Hopemate is a small IT service provider located in the Greater Vancouver, Canada, area that brings IT support to small businesses in its community.
- By Richard Jonker
- Dec 01, 2018
Technological advancements are resulting in trends and movements that improve the quality of life and business.
- By Abhishek Iyer
- Dec 01, 2018
It’s no secret Americans like to shop online. A marketing survey showed 40 percent of U.S. internet users made purchases several times a month in 2017.
- By Dana Pruiett
- Dec 01, 2018
After spending close to 20 years in the security industry, it is always a good exercise to see what projections came through the last year and which ones we foresee in the coming years.
- By Fredrik Nilsson
- Dec 01, 2018
Since North American Video (NAV) was founded in 1995, the systems integrator has continued to build an outstanding reputation in the physical security market.
- By Ralph C. Jensen
- Dec 01, 2018
In the dealer/integrator business, recurring monthly revenue (RMR) is like finding a gold mine with several profitable veins that can be mined. RMR is an attractive means for a secondary revenue stream.
- By Ralph C. Jensen
- Dec 01, 2018
No one will argue that the network has been one of the greatest evolutions in time. Think of it, everything that you used to do by hand, you can now do via computer. Well, almost everything.
- By Ralph C. Jensen
- Dec 01, 2018
In the professional security market, the model for revenue is changing. Systems integrators are looking for revenue beyond basic sales and maintenance—especially customer-oriented addons to generate recurring monthly revenues (RMR).
- By Bud Broomhead
- Dec 01, 2018
Thanks to wireless lock technologies, cloud-based software, and smartphone/tablet integration, it is now possible to deploy a secure, manageable, and cost-effective security solution without the need for complicated and expensive infrastructure.
- By Peter Boriskin
- Dec 01, 2018
Video surveillance has dramatically changed in recent decades. Open, IP-based network technology has largely replaced the closed, proprietary world that long dominated the security industry.
- By Jeff Whitney
- Dec 01, 2018
Before installing a networked, open-platform, VMS solution, the Port of Antwerp had a standalone DVR system with no networking capabilities and no open platform support, meaning only a limited number of camera brands were supported.
- By Courtney Dillon Pedersen
- Dec 01, 2018
When it comes to access control, it all boils down to companies trying to determine whether you are who you say you are, and whether you are authorized to access certain information. As we all know, both those are tall orders to fill.
- By Jeff Capone
- Dec 01, 2018
Radar may not be the first technology that comes to mind when discussing perimeter protection, but that is all beginning to change.
- By Gadi Bar-Ner
- Dec 01, 2018
My, how times are changing the way we do business… in the publishing industry. Without going back to the details of yesteryear, the manner in which a publication is produced has changed from cut and paste, to the digital version of today.
- By Ralph C. Jensen
- Dec 01, 2018
We live in a world where computer hacking, data breaches, identity theft, and stolen records of all sizes have become worldwide events that can happen at any time.
- By Ruben Lugo
- Dec 01, 2018
The coffee chain says hackers might have accessed customer info through a data breach.
- By Sydny Shepard
- Nov 30, 2018
Legacy endpoint prevention and protection solutions are limited when faced with advanced and sophisticated threats
- By Liviu Arsene
- Nov 30, 2018
The cameras are expected to cost about $30,000 and will be installed in about three months.
- By Sydny Shepard
- Nov 30, 2018
“The OVMC-EORH employees and medical staff have been very adaptive and supportive, and we are able to continue with quality patient care,” Ohio Valley Medical Center CEO Daniel Dunmyer said.
- By Jessica Davis
- Nov 29, 2018
Huawei, the world’s biggest producer of telecoms equipment, has faced pushback from governments due to concerns that its technology could be used for unsavory purposes such as spying.
- By Jessica Davis
- Nov 29, 2018
Here are five principles that developers should keep in mind to create more secure apps
- By Madhan Kanagavel
- Nov 29, 2018
Tips and tactics for ensuring your small business is safe from the threat of cyberattacks.
- By Michael Flavin
- Nov 28, 2018
A security hole in a mail preview program may have made the data of 60 million customers vulnerable.
- By Sydny Shepard
- Nov 28, 2018
The site of Berlin's devastating 2016 truck attach has now become a testing area for heavy security.
- By Sydny Shepard
- Nov 28, 2018
When a rider uses the app or a text to report a non-emergency security incident, the operations center alerts security staff so they can find the corresponding train and respond to the report.
- By Jessica Davis
- Nov 27, 2018
“By tying in cloud-based or network-based cameras into JSO’s larger infrastructure, it will help them investigate crimes, it will help them with a number of different capacities as it relates to where to put patrols,” Hughes said.
- By Jessica Davis
- Nov 26, 2018
The physical security equipment market will see an increase in the next few years, largely due to threats and terrorism around the world.
- By Sydny Shepard
- Nov 26, 2018