No More Careless Convergence, Please!

Jensen, Joel
February 2009
Security: Solutions for Enterprise Security Leaders;Feb2009, Vol. 46 Issue 2, p32
Trade Publication
The article discusses the need of applying convergence carefully. It is stated that integrating the sophisticated video platform from one manufacturer and an access control solution from another is a costly process. It is suggested that one should stick with the same version of the software and operating system or replace video side with a digital video recorder from the access control manufacturer. Simpler video software enhances the operators' ability to check an alarm via video.


Related Articles

  • 3 Wishes. Hodgson, Karyn // SDM: Security Distributing & Marketing;Oct2008, Vol. 38 Issue 10, p65 

    The article discusses the three things that access control dealers and integrators wanted to improve or implement within the security systems industry in the U.S. The three things include more open and non-proprietary standardized access cards, longer read ranges and more powerful software and...

  • PTZ DOME, DVR & ACCESS CONTROL COMPONENT ADDED TO PRODUCT SERIES.  // SDM: Security Distributing & Marketing;Dec2010, Vol. 40 Issue 12, p104 

    The article offers information on the new control component products which were added to the Performance Series of Honeywell Inc. such as the HDT Series PTZ dome, HRDP H.264 digital video recorder, and NetAXS-123 entry-level access control system.

  • What Exactly is an API? Honovich, John // Security: Solutions for Enterprise Security Leaders;Aug2008, Vol. 45 Issue 8, p48 

    The article offers information on application programming interface (API) relative to physical security in the U.S. It states that the goal of API is to allow different applications to work together, integrating a digital-network video recorder (DVR/NVR) with an access control system, alarm...

  • Windows 98 remote access.  // PC Week;06/15/98, Vol. 15 Issue 24, p144 

    Presents a step by step description of accessing Windows 98 from a remote location. The Dial-Up Networking wizard; Creating a modem based connection; Entering the Internet service provider's phone number; Creating a second dial-up connection; Entering the host's Internet Protocol (IP) address...

  • Confused yet about NT passwords? Try the 7-14 rule; those numbers work better than most. McClure, Stuart; Scambray, Joel // InfoWorld;11/22/99, Vol. 21 Issue 47, p40 

    Provides information on how to restrict Windows NT passwords. Steps to follow in restricting passwords; How a seven character password can match eight in complexity; How the Lan-Manager algorithm works.

  • Track record. Bennett, Geoffrey // Australian Personal Computer;May2001, Vol. 22 Issue 5, p134 

    Gives advice on the use of the Revision Control System to edit software code in Linux. Simplicity of application for the management of a small number of files; Separation of the repository from the working files; Procedure for the creation of a test directory.

  • Beefing up NT's security out of the box. Morrey, Brad // InfoWorld;06/16/97, Vol. 19 Issue 24, p122 

    Presents ways to make Windows NT security more robust in the absence of third-party security products. Limitation of log-in hours and enabling audit logging as two easy-to-enable security measures; Password strategies.

  • Charms of Linux DVRS. Maughan, Ken // Security: Solutions for Enterprise Security Leaders;Jun2005, Vol. 42 Issue 6, Special Section pL 

    This article reports that manufacturers of purpose-built digital video recorders (DVRs) are able to customize the Linux operating system code, which lets them include only the functionality, or services that customers need record and review video. Because the Linux source code is open, product...

  • 'Central Station' Video.  // Security: Solutions for Enterprise Security Leaders;Jun2005, Vol. 42 Issue 6, Special Section pN 

    This article focuses on the central station video security. Steve Shaer of VideoSave, developed this idea and believes that such a back to the future approach will arrive because of shortcomings of digital video recorders (DVRs). A DVR is little more than a PC and PCs are prone to failures, with...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics