Articles Search Results

653 Articles and 0 related Products found for security applications
  • Linking Cloud Computing and Security
    Cloud computing has amassed a legion of fans over the past two years, including tech giants Google and IBM. Physical security players are ke...
    Editor / Provider: a&s China | Updated: 2010 / 12 / 13
  • Low-Light Cameras Break New Ground
    While security cameras have evolved continuously, few can perform up to par after the sun sets. Thus, what determines the effectiveness of a...
    Editor / Provider: The Editorial Team | Updated: 2010 / 12 / 8
  • Accessing and Assessing Biometrics
    Anyone accessing highly sensitive areas must be authorized, and there is no better authorization code than a person's biological signature. ...
    Editor / Provider: a&s International | Updated: 2010 / 11 / 9
  • Treading Cautiously with Border Security
    From a highly anticipated border protection program to a mess of malfunctioning sensors, solution providers and system integrators can learn...
    Editor / Provider: a&s International | Updated: 2010 / 10 / 25
  • Where Quality is the Operative Word
    In an operating theatre at the German Heart Institute in Berlin, open heart operations are carried out on a sophisticated dummy. A Geutebruc...
    Editor / Provider: Submitted by Geutebruck | Updated: 2010 / 10 / 4