Wednesday, December 20, 2017

Low Light Sensitivity of IP Cameras

The low light capability of an IP camera will determine if you can use the camera outdoors at night or inside with minimum lighting. This article reviews the IP camera specification for minimum light level and the factors that affect the low light performance.

Read More...

Biometric Door Control Misconceptions

Do You Believe Facial Recognition Readers Store Your Picture? There are many misconceptions about science and technology. One of the misconceptions is that biometric IP door readers store a picture of your fingerprint or face. Another one is that the Earth is a flat disc that rests on top of four elephants, on top of ...

Read More...

Wednesday, November 29, 2017

How to Ensure Video Chain of Evidence

How Write-Once Storage is Used to Protect Video Evidence From Your Ip Surveillance System One of the objectives of a video security system is to help law enforcement prosecute miscreants. It is important that this digital evidence follow the rules for chain of evidence so it will be acceptable by the courts. It must be ...

Read More...

Long Range Camera Systems - Custom Vs. Off-the-Shelf

Review of Long-Range Day-Night IP Camera Systems Do you want to detect objects many miles away? While custom-made cameras are best for very long-range applications, the latest off-the-shelf cameras provide some of the same capability for less money. These long-range PTZ cameras are very cost-effective, and allow you to detect a person almost 4-miles away. ...

Read More...

Wednesday, October 25, 2017

How to set up an IP Camera in Low Light Situations

IP Camera Settings for Low Light (This article was updated to reflect new IP cameras, 10/16/2017) When selecting cameras for your IP camera system, one of the most challenging situations is when you have very little light. When it's dark, there can be motion smearing and amplifier noise that degrades the image. All IP ...

Read More...

Protecting Your Computer from Malware

How to Protect Your Computer from Ransomware and Other Malware What if you didn't have to worry about ransomware or any other viruses? Unfortunately, cybercrime has become a major problem for the Chief Technology Officer (CTO) who is tasked with protecting the company's computer systems, as well as the CEO who has to deal with ...

Read More...

Wednesday, September 27, 2017

Detection, Recognition, Identification: The New Criteria

The Real-World Resolution Requirements I was not sure what to call this article. I first thought it should be titled, "Why The Johnson Criteria is Wrong." We use this criterion to predict how far away we can see something using a specific camera and lens. The criteria define the threshold for detection, recognition, and identification ...

Read More...