August 31, 2020 By Jeffrey Palmer < 1 min read

Wearing face masks is a crucial new norm that today’s consumers and workers are getting used to.

We know face masks can substantially reduce the transmission of aerosol-borne viruses, but sometimes people forget to wear them properly (or at all).

For a safe return to work, it’s critical that businesses can determine whether an individual is wearing a face mask.

Real-time, AI-based video analytics at edge devices like optical cameras help you detect whether an individual is wearing their face mask properly. Doing so also provides assurance that your business can conform to relevant health guidelines.

See how edge computing is used to analyze face mask usage without jeopardizing the identity of anyone in the image:

Explore other use cases

Here’s how it works

IBM Edge Application Manager places analytical workloads with edge-enabled cameras that can recognize face masks and determine if they’re being worn effectively—all without compromising the identity or security of anyone in the image to the analytics platform.

Since analysis is performed at the camera, the video data and individual privacy are protected. You avoid the expense of transmitting, storing, or analyzing that image data any further.

Alerts are sent every time the camera detects an improperly worn or non-existent face mask. Then, it sends the aggregated data back to the IBM Maximo Worker Insights platform, allowing you to highlight face-mask activity in your facilities.

Edge-enabled technology like this helps you protect your workers and customers as you safely rejuvenate your business.

Ready to learn more? Find out how IBM help you act on insights closer to the source of data, and accelerate your safe return to work.

Was this article helpful?

More from Cloud

Enhance your data security posture with a no-code approach to application-level encryption

4 min read - Data is the lifeblood of every organization. As your organization’s data footprint expands across the clouds and between your own business lines to drive value, it is essential to secure data at all stages of the cloud adoption and throughout the data lifecycle. While there are different mechanisms available to encrypt data throughout its lifecycle (in transit, at rest and in use), application-level encryption (ALE) provides an additional layer of protection by encrypting data at its source. ALE can enhance…

Attention new clients: exciting financial incentives for VMware Cloud Foundation on IBM Cloud

4 min read - New client specials: Get up to 50% off when you commit to a 1- or 3-year term contract on new VCF-as-a-Service offerings, plus an additional value of up to USD 200K in credits through 30 June 2025 when you migrate your VMware workloads to IBM Cloud®.1 Low starting prices: On-demand VCF-as-a-Service deployments begin under USD 200 per month.2 The IBM Cloud benefit: See the potential for a 201%3 return on investment (ROI) over 3 years with reduced downtime, cost and…

The history of the central processing unit (CPU)

10 min read - The central processing unit (CPU) is the computer’s brain. It handles the assignment and processing of tasks, in addition to functions that make a computer run. There’s no way to overstate the importance of the CPU to computing. Virtually all computer systems contain, at the least, some type of basic CPU. Regardless of whether they’re used in personal computers (PCs), laptops, tablets, smartphones or even in supercomputers whose output is so strong it must be measured in floating-point operations per…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters