Articles Search Results

498 Articles and 619 related Products found for RF
  • Advanced Technology Clamps Down on Inmates
    Although funding is an issue, correctional facilities are deploying advanced technology to keep better watch on inmates. Everything from biometric to infrared technology is used to keep danger from entering or leaving the facility.
    Editor / Provider: a&s International | Updated: 2010 / 12 / 22
  • Tempering Threats Within Prison Walls
    Prisons house people deemed too dangerous to society by the law. Freedom is no longer theirs while they are incarcerated, and steps are made to ensure all actions within the facility are monitored for both their own safety and the safety of other inmates and guards.
    Editor / Provider: a&s International | Updated: 2010 / 12 / 21
  • Internet Protocol Version 6 and Security
    Internet protocol version 6 (IPv6) is designed to succeed IPv4, the first publicly used protocol that is still in dominant use currently. IPv6 was first ratified as IPng some 14 years ago. Since then, it has had a gradual development and deployment in the Internet and in enterprise level installatio
    Editor / Provider: Submitted by Norbain | Updated: 2010 / 12 / 14
  • Growing Profits in Lean Times PartⅠ
    While the recession has increased budget offerings and driven prices down, a number of companies still managed to grow their profits. We find out more about their growth factors and differentiators for success.
    Editor / Provider: by a&s International | Updated: 2010 / 11 / 30
  • Security 50's Top Performers Rise Above the Fray Part Ⅱ
    Mergers and acquisitions continued, even in the face of tighter lending policies. Flir bought thermal imaging provider OmniTech in June 2009. It also purchased Directed Perception in December 2009, enhancing its PTZ camera line.
    Editor / Provider: by a&s International | Updated: 2010 / 11 / 30
  • Security 50's Top Performers Rise Above the Fray Part Ⅰ
    The recession causes mixed feelings — most of them negative. Slumping sales have been unpleasant, after a decade of meteoric growth. Several companies closed, unable to make ends meet. A supposedly recession-proof industry found itself on thin ice, with little relief.
    Editor / Provider: by a&s International | Updated: 2010 / 11 / 30
  • Accessing and Assessing Biometrics
    Anyone accessing highly sensitive areas must be authorized, and there is no better authorization code than a person's biological signature. Although some areas of this technology are still in the development stages, other areas, such as fingerprint readers, have already been widely deployed.
    Editor / Provider: a&s International | Updated: 2010 / 11 / 9
  • Searching For the Right Solution
    Finding the perfect solution for a project entails careful planning and understanding client requirements. Points such as the correct management software and choosing between analog and IP devices should be taken into careful consideration.
    Editor / Provider: a&s International | Updated: 2010 / 11 / 9

asmag.com provides weekly and monthly e-Newsletters which include the latest security industry news, vertical solution case studies and product information.



Please key in code