Protecting pieces of history with a video surveillance solution based on machine-to-machine (M2M) communications.
- By Markus Breitbach
- Aug 02, 2013
It's time to recharge your iPhone battery, but before you plug in make sure it’s not a “Mactan!”
- By Ginger Hill
- Aug 01, 2013
After dealing with proprietary systems that did not “play well” with each other, Mercy made the decision to replace them with non-proprietary, enterprise-level systems through Lenel.
- By Paul Baratta
- Aug 01, 2013
Some equipment vendors can be hesitant when financing their customers. However, vendor financing is a significant way to gain a strategic advantage over the competition.
- By Mark Scardigli
- Aug 01, 2013
Remote situational awareness provides operators, security personnel and first responders with decision making data to appropriately and effectively respond to perceived threats.
- By Justin Thompson
- Aug 01, 2013
Everyone loves a good story, especially if there is a bit of patriotism, some struggle and a sprinkle of romance. And, throw in a flight from communist dictatorship to America, it might mean tears to your eyes.
- By Ralph C. Jensen
- Aug 01, 2013
The Grundfos-Indianapolis manufacturing facility in Indiana, a plant that produces a broad selection of water pumping equipment, much of which results in small to large fire pump systems for commercial facilities, was in need of a fire alarm upgrade.
- By Brian Carlson
- Aug 01, 2013
An electronic security and fire alarm company can be a great business for many reasons, including the ability to be successful at a range of company sizes or the fact that barriers to entry can be fairly low.
- By Jim Wooster
- Aug 01, 2013
Joe from ABC Company has had the same security management system for 15 years in all of his buildings. He likes it; he knows it inside and out, and he can give training classes to his security guards on how to use it.
- By Kim Rahfaldt
- Aug 01, 2013
The success of ASAP didn’t happen overnight. In fact, there have been several efforts to help deal with alarm monitoring over the past 20 years.
- By Lindsay Page
- Aug 01, 2013
The term wide dynamic range (WDR) is used to describe the function of a camera designed to produce clearer, more actionable images and/or video in circumstances where back light and intense illumination can vary excessively, especially when both very bright and very dark areas are simultaneously present in the camera’s field-of-view.
- By Wendi Burke
- Aug 01, 2013
As more systems are going online, the more these systems rely on a wireless backbone to deliver security in a world filled with technology, smartphones and tablets.
- By Ralph C. Jensen
- Aug 01, 2013
In the world of product distribution, Tri-Ed Distribution means business. In fact, President and CEO Pat Comunale is so excited about the security industry’s future, he plans to bring five, recently-acquired, data solutions centers into the security vertical.
- By Ralph C. Jensen
- Aug 01, 2013
In the 1980s, a keynote speaker at a Novell Users Group meeting said, “All things will become IP.” It was almost certain the industry would adopt Asynchronous Transfer Mode, or ATM, as a more secure and deterministic networking technology.
- By Vince Ricco
- Aug 01, 2013
Zoom cameras allow targets from hundreds of feet away to be viewed up close, while megapixel cameras can cover larger areas with fewer cameras. But is it really that simple?
- By Aaron Tankersley
- Aug 01, 2013
A common misperception among security system integrators is the notion that an IP surveillance network must be separate and distinct from corporate or campus data, and the voice network. However, having a separate, distinct network for video surveillance comes with a price.
- By Steven Olen
- Aug 01, 2013
Traditionally, homebuyers have been most interested in modern kitchens or high-tech home features. And for most homebuyers, a lock was just that… a lock.
- By Keith Brandon
- Aug 01, 2013
THE George Zimmerman zooms through Texas...or at least tries to.
- By Ginger Hill
- Jul 31, 2013
Redamak’s faces challenges ranging from theft to fraud to employee safety.
IHS tracked the current adoption rates of wireless download technology across each vertical market.