SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs  |  Contact Us    Site tour of SourceSecurity.com
Unique environments

Nepal security news

1,112 articles found
Showing 1 to 20 of 1,112 Nepal security news articles
Page 1 of 56 pages
Technology contributes to holistic security approach at primary/secondary schoolsTechnology contributes to holistic security approach at primary/secondary schools
Honeywell recently helped the Penns Valley Area School district in Pennsylvania design and implement a custom security system Security...
Clarifying misconceptions about video storage solutionsClarifying misconceptions about video storage solutions
One key misconception is that solid-state drives (SSDs) are going to replace hard disk drives (HDDs) Like many areas of the security...
Physical security technology aiding Nepal earthquake responsePhysical security technology aiding Nepal earthquake response
The physical security community is contributing expertise and equipment of many kinds to the country As rescue teams and aid workers from...
A wrinkle emerges in Canon’s acquisition of Axis CommunicationsA wrinkle emerges in Canon’s acquisition of Axis Communications
28 April, 2015: Anyone thinking the Canon acquisition of Axis is a done deal should reconsider. Not so fast. A wrinkle has emerged as the Japanese imaging giant has been...
Video surveillance trends driving increasing storage needsVideo surveillance trends driving increasing storage needs
End users in the video surveillance market are looking for higher quality images and to retain those images for longer periods. Also,...
Integrators should foster relationships to increase primary/secondary education salesIntegrators should foster relationships to increase primary/secondary education sales
Integrators must understand that the primary/secondary education market has a unique and urgent need for access control, but with limited budgets...
School security: Communication and controlling accessSchool security: Communication and controlling access
Readily available security technology can help officials take control of their campuses Two top priorities for school security are the...
Networking basics for security professionals: What do layers really mean?Networking basics for security professionals: What do layers really mean?
Layering as applied to computers is a made up term having no relationship to any particular standards When it comes to setting the...
Convergence of IT networks and physical securityConvergence of IT networks and physical security
Kevin Brownell, principal physical security consultant at PTS Consulting Group, considers convergence of IT networks and physical security. He argues that...
Technology advancement requires well-educated, well-paid security officersTechnology advancement requires well-educated, well-paid security officers
The industry has to advance in terms of attracting experienced people and paying for that experience Time was, security officers patrolled...
Online and offline locks: Leveraging the best of both optionsOnline and offline locks: Leveraging the best of both options
Online wireless locks enable real-time online access control functionality Organisations require more than a...
The Internet of Things presents new cyber-vulnerabilitiesThe Internet of Things presents new cyber-vulnerabilities
Companies need to increase the knowledge within their business on the range of cyber-vulnerabilities At one time, embedded devices, such...
Cyber-defence challenges cannot be ignored, says DVTELCyber-defence challenges cannot be ignored, says DVTEL
13 April, 2015: Cybersecurity has been getting much more attention lately in the physical security market. One company ready to address cybersecurity of IP video products is...
Networking basics for security professionals: Misinterpreting product specs – temperature, latency and moreNetworking basics for security professionals: Misinterpreting product specs – temperature, latency and more
Too often a valid assumption turns out to be the opposite in practical operation It’s easy to misinterpret product specifications of...
Illinois Association works to quell proposed fire alarm legislationIllinois Association works to quell proposed fire alarm legislation
Anyone who questions the value of participation in local and national burglar and fire alarm associations need only look at the ongoing activities of the...
Deploying a high-performance computing environment to minimise processing costsDeploying a high-performance computing environment to minimise processing costs
Organisations must find more effective ways to optimise the use of the resources they have available As market demand intensifies for...
From consolidation to video services: Milestone’s Thinggaard talks coming trendsFrom consolidation to video services: Milestone’s Thinggaard talks coming trends
10 April, 2015: Milestone Systems is closing in on a year since their acquisition by Canon’s European subsidiary in June 2014. Throughout the ownership transition,...
Impact of school shootings on demand for security systemsImpact of school shootings on demand for security systems
School administrators are now choosing products that make the biggest, long-term impact on campus security Well-publicised events such as...
Networking basics for security professionals: Considering 4k’s impact on networksNetworking basics for security professionals: Considering 4k’s impact on networks
Since last year there has been a lot of talk with regard IP security cameras with 4K resolution. As with any advancement in video...
Networking basics for security professionals: Do you believe in specifications?Networking basics for security professionals: Do you believe in specifications?
Misreading specifications of transmission products can lead to making the wrong selection Manufacturers’ product specifications are...
1|2|3|4|5|6|7|8|9|10|11|12|13|14next
Go to :
border
Related videos
Bookmark and Share
Latest Technology Report

SourceSecurity.com Technology Report: Managing Business Remotely Using the Cloud

A Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management.

The white paper outlines how the OnVu360 management platform combines inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others to improve remote business management and security management across several markets including retail, public security, and home automation.

View White paper

See privacy and cookie policy
International Edition