- WIRELESS TECHNOLOGY - Indoor Wireless Path Loss
- PERIMETER SECURITY - Into the Future
- CLOUD STORAGE - Creative Uses for Hosted Video Sureillance
- SECURITY SOFTWARE - Keeping Up with the Tools
Good security means a layered approach; great security begins at the perimeter
Susceptibility to an attack begins with an unprotected perimeter. In the past, an unprotected perimeter often meant the opportunity for myriad security breaches, loss of assets and the chance for loss of human life.
What do golf tournaments, racetracks, pedestrian malls and construction sites have in common?
Hosted video has leveled the playing field for many small businesses looking to secure their properties with the latest network surveillance technology.
Automated system detects and prevents potential criminal activity
Cell towers and accompanying cell sites attract more attention in the area of security than ever before.
Integrated, scalable system controls and manages keys to locked tool boxes
There are hundreds of specialized tools used on a daily basis at the United Airlines jet engine rebuild and test facility, a 20-acre maintenance and operations center adjacent to San Francisco International Airport.
Endless possibilities take New Jersey hospital forward
Since 1925, northern New Jersey has turned to Holy Name Medical Center in Teaneck for healthcare excellence.
Four factors must be considered for transmission range
Unlike digital systems, trying to quantify the range performance of radio frequency (RF) communication systems can be difficult due to the large role the environment has on radio frequency signals.
We have a pretty diverse lineup of events to talk about in this month’s issue of Security Products magazine. We begin with our cover feature from Michael Derby, the founder and chief technology officer at AvaLAN Wireless.
Dallas hospital includes emergency phone system on campus
Integration of multifaceted security systems can be a serious challenge. Using cameras, call boxes, mass notification systems and access control readers together is a difficult but increasingly common goal.
Standards development assists with integration issues, but will interoperability ever become a reality?
The development of custom video drivers is a huge barrier for less-established brand names. From a stand-alone camera manufacturer’s perspective, it is impossible to gain market share without being included in the more popular VMS platforms. Without strong market share, however, VMS companies cannot devote the time or the energy to support these lower-tier brands.
Mobile computer systems are proving themselves vital to the future of public safety
Its deputies in the field were being asked to make do with an old, end-of-life mobile data terminal (MDT) system that it had been using for more than two decades.
Wayward tropical storm blitzes New York coastline, emergency intact
The town of Oyster Bay, part of the New York metropolitan area, is the only town in Nassau County that extends from the North Shore to the South Shore of Long Island.
Locking down network video surveillance
Both physical security and IT professionals place great importance on cyber security.
Flash memory delivers performance benefits to video storage, but at what cost?
Surveillance data is critical in applications ranging from retail to government, and gaming to transportation.
Committing leadership and resources is a top priority
When selecting a partner for your government security program, it’s important to keep in mind the four C’s that lead to success: commitment, compliance, coverage and communication.
IP-based system provides speed for emergency response teams
Emergency preparedness requires critical communications to be response ready—help can’t wait when disaster strikes.