SSI logo

Other

Top Story

ASG Enters Eastern Tennessee Market With Fleenor Security Buy

Full-service security provider Fleenor Security brings super-regional ASG $210K in recurring revenue and 5,200 commercial and residential customers.


Latest in Other

Panasonic, Mitsubishi and others are working to deploy advanced ID authentication, wireless video surveillance, bomb detection, facial recognition and other security measures ahead of the 2020 Olympic games in Tokyo. SSI Staff · February 24, 2015

A Shields Business Solutions worker walked into the firm and opened fire, shooting one of his coworkers multiple times before turning the gun on himself. SSI Staff · February 23, 2015

The annual conference hosted by Park Associates provided key insights from executives from energy providers, device manufacturers and technology companies. SSI Staff · February 20, 2015

A professional hacker claims to breach multiple security systems and connected devices, including intercepting video streams. SSI Staff · February 20, 2015

Fire/life-safety professionals report rising awareness — and confidence in — wireless fire detection systems. SSI Staff · February 20, 2015

For the third year, Axis Communications will lend LAPD its video surveillance technology for the Academy Awards. SSI Staff · February 20, 2015

Full-service security provider Fleenor Security brings super-regional ASG $210K in recurring revenue and 5,200 commercial and residential customers. Rodney Bosch · February 18, 2015

The current PACS architecture significantly limits access control system capabilities. This paper explains why next generation PACS architecture is long overdue: it presents the critical IT-aligned attributes and capabilities that next generation PACS architecture must possess. February 18, 2015

John Jabbusch started the company in the basement of his Siler City, N.C. home. Today the company serves government, education, health-care and commercial markets. SSI Staff · February 17, 2015

Although an organization’s computer network is normally built to deal with large amounts of data, including that of video surveillance applications, installing security contractors need to fully leverage the functionalities of the end user’s IT investment to optimize bandwidth capacity. Learn principles behind proper cabling uses, bit rate control fundamentals and more. The increasing need to transmit digital information from point to point has created various networking challenges for installing security contractors. This FREE download from Security Sales & Integration delves into the cabling and other infrastructure that determines the amount of bandwidth a network can achieve, along with insights into different transmission methodologies. February 17, 2015




EDITOR'S CHOICE