So you’ve sold your client on an electronic access control system (EACS). Now it’s time to tackle the more complex issues with placing the EACS on the enterprise network. You’ll also want to help the end user leverage the thousands of transactions the system creates, plus develop the range of systems that can be integrated into the EACS.
October 01, 2008
The essential function of an electronic access control system (EACS) is to control access. But it is software that enables users to make the most of EACS hardware, including the ability to enhance alarm monitoring, control auxiliary devices and integrate badging solutions.
September 01, 2008
Security Contractors have layers of technology to consider when designing an electronic access control system. Depending on end user needs and budget constraints, solutions will involve entry point controls, multitechnology credentials, system configuration concerns and more.
May 01, 2008
Devising an electronic access control system begins with a detailed understanding of an end user's expectations and requirements. A system design can then be developed by following an initiative that aims to achieve four specific access control goals.
March 06, 2008
Deploying IP cameras necessitates not only an indoctrination of networking concepts, but also a firm grasp of analog video and how to translate those design principles into the language of digital surveillance. Sizing up an application calls for equal consideration of a range of factors, such as purpose, location, light, bandwidth and image size.
September 01, 2007
As the size of broadband pipelines continue to increase, the amount of data seems to expand right along with them. Therefore, the bandwidth consumed by IP video system transmission continues to be paramount.Fortunately, there are numerous compression solutions available to help.
August 01, 2007
Whether a system is analog, hybrid or entirely IP-based, it’s all for naught if the camera fails to capture quality images.While it’s true many of the optimizing principles of older analog cameras apply to their IP successors, the technology introduces enough new wrinkles to keep even the most skilled integrators on their toes.
May 01, 2007
Networked video surveillance systems are at the forefront of the convergence of IT and physical security. However, no matter what the delivery method, the proven, time-tested principles of CCTV system design remain vital. Applying these theories to IP-based systems can help overcome some inherent shortcomings.
March 01, 2007
As networked video becomes more prevalent, security contractors are faced with either learning the technology or greatly limiting their relevance. To a large extent, however, it is a case of fearing the unknown. Aside from some new terminology and basic concepts, the fundamentals of troubleshooting network-based systems are similar to those of traditional surveillance systems.
September 01, 2006
Serious video system troubleshooting calls for serious tools, such as an oscilloscope. Find out how to select, set up and use this electronic testing device to analyze video waveforms and solve even the most challenging system malfunctions.
August 01, 2006