SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs  |  Contact Us    Site tour of SourceSecurity.com

Nepal security news

1,122 articles found
Showing 1 to 20 of 1,122 Nepal security news articles
Page 1 of 57 pages
ISC West’s Mt. Everest climber witnesses deadly earthquake and avalancheISC West’s Mt. Everest climber witnesses deadly earthquake and avalanche
A demonstration of the home automation capabilities of Z-Wave wireless transmission – controlling a coffee maker from the Mt. Everest base camp –...
How video storage ensures critical data isn’t lostHow video storage ensures critical data isn’t lost
The fundamental value of data is widely apparent in modern society, and its loss may have significant consequences Video data is critical...
Rethinking DIY: new opportunities for recurring revenueRethinking DIY: new opportunities for recurring revenue
According IHS Technology, more than 11 million consumer and DIY network cameras will be shipped worldwide this year Perhaps we should...
President and CEO Denis Hébert leaves HID GlobalPresident and CEO Denis Hébert leaves HID Global
22 May, 2015: Denis Hébert, president and CEO of HID Global, has quietly left the company. There has been no official announcement, and the...
ISCON Imaging’s IR technology addresses shrinkage at distribution centresISCON Imaging’s IR technology addresses shrinkage at distribution centres
22 May, 2015: Most of us think of shrinkage in the context of the retail environment, where a host of video cameras, tamper-proof packaging, sensors and other technologies...
Long range identification - 3rd major contactless access controlLong range identification - 3rd major contactless access control
Recently there has been great interest in long range reading (433 MHz technology) For the last two decades, the primary contactless...
How SIP-enabled intercoms open up communication with security departmentsHow SIP-enabled intercoms open up communication with security departments
The trend towards greater unification is facilitated by an all-encompassing shift to IP technologies As more organisations are looking for...
Making security easier for integrators to spec, install and programMaking security easier for integrators to spec, install and program
Easy does it is the watchword of the day, as industry suppliers make their products more intuitive A common theme emerging from physical...
Airbus Defence and Space and Cisco collaborate on defence and security productsAirbus Defence and Space and Cisco collaborate on defence and security products
7 May, 2015: The partner agreement expands the two companies’ sales collaboration globally Airbus Defence and Space and Cisco recently announced...
Networking basics for security professionals: Understanding the role of midspans to supply powerNetworking basics for security professionals: Understanding the role of midspans to supply power
Just as with network switches, there are no real standards for midspans In general terms, a midspan is a power over Ethernet (PoE) power...
Technology contributes to holistic security approach at primary/secondary schoolsTechnology contributes to holistic security approach at primary/secondary schools
Honeywell recently helped the Penns Valley Area School district in Pennsylvania design and implement a custom security system Security...
Clarifying misconceptions about video storage solutionsClarifying misconceptions about video storage solutions
One key misconception is that solid-state drives (SSDs) are going to replace hard disk drives (HDDs) Like many areas of the security...
Physical security technology aiding Nepal earthquake responsePhysical security technology aiding Nepal earthquake response
The physical security community is contributing expertise and equipment of many kinds to the country As rescue teams and aid workers from...
A wrinkle emerges in Canon’s acquisition of Axis CommunicationsA wrinkle emerges in Canon’s acquisition of Axis Communications
28 April, 2015: Anyone thinking the Canon acquisition of Axis is a done deal should reconsider. Not so fast. A wrinkle has emerged as the Japanese imaging giant has been...
Video surveillance trends driving increasing storage needsVideo surveillance trends driving increasing storage needs
End users in the video surveillance market are looking for higher quality images and to retain those images for longer periods. Also,...
Integrators should foster relationships to increase primary/secondary education salesIntegrators should foster relationships to increase primary/secondary education sales
Integrators must understand that the primary/secondary education market has a unique and urgent need for access control, but with limited budgets...
School security: Communication and controlling accessSchool security: Communication and controlling access
Readily available security technology can help officials take control of their campuses Two top priorities for school security are the...
Networking basics for security professionals: What do layers really mean?Networking basics for security professionals: What do layers really mean?
Layering as applied to computers is a made up term having no relationship to any particular standards When it comes to setting the...
Convergence of IT networks and physical securityConvergence of IT networks and physical security
Kevin Brownell, principal physical security consultant at PTS Consulting Group, considers convergence of IT networks and physical security. He argues that...
Technology advancement requires well-educated, well-paid security officersTechnology advancement requires well-educated, well-paid security officers
The industry has to advance in terms of attracting experienced people and paying for that experience Time was, security officers patrolled...
1|2|3|4|5|6|7|8|9|10|11|12|13|14next
Go to :
border
Related videos
Bookmark and Share
Latest Technology Report

SourceSecurity.com Technology Report: Managing Business Remotely Using the Cloud

A Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management.

The white paper outlines how the OnVu360 management platform combines inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others to improve remote business management and security management across several markets including retail, public security, and home automation.

View White paper

See privacy and cookie policy
International Edition