Retail Surveillance Operator Secrets Revealed
By Carlton Purvis
| 13 CommentsWhat's it like to be a surveillance operator? What problems do they face? How do they do their job? We interviewed one with extensive experience...
By Carlton Purvis - about 11 years ago | 13 Comments
What a bizarre pitch I just received. Even for a PR person, this is amazing: "I wanted to reach out to you for ... a story about how Security...
By John Honovich - about 11 years ago | 20 Comments
This report requires an IPVM Research Service subscription. Learn more.
In our recent BRS Labs layoffs post, a member commented: "I think its very valuable to know about every company. Especially those that have red...
By John Honovich - about 11 years ago | 5 Comments
This report requires an IPVM Research Service subscription. Learn more.
Fiber is a mainstay for networking cameras run far apart. The number of cameras seldom matches the fiber available, and having two strands to run...
By Brian Rhodes - about 11 years ago | 6 Comments
Manufacturers, like casinos, want whales - huge customers who will spend the big bucks. Getting them, of course, can be difficult. Now ASIS has a...
By John Honovich - about 11 years ago | 16 Comments
Do you realize that your camera can power and integrate PIR sensors, accelerometers, lights, sirens and strobes? Camera input/output ports make...
By Brian Rhodes - about 11 years ago
What's worse than having a crappy consultant prepare your RFP? Perhaps doing it yourself, as this case shows. Everyone thinks end users should be...
By Ben Wood - about 11 years ago | 3 Comments
One company refused to be bullied by ObjectVideo, proactively suing the company after it received a letter claiming it infringed on patents. In...
By Carlton Purvis - about 11 years ago | 2 Comments
The Internet is abuzz with a NYC startup that has raised more than $1.5 million from an ongoing Indiegogo campaign, smashing their goal of $100,000...
By Brian Rhodes - about 11 years ago | 18 Comments
The bad guys want video surveillance too. Recently, footage from a violent shootout caught on a Miami drug dealer's surveillance system was played...
By Carlton Purvis - about 11 years ago | 20 Comments
This report requires an IPVM Research Service subscription. Learn more.
Economical or foolhardy? Industry professionals are torn on combination door readers. These units typically integrate credential readers and door...
By Brian Rhodes - about 11 years ago | 10 Comments
How does this sound? "Need to transmit a camera wirelessly through a forest? No problem, simply spray a little paint on a few trees and instantly...
By John Honovich - about 11 years ago | 24 Comments
An Avigilon executive has confirmed that an Avigilon employee has illicitly obtained copyrighted IPVM information, advertised the illicit...
By John Honovich - about 11 years ago | 38 Comments
BRS Labs' new press release trumpets bringing their 'technology to new markets [link no longer available].' Inside the release, they note that they...
By Carlton Purvis - about 11 years ago | 16 Comments
This report requires an IPVM Research Service subscription. Learn more.
Is there a camera layout formula that can be effective in any retail store to help protect it from shrinkage? Joe LaRocca [link no longer...
By Carlton Purvis - about 11 years ago | 4 Comments
This report requires an IPVM Research Service subscription. Learn more.
The differences between 'contactless' proximity credential formats are significant, yet the details are not well understood. Most access designers...
By Brian Rhodes - about 11 years ago | 9 Comments
The first deal in the VSaaS market has occurred with Panasonic acquiring Netherlands based CameraManager. We spoke with CameraManager on the...
By John Honovich - about 11 years ago | 7 Comments
Is your mom lying about being disabled to get free bus rides? A Canadian city is so determined to stop her that they have deployed thousands of...
By Carlton Purvis - about 11 years ago
This report requires an IPVM Research Service subscription. Learn more.
Proximity style credentials carry a huge risk: they can be passively read by thieves, who take the stolen information and gain unlawful entry into...
By Brian Rhodes - about 11 years ago | 8 Comments
Back to Top