Recently, the county implemented an initiative to migrate toward one centralized system for all security, including access control, biometrics and surveillance on its three populated islands, excluding Kahoolawe, which does not have any residents or county buildings.
- By Steve Carney
- May 01, 2013
Located in the heart of Hollywood, Calif., The Ricardo Montalbán Foundation Theatre, named after the late actor and performing arts patron, is a venue for diverse cultural events.
- By Ralph C. Jensen
- May 01, 2013
As network security professionals are acutely aware, they must be continuously vigilant to meet the ever-evolving threats driven by the bring your own device (BYOD) trend that is extending the network outside the office.
- By Michael Harris
- May 01, 2013
Whether traveling, working from home, in flex offices or a conference room at a home office, we expect information access to be immediate and communication via voice, chat, text or email to be always available.
- By Peter Cattaneo
- May 01, 2013
A few years ago, someone sent me a little knife that, when you push a lever, the blade flies from inside the stock. It is a wicked little weapon that I had put away and forgot about. I found it during my annual office spring cleaning.
- By Ralph C. Jensen
- May 01, 2013
Multiple factors of authentication, including biometrics, can increase the probability that a person presenting a card to a reader is the same person who was initially issued the card.
- By Dave Adams
- May 01, 2013
When I was growing up, one of my favorite comic book characters was Dick Tracy—not the Warren Beatty variety— but the heroic police detective of Sunday newspaper comic strips.
- By Frank Defina
- May 01, 2013
The transition of existing physical security systems, such as fire and burglar alarm or video surveillance systems, to the next generation of technology has never been easier or more affordable than it is today.
- By Jim McLaughlin
- May 01, 2013
When the first network camera was introduced in 1996, its functionality was pretty bare bones: digitize images and send them across the network to a centralized video management system.
- By Robert Muehlbauer
- May 01, 2013
Joint national program opens doors for integrators to tap vertical markets by deploying custom-tailored HD video surveillance systems transmitted via Verizon Wireless.
Less than a year ago, Apple, Inc. whipped out and handed over $356 million to purchase AuthenTec, Inc., a fingerprint sensor technology developer with the technology to embed a fingerprint scanner into the glass of the iPhone (and, iPad for that matter), making it one of the very few public companies acquired by Apple.
- By Ginger Hill
- Apr 30, 2013
Fastlane Glassgate 200 Optical Turnstiles selected after successful Fastlane operation for years in previous headquarters.
The Situator implementation will help DIA better manage its critical security systems and enhance responses to emergencies and other events.
HID Global’s focus areas of use for new applications include authentication of items, secure data management and trusted authorizations.
The ER-148 is an EIA compliant, 19-inch, steel-constructed, equipment rack with a rail height of 48 inches and 27 available rack spaces; the ER-148-4PKIT expands the 2-post rack to a 4-post rack.
Gone are the days when you can simply allow your child to walk to school, play outside in the yard alone or even now, leave them in the “safety” of their own home.
- By Ginger Hill
- Apr 30, 2013
Global initiative aims to increase focus in specific business sectors.
Technology advancements meant that the equipment consumers bought became unsupported too soon by manufacturers.
Mobile banking has evolved over time and, if you ask most consumers, it’s something they’ve come to trust and rely on as usage numbers continue to rise. In this article, Stephen Joseph explores the five most common myths of IP solutions in the banking environment.
- By Stephen Joseph
- Apr 30, 2013
As the pioneer in the manufacturing and development of real-time GPS surveillance technology, LandAirSea Systems’ product line enhances KJB Security Products dealer offerings and further strengthens the company’s position as the leading U.S. distributor of surveillance products.
Customers of Dortmunder Volksbank will now be able to use a virtual credit card integrated in their smartphones to make payments in shops that accept MasterCard PayPass thanks to a TSM (Trusted Service Manager) service operated by technology group Giesecke & Devrient in cooperation with DG VERLAG.
Sandia has decided not to patent or license the formula, but to make it freely available in hopes of saving lives.
With high center of gravity, taller trucks cannot hurdle over Delta Scientific's DSC720 bollards.
Elkridge, Maryland hosts ceremony at 9:00am EST on Wednesday, May 1, 2013.
ComNet, Communication Networks of Danbury, Connecticut, a USA-based manufacturer of fiber optic transmission and networking equipment, is introducing a variable rate electrical-to-optical media converter with PoE (power over Ethernet) that allows the user to select between 10/100 Mbps and 1000Mbps rate transmission and provides up to 30 watts of PoE+ for powered devices (PD).
For read/write desktop applications, such as library checkout, inventory systems, or other track and trace applications, requiring the reading of any articles, documents and books that are identified with HF contactless labels.
IHS, a global information company with world-class experts, gives information to help the security industry.
At over 1,450 feet, without the antennae, this building accounts for 17 city blocks that need safety and security.
- By Ralph C. Jensen
- Apr 25, 2013
XProtect Corporate video management software is a centralized solution for all government facilities and with Agent Vi analytics integrated at the airport.
This system was developed to meet the particular needs of a video surveillance operator with remote sites, where there is no network or where the video is to be reviewed by police or other third parties who have no access rights to the operator’s network.