When you think about it, a cable splice is really the termination of two or more wires. And poor cable termination practices are the No. 1 technical problem for alarm system installation and service. Thus the need to discuss some time-proven cable splicing techniques.
With no apparent slowdown in sight for violent outbursts claiming innocent lives in areas where people gather, it is time to reassess all areas of access control. Find out how better practices and technology advancements can help the cause.
While video surveillance is the most overt example of the security industry’s technology advancement the past 20 years, too often it’s also a leading source of disappointment due to improper deployment and usage. Find out some of the system design techniques, features and best practices to optimize today’s impressive network video capabilities.
One of the most basic elements of an intrusion system is the alarm contact or switch used to secure doors, windows and other building openings. Although ubiquitous and not overly complex, alarm contacts nonetheless require the utmost attention to ensure proper alarm system operations.
Smart security practitioners know better than to ever underestimate the power of Mother Nature. That includes lightning strikes, which can wreak havoc for systems unless they are properly grounded and equipped with surge protection.
Unfortunately, there is no shortage of security systems installations gone wrong – sometimes with devastating and fatal consequences. Two in particular serve as departure points to review critical practices and grasp why wisdom trumps smarts.
While discussion regarding high definition surveillance video has overwhelmingly centered around IP connectivity, there is an alternative. HDcctv, an HD-SDI-based open industrial standard for transmitting uncompressed digital video over point-to-point coax links, offers advantages depending on the application.
Technological advancements in communication protocols and transmission methods are allowing building systems to achieve connectivity and functionality like never before. Learn how to provide clients with total system solutions that optimize the capabilities of security as well as its value proposition.