Smart Access Control: Creating Logical Rules

The delivery of smart solutions has been made easier for many integrators and installers via the implementation of ‘cause and effect’ logical programming. This allows a system to automatically trigger actions in response to user-defined events,...

Face-based Video Analytics

Facial detection and facial recognition technologies have been trialled in a variety of security and safety applications in the past, with varied success. While the technologies have appeared in a range of applications from the very basic right up to...

12 to Try: Locking Systems

Benchmark looks at 12 products and systems of interest for security installers and system integrators involved in the delivery of managed and secure locking systems. Paxton: Net2 PaxLock The Net2 system from Paxton includes the PaxLock, a wireless...

Assessment: Intrusion Detector Stability

The world of intruder detection never stands still. Professional manufacturers work tirelessly to enhance the catch performance of sensors and improve overall levels of accuracy. Unfortunately, too many people still think about detectors solely in...

NIS – do your systems comply with the cybersecurity directive?

PROMOTIONAL FEATURE By Steven Kenny, Industry Liaison, Architecture and Engineering, Axis Communications Are you aware of the Network and Information (NIS) Directive and what it means for your business? Unsure of the details? You’re not alone. The...

SMART PROJECTS


SMART SEARCH: THE BENEFITS AND USE CASE


A series of articles looking at the business case for deploying smart search technology, an assessment of Avigilon Appearance Search, and a consideration of the end user benefits, plus other resources.


 

SMART AUDIO: IMPLEMENTING IP AUDIO


A series of articles looking at the business case and potential added value when deploying network-based audio technology, along with a consideration of the end user benefits, plus other resources.