System integrators count on video intercoms to secure virtually any facility, whether it’s a remote water pump station, a pharmaceutical manufacturing plant or a multitenant apartment building. Intercoms add a valuable layer of security by letting employees or residents control who enters their facilities.
- By Bruce Czerwinski
- Apr 01, 2018
Winning more business is typically thought of as using marketing, advertising, referrals, or even cold calls and precision pitching to secure new opportunities at new clients. When it comes to physical security integration, there are after all, only so many doors to secure in your area of operation.
- By Kevin Hendershot
- Apr 01, 2018
Like many other standards, ONVIF has evolved incrementally and its development, use and acceptance have as well. The journey ONVIF is on is actually quite typical for a standards organization.
- By Per Björkdahl
- Apr 01, 2018
The information technology department of the Everett Public School district was asked to design a modern security system that would serve the district’s current needs, be cost effective and handle future expansion.
Advancements in emerging technologies require leadership, critical thought about the future, and a willingness to take risks. Stretching oneself to integrate with new technologies is critical, of course, but the true promise of innovation is offering new solutions to the market.
- By Leslie Saunders
- Apr 01, 2018
Efficiency is part of Climatec’s DNA—after all, much of their work is in energy and access solutions—but efficiency doesn’t mean taking shortcuts. Climatec believes in client-focused, service-driven work and solutions.
- By Jessica Davis
- Apr 01, 2018
We’re hearing about security breaches every day in the news. From retailers like Target and TJ Maxx, to financial services firms like Equifax and J P Morgan Chase, and government agencies like the Securities & Exchange Commission (SEC), it seems like no organization is safe.
- By Jeff Capone
- Apr 01, 2018
I went shopping after Christmas. Right there, on sale, I spotted a drone. I couldn’t take my eyes off of the box and for whatever reason, I felt compelled to buy it.
- By Ralph C. Jensen
- Apr 01, 2018
As camera counts and the data they provide grow ever-larger, it becomes increasingly difficult for organizations to monitor, perform investigations, and draw useful conclusions from the valuable information gathered by their video surveillance infrastructure.
- By Brian Carle
- Apr 01, 2018
After several business trips to California, I did bump in to something a little radical and most certainly worth a story. The story begins with Steve Reinharz, a man who is living on the leading edge of technology. It is the people, or things that he associates with that brings pause.
- By Ralph C. Jensen
- Apr 01, 2018
More than 22 years ago, Steve Reinharz decided he wanted to become part of the security industry. He stepped into his first integration at a local gas station.
- By Ralph C. Jensen
- Apr 01, 2018
The growth of technology is everywhere. What’s next for the security industry? I think the next innovation poised to transform the security industry will be deep learning or artificial intelligence (AI), which is a system that learns by looking at masses of data.
- By Ralph C. Jensen
- Mar 01, 2018
Most of us are using biometric technology in some way, shape or form whether that is at work or in our personal lives. If you are not yet using it, you will be soon.
- By Mark Clifton
- Mar 01, 2018
The challenge of accurately tracking who has worked, and for how long, has exasperated employers for centuries. It is easy to see why—payroll is the single largest cost for most businesses.
- By Mohammed Murad
- Mar 01, 2018
It is time to pay attention to Artificial Intelligence (AI). With Apple Siri, Google Assistant and now Amazon Echo, voice recognition AI interacts with users worldwide thousands of times a day.
- By Shawn Guan
- Mar 01, 2018
The University wanted to implement a robust VMS with good video storage capacity that included alarms and notifications for motion detection or perimeter crossings in order to control potential external and, most importantly, internal theft.
- By Courtney Dillon Pedersen
- Mar 01, 2018
Most people, when confronting a drone (Unmanned Air Vehicle/Unmanned Air System) operating in or around their area of responsibility in an unsafe manner, would like to bring it down immediately.
- By Logan Harris
- Mar 01, 2018
Recurring Monthly Revenue, almost always referred as RMR, is probably the most important metric of any subscription business.
- By Ralph C. Jensen
- Mar 01, 2018
Blockchain, the backbone technology behind Bitcoin, has grown exponentially since its inception in 2008. Since 2013, Google searches of “blockchain” have risen by 1,900 percent.
- By Jaikishan Rajaraman
- Mar 01, 2018
You’ll get a real kick out of this security story. It is all about a secure perimeter and access control that is stored in the cloud and a man devoted to those around him.
- By Ralph C. Jensen
- Feb 12, 2018