Mines require proof of performance

SMART Mining Security Solutions 2024 Mining (Industry)

Africa and its deep connection to the continent’s mineral wealth is undeniable. It is a connection that far precedes the impact that colonialism had across the continent in the first wave of mineral and personnel exploitation. This exploitation continued for many decades, while the continent’s wealth was exported with no benefit to the local populace. Slowly, Africa began to benefit from wealth-sharing initiatives.

Some of the colonial practices, sadly, still exist in some parts of Africa, but the drive towards responsible mining practices in the majority of African states takes continuous effort and attention from security managers, IT directors, health & safety executives and compliance officers. The efforts of these teams of people mean that mining is safer than ever, and mining properties are more secure than ever. Now is the time for more efficient processes and accountability.

The relatively hostile environment and remote locations of mining establishments mean that any electronic/technical implementations have to be easily installed, require little or no maintenance and, once commissioned, require no adjustment. These challenges have seen many come, many try, and most fail, while vast sums of money have been squandered in the pursuit of effective solutions.

How do you avoid repeating past mistakes and installing expensive white elephants?

The most common approach is to ask for specific reference sites.

o This is not a very scientific approach because most reference sites cannot be proven and almost definitely cannot be inspected to see what was installed, how it was installed, and if, in fact, it works as specified and the client is happy.

Visit a trade show.

o Speak to very well-dressed and extremely knowledgeable employees who will sell you ideas with a few specifics and convince you that their way is the only way. (It is worth noting I am also one of these people.)

Request a proof of performance.

o The most reliable way to gauge the performance of the manufacturer’s proposal versus your request, thus identifying any expectation gap, is to have a small-scale installation to replicate your larger requirements and use the products and solution in a real-world environment for a period of time before evaluating the results and then making an educated purchasing decision.

You might want to try any of the above, but any combination of the three would help the decision-making process immeasurably.

The most commonly implemented applications in African mining currently involve UHF technology and vehicle-related issues. Fuel, truck loading/unloading and vehicular movement onsite. UHF is a tricky technology to get right because of its susceptibility to environmental conditions, but if installed correctly can be one of the greatest assets a mine can have onsite. Completely passive technology provides 100% reading 100% of the time. Request a proof of performance and see first hand what is possible.

For more information, contact STid, Jethro Lakin, [email protected], John Lakin, [email protected], www.stid-security.com


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

From the editor's desk: AI and events
Technews Publishing News & Events
      Welcome to the 2024 edition of the SMART Surveillance Handbook. Reading through this issue will demonstrate that AI has undoubtedly made its mark on the surveillance industry. Like ‘traditional’ video ...

Read more...
The TCO of cloud surveillance
DeepAlert Verifier Technews Publishing Surveillance Infrastructure
SMART Security Solutions asked two successful, home-grown cloud surveillance operators for their take on the benefits of cloud surveillance to the local market. Does cloud do everything, or are there areas where onsite solutions are preferable?

Read more...
Surveillance on the edge
Axis Communications SA Guardian Eye Technews Publishing Surveillance
Edge processing, a practical solution that has been available for some time, has proven its utility in various scenarios, tailored to the unique requirements of each user.

Read more...
AI developments in surveillance
DeepAlert Secutel Technologies Technews Publishing Surveillance
When AI-powered video analytics first emerged in the surveillance market, it was heralded as a game-changer, promising near-magical object recognition and identification. As always, it was oversold, but times have changed and we are close to seeing the ‘magic’ at work.

Read more...
Putting cyber into surveillance
Dallmeier Electronic Southern Africa Cathexis Technologies Technews Publishing Editor's Choice
Cybersecurity has become an essential part of the physical security industry. However, unlike other IoT technologies, of which security products are a part, surveillance technologies have more to protect.

Read more...
Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...
Leading products, trustworthy service
Mining (Industry)
First Distribution Digital Security & IoT aims to be the leading value-added distributor of IP video, advanced video analytics, high-density storage solutions, access control, fire detection, public address, IoT, and networking products in Africa.

Read more...
Key and asset management for mining
Traka Africa Mining (Industry)
Traka specialises in intelligent management solutions for keys and equipment, helping organisations control their important assets, improving productivity and accountability, and reducing risk in critical processes.

Read more...
Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Read more...