Guide (332)

Displaying 'Guide' tags 101 - 125 of 332 in total

Multi-Factor Access Control Authentication Guide

(Member Only)

Can a stranger use your credentials? One of the oldest problems facing access control is making credentials as easy to use as keys, but restricting them to certain individuals. Multi-factor authentication is used when the end-user is concerned ...

By Brian Rhodes - almost 2 years ago

HID Product Configurator Examined

(Member Only)

HID is widely used. However, figuring out all the different configurations of features for a final credential or reader part number can be a real headache, with around 75,000 different configurations available. HID has created a solution called P...

By Dan Gelinas - almost 2 years ago

Axis Bad Marketing - Panoramic Commercial

Axis is bad at marketing. Recall last month - Axis: "No One Wants To Buy A Camera" and, more generally their 2018 production introductions. But this one is especially good bad. Axis released "The Heist" a commercial about how a bank vault is rob...

By John Honovich - almost 2 years ago

HID: Stop Selling Cracked 125 kHz Credentials

HID should stop selling cracked 125 kHz access control credentials, that have been long cracked and can easily be copied by cheap cloners sold on eBay and Amazon. To its credit, HID has long acknowledged the vulnerability and does take steps to...

By IPVM Team - almost 2 years ago

Video Surveillance Hard Drive Failure Statistics 2018

(Member Only)

Hard drive failures can be significant service problems but how common of an issue are they in video surveillance? How long do drives last when constantly being written to? 150+ integrators answered this: Video Surveillance Recording: How ma...

By IPVM Team - almost 2 years ago

Contactless Access Credentials Guide

(Member Only)

Contactless credentials are the most common component used in an access control system and while many look alike externally, important differences exist. Choosing the correct one can be the difference between a secure facility and wasting signifi...

By Brian Rhodes - almost 2 years ago

Security Fence Guide

(Member Only)

Fences, while a low tech barricade, are a cornerstone of good security. Few physical security elements are as effective at keeping threats away as security fences, even keeping heads of state and presidents safe: While simple and familiar, whic...

By Brian Rhodes - almost 2 years ago

Video Quality / Compression Tutorial

(Member Only)

While CODECs, like H.264, H.265, and MJPEG, get a lot of attention, a camera's 'quality' or compression setting has a big impact on overall quality. In this training, we explain what this level is, what options you have and how you should optimize...

By IPVM Team - almost 2 years ago

Integrator Laptop Guide

This 18-page guide provides guidance and statistics about integrator laptop use. 150 integrators explained to IPVM in detail about their laptops, including: Favorite laptop brands used, with the top 7 ranked Most commonly used CPU, RAM, and ...

By IPVM Team - almost 2 years ago

Higher Power PoE 802.3bt Ratified, Impact on Security Products Examined

(Member Only)

Power over Ethernet has become one of the most popular features of many video, access, and other security products. See our PoE for IP Video Surveillance Guide and PoE Powered Access Control Tutorial. Now PoE is able to transmit even more power, ...

By Brian Rhodes - almost 2 years ago

Door Hinges Guide

(Member Only)

Some of the trickiest access control problems are caused by bad door hinges. From doors not closing right, to locks not locking, worn or warped hinges are one of the most common root causes but typically ignored. Along with proper Door and Fram...

By Brian Rhodes - almost 2 years ago

Network Cable Testing Guide

(Member Only)

Proper cable installation is key to trouble-free surveillance systems. However, testing is often an afterthought, with problems only discovered when cameras have problems, resulting in increased troubleshooting, or even worse, reinstallation. Sim...

By John Scanlan - almost 2 years ago

Access Control Lock Guide

(Member Only)

In this guide, we examine locks; critical elements of any security system and fundamental parts of every access control system. Two fundamental classes of locks are used in access, electrified locks and mechanical locks. But with thousands of l...

By Brian Rhodes - almost 2 years ago

Ladders For Installers Guide

(Member Only)

Ladders are one of the most important pieces of worksite equipment for the surveillance technician. Too often, however, even highly experienced technicians are using old or defective ladders in an unsafe or inefficient manner. As the Occupational...

By IPVM Team - almost 2 years ago

IP Camera Cable Labeling Guide

(Member Only)

Labeling cables can save a lot of money and headaches. While it is easy to overlook, taking time to label runs during installation significantly speeds up troubleshooting and maintenance. In this guide, we examine this practice and the ways tha...

By John Scanlan - about 2 years ago

IP Camera Cable Termination Guide

(Member Only)

Terminating cables properly is critical to network performance, but it can be a tricky task with multiple steps. Fortunately, this task is easy to manage and get right when the proper tools, connectors, and methods are understood. In this guide...

By John Scanlan - about 2 years ago

IP Camera Cabling Installation Guide

(Member Only)

This guide teaches how to install network cabling for IP cameras, including: Estimating cable run length (with video tutorial) Accounting for vertical length Tracking cable remaining (with video tutorial) Selecting a staging location (with v...

By John Scanlan - about 2 years ago

Inputs/Outputs For Video Surveillance Guide

(Member Only)

While many cameras have Input/Output (I/O) ports, few are actually used and most designers do not even consider them. However, a good understanding of their flexibility can save hundreds of dollars on complex designs. In this guide, we explain ca...

By IPVM Team - about 2 years ago

France Political Scandal Reveals Video Surveillance Problems

(Member Only)

In what French media describes as "the most damaging crisis yet for" French President Macron, a political scandal has revealed major gaps in the country’s enforcement of video surveillance regulations. These gaps could expose integrators and end u...

By Charles Rollet - about 2 years ago

SNMP / Network Monitoring For Surveillance

(Member Only)

Surveillance systems typically rely on the the VMS to report issues, but this most often just means knowing a camera is "down" with no warning or detailed information. Network monitoring systems can give users more insight into their network, f...

By IPVM Team - about 2 years ago

Backup Power For Maglocks Guide

When the main power fails, many believe maglocks must leave doors unlocked. However, battery backed up maglocks are allowed according to IBC / NFPA code. It just needs to be done properly. We examine the five critical steps for using backing up m...

By Brian Rhodes - about 2 years ago

Video Analytics Integration Guide

(Member Only)

Video analytics is hot again (at least conceptually) but integrating video analytics with VMSes can be challenging. This is especially significant when using 'smart' IP cameras or 3rd party server-based analytics that need to sent their results / ...

By IPVM Team - about 2 years ago

Backboxes for Video Surveillance Tutorial

(Member Only)

Backboxes are a necessity in surveillance, whether for managing cable whips, recessing cameras, adding wireless radios. But it can be confusing to know which option works for their install. In this report, we explain: When to use backboxes Ca...

By IPVM Team - about 2 years ago

Displaying 'Guide' tags 101 - 125 of 332 in total