|By Business Wire||
|May 27, 2014 06:00 AM EDT||
Eagle Eye Networks, Inc., provider of a cloud managed, on-demand security and operations video management system, today announced the Eagle Eye Video API, targeted at businesses and developers integrating video into their applications. The Eagle Eye Video API provides a robust set of storage, analytics, indexing, and interfaces for quickly building or integrating applications with both live and recorded video; the applications can range from very simple or highly complex.
Eagle Eye Video API opens New Frontiers in Video Applications (Photo: Business Wire)
The video surveillance market is expected to grow at a compound annual growth rate (CAGR) of 19.1% through 2019, reaching more than $42 billion, according to Transparency Market Research.
It’s been estimated that less than 1% of this video is ever used. Due to the extraordinary volume and variety of data, the video has been hard to access, and difficult to search and manipulate. As a result, the number of applications built utilizing surveillance video has been modest.
“Streaming video from cameras is an under-utilized resource,” said Dean Drako, President and CEO of Eagle Eye Networks. “The Eagle Eye Video API dramatically changes this, allowing developers to fully harness video content in their applications without having to worry about a complex infrastructure, in the same way that Twilio allows them to easily incorporate voice, VoIP and SMS.”
Cloud-based API eliminates high infrastructure burden of traditional Video System Integrations
Traditional video management system integrations require developers and integrators to purchase and install servers, storage, and software, plus hire staff to assemble and maintain the infrastructure before they can begin development.
The cloud Eagle Eye Video API, accessed through a simple-to-use RESTful Application Programming Interface (API), completely eliminates this overhead. Its RESTful API approach is easy to use, scalable, secure, reliable, and redundant.
The Eagle Eye Video API can be used for integration, analysis, big data research, and development of new applications. Eagle Eye does the heavy lifting of capturing, storing, and indexing the video and events.
The platform uses the Eagle Eye Big Data Video Framework™, with time based data structures for indexing, search, retrieval and analysis of the video. It then offers API access to integrate alerts, user interfaces, applications, and analysis ranging from simple searches to Big Data analytics.
The Eagle Eye Video API Features
“Cloud-based APIs have reinvigorated innovation across multiple industries,” said Dean Drako. “Eagle Eye’s Video API brings this technology to video surveillance cameras, enabling developers to create and deliver scalable innovations faster and with far fewer resources. This opens up tremendous opportunities in this high growth market. ”
Eagle Eye’s unmatched features, unparalleled security, scalability, and rapid on-demand deployment give a time-to-market advantage in delivering applications. Some of the functionality available:
1. Streaming live video
2. Recording and storage of continuous video
3. Time Lapse video creation
4. Video format conversion (for different devices)
5. Notification and alert engine
6. Real time Analytics
7. Post-processing Big Data Analytics
8. Seamless integration with thousands of camera models – both IP and analog
9. On-site buffering for when the internet goes down or bandwidth is limited
10. Redundant and scalable storage
Unlimited New Applications for Underutilized Cameras
70% of the traffic on the Internet is video, but almost none of that is from surveillance cameras. With the Eagle Eye Video API, existing security cameras can be transformed into intelligent tools for sales, marketing, business operations improvement and planning, social media, and more.
Developers, integrators and businesses can search, modify, tag, play, share, and stream the video in their apps with a few lines of code. They can leverage existing cameras, build new video surveillance systems, create video alerting applications, improve traditional integrations of Point-of-Sale and Access Control systems, and much more.
Some examples of what developers, resellers and end users can quickly build with the Eagle Eye Video API platform are:
- Customer service improvements
- Employee Training systems
- Embedded video for mobile or web applications
- Command and control system integration
- Long term storage and sharing of video events
- Alert and notification systems with video or images
- Access control systems with video
- Animal and environment monitoring
- Automated cash register monitoring
- Automated video correction and editing
- Traffic pattern analysis (people, cars, animals)
- Advertising optimization based on viewers
- Demographic identification and response
- Virtual doorman services
For more information on the Eagle Eye Video API, click here.
Pricing and Availability
The Eagle Eye Video API is available immediately. There is no additional charge to use the API. Subscriptions for the Eagle Eye Security Camera VMS start at $4.99 per camera per month.
About Eagle Eye Networks
Eagle Eye delivers the first on-demand cloud based security and operations video management system (VMS) providing both cloud and on-premise recording, in conjunction with a cloud video API. Eagle Eye offers secure, encrypted recording, camera management, mobile viewing and alerts - all from a 100% cloud managed platform. The Eagle Eye Security Camera Video Management System supports a broad array of IP and analog cameras uses Intelligent Bandwidth Management™, making it easy to deploy at single and multiple sites. The API platform uses the Eagle Eye Big Data Video Framework™, with time based data structures used for indexing, search, retrieval and analysis of the live and archived video. Eagle Eye Networks sells through authorized reseller and installation partners. The headquarters is at 411 Brazos St, Suite 101, Austin, TX. For more information please visit www.eagleeyenetworks.com or call +1-512-473-0500.
Countless business models have spawned from the IaaS industry – resell Web hosting, blogs, public cloud, and on and on. With the overwhelming amount of tools available to us, it's sometimes easy to overlook that many of them are just new skins of resources we've had for a long time. In his general session at 17th Cloud Expo, Harold Hannon, Sr. Software Architect at SoftLayer, an IBM Company, broke down what we have to work with, discussed the benefits and pitfalls and how we can best use them ...
Dec. 1, 2015 10:45 AM EST Reads: 119
In demand-intensive mobile and web applications, an emerging pattern is to host the Systems of Engagement in the cloud (for maximum responsiveness) but keep the Systems of Record with the other important business systems in the company datacenter, often on a tightly secured mainframe. But what about the space in between? In this IBM Redpaper publication, we show that the IBM Bluemix cloud platform offers technologies that make it easy for cloud-based SoEs to securely connect to on-premises IBM...
Dec. 1, 2015 10:19 AM EST
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true ...
Dec. 1, 2015 10:00 AM EST Reads: 576
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem"...
Dec. 1, 2015 09:00 AM EST Reads: 481
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Dec. 1, 2015 08:00 AM EST Reads: 395
Container technology is shaping the future of DevOps and it’s also changing the way organizations think about application development. With the rise of mobile applications in the enterprise, businesses are abandoning year-long development cycles and embracing technologies that enable rapid development and continuous deployment of apps. In his session at DevOps Summit, Kurt Collins, Developer Evangelist at Built.io, examined how Docker has evolved into a highly effective tool for application del...
Dec. 1, 2015 08:00 AM EST Reads: 397
We all know that data growth is exploding and storage budgets are shrinking. Instead of showing you charts on about how much data there is, in his General Session at 17th Cloud Expo, Scott Cleland, Senior Director of Product Marketing at HGST, showed how to capture all of your data in one place. After you have your data under control, you can then analyze it in one place, saving time and resources.
Dec. 1, 2015 08:00 AM EST Reads: 251
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound...
Dec. 1, 2015 06:30 AM EST Reads: 515
As organizations shift towards IT-as-a-service models, the need for managing & protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection & E-Discovery of your data - whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise.
Dec. 1, 2015 06:00 AM EST Reads: 272
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, San...
Dec. 1, 2015 05:00 AM EST Reads: 622
PubNub has announced the release of BLOCKS, a set of customizable microservices that give developers a simple way to add code and deploy features for realtime apps.PubNub BLOCKS executes business logic directly on the data streaming through PubNub’s network without splitting it off to an intermediary server controlled by the customer. This revolutionary approach streamlines app development, reduces endpoint-to-endpoint latency, and allows apps to better leverage the enormous scalability of PubNu...
Dec. 1, 2015 05:00 AM EST Reads: 359
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Ben Perlmutter, a Sales Engineer with IBM Cloudant, demonstrated techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, faster user e...
Dec. 1, 2015 04:45 AM EST Reads: 458
SYS-CON Events announced today that Catchpoint, a global leader in monitoring, and testing the performance of online applications, has been named "Silver Sponsor" of DevOps Summit New York, which will take place on June 7-9, 2016 at the Javits Center in New York City. Catchpoint radically transforms the way businesses manage, monitor, and test the performance of online applications. Truly understand and improve user experience with clear visibility into complex, distributed online systems.Founde...
Dec. 1, 2015 04:15 AM EST
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace. Traditional approaches for driving innovation are now woefully inadequate for keeping up with the breadth of disruption and change facin...
Dec. 1, 2015 03:30 AM EST Reads: 533
The revocation of Safe Harbor has radically affected data sovereignty strategy in the cloud. In his session at 17th Cloud Expo, Jeff Miller, Product Management at Cavirin Systems, discussed how to assess these changes across your own cloud strategy, and how you can mitigate risks previously covered under the agreement.
Dec. 1, 2015 03:00 AM EST Reads: 113