Located on the campus of Duke University, the Nasher Museum of Art displays a growing collection of modern and contemporary art. With an exhibition space of more 65,000 square feet it is one of the most important university are museums in the country.
- By Kate Houghton
- Dec 01, 2008
Banks, financial institutions, municipal, state and federal governments are demanding more reliable, less expensive authentication and authorization systems for everyday activities, from performing financial transactions to boarding an aircraft, entering a secure physical location or crossing international borders.
- By Tatiana Vazulina
- Nov 05, 2008
Today’s mobile professionals carry more sensitive information than ever before. A single laptop can contain information that can be valued in the millions, if not billions, of dollars.
- By Bill Bockwoldt
- Oct 02, 2008
In this age of widespread easy access to personal information, identity theft has become the fastest growing and most lucrative crime in America.
- By Reginald Ball
- Oct 02, 2008
Internet-enabled products and services are now gaining wider acceptance and delivering better results than before. Remote monitoring services are no exception.
- By Karina Sanchez
- Sep 02, 2008
Regardless of the scope and scale, when disaster strikes, first responders need a rapid and effective way to collect and communicate information in the early moments.
- By Brian Dopp
- Aug 04, 2008
There are two "S"s critical to the construction industry: safety and security. Protecting workers from harm is obviously of primary concern, but protecting assets on the jobsite against theft is also on the top of one's mind.
- By Mike Marett
- Aug 01, 2008
Critical infrastructure organizations are essential to the functioning of societies and economies. The role of these facilities in international commerce makes their security a top priority. But given the complex and often geographically dispersed nature of these facilities and assets, critical infrastructure security often presents a daunting challenge.
- By Mariann McDonagh
- Jul 01, 2008
An organization suspects that an employee is not following his or her route. In the past, a security manager would personally follow the employee or instruct someone to do so. This tactic is time consuming, especially if, on that particular day, the employee actually goes where he’s supposed to go.
- By Jaap Groot
- Jun 04, 2008
Business is all about managing risk, and risk management comes down to making solid business decisions to avoid and mitigate potential threats, including natural disasters.
- By Richard Daley
- Jun 02, 2008
While every individual and organization that provides security products or services will have their spin on what security is and how to achieve the desired level, the truth is, security is essentially an unachievable outcome. A common definition of security is, “freedom from danger, fear and anxiety.” Security defined as such is, therefore, unattainable.
- By Kevin McDonald
- Jun 02, 2008
Securely exchanging and storing documents and emails has become a necessity across multiple industries. An increasing number of businesses need to exchange data internally as well as with business partners and customers. The question is: How do you do exchange information easily, efficiently, and securely?
- By Steve Laubenstein
- May 05, 2008
When hurricanes in 2005 leveled the Charlotte County Airport in Punta Gorda, Fla., airport officials chose to rebuild, and to do so stronger and smarter. That meant making sure the airport’s security system satisfied federal and state regulations in a post-9/11 world that had to protect against potential terrorists turning airplanes into deadly bombs.
- By Debbie Bolles
- Apr 08, 2008
With an explosive demand for security monitoring worldwide, cameras are appearing in every conceivable location. The challenge is how to support this rapidly growing infrastructure with affordable and flexible real-world solutions. The adoption of PoE offers new opportunities for the design of products directly powered over Ethernet lines, drastically reducing overall installation and maintenance costs.
- By Koen Geirnaert
- Apr 01, 2008
Several New York regional authorities have teamed with TSA to increase security, focus on threats and to make funding available to the right people, for the right projects at the right time.
- By Ralph C. Jensen
- Feb 29, 2008
If you pick up any local employment guide, you cannot avoid seeing the many call centers with ads that read, “Customer service representatives wanted—immediate hire.” Why are these call centers continuously struggling with hiring and turnover?
- By Jacquellin Faison
- Feb 01, 2008
Politicians know full well the impact of terrorism in Europe. They’ve faced it for years, if not decades.
- By Ralph C. Jensen
- Jan 29, 2008
Have you ever looked at a surveillance image and wondered why the image quality is so poor when compared with the clear, detail-packed images captured by consumer digital cameras or even the newest cell phones?
- By Pierre Parkinson
- Dec 01, 2007
Often, when people think of business continuity and disaster recovery, they immediately focus on protecting their employees and organization’s key assets, such as facilities and inventory. However, in more recent years, many have become significantly more reliant on computer infrastructures and the data that is produced with these systems.
- By Peter Briggs
- Nov 01, 2007