Nicaragua News

Choosing the right cable for networking infrastructure

The use of multiple wires has advantages for network transmission Network connection to a remote device begins by considering the type of cable. In some cases, installed cable may already be present and available for reuse, or you may have the option to install a new cable. Let’s review the major types of cable used for most security applications, their advantages and disadvantages. Types of cables In general, there are four major types of cable. First is coaxial cab...

Should marketers seek to leverage violent incidents?

When a big security breach occurs, the phones start ringing at security companies, or so the expectation goes. The nature of security is that it takes a security breach, or even a high-profile tragedy, to convince managers of the need for security technology. When a school shooting occurs, schools take note. When terrorism strikes a soft target, other vulnerable institutions notice. Same for hospitals and airports and even nightclubs. When an event occurs, it gets attention that could translate...

oneM2M significantly expands IoT ecosystem with new global standards

The critical area of security has been addressed throughout the 17 specifications of Release 2 The full potential of the Internet of Things (IoT) advanced significantly as oneM2M, the global standards initiative for Machine-to-Machine (M2M) communications and the IoT, published a new landmark set of specifications, Release 2.Based on contributions from more than 200 member companies, Release 2 builds on oneM2M’s initial set of official specifications, which enable basic...

Joint Commission accreditation impacts healthcare security upgrades

 Part 11 of our Security in Healthcare series The Joint Commission’s mission is to continuously improve health care for the public, in collaboration with other stakeholders Compliance with Joint Commission accreditation can impact hospital and healthcare safety and security decisions, and can even drive security system improvements at healthcare facilities. An independent, not-for-profit organisation, The Joint Commission accredits and certifies nearly 21...

IHS Markit: Global shipment of e-government credentials to reach 1 billion units by 2020

The e-government and healthcare identification market is very much driven by individual projects Shipments of electronic government (e-government) credentials—including e-passports, e-identity cards, e-health cards and e-driving licenses, and others—are projected to reach 1 billion units in 2020, nearly doubling 2015 volume.Project-driven marketThe e-government and healthcare identification market is very much driven by individual projects. Whether these projects c...

Wireless tracking & RFID enabled Real-Time Location System protects infants at Boston Medical Center

The Hugs Infant Protection Solution tracks the location of babies and provides protection anywhere the infant may be transported Wireless tracking and radio frequency identification (RFID) continue to improve dramatically in range and reliability, allowing Real-Time Location Systems (RTLS) pinpointing people, places and things with impressive accuracy. Systems integrator Advance Technology Inc. (ATI), Scarborough, Maine, recently installed a comprehensive, hospital-wide soluti...

Advantages of integrating audio monitoring and sound detection in school security solutions

Deploying audio solutions would flag incidents not caught on camera With the increasing number of campus shootings and lockdowns, security is a top priority for schools. Decision-makers are looking to repair the inefficient security measures on campuses by either upgrading their current systems or installing state-of-the-art technologies to enhance situational awareness. Traditionally, security personnel have relied on video as the primary method of monitoring. However, this...

Download: Modern tools to achieve excellence in video security

Better-performing video systems provide better security. Today’s end users demand systems with optimum performance, providing smooth video streams, higher resolutions, efficient storage, better analysis and quick access to stored images. Here are several technologies driving greater video surveillance capabilities: Innovations in image processing to boost system performance Higher resolutions are a challenge for video management systems, but new tools are mee...

Clarifying evidentiary procedures for digital video admissibility

48% of U.S. judges say they are not adequately prepared to deal with the range of “scientific or technical evidence” presented in court Over the last decade, the video surveillance security industry has morphed drastically in attempts to keep pace with both the consumer electronics and enterprise IT markets. This has created a steep learning curve for law enforcement as well as individuals in the judicial system. A 2012 survey titled “A national survey of ju...

Deep learning technology applications for video surveillance

The field of artificial intelligence known as machine learning or cognitive computing has in recent years become highly popular The field of artificial intelligence known as machine learning or cognitive computing has in recent years become highly popular. The meteoric rise of “deep learning” technology over the past several years has been truly dramatic in many industries. Industry giants from Google, Microsoft, Facebook, IBM and many others have been pouring mass...

Video intelligence broadens with actionable intelligence from social media and other data

For more than a decade, Verint Systems, Melville, New York, has been developing and redefining the phrase the company pioneered: actionable intelligence. Today, its real-world specifications provide an in-depth analysis of video and integrated physical security data, deepening the gathering of intelligence and lessening risk at the protected premises. The entire realm of situational awareness continues to transition as intelligence is gleaned from new points, with this trend only...

Security companies embrace Corporate Social Responsibility to improve environmental & social impact

CSR applies to the security industry in many different ways and can be practised by small or large businesses What exactly is Corporate Social Responsibility (CSR) and how does it apply to the security industry? Let’s look at how two very different companies – Axis Communications and FGH Security – each put CSR at the heart of their operations. Corporate Social Responsibility means different things to different people, and is often used as a catchall for one...

Dahua cameras provide winning video surveillance solution for 2016 Rio Summer Olympics

Dahua provided 1823 pieces high-resolution IP, dome, and 30x optical zoom PTZ cameras for the project When the Olympic Games come to town, the welfare of people and property are of paramount importance in both the planning process and during the event. The 2016 Summer Olympics in Rio de Janeiro drew 500,000 foreign visitors and sold $7.5 million tickets to people who watched 10,500 athletes compete. There were 85,000 security personnel on hand, and the overall budget for secur...

Security buying: Why purchase from a distributor?

A perceived benefit of buying direct is to save money as opposed to paying a middleman Security companies have multiple options to purchase security products today – online, manufacturer direct, or from the vast array of security products and electrical supply networks dotting the landscape. Because there are numerous options, and costs may not vary drastically, the final decision on where to purchase ultimately boils down to service and additional support these channels...

Considerations when designing an IP video security infrastructure

Too often we attribute failure of connected devices to the devices themselves when the problem is actually an infrastructure failure Network infrastructures for security devices are complex. It may seem simple to connect an Ethernet cable to a cable modem, but the connection of IP cameras, access control devices and other IP/Power Over Ethernet (PoE) devices is not nearly so simple. Infrastructure is the heart of any system; and too often we attribute failure of connected devi...

ASIS 2016 Accolades Award winners list released

IoT-based platforms, software analytics, and personal protection devices feature in the Accolades winners ASIS International, an organisation for security professionals worldwide, has selected its ASIS 2016 Accolades Award winners. ASIS Accolades Award recognises the security industry's most innovative new products, services, and/or solutions featured at the ASIS International Annual Seminar and Exhibits (ASIS 2016), taking place Sept 12-15 at the Orange County...

How can IP networked systems adapt to lost connectivity?

IP network dependability matters in physical security and safety applications, given that a company’s assets and people are at risk. There have been strides in the areas of network dependability, fault-tolerance, reliability, and survivability. However, networks (or affordable ones, at any rate) still cannot ensure near-100 percent uptime, which is why system designers acknowledge and plan for the possibility of a network outage. We asked this week’s Expert Panel Roundtable: How can/...

Low-key ASIS 2016 reflects changes in the security industry

I have been unpacking from last week’s ASIS show in Orlando. It was a good show, except if you compare it to last spring’s ISC West in Las Vegas, which was especially well attended and generated a lot of excitement in the market. ASIS was definitely smaller, lower key and less crowded. And there were no big product announcements. But there was still plenty of technology on display. In particular, I saw the show reflecting several ongoing trends in the market. Impact of M&As Me...

Future of mobile security hardware for enhanced situational decision making

In our world we make mobile security equipment for surveillance on-the-go in moving vehicles There are too many moving parts to a mobile system to think we could just predict hardware innovations. In our world we make mobile security equipment for surveillance on-the-go in moving vehicles. To make it work it takes a village of components vendors to bring it all together into a system that will keep civilians safer in the future. Possibly to the point of preventing an event fro...

Maximising camera-based applications for security

Camera apps provide flexibility that is unheard-of with traditional server-based processing and analytics solutions The ability to customise IP video surveillance cameras with third-party apps has been a game-changer in system design and implementation. Traditional analytics require streaming all video to a server or external processor for deep interpretation to detect a license plate, face, or other criteria in each video frame. Apps perform image processing within the camera...

Allied Market Research expects managed security services market to reach $40.97 billion by 2022

IPS/DPS market is expected to exhibit a remarkable growth during the forecast period A new report published by Allied Market Research titled, "Managed Security Services Market - Global Opportunity Analysis and Industry Forecast, 2014 - 2022", states that the global managed security services market is likely to reach revenue of $40.97 billion by 2022, growing at a CAGR of 16.6% from 2016 to 2022. North America is expected be the largest market for managed security services dur...

Allied Market Research predicts situation awareness systems (SAS) market to reach $32.6 billion by 2022

By industry vertical, military and defence dominated the situation awareness system market in 2015 A new report published by Allied Market Research titled, "Situation Awareness System (SAS) Market - Global Opportunity Analysis and Industry Forecast, 2015 - 2022", states the situation awareness systems (SAS) market is projected to garner $32.6 billion by 2022, registering a CAGR of 8.2% during the forecast period of 2016 - 2022. North America dominates the global SAS market, ow...

ASIS 2016 Day 2 highlights: New product releases, technology innovations & data

The ASIS show has not traditionally been a big forum for new product introductions -- those happen mostly at ISC West in the spring. Even so, there is plenty of technology to see at this year's show, and many exhibitors now say the products they were talking about last spring are now ready to ship. On Day Two of the show, it seems a lot of the attendees are ready, too. Video camera technology The technologies of video cameras march on, and Hanwha Techwin America has embraced the new H.265 cod...

Rapid growth of data attracts Hitachi to the video storage market

The amount of data generated by today’s video systems – whether resulting from increasing camera counts and/or higher resolutions such as 4K – is presenting new challenges when it comes to storing the data and making it instantly accessible to end users. The surge in data is opening the way in our market for new, more sophisticated IT systems to manage and store the data. In fact, the sheer volume of video data and increasing application demands make some legacy approaches obso...

ASSA ABLOY displays eco-friendly sustainable access control solutions at ASIS 2016

Securitron EcoPower power supply is designed to work with low-power electrified access control devices Reaffirming a commitment to providing access control solutions that help customers achieve sustainability goals and reduce energy consumption, ASSA ABLOY will showcase a comprehensive array of high-performing, sustainable access control technologies at ASIS 2016. These technologies address sustainability on two levels—they are designed and manufactured in facilities ce...

Schneider Electric’s AccessXpert security management system allows access control and building management systems integration via BACnet

AccessXpert cloud-based security system uses BACnet communications protocol to drive new levels of building efficiency Schneider Electric, a provider of energy management and automation solutions, announced enhancements to its AccessXpert security management system at ASIS 2016. The new enhancements allow facility mangers to seamlessly integrate their security and building management systems for the first time via the BACnet communications protocol to drive information sharing...

Protection 1 announces “The Power to Do More for You” at ASIS 2016

The exhibit marks the company’s first appearance with ADT since the announcement of their integration Protection 1, the premier full-service business and home security company in the U.S., announces “The Power to Do More for You” at the ASIS 2016 Conference in Orlando, Florida. The exhibit marks the company’s first appearance with ADT since the announcement of their integration in May 2016. Expanding footprint From September 12-14 at booth #3113, Prot...

Promise Technology announces availability of new NVRs in North America at ASIS 2016

The Vess A2330 and A3340 provide value and reliability for small to mid-sized security deployments Security professionals now have more storage options to choose from when planning their IP video surveillance deployments, no matter the size of the project. Promise Technology, a developer of open storage platforms for video surveillance, announces at ASIS International that its two new network video recorder (NVR) storage servers, the Vess A2330 and A3340, are now available in...

LifeSafety Power displays new intelligent power management solutions at ASIS 2016

At ASIS 2016, LifeSafety Power will exhibit growing ecosystem of network-based solutions LifeSafety Power, Mundelein, Illinois, a provider of smarter power solutions and patented remote networking capabilities, is already creating a buzz for ASIS 2016, September 12-15 in Orlando, with its intelligent power management solutions. Set to exhibit at booth 3461 during the show, the company’s growing suite of products have effectively forged a new category of remote managed se...

HID Webinar: Mobile credentials in access control - The next transformation

  Summary Date: Tuesday, September 20, 2016 Time: 10:00am PT / 1:00pm ET / 5:00pm UTC Duration: 45 minutes + Q&A What's the webinar about? Mobile credentials are one of the most exciting areas of the access control market. The transformation caused by the development of various mobile solutions in payment, banking, ticketing and automation is poised to deliver similar changes in the access control industry. Mobile credentials are now entering the market...

Related videos

OPTEX REDSCAN mini series protects The Londoner Hotel

Hofbräuhaus in Munich relies on eCLIQ

What Alcatel-Lucent OmniVista Network Advisor can do for network infrastructure

Quick poll
What is the most significant challenge facing smart building security today?