Whether it was “Goldilocks and the Three Bears,” “Hansel and Gretel” or “Red Riding Hood,” we all had our favorite fairy tales as children. As adults, it seems these stories fade into the background of our memories, only remembered if we have children of our own.
- By Ginger Hill
- Oct 01, 2013
Frank DeAngelis has given his all to the students and community of Columbine High School. Now, 14 years after the tragic shooting, DeAngelis is retiring as school principal.
- By Ralph C. Jensen
- Oct 01, 2013
Because of the advantages in the transmission of both audio and video data, as well as control signals, IP-based surveillance has caught on in recent years. The data provided can be synthesized into new, custom build-outs that allow the support of HD images, analytics for operational purposes, local or remote video storage, remote control and monitoring.
- By Todd Flowers
- Oct 01, 2013
Businesses set goals, and employees are involved in meeting those benchmarks, year in and year out. The same is true in the security monitoring business, which translates to complete security for homeowners.
- By Ralph C. Jensen
- Oct 01, 2013
Remote monitoring of critical infrastructure used to be very difficult, but thanks to available technologies, this task can be achieved with a fraction of the resources required in the past.
- By Matt S. Nelson
- Oct 01, 2013
Like many small town police departments seeking to maintain neighborhood safety, the Village of Glenwood, Ill., needed to squeeze every ounce of value from its law enforcement tools.
- By John Bartolac
- Oct 01, 2013
Tyco’s Global Accounts Program meets the needs of some of the largest, highprofile, enterprise customers in the world. At the heart of the global account program, Tyco’s Global Center of Excellence (GCoE) provides global program management and programming services for unified security throughout an enterprise.
- By Renae Leary
- Oct 01, 2013
When the owner of a 7,000 sq. ft. RadioShack warehouse in Fort Worth, Texas worried about his space’s security, he decided to install a video-verified alarm system.
- By Jamie Friedlander
- Oct 01, 2013
Five or six years ago, when PDAs began taking on the characteristics of today’s Blackberries, iPhones and Androids, video surveillance manufacturers rushed to develop mobile capabilities.
- By Dan Cremins
- Oct 01, 2013
Wireless devices are everywhere. They are in our homes and offices in the form of mobile smart phones, tablets and personal computers, among other things.