Articles Search Results

1014 Articles and 0 related Products found for legacy
  • How to scale access projects
    Access control is customization-intensive. The scale of a project is not only measured by the number of doors to be secured, but also the le...
    Editor / Provider: Tevin Wang, a&s International | Updated: 2013 / 1 / 18
  • Hikvision hits the jackpot in New Mexico
    Every casino requires a meticulous surveillance system to monitor all activities on its premises. We all enjoyed the Ocean's Eleven movies b...
    Editor / Provider: Hikvision | Updated: 2012 / 12 / 3
  • Rob banks of security threats
    Banks are responsible for the security of countless personal, corporate and national assets, making them obvious targets. Conditions in toda...
    Editor / Provider: By Christina Phillips, a&s International | Updated: 2012 / 11 / 26
  • 2013 — Never a dull moment
    Security has become a rapidly evolving and highly complex industry. The cables connecting card readers have been cut in favor of wireless ne...
    Editor / Provider: Submitted by Johnson Controls | Updated: 2012 / 11 / 26
  • Nedap releases invisible retail anti-theft tags
    Nedap Retail, a developer and supplier of innovative solutions for the retail market, in partnership with Kovi, a worldwide printed silicon ...
    Editor / Provider: Nedap | Updated: 2012 / 11 / 15
  • Sound Intelligence built into Axis IP cams
    Axis Communications, the global provider for network video, announced that Sound Intelligence, supplier of advanced audio analytics technolo...
    Editor / Provider: Axis Communications | Updated: 2012 / 10 / 24