Ground Yourself for Power Quality

September 2007
Security: Solutions for Enterprise Security Leaders;Sep2007, Vol. 44 Issue 9, p96
Trade Publication
The article focuses on the need to understand the electrical sensitivity of elements of a security system to resolve common power quality problems. It is noted that changes in the characteristics of the power supply to the components of a security system are caused by several sources. Components of security systems that are highly sensitive to power quality includes visual surveillance, access control, storage of surveillance and access data, and intruder detection and monitoring.


Related Articles

  • United Building Security: Urban Challenges, Diverse Solutions.  // Security: Solutions for Enterprise Security Leaders;Mar2004, Vol. 41 Issue 3, p22 

    Focuses on the employment by Martin Cramer, vice president of the Downtown Dallas Security Directors Association, of a security video system for the facility of Dallas, Texas-based United Building Security. Description of the facility; Availability of the video system on a local area network;...

  • Time-sensitive Upgrade to IP Video.  // Security: Solutions for Enterprise Security Leaders;Nov2006, Vol. 43 Issue 11, p52 

    The article discusses the upgrade on the security video system of Sho Ka Wah Casino in California. Terri Seigler implemented an advance Internet Protocol based digital surveillance system using intelligent and networking by Intelligent Edge Switches. The said installation comprised of 300...

  • Honeywell Power Products Earns CSFM Approval.  // SDM: Security Distributing & Marketing;Oct2007, Vol. 37 Issue 10, p47 

    The article reports on the approval of constant duty-free fire system power supplies from Honeywell Power Products company by the California State Fire Marshal (CSFM). The products are listed by the CSFM as approved devices for installations within the state. The HP-300, 400 and 600 series...

  • Pick Your Alarm Power. Gager, Russ // SDM: Security Distributing & Marketing;Oct2007, Vol. 37 Issue 10, p83 

    The article offers advice on how to choose the type of power supply for one's application. The selection of these products is critical depending on the kind of one's fire or burglar installations. Generally, every power supply takes line voltage and reduces it to the voltage digital electronics...

  • ON THE MARKET.  // Security: Solutions for Enterprise Security Leaders;Jan1999, Vol. 36 Issue 1, p52 

    Features several electronic security systems in the United States. Details of SWM Series Spectra Compact Wall Mount from Pelco; Functionality of Alligro LTC 4300 Series phoneline video transmission system from Philips Communication & Security Systems; Description of SWC40 surveillance system...

  • Super Bowl Spurs Face Recognition Technology.  // Security: Solutions for Enterprise Security Leaders;Mar2001, Vol. 38 Issue 3, p13 

    Focuses on the use of facial recognition technology for surveillance, crime detection and counter-terrorism operations in the United States. Software technology and video surveillance systems used during the Super Bowl event; Companies offering the facial recognition technology; Concern over...

  • CCTV traps McVeigh: Multi-media surveillance advances, succeeds. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Jul97, Vol. 34 Issue 7, p23 

    Focuses on advances in multi-media surveillance technology. Use of closed-circuit television in security applications; Computer-based surveillance technology; Use of Object Linking and Embedding; Security software; Products by different manufacturers.

  • Five Minute Tech Quiz. Nelson, Ron // SDM: Security Distributing & Marketing;Feb2009, Vol. 39 Issue 2, p67 

    A quiz concerning control panel and monitoring technology of security systems is presented.

  • CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions. Black, John; Rogaway, Phillip // Journal of Cryptology;Spring2005, Vol. 18 Issue 2, p111 

    We suggest some simple variants of the CBC MAC that enable the efficient authentication of arbitrary-length messages. Our constructions use three keys, K1, K2, K3, to avoid unnecessary padding and MAC any message M ? {0,1}* using max{1, ? |M|/n?} applications of the underlying n-bit block...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics