Everyone loves a good story, especially if there is a bit of patriotism, some struggle and a sprinkle of romance. And, throw in a flight from communist dictatorship to America, it might mean tears to your eyes.
- By Ralph C. Jensen
- Aug 01, 2013
The Grundfos-Indianapolis manufacturing facility in Indiana, a plant that produces a broad selection of water pumping equipment, much of which results in small to large fire pump systems for commercial facilities, was in need of a fire alarm upgrade.
- By Brian Carlson
- Aug 01, 2013
An electronic security and fire alarm company can be a great business for many reasons, including the ability to be successful at a range of company sizes or the fact that barriers to entry can be fairly low.
- By Jim Wooster
- Aug 01, 2013
Joe from ABC Company has had the same security management system for 15 years in all of his buildings. He likes it; he knows it inside and out, and he can give training classes to his security guards on how to use it.
- By Kim Rahfaldt
- Aug 01, 2013
The success of ASAP didn’t happen overnight. In fact, there have been several efforts to help deal with alarm monitoring over the past 20 years.
- By Lindsay Page
- Aug 01, 2013
The term wide dynamic range (WDR) is used to describe the function of a camera designed to produce clearer, more actionable images and/or video in circumstances where back light and intense illumination can vary excessively, especially when both very bright and very dark areas are simultaneously present in the camera’s field-of-view.
- By Wendi Burke
- Aug 01, 2013
As more systems are going online, the more these systems rely on a wireless backbone to deliver security in a world filled with technology, smartphones and tablets.
- By Ralph C. Jensen
- Aug 01, 2013
In the world of product distribution, Tri-Ed Distribution means business. In fact, President and CEO Pat Comunale is so excited about the security industry’s future, he plans to bring five, recently-acquired, data solutions centers into the security vertical.
- By Ralph C. Jensen
- Aug 01, 2013
In the 1980s, a keynote speaker at a Novell Users Group meeting said, “All things will become IP.” It was almost certain the industry would adopt Asynchronous Transfer Mode, or ATM, as a more secure and deterministic networking technology.
- By Vince Ricco
- Aug 01, 2013
Zoom cameras allow targets from hundreds of feet away to be viewed up close, while megapixel cameras can cover larger areas with fewer cameras. But is it really that simple?
- By Aaron Tankersley
- Aug 01, 2013
A common misperception among security system integrators is the notion that an IP surveillance network must be separate and distinct from corporate or campus data, and the voice network. However, having a separate, distinct network for video surveillance comes with a price.
- By Steven Olen
- Aug 01, 2013
Traditionally, homebuyers have been most interested in modern kitchens or high-tech home features. And for most homebuyers, a lock was just that… a lock.
- By Keith Brandon
- Aug 01, 2013
THE George Zimmerman zooms through Texas...or at least tries to.
- By Ginger Hill
- Jul 31, 2013
Redamak’s faces challenges ranging from theft to fraud to employee safety.
IHS tracked the current adoption rates of wireless download technology across each vertical market.
Coffee chain refuses to ban loaded guns from its shops in gun-friendly states.
- By Ginger Hill
- Jul 31, 2013
Redesign was driven by ACP’s 16-bit Hitachi main processor unit becoming obsolete.
SightLogix SightSensor on display Aug 9-14 at the American Correctional Association’s Congress of Corrections.
Multi-factor authentication stations employ multispectral imaging for simultaneous capture of two index fingers.
The risk is still here and demands a data-centric approach to security.