Navarre Corp., a distribution and retail support operation in Minneapolis, previously relied on an analog-based surveillance system as a way to increase security and aid in investigations, but the company found the system unreliable for capturing high-quality video when incidents occurred.
- By Peter Jankowski
- Dec 01, 2011
The Naval Ordnance Test Unit (NOTU) at the Cape Canaveral, Fla., Air Force Station supports and tests sea-based weapons in a safe environment.
- By Del V. Salvi
- Dec 01, 2011
’Tis the season to be jolly, especially if you’re a retailer. For most stores, the cash registers are ca-chinging more this month than they have all year.
- By Ronnie Rittenberry
- Dec 01, 2011
This year’s EAA AirVenture 2011 in July drew close to 550,000 visitors during the seven-day event—members, fans and spectators who came to see daily aviation shows, aerobatics and pyrotechnics, as well as the opening day Fly-In Theater.
- By Rolland Trayte
- Dec 01, 2011
A lower-cost virtual infrastructure gives cloud providers pricing leeway that can be used either to beat a competitor’s price or to increase margins.
- By Eric Burgener
- Dec 01, 2011
Shanghai WorldExpo Culture Center, shaped like a flying saucer—and often referred to as the “Spaceship”—is one of Shanghai’s iconic buildings.
- By Mark S. Wilson
- Dec 01, 2011
The transition from analog CCTV equipment to network video surveillance equipment continues to be the major overarching trend within the video surveillance industry.
- By Gary Wong, Jon Cropley
- Dec 01, 2011
Mike Flannery, director of commercial hardware solutions of ADT Commercial Security, discusses the three types of access controls, and how users can determine which solution is best for their business.
Researchers are applying criminological concepts in the study of cybercrime.
Bear Creek Mountain Resort replaced its analog-based surveillance system with the Avigilon high-definition surveillance solution for greater reliability, enhanced image quality, and the ability to more efficiently and quickly resolve incidents onsite.
Engineers from the MU College of Engineering, with funding from the U.S. Army/Leonard Wood Institute, have enhanced popular smartphones to be able to find and track targets.
Stress-related disorders are often linked to people working in the line of fire.
In October 2006, the Department of Homeland Security Appropriations Act of 2007 became law. Section 550 of the Act ordered the Department of Homeland Security (DHS) to...
- By Carlos Barbosa
- Nov 29, 2011
This operation is the eighth phase of Operation In Our Sites, a sustained law enforcement initiative to protect consumers by targeting counterfeit and piracy on the Internet, and the second year it has coincided with Cyber Monday.
Knowing the identity of workers and monitoring their access to various operations are key capabilities required to meet Chemical Facility Anti-Terrorism Standards (CFATS). Several of the Department of Homeland Security (DHS)'s 18 Risk-Based Performance Standards (RBPS), which were formulated to ensure protection of chemical facilities, specifically mention the need for comprehensive monitoring of employee identity and control of access to critical areas.
Seven individuals have been charged in federal court with drug smuggling following the discovery of more than 9 tons of marijuana inside a tractor trailer attempting to enter the United States at the Otay Mesa Commercial Port of Entry.
Small changes in pub and bar closing hours seem to affect the number of violent incidents.
The U.S. Department of Homeland Security developed the Chemical Facility Anti-Terrorism Standards (CFATS), a comprehensive set of security regulations governing chemical facilities, to ensure companies that manufacture, store and transport chemicals are properly secured. While various technologies can play a role to protect chemical facilities, CFATS does not specify which should be used or how. Instead, CFATS specifies 18 Risk-Based Performance Standards (RBPS) to guide chemical facilities in selecting and implementing appropriate protective measures to reduce vulnerability and manage risk.
- By John Romanowich
- Nov 29, 2011
A Hungarian citizen pleaded guilty today to intentionally causing damage by transmitting a malicious code to Marriott International Corporation computers and to threatening to reveal confidential information obtained from the company’s computers if Marriott did not offer him a job.
With all of the crazy 2011 security breaches, exploits and notorious hacks, what can we expect for 2012?