The success of ASAP didn’t happen overnight. In fact, there have been several efforts to help deal with alarm monitoring over the past 20 years.
- By Lindsay Page
- Aug 01, 2013
The term wide dynamic range (WDR) is used to describe the function of a camera designed to produce clearer, more actionable images and/or video in circumstances where back light and intense illumination can vary excessively, especially when both very bright and very dark areas are simultaneously present in the camera’s field-of-view.
- By Wendi Burke
- Aug 01, 2013
As more systems are going online, the more these systems rely on a wireless backbone to deliver security in a world filled with technology, smartphones and tablets.
- By Ralph C. Jensen
- Aug 01, 2013
In the world of product distribution, Tri-Ed Distribution means business. In fact, President and CEO Pat Comunale is so excited about the security industry’s future, he plans to bring five, recently-acquired, data solutions centers into the security vertical.
- By Ralph C. Jensen
- Aug 01, 2013
In the 1980s, a keynote speaker at a Novell Users Group meeting said, “All things will become IP.” It was almost certain the industry would adopt Asynchronous Transfer Mode, or ATM, as a more secure and deterministic networking technology.
- By Vince Ricco
- Aug 01, 2013
Zoom cameras allow targets from hundreds of feet away to be viewed up close, while megapixel cameras can cover larger areas with fewer cameras. But is it really that simple?
- By Aaron Tankersley
- Aug 01, 2013
A common misperception among security system integrators is the notion that an IP surveillance network must be separate and distinct from corporate or campus data, and the voice network. However, having a separate, distinct network for video surveillance comes with a price.
- By Steven Olen
- Aug 01, 2013
Traditionally, homebuyers have been most interested in modern kitchens or high-tech home features. And for most homebuyers, a lock was just that… a lock.
- By Keith Brandon
- Aug 01, 2013
THE George Zimmerman zooms through Texas...or at least tries to.
- By Ginger Hill
- Jul 31, 2013
Redamak’s faces challenges ranging from theft to fraud to employee safety.
IHS tracked the current adoption rates of wireless download technology across each vertical market.
Coffee chain refuses to ban loaded guns from its shops in gun-friendly states.
- By Ginger Hill
- Jul 31, 2013
Redesign was driven by ACP’s 16-bit Hitachi main processor unit becoming obsolete.
SightLogix SightSensor on display Aug 9-14 at the American Correctional Association’s Congress of Corrections.
Multi-factor authentication stations employ multispectral imaging for simultaneous capture of two index fingers.
The risk is still here and demands a data-centric approach to security.
Race control systems, and basic audio and video systems, were chosen to upgrade and/or supplement the A/V systems in many areas.
Easy to use and install network video management solution complements and expands Tyco’s network video solutions offering.
American history is tampered with as statue of 16th American President is paint spattered.
- By Ginger Hill
- Jul 26, 2013
Retailers need to quit thinking of surveillance systems as repositories of what’s been seen and recorded and, instead, think of cameras as sensors in a system.