Campus Graduates to Intelligent Video

November 2005
Security: Solutions for Enterprise Security Leaders;Nov2005, Vol. 42 Issue 11, p16
Trade Publication
Focuses on the installation of surveillance systems in John Hopkins University. Significance of the behavior recognition software solutions; Selection of Cernium's Perceptrak system for the university; Features and capabilities of the system. INSET: 'See' More Like Humans.


Related Articles

  • PRODUCT SOLUTIONS.  // American School & University;Sep2004, Vol. 77 Issue 1, pSS 12 

    Features several security and technology products for schools and universities. Supervised Reader Extender from Cypress Computer Systems; Portable first-aid unit from SafetyMate Corp.; Steel latch from Kwikset; Wireless Camera Surveillance System from Beacon Products, Inc.; CAM SS-XP Digital...

  • Orchestrate vulnerability management. Andrew, Chris // Communications News;Aug2006, Vol. 43 Issue 8, p26 

    This article discusses ways to implement patch and vulnerability management within corporations. While patching and vulnerability assessment may seem like an arduous task, consistent mitigation of organizational vulnerabilities can be achieved through a thoroughly tested and integrated patching...

  • MOBILE ROBOT COMPUTER.  // Aviation Week & Space Technology;9/19/2005, Vol. 163 Issue 11, p65 

    This article reports that Cypress Computer Systems Inc. has joined with MobileRobots to introduce robotic platforms to the security marketplace. Cypress recently launched its first mobile robotic product--the Remote Surveillance and Verification Platform (RSVP). It is the first autonomous mobile...

  • Northwest Electronic Security Has the Latest in Biometric Systems.  // Caribbean Business;10/27/2005, Vol. 33 Issue 42, pS10 

    Focuses on ACTAtek, the world's only biometric and smart card authentication system using encrypted and secure Web-based, real time communication, by Northwestern Electronic Security. Benefits of the biometric system; Functions of the system; Impact of the system on the security management industry.

  • Taking a Proactive Campus Approach.  // Security: Solutions for Enterprise Security Leaders;Aug2007, Vol. 44 Issue 8, p40 

    The article features the security management of the University of Southern Mississippi in Hattiesburg, Mississippi. The university serves 16,000 students in the main campus. The Department of Residence Life is the one tasked in providing a premier physical, social and cultural environment....

  • SAFETY BY DESIGN. Hensley, Don // American School & University;Sep2004, Vol. 77 Issue 1, pSS 4 

    Offers guidelines concerning the implementation of security solutions within schools and universities. Categories of security solutions available for the school system; Overview of the Safe School Ambassadors Program, which was founded in 1999; Common hardware selected for school security. ...

  • The Role of Universities in Preparing the Next Generation of Security Professionals. Alexander, Dean C. // Security: Solutions for Enterprise Security Leaders;Apr2008, Vol. 45 Issue 4, p90 

    The article discusses the role of universities and colleges in preparing the next generation of security professionals. The article focuses on students' substantive academic coursework provided by the universities. It states that students are exposed to practical, hands-on security-related...

  • Retrofit with Finance Card.  // Security: Solutions for Enterprise Security Leaders;Jun2008, Vol. 45 Issue 6, p52 

    The article focuses on the effort of Texas A&M University (TAMU) to impose a specified centralized system that enables decentralized control in College Station, Texas. Careful research helped TAMU to accomplish access control while avoiding additional implementation expenses. The system uses...

  • The Magic of Mix & Match Communications.  // Security: Solutions for Enterprise Security Leaders;Mar2006, Vol. 43 Issue 3, p58 

    The article features Ithaca, New York-based Cornell University's Digitize System 3505 alarm monitoring system which identifies and provides details on the alarm source. As part of the upgrade, the system was replaced. The older system simply monitored reverse polarity alarms that only identified...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics