Security Systems News

FEB 2019

Security Systems News is a monthly business newspaper that reaches 25,100 security installers, product distributors, central stations, engineers & architects, and security consultants. Our editorial coverage focuses on breaking news in all major se

Issue link:

Contents of this Issue


Page 10 of 28 f E b RU a RY 2019 SECURITY SYSTEMS NEWS news 6 PASSIONATE SECURITY Networking. NETWORKING. EDUCATION. EXPO. JUNE 2-6, 2019 JUNE 4-5 EXPO INDIANAPOLIS # PASSIONATESECURITY ESXWEB.COM "Lots of great time with people who I don't always get time to speak with at more hectic expos." SHARE MORE "Lots of great time MORE ots of great time complete a working model or proof of concept. In April 2000, the first "waivered" UL 2050 IDS system was accredited by a U.S. government agency. After which I worked with the U.S. government policy writers on how to change the policy which was codified in Director of Cen- tral Intelligence Directives, DCID 6/9 Annex B in 2001. Since then, I have worked with the policy working group and subcommittees to continually update those policy now found in ICD 705 Technical Specifica- tion v1.4. Can you talk about what new or emerging technologies you are seeing or specifying today? O f t e n a c c e s s c o n t ro l a n d intrusion detection equipment that is leading, or emerging technology is not the type of equipment the U.S. government is looking to be an early adopt- er. If a particular use statement is formulated or a cost benefit statement developed to support the technology a U.S. govern- ment agency might then then look to support a concept of operations or trial case. The other way new technology is ingested into new projects is if the Department of Defense (DoD) Combatant Commands (CoCOMs) have stated that a new technology is required to overcome a current operational challenge. For access control, intrusion detection and video management systems this is not often, but when industry has solutions that can be adapted to a particular mission support then change is inevitable. What is your view on the indus- try moving forward? As the technologies become easier to integrate, more focus and effort has to be applied on the end user to make sure that the data available to the end user is transformed into useful information. D a t a w i t h o u t c o n t e x t b e c o m e s o v e r w h e l m i n g — especially during emergency or crisis events—so we need to better understand the end-user and client operations to ensure that the information is avail- able when and how they need it. SSN —Paul Ragusa S p e c i f i c a l l y S p e a k i n g f e a t u r e s Q-and-A with a different security con- sultant every month. Consultants are provided to Security Systems News by SecuritySpecifiers. the Defense Advance Research Project Agency (DARPA) and had worked on the "Internet". He stated to me, "It is 1999, why can I put an alarm signal to the monitor station across the Internet?" The answer was not so sim- ple. U.S. government policies and UL 2050 did not allow for UL 2050 alarm signals to tra- verse the Internet. The busi- ness unit manager funded a small team of three of us to work with a U.S. government Agency, UL 2050 in order to the spring of 1999, I took a position with a growing firm in the Washington DC Metro area. The business unit manager had a large telephone bill from all the alarm systems using mul- tiplex telephone lines. He had been a program manager at the mitigations and counter- measures are to the design. How did you get started in security and designing/specify- ing? After an honorable discharge from the U S Marine Corps in Continued from page 4 Specifically Speaking with HLM Associates' Andrew B. Hall Hall says, "Data without context becomes overwhelming—especially during emergency or crisis events ..."

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Systems News - FEB 2019