Guest Authors's Latest Posts

Read: Why Most New Dome Cameras No Longer Need That ‘Bubble’

Why Most New Dome Cameras No Longer Need That ‘Bubble’

As the resolution of cameras has improved, the quality of the bubble cover cannot keep pace. Here are the positive effects of eliminating the bubble.

Read: Think Value, Not Megapixels: How to Sell Your HD Surveillance Cameras

Think Value, Not Megapixels: How to Sell Your HD Surveillance Cameras

Discover the latest video capabilities and features that further the security mission as well as bring customers added value.

Read: How to Ensure Your Customer Selects the Right Access Control Solution

How to Ensure Your Customer Selects the Right Access Control Solution

From keypads and mobile apps, to biometrics, this guide will help your customers choose the access control solution that fits best.

Read: How RFID Proximity Technology Can Do More Than Open Doors

How RFID Proximity Technology Can Do More Than Open Doors

Learn how companies are leveraging the cards employees are already carrying to control access to the information, systems, materials and devices their employees use at work.

Read: Amazon May Halt Selling of Facial Recognition Technology to Governments

Amazon May Halt Selling of Facial Recognition Technology to Governments

An upcoming vote by Amazon shareholders will determine whether or not its facial recognition software will be sold to governments in the future.

Read: LifeWay Christian Resources Upgrades Access Control at Nashville HQ

LifeWay Christian Resources Upgrades Access Control at Nashville HQ

LifeWay’s existing access control system was incorporated into Automatic Systems’ networkable security optical turnstiles.

Read: Wireless Sensor Security: How Manufacturers Are Securing Their Devices

Wireless Sensor Security: How Manufacturers Are Securing Their Devices

Wireless edge devices can be an easy backdoor for hackers to exploit. For security systems, this means sensors and new add-ons like doorbell cameras, smart locks and thermostats.

Read: 3 Essential Use Cases to Prepare for the AI Revolution

3 Essential Use Cases to Prepare for the AI Revolution

Next time artificial intelligence pops up in conversation, consider the following use cases where AI helps to significantly enhance security and life safety.

Read: When a Data Breach Occurs Will You Be Prepared?

When a Data Breach Occurs Will You Be Prepared?

While proper cybersecurity is integral, you should also develop a cyber incident response plan should a data breach occur.

Read: Keys to Increased Fire System Performance and False Alarm Reduction? Multisensor Detection.

Keys to Increased Fire System Performance and False Alarm Reduction? Multisensor Detection.

According to recent testing, multisensor detection has the potential to reduce the number of false alarms by up to nearly 40%.

1 52 53 54 55 56 75
Get Our Newsletters