While bandwidth is widening, larger video systems and more advanced megapixel cameras are continuing to push the throughput limits of network piping. Fortunately, new compression methods such as H.264 are available to help keep surveillance data flowing.
June 01, 2009
Gang way, the Megapixel Revolution is upon us! No, it’s not the latest “Transformer” movie blockbuster but rather the coined phrase signifying the arrival of superior video surveillance technology. This, the first of a four-part series, has been designed to transform you into an expert on the topic.
March 01, 2009
So you’ve sold your client on an electronic access control system (EACS). Now it’s time to tackle the more complex issues with placing the EACS on the enterprise network. You’ll also want to help the end user leverage the thousands of transactions the system creates, plus develop the range of systems that can be integrated into the EACS.
October 01, 2008
The essential function of an electronic access control system (EACS) is to control access. But it is software that enables users to make the most of EACS hardware, including the ability to enhance alarm monitoring, control auxiliary devices and integrate badging solutions.
September 01, 2008
Security Contractors have layers of technology to consider when designing an electronic access control system. Depending on end user needs and budget constraints, solutions will involve entry point controls, multitechnology credentials, system configuration concerns and more.
May 01, 2008
Devising an electronic access control system begins with a detailed understanding of an end user's expectations and requirements. A system design can then be developed by following an initiative that aims to achieve four specific access control goals.
March 06, 2008
Deploying IP cameras necessitates not only an indoctrination of networking concepts, but also a firm grasp of analog video and how to translate those design principles into the language of digital surveillance. Sizing up an application calls for equal consideration of a range of factors, such as purpose, location, light, bandwidth and image size.
September 01, 2007
As the size of broadband pipelines continue to increase, the amount of data seems to expand right along with them. Therefore, the bandwidth consumed by IP video system transmission continues to be paramount.Fortunately, there are numerous compression solutions available to help.
August 01, 2007
Whether a system is analog, hybrid or entirely IP-based, it’s all for naught if the camera fails to capture quality images.While it’s true many of the optimizing principles of older analog cameras apply to their IP successors, the technology introduces enough new wrinkles to keep even the most skilled integrators on their toes.
May 01, 2007
Networked video surveillance systems are at the forefront of the convergence of IT and physical security. However, no matter what the delivery method, the proven, time-tested principles of CCTV system design remain vital. Applying these theories to IP-based systems can help overcome some inherent shortcomings.
March 01, 2007