About Technology

Security Technology Review for 2017

In 2017 there were a number of technology advancements. Faster processors provided higher performance IP cameras that enhanced the security…

8 years ago

How to Protect IP Camera System from Cyber Attack

Protecting Your IP Camera from Hacking IP camera systems are supposed to protect us. That is their purpose. However, do…

8 years ago

Biometric Door Control Misconceptions

Do You Believe Facial Recognition Readers Store Your Picture? There are many misconceptions about science and technology. One of the…

8 years ago

Long Range Camera Systems – Custom Vs. Off-the-Shelf

Review of Long-Range Day-Night IP Camera Systems If you want to detect an object many miles away, you will need…

8 years ago

How to Ensure Video Chain of Evidence

How Write-Once Storage is Used to Protect Video Evidence From Your Ip Surveillance System One of the objectives of a…

8 years ago

Protecting Your Computer from Malware

How to Protect Your Computer from Ransomware and Other Malware What if you didn’t have to worry about ransomware or…

8 years ago

Detection, Recognition, Identification: The New Criteria

The Real-World Resolution Requirements I was not sure what to call this article. I first thought it should be titled,…

8 years ago

Comparison of Security Provided by Door Access Systems

What Is the Most Secure Door Access Control System? How secure are door access control systems?  Pricing can range from…

8 years ago

Comparison of Panoramic IP Cameras

How far can you see with an IP panoramic camera? Panoramic Camera View A panoramic camera provides a very wide…

8 years ago

Access Control and Fire Alarm System Integration

How to Integrate Access Control with Fire Alarm Systems Integration of Access Control and Fire Alarm Door access control systems…

9 years ago