Published on 2 May, 2014
Every security system has a story
Our industry’s technology solutions are at work almost everywhere, if you think about it. You might see Kelvin Hughes high-resolution radar pictures providing protection for Maryland’s oyster beds. At the 2014 Oscars, Axis pan-tilt-zoom (PTZ) cameras kept watch around the Dolby Theatre in Los Angeles. At The Marque, an exclusive membership club in Houston, Texas, MorphoTrak 3D facial recognition technology secures access and enables the club to be “exclusive.”
These are just a few examples of the many ways security technology is at work every day around the world. I came across them when browsing through SourceSecurity.com’s Application section.
Every system has a history. Each application of security technology has a story behind it, and more and more supplier companies are seeing the value of telling those stories. Sometimes, it’s not easy to get the stories out there. Suppliers have to browbeat their dealer/integrator partners to identify interesting ways their equipment is being used in the field, and then they have to work with each end user customer to collect the details of the story and to get the information written down and distributed.
Showcasing value with success stories
In the end, the application stories tell as much about our industry than anything else. Application case studies are about our successes. They demonstrate the value of our products and equipment in terms that any end user or integrator can understand. Simply put, application stories confirm that our industry’s products really work. Case studies are about happy customers – the best kind – so of course manufacturers want those stories told and retold.
I personally love to hear how security technology is working in the real world. Application stories take the abstract concepts and technology jargon we hear every day and translate them into something concrete and understandable. This was our problem. Here’s how we solved it. These are our results.
As a broad-ranging digital publisher dedicated to security systems and technology, SourceSecurity.com leverages its Applications to enable every supplier to share their successes. And technology makes it easy to search for content specific to any situation. I find it interesting just to browse through the various articles to see the diverse range of ways equipment is used. Definitely worth a look.