SourceSecurity.com US Edition
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs    Join SourceSecurity.com on LinkedIn
REGISTERTerms
Unique perspectives

iOmniscient publishes new book focused on how to implement successful technologies for a Smart City

Published on 16 Jan, 2013

iQ-Smart City, Security-Safety–Services discusses the various technologies that can be used to manage a City environment
iOmniscient releases new book called  iQ-Smart City, Security-Safety-Service

Having won some very large Smart City projects around the world (the largest of which involves over 20,000 cameras) iOmniscient has put together the knowledge it has gained into a new book called iQ-Smart City, Security-Safety-Service. This is the first publication focused on how to implement successful technologies for a Smart City. There is a particular focus on maximising the return on investment demonstrating that a good design can reduce the cost of implementation by an order of magnitude.

iQ-Smart City, Security-Safety–Services discusses the various technologies that can be used to manage a City environment and discusses the processes that must be used to ensure a successful implementation.

Download PDF Version

Follow us for latest editorial and commercial opportunities


Please rate this article


Related videos
Featured White Paper

What Do I Need to Know to Successfully Deploy Mobile Access?

This white paper discusses what you need to know in preparation to deploy a mobile access solution. Using a mobile device to gain access to buildings is not only about solving a particular problem; it's also about doing things better.

Confidence and education in the use of contactless applications and technologies, such as Near Field Communications (NFC) and Bluetooth, are continuously growing. In the era of mobility and cloud computing, companies are increasingly concerned about the security and protection of their physical environment. Correctly implemented, mobile access has the potential to revolutionise the way we open doors.

HID have produced this guide to mobile access configuration to explore the underlying technologies which enable mobile access and discuss what you need to know to implement mobile access control.


See privacy and cookie policy
SourceSecurity.com
Browsing from the Americas? Looking for SourceSecurity.com US Edition?
View this content on SourceSecurity.com US Edition, our dedicated portal for our Americas audience.
Do not show me this again
International EditionUS Edition