Articles Search Results

1887 Articles and 7 related Products found for user
  • Widespread Texas border school district upgrades security from analog to IP
    Milestone Systems' open platform IP video management software (VMS) is the flexible foundation for continuing expansion by the Mission Consolidated Independent School District (Mission CISD) in South Texas. Their previous analog systems had too many limitations such as low resolution and stationary
    Editor / Provider: Milestone Systems | Updated: 10 / 16 / 2015
  • Financial benefits of security as a service for systems integrators
    The security industry is going through a tough phase - revenues are not growing much, sales margins aren't as wide as they used to be, and profits are increasingly difficult to make. In this context, security as a service comes as a refreshing mode of income for the systems integrator.
    Editor / Provider: Prasanth Aby Thomas | Updated: 10 / 8 / 2015
  • Samsung updates iPOLiS mobile app
    The latest version of the Samsung iPOLiS mobile app now has a host of new features designed to make it even easier to remotely gain access to live images in HD via a smartphone or tablet and avoid unauthorized access to confidential data.
    Editor / Provider: Samsung Techwin | Updated: 10 / 6 / 2015
  • Tyco Security Products introduces iSTAR Ultra SE with scalable, advanced features
    Tyco Security Products, part of Tyco, the world's largest pure-play fire protection and security company, introduces iSTAR Ultra SE, a special edition iSTAR Ultra door controller that supports up to 32 readers, and combines iSTAR Ultra features with a ‘Pro mode' that ensures flexibility and compatib
    Editor / Provider: Tyco Security Products | Updated: 10 / 2 / 2015
  • ADLINK media cloud server with MediaManager software for high-performance transcoding
    Video surveillance technologies are widely used in urban security systems today. Intelligent video analytics are an important aspect of video surveillance technology, using image recognition processing to identify the existence of security threats that have already occurred or may occur in the futur
    Editor / Provider: Sponsored by ADLink | Updated: 10 / 12 / 2015