Articles Search Results

380 Articles and 66 related Products found for thermal imaging
  • Low-Light Cameras (Part Ⅱ)
    In the second part of this article, we introduce another hot technology — thermal imaging, which also gets popular in the low-light cameras....
    Editor / Provider: Hayden Hsu | Updated: 2008 / 7 / 30
  • New Epoch in Surveillance: Chinese Mini Speed Domes
    Mini speed domes are designed for small applications, such as retail stores, which not only require security but also must aesthetically ple...
    Editor / Provider: The Editorial Team | Updated: 2008 / 7 / 3
  • Chinese Vendors a Major Presence at SecuTech 2008
    Thirty-three Chinese exhibitors showcased hundreds of products at SecuTech 2008. New faces included Aheadex, Aopvision, CSST, Dahua, Fibridg...
    Editor / Provider: a&s International | Updated: 2008 / 6 / 9
  • GDSF China: An Insight into Security Trends
    In recent years, video surveillance has been integrated with IP and IT technology, creating a new and unstoppable epic for intelligent video...
    Editor / Provider: The Editorial Team | Updated: 2008 / 5 / 29
  • 2008 Full-feature DVRs Winning Customers
    China has a fast-growing DVR supplier base. Increased demand for products and availability of newly developed compression software and hardw...
    Editor / Provider: a&s International | Updated: 2008 / 1 / 3
  • Research and Industry Go Hand in Hand
    The cooperation of government-led research and the high-tech industry is not new in the market. In China, this cooperation is about to get m...
    Editor / Provider: BY JILL LAI | Updated: 2007 / 10 / 19
  • Newcomers: Making the Cut
    This year's Security 50 ranking includes 11 new faces from all corners of the globe and all product sectors. The U.S. is well-represented, w...
    Editor / Provider: The Editorial Team | Updated: 2007 / 8 / 16
  • Electronic Systems Revolutionize Border Security
    The need to secure national borders is focusing attention on outdoor electronic technologies. This article examines what can be considered t...
    Editor / Provider: Submitted By Senstar-Stellar and Magal Security Solutions | Updated: 2007 / 7 / 12