Stemmed from IT industry, user's experience of IT industry refers to the attention to the using habit and personal emotion when using the products, which is rarely valued in security industry. Since the thresholds for the technology have been brought down, nearly all the products are able to meet the basic standard, thus the decisive factor for purchasing will be a good user's experience.
The tremendous development of technology pushes security from simple imitations to further exploitation. For seeking the continuous growth, what should the manufacturers do since they are no more just copycats. Readers may draw some lessons from the words of Ann Wu, Vice President of Sunell, who made a speech about the combination of art and technology in 2012 CEO Forum.
Since the hardware is reaching maturity, especially the development of chip and hardware, this would reduce the phenomenon of monopoly. Most of the manufacturers equally match in the hardware, so the next step for security players is to make the detailed exploitation to optimize the software structure. With the rise of the mobile platform, the connection between security and IT will beyond doubt be increased. In the light of the strong demand and talented personnel of IP, it's reasonable to introduce some concepts of IT in order to pave the way for security.
Inevitably, the manufactures tend to demand all kinds of function exploitation, the overall structure and integration could be ignored by simply meeting the market niche. It seems to have satisfied the needs of end-users within a short period of time, but the inconsistence will become a hidden trouble in the long-term development.
Going Deep into User's Experience
Stemmed from IT industry, the concept of IT industry refers to the attention to the using habit and personal emotion when using the products, which is rarely valued in security industry. Since the thresholds for the technology have been brought down, nearly all the products are able to meet the basic standard, thus the decisive factor for purchasing will be a good user's experience.
Designers must stand in user's shoes for enhancing the user's experience. As some operation systems of computers like DOS, Windows, Linux, UNIX, every system can satisfy the technical demands from users, it depends on which one can take better care of the user's habit.
Introduction of Fashion
Most of the security companies are designing their product with an ordinary standard, They seldom pay attention to the outward appearance or how to make the product more fashionable. Though the aesthetic feeling seems to be profound for user's experience, the ultimate purpose is to achieve a pleasing life.
It is believed that the exterior design of security products will become an important factor for the end-users to choose or not, that is similar to the mobile phone industry, taking all functions into consideration, the fashionable iphone is the winner.
For an organic industry chain, each part plays its role to form an alliance that draws on collective wisdom and absorb all useful ideas; as a result, the end-users can gain the more valuable product and service.
In cooperating with different partners, more attention is put on the open software platform. There are many platforms in China developed by domestic manufacturers which can only be linked to their own video camera and NVR in order to promote the brand. Nevertheless, it's beneficial for the expansion of the company as well as the long-term development of security industry.
From 2010 until now, an evident trend of security industry is the constant merger between different companies, from the point of capital operation, it's a commercial mode and natural process.
However, the business philosophy and culture should be taken into account, especially the compatibility of R&D. For the company concept, more precisely, is fostered step by step, unlike a product, which can be made by assembly line. The compatibility, It is similar to the interpersonal relationship to some degree, long-term benefit can be produced only when two different culture fit together in a coherent framework.
From a whole, security industry is relatively closed; some new technology has been applied in IT industry for a couple of years. When surveillance steps into IP, more IT personnel begin to form an increasingly closer relationship with security. The deep user experience and some fashion concepts will be the irreversible trend of the future development of security.