Expert commentary
A demonstration of the home automation capabilities of Z-Wave wireless transmission – controlling a coffee maker from the Mt. Everest base camp – came off without a hitch at ISC West. A few days later, however, the veteran climber involved in the stunt got a first-hand look at the deadly 7.8 earthquake in Katmandu and the resulting avalanche. The adventurer, Mariusz Malkowski, began his love of climbing in his native Poland while in early high school. “I would go on an 8-hour...
“Better, Faster, Cheaper – choose any two” is the old adage for computerised systems. When it comes to businesses subjected to federal or industry security regulations, the equivalent saying might be, “mitigate risk, achieve compliance, or reduce cost – choose any two.” So if there were a way to have all three that would get your attention. Complying with regulations More and more industries are subjected to some form of regulation....
Recently there has been great interest in long range reading (433 MHz technology) For the last two decades, the primary contactless technology used in access control systems has been the proximity card (125 kHz technology). In the last decade, proximity cards have been augmented by the smart card (13.56 MHz technology). And that's the way it has been until just recently. All of a sudden, there has been great interest in long range reading (433 MHz technology). Merging traditi...
Most of us have a basic instinct as to what is and is not ethical behaviour. But is instinct enough? “Ethics and the security industry is a balancing act,” says Mike Hurst, vice chairman of the UK Chapter of ASIS International. “Most people will have an instinct as to what ethical behaviour is, but there’s an absence of hard and fast rules.” Examples often crop up in video surveillance situations, Hurst says. For instance, when and where i...
SWOT evaluates a company’s Strengths, Weaknesses, Opportunities and Threats (SWOT) in connection with a project Expanding into other countries with sales offices, manufacturing facilities and distribution centres can present a number of security risks. SWOT analysis for security strategy Physical security technology can help to mitigate some of these risks. “The physical security technology used in international locations is similar to what we use here, but t...
Petrow began her career at Vector Security in 1982, and was appointed senior vice president of the Central Stations and Information Services Group in 1997 Pamela J. Petrow, chief executive officer (CEO) of Vector Security Inc., Warrendale, Pa., has been appointed President of CSAA International, the industry’s leading, 65-year-old central station monitoring organisation. Petrow is the first woman in the organisation’s history to hold this top leadership...
ESX is designed to provide information and knowledge alarm companies can’t get at any other event For those of you who have been honky-tonking the last several years during the ESX Show, there’s a new game in town – as the annual educational, exhibits and networking event moves to Baltimore, Md., June 24 to 26, and the excitement of the Inner Harbor. Focused and futuristic Celebrating its eighth year, ESX focuses on peer-to-peer education and strategies &n...
Easy does it is the watchword of the day, as industry suppliers make their products more intuitive A common theme emerging from physical security manufacturers is a focus on making installation, setup and integration as easy as possible for the installer. With technology moving at break-neck speeds and the Internet of Things promising seamless device connectivity, manufacturing are doing their best to help systems integrators succeed. Of course, the manufacturer benefits...
The trend towards greater unification is facilitated by an all-encompassing shift to IP technologies As more organisations are looking for ways to maximise resources and increase operational efficiencies, unification of multiple security and business systems is gaining popularity. From the central command center, there is significant time lost when operators have to jump from video surveillance to access control systems to analyse an incident and take appropriate measures. Eve...
Maricopa County installed a fully integrated security controls system, featuring a VMS Larger IP video systems require plenty of storage, and several high-profile applications help to demonstrate the value of storage in today’s networked video environment. Maricopa county security project One example is the Maricopa County (Ariz.) Sheriff’s Office, which is nationally recognised for its zero tolerance toward crime and unwavering focus on innovation in law enforce...
ASAP-to-PSAP technology automates communications between alarm monitoring companies & PSAPs and dispatches emergency service In April 2015, Cary, N.C., adopted a technology called Automated Secure Alarm Protocol to Public Safety Answering Point (ASAP-to-PSAP), but currently they are among only a handful of emergency 911 call response locales that use ASAP-to-PSAP technology in the United States. Commander Scott Edson of the Los Angeles County Sheriff’s Department, sp...
Michael Byrden, Sales Director of ACT, considers the convergence of facility management. He describes how ACT, the access control manufacturer, has acquired a VMS and analytics development house in order to unify security solutions and bring customers nearer to the goal of a truly intelligent building. Desire for open systems Major acquisitions have been dominating the news recently and, even if this lays me open to a charge of naivety, I genuinely believe that they aren’t predatory. As...
Timm typically walks through school buildings to assess vulnerabilities, and recommends systems and products As an independent school security consultant, Paul Timm of RETA Security conducts security assessments and provides technical assistance for numerous school districts throughout the United States and Canada. Timm typically walks through school buildings to assess vulnerabilities, and recommends systems and products, practices and policies, and other strategies to optimi...
Since 2006, the LUSAX research program at Lund University in Sweden has investigated the effects of digitisation on the physical security industry. This article will look into the forces driving digitisation, and how those forces broadly translate and impacts the physical security industry. Historically, physical security systems have moved from purely mechanical systems into systems holding both mechanical and electronic low-voltage circuit-based components. Development was...
Just as with network switches, there are no real standards for midspans In general terms, a midspan is a power over Ethernet (PoE) power source that is placed between a network switch and the device being powered, hence the term midspan. The real question is, with almost all network switches providing PoE power, why do we need a midspan? The answer is, in some cases we don’t, but in others we do. As with any other product we have discussed, we need to first consider that...
Honeywell recently helped the Penns Valley Area School district in Pennsylvania design and implement a custom security system Security systems are just part of the solution to protecting primary/secondary schools. Technology can contribute to a broader, holistic approach to security that is customised to meet the needs of each educational institution. Honeywell has helped many schools customise security systems to meet each school’s unique needs, says Bruce Montgomery,...
One key misconception is that solid-state drives (SSDs) are going to replace hard disk drives (HDDs) Like many areas of the security market, the field of digital video storage systems has its share of misconceptions and missed opportunities. We called on manufacturers of these systems to set the record straight. Hard disk drives (HDDs) will continue to rule One key misconception is that solid-state drives (SSDs) are going to replace hard disk drives (HDDs), says Henk Van Den...
To guide people under stress facing emergency situations, SchoolDude developed the CrisisManager smartphone app Last year, SchoolDude asked administrators at several hundred primary/seconday schools and colleges how they communicated their emergency and crisis management plans to administrators and faculty. Seventy-nine percent said they sent their emergency plans out in paper binders. Cary, N.C.-based SchoolDude, an education enterprise asset manager, conducted the study to...
The physical security community is contributing expertise and equipment of many kinds to the country As rescue teams and aid workers from around the world converge on Nepal after the country's 7.8-magnitude earthquake, the physical security community is contributing expertise and equipment of many kinds to a country whose government has described it as being “on a war footing.” At time of writing, conservative estimates of the fatalities are around 5,000, but many,...
see bigger image Figure 5: Providing correct and useful results requires intersection of user intentions, VCA interpretation, and results provided by VCA tool The term Video Content Analysis (VCA) is often used to describe sophisticated video analytics technologies designed to assist analysts in classifying or detecting events of interest in videos. These events may include the appearance of a particular object, class of objects, or action. VCA technology employs a comple...
Beyond the need to install new systems, often overlooked is how schools are going to pay for security upgrades Limited financial resources are a common pain point for primary/secondary schools looking to implement cutting-edge security technology. But security needs persist despite scarce resources. All school administrators want to do everything in their power to secure their facilities against threats. More schools are recognising the benefits and, in some cases, requiremen...
End users in the video surveillance market are looking for higher quality images and to retain those images for longer periods. Also, small- and medium-sized enterprises (SMEs) are turning to networked video surveillance in larger numbers. And video is now finding many uses outside the security market, including business intelligence and customer service applications, among others. These familiar trends are directly impacting the choice of video storage solutions being used i...
Wong was the first Asian woman to obtain the Alarm Contractor License Mun C. Wong, PSP and president of VinTech Systems Inc. in Chicago, is a successful entrepreneur who has brought new technologies and a knack for superior service to her integration business. In fact, at the age of 29, she was the first Asian woman to obtain the Alarm Contractor License from the State of Illinois and its Department of Financial and Professional Regulation. But she doesn't focus on gend...
Employees are the front line of defence — as well as the most economical defence — against shrinkage losses The financial cost of retail shrinkage is huge. The latest Annual Shrink Report issued by Dr. Richard Hollinger and Dr. Read Hayes at the University of Florida puts the total at $36 billion annually. Shrinkage has several causes: customers shoplifting , employee theft, supplier fraud and administrative errors. Frequent inventories and accounting audits coun...
Integrators must understand that the primary/secondary education market has a unique and urgent need for access control, but with limited budgets Systems integrators play a key role delivering effective security solutions to the kindergarten through 12th grade (primary/secondary) education market. Schools certainly depend on an integrator’s expertise regarding which electronic products to choose. However, schools also rely the benefit of an integrator’s experience...
Readily available security technology can help officials take control of their campuses Two top priorities for school security are the ability to communicate within a facility, and the ability to control access of who comes and goes. Paul Timm, president of RETA Security, an independent school security consulting firm, acknowledges the value (and popularity) of video cameras for school security, but that value is almost completely realised in terms of forensics – reactin...
Audio systems can enhance liability protection. Recently, a large regional convenience store chain with units across the Midwest and South supplemented its video surveillance security system with an audio monitoring system. Retail stores with Louroe audio system: The technology has been installed in more than 700 of the convenience retailer’s locations. The Louroe Electronics systems feature omni-directional capability and sensitivity and pick up sound within a 15-foot...
Layering as applied to computers is a made up term having no relationship to any particular standards When it comes to setting the criteria for network switching, we often hear “I only want a layer 3 switch.” We naturally assume that since the number 3 is bigger than the number 2, a layer 3 switch must be better than a layer 2 switch. It may surprise you, but when it comes to video security applications, this may not be the case. In fact, just the opposite may...
SWIFT is a wireless fire detector line offered by Honeywell Fire Systems Honeywell Fire Systems, Northford, Conn., continues to enhance its line of wireless fire detectors, announcing new updates to its Fire-Lite® Alarms Smart Wireless Integrated Fire Technology (SWIFT™) at ISC West 2015 in Las Vegas. The SWIFT line of wireless fire alarm detectors and modules – which includes smoke, heat and pull stations – integrate with new and existing Fire-Lite...
It’s that time of year: show season! And for systems integrators and security installers, PSA-TEC is one of the quintessential annual conferences, offering hundreds of hours of education and training during the May 4-8 show (exhibits are May 6). Hotel registration at the Westin in Westminster, Colo., is due on or before April 16. PSA Security Network was established in 1974 as the Professional Security Alliance, Inc. dba PSA Security Network and is now the world’s largest electronic...
Browse expert commentaries
Expert Section
Related videos
CLIQ Connect
DNAKE Access Control Terminals: Minimalist Design, Maximum Security!
Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems
Security beat
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
