Articles Search Results

1645 Articles and 144 related Products found for ISS
  • Network Optix delivers a whole new VMS experience
    Rather than conforming to the standard, familiar, yet stagnant layout that we have come to associate VMS with, Network Optix aims to deliver something that upends the way video is viewed, controlled, and managed.
    Editor / Provider: William Pao, a&s International | Updated: 2016 / 2 / 29
  • Young Chevrolet Selects Eyewitness as Video Surveillance Provider
    Eyewitness Surveillance (Eyewitness) announced their new partnership with Young Chevrolet of Dallas, Texas, a recognized leader in the automotive dealership industry. Prior to working with Eyewitness, Young Chevrolet had utilized security guards for years to monitor and secure the 16 acres of land a
    Editor / Provider: Eyewitness Surveillance | Updated: 2016 / 2 / 26
  • Clear vision leads the way for start-up drone companies
    There is a growing global industry for commercial drones or unmanned aerial vehicles (UAV). According to Market Research International, the commercial drone market currently amounts to US$609 million in sales and this is set to rise to $4.8 billion by 2021.
    Editor / Provider: Emily Lin | Updated: 2016 / 2 / 25
  • For systems integrators: Optimizing the performance of ALPR
    Automatic license plate recognition (ALPR) has become the most important tool for identifying vehicles. To optimize its performance, the installer needs to have a proper understanding of how the system works and how it's set up.
    Editor / Provider: a&s Editorial Team | Updated: 2016 / 2 / 24
  • Public transport bets on biometrics to boost safety and efficiency
    The use of biometric technology is becoming increasingly popular in public transport, as issues like the on-train shooting in France spark debate on methods to ensure better protection for travelers.
    Editor / Provider: Prasanth Aby Thomas | Updated: 2016 / 2 / 23
  • How to minimize cyberthreats in IP-based physical security systems
    Companies have gradually started to change the architecture of their solutions in order to avoid cyberthreats. One approach is to change the security solution architecture in a way that will minimize the number of potential breach points.
    Editor / Provider: Israel Gogol, Freelancer | Updated: 2016 / 2 / 22
  • How secure is surveillance data accessed on mobile apps?
    Mobile apps that can provide access to security solutions have become a standard facility for most solution providers. Such ‘on-the-go' access does raise some concerns, however, especially with regard to protecting surveillance data from unwanted, third-party access.
    Editor / Provider: Prasanth Aby Thomas | Updated: 2016 / 2 / 18
  • What makes video effective in chain store shrink prevention
    A major challenge chain operators deal with is shrinkage, or losses from employee/customer theft and other management issues. As a result, operators turn to video surveillance to prevent such losses. This article explores some of the features that make video surveillance for chain applications effec
    Editor / Provider: Israel Gogol, Freelancer, and William Pao | Updated: 2016 / 2 / 16