-
Scallop Imaging showcasing a camera with 180 degree field of view
Traditional security cameras, composed of a single lens and image sensor, either require a number of cameras to cover a 180 degree field of view, or utilize extreme, wide angle lenses that are costly and introduce optical distortion; Scallop has a better solution: distributing this imaging task across five powerful microsensors
-
-
Intransa VideoAppliance named 2009 New Product of the Year
Intransa VideoAppliance, introduced in June 2009; a panel of judges for Security Products Magazine names it 2009 New Product of the Year in the Network-Centric Security category
-
-
Competition intensifies in high-definition security imaging
Surveillance has come out of domestic and office environments into the main street in both industrial and developing countries, and the competition among the companies seeking customers at ASIS is likely to remain fierce
-
-
Panasonic shows array of new technologies
In addition to enhancing its line of i-Pro Series Network Solutions, Panasonic continues to introduce select analogue products incorporating the latest technologies in support of legacy system
-
-
Camera manufacturers going HD
High definition technology gives users the capability to make out faces and license plates more easily, which in the future will also have implications for video analytics, making them more effective
-
-
Fujitsu asks terrorists whether they would use its software for WMD
Fujitsu runs a patching site for Sun Microsystems’ Solaris Unix variant; the company asks end-users to fill out a survey before downloading the latest patch, and the first question asks whether the customer would be using the patch to build WMD; even if you admit to building a nuclear bomb, Fujitsu allows you to download the patch; either Fujitsu targets really honest terrorists, or the company wants to use the information in its advertising (as in: “5% of our customers are terrorists who use our software to build weapons of mass destruction”)
-
-
New cybersecurity research center opens in Belfast
The £30 million center will work primarily on embedded security tech for next-gen IT equipment, and on real-time automated analysis of CCTV footage for “criminal activity”
-
-
Open-System Vendors demo IP interoperability
Exacq Technologies, Firetide, IQinVision, and Pivot3 are showing how standards-based solutions from open-system vendors can be integrated and supported in the field
-
-
BRS Labs takes ASIS' Accolades award
This is the fourth award BRS Labs has won this year for its unique approach to security; its AISight’s software ingests external visual input (computer vision), while its machine-learning engine observes the scene, learns and recognizes behavioral patterns, and responds accordingly
-
-
Team recognized for Hollywood video surveillance implementation
TimeSight Systems, VAS Security Systems, and Technicolor selected as Silver Medal Winner of the 2009 Security Innovations Awards
-
-
ASIS International offers standards and guidelines for the security industry
ASIS standards and guidelines address issues concerning the protection and management of assets — both physical and human — which are common to all sectors of society
-
-
Clayton Consultants on kidnapping and ransom
In many developing countries, kidnapping the family members of rich individuals and then asking for ransom has become a small industry; a specialist offers ideas about what to do to prevent kidnapping — and deal with it when it happens
-
-
Intransa shows new simple, green video solutions
Some companies go for gold-plated complexity; Intansa prefers simple, green video surveillance solutions for physical security; the company introduces new products and enhancements to old products
-
-
Protection One unveils uConnect
Large security provider shows a new, all-in-one online security management solution for businesses of all sizes
-
-
Rolls-Royce, EDF to construct four nuclear reactors in U.K.
The civil nuclear market is worth around £30 billion a year globally and is expected to grow to £50 billion a year in fifteen years’ time, more than 70 percent of which will relate to the build and support of new facilities
-
More headlines
The long view
Even Out of China’s Hands, Mines Still Rely on Its Equipment
The landmark critical minerals agreement between Australia and the United States is vital to both nations’ security and sovereignty. But the agreement signed carries an inherent vulnerability. The very partnership designed to reduce China’s coercive leverage is increasingly relying on Chinese technology to give effect to its objectives.
Building Trust into Tech: A Framework for Sovereign Resilience
Governments are facing a critical question: who can be trusted to build and manage their countries’ most sensitive systems? Vendor choices, for everything from cloud infrastructure to identity platforms, are no longer just commercial; they are strategic.
Data Centers’ Insatiable Demand for Electricity Will Change the Entire Energy Sector
When the first large language models were unleashed, it triggered a headache for authorities around the world as they tried to figure out how to satisfy data centers’ endless demand for electricity.
