SourceSecurity.com US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs  |  Contact Us    Join SourceSecurity.com on LinkedIn
REGISTERTerms
Everything you need know

Nepal security news

1,465 articles found
Showing 381 to 400 of 1,465 Nepal security news articles
Page 20 of 74 pages
Utilising intelligence analysts to improve business
If your company has a facility or a current business meeting in Seoul, South Korea, you would want to know the details behind the recent knife attack on the...
Cloud-based systems: Current challenges and future technology
There’s more talk than ever in the security industry about cloud-based systems – where they are, where they’re going, the risks, the...
Networking basics for security professionals: What network switches don’t do
When the need to purchase a network switch arises, many IT directors immediately turn to two favourites, HP or Cisco . They have become to the...
Key management essential for transportation environment
Keys are a common element in any transportation department, and an automated key control system is a valuable tool. Key management systems offer...
Networking basics for security professionals: The 60 Watt dilemma
Standards for camera manufacturers presented a new challenge with the introduction of security cameras that require more than 30 Watts of power....
MIPS 2015: Largest-ever Milestone symposium keeps focus on partners
This year’s 10 th anniversary Milestone Integration Platform Symposium (MIPS) was the largest ever, with 463 participants, including manufacturers ,...
Addressing false alarms in video analytics
False alarms have plagued the video analytics market since the beginning. Improvements in the technology have lowered – but not eliminated –...
Learning to use visitor management technology in schools
Handwritten check in and check out books fail to alert the security risks posed by individuals on school campuses. Installing visitor management...
HID Global Mobile Access Solution via Samsung KNOX 2.4 mobile platform
HID Global®, a worldwide leader in secure identity solutions, has partnered with Samsung to provide enterprises with a secure and seamless management...
Honeywell IS335 Motion Detector
Honeywell recently expanded its line of Performance Series IP embedded network video recorders (NVRs), giving customers more flexibility when designing...
AXIS P39-R network camera series for outdoor use on vehicles
AXIS P3905-RE is an outdoor-ready camera addition to the family of compact, rugged and discreet cameras of the AXIS P39-R Network Camera Series. They are...
Is home automation driving a security renaissance?
For years, the industry’s penetration rate for security alarm systems has hovered from a conservative 18 percent of households to a more liberal...
Security’s new job - Managing supply chain risks
Today’s complex world needs risk managers, business people that think about the bad things that might happen and lay plans to eliminate or at...
Combining thermal cameras with video analytics
Prices are dropping for thermal cameras. Now they are much more affordable for non-military customers – and more likely to be used in combination...
Key to IoT (Internet of Things) success: Scalable computing platforms
The era of IoT - the Internet of Things - is upon us. A deluge of urban sensory data is flowing into data centers every minute, putting pressure on...
Transportation end users embracing open video platform
The transportation vertical is embracing the open platform for video systems. In the past, manufacturers required transportation end users to purchase...
Video analytics: On the server or at the edge?
There are multiple benefits to using video analytics at the edge (i.e., near or inside the camera). For one thing, analytics at the edge provides the...
Video analytics applications in retail - beyond security
Video analytics isn’t just for security. In general, the ability to leverage data from video provides a new wealth of information and...
Networking basics for security professionals: PoE standards are not so standard
Standards are like a warm blanket on a cold winter night. They make us feel safe and warm. A standard tells us the devices we use within our systems will...
HID Global UHF RFID tags for industrial environments
HID Global®, a worldwide leader in secure identity solutions, recently announced that its Identification Technologies division has launched its new High...
next13|14|15|16|17|18|19|20|21|22|23|24|25|26|27next
Go to :
border
Related videos
Bookmark and Share
Latest Technology Report

SourceSecurity.com Technology Report: Managing Business Remotely Using the Cloud

A Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management.

The white paper outlines how the OnVu360 management platform combines inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others to improve remote business management and security management across several markets including retail, public security, and home automation.

View White paper

See privacy and cookie policy
International Edition