You can imagine how difficult it would be to secure an oil and gas pipeline than runs 50 or 60 miles. Multiply that distance by 20, and the security costs alone would be enormous -- let alone adding to the environmental impact or related safety concerns.
- By Ralph C. Jensen
- Oct 26, 2011
Using gun tracing data from the Bureau of Alcohol, Tobacco, Firearms and Explosives, which identify the source state for crime guns recovered in each of the 50 states, Brown University economist Brian Knight constructed an import-export matrix to measure the state-to-state gun trafficking flow.
Orlando Infiniti requires high security surveillance around the clock. Arecont Vision recently installed megapixel cameras to provide maximum surveillance for Orlando's luxury car dealer.
Firetide’s HotPort mesh is the communications foundation for the IP video surveillance system which is part of a larger initiative being driven by the Maribyrnong City Council, State Government, and Victoria Police, to improve security and safety in the high pedestrian traffic retail areas of downtown Footscray.
City of Westminster College has invested in the latest IP Video technology from IndigoVision to provide integrated CCTV surveillance for its new flagship campus.
A new president takes the reins at one Florida-based, 27-year-old security alarm firm.
Milestone Systems, the open platform company in IP video management software (VMS), is now recognized for Continued Education Credits (CECs) by Building Industry Consulting Service International, Inc. (BICSI), a professional association supporting the information technology systems industry covering voice, data, electronic safety & security, and audio & video technologies. BICSI provides information, education and knowledge assessment for individuals and companies in the IT systems industry through courses, conferences, publications and professional registration programs.
ONVIF, the global leading standardization initiative for IPbased physical security products, announced today that it is streamlining the user experience of its interoperability specification by developing a Profile concept so users can more easily identify interoperable solutions to deploy within their organizations.
Advanced Fire Alarm Network Protects Diverse Environments, Simplifies Maintenance and Monitoring.
The National Retail Federation has released its 2011 Crowd Management Guidelines and recognized in them the growing problem of criminal flash mobs.
One of America's most costly natural disasters are wildland fires, and wildland-urban interface (WUI) fires rank among the worst of these. WUI is the threshold where wildfires consume not only the landscape, but also infrastructure. Once that threshold is crossed, flames can spread – well, like wildfire.
Are you among the majority of Americans that like the use of surveillance cameras on police cars and in public spaces? Are you among the majority of Americans who aren’t quite as enthusiastic about the use of video surveillance at traffic intersections?
- By Ralph C. Jensen
- Oct 17, 2011
The answer to the public’s question, “How can we receive alerts and warnings during an emergency?” is rapidly changing. Many are just as likely to turn to a Twitter feed on their smartphone as they are to seek out government websites for important information, such as whether they need to seek immediate shelter.
In a breakthrough that could aid spies, keepers of medical records and parents who want to prevent their kids from "sexting," a team of Virginia Tech researchers has created software to remotely put smart phones under lockdown.
According to a recent study of Clery Act reports by Siemens Building Technologies division, analysis revealed that among institutions of higher learning, community colleges were least likely to have the integrated, multi-modal systems necessary to quickly reach the largest number of people when crisis strikes.
For many businesses, maintaining a competitive edge requires a collaborative line of communication, but sharing highly sensitive documents without the proper security can be dangerous if the information falls into the wrong hands
- By Adi Ruppin
- Oct 14, 2011
MOBOTIX donates IP-based cameras to a North Carolina community church.
A team of University of Notre Dame biometrics experts are developing a crime-fighting tool that can help law enforcement officials identify suspicious individuals at crime scenes.
Here are 10 best practices for protecting customer credit card account information and minimizing exposure to online payment scams.
Symantec Corp. recently announced two new DeepSight datafeeds -- Symantec DeepSight IP Reputation DataFeed and Symantec DeepSight URL Reputation DataFeed, which provide critical intelligence about known attack actors in a format that enterprises can use to automatically trigger systems for active protection or incident management.
Concerns over Internet bandwidth and online security are the two biggest fears that suppliers of cloud based work solutions should be addressing now, according to a study released in October 2011.
Not just doors, but cabinets, carts, computers, ambulances and parking lots can be secured using latest centralized access control systems that run off existing IT network.
In a lush hilltop setting in an affluent suburb of Kuala Lumpur, Malaysia, 1.3 and 3 megapixel video cameras from Arecont Vision provide surveillance at the expansive Kuala Lumpur Golf and Country Club (KLGCC). The club, which offers a choice of two 18-hole courses, is the site of numerous international championships and hosts more than 100,000 rounds of golf a year.
Thanks to a Mobotix camera, watch real-time video from the top of Mount Everest right from the comfort of the home computer.
California Governor Jerry Brown has signed Senate Bill 819, which will allow law enforcement officers to take more firearms out of the hands of those who are prohibited from owning them.
The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, as well as escalating battles over the control of online information that threatens to compromise content and erode public trust and privacy.
The Academy of Art University in San Francisco has evolved from a loft studio for a handful of students in 1929 to become the country’s largest private school for art and design. The family-run institution understands that parents want to be assured that their children are in a safe and secure environment. Academy President Elisa Stephens, the granddaughter of the school's founder, Richard S. Stephens, has committed the academy to an ever-expanding curriculum in order to stay current with new technologies and trends. Roving patrols that provide security are as much a part of the academy’s philosophy as its commitment to being “student-centric,” meaning staff members will do what they need to do to benefit the students. On a day-to-day basis, the academy’s security team makes the decisions that will affect positive outcomes for student security. This includes video surveillance, campus safety hosts at buildings and desk guards in buildings where students must be buzzed-in to enter.
- By Mary Wilbur
- Oct 11, 2011
More and more companies are providing their employees with smartphones. While companies seek the best security available for their data, employees would also like to install apps of their own. Security experts have now developed equipment software with two separate areas: the business area and the personal area.