Success is built on making the right connections

    In 1624 the poet John Donne shared his world view that “no man is an island.” Looking through this lens 400 years later, we’ve come to acknowledge how important connections are to our success. In the security arena, this translates into collaborating with fellow practitioners, technology vendors, law enforcement and sometimes even city officials who […]

      The future of the oil industry: Evolution of the automation process

      “The first rule of any technology used in a business is that automation applied to an efficient operation will magnify the efficiency.” A sentence that Bill Gates once said, and which still applies to our digitalized world, maybe more than ever. What individuals experience in a smaller environment, for example through an automated robot vacuum […]

        A camera for every patient bed

        The statistics are alarming A study published in the Journal of Hospital Medicine revealed that the median response time to potentially critical alarms in a pediatric intensive care unit (PICU) is in excess of three minutes and almost 10 minutes on the pediatric ward. If these alarms were signaling a severe deterioration of patient health, […]

          The development of onboard cameras in transportation

          Over the past decade, network cameras have become an essential part of transportation safety and security. Thanks to the technologies that can now be integrated onto onboard network cameras, the range of solutions they can be a part of has also increased: from boosting security inside vehicles to enhancing safety in passenger boarding and alighting, from improving […]

            Data center protection: Five fundamental steps

            Companies all over the globe rely more and more on data to improve their performance and revenue. This has made data centers crucial infrastructures, but also mouth-watering targets for cybercriminals. The increasing value of information has made data centers a prime target for nefarious intentions, from criminals stealing data for profit, to individuals wishing to […]