Index to Products
- Revisiting the Panic Button. // SDM: Security Distributing & Marketing;Aug2001, Vol. 31 Issue 10, p39
Offers advice on how security dealers should install panic buttons in burglar alarms. Rules for installing panic buttons in commercial applications; Ideal mounting location for a panic button; Need to install panic buttons pains for bill traps.
- Lock boggles the mind of car thieves. Whitward, Lane // Design Engineering;Oct95, p8
Features a code burglar system developed by Electronic Research & Design (ERD) in Great Britain. Combining encryption process with a moving time seed; Features of the ERD's system; Using Sunrise Electronics' single chip microcontroller to complement the design.
- To catch a thief. Scott, Joseph // Good Housekeeping;Nov95, Vol. 221 Issue 5, p52
Presents advice from police sergeant Scott Hoover, head of the Crime Prevention Unit of the South Brunswick, New Jersey, Police Department, about home alarm systems. Cost of alarm systems; Comparison between direct police dialers and use of a monitoring system.
- Relay control solves closing problems. // SDM: Security Distributing & Marketing;Aug98, Vol. 28 Issue 11, p29
Presents information on ways to relay control close businesses using a programmable output from an alarm panel to trip a double pole, single throw (DPST) relay. How the systems works; Benefits of a request-to-exit button.
- Burglar alarms. // Consumer Reports;May94, Vol. 59 Issue 5, p329
Presents criteria in choosing a proper home-security system. Wired versus wireless system; Do-it-yourself versus professionally installed systems; Checking the control units of the system; Subscribing to a monitoring service; Dealing with dealers and contract-signing. INSET: Security check...
- Anatomy of an alarm system. // Consumer Reports;May94, Vol. 59 Issue 5, p330
Shows how a burglar alarm system works. Division of a dwelling into zones; Perimeter versus area sensors; Microwave detectors; Passive infrared detectors; Glass-break detectors.
- Safe as houses. // Australian House & Garden;Jun98, Vol. 100 Issue 1, p163
Introduces the HPM Wireless Intruder Alarm System. Details on the system; How to use it; Cost of the system.
- Phone line monitor. Melton, James // Electronics Now;Mar1997, Vol. 68 Issue 3, p46
Presents instructions on how to build the Phone Line Monitor, an anti-burglary alarm that detects if the phone line has been cut. Design of the circuit; Schematic diagram; Operation of the alarm. INSET: A small view of telephone history..
- Emerging alarm verification technology helps bring order out of chaos. Keosayian, Ray // Long Island Business News (7/1993 to 5/2009);3/25/96, Vol. 43 Issue 13, p28
Reports on the benefits of alarm verification technology on the security alarm systems in Long Island, New York. Impact of false alarms on the law enforcement authorities; Introduction of visual verification.