Securely exchanging and storing documents and emails has become a necessity across multiple industries. An increasing number of businesses need to exchange data internally as well as with business partners and customers. The question is: How do you do exchange information easily, efficiently, and securely?
- By Steve Laubenstein
- May 05, 2008
When hurricanes in 2005 leveled the Charlotte County Airport in Punta Gorda, Fla., airport officials chose to rebuild, and to do so stronger and smarter. That meant making sure the airport’s security system satisfied federal and state regulations in a post-9/11 world that had to protect against potential terrorists turning airplanes into deadly bombs.
- By Debbie Bolles
- Apr 08, 2008
With an explosive demand for security monitoring worldwide, cameras are appearing in every conceivable location. The challenge is how to support this rapidly growing infrastructure with affordable and flexible real-world solutions. The adoption of PoE offers new opportunities for the design of products directly powered over Ethernet lines, drastically reducing overall installation and maintenance costs.
- By Koen Geirnaert
- Apr 01, 2008
Several New York regional authorities have teamed with TSA to increase security, focus on threats and to make funding available to the right people, for the right projects at the right time.
- By Ralph C. Jensen
- Feb 29, 2008
If you pick up any local employment guide, you cannot avoid seeing the many call centers with ads that read, “Customer service representatives wanted—immediate hire.” Why are these call centers continuously struggling with hiring and turnover?
- By Jacquellin Faison
- Feb 01, 2008
Politicians know full well the impact of terrorism in Europe. They’ve faced it for years, if not decades.
- By Ralph C. Jensen
- Jan 29, 2008
Have you ever looked at a surveillance image and wondered why the image quality is so poor when compared with the clear, detail-packed images captured by consumer digital cameras or even the newest cell phones?
- By Pierre Parkinson
- Dec 01, 2007
Often, when people think of business continuity and disaster recovery, they immediately focus on protecting their employees and organization’s key assets, such as facilities and inventory. However, in more recent years, many have become significantly more reliant on computer infrastructures and the data that is produced with these systems.
- By Peter Briggs
- Nov 01, 2007
Advancements in technology and increased expectations for wireless sensor networks are driving new developments in the wireless burglary and intrusion marketplace. In response to growing expectations, many wireless sensor network developers have built upon years of experience and previous generations of proven technology to address these new-found demands.
- By Steve Pearlman
- Oct 02, 2007
The ideal solution for busy retailers is a video surveillance solution that’s not only integrated with their point-of-sale (POS) system but is also custom-designed to automatically generate daily exception reports that zero-in on potentially suspicious transactions.
- By Ali Mahmoud
- Jun 07, 2013