Guest Authors's Latest Posts

Read: How A/V Integrators Can Best Serve Higher-Ed Institutions

How A/V Integrators Can Best Serve Higher-Ed Institutions

Education is an opportunity-rich sector for A/V integrators. But the needs of colleges and universities often differ substantially from clients in other verticals.

Read: Is Vehicle Control Becoming the Key to Access Control?

Is Vehicle Control Becoming the Key to Access Control?

A mismanaged parking lot and vehicle access can lead to an end user’s building (or your own company) being vulnerable to a security breach.

Read: Cautionary Note to Commercial Integrators: Avoid Race to the Bottom

Cautionary Note to Commercial Integrators: Avoid Race to the Bottom

Too many integrators serving SMB markets are competing in a race to the bottom. That’s a losing scenario, with slim margins taking a toll on profitability.

Read: Making the Case for External Illumination in Video Surveillance

Making the Case for External Illumination in Video Surveillance

Visible and infrared (IR) external illuminators offer a versatile solution for physical intrusion perimeter detection systems. Here’s why and tips for integration.

Read: How Mass Notification Systems Help Campuses Develop Active Shooter Response Plans

How Mass Notification Systems Help Campuses Develop Active Shooter Response Plans

Critical event management capabilities are providing campuses with more methods for handling emergency events, and it begins with planning.

Read: How RTLS Mobile Duress Tech Protects Healthcare Workers

How RTLS Mobile Duress Tech Protects Healthcare Workers

Real-time location systems (RTLS) provide staff duress solutions that prevent violent threats from escalating to dangerous events.

Read: NSCA Conference Chockablock With Business Intelligence

NSCA Conference Chockablock With Business Intelligence

NSCA’s Business & Leadership Conference (BLC) eschewed commercialism, instead focusing on actionable intelligence for integration leaders.

Read: Why Most End-User Threat Intelligence Is Awful (and What to Do Instead)

Why Most End-User Threat Intelligence Is Awful (and What to Do Instead)

Threat intelligence is a collection of data containing known dangerous and suspicious IP addresses, domains, email addresses, file hashes and attacker groups.

Read: U.S. Cyber Agency, Others Warn Ukraine Crisis Could Lead to More Cyberattacks

U.S. Cyber Agency, Others Warn Ukraine Crisis Could Lead to More Cyberattacks

As more tech firms fall victim to cyberattacks, experts warn threats could increase in the wake of Russian aggression against Ukraine.

Read: The State of IT, Security and the Transportation Industry

The State of IT, Security and the Transportation Industry

These IP/IoT systems are here and customers are more keen to wanting integrated and unified platforms in order to see all of their systems under one hood.

1 15 16 17 18 19 75
Get Our Newsletters