Technology




Please key in code
Latest Articles
Optimizing behavior recognition with deep learning

Optimizing behavior recognition with deep learning

Behaviors like people fighting or having an argument can be dangerous to an end user organization and should be detected and dealt with as quickly as possible. To that end, artificial intelligence and...
Most Popular Article
  • Secure oil and gas facilities with Pelco's ExSite Enhanced explosion proof camera system
    Global energy demand is rising at a rapid rate. According to the U.S. Energy Information Administration, world energy consumption will grow by 56 percent between 2010 and 2040. This fact propels strong energy producers, such as oil and gas providers, to embark on extensive exploration and production...
    2017/09/26
  • ACRE cites inquiries, further acquisitions as rationale for Mercury sale
    The deal, whose monetary value isn’t disclosed and which is expected to close in Q4, is seen as mutually beneficial for ACRE and HID Global, whose physical access control lines are expected to get a further boost after the purchase.
    2017/09/26
  • What to ask when developing a perimeter protection plan
    Perimeter detection is usually the first line of defense for end user organizations. Designing an effective perimeter protection plan that takes various factors into consideration, for example the size of perimeters, the climatic patterns of the area as well as the technology used, is therefore impo...
    2017/09/21
  • Intercoms in upscale apartments: Design, user experience matter too
    High-end apartments are on the rise in major metropolises across the world. When installing door entry systems, developers are looking for products that provide exceptional design and user experience in addition to security. Vendors and their integrator partners that can offer solutions in this rega...
    2017/09/15
  • ACaaS: How it's influenced by IoT
    Due to the benefits it provides, ACaaS or access control as a service appeals to users in various vertical markets, including residential. At the same time, a migration towards IoT has also driven demand for ACaaS.
    2017/08/30
  • Enhance casino security and surveillance operations with enterprise VMS solutions
    Security and fraud reduction are major objectives in the gaming industry, and casinos and other organizations face significant challenges in addressing these challenges. In addition to safeguarding guests and employees, protecting critical assets, and striving to gather intelligence and data to prev...
    2017/08/29
  • ACaaS: Why residential sector sees pickup in deployment
    Access control as a service or ACaaS carries various advantages, one of the biggest being all doors are secured and managed centrally, saving the end user the need to monitor everything onsite and invest in related devices and equipment. It is due to this reason that ACaaS is seeing deployment in va...
    2017/08/25
  • ACaaS: Benefits abound for users, integrators alike
    Access control as a service, in which a cloud service provider manages an end user's access control needs, has become a major trend. This is mostly because of the various benefits associated with it – for example enabling the user to lower or eliminate initial investment in access control-related de...
    2017/08/24
  • How electronic locks offer greater peace of mind
    Electronic locks are becoming more and more popular. Convenience certainly plays a big role, as they can be remotely managed and opened with smart devices. Yet they also offer greater peace of mind for residents who can remotely check the status of their locks.
    2017/08/17
  • Delta offers to acquire a stake in VIVOTEK
    Delta Electronics, a leader in power and thermal management solutions, announced August 8 its intention to acquire a stake in IP video manufacturer VIVOTEK, setting the stage for an acquisition that would help broaden Delta’s building automation offerings.
    2017/08/09