SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs  |  Contact Us    Site tour of SourceSecurity.com
Everything you need know

Algeria security news

1,030 articles found
Showing 1 to 20 of 1,030 Algeria security news articles
Page 1 of 52 pages
Combining thermal cameras with video analyticsCombining thermal cameras with video analytics
Combining thermal imaging with analytics provides a robust system Prices are dropping for thermal cameras. Now they are much more...
Key to IoT (Internet of Things) success: Scalable computing platformsKey to IoT (Internet of Things) success: Scalable computing platforms
The era of IoT - the Internet of Things - is upon us. A deluge of urban sensory data is flowing into data centers every minute, putting...
Transportation end users embracing open video platformTransportation end users embracing open video platform
Milestone Interconnect provides a cost-efficient and flexible way to have central surveillance operation across geographically dispersed sites...
Video analytics: On the server or at the edge?Video analytics: On the server or at the edge?
Analytics at the edge provide the ability to process what is happening in a field of view and discern if a relevant alert is triggered...
Networking basics for security professionals: PoE standards are not so standardNetworking basics for security professionals: PoE standards are not so standard
Standards are like a warm blanket on a cold winter night. They make us feel safe and warm. A standard tells us the devices we use within our...
Video analytics applications in retail - beyond securityVideo analytics applications in retail - beyond security
Video analytics isn’t just for security. In general, the ability to leverage data from video provides a new wealth of information and...
HID Global UHF RFID tags for industrial environments
26 February, 2015: HID Global®, a worldwide leader in secure identity solutions, recently announced that its Identification Technologies division has launched its new High...
Custom-built IP cameras to boost transport securityCustom-built IP cameras to boost transport security
The ability to clearly see facial features and other identifying characteristics on each passenger greatly enhances security Some of the...
Veterans in security: Military skills utilised to develop strategiesVeterans in security: Military skills utilised to develop strategies
Veterans are able to use their skills from the military to help develop strategies Ex-army officers/ military veterans bring considerable...
Video Analytics for forensics: Analytics-based forensic evidence collectionVideo Analytics for forensics: Analytics-based forensic evidence collection
Intelligent searches of video archives provide investigators faster access to any needed video clip That video analytics can be immensely...
Networking basics for security professionals: How does PoE work?Networking basics for security professionals: How does PoE work?
The action of a voltage applied to a resistance element, draws power from the switch’s PoE port We often think about a power supply...
High quality images maximise video analytics successHigh quality images maximise video analytics success
The better the sensors, the better the analytics Garbage in, garbage out. The familiar cliché is just as applicable to the area of...
Cybersecurity - Hackers target SCADA embedded systemsCybersecurity - Hackers target SCADA embedded systems
Forty-one percent of cyber incidents involved the energy sector The Bipartisan Policy Center, the Industrial Control Systems Cyber...
Video analytics systems in real-world environmentsVideo analytics systems in real-world environments
Various vertical markets such as retail, airports, and transportation have benefited from video analytics Video analytics systems have...
Post Canon acquisition, Axis still committed to open security systemsPost Canon acquisition, Axis still committed to open security systems
20 February, 2015: In the wake of Canon’s acquisition of Axis Communications, the company faces a communication challenge in the market – to reiterate the camera...
Canon-Axis buy: Integrators respondCanon-Axis buy: Integrators respond
Recent news of Canon’s $2.83 billion cash bid for network surveillance leader Axis Communications came as a surprise to some, but many...
Still independent, Genetec emphasises innovationStill independent, Genetec emphasises innovation
19 February, 2015: Given the current trend toward consolidation, the industry has seen more camera manufacturers and software suppliers aligning under the same owner. Bucking...
Importance of upgrading physical security systemsImportance of upgrading physical security systems
Regular upgrading ensures all systems communicate correctly  In the IT world, innovation moves quickly. New versions of software are...
Addressing business goals for transportationAddressing business goals for transportation
Many purpose-focused stand-alone systemsaddress business goals aside from security Transportation gets passengers and goods to their...
Hardware vs. software-based surveillance recorders: which is best for you?Hardware vs. software-based surveillance recorders: which is best for you?
Coming of age: storage devices have evolved to better record, manage and play back high-quality images Video surveillance and security...
1|2|3|4|5|6|7|8|9|10|11|12|13|14next
Go to :
border
Related videos
Bookmark and Share
Latest Technology Report

SourceSecurity.com Technology Report: Managing Business Remotely Using the Cloud

A Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management.

The white paper outlines how the OnVu360 management platform combines inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others to improve remote business management and security management across several markets including retail, public security, and home automation.

View White paper

See privacy and cookie policy
International Edition