April 2011


Features

A Better Line of Defense

How to ensure perimeter security meets your expectations

By John Bartolac

On the heels of the government’s reassessment of the SBInet program, or the virtual fence as it’s been called, officials from Department of Homeland Security Customs and Border Protection have decided that there are better ways to deal with the needs for perimeter security at the U.S.-Mexican Border.


Securing the Baby

Infant security programs: a safe way to differentiate your hospital

By Joel Harris

One of the greatest scenes in a hospital is that of newborns coming into the world. If you have been to a hospital recently, however, you may have noticed a change in policy in regard to the nursery. Gone are the days of people visiting the maternity ward just to see the newborns.


The Sweet Smell of Security

Teleflora stakes its reputation on virtual computing stability and performance

By Ryan Pope

Teleflora, the nation’s largest floral delivery network service, has chosen a 2X virtual computing solution to meet its call centers’ computing needs. The company chose to deploy the 2X ApplicationServer with load balancer along with the 2X ThinClientServer Enterprise Edition to optimize employees’ remote access to critical desktop applications.


Protecting a Public Water Supply System

Terror threats shake security to the very core of basic supplies

By James McGowan

The people of the United States maintained confidence in the safety and security of the public drinking water system even as the country endured World War II, the Korean conflict and the Cold War years. That changed after the attacks of Sept. 11, 2001. Their confidence shaken, the people had concerns. Was the public water supply system sufficiently prepared for the threats posed in today’s world?


From Offline to Wireless

Combining networking options has never been simpler

By Karen Keating

Why, users ask, must they choose between offline and online solutions? If online, why must they choose between wired and wireless? Why must they isolate technologies when they could choose them all, working under one system with only one database, to provide a holistic security and safety solution?


Farm-to-Fork Security

By Ronnie Rittenberry

Americans spend more than $1 trillion on food each year, and usually we get what we pay for. Built into the cost in most instances is the safety and security of the various ingredients, from the time they’re grown and prepared to the moment they enter our mouths. From that perspective, we enjoy one of the safest food supplies in the world. But the system’s not perfect.


Departments

A Conversation with Steve Carney

We wanted to know more about IP cameras and how technology began to deliver on the promise of connectivity, improved image resolution and the ability to manage bandwidth, so we talked with Steve Carney, senior product manager of IP cameras and encoders at Tyco Security Products.


Decentralized at the Core

Innovations in storage, camera technology bring high-res solutions to a broader market

By Steve Gorski

IP-based surveillance signals growth and opportunity for the integrator who knows how to determine the best deployment and camera configuration for specific infrastructures. At the same time, end customers ranging from municipalities, schools and large corporations to small retailers are taking advantage of price reductions and the enhanced capabilities of networked-based cameras to build large video surveillance networks.


Digital Edition

  • Security Today Magazine - May 2018

    May 2018

    Featuring:

    • The Changing Landscape
    • Booking an Upgrade
    • The Best Bet
    • Get Out of Our Space
    • Poised for Expansion

    View This Issue

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • School Planning & Managmenet
  • College Planning & Management
  • Campus Security & Life Safety