June 2011


Features

Preparing for the Survey

Scheduling safety and security audits to complement the accreditation process can be a wise strategy

By Matthew Conrad

In the not-too-distant past, preparing for a survey by The Joint Commission meant ensuring that not only the facility but also all policies, procedures and documentation were well-prepared and ready for scrutiny during one specific week every three years. Anyone who has worked in a hospital knows how stressful this was and how the survey process has changed in recent years.


Monumental Security

North American university finds success with major security overhaul

By Tim Neary

With a larger student population than any other university in North America and more than 200 facilities spread across three campuses, the University of Toronto is a vast and diverse institution, rich in history and culture. In addition to being internationally known and recognized for its research and teaching, the university is now a model of security, thanks to careful, coordinated planning and integrated technology.


Meeting All the Requirements

Software configuration synchronizes fire and life safety systems

By Todd Alford

Comprising two interconnected threestory buildings, Silvercreek Premier Retirement Living overlooks the Cherokee Valley Golf Course in Olive Branch, Miss. Silvercreek has 98 luxury apartments and offers catered independent and assisted living opportunities. Because it is a retirement facility catering to a senior community, the design of the fire system posed some unique challenges for AlarmTec Systems of Memphis, Tenn., designer and installer of the fire system.


Load-Balancing Security

Distributed network architecture provides scalability in industry environment

By Warren Brown

Global enterprises and large, multi-site hospitals, universities and government agencies are increasingly facing a common challenge: how to bring all of their disparate buildings into an easy-to-manage enterprise security system. Most multi-site organizations have a variety of sites that range in size from small branch offices to large, multi-building campuses.


Coming of Age

Wireless mesh enables fixed, portable and mobile video applications

By Ksenia Coffman

Wireless transmission for security is often used in outdoor settings where there is not existing wired infrastructure, or where it’s cost-prohibitive or impractical to implement wired solutions. Wireless networks also are ideal for temporary installations such as special events, fairs or rallies, as well as longer-term installations, such as construction sites.


Departments

A Conversation with Ed Strong

Western Digital is making waves in the mergers and acquisitions market by buying Hitachi Global Storage. With the economy making a rebound, we wanted to know more about the company and its plans for the future, so we talked with Ed Strong, director of Western Digital’s CE business unit.


Securing the Perimeter

Automated detection solutions prevent crime before loss occurs

By Rolland Trayte

Security technologies are valuable for their ability to deter criminal and illegal behavior. The visible addition of security cameras to highcrime areas reduces criminal activity significantly. But video surveillance isn’t the only valuable service or system that effectively reduces crime. The presence of security guards also limits illicit activity that leads to loss or damage, and regular visible patrols restrict the opportunity for violence.


New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.