In recent years, video surveillance has experienced a constant and rapid evolution of both technology and use cases for IP video in the traditional life safety and loss prevention worlds.
- By Vince Ricco
- Sep 01, 2018
One of the drivers for cloud adoption is that cloud security has expanded significantly. As confidence in these platforms grows, demand is rising to use trusted identity solutions in the cloud and benefit from its many advantages
- By Ian Lowe, Mark Robinton
- Sep 01, 2018
By definition, cash-in-transit (CIT) is the physical transfer of banknotes, coins, credit cards and items of value from one location to another.
- By Travis Ferry
- Sep 01, 2018
If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property.
There is little question that the Southern U.S. border is porous; people stream into the United States at will. There is a great need for security; and the best technology should be used.
- By Ralph C. Jensen
- Sep 01, 2018
If you think your dealership isn’t conducive to outside pressures, ask the merchants of Smalltown, USA, about that new Walmart going up on the outskirts of the municipality.
- By Scott Lindley
- Sep 01, 2018
People are fallible creatures. As the saying goes, nobody’s perfect.
- By Jason Cronk
- Sep 01, 2018
Healthcare institutions face a variety of cybersecurity challenges, and the threats continue to grow and evolve. Hospitals are particularly vulnerable to data breaches and ransomware attacks because of the high value of healthcare data
- By Sheila Loy
- Sep 01, 2018
Google Chrome is largely considered one of the most security-conscious browsers, but recent headlines revealed some of its weaknesses.
- By David Pearson
- Sep 01, 2018
Drones can provide significant benefits for residents and business in rural areas: delivering medical supplies, collecting data on the status of crops, aiding in search and rescue efforts.
- By Matthew Leonard
- Sep 01, 2018
With the high availability of today’s mobile network coverage and accessibility to public Wi-Fi hotspots, secure connectivity is often overlooked by traveling professionals.
- By Julian Weinberger
- Sep 01, 2018
Wi-Fi is a technology based on the IEEE 802.11 suite of standards that uses radio frequencies (RF) extend wired Ethernet-based local area networks (LAN) to Wi-Fi-enabled devices, allowing the devices to receive and send information from the internet.
- By Andrew Jimenez
- Sep 01, 2018
We all are talking to machines these days. We talk to assistants in our home, in our cars and on our phones. By using our voice, we feel more engaged. We also become more productive, freeing our hands and minds for other tasks.
- By Jim Hoffpauir
- Sep 01, 2018
About two million people are affected by workplace violence every year in the United States. Some of these people are parking enforcement officers.
- By Chris Yigit
- Sep 01, 2018
The surveillance technology initially installed at the site was triggered by outdoor motion sensors that activated any one of several PTZ cameras for verification—unfortunately this set-up generated far too many false alarms to be effective.
- By Suzi Abell
- Sep 01, 2018
Cloud technology began with the concept of grid computing— the idea that we could replicate the way a power grid in a country was set up.
- By Peter Boriskin
- Sep 01, 2018
Technology innovations are being introduced to the market at an increasingly accelerated pace and the established multi-national companies that have long enjoyed strong market shares and growth rates are being challenged by hundreds of startups.
- By Robert Lydic
- Sep 01, 2018
New Program puts 88 more cameras on Albuquerque’s streets.
- By Jordan Lutke
- Aug 31, 2018
A man defied security measures to kill his bedridden wife and himself, rattling hospital staff.
- By Jordan Lutke
- Aug 31, 2018
A man faces a criminal charge after police say he threatened to commit a mass shooting at a school using a 3D-printed gun.