SSI logo

Resources

Top Story

Selling Video Surveillance With Vision: How to Maximize Your Value Proposition

This FREE one-hour Webinar from Security Sales & Integration and sponsored by Western Digital will equip attendees with what they need to know and do to deliver business-based video surveillance solutions.


Latest in Resources

Although megapixel cameras may not be necessary for all applications, there are many where their technology provides an undeniably superior solution. Features like greater detail and wider coverage make them ideal for identification and forensic purposes. By Bob Wimmer · August 25, 2009

Although megapixel cameras may not be necessary for all applications, there are many where their technology provides an undeniably superior solution. Features like greater detail and wider coverage make them ideal for identification and forensic purposes. August 01, 2009

While bandwidth is widening, larger video systems and more advanced megapixel cameras are continuing to push the throughput limits of network piping. Fortunately, new compression methods such as H.264 are available to help keep surveillance data flowing. By Bob Wimmer · June 25, 2009

While bandwidth is widening, larger video systems and more advanced megapixel cameras are continuing to push the throughput limits of network piping. Fortunately, new compression methods such as H.264 are available to help keep surveillance data flowing. June 01, 2009

Gang way, the Megapixel Revolution is upon us! No, it’s not the latest “Transformer” movie blockbuster but rather the coined phrase signifying the arrival of superior video surveillance technology. This, the first of a four-part series, has been designed to transform you into an expert on the topic. March 01, 2009

So you’ve sold your client on an electronic access control system (EACS). Now it’s time to tackle the more complex issues with placing the EACS on the enterprise network. You’ll also want to help the end user leverage the thousands of transactions the system creates, plus develop the range of systems that can be integrated into the EACS. October 01, 2008

The essential function of an electronic access control system (EACS) is to control access. But it is software that enables users to make the most of EACS hardware, including the ability to enhance alarm monitoring, control auxiliary devices and integrate badging solutions. September 01, 2008

Security Contractors have layers of technology to consider when designing an electronic access control system. Depending on end user needs and budget constraints, solutions will involve entry point controls, multitechnology credentials, system configuration concerns and more. May 01, 2008

Devising an electronic access control system begins with a detailed understanding of an end user's expectations and requirements. A system design can then be developed by following an initiative that aims to achieve four specific access control goals. March 06, 2008

Deploying IP cameras necessitates not only an indoctrination of networking concepts, but also a firm grasp of analog video and how to translate those design principles into the language of digital surveillance. Sizing up an application calls for equal consideration of a range of factors, such as purpose, location, light, bandwidth and image size. September 01, 2007




EDITOR'S CHOICE