Recent legislative bans and criticisms of facial recognition technology should give integrators pause when they consider offering it to customers.
No credible threats of Iran cybersecurity breach in DHS bulletin, but possibility exists in the wake of U.S. airstrike that killed Iran Gen. Soleimani.
After pitchers complained about using earpieces on the mound, options being considered include random-number generator and lights only pitchers can see.
Thorough and effective cyber security practices are becoming increasingly important for AV integrators as they become targeted due to large client bases.
Supply chain attack vectors & 5G network security will soon have large corporations & universities demand more info about supply chains of AV manufacturers.
As AV integrators adopt a managed services model, they should train staff on cybersecurity, hire dedicated IT staff and look into cybersecurity insurance.
LookingGlass Concierge facial recognition technology helps to identify and locate people, then logs them into a group to improve customer service.
Judge says Nortek Security and Control did not violate Section 337 of the Tariff Act of 1930, despite claims by The Chamberlain Group.
Northeastern University computer engineer creates “adversarial T-shirt” design that can trick artificial intelligence tracking systems.
Ride-share giant Uber responds to crime reports with plans to roll out option to record audio for riders and drivers, but no right to access recordings.
Organizations are seeing a boon when implementing AV over IP technology, and integrators are finding happy customers when installing AV over IP. In this webinar, you’ll learn exactly why you need AV over IP.
The one-hour webinar will discuss the basics of fiber cable, as well as how its bandwidth capabilities support today’s and tomorrow’s AV formats, and guidelines for specifying and installing fiber products.