In the security industry, a completed camera installation, active access control platform, and all its moving parts are nothing short of a work of art.
- By Ralph C. Jensen
- Apr 01, 2016
There are seven basic code categories for electrified hardware used to control access or egress, and each has seen recent code changes.
- By Lori Greene
- Apr 01, 2016
When it comes to cybersecurity the world falls into two camps: those focused on securing their hardware and applications as a closed system, and those who recognize that converging technologies calls for a more ecosystem-centric approach.
- By Vince Ricco
- Apr 01, 2016
Business is booming in higher education, and campuses all around the country are stepping up to the challenge to enhance security.
- By Ralph C. Jensen
- Apr 01, 2016
Law enforcement, homeland security, surveillance, emergency response and military operations may span a range of operations, but they all share a crucial need for a detailed, real-time picture of rapidly changing events from various field locations.
- By Eric Chang
- Apr 01, 2016
TelX helps companies build more agile businesses faster with reduced infrastructure complexity and broader reach to new markets.
- By Kim Rahfaldt
- Apr 01, 2016
As a camera views and records in 360 degrees, a circular, distorted image is produced, making it essential to process the image so that the human eye can comprehend the image easily.
- By Jumbi Edulbehram
- Apr 01, 2016
Wireless locks are increasingly becoming the solution of choice in commercial facilities worldwide.
- By Minu Youngkin
- Apr 01, 2016
With almost 33,000 students and just under 5,000 academic and administrative staff, BYU takes its responsibility to provide a secure environment for students, staff and visitors very seriously.
- By Andrew Elvish
- Apr 01, 2016
Now that mobile identities can be carried on phones for physical security applications, they are merging with smart cards into centralized identity management systems.
- By Brandon Arcment
- Apr 01, 2016