Bob Mesnik

How to Protect IP Camera System from Cyber Attack

Protecting Your IP Camera from Hacking IP camera systems are supposed to protect us. That is their purpose. However, do…

8 years ago

Technical Jokes and Cartoons-36

Jack made his way through veterinary school working nights as a taxidermist. Upon graduation, he decided he could combine his…

8 years ago

Biometric Door Control Misconceptions

Do You Believe Facial Recognition Readers Store Your Picture? There are many misconceptions about science and technology. One of the…

8 years ago

Technical Jokes and Cartoons-35

Some groaners: Back in the 1800's the Tates Watch Company of Massachusetts wanted to produce other products and, since they…

8 years ago

Long Range Camera Systems – Custom Vs. Off-the-Shelf

Review of Long-Range Day-Night IP Camera Systems If you want to detect an object many miles away, you will need…

8 years ago

How to Ensure Video Chain of Evidence

How Write-Once Storage is Used to Protect Video Evidence From Your Ip Surveillance System One of the objectives of a…

8 years ago

Technical Jokes and Cartoons-34

An engineer died and reported to the Pearly Gates. An intern angel, filling in for St Peter, checked his dossier…

8 years ago

Protecting Your Computer from Malware

How to Protect Your Computer from Ransomware and Other Malware What if you didn’t have to worry about ransomware or…

8 years ago

Technical Jokes and Cartoons-33

There was once a man named Odd. People made fun of him because of his name so he decided to…

8 years ago

Detection, Recognition, Identification: The New Criteria

The Real-World Resolution Requirements I was not sure what to call this article. I first thought it should be titled,…

8 years ago