- Capturing Teachable Moments
- The Zoo at Night
- A Strategic Approach
- Connecting Disparate Systems
- More Comfortable Operations
- The Value of a Smart Home
How one university uses network video to train next-generation speech and language pathologists
When you’re conducting a therapy session, it’s virtually impossible to be fully engaged with the client and be an objective observer of your own interactions at the same time.
Giving customers a unique experience thanks to security features
The fierce competition in the hospitality market has created a need to think creatively in order to increase the number of visitors. Therefore, Copenhagen Zoo constantly looks for new ways to give their customers an interesting and out-of-the-box experience.
Retrofit brings a sharper image to command center
Throughout the world, security and screening for explosives is a vital service for numerous types of businesses and organizations—from package transport to government agencies and to financial institutions.
Scalable security is the way of networking an IT infrastructure
The security industry is under attack by buzzwords, and the Internet of Things (IoT) is one of a few leading the assault.
Multiple-vendor link access control systems across all geographic locations
NERC compliance requirements in the utilities industry have made it essential to monitor and report on physical access to various facilities, control rooms, substations and critical assets.
It’s been two weeks and it’s time for me to introduce the latest video surveillance technology to the daycare center. They need to install IP cameras, so I can clearly see what that baby girl is doing, and make sure she is treated like I expect my granddaughter to be treated.
During the past 10 years there have been some magnificent technological innovations in the security industry, but the pace of change has never been higher.
Audio is a vital component in the security industry. For years, companies have focused on video, trying to perfect image capture, data storage and analytics.
Don’t forget to lock the obvious front door to your network
Security managers are more aware than ever that information security requires a layered approach with components addressing every point of intrusion on the corporate network.
Taking a look at a holistic information security perspective
Now more than ever, major network vulnerabilities are making national and international news headlines.
Increased security concerns, availability of IP networks, camera sprawl and improvement in video content analytics are all contributing to a rapid growth in the amount of video surveillance data that federal agencies are gathering today.
Protecting the network with your sensitive business data
Are your physical security devices attached to the same network as your sensitive business data?
Whenever I receive a cover story from Vince Ricco I listen, and I learn. I’ve known Vince for quite a while, and when he asks if your security devices are connected to your sensitive business data, it really makes you think.
In Utah, locals refer to the Orem/Provo area as Happy Valley. It is a quiet, conservative college town, but all this doesn’t stand in the way of building a booming business.
High definition analog technology competes with IP cameras
Mastering the alphabet used to be as simple as learning your ABCs. Not anymore. A whole new alphabet has been created for the world of analog video. Don’t try to sing this one to the “Alphabet song” we all grew up with. It doesn’t work. Trust me. I just spent 15 minutes trying.
Five Steps Dealers Can Take to Reduce False Alarms
Everybody knows the old saying that the only things certain in life are death and taxes. But, alarm dealers understand that there’s a third certainty: false alarms.
6 hidden costs of “low-cost” cameras for the government market
There has been a noticeable increase in mass-produced, lowcost cameras available in the security industry. Low prices can be hard to resist, especially considering the tight budgets faced by government agencies at all levels.
Reducing the clutter of disparate systems
Beverly Hills, Calif., has been glamorized in countless film and television depictions as the home of the wealthy and the famous.
Solutions enable local agencies to maintain safe, secure environment
Cities are a challenge to secure and manage—they encompass a wide geographic footprint and include a multitude of key stakeholders comprising local, state and federal agencies along with a variety of private business entities and public organizations.