Archive


2008  ⏷

November 2008: Feature Articles

  • Developing operators through simulation
  • Securing your perimeter the intelligent way
  • Pre-empt, prepare, prevent
  • Multiple sensors to reduce false alarms
  • Local manufacturers go the extra mile
  • State of the manufacturing nation
  • Command and control, a subtle approach
  • Add a listening post
  • The buzz around H.264
  • Setting up a control room
  • The road to integrated systems
  • Technology is the answer to ATM bombings and cash-in-transit heists
  • Fibre design concepts
  • HTS and Rontal announce Eagle Eye


October 2008: Feature Articles

  • Expounding the legal implications of CCTV in South Africa
  • Shaping the CCTV legal environment
  • Biometrics review
  • Inaugural BiometriX conference sets the standard
  • Voice as a biometric
  • The evolution of biometrics
  • Multispectral imaging
  • Using radio to track and monitor
  • Licence plate recognition expands
  • More to ACSA parking security system than meets the eye
  • Digital detail enhancement for thermal cameras
  • Securing an 8 km perimeter
  • The power of business intelligence
  • Polygraph testing: truth or dare
  • Basic fibre-optics explained
  • How much is your laptop really worth?


September 2008: Feature Articles

  • Namibia 2008
  • Video evidence from digital devices
  • Securex makes the grade
  • Armed robbery: a South African banking perspective
  • Command and control
  • Synectics integrates London's CCTV
  • Seeing through fog and rain
  • Effective enterprise control
  • DVR roundup


August 2008: Feature Articles

  • New MD driving change from Blick to Stanley
  • Using wipers with thermal cameras
  • Why IP surveillance?
  • Centralised CCTV protection
  • Making your lobby work
  • Proactive protection
  • Campus security demands controlled flexibility
  • The human threat
  • Understanding the benefits of active RFID for asset tracking
  • Banking on a mobile future
  • Electric fencing: the poor cousin of the security sector?
  • Stopping criminals before they get near - the importance of perimeter security


July 2008: Feature Articles

  • Biometrix 2008 Conference Overview
  • Biometrix 2008 Conference Agenda
  • Biometrix 2008 Conference speaker profiles
  • Ifsec 2008
  • How long should you retain your recorded CCTV video?
  • Command and control a critical element in security systems for casino complexes
  • Super-security at Dolphin Stadium
  • IR: domes and infrared lighting
  • NVT secures John Ross House
  • Fire detection technology in the HDI-Gerling administrative centre


June 2008: Feature Articles

  • IFSEC Acquires Stake in Securex South Africa

  • Personnel selection releases the potential of your system
  • IP surveillance solutions for education
  • Thermal imaging - how far can you see with it?
  • Load shedding and security - what you should know


May 2008: Feature Articles

  • Crime in South Africa
  • Using CCTV to identify people carrying guns
  • Power down, crime up
  • Complex security can be simple
  • Integrated high-tech security lowers risk and costs
  • CCTV over IP
  • Darkness is the new black
  • Managing the process to reap IP rewards


April 2008: Feature Articles

  • Retail Risk review
  • Systematic management of CCTV information
  • Do not discount the hi-tech security approach
  • The answer to business crime is an holistic security solution
  • Doing more with your POS scanner
  • Controlling shrinkage
  • Measuring the value of CCTV, EAS and data mining tools
  • Stop thinking access control: start thinking identity control
  • Visual business intelligence
  • Security at Sainsbury's
  • Minimising risk, maximising reward
  • Solving the complex equations of petrochemical security solutions
  • VESA - assisting the insurers in motor theft claims


March 2008: Feature Articles

  • Pelco acquired by Schneider Electric
  • Electricity impact
  • Implementing international security systems
  • Evolution: a permanent feature in mining security
  • Mining sector security solutions
  • Wireless IP surveillance for the masses
  • Integrated security system for Nelson Mandela Bay
  • Town policing transformed by IP CCTV
  • Smartcards integrate access control and security systems
  • Bridging the gap


February 2008: Feature Articles

  • Retail Risk 2008
  • Remote CCTV monitoring: has it come of age?
  • Wireless and IP surveillance: what is next in monitoring and surveillance
  • IP video security surveillance - understanding the storage issues
  • IP network technology
  • Protecting Science Museum's treasures
  • Enterprise security and integrated systems
  • Employee honesty maintenance service based on voice analysis


January 2009: Feature Articles

  • Inaugural iLegal a resounding success
  • Security trends 2009
  • Creating trust across borders
  • Security versus access control