Since it began operating in 2006 as Pennsylvania’s first slots casino, Mohegan Sun at Pocono Downs has offered a little bit of everything. Spread across 300,000 square feet, the 24-hour gaming and entertainment complex boasts 2,500 slot machines, electronic blackjack and roulette and live harness racing, along with upscale restaurants, a food court and an expansive shopping area.
Start the New Year off right by upgrading your security system to the latest technology. Analog has been going out of style over the past few years because it is easier than ever to migrate to an IP solution.
This recording station appliance from Bosch manages an entire surveillance infrastructure, and is perfect for banks, retail environments, schools, gas stations, and any installation spread over multiple locations.
The eye in the sky can now see better than ever. New Internet protocol (IP)-based megapixel cameras are becoming more common in the casino environment, bringing with them advantages such as clearer images, better resolution and the ability to cover larger areas with fewer cameras. Surveillance systems that incorporate megapixel or high-definition (HD) cameras are better equipped to monitor fast-paced gaming action and better able to differentiate the suits of a playing card, the numbers on a die, or the quick moves of a cheater looking for an advantage over the casino.
For the last four years, Axis Communications Inc., Chelmsford, Mass., has hosted the members of its A&E program at an annual technology summit. This year, the Axis A&E Technology Summit 2011 begin at the Rosen Shingle Creek Resort in Orlando, Fla., and then took to the high seas, as attendees enjoyed a three-day cruise to the Bahamas aboard the Royal Caribbean’s Monarch of the Seas vessel.
Advances in IP video technology have expanded the use of video surveillance from the closed circuit television (CCTV) application, to applications that can improve virtually every aspect of a business – streamlining operations to increased protection and safety of facilities, inventory and staff.
And then found. Among the cameras, servers, alarms, readers, smart cards and other dazzlers at last month’s ISC West in Las Vegas, the technology-centric security trade show, a reasonably new face appeared, seemingly out of thin air. Call it cloud computing or hosted services or remote managed services or software as a service or video as a service.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!