Using intelligent technology to manage growth.
Seneca, a leading custom computer and appliance manufacturer providing optimized, certified, and guaranteed solutions for the digital security and surveillance (DSS) market, today announces an integrated solution combining the Seneca xVault xNVR100 (Network Video Recorder) and OnSSI ’s flagship Ocularis PS VMS software. This solution highlights the ongoing effort between the two companies to simplify and accelerate the adoption of IP video surveillance.
New unit provides superior image quality and Megapixel technology.
Allows systems integrators, specifiers and consultants to achieve interoperability between clients and devices of PACS and network-based video systems.
Part of company's lean-forward strategy to broaden its global presence.
Sales representation will cover entire Latin American territory with open platform video management software.
Is this a violation of our Second Amendment right or is this responsible gun selling/ownership at it's best?
- By Ginger Hill
- Mar 06, 2014
Homeland Security Presidential Directive 12 (HSPD-12) called for the mandatory implementation of a government-wide standard for secure and reliable forms of identification for federal employees and contractors.
- By Ginger Hill
- Mar 05, 2014
Atchison Frazer, CMO for KEMP Technologies, talks hackers and other security attacks being a source of server downtime and how you can use ADCs to protect your network(s.)
- By Atchison Frazer
- Mar 05, 2014
New hosted license plate recognition solution eliminates the need for dedicated IT infrastructure and minimizes deployment and maintenance costs.
Studies find lower-frequency sounders to be more effective at waking sleeping individuals.
To accommodate record sales growth in the past several years, Boon Edam Inc. is proud to announce an increased presence of a larger exhibit space this year at the ISC West International Security Conference and Exhibition in Las Vegas, NV, on April 2nd - 4th.
Why every company, no matter how big or small, needs to have an emergency response plan in place specifically for cyber attacks.
- By Ginger Hill
- Mar 04, 2014
When Barbara Morgan settles into her classroom, she has a
room full of teaching aides and equipment that keeps installers,
end users and dealers focused on the topic of the day. Her
message to her students is quite simple.
- By Ralph C. Jensen
- Mar 04, 2014
When the IP camera was introduced to the physical security industry in the mid-1990s, the move from analog to digital was set in motion. Adoption of this technology began slowly but has steadily gained momentum.
- By Michael Leary
- Mar 04, 2014
Training is an essential priority for any security dealer or integrator seeking to enter the fire alarm market, while continuing education is important for dealers who already install fire alarms systems.
- By Beth Welch
- Mar 04, 2014
Training is the life blood of any successful organization. Training employees on how to do their jobs better is one thing, but training dealers and integrators on how to use and incorporate security products is another.
- By Ralph C. Jensen
- Mar 04, 2014
Dealers just need to remember one thing: Security— the promise to help protect customers’ lives and property—must remain at the core of their business.
- By Rob Phillips
- Mar 04, 2014
When a security integrator begins deciding which manufacturer to use for an installation, a myriad of key elements come into play. Does the manufacturer have easy-to-use online training?
- By Jamie Friedlander
- Mar 04, 2014
“Digital Watchdog is the perfect complement for ISD.” said Ian Johnston, CEO of Innovative Security Designs, Inc.
Greater efficiency provided by accommodating multiple cameras over a single coax or Ethernet cable.
- By Ronnie Pennington
- Mar 03, 2014
Each year in Lansing, Mich., the holiday season unofficially begins with the Silver Bells Parade. On Nov. 22, 2013, approximately 80,000 people crowded this city’s streets to see the parade that ends in front of the Michigan State Capitol building with a traditional tree lighting ceremony.
- By Ralph C. Jensen
- Mar 01, 2014
To say I’m sold on biometrics for athletic clubs after using the Hand- Key since 1995 is an understatement. Back then, we were remodeling our check-in area. While doing so, we decided to re-evaluate our check-in software.
- By Don Helander
- Mar 01, 2014
Back in the day, students were taught how to protect themselves from fire and the unimaginable nuclear attack.
- By Ralph C. Jensen
- Mar 01, 2014
Water is one of Arizona’s most precious resources, and the Colorado River satisfies much of this demand via the 336-mile-long Central Arizona Project (CAP) aqueduct that annually delivers approximately 1.6 million acre-feet of Colorado River water to cities, Indian Tribes and farms in central and southern Arizona.
- By Fred C. Bauer
- Mar 01, 2014
We live in a very different world today—one of risks and fast changes—and looking ahead, such changes and risks will only continue. I call it “the new normal,” since this is expected to be the basis going forward.
- By Lars Thinggaard
- Mar 01, 2014
We live in a world full of information as data is being collected each day because the demand is higher than ever before. Consumers want faster access to online data to make quicker, more informed decisions regarding everything from nearby restaurants to the highest-rated tablets.
- By Mike Scirica
- Mar 01, 2014
On March 10, 2007, three-day-old Mychael Darthard-Dawodu disappeared from her mother’s hospital room in the maternity ward of Covenant Medical Center in Lubbock, Texas. Even though the infant had been fitted with a state-of-the-art security bracelet around her ankle, the woman who abducted her simply snipped through the device and carried the five-pound bundle-of-joy out of the facility in her purse.
It’s 2014 and time for a new way of thinking when it comes to security. It’s kind of like our five senses; we have each one for a reason, and they are all equally valuable.
- By Richard Brent
- Mar 01, 2014
Security is no longer chained to a desktop, and breaking these chains has changed the face of remote monitoring. It used to be that remote monitoring meant keeping an eye on things from a central station, like a corporate security command center or even a thirdparty monitoring service.
- By Steve Surfaro
- Mar 01, 2014