April 2012
- WIRELESS TECHNOLOGY - Indoor Wireless Path Loss
- PERIMETER SECURITY - Into the Future
- CLOUD STORAGE - Creative Uses for Hosted Video Sureillance
- SECURITY SOFTWARE - Keeping Up with the Tools
Features
By Rolland Trayte
Cell towers and accompanying cell sites attract more attention in the area of security than ever before.
By Patricia Logue
Susceptibility to an attack begins with an unprotected perimeter. In the past, an unprotected perimeter often meant the opportunity for myriad security breaches, loss of assets and the chance for loss of human life.
By Matt Krebs
Hosted video has leveled the playing field for many small businesses looking to secure their properties with the latest network surveillance technology.
By Del V. Salvi
There are hundreds of specialized tools used on a daily basis at the United Airlines jet engine rebuild and test facility, a 20-acre maintenance and operations center adjacent to San Francisco International Airport.
By Kim Rahfaldt
Since 1925, northern New Jersey has turned to Holy Name Medical Center in Teaneck for healthcare excellence.
By Mike Derby
Unlike digital systems, trying to quantify the range performance of radio frequency (RF) communication systems can be difficult due to the large role the environment has on radio frequency signals.
Departments
By Samuel Shanes
Integration of multifaceted security systems can be a serious challenge. Using cameras, call boxes, mass notification systems and access control readers together is a difficult but increasingly common goal.
By Ralph C. Jensen
We have a pretty diverse lineup of events to talk about in this month’s issue of Security Products magazine. We begin with our cover feature from Michael Derby, the founder and chief technology officer at AvaLAN Wireless.
Supplement
By Ian Johnston
The development of custom video drivers is a huge barrier for less-established brand names. From a stand-alone camera manufacturer’s perspective, it is impossible to gain market share without being included in the more popular VMS platforms. Without strong market share, however, VMS companies cannot devote the time or the energy to support these lower-tier brands.
By TJ Kennedy
Its deputies in the field were being asked to make do with an old, end-of-life mobile data terminal (MDT) system that it had been using for more than two decades.
By Steve Surfaro
Both physical security and IT professionals place great importance on cyber security.
By Ben Bradley
Emergency preparedness requires critical communications to be response ready—help can’t wait when disaster strikes.
By Samuel Shanes
The town of Oyster Bay, part of the New York metropolitan area, is the only town in Nassau County that extends from the North Shore to the South Shore of Long Island.
By Lee Caswell
Surveillance data is critical in applications ranging from retail to government, and gaming to transportation.
By Dan Myslewski
When selecting a partner for your government security program, it’s important to keep in mind the four C’s that lead to success: commitment, compliance, coverage and communication.