Imagine a world where license plate recognition (LPR) technology and advances in city-wide video surveillance make it possible to spot suspects and criminals so quickly and comprehensively that law enforcement
Common wisdom over the last couple of decades has been to never write down the passwords you use for accessing networked services. But is now the time to begin writing
As companies look more and more to active surveillance systems with video analytics, ease of installation and maintenance becomes increasingly important. The term “calibration” is an integral part of any
Megapixel camera technology provides real value and measureable Return on Investment (ROI) to end users and their resellers. The most evident value is the fantastic images that are produced by
The key to promoting a safe, secure workplace isn’t reactively managing crises through zero tolerance policies, but proactively creating a security-conscious environment and corporate culture. An important first step in
Working in the field of code development is akin to planting redwood trees – it takes a long time to see results, but success leaves a lasting footprint. In May,
Mobile donations are not new. But the unprecedented success of recent mobile fundraising efforts, such as the Red Cross Haiti earthquake mobile fundraising campaign that raised over $32 million, has
It was early afternoon in Boston when an off-duty security guard heard screaming in a clinic he was visiting in New England. Immediately responding, he found a man, Jay Carciero,
Data centers are no longer just resources to improve processes and productivity, but are becoming vast repositories of sensitive personal, enterprise and government information that dramatically impact how people interact
While Internet Protocol (IP)-based security systems have broken down the silos between surveillance, access control, and intrusion detection, Security (e.g. facility / physical security) largely remains isolated from the rest