News

featured item

Protecting Staff While Securing Evidence

Incident recorders are proven to deter aggression and protect staff. Check out the latest innovation from Edesix

featured item

Wireless CCTV Network Led To 45% Reduction In Violent Crimes In Colombian Town

When a small town installed CCTV, the effect was remarkable

featured item

Smart Street Lighting Could Be The Key That Unlocks The Potential Of Smart Cities

Smart streetlights and sensors in the public space could be the springboard to smart cities

featured item

Count On It, The People Counter Industry Is Booming

Lower cost, enhanced accuracy and security concerns have led to a boom in the people counter industry

featured item

Tata Communications helps drive kids’ smartwatch maker Doki Technologies’ international expansion

Equipping the dokiWatch S with borderless connectivity by Tata Communications MOVE™ will help Doki Technologies hit its target of 200,000 units sold globally in 2018

featured item

Huawei partners IMDA on Seeds for the Future Programme

Ten Singaporean students selected to embark on a learning journey to China to learn the latest telecommunications and network technologies first-hand

featured item

Uber’s Self-Driving Car Didn’t Malfunction, It Was Just Bad

There were no software glitches or sensor breakdowns that led to a fatal crash, merely poor object recognition, emergency planning, system design, testing methodology, and human operation.

featured item

Dahua Technology USA Debuts Latest Advancement, HDCVI 4.0, at ISC West 2018

Six New Models Showcase Market’s Highest Over-Coax Resolution

featured item

Hitachi Vantara Unveils Industry Leading AI Operations Software and New Flash Storage Systems

New Systems with Predictive Analytics and IT Automation Software Deliver Agile Data Infrastructure and Intelligent Operations to Fuel Data Center Modernization Initiatives

featured item

How to Get Started with Physical Security

When we think about cybersecurity assessment and hardening, it’s obvious to think about vulnerabilities in software or hardware. Do any of the encryption technologies we deploy have backdoors or are easily crackable? How secure are our authentication vectors and credentials?