Government & public services security applications - Expert commentary

Security System Implementation: "bleeding Edge" Versus Leading Edge Security Technologies

Choosing between "bleeding edge" and leading edge technology is critical when deploying a security system The choice of the right security technology is one of the primary considerations for implementation or upgrade of a video surveillance system or other security system. Industry professionals making this critical decision often have to choose between a ‘bleeding edge’ technology, i.e. one that is in its infancy but offers great potential, and a leading edge prov...

Intelligent Security Components Pave The Second Wave Of Convergence

   Network-enabled "intelligent" security components increasingly have better computational and memory capacity The use of Internet Protocol (IP), or networking, is commonly associated with convergence. In this article, Markus Lahtinen of Lund University's LUSAX project, contends that the shift to network-enabled "intelligent" security components which increasingly have better computational and memory capacity has a significant impact on the present and future dy...

Fiber Optic Transmission In Security And Surveillance Solutions

  Fiber optics enhances the operation and business bottom line of surveillance solutions Designers and end users of security systems, integrators and installers must consider and balance the functionality required of a video surveillance camera with its methods of transmission. This is the first of a 3-part examination by Mark Wilson, Marketing Vice President of Infinova, of how chief security officers (CSOs), directors and managers can understand the benefits of and...

Axis Communications Considers The Future For The Security Industry

SourceSecurity.com took the time to catch up with the CEO and President of the company that invented the network camera more than 10 years ago, Axis Communications, to ask him whether the era of IP-based surveillance had arrived and what obstacles remain in the way of more widespread adoption. SourceSecurity.com: Do you think IP-Surveillance has finally come of age? Ray Mauritsson: Yes and it is not just Axis saying this.  You only need to look at the growth of sales of the network...

Where There's Smoke And Wire, Thieves Perspire: Applications Of Artificial Smoke Systems

In his previous article, Matt Gilmartin of Concept Smoke Screen introduced the... well... concept... of artificial smoke as a defense against burglars.  Here he explores the practicalities of the technology and introduces us to a few of its many applications. Originally, security fog systems were exclusively a means of preventing loss through burglary, and were utilised only in the manner described in my previous article.  But advancements in technology (partly fueled by ever-growing...

Security Smoke Systems

In the first of two articles, Matt Gilmartin of Concept Smoke Screen introduces the idea of using artificial smoke as a final - and telling - barrier against burglary, and explains the basics behind this wildly under-reported technology. Around twenty years ago, a dramatic increase in the amount of smash-and-grab and "ram-raid" style burglaries made it apparent that for a lot of premises, the three layers of "conventional" security measures were no longer enough: Physical security...