<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=159683641205248&amp;ev=PageView&amp;noscript=1">
Blog Banner 7
Search Keyword banner-2

    Matt Golueke

    Recent Posts

    Business Operations Voice Communication: Case Study by Commend Intercom and Public Address

    January 20, 2016

    Sound quality, ease of use, and noise filtering are critical as intercom communications become a top priority for operational processes, public safety, and security.

    Fratelli Beretta needed an intercom system for their food processing plant in...

    Read more

    Simplified User Interface for Security & IP Video Systems: Integration of G-Series Alarm Monitoring in BVMS

    January 13, 2022

    The demands on security system operators are increasing.

    • More cameras.
    • More access control alarms.  
    • More intrusion detection points.
    • More fire detection alarms.
    • And, as a result, more safety & security resources to dispatch and direct.

    ...

    Read more

    Dual-purposing and/or re-purposing legacy coaxial cable infrastructure for IP video

    January 18, 2016

    Security pro's are relying on innovative system design and technology to plan for system upgrades and manage project cost. 

    Many are consider dual-purposing and/or re-purposing legacy coaxial cable infrastructure.

    Primary considerations: re-using...

    Read more

    Benchmark Test: Line Cross Video Analytics - Bosch vs Axis

    January 12, 2016

    By Benchmark Magazine: The benefits of IVA (intelligent video analysis) are manifold, and cover both security and business intelligence. While many focus on advanced analytics using AND/OR logic to link rules, the humble virtual tripwire is often...

    Read more

    Security System Basics: What is an Intrusion Detection System?

    January 10, 2016

    If you're new to the security buisiness, appointed to a new security position at a facility, or have never ventured into intrusion detection technologies, this short video will provide you with the fundamental basics of an intrusion detection...

    Read more

    BIM: Construction Productivity Realized

    November 28, 2017

    After decades of decreasing productivity, the building industry is on the verge of a revolution.

    Architects, planners, consultants, integrators and contractors will soon be able to share information more easily, drill down into design...

    Read more

    Meet Commend: Intercom and Public Address

    January 11, 2016

    Unparalleled sound quality and innovative technology.

    That's what sets Commend apart from other manufacturers. 

    After several exciting new product launches in 2015, including a series of PoE loudspeakers (pictured here), and a rapidly growing...

    Read more

    Meet Steve Pennington

    January 10, 2016

    Complex security system design requires a deep knowledge of modern security technology. It also requires a strong knowledge past technologies and security fundamentals.

    Steve is the Managing Partner of Chesapeake & Midlantic Marketing. Aside from...

    Read more

    External Video Security Hacks - 3 Common Ways They Happen

    April 5, 2016

    A data security breach is is something nobody can afford.

    Video Security Systems can be attacked from the outside or the inside. A view from the outside - basic external attacks are typically executed in 3 phases. To help understand how these...

    Read more

    A New Year, A New Outlook: Security Planning

    December 22, 2015

    Merry Christmas, Happy Hanukkah, and Happy Holidays! 

    As New Year celebrations come and go, safety & security will remain on everyone's mind.

    Now, more than ever, proper planning and deployment is critical. Security is on highest alert and budgets...

    Read more
    Page 94 of 114
    Search Keyword banner-2
      Extra Long Narrow Orange Line - vertical-1
      Subscribe Now Icon

      Search Keyword banner-2
        Need Help Icon orange