Articles Search Results

1467 Articles and 0 related Products found for end user
  • Why mobile credentials will see momentum down the road
    While mobile credentials have gained more attention in the industry, actual adoption hasn't been that great across verticals due to various ...
    Editor / Provider: William Pao, a&s International | Updated: 2019 / 1 / 8
  • What to know about video surveillance under GDPR
    On May 25 the General Data Protection Regulation or GDPR officially took effect, requiring better protection of personal data across the EU ...
    Editor / Provider: William Pao, a&s International | Updated: 2018 / 12 / 27
  • What are some use cases for crowd management solutions?
    Crowd management solutions are in higher demand as end user organizations seek to prevent crowd-related incidents, avoid gridlocks and impro...
    Editor / Provider: William Pao, a&s International | Updated: 2018 / 12 / 26
  • Malaysia: Which verticals may see most demand?
    Given the mixed sentiments that industry players are echoing across the region regarding the concerns, systems integrators and foreign compa...
    Editor / Provider: Prasanth Aby Thomas, Freelancer | Updated: 2018 / 12 / 21
  • Milestone drives AI growth with open platform VMS
    Artificial intelligence (AI) has become a major topic in security these days. In this regard, Milestone Systems, the world's No. 1 VMS provi...
    Editor / Provider: William Pao | Updated: 2018 / 12 / 19
  • Building automation: going beyond the holistic approach
    With the increasing popularity of building automation solutions that has brought about the entry of intelligent devices and data-driven faci...
    Editor / Provider: Prasanth Aby Thomas, Freelancer | Updated: 2018 / 12 / 18
  • How to pick the right video conferencing solution
    Video conferencing systems have evolved from simple gadgets to advanced solutions with various new features. Amid this trend, how to pick ou...
    Editor / Provider: William Pao, a&s International | Updated: 2018 / 12 / 11
  • How does the end user see cybersecurity threats?
    With an increasing number of malware attacks, hacking attempts and distributed denial of services among others, end users are forced to rema...
    Editor / Provider: Prasanth Aby Thomas, Freelancer | Updated: 2018 / 12 / 4