Fraudulent Email Attacks Manufacturer
By Carlton Purvis
| 2 CommentsAn email circulating around the surveillance industry accusing a sales manager of sexual harassment is a hoax, the U.S. Equal Employment...
By Carlton Purvis - over 10 years ago | 2 Comments
This report requires an IPVM Research Service subscription. Learn more.
Putting surveillance in the face of thieves. That's the aim of a new Public View Monitor (PVM). While other small surveillance PVMs are available...
By Brian Rhodes - over 10 years ago | 9 Comments
Grants seem to power almost every public surveillance system deployed in the past decade. Need a hundred thousand? No problem. Get a government...
By IPVM Team - over 10 years ago | 13 Comments
What's it like to be a surveillance operator? What problems do they face? How do they do their job? We interviewed one with extensive experience...
By Carlton Purvis - over 10 years ago | 13 Comments
What a bizarre pitch I just received. Even for a PR person, this is amazing: "I wanted to reach out to you for ... a story about how Security...
By John Honovich - over 10 years ago | 20 Comments
This report requires an IPVM Research Service subscription. Learn more.
In our recent BRS Labs layoffs post, a member commented: "I think its very valuable to know about every company. Especially those that have red...
By John Honovich - over 10 years ago | 5 Comments
This report requires an IPVM Research Service subscription. Learn more.
Fiber is a mainstay for networking cameras run far apart. The number of cameras seldom matches the fiber available, and having two strands to run...
By Brian Rhodes - over 10 years ago | 6 Comments
Manufacturers, like casinos, want whales - huge customers who will spend the big bucks. Getting them, of course, can be difficult. Now ASIS has a...
By John Honovich - over 10 years ago | 16 Comments
Do you realize that your camera can power and integrate PIR sensors, accelerometers, lights, sirens and strobes? Camera input/output ports make...
By Brian Rhodes - over 10 years ago
What's worse than having a crappy consultant prepare your RFP? Perhaps doing it yourself, as this case shows. Everyone thinks end users should be...
By Ben Wood - over 10 years ago | 3 Comments
One company refused to be bullied by ObjectVideo, proactively suing the company after it received a letter claiming it infringed on patents. In...
By Carlton Purvis - over 10 years ago | 2 Comments
The Internet is abuzz with a NYC startup that has raised more than $1.5 million from an ongoing Indiegogo campaign, smashing their goal of $100,000...
By Brian Rhodes - over 10 years ago | 18 Comments
The bad guys want video surveillance too. Recently, footage from a violent shootout caught on a Miami drug dealer's surveillance system was played...
By Carlton Purvis - almost 11 years ago | 20 Comments
This report requires an IPVM Research Service subscription. Learn more.
Economical or foolhardy? Industry professionals are torn on combination door readers. These units typically integrate credential readers and door...
By Brian Rhodes - almost 11 years ago | 10 Comments
How does this sound? "Need to transmit a camera wirelessly through a forest? No problem, simply spray a little paint on a few trees and instantly...
By John Honovich - almost 11 years ago | 24 Comments
An Avigilon executive has confirmed that an Avigilon employee has illicitly obtained copyrighted IPVM information, advertised the illicit...
By John Honovich - almost 11 years ago | 38 Comments
BRS Labs' new press release trumpets bringing their 'technology to new markets [link no longer available].' Inside the release, they note that they...
By Carlton Purvis - almost 11 years ago | 16 Comments
This report requires an IPVM Research Service subscription. Learn more.
Is there a camera layout formula that can be effective in any retail store to help protect it from shrinkage? Joe LaRocca [link no longer...
By Carlton Purvis - almost 11 years ago | 4 Comments
This report requires an IPVM Research Service subscription. Learn more.
The differences between 'contactless' proximity credential formats are significant, yet the details are not well understood. Most access designers...
By Brian Rhodes - almost 11 years ago | 9 Comments
Back to Top