SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs  |  Contact Us    Site tour of SourceSecurity.com
REGISTERTerms
Unique perspectives

Afghanistan security news

1,410 articles found
Showing 341 to 360 of 1,410 Afghanistan security news articles
Page 18 of 71 pages
Video analytics: On the server or at the edge?
There are multiple benefits to using video analytics at the edge (i.e., near or inside the camera). For one thing, analytics at the edge provides the...
Video analytics applications in retail - beyond security
Video analytics isn’t just for security. In general, the ability to leverage data from video provides a new wealth of information and...
Networking basics for security professionals: PoE standards are not so standard
Standards are like a warm blanket on a cold winter night. They make us feel safe and warm. A standard tells us the devices we use within our systems will...
HID Global UHF RFID tags for industrial environments
HID Global®, a worldwide leader in secure identity solutions, recently announced that its Identification Technologies division has launched its new High...
Custom-built IP cameras to boost transport security
Some of the video technology used in the transportation vertical is purpose-built, but the wide range of applications and environments is conducive to a...
Veterans in security: Military skills utilised to develop strategies
Ex-army officers/ military veterans bring considerable skills and invaluable experience to security companies. Not only do they play an important role...
Video Analytics for forensics: Analytics-based forensic evidence collection
That video analytics can be immensely useful in forensics is relatively less known. However, forensic search capabilities offered by some modern video...
Networking basics for security professionals: How does PoE work?
We often think about a power supply operating in a single format. A power source provides power to a device. You plug it into a wall outlet and...
High quality images maximise video analytics success
Garbage in, garbage out. The familiar cliché is just as applicable to the area of video analytics as any other field of computing. You simply...
Cybersecurity - Hackers target SCADA embedded systems
The Bipartisan Policy Center, the Industrial Control Systems Cyber Emergency Response Team, which is part of the U.S. Department of Homeland Security,...
Video analytics systems in real-world environments
Video analytics systems have progressed far beyond the theoretical and are now being used effectively in a range of applications. Let’s look at some...
Post Canon acquisition, Axis still committed to open security systems
In the wake of Canon’s acquisition of Axis Communications , the company faces a communication challenge in the market – to reiterate the camera...
Canon-Axis buy: Integrators respond
Recent news of Canon ’s $2.83 billion cash bid for network surveillance leader Axis Communications came as a surprise to some, but many could...
Still independent, Genetec emphasises innovation
Given the current trend toward consolidation, the industry has seen more camera manufacturers and software suppliers aligning under the same owner. Bucking...
Importance of upgrading physical security systems
In the IT world, innovation moves quickly. New versions of software are launched every day to keep business processes running smoothly. So frequent...
Addressing business goals for transportation
Transportation gets passengers and goods to their destination safely and in a timely manner. Making transportation possible are purpose-focused stand-alone...
Hardware vs. software-based surveillance recorders: which is best for you?
Video surveillance and security technology continues to come of age. The sophistication of cameras that have moved to high-definition, high-resolution,...
Canon & Axis Communications: Pre acquisition history of collaboration
A more than 20-year shared history between Canon and Axis Communications has been an underreported aspect of the recent announcement by the...
Networking basics for security professionals: Transmission limitations
Transmission of video and PoE power for IP security cameras over infrastructures can be confusing. Network infrastructures are designed using twisted...
Security identity crisis: What’s in a name?
Because I have been in the industry for a considerable amount of time, I have seen quite a few changes, albeit the bulk have come over the last five or so...
next11|12|13|14|15|16|17|18|19|20|21|22|23|24|25next
Go to :
border
Related videos
Bookmark and Share
Latest Technology Report

SourceSecurity.com Technology Report: Managing Business Remotely Using the Cloud

A Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management.

The white paper outlines how the OnVu360 management platform combines inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others to improve remote business management and security management across several markets including retail, public security, and home automation.

View White paper

See privacy and cookie policy
International Edition