protection

Are AR/VR The Next Tech Evolution In Security?

As part of my first column in a monthly series for Security.World, I want to look at the emerging technologies coming down the pipeline within the security industry —and beyond— and answer the burning questions: Will this change how we protect people? Can we achieve more protection with less equipment? How can AI influence the industry? Will these changes be good or bad overall? Tune in as I explore a wide range of topics in the coming months. While most of us are now familiar with and may have even experienced the fun and excitement of virtual reality (VR), there?s a newer, similar technology with a less immersive experience that may soon start impacting our everyday lives: augmented reality (AR).

Surge Protectors Safeguard Emergency Call Box Reliability

Emergency call boxes (ECBs) are a fixture in parking lots/garages and plaza areas as an integral component of a security plan for schools, airports, shopping centers and so on. The boxes are typically identified by emergency signs or flashing lights and most are activated by opening the door on the box and pushing a call button on the inside.

A Common Problem Solved With Proper Surge Protection

Static electricity is more problematic when there is low humidity, no matter what the season. The issue is compounded as electronic devices today are smaller and more susceptible to electrostatic discharge. Granted, most electronics have ESD protection built in; but over time or from a constant barrage of these tiny lightning-like strikes, the protection becomes corrupted, resulting in a failure. Anytime air is warmed, this only reduces the humidity further, increasing the likelihood of a static discharge.

How To Protect Your ID Card Access Control System From Getting Hacked

When a 125kHz proximity card is powered up by getting in ?proximity? of a reader, it immediately begins to transmit a fixed binary code number. As a result, it?s also possible to use a device that will stealthily power up the card from a distance to read and record its internal data. An attacker can then easily use the card?s information to let unauthorized people in.