Articles Search Results

915 Articles and 5 related Products found for maintenance
  • How smart buildings differ across industries
    Key verticals for smart buildings and the associated big data applications are large buildings where besides high energy consumption there is also care and engagement with environmental issues.
    Editor / Provider: Israel Gogol, Freelancer | Updated: 2 / 8 / 2016
  • Top 10 case studies of 2015
    The top 10 most viewed case studies from 2015, with applications ranging from banks to hotels to stadiums and more!
    Editor / Provider: Eifeh Strom, a&s International | Updated: 2 / 2 / 2016
  • Saudi university upgrades to IDIS HD surveillance
    IDIS reported that it has delivered a comprehensive IDIS DirectIP HD surveillance solution for Majmaah University in Saudi Arabia to enhance safety for students and staff across multiple campus sites.
    Editor / Provider: IDIS Global | Updated: 2 / 2 / 2016
  • Looking into the pricing structure of managed security services
    The advent of cloud technology has changed existing business models in many sectors, including in the security industry. Software as a service is a common model now for both private and enterprise users. Companies can set up online stores using Amazon Web Services or manage their sales pipeline and
    Editor / Provider: Israel Gogol, Freelancer | Updated: 1 / 25 / 2016
  • Milestone Systems set to launch XProtect 2016
    Milestone Systems is set to launch the XProtect 2016 version of their VMS to maximize the business value of video management systems for partners and customers. The XProtect 2016 contains many new features to ease deployment of systems and to optimize systems operations.
    Editor / Provider: Milestone Systems | Updated: 1 / 14 / 2016
  • Ensuring data security in a hyper-connected world
    Video surveillance data is increasingly connected across local and global networks. An ever increasing number of network cameras send their data to servers over the Internet, where digital intruders and hackers loom. As a consequence, the focus of data security has long shifted from the physical lev
    Editor / Provider: Sponsored by BOSCH | Updated: 1 / 14 / 2016