Keeping House at the Office

Dean, Ray
December 2008
Security: Solutions for Enterprise Security Leaders;Dec2008, Vol. 45 Issue 12, p52
Trade Publication
The article focuses on the importance of service contracts in preventing problems and normal system breakdowns. It relates that security systems require upkeep to maintain integrity and function. It notes that a maintenance contract should be about a vendor coming to a facility and performing maintenance. Moreover, it implies that service pricing should not only reflect equipment cost but also the life of the system and replacement cost.


Related Articles

  • Avoid downtime with proper machine maintenance. BROOKS, BILL // American Laundry News (American Trade Magazines LLC (ATM));08/01/2014, p18 

    The article focuses on the importance of avoiding downtime with proper machine maintenance in laundry industry and offers expert guidance. Preventive maintenance is the best way and can be made more seamless if managers have a historical account of what repairs have been made, how frequently...

  • Martin Engineering Air Cannon Resolves Hopper Clogging.  // Rock Products;Aug2015, Vol. 118 Issue 8, p64 

    The article reports on a solution designed by materials handling solutions provider Martin Engineering to address ratholing and clogging of limestone dust in the main hopper at aggregates firm CRH Roadstone's Waterford facility in Ireland. Topics mentioned include the use of a mechanical digger...

  • 5 Five-Minute TECH QUIZ. Nelson, Ron // SDM: Security Distributing & Marketing;Jul2006, Vol. 36 Issue 7, p41 

    A quiz concerning wireless security systems is presented.

  • Manage Large Card Holder Databases.  // Security: Solutions for Enterprise Security Leaders;Jan2011, Vol. 48 Issue 1, p50 

    The article offers brief information on Access Control's two door controller.

  • Untitled.  // New Yorker;2/16/1976, Vol. 51 Issue 52, p120 

    An excerpt is presented from an article in "Fort Smith Southwest Times Record" about the problem of building a better alert system on a Monday.

  • Overload and Fuzzy Alarms. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Dec2003, Vol. 40 Issue 11, p66 

    Looks into the techniques used to maximize dispatch and response personnel in the security systems industry in the U.S. Utilization of filtering; Importance of automating; Advantages in prioritizing.

  • A Peace Offering. Stepanek, Laura // SDM: Security Distributing & Marketing;May2014, Vol. 44 Issue 5, p14 

    An introduction is presented in which the editor discusses various reports within the issue on security systems as well as the process for gathering data on security device manager installations.

  • Editorial. Jong Hyuk Park; Deqing Zou; Tai-hoon Kim; Lopez, Javier; Hangbae Chang // Journal of Intelligent Manufacturing;Oct2010, Vol. 21 Issue 5, p593 

    The article discusses various reports published within the issue, including one by Y. Shin on a telebiometric system mechanism model and biometric network protocol for networked manufacturing security, one by S. Oh on a role-based access control in e-business environment, and one by Cheng on the...

  • Editorial. Kokolakis, Spyros; Stefanos, Gritzalis // Journal of Information System Security;2010, Vol. 6 Issue 1, p1 

    The article discusses various reports published within the issue including one by Christos Kalloniatis on the new methods of privacy requirements engineering, one by George Aggelinos and colleagues on disaster recovery planning, and one by Aggeliki Tsohou on the correlation of security awareness...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics