Enterprises big and small share goals when it comes to security. When it makes business sense, they want to leverage what exists; speed up the delivery of more accurate information to the appropriate decision maker; improve a process that’s essential to the organization; piggyback one solution to help solve sometimes unrelated others; and save time or money or both.
Daniel Gohl, principal at McKinley Technology High School in Washington, D.C., knows better than some boardroom-oriented CEOs that – when there’s an incident – wasted time can cause exponential harm.
Leverage existing tech
Gohl’s assignment: Leverage the school’s existing technology to improve student services by increasing his faculty’s access to student information such as emergency contacts and medical records as well as grades and schedules.His solution was in the hands of his staff – WiFi-enabled PDAs. Mobility was the overriding key. Before the improvements, “We were able to access student information only on desktop systems, which isn’t helpful to school personnel monitoring school grounds.”
To meet his business needs, Gohl saw value in the two “Ms” – middleware and mobile technology – to deliver secure, wireless data to school administrators. In an instant, they can access emergency and truancy information and other critical student information wherever and whenever they need it. It’s a solution being shared by more and more corporations and government agencies, where the chief security officer can pull up access and security video from a laptop or where an officer at an outdoor entrance can check IDs by pulling up a person’s database info and even her portrait on a sophisticated, wireless device. Next generation Web-based access control systems now allow first responders to go online to determine not only the number of people in an impacted building or floor but also more detailed information on each one.
More security executives, often working more closely with their IT colleagues, are also bringing in middleware or what some call enabling technology to bridge existing computer and communications infrastructure to do better or more or faster or all of these outcomes. Middleware comes from sources not usually found in the traditional security market or are brought into a design thanks to a systems integrator.
The charm of middleware
For McKinley’s Gohl, “Now we have an application (Mobile Guardian from Defywire, Herndon, Va.) that roams wherever our personnel and students are. This has greatly enhanced our ability to secure the school and significantly cuts down on staff hours spent completing paperwork associated with disciplinary incidents.”The real-time nature of such incident reporting applications creates accurate, uniform and instantaneous documentation of incidents. To me, it also sounds like guard tour systems on steroids.
And just like those early guard tour systems, Gohl aims to expand uses for his mobile devices. His future plans include adding teachers to the user base and using sophisticated wireless technology to evaluate teachers and provide instant feedback at the end of the class.