April 2012
- WIRELESS TECHNOLOGY - Indoor Wireless Path Loss
- PERIMETER SECURITY - Into the Future
- CLOUD STORAGE - Creative Uses for Hosted Video Sureillance
- SECURITY SOFTWARE - Keeping Up with the Tools
Features
Automated system detects and prevents potential criminal activity
By Rolland Trayte
Cell towers and accompanying cell sites attract more attention in the area of security than ever before.
Good security means a layered approach; great security begins at the perimeter
By Patricia Logue
Susceptibility to an attack begins with an unprotected perimeter. In the past, an unprotected perimeter often meant the opportunity for myriad security breaches, loss of assets and the chance for loss of human life.
What do golf tournaments, racetracks, pedestrian malls and construction sites have in common?
By Matt Krebs
Hosted video has leveled the playing field for many small businesses looking to secure their properties with the latest network surveillance technology.
Integrated, scalable system controls and manages keys to locked tool boxes
By Del V. Salvi
There are hundreds of specialized tools used on a daily basis at the United Airlines jet engine rebuild and test facility, a 20-acre maintenance and operations center adjacent to San Francisco International Airport.
Endless possibilities take New Jersey hospital forward
By Kim Rahfaldt
Since 1925, northern New Jersey has turned to Holy Name Medical Center in Teaneck for healthcare excellence.
Four factors must be considered for transmission range
By Mike Derby
Unlike digital systems, trying to quantify the range performance of radio frequency (RF) communication systems can be difficult due to the large role the environment has on radio frequency signals.
Departments
Dallas hospital includes emergency phone system on campus
By Samuel Shanes
Integration of multifaceted security systems can be a serious challenge. Using cameras, call boxes, mass notification systems and access control readers together is a difficult but increasingly common goal.
By Ralph C. Jensen
We have a pretty diverse lineup of events to talk about in this month’s issue of Security Products magazine. We begin with our cover feature from Michael Derby, the founder and chief technology officer at AvaLAN Wireless.
Supplement
Standards development assists with integration issues, but will interoperability ever become a reality?
By Ian Johnston
The development of custom video drivers is a huge barrier for less-established brand names. From a stand-alone camera manufacturer’s perspective, it is impossible to gain market share without being included in the more popular VMS platforms. Without strong market share, however, VMS companies cannot devote the time or the energy to support these lower-tier brands.
Mobile computer systems are proving themselves vital to the future of public safety
By TJ Kennedy
Its deputies in the field were being asked to make do with an old, end-of-life mobile data terminal (MDT) system that it had been using for more than two decades.
Locking down network video surveillance
By Steve Surfaro
Both physical security and IT professionals place great importance on cyber security.
IP-based system provides speed for emergency response teams
By Ben Bradley
Emergency preparedness requires critical communications to be response ready—help can’t wait when disaster strikes.
Wayward tropical storm blitzes New York coastline, emergency intact
By Samuel Shanes
The town of Oyster Bay, part of the New York metropolitan area, is the only town in Nassau County that extends from the North Shore to the South Shore of Long Island.
Flash memory delivers performance benefits to video storage, but at what cost?
By Lee Caswell
Surveillance data is critical in applications ranging from retail to government, and gaming to transportation.
Committing leadership and resources is a top priority
By Dan Myslewski
When selecting a partner for your government security program, it’s important to keep in mind the four C’s that lead to success: commitment, compliance, coverage and communication.