As cities across California struggle with how to handle medical marijuana dispensaries and police agencies blame them for an increase in lawlessness, academics are delving into data to find out whether pot shops really do influence neighborhood crime.
While computing changes constantly, most shifts are simple changes that don’t require organizations to change the core of how they work. Not so with cloud computing. While promising significant benefits, it requires organizations to change how they approach IT.
ASSA ABLOY has packed up its latest door and hardware products and opening solutions into the Mobile Innovation Showroom and is touring the country.
The company has hired Brian Ashley and Roy Wake as its new regional sales managers.
Bosch Security Systems provides Rio de Janiero with state-of-the-art surveillance technology for Brazil's Rock in Rio Festival.
NAV will provide service for more than 300 locations across seven states.
Vector Security's new National Service Center provides additional space, technology review labs and increased customer communications.
The additions include Werner Gartner, CFO, Joe Haar, vice president of sales and Hussein Amery, vice president of business development.
McAfee recently released the results of a survey conducted by Gabriel Consulting Group (GCG), an independent analyst firm, showing a serious disconnect between security perceptions and reality among IT Enterprise security managers.
The company will donate a portion of the proceeds to the Pink Ribbon Foundation for every limited edition printer sold.
Levitch has spent the last 20 years in the security/access control industry, including recent stops at S2 and VEREX.
The Austin Police Department caught a burglar thanks to one man’s home security system. Homeowner Thomas Marik received a startling phone call from his wife one August afternoon only to find out that the couple’s home was burglarized. Marik and his wife were out for the day only to come home to find their house broken in. The couple never experienced a burglary before in their Austin, Texas, neighborhood, but they were prepared.
- By Christina Miralla
- Oct 03, 2011
While campus security is obviously a key concern, an integrated security solution can provide an educational institution with additional value.
- By Shan Bates
- Oct 03, 2011
Seneca 's xVault server is optimized for use with Ocularis, OnSSI's flagship video surveillance software.
What’s up with the TSA these days? Have you noticed that officers are acting a little nicer and even asking questions about you, your travel or maybe even your job? Don’t be fooled: It’s all an act, because it’s business as usual at the airports.
- By Ralph C. Jensen
- Oct 01, 2011
Organizations of all sizes are migrating from analog to IP-based physical access control solutions, drawn by increased security, increased operational efficiency and better availability.
- By Dan O’Malley
- Oct 01, 2011
Most security professionals know that wireless systems remove the expense of running wire to all access points, a project that takes too much time and wreaks havoc throughout the facility while the job is being done.
- By Sean Leonard
- Oct 01, 2011
Providing security in the government sector is not for the faint of heart or the uncommitted. The government sector requires expertise in high-level security applications, advanced compliance requirements and the challenge of securing funding.
- By Dan Myslewski
- Oct 01, 2011
Helicopter emergency safety decisions are separate from medical decisions. Helicopter personnel need to be armed with the latest navigation tools to ensure safety for all onboard, especially when a matter of minutes can mean the difference between life and death.
- By Christina Miralla
- Oct 01, 2011
Over the last decade, the alarm industry has spent millions of dollars and thousands of hours addressing the issue of preventing unnecessary police dispatches from alarm systems.
- By Stan Martin
- Oct 01, 2011
With the number of IT devices used in businesses today growing rapidly, organizations are seeking solutions that not only reduce risk and secure property and staff, but also offer IT and security convergence for maximum protection of people and property across buildings systems.
- By Warren Rosebraugh
- Oct 01, 2011
In a year in which some of the biggest names in both physical and logical security have been named and shamed for security lapses and subsequent breaches, reality is bearing down hard on the IT executive.
- By Philip Lieberman
- Oct 01, 2011
This need for better image quality led GMU directly to IP-based megapixel camera technology. The university evaluated several wellknown camera suppliers before deciding on Arecont Vision.
- By Del V. Salvi
- Oct 01, 2011
Building a successful dealer business is much like experimenting with a new recipe: Without the right ingredients, you’re setting yourself up for failure.
- By Megan Weadock
- Oct 01, 2011
It’s well-documented that effectively monitoring security cameras is difficult. Human operators routinely suffer from fatigue and lack of focus, even after short periods of time, which results in missed events.
- By Mahesh Saptharishi, Ph.D.
- Oct 01, 2011
When a golf cart went missing at CordeValle, a 44-room Rosewood golf resort on 1,700 acres in the foothills of the Santa Cruz mountains about 25 miles south of San Jose, Calif., it was a wakeup call about the resort’s need to upgrade its aging video surveillance system.
- By Del V. Salvi
- Oct 01, 2011
Whether you’re a brand-new alarm dealer starting a company or an established dealer looking to expand through acquisitions, opportunities for financing abound.
- By Cindy Horbrook
- Oct 01, 2011
To help comply with industry regulations, boost security and improve operational efficiencies, Associated British Ports (ABP) needed a flexible HD surveillance system that could easily integrate with the port operator’s existing analog system.
- By Keith Marett
- Oct 01, 2011
As a result of Homeland Security Presidential Directive 12 (HSPD- 12), smart cards are spreading rapidly through government agencies and many large organizations. The directive’s purpose is to ensure secure and reliable identification for every federal employee and government contractor.