Subnetting for Video Surveillance
This guide explains when subnetting is used on security networks, and how it works. We explain how to add or remove IP addresses to your range,...
This guide explains when subnetting is used on security networks, and how it works. We explain how to add or remove IP addresses to your range,...
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
Poles are a popular but challenging choice for deploying surveillance cameras outdoors. Poles are indispensable for putting cameras at the right...
Point of Sale System integration is a common feature of Enterprise VMS platforms. It is critical for many retailers but doing so can be...
ONVIF is well known within the surveillance industry as an interface to connect IP cameras and VMS systems. However, new users may find it...
Turnstiles control pedestrian access to secured areas, essentially becoming moving portions of fences, walls, or barricades for physically stopping...
Labeling cables can save a lot of money and headaches. While it is easy to overlook, taking time to label runs during installation significantly...
While many cameras have Input/Output (I/O) ports, few are actually used and most designers do not even consider them. However, a good understanding...
Choosing the right backup power system depends on system size. While small and medium systems greatly benefit from using UPS battery backup...
By Brian Rhodes - over 5 years ago
Backboxes are a necessity in surveillance, whether for managing cable whips, recessing cameras, adding wireless radios. But it can be confusing to...
IPVM is producing the definitive series on installing surveillance cameras. This entry covers one of the most common scenarios - installing dome...
A key part of installing security hardware is ensuring the right hardware is used to provide a long-lasting, solid mount. But there are almost...
Pixel density (PPF / PPM) is the best metric the industry has to define and project video quality. It allows simple communication of estimated...
By IPVM Team - almost 6 years ago
Keypad readers present huge risks to even the best access systems. If deployed improperly, keypads let people through locked doors almost as if...
By Brian Rhodes - almost 6 years ago
This guide starts our physical installation for video surveillance series, starting with Box Cameras, one of the oldest and most basic types....
There is often confusion about plenum ceilings, with misinformation about what is required when running cables through them and mounting cameras...
Rack mounting recorders is common in professional systems, but manufacturers are making it difficult, with simple design failures causing multiple...
In this report, we explain using cellular for video surveillance including: 4G vs LTE vs 5G 4G standards 5G future Advantage: Placing cameras...
"Smart Codec" was once seemingly a marketing buzzword, but in 2023, almost all new camera models include this technology. These marketing...
Network bandwidth can be a concern for some surveillance systems. While improvements in video codecs, such as smart codecs for H.264 and H.265,...
Along with VLANs, QoS is one of the most misunderstood topics in IP surveillance networks. Many purported "experts" claim it is required in any and...
Properly configuring access controllers software is key to a professional access system. These devices have fundamental settings that must be...
This report concisely explains the developments for surveillance cameras offered in 2017 and the state of offerings going into 2018, including...
Exporting video surveillance is important when incidents or crimes occur. However, there are multiple ways to export video which have their pros...
Alarm systems use backup batteries in order to continue working if an intruder attempts to disable the alarm by cutting power to the building. In...
Back to Top