You’ve seen the ads, probably heard colleagues talking about a new option for video surveillance. It sounds pretty good and you’re thinking, “yeah, I think I’ll explore that for my next project”. Little to no upfront cost, a “free” system design, a predictable monthly fee, and no maintenance costs make this an option that’s difficult to ignore. These large, multi-national …
Selecting the Right Technology for Now and the Future
As I write this, we are working on several projects that require figuring out which technology will best suit the specific needs of a particular project. One involves new construction. Will the client best be served by installing underground conduit and running cable or fiber? The 4 buildings that make up the site are very close together so aerial cabling …
Perfecting facial recognition
We’ve been familiar with facial recognition technology for some time now. It has been in used in law enforcement and security circles since the mid-1990s in one form or another. More recently, the technology has been used at large scale events (Super Bowl) to identify terrorists, in Mexico to prevent voter fraud and by an increasing amount of private companies …
When your security devices get used against you
Every day, the world is becoming more connected. Our smart phones, our cars, even appliances in our homes are linked via the internet. Internet of Things (IoT) or Internet of Everything is shorthand for the opportunity to create new commercial value by making things smart. But, with the convenience that this may bring, it also brings security woes that stem …
Why Hire a Security Consultant – Reason # 6
You planned for it in your budget and now it’s time to get the work done; a complete overhaul of your outdated video surveillance system and the addition of an electronic access control system. You’ll need to obtain competitive bids and you absolutely need to get this right the first time. You’ve been advocating for money to make your campus …
Password Protecting your Security Cameras
Many users of IP based video systems may not be aware that each camera on your network has its own unique IP address. It is a device, connected to the internet just as your iPad, office computer or laptop is. And just as these devices are (or should be) protected by passwords to prevent unauthorized people from gaining access to …