SourceSecurity.com US Edition
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs    Join SourceSecurity.com on LinkedIn
REGISTERTerms
Bringing the security industry into focus
Biography
Larry Anderson
Specialist areas

Larry Anderson

Editor, SourceSecurity.com

An experienced journalist and long-time presence in the US security industry, Larry is SourceSecurity.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SourceSecurity.com US Edition's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals. Larry also commissions Expert Commentary / Thought Leadership features, providing a platform for the industry's top executives to comment on the dynamic security marketplace.

From 1996 to 2008, Larry was editor of "Access Control & Security Systems" magazine and its affiliated website. He has written numerous articles for and about some of the largest companies in the security industry. He earned a Bachelor of Arts from Georgia State University with a minor in marketing.

Round Table contributions by Larry Anderson

How can IP networked systems adapt to lost connectivity?
How can IP networked systems adapt to lost connectivity?

Comment: Assuming localised power, networked video and security edge devices continue to operate in the case of a network outage. Cameras continue to...

What if a customer expects more than a security system can deliver?
What if a customer expects more than a security system can deliver?

Comment: Depending on the customer and the system provider, any number of things could happen, none of them pleasant. If a system doesn't deliver on the...

What security applications are best suited to smartphone apps?
What security applications are best suited to smartphone apps?

Comment: Almost any security application is suited to a smartphone app – and many (if not most) of them are moving in that direction. Increasingly,...

What is the value of edge-based video storage for IP surveillance systems?
What is the value of edge-based video storage for IP surveillance systems?

Comment: Storage at the edge is part of a trend toward “distributed” rather than centralised systems. Capturing images at the edge can be...

Articles by Larry Anderson

CodeLynx adapts Microsoft HoloLens headset for security systems on the goCodeLynx adapts Microsoft HoloLens headset for security systems on the go
“Mixed reality” may seem like a strange term to apply to the physical security industry, but it describes a new approach to enable the features of access control and video...
London terror attack: Are other high-profile sites at risk?London terror attack: Are other high-profile sites at risk?
The attack on Parliament in London is another reminder that a facility's security is only as strong as its weakest point. In this case, it was a frequently used gate in New Palace Yard that was...
Smartphones offer many advantages over cards and fobs for access controlSmartphones offer many advantages over cards and fobs for access control
Smartphones offer a new alternative to traditional physical access control form factors such as smart cards or fobs. Convenience is the most obvious...
IronYun: How AI simplifies video search and lowers storage costsIronYun: How AI simplifies video search and lowers storage costs
Artificial intelligence and deep learning are poised to transform how video images are used and managed. In today’s surveillance systems, video from more and more cameras leave operators at...
NVIDIA Jetson TX2 GPU: Greater intelligence and computing power at the edgeNVIDIA Jetson TX2 GPU: Greater intelligence and computing power at the edge
Several of the hot trends in the physical security industry – robots, drones, video analytics – have one thing in common: The need for greater intelligence. More complex physical...

Show all

Related articles
SourceSecurity.com’s top 10 Expert Panel Roundtable discussions in 2015SourceSecurity.com’s top 10 Expert Panel Roundtable discussions in 2015
SourceSecurity.com’s Expert Panel had a lot to say in 2015 on a variety of topics in our Roundtable discussions. Not surprisingly, the discussion...
Huge China Public Security Expo (CPSE) reflects China’s growing security marketHuge China Public Security Expo (CPSE) reflects China’s growing security market
There's nothing like a visit to the China Public Security Expo (CPSE) in Shenzhen to open your eyes to a new world of security market manufacturers and customers in the Asia-Pacific market. The...
Video storage system cost considerationsVideo storage system cost considerations
Strategic management of costs is important when considering video storage systems Costs are at issue when considering any component of a video system. Strategic...
Rethinking physical access control to operate in an IT-centric environmentRethinking physical access control to operate in an IT-centric environment
Physical access control system architecture should be built to use the changing IT infrastructures of today’s organizations to their fullest It’s time...
What's next for Vicon? We asked the new CEOWhat's next for Vicon? We asked the new CEO
The merger of Vicon and IQinVision has been one of the more interesting business developments in the security and video surveillance markets in 2014. Wondering how the merger is working out, I...

Show all


See privacy and cookie policy
SourceSecurity.com
Browsing from the Americas? Looking for SourceSecurity.com US Edition?
View this content on SourceSecurity.com US Edition, our dedicated portal for our Americas audience.
Do not show me this again
International EditionUS Edition