 
                    
                                        
		            
                    When we use the term “wireless” to look at access control technologies—or, truly, any security system—the reality is that we often use it as a catch-all term for the many technologies on the market that work in some way to wirelessly communicate with one another. 
                    
			            - By Peter  Boriskin
- Mar 01, 2018
 
            
                
	                 
                    
                                        
		            
                    The safety and security of visitors and staff and the protection of the Musical Instrument Museum's extensive collection is an essential aspect of fulfilling its mission. With an active facility during both day and evening hours, the museum sought to upgrade its outdoor security surveillance system to improve the quality of the images around the clock.
                    
			            - By Sydny  Shepard
- Mar 01, 2018
 
            
                
	                
                    
                                        
		            
                    The challenge of accurately tracking who has worked, and for how long, has exasperated employers for centuries. It is easy to see why—payroll is the single largest cost for most businesses. 
                    
			            - By Mohammed  Murad
- Mar 01, 2018
 
            
    
                
	                 
                    
                                        
		            
                    Perimeter protection has been part of the human psyche since the dawn of mankind. Over the millennia we’ve evolved from crude barriers of sticks and rocks to fortified walls of concrete and stone to electrified fences and high-resolution surveillance cameras.
                    
			            - By Joe  Morgan
- Mar 01, 2018
 
            
                
	                 
                    
                                        
		            
                    It is time to pay attention to Artificial Intelligence (AI). With Apple Siri, Google Assistant and now Amazon Echo, voice recognition AI interacts with users worldwide thousands of times a day.
                    
			            - By Shawn  Guan
- Mar 01, 2018
 
            
                
	                
                    
                                        
		            
                    The security landscape is constantly evolving with new products and technologies. With the introduction of these new and improved technologies, it is inevitable that products which have existed within the industry for years may no longer be the go-to choice when it comes to selecting system equipment. 
                    
			            - By Roscoe  Coffman
- Mar 01, 2018
 
            
                
	                 
                    
                                        
		            
                    The University wanted to implement a robust VMS with good video storage capacity that included alarms and notifications for motion detection or perimeter crossings in order to control potential external and, most importantly, internal theft.
                    
			            - By Courtney Dillon Pedersen
- Mar 01, 2018
 
            
                
	                 
                    
                                        
		            
                    The casino and hospitality industry includes hotels, restaurants, entertainment venues as well as gaming elements to entertain visitors and guests.
                    
			            - By Jennifer  Hackenburg
- Mar 01, 2018
 
            
                
	                 
                    
                                        
		            
                    Farmington community library needed access control to restricted areas and employee entrances, video surveillance at the building perimeter, parking lots, restricted and common areas, and intrusion detection on all controlled doors.
                    
			            - By Kim  Rahfaldt
- Mar 01, 2018
 
            
                
	                 
                    
                                        
		            
                    Most people, when confronting a drone (Unmanned Air Vehicle/Unmanned Air System) operating in or around their area of responsibility in an unsafe manner, would like to bring it down immediately.
                    
			            - By Logan  Harris
- Mar 01, 2018
 
            
                
	                
                    
                                        
		            
                    Most of us can recall our elders offering the sage counsel of “moderation in all things.” It seems that dated phrase has become quite apropos once again especially as it applies to the discussion of the lumens needed in flashlights for law enforcement and security staff. 
                    
			            - By Kenneth  White
- Mar 01, 2018
 
            
                
	                
                    
                                        
		            
                    It is exciting times for physical security today. Technology has advanced at breakneck speeds, quite significant for an industry that seemed to stand still for decades. 
                    
			            - By Joseph M.  Holland
- Mar 01, 2018
 
            
                
	                
                    
                                        
		            
                    Recurring Monthly Revenue, almost always referred as RMR, is probably the most important metric of any subscription business.
                    
			            - By Ralph  C. Jensen
- Mar 01, 2018
 
            
                
	                 
                    
                                        
		            
                    Blockchain, the backbone technology behind Bitcoin, has grown exponentially since its inception in 2008. Since 2013, Google searches of “blockchain” have risen by 1,900 percent.
                    
			            - By Jaikishan  Rajaraman
- Mar 01, 2018
 
            
                
	                 
                    
                                        
		            
                    Milestone teams up with NMS Security, SpotterRF and Polar Bears International to deploy a unique camera/radar solution to help the city of Churchill, Manitoba keep citizens and polar bears at a safe distance from each other. 
                    
			            - By Courtney  Pedersen
- Feb 28, 2018
 
            
                
	                
                    
                                        
		            
                    FLIR Provides Over 300 Cameras and Video Management Software to Increase Security Surveillance at Athlete Village and City Perimeter Protection 
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    E-passports store a cryptographic signature to prevent forgeries and tampering, but CBP has not deployed the software needed to verify the information, causing a security lapse. 
                    
			            - By Jessica  Davis
- Feb 27, 2018
 
            
                
	                 
                    
                                        
		            
                    Due to the success of DDoS attacks, attackers are constantly evolving their techniques, so that they can target more organizations at once.
                    
			            - By Robert  Hamilton
- Feb 26, 2018