TITLE

In the Video Integration Driver s Seat

AUTHOR(S)
Zalud, Bill
PUB. DATE
October 2007
SOURCE
Security: Solutions for Enterprise Security Leaders;Oct2007, Vol. 44 Issue 10, p122
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the importance of video integration in the transportation industry. Integration of security video into the driving experience started with cameras in the back of commercial trunks. For enterprise security executives, what is more interesting about video integration are business applications.
ACCESSION #
27148962

 

Related Articles

  • Career Path Certification Program Launched for Video Professionals.  // SDM: Security Distributing & Marketing;Jun2005, Vol. 35 Issue 6, p54 

    This article focuses on video security systems. Technicians and designers working with video security systems are now being recruited to be among the first in their industry to showcase their professional competency by embarking on a new series of certification tests that can make them eligible...

  • Digital Revolution Video. Jones, Sandra // Security: Solutions for Enterprise Security Leaders;Apr2004, Vol. 41 Issue 4, p25 

    Discusses digital technology developments related to the video market as used in security systems. Advantages provided by video technology and remote video monitoring systems to users; Challenges associated with video technology developments; Significant trends in digital technology. INSET:...

  • Tools of the Master Planning Trade. Collins, Kurt W. // Security: Solutions for Enterprise Security Leaders;Dec2007, Vol. 44 Issue 12, p36 

    The article discusses why organizations need a master security plan and how to go about assembling and implementing the plan. Creating a security master plan calls for a lot of homework including the need to know the existing and future needs of the business enterprise. The baselining of current...

  • Reinventing Security. Berg, Chris // Security: Solutions for Enterprise Security Leaders;Jul2009, Vol. 46 Issue 7, p30 

    The article discusses the reinvention of the security function on companies in the U.S. It defines the reinvention of security as working through extreme organization alteration or functional flaws to generate a new function that meets the business' needs. It offers four common occurrences which...

  • A security-based agent for a virtual enterprise. Huang, J.; Zhou, Z. D.; Chen, Y. P. // International Journal of Advanced Manufacturing Technology;Apr2004, Vol. 23 Issue 7/8, p620 

    On the basis of an analysis of the differences between virtual and traditional enterprise including the disadvantages of traditional enterprise, this article addresses the issues of information security and the impact of concurrent events. Because the Internet is an open network, some of the...

  • CPS Security Solutions: A Safer Point of View for Industrial and Commercial Security.  // Orange County Business Journal;7/31/2006, Vol. 29 Issue 31, p15 

    The article features the CPS Security Solutions, which is intended for industrial and commercial security. According to sources, surveillance in industrial and commercial security applications, is growing in demand. Expenditures in video surveillance equipment market grow at an annual growth...

  • Focus on the Front End. Farnham, J. Mike // Security: Solutions for Enterprise Security Leaders;Mar2004, Vol. 41 Issue 3, p37 

    Focuses on the role of specifics of the front end load in the application by San Francisco, California-based credit card provider Providian Financial Corp. of new security technology. Problem faced by the company concerning the card access system; Selection by Providian of Picture Perfect...

  • Staff: Light Their Fires. Cottringer, William; Kirby, Jeff // Security: Solutions for Enterprise Security Leaders;Jul2004, Vol. 41 Issue 7, p60 

    Presents tips in motivating employees to participate in corporate security management programs. Need for security managers to discuss with supervisors about security measures the company has implemented; Significance of listening to each individual security staffer; Consistency in demonstrating...

  • Mission Essential Vulnerability Assessments - Try Them, You Just Might Like Them.  // Security: Solutions for Enterprise Security Leaders;Jul2008, Vol. 45 Issue 7, p52 

    The article features a new concept tool called Mission Essential Vulnerability Assessments (MEVA) in the U.S. The MEVA concept allows a security expert to justify expenses in a clear and concise manner. Moreover, MEVA assessment allows accountants, executives and other non-security management...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics