Guest Authors's Latest Posts

Read: How GDPR and CCPA Compliance Requests Eat Away at Profits

How GDPR and CCPA Compliance Requests Eat Away at Profits

Without an understanding of where data is stored, how to access it or how to make a change, no request for consent or privacy data can be easily addressed.

Read: Why Open Standards for Interoperability Are Vital for Retrofit Projects

Why Open Standards for Interoperability Are Vital for Retrofit Projects

Open standards for interoperability, such as those offered by ONVIF, allow end users to add newer security components from multiple vendors as needed in the future.

Read: How to Leverage Remote Diagnostics

How to Leverage Remote Diagnostics

Remote diagnostics can greatly improve situational awareness when troubleshooting technical issues involving products and systems.

Read: How to Get Maintenance and Service Down to an RMR Science

How to Get Maintenance and Service Down to an RMR Science

SSI talks with maintenance and service specialists who explain coverage agreements, pricing, execution and more.

Read: Why Ascending Mobile PERS Market Is Ripe for Opportunity

Why Ascending Mobile PERS Market Is Ripe for Opportunity

The PERS market is estimated to reach more than $8.6 billion by 2022, with a large majority of market growth expected to be driven by the mPERS segment.

Read: 5 Reasons Veterans Are a Perfect Fit for the Security Industry

5 Reasons Veterans Are a Perfect Fit for the Security Industry

Allied Universal CEO Steve Jones explains how veterans entering the workforce already have identifiable skills that can be transferred to the physical security world.

Read: How Technology Partners Are Working With Monitoring Stations to Reduce False Alarms

How Technology Partners Are Working With Monitoring Stations to Reduce False Alarms

False alarm reduction is a real opportunity for professional security providers to differentiate themselves from DIY competitors.

Read: A Guide to Verified Alarm Trends and How to Utilize Them

A Guide to Verified Alarm Trends and How to Utilize Them

Video verification has been gaining momentum as the technology continues to improve and get less expensive. Find out about new technology, best practices and much more in this area.

Read: How WiFi Can Provide Robust and Reliable Wireless Video

How WiFi Can Provide Robust and Reliable Wireless Video

The 11ac Wave 2 WiFi standard combined with EnJet technology gives long-range, near-Gigabit performance capable of reliably streaming multiple IP cameras.

Read: How Dogs Could One Day Trigger PERS Devices & Other Alarms

How Dogs Could One Day Trigger PERS Devices & Other Alarms

A novel research program at the Georgia Institute of Technology is training dogs to communicate using wearable devices that can activate emergency alerts.

1 46 47 48 49 50 75
Get Our Newsletters