Articles Search Results

2930 Articles and 20 related Products found for application
  • How to reduce false alarms in perimeter intrusion detection systems
    Perimeter intrusion detection systems (PIDS) are prone to false alarms, which could be frustrating for those monitoring a perimeter. According to a new white paper released by Sensurity, microwave PIDS have lower false alarm rates in comparison to other systems but are still vulnerable to nuisance a
    Editor / Provider: the a&s Editorial Team | Updated: 2016 / 2 / 26
  • Network Optix delivers a whole new VMS experience
    Rather than conforming to the standard, familiar, yet stagnant layout that we have come to associate VMS with, Network Optix aims to deliver something that upends the way video is viewed, controlled, and managed.
    Editor / Provider: William Pao, a&s International | Updated: 2016 / 2 / 29
  • Clear vision leads the way for start-up drone companies
    There is a growing global industry for commercial drones or unmanned aerial vehicles (UAV). According to Market Research International, the commercial drone market currently amounts to US$609 million in sales and this is set to rise to $4.8 billion by 2021.
    Editor / Provider: Emily Lin | Updated: 2016 / 2 / 25
  • Hi Sharp diversifies products to stave off competition
    Many companies have found it important to provide value-added systems for different niche markets. One example is Hi Sharp, which has moved beyond traditional security to offer high-quality, high-value solutions for various niche markets and applications.
    Editor / Provider: William Pao, a&s International | Updated: 2016 / 2 / 23
  • Tyco Security Products introduces new Illustra pro series mini-domes
    Tyco Security Products introduces the new Illustra Pro 2 megapixel mini-dome cameras, featuring new UltraVision low light technology to capture high quality color video in the most extreme low light conditions.
    Editor / Provider: Tyco Security Products | Updated: 2016 / 2 / 23
  • How to minimize cyberthreats in IP-based physical security systems
    Companies have gradually started to change the architecture of their solutions in order to avoid cyberthreats. One approach is to change the security solution architecture in a way that will minimize the number of potential breach points.
    Editor / Provider: Israel Gogol, Freelancer | Updated: 2016 / 2 / 22

asmag.com provides weekly and monthly e-Newsletters which include the latest security industry news, vertical solution case studies and product information.



Please key in code