OODALOOP edj3.jpg

 

Vision

SAI’s primary goal is to provide customers with advice or solutions on how technology can be applied in security concepts in access control and community APP's and Training. SAI strongly believes in “connecting the dots”. That means that security software should be able to correlate a range of sensors to get a near real time operational picture. “What the hell is going on !” The founder of SAI has extensive experience as he was the National Projectmanager ALPR and the driving force behind the National Sensing Field-Lab of the Dutch National Police and has 46 years of experience in Law Enforcement. On request of the customer SAI will do a security scan on the case of interest and will give an advice and/or solution. Based on his knowledge of the products and relationships with multiple manufacturers.

 

 

 

  

 

OODALOOP

To explain the correlation of data and information SAI uses the OODALOOP.  OBSERVE, ORIENT, DECIDE and ACT.

Where a several number of different sensors and other dataresources (like social media or criminal records) are OBSERVING and are used as input, there must be made some sense in these data. Thats why there must be an ORIENTATION on this data. This orientation is made by Artificial Intelligence (which can also be build in into the sensors), Correlation (algorithms) and Unification of systems. In this case data will be transformed to Information and Knowledge. Decision supporting software and a "Man in the middle" will have to DECIDE (based on Business Rules)  what to do with the presented Intelligence which will result in a ACTION. The Action on its own gives new input : de LOOP.

SAI will only work with “Trusted Partners”. Partner who will be complementary to each other and not competitive to each other. From proven technology to innovation. That is why we have a deep knowledge of the products and companies involved.

Solutions can be found in a relatively simple ALPR system, CCTV system or Under Vehicle Inspection scan to a combination of multiple sensors and systems. It depends of the threat level and budget.

© 2020 Security Advice International LLC