Security 400

Loading
loading...
"What are you afraid of losing, when nothing in the world actually belongs to you." -- Marcus Aurelius

Security 400

June 12, 2024
mike@standardsmichigan.com
No Comments

 

“We worry about what a child will become tomorrow,

yet we forget that he is someone today.”

– Stacia Tauscher

 

Today we run a status check on the stream of technical and management standards evolving to assure the highest possible level of security in education communities.  The literature expands significantly from an assortment of national standards-setting bodies, trade associations, ad hoc consortia and open source standards developers.  CLICK HERE for a sample of our work in this domain.

School security is big business in the United States.   According to a report by Markets and Markets, the global school and campus security market size was valued at USD 14.0 billion in 2019 and is projected to reach USD 21.7 billion by 2025, at a combined annual growth rate of 7.2% during the forecast period.  Another report by Research And Markets estimates that the US school security market will grow at a compound annual growth rate of around 8% between 2020 and 2025, driven by factors such as increasing incidents of school violence, rising demand for access control and surveillance systems, and increasing government funding for school safety initiatives.

Because the pace of the combined annual growth rate of the school and campus security market is greater than the growth rate of the education “industry” itself, we’ve necessarily had to break down our approach to this topic into modules:

Security 100.   A survey of all the technical and management codes and standards for all educational settings — day care, K-12, higher education and university affiliated healthcare occupancies.

Security 200.   Queries into the most recent public consultations on the components and interoperability* of supporting technologies

Video surveillance: indoor and outdoor cameras, cameras with night vision and motion detection capabilities and cameras that can be integrated with other security systems for enhanced monitoring and control.

Access control: doors, remote locking, privacy and considerations for persons with disabilities.

Panic alarms: These devices allow staff and students to quickly and discreetly alert authorities in case of an emergency.

Metal detectors: These devices scan for weapons and other prohibited items as people enter the school.

Mass notification systems: These systems allow school administrators to quickly send emergency alerts and notifications to students, staff, and parents.

Intrusion detection systems: These systems use sensors to detect unauthorized entry and trigger an alarm.

GPS tracking systems: These systems allow school officials to monitor the location of school buses and track the movements of students during field trips and other off-campus activities.

Security 300.  Regulatory and management codes and standards; a great deal of which are self-referencing.

Security 400.  Advanced Topics.  NFPA 731 Standard for the Installation of Premises Security Systems

As always, we reckon first cost and long-term maintenance cost, including software maintenance for the information and communication technologies (i.e. anything with wires) installed in the United States.  Cybersecurity is outside our wheelhouse and beyond our expertise.  In order to do any of the foregoing reasonably well, we have to leave cybersecurity standards to others.

Inside The Safest School In America

Bob Hope Primary School Kadena Air Base

 


Education Community Safety catalog is one of the fast-growing catalogs of best practice literature.  In developing district security plans, K-12 school leaders stress that school safety is a cross-functional responsibility and every individual’s participation drives the success of overall safety protocols.  We link a small sample below and update ahead of every Security colloquium.

Artificial Intelligence Tries (and Fails) to Detect Weapons in School

Could AI be the future of preventing school shootings?

Executive Order 13929 of June 16, 2020 Safe Policing for Safe Communities

Clery Act

National Center for Education Statistics: School Safety and Security Measures

International Code Council

2021 International Building Code

Section 1010.1.9.4 Locks and latches

Section 1010.2.13 Delayed egress.

Section 1010.2.14 Controlled egress doors in Groups I-1 and I-2.

Free Access: NFPA 72 National Fire Alarm and Signaling Code

Free Access: NFPA 731 Standard for the Installation of Premises Security Systems

IEEE: Design and Implementation of Campus Security System Based on Internet of Things

APCO/NENA 2.105 Emergency Incident Data Document 

C-TECC Tactical Emergency Casualty Care Guidelines

Department of Transportation Emergency Response Guidebook 2016

NENA-STA-004.1-2014 Next Generation United States Civic Location Data Exchange Format

Example Emergency Management and Disaster Preparedness Plan (Tougaloo College,  Jackson, Mississippi)

Partner Alliance for Safer Schools

Federal Bureau of Investigation Academia Program

Most Dangerous Universities in America

Federal Bureau of Investigation: Uniform Crime Reporting Program

ICYMI: Guide to Campus Security


* Interoperability refers to the ability of different technologies or systems to communicate and work together seamlessly. In the context of school security technologies, interoperability can help improve the effectiveness of security systems and make it easier for school personnel to manage and respond to potential security threats.  Here’s what we look for:

  1. Standardization: By standardizing communication protocols and data formats, school security technologies can be made more compatible with each other, making it easier for different systems to communicate and share information.
  2. Integration: School security technologies can be integrated with each other to provide a more comprehensive security solution. For example, access control systems can be integrated with video surveillance systems to automatically trigger alerts when an unauthorized person enters a restricted area.
  3. Open Architecture: Open architecture solutions enable different security systems to be connected and communicate with each other regardless of their manufacturer or supplier. This approach makes it easier to integrate different technologies and avoid vendor lock-in.
  4. Cloud-based Solutions: Cloud-based security solutions can enable interoperability by providing a centralized platform for managing and monitoring different security systems. This approach can also simplify the deployment of security technologies across multiple locations.
  5. Collaboration: School security technology providers can work together to develop interoperability standards and best practices that can be adopted across the industry. Collaboration can help drive innovation and improve the effectiveness of security systems.

 

 

 

Certified Broadcast Meteorologist

June 11, 2024
mike@standardsmichigan.com
No Comments

This content is accessible to paid subscribers. To view it please enter your password below or send mike@standardsmichigan.com a request for subscription details.

Quantum Computing

June 11, 2024
mike@standardsmichigan.com
,
No Comments

Is it a fact—or have I dreamed it—that, by means of electricity,

the world of matter has become a great nerve,

vibrating thousands of miles in a breathless point of time?

Nathaniel Hawthorne, 1851 | The House of Seven Gables

 

Universitat de Barcelona

Today we break form from our normal custom of assessing conceptual movement in stabilized safety and sustainability standards for education settlements and, instead, venture into a domain that will inform nearly everything we do; and with gathering pace.

We begin with the action among the experts in the organizations listed below:

  1. National Institute of Standards and Technology (NIST):
    • NIST’s Post-Quantum Cryptography Standardization: NIST is working on standardizing cryptographic algorithms that are secure against quantum attacks. The goal is to ensure that data remains secure even with the advent of quantum computers. This involves selecting algorithms through an open competition, which began in 2016, and is still ongoing.
    • Quantum Information Program: NIST conducts research and develops standards related to quantum information science, including quantum computing, quantum communication, and quantum metrology.
  2. Quantum Economic Development Consortium (QED-C):
    • Formed as part of the National Quantum Initiative Act, QED-C aims to enable and grow the quantum industry in the U.S. It involves various stakeholders, including industry, academic institutions, and government agencies, working together to identify and address standards and other needs to foster a robust quantum ecosystem.
  3. National Quantum Initiative (NQI):
    • Established by the National Quantum Initiative Act in 2018, NQI coordinates efforts across multiple agencies, including NIST, the Department of Energy (DOE), and the National Science Foundation (NSF), to advance quantum information science. This includes the development of standards, infrastructure, and research to support quantum technologies.
  4. International Standards:
    • While primarily international, organizations like the International Telecommunication Union (ITU) and the International Organization for Standardization (ISO) have working groups focusing on quantum technologies. U.S. participation in these groups helps ensure that global standards align with U.S. interests and priorities.
  5. Federal Agencies and Research Programs:
    • The DOE, NSF, and other federal agencies fund research and development in quantum computing, which often includes aspects related to standards and best practices. For example, the DOE’s Quantum Information Science (QIS) Research Centers and NSF’s Quantum Leap Challenge Institutes.
  6. Industry-Led Initiatives:
    • Several industry consortia and companies are actively involved in developing quantum computing standards. Organizations like the IEEE have working groups focused on quantum computing and quantum communications standards.

Overall, the U.S. approach to quantum computing standards is multifaceted, involving federal agencies, industry consortia, academic research, and participation in international standard-setting bodies.

Andrej Karpathy (Stanford, OpenAI): Introduction to Large Language Models

Evensong “Sonata for Arpeggione and Piano” (Franz Schubert)

June 9, 2024
mike@standardsmichigan.com
,
No Comments


Evensong is a traditional Anglican choral service that takes place in the late afternoon or early evening, typically around sunset. It is also known as Evening Prayer or Vespers.

The service consists of a series of prayers, psalms, canticles, and readings from the Bible, which are sung or chanted by a choir in four-part harmony. The choral music often features elaborate harmonies and complex counterpoint, and is usually accompanied by an organ or other instruments.

Evensong has been an important part of the British choral tradition for centuries, and is still performed in many Anglican churches throughout the UK and beyond. The tradition is particularly strong in Oxford and Cambridge, where the famous college choirs perform regular Evensong services that are open to the public.

The origins of Evensong can be traced back to the monastic offices of the Middle Ages, when monks would gather in the evening to sing the psalms and other prayers. Over time, these services evolved into more elaborate and musically sophisticated forms, which were eventually adopted by the Anglican Church and other Protestant denominations.

Today, Evensong is appreciated for its beauty and spiritual depth, as well as its contribution to the rich heritage of British choral music.

Abiit sed non oblitus | Wisconsin

June 9, 2024
mike@standardsmichigan.com
, ,
No Comments

A message from Stritch President Dr. Dan Scholz

“Saint Francis with the Animals” 17th Century / Lambert de Hondt

Standards Wisconsin

Coffee or Tea?

June 8, 2024
mike@standardsmichigan.com

No Comments

This content is accessible to paid subscribers. To view it please enter your password below or send mike@standardsmichigan.com a request for subscription details.

Coffee Lab

June 8, 2024
mike@standardsmichigan.com

No Comments

This content is accessible to paid subscribers. To view it please enter your password below or send mike@standardsmichigan.com a request for subscription details.

How The States Got Their Abbreviations

June 7, 2024
mike@standardsmichigan.com
,
No Comments

This content is accessible to paid subscribers. To view it please enter your password below or send mike@standardsmichigan.com a request for subscription details.

Rooibos Tea

June 7, 2024
mike@standardsmichigan.com
, , , , ,
No Comments

Rooibos tea, also known as red bush tea, is a popular herbal tea that is native to South Africa. It is made from the leaves of the Aspalathus linearis plant, which is found only in the Western Cape region of South Africa.

The plant grows in a microclimate where it is exposed to a combination of hot, dry summers and cold, wet winters, which gives it its distinctive flavor and aroma.  It is used in cooking and baking, and can be found in a variety of products, including desserts, skincare products, and even beer.

EU protection for Rooibos tea is good news for South African agriculture

Tea

Layout mode
Predefined Skins
Custom Colors
Choose your skin color
Patterns Background
Images Background
error: Content is protected !!
Skip to content