Archive for April 2017

, , , , ,

By the Power of Ethernet

PoE gives smaller facilities more access control options Physical electronic security for non-enterprise applications is now as simple as tapping into the nearest Ethernet connection to power and control doors via web browser and low-voltage access and egress devices. There are a variety of cost-effective, code-compliant, low-power solutions for electronic access control of door openings…

Keep Reading »
, , ,

More than Just a Silver Lining

Using the cloud for access control enhances scalability, availability, resiliency, flexibility and security The power of the public cloud has become a catalyst for a dramatic shift in the information systems and security worlds. On-premises solutions no longer exist in many domains, from customer relationship management to expense management to human resources systems to learning…

Keep Reading »
, , , ,

Getting on the Path

Shortest Path Bridging can enhance network performance and efficiency Darren Giacomini, BCDVideo As the world of surveillance evolves, the introduction of multi-sensor and megapixel cameras presents a dynamic shift in industry accepted standards. For years, we have known the limitations of pan-tilt-zoom (PTZ) cameras, often finding them looking in one direction, only to miss critical…

Keep Reading »
,

Up in the Air

Drones powered by artificial intelligence could transform security Drones are powerful. They are changing our existence. They are here to stay. This article examines a drone application with the potential to have an extraordinary impact on the physical security industry. It is called robotic aerial security (RAS). What Is Robotic Aerial Security? RAS is sometimes…

Keep Reading »
Using multiple biometric markets and factors for authentication
, , ,

Walk this Way, Talk this Way: Using Multiple Biometrics

Combining gait analysis, voice recognition and other biometric identifiers provides a fraud-resistant security solution According to the statistics, terror attacks are continuing to climb as political climates heat up and radicals look for security weaknesses they can exploit to further their messages globally. The list of cities that have fallen victim to major attacks keeps…

Keep Reading »
Back to Top