TITLE

Applying New Technologies' Value Proposition in a Down Economy

AUTHOR(S)
Freschi, Cynthia
PUB. DATE
May 2009
SOURCE
Security: Solutions for Enterprise Security Leaders;May2009, Vol. 46 Issue 5, p48
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article provides information on several measurable value style video surveillance and security technology. It states that the enhanced digital signal processing (DSP) technology provided the ability to demonstrate tracking functions, which can be programmed and set remotely. It infers that by implementing a command and control software solution, the enterprise can attain a single approach to managing video surveillance and access control.
ACCESSION #
39231169

 

Related Articles

  • Hacker tracker.  // CRN;6/6/2005, Issue 1150, p48 

    The article focuses on computer security in relation to various ways in which a computer hacker hacks a computer. One of the computer security software's "Coldfusion MX" fixes cross-site scripting vulnerability. A cross-site scripting vulnerability was discovered in ColdFusion MX's error page...

  • VULNERABILIDADES SOBRE MECANISMOS DE SEGURIDAD EN PLATAFORMAS LCMS OPEN SOURCE A NIVEL DE AUTENTICACIÓN. Diego, López Vargas Juan; Alonso, Gaona García Paulo // Revista Entérese Boletín Científico Universitario;dic2009, Issue 27, p75 

    Is the result of analysis of a research project to determine the level of vulnerabilities in Open Sorce like platforms more representative of the market, Like Moodle, Sakay, Dokeos,. DotLRN and Atutor, which represent a good choice at the computer for most activities and services available for...

  • IS IT SOFTWARE? OR SPYWARE. Levy, Steven // Newsweek;2/19/2001, Vol. 137 Issue 8, p54 

    Focuses on NBC Internet's (NBCi) QuickClick, which is a program that allows a user to mouse-click a word and get information about it. How personal information is obtained from QuickClick; How QuickClick is capable of transmitting information typed by users into forms presented on Web pages;...

  • LETTERS TO THE EDITOR. Larmee, Don; Walsh, Robert W.; Cohen, Ted // Crain's New York Business;1/24/2005, Vol. 21 Issue 4, p10 

    Presents letters to the editor on various business developments. Lacunas in the article "Five Easy Techniques for Defeating e-Invaders"; Suggestion for reducing cyber crimes; Praise for the article "Bronx Merchants Sell BID With Pilot Cleanup."

  • The Plan You Never Hope to Use. Cohn, Michael D. // Banking New York;2009 Banking Solutions Supplement, p15 

    The article focuses on computer security incident response plans (IRP). IRP is a tool that understands the information system of the company and traces the non-public personal information (NPPI) of key customers through business processes. The IRP planning process, which is divided into the...

  • Safety Lessons.  // Casino Journal;Jun2013, Vol. 26 Issue 6, p30 

    The article discusses several case studies including Harrah's Cherokee ups security and surveillance ante to meet growing needs, verification solution gains traction in casino environments and slot bases and gaming locks help protect Horseshoe Casino Cincinnati's gaming floor. It mentions the...

  • The Price of Privacy. Kalnoskas, Aimee // ECN: Electronic Component News;Jul2004, Vol. 48 Issue 8, p8 

    Focuses on the lack of regulation aimed at technology used for protecting the public from potential security threats in the United States. Public opposition to the Total Information Awareness program proposed by the government due to privacy concerns; Devices and computer programs that would...

  • Access control with added reserve.  // International Fire & Security Product News;Oct2004, Vol. 29 Issue 5, p4 

    Features the Bewator Entro access control system developed for organisations which require a high level of security but also need a user-friendly system. Advantage of using the reservation facility of the system; Applications of the system; Importance of the access control card.

  • A novel approach for pre-processing of face detection system based on HSV color space and IWPT. Gupta, Megha; Gupta, Neetesh // International Journal of Advanced Computer Science & Application;Nov2011, Vol. 2 Issue 11, p144 

    Face detection system is challenging area of research in the field of security surveillance. Preprocessing of facial image data is very important part of face detection system. Now days various method of facial image data preprocessing are available, but all these method are not up to mark. Now...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics