Bigger isn’t always better and less can beat more. Important keys to the video kingdom now include aspect ratio, actual resolution, frame rate and color rendition. Standards are essential except when they are not.
It was electricity, gas, oil and water back then. But when Congress passed and President George Bush signed the USA Patriot Act of 2001, those and a lot other sectors got bundled into critical infrastructures and suddenly inherited a more intense security profile.
Whether it’s a church door, an entrance into a high-tech Internet company or admission to a local police station, enterprise security leaders often view the application of access control technology one door at a time.
Stow the crystal ball. What rolled out in Dallas at the ASIS International event earlier this fall or even at the spring International Security Conference in Las Vegas may indicate what will be specified next year. But, as in the past with security video and its camcorder chip origins, what’s happening with consumer electronics, computer gaming, homeland security and at the futures conferences of the National Association of Broadcasters may point to more developments.
There was a time when people defined privacy as the right to be left alone, spurred by Supreme Court Justices way back when who saw the need to protect from the intrusion of instant cameras, of all things. Then there was a 2.0 definition that required a person to show harm of a so-called privacy violation in such areas as intrusion upon seclusion, appropriate of name or likeness, publicity given to private life, and publicity placing a person in a false light.
A prox card is a card is a card unless you do more things with it. And that’s what is happening as radio frequency identification (RFID) in its many increasingly powerful forms becomes a diverse security and business tool to apply to people, vehicles, assets and even processes. Active or passive, more or less intelligent, contact or contactless, with ranges from inches to feet, RFID is suddenly the super solution.
Temp workers and independent contractors from overseas can be a security and regulatory challenge. One private sector proposal: Advocate Helen Krieble explains the Red Card Solution, a free-market background screening
Some businesses and consumers are not on board the green bus with the U.S. the most cynical.Look at the bottom of a few emails these days. After the signature and
Enterprise card solutions can enable myriad business applications. One example: Identity cards allow Italians to share and use publicly available bicycles.In enterprise-wide identification card access systems, which came first –