US Police Will Use Smart Patrolling

Two leading tech-based companies are collaborating in order to provide law enforcement with Smart Patrolling, the first in-car camera video system, powered by artificial intelligence.

The way smart patrolling will work is by supplementing the conventional license plate reader (LPR) technology for law enforcement vehicles. The companies, Sony and Utility Inc., will provide a cost-effective solution that can be delivered to entire fleets, rather than a handful of vehicles.

To put it simply, the Smart Patrolling feature, which is an add-on to the RocketIoT Vehicle video systems, frees officers from keying in license plate numbers and significantly minimises driver distraction.

Smart Patrolling integrates well with Utility`s cloud-based evidence management platform, AVaiL Web

The value of AI used in Smart Patrolling for a police department increases as more vehicles use the technology. With Smart Patrolling as an add-on to the RocketIoT In-Car Video System, entire departments can be outfitted with License Plate reading capabilities, as reported in prnewswire.com.  

“Smart Patrolling is a game changer for law enforcement. For many years LPR technology has been inaccessible to all but a handful of first responders. By leveraging our company’s combined capabilities in communications, software, and AI, Utility is rewriting the LPR script for our nation’s first responders with Sony,” said Ted Davis, CEO of Utility, Inc.

“Today we are announcing license plate reading as an add-on to our tremendously successful RocketIoT In-Car Video System. Soon our partner departments will be able to embed license plate meta-data into vehicle and body worn camera video automatically, notify their drivers of hot list plates, and collaborate with other departments for investigations – all through AVaiL Web.”

iHLS:

You Might Also Read:

A Breakthrough In Video Analytics

« Edward Snowden To Address Israeli Spies
New iPhone Bug Gives Anyone Access To Your Photos »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

RSA Security

RSA Security

RSA provide cybersecurity products for Threat Detection and Response, Identity and Access Management, Governance, Risk and Compliance, and Fraud Prevention.

Portnox

Portnox

In 2007, Portnox set out to create one of the world’s easiest to use, most loved, value-driven network security solutions — and our customers will tell you we’ve succeeded.

Xcitium

Xcitium

Xcitium (formerly Comodo) is and industry leading provider of state-of-the-art endpoint protection solutions. Our Zero threat platform isolates and removes all ransomware & malware infectictions.

National Cyber-Forensics & Training Alliance (NCFTA) - USA

National Cyber-Forensics & Training Alliance (NCFTA) - USA

NCFTA is a trusted alliance of private industry and law enforcement partners dedicated to information sharing and disrupting cyber-related threats.

Efecte

Efecte

Efecte is a Nordic SaaS company specialized in IT Service Management, Self-Service, Identity Management and Access Governance solutions.

BELAC

BELAC

BELAC is the national accreditation body for Belgium.

Westminster Insight - Cyber Security Conference

Westminster Insight - Cyber Security Conference

Join colleagues this December for Westminster Insight’s Cyber Security Conference, as you’ll assess how new technologies such as AI can secure your organisation against future threats.

Forum Systems

Forum Systems

Forum Systems is a global leader in API Security Management with industry-certified, patented, and proven products deployed in the most rigorous and demanding customer environments.

M2MD Technologies

M2MD Technologies

M2MD Technologies offers solutions optimized for cellular IoT that provide stronger security, reduced costs, enhanced user experience, and ultimately generates higher returns for stakeholders.

Cybertronium

Cybertronium

Cybertronium is a leader in managing cyber risk. We bring you the latest from the complex, ever-evolving online threat environment with the insights to inspire and the expertise to act.

Ministry of Electronics & Information Technology (MeitY)

Ministry of Electronics & Information Technology (MeitY)

The Ministry of Electronics & Information Technology is an executive agency responsible for IT policy, strategy and development of the electronics industry.

Metabase Q

Metabase Q

Metabase Q protects you from financial and reputational losses with more efficient and intelligent cybersecurity, using the best worldwide in technologies, processes and specialists.

TIM Enterprise

TIM Enterprise

TIM Enterprise offers innovative, sustainable and secure 360-degree digital solutions to companies and public administrations.

Amnet Technology Solutions (Amnet Systems)

Amnet Technology Solutions (Amnet Systems)

Amnet Systems is a technology services organization that provides Managed IT, Cloud Computing, Cyber Security, Data Center and Audio Visual services since 1995.

XeneX

XeneX

XeneX Cloud Security Services address enterprise-class security challenges by enabling DevOps and Security teams to access a shared source of truth.

Cytracom

Cytracom

Cytracom delivers powerful yet intuitive solutions that enable MSPs and ITSPs to meet the challenges of security, compliance, and connectivity.