The individual cash pay-outs might be small, but for Texas Title Loans—a chain of 14 short-term loan shops stretching from Dallas to San Antonio—keeping an eye on the till was creating big problems.
Convergence has come, and while there are still analog cameras being produced, bought and installed, the security industry has become a networked prism.
New developments in network cameras are enhancing their role as imaging sensors at the edge of IP video networks. The new landscape in imaging includes cameras that offer new capabilities, can see better and are smarter and more versatile.
The lesson of Pandora could be, in short, that containers secure enough to lockdown all the evil in the world are probably secure enough to protect good things, too.
Privacy was an immediate concern when the Council on Aging in Marshfield, Mass., sought to install a video surveillance system.
Engineering researchers at the University of Arkansas have received funding from the National Science Foundation to create distortion-tolerant communications for wireless networks that use very little power. The research will improve wireless sensors deployed in remote areas where these systems must rely on batteries or energy-harvesting devices for power.
Brivo Systems LLC, provider of cloud applications for security management, recently announced that several properties in the Barefoot Resort complex in Myrtle Beach, S.C. have deployed the Brivo ACS WebService cloud-based solution to improve safety and security. STOP Security is the dealer and installer for this large-scale project.
Schneider Electric recently announced the successful expansion of its Pelco by Schneider Electric Endura IP video management system (VMS) in the newly opened Terminal 3 at McCarran International Airport in Las Vegas.
Milestone Systems, the open platform company for IP video management software (VMS), will heighten its focus on development by starting up a new international business unit, Incubation and Ventures, with locations in Silicon Valley, California, and at the Danish headquarters. The goal is to develop new products and services with high potential for market superiority and differentiation, to achieve additional growth by cultivating new Milestone ventures.
It begins with a single system. It could be an access control system or a video system, but for a time it is enough to serve the company’s needs.
Security principles have not changed much in the past 30 years, but the application of those principles is shifting daily. Addressing integrated security disciplines to ensure a cohesive and collaborative security solutions environment in any organization requires a number of coordinated things to happen efficiently.
During the last 10-15 years, the retail industry has experienced a transformation from traditional brick and mortar store to newer technology platforms such as e-commerce, powerful search engines and social media. As a result, brick and mortar retailers have had to re-visit their strategic priorities to focus on higher levels of customer experience, channel convergence plans and new marketing and merchandizing approaches. Alongside, price pressure and lower margins continue to require retailers to drive higher efficiencies in store operations through improved workforce management, product placement and store layouts.
Texas Children’s Hospital recently added a new high-rise facility, the Pavilion for Women, to its already impressive five-building campus in the heart of the Texas Medical Center in Houston.
IP technology makes it easier to secure a campus environment. This is true even for very large corporate, healthcare and education campuses where many points of security concern are spread across large geographic areas.
To enhance the quality of the educational experience as well as the safety of their students, many schools and universities today view campus safety as a top priority.
The FBI established the Criminal Justice Information Services (CJIS) division in 1992, and it is now the bureau’s largest division.
Of all the accoutrements of civilization—and they are myriad, from plumbing to Pop- Tarts—perhaps none is more routinely taken for granted than the lowly fire hydrant.
Cyberthieves and hackers are always looking for new ways to obtain sensitive information. As Web browsers have become the common interface for accessing information that drives business activity, browsers have become the primary target of theft and data leakage.
VSS Monitoring has earned the 2012 Global Competitive Strategy Leadership Award in the infrastructure packet broker market from Frost & Sullivan.
Lookingglass Cyber Solutions, a cyber security company whose platform delivers emerging network threat intelligence, will integrate iSIGHT’s industry leading cyber intelligence with the Lookingglass' cyber threat analysis platform, ScoutVision.