to reduce ambient background noise.
One of five pillars of information assurance. Nonrepudiation provides proof of the origin, authenticity, and integrity of data. It assures the sender that the message was delivered and provides proof of the sender's identity to the recipient. Neither party can deny that a message was sent, received, and processed.
A software component that authenticates the ownership of an Axis device over the cloud together with an owner authentication key, which is shipped with the device. The one-click cloud connection service is used by select partners such as Genetec, Telcred, Total Security, IDODI, etc. This feature is available only to select partners.
Open Network Video Interface Forum (ONVIF) provides and promotes standardized interfaces for effective interoperability of IP-based physical security products. ONVIF is a registered trademark.
Open source means that developers have access to the source code of a certain software application. Developers can use, study, change, and then distribute their version of the software. A characteristic and benefit of open-source software is the development method, which includes distributed peer review and process transparency.
Axis OptimizedIR provides a unique and powerful combination of camera intelligence and sophisticated LED technology, resulting in our most advanced camera-integrated IR solutions for complete darkness. In our pan-tilt-zoom (PTZ) cameras with OptimizedIR, the IR beam automatically adapts and becomes wider or narrower as the camera zooms in and out to make sure that the entire field of view is always evenly illuminated.
The Open Supervised Device Protocol (OSDP) is an access control communications standard developed by the Security Industry Association (SIA) to improve interoperability among access control and security products.
A conceptual model that describes data communication between open systems. The model consists of seven layers. To provide a service, each layer uses the services of the layer immediately below it. Each layer must follow certain rules, or protocols, to perform services.
P-Iris is an automatic and precise iris control developed by Axis. It involves a P-Iris lens and specialized software that optimize image quality.
PBX is short for private branch exchange. It’s a telephone system within an enterprise that switches calls between users on local lines while allowing all those users to share a certain number of external phone lines. This way, you don't have to set up individual external phone lines for each user.
Personal protective equipment (PPE) is protective clothing, helmets, goggles, face masks, hairnets or other garments or equipment designed to protect the wearer's body from injury or infection and in some cases, used to protect sensitive environments from contamination. The hazards addressed by protective equipment include physical, electrical, heat, chemicals, biohazards, and airborne particulate matter.
PoE classes ensure efficient power distribution by specifying the amount of power that a powered device will require.
A concept (unique to Axis) for adding connectivity to Axis cameras. An interface box between the camera and switch provides the ports and adds a communication layer on top of the network.
PTRZ (pan-tilt-roll-zoom) functionality includes the ability of a camera to rotate around its lateral, vertical, and longitudinal axes. The camera’s focal length is adjustable to achieve a narrower or wider field of view. Thanks to the remote functionality, you can quickly adjust and readjust the camera view remotely over the network, saving time and effort. PTRZ functionality also gives you the flexibility to make future adjustments easily, ensuring less disruption, less downtime, and that no dispatched technician is needed.
Reader is a device for the input of credentials and forwards the credential to the access control system for authentication and authorization.
RFID is short for radio-frequency identification. It’s an identification technology that uses radio signals, (i.e., the electromagnetic or electrostatic coupling in the radio frequency (RF) portion of the electromagnetic spectrum) to identify an object, an animal, or a person.
A detection profile for radar in traffic use cases. Best used to track vehicles moving at up to 200 km/h (125 mph) in urban zones, closed zones, and on suburban roads. This mode is mainly used to track vehicles. To track humans and other objects moving at lower speeds, use the area monitoring profile. The ability for detection at high speeds is dependent on the Axis radar product in use.
A scene profile consists of a group of settings that are combined in a way that suits a particular scenario. When the user selects a scene profile, the camera automatically optimizes the exposure time, white balance, aperture, sharpness, contrast, and noise to suit that scenario.
AXIS Camera Application Platform (ACAP) allows you to install plugin-style apps on your Axis devices. This way, you can customize the feature set of your Axis devices and systems while maintaining a high degree of interoperability and scalability. The application programming interfaces (APIs) and ACAP software development kits (SDKs) are based on open-source components and support developers, at Axis and partner companies alike, in creating apps for a vast array of scenarios.
Secure boot is a boot process that consists of an unbroken chain of cryptographically validated software, starting in immutable memory (boot ROM). Being based on signed firmware, secure boot ensures that a device can boot only with authorized firmware.
Secure boot is a boot process that consists of an unbroken chain of cryptographically validated software, starting in immutable memory (boot ROM). Secure boot ensures that a device can boot only with signed OS.
A cryptographic computing module that provides hardware-based, tamper-protected storage of private, cryptographic keys and secure execution of cryptographic operations. Unlike the TPM, the hardware and software interfaces of a secure element are non-standardized and manufacturer-specific.
Secure keystore is a tamper-protected environment for the protection of cryptographic keys and the secure execution of cryptographic operations. It prevents unauthorized access and malicious extraction even in the event of a security breach. An Axis device can have either one or multiple hardware-based, cryptographic computing modules (for example, secure element, TPM, and TEE), which provide a hardware-protected secure keystore.
A secure and encrypted process for connecting remotely to a network. It uses security solutions to ensure that your network doesn't compromise your data or open the network to unauthorized connections and attacks. Examples include the use of VPN, multifactor authentication, and encryption.
A slot for a small form-factor pluggable (SFP) transceiver. This type of transceiver supplies network devices, such as a switches or routers, with a fiber optic network connection.
The sharpdome feature offers innovative mechanics that make the entire dome rotate, in contrast to a conventional dome where the camera rotates inside the dome. Pan-tilt-zoom (PTZ) cameras with sharpdome are versatile, with a field of view that extends above the camera horizon. This means that refractions and other optical effects are kept to a minimum.
Signed firmware is implemented by the software vendor signing the firmware image with a private key, which is secret. When firmware has this signature attached to it, a device will validate the firmware before accepting and installing it. If the device detects that the firmware integrity is compromised, it will reject the firmware upgrade. Axis signed firmware is based on the industry-accepted RSA public-key encryption method.
Signed OS is implemented by the software vendor signing the device software image with a secret, private key. When device software has this signature attached to it, a device will validate the device software before accepting and installing it. If the device detects that the integrity is compromised, it will reject the software. Axis signed OS is based on the industry-accepted RSA public-key encryption method.
When the signed video feature is enabled in a supported camera, it enables video to be authenticated and video tampering to be detected. Cryptographic signatures are added to the video stream before it leaves the camera, enabling traceability back to a particular Axis camera and allowing viewers to verify if the video has been tampered with or not. This is particularly important in an investigation or prosecution. The signing keys for signed video are stored in the secure keystore of the Axis device.
Transmission of data in one direction only, such as from a camera to the operator.
The Session Initiation Protocol (SIP) is a protocol that initiates, maintains, and terminates multimedia sessions between different parties. Usually, these sessions consist of audio, but sometimes they consist of video. The most common applications of SIP include internet telephony for voice and video calls and instant messaging over IP networks.
Sound pressure level (SPL) is an objective measure of sound loudness. SPL is used to describe how loud a sound a product is producing. The higher the SPL, the louder the sound. It is a reference level, where 0 dBSPL equals the threshold of hearing, 120–140 dBSPL is painful, and 140 dBSPL equals irreparable hearing damage. To get the SPL, you measure the atmospheric pressure caused by a sound wave over a specified period of time. It's expressed in dBSPL.
Spatial behavior is the way objects move within a scene.
In video analytics, you can set up rules for detecting and handling both unexpected or desired spatial behavior. Through rules that pair spatial behavior-based conditions with actions, your systems or staff can be made aware and respond appropriately.
Examples:
A supervised input, or supervised I/O, allows you to detect tampering in external alarm systems. Beyond the active or inactive state, it's possible to detect if the wire has been cut or shortened.
A constant monitoring of your system to ensure that it's in good operational mode. It helps to evaluate the system’s condition, by checking its performance and performing regular maintenance. A comprehensive system health monitoring provides a full status report of the system’s components. With this, you can easily check which part of the system is malfunctioning or partially performing.
The overall monitoring and maintenance of a system’s hardware and software. It includes management processes such as operating system updates, user profile administration, cybersecurity, hardware servicing and replacement. For example, you should upgrade your device’s software when there's a new version, to ensure the product has access to the newest features and functionalities.
Short for Transmission Control Protocol/Internet Protocol. A reference model used to understand protocols and how communication takes place. The model consists of four layers, which correspond to the seven layers in the OSI model. Each layer must follow certain rules, or protocols, to perform services.
Data about the environment that is transmitted from a remote device, such as a sensor. Temperature and energy usage can be examples of telemetry data.
In the case of MQTT, telemetry data shows how products are used (e.g., where, how often, with which software and hardware).
A mode that allows the user to select a color range to show relative temperature differences in a scene. The user can choose between black-and-white ranges, color ranges, or a mix between the two. The same input (measured thermal radiation) can result in different visual appearance depending on how each pixel value is mapped to a color range.
Thermal cameras detect objects using the infrared radiation (heat) emitted by all objects. Temperature calibrated thermal cameras – called thermometric cameras – can measure absolute temperatures while surveillance optimized thermal cameras show relative temperatures. All types of thermal cameras have excellent object detection capabilities regardless of light conditions – even in complete darkness.
When using thermometric guard tour the camera needs to be installed on a positioning unit to be able to move between preset positions. It then measures temperatures in predefined polygonal detection areas. It’s possible to add up to 256 presets with 10 detection areas per preset for large-scale temperature monitoring. With thermometric guard tour, you also don't have to control the camera manually every time you want to do a video tour of the premises. Instead, you can play the guard tour. You can play the guard tour on command and at scheduled times.
TPM is short for Trusted Platform Module. A TPM is a component that provides a set of cryptographic features suitable for protecting information from unauthorized access. The private key is stored in the TPM and never leaves the TPM. All cryptographic operations requiring the use of the private key are sent to the TPM to be processed. This ensures that the secret part of the certificate remains safe even in the event of a security breach.
Trusted execution environment (TEE) provides hardware-based, tamper-protected storage of private, cryptographic keys and secure execution of cryptographic operations. Unlike secure element and TPM, the TEE is a secure, hardware-isolated area of the system-on-chip’s (SoC) main processor.
Two-way audio is a feature that enables devices to transmit and receive audio either acoustically or electronically.
Universal Plug and Play is a protocol that allows Microsoft operating systems to automatically detect resources on a network.
VAPIX is a registered trademark and our own open application programming interface (API). It enables the integration of our products into a wide range of solutions and platforms.
A varifocal lens provides a wide range of focal lengths, as opposed to a lens with a fixed focal length, which only provides one.
Video management is the process of capturing, storing, and distributing videos produced by your security cameras and other surveillance devices. Video management requires a video management system where you can monitor and manage all your surveillance devices.
Video management software (VMS) is a component of a video management system. The software enables users to control and manage video streams and other hardware components. It also allows features like live-view monitoring, video recording, playback and forensics, trigger automated actions, and notifications.
A video management system (VMS) is a complete surveillance solution that integrates software and hardware (such as cameras and speakers) to manage, record, and monitor video streams from security cameras. It offers functionalities like video storage, live viewing, playback, and notifications. It may also include analytics and integration with other security systems.
Using a video surveillance system involves several activities. We refer to these activities as video operations. Video operations include tasks such as managing and controlling video surveillance systems. An example of a video operation is storing video footage for security and surveillance purposes.
An algorithm that amplifies voice content relative to other sounds with the purpose of making speech more perceptible.
VoIP is short for voice over IP. It’s a group of technologies that enables voice communication and multimedia sessions over IP networks.
Axis cameras with wide dynamic range (WDR) technology make the difference between seeing important forensic details clearly and seeing nothing but a blur in challenging light conditions. Scenes with dark and bright areas spell trouble for image usability and clarity. This contrast in lighting is referred to as a wide dynamic range or a high dynamic range. Our WDR technology is more capable of handling these difficult lighting conditions, allowing you to place your cameras more freely.
Zero trust is about not trusting anyone or anything by default. Connected devices and IT infrastructure such as networks, computers, servers, cloud services, and applications need to continually identify, validate and authenticate each other to achieve high security controls.
The Axis Zipstream technology preserves all the important forensic details in the video stream while lowering bandwidth and storage requirements by more than 50%. Zipstream includes intelligent algorithms, which ensure that relevant forensic information is identified, recorded, and sent in full resolution and frame rate.
Hazardous areas (or locations) are divided into zones or divisions, defined by the probability that hazardous substances will be present in an ignitable concentrations in the surrounding atmosphere. In Zone 1/Division 1 areas, the likelihood that the atmosphere is combustible is higher than in Zone 2/Division 2 areas, as explosive atmospheres will occur intermittently or continuously. With “Ex d” and “Ex t” protection, devices certified for Zone 1/Division 1 offer flameproof and dustproof protection (The short form of Zone 1/Division 1 is Zone 1/Div 1).
Hazardous areas (or locations) are divided into zones or divisions, defined by the probability that hazardous substances will be present in an ignitable concentrations in the surrounding atmosphere. Zone 2/Division 2 areas are less hazardous than Zone 1/Division 1 areas, in that explosive atmospheres in Zone 2/Division 2 are not likely to occur during normal operating conditions. However, once you have an explosive atmosphere in Zone 2/Division 2, it is as equally hazardous as Zone 1/Division 1 (The short form of Zone 1/Division 1 is Zone 1/Div 1).