logo11d 4 1

Zelenograd streets will be illuminated by the latest energy-saving LEDs.

The article «Saving on a Light Bulb», published in «Vedomosti», is dedicated to the innovative technologies of the company «TSERS», which develops LED lighting equipment and recently became a resident of the Zelenograd special economic zone (SEZ). The article describes the history of the company's development since 2005, when a holding company engaged in high-tech …

Zelenograd streets will be illuminated by the latest energy-saving LEDs.Далее …

logo11d 4 1

The success of the QNX Technology Day confirmed the interest of the Russian IT community in the latest QNX RTOS technologies.

The success of the «QNX Technology Day» confirmed the interest of the Russian IT community in the latest QNX RTOS technologies. The success of the «QNX Technology Day» confirmed the interest of the Russian IT community in the latest QNX RTOS technologies The success of the «QNX Technology Day» confirmed the interest of the Russian …

The success of the QNX Technology Day confirmed the interest of the Russian IT community in the latest QNX RTOS technologies.Далее …

From July 1, the construction industry will switch from a licensing system to self-regulation.

From July 1, the construction industry switches from the licensing system to self-regulation. From July 1, the construction industry switches from the licensing system to self-regulation From July 1, the construction industry switches from the licensing system to self-regulation The upcoming abolition of licensing in the construction sector after July 1 and the introduction of …

From July 1, the construction industry will switch from a licensing system to self-regulation.Далее …

logo11d 4 1

SystemGroup has implemented an innovative solution, “Queue Killer,” in the KARAVAN hypermarket.

SystemGroup has implemented an innovative solution, «Queue Killer,» in the KARAVAN hypermarket. SystemGroup has implemented an innovative solution, «Queue Killer,» in the KARAVAN hypermarket. SystemGroup has implemented an innovative solution, «Queue Killer,» in the KARAVAN hypermarket. KARAVAN Group of Companies has become the first Ukrainian retail chain to implement the Queue Killer solution in its …

SystemGroup has implemented an innovative solution, “Queue Killer,” in the KARAVAN hypermarket.Далее …

logo11d 4 1

Recession or restructuring? The crisis creates conditions for strengthening the positions of Russian companies working in the high-tech sector.

Recession or Perestroika? The crisis creates conditions for strengthening the positions of Russian companies operating in the field of high technology. Recession or Perestroika? The crisis creates conditions for strengthening the positions of Russian companies operating in the field of high technology. Recession or Perestroika? The crisis creates conditions for strengthening the positions of Russian …

Recession or restructuring? The crisis creates conditions for strengthening the positions of Russian companies working in the high-tech sector.Далее …

logo11d 4 1

Professionals unite

Professionals Unite Since January 1, 2010, the only permit for an organization to operate in the construction industry is a certificate of admission issued by a self-regulatory organization. By this time, licenses are completely terminated, and the law «On Self-Regulatory Organizations» comes into force. According to this law, all engineering, construction and design organizations must …

Professionals uniteДалее …

MIRAX GROUP and Jones Lang LaSalle have signed a cooperation agreement.

MIRAX GROUP and Jones Lang LaSalle have signed a cooperation agreement. According to the agreement signed by the parties for a period of three years, Jones Lang LaSalle specialists will provide Federation Management Tower CJSC with marketing and sublease services for premises located on the lower (-2, -1 and 1) floors of the Federation business …

MIRAX GROUP and Jones Lang LaSalle have signed a cooperation agreement.Далее …

KNX has gone international.

KNX has become an international standard: ISO/IEC 14543-3 KNX is a globally recognized INTERNATIONAL STANDARD for home networks and building management. KNX has already proven its compliance with the requirements of both European standards CENELEC EN50090 and CEN EN 13321-1, and its recent recognition as an international standard (ISO/IEC 14543-3) has only confirmed the importance …

KNX has gone international.Далее …

logo11d 4 1

ARMO-Group demonstrated the benefits of building automation.

«ARMO-Group» demonstrated the benefits of building automation. The company «ARMO-Group» took part in the 7th International Exhibition HI-TECH BUILDING & House, dedicated to modern technologies for equipping, automating and operating business buildings. Visitors to the company's stand got acquainted with its new projects and solutions for building automation, as well as areas of activity for …

ARMO-Group demonstrated the benefits of building automation.Далее …

novii etap v razvitii sistemnoi integracii sistemnii mast

A new stage in the development of system integration: “system master – integrator”.

A new stage in the development of system integration: «system master — integrator». The development of today's open systems market is leading to a dramatic change in business relations in the field of building automation. Most manufacturers are moving or have already moved to open systems. The use of a single infrastructure across all sectors …

A new stage in the development of system integration: “system master – integrator”.Далее …

YORK Johnson Controls: Automation of high-rise refrigeration systems.

YORK Johnson Controls: Automation of high-rise refrigeration. YORK Johnson Controls has its own special examples of the implementation of automated control systems for the refrigeration of high-rise buildings. In accordance with MGSN, refrigeration systems and refrigeration units of high-rise buildings must: — ensure the specified parameters of the coolant during the billing period, the ability …

YORK Johnson Controls: Automation of high-rise refrigeration systems.Далее …

logo11d 4 1

Implementation of “Intelligent Building” class solutions during reconstruction of buildings and structures.

Implementation of “Intelligent Building” class solutions during reconstruction of buildings and structures. Today, when large cities in Russia are experiencing an upswing in construction production, the condition of a significant number of buildings and structures in operation determines the objective need for reconstruction of engineering systems, technological cycles, structural and other components of construction projects. …

Implementation of “Intelligent Building” class solutions during reconstruction of buildings and structures.Далее …

texniko ekonomicheskaya ocenka reshenii klassa intellektu 2

Technical and economic assessment of “Intelligent building” class solutions for reconstruction of buildings and structures.

Technical and economic assessment of solutions of the “Intelligent Building” class in the reconstruction of buildings and structures. Technical and economic assessment of the effectiveness of the application of specific organizational, technological and technical solutions is based on a multi-criteria analysis of various factors. To solve this problem, two methods have been adapted: target programming …

Technical and economic assessment of “Intelligent building” class solutions for reconstruction of buildings and structures.Далее …

svejii vzglyad na avtomatizaciyu zdanii i filtraciyu vozd 2

A fresh look at building automation and air filtration.

A fresh look at building automation and air filtration. Ken Bloom, President, Precision Air Technology, Inc. The issue of regular replacement of air filters is not exclusive to any modern ventilation and air conditioning (HVAC) system. Perhaps, not much attention was paid to this issue before. However, there is a growing understanding that it is …

A fresh look at building automation and air filtration.Далее …

sroki okupaemosti energosberegayushego oborudovaniya 2

Payback periods for energy-saving equipment.

Payback periods for energy-saving equipment. The practice of using energy-saving equipment, namely frequency converters, which are used to change the performance of fans, pumps, compressors, shows that this type of equipment often belongs to the «extra» category, since air or water can be supplied without these devices, and in the case of a requirement for …

Payback periods for energy-saving equipment.Далее …

sistema energosberejeniya nrg systems zolotoi sertifikat 2

NRG Systems Energy Efficiency System – LEED Gold Certified for Industrial Buildings.

NRG Systems Energy Saving System – LEED Gold Certified in Industrial Building Construction. Joy Null, Director of Public Relations, Watt Stopper/Legrand June 2007, Santa Clara (USA, California). NRG Systems, headquartered in Vermont, built its new headquarters taking into account environmental requirements, as well as requirements put forward by local unions and employees. The 4,325 square …

NRG Systems Energy Efficiency System – LEED Gold Certified for Industrial Buildings.Далее …

sistema avtomatizacii jilogo kompleksa blijnyaya dacha

Automation system for the residential complex «Blizhnyaya Dacha».

Automation system of the residential complex «Blizhnyaya Dacha». Author: Zakharov N.S. Leading specialist in air conditioning systems, Moscow representative office of Mitsubishi Electric In the spring of 2006, the residential complex «Blizhnyaya Dacha» will be put into operation in Moscow, where multi-zone air conditioning systems «City Multi» manufactured by Mitsubishi Electric are installed. The general …

Automation system for the residential complex «Blizhnyaya Dacha».Далее …

rinok sistem avtomatizacii zdanii v ssha 2

Building automation systems market in the USA.

The building automation systems market in the USA. The company «BCS Partners» recently published an analysis of the North American building automation systems (BAS) market («BCS/2006: The Building Control Systems Market (2005-2010).»). This analysis revealed a number of important and perhaps surprising facts. Leading BAS vendors are pushing digital control systems in conjunction with centralized …

Building automation systems market in the USA.Далее …

NEXA Software by Citect

NEXA software from Citect Citect has been a software supplier and successful player in the market of automation of buildings, infrastructure facilities, housing and utilities for over 30 years. To solve this class of problems, Citect offers the Nexa software product, the main functions of which are: centralized control and management of ventilation, heating and …

NEXA Software by CitectДалее …

Selling fear.

Selling fear. Service engineering is one of the few professional fields of activity where, as a tool for increasing revenue for service providers, it is possible to use the client's fear, forcing them to renew service contracts and abandon traditional design in favor of individual ones. Using building automation systems as a basis for escalating …

Selling fear.Далее …

prakticheskii seminar bacnet novie vozmojnosti dlya avto 2

BACnet Practical Workshop – New Possibilities for Building Automation.

BACnet Practical Seminar – New Possibilities for Building Automation. When: May 15, 2007 Where: St. Petersburg, North-West RF Exhibition Center (building of the Research Institute «Electronstandart», pl. Pobedy, 2 (metro «Moskovskaya», exit to ul. Altayskaya). From May 15 to 17, 2007, the 3rd international specialized exhibition of equipment and technologies for industrial automation and embedded …

BACnet Practical Workshop – New Possibilities for Building Automation.Далее …

logo11d 4 1

Apartment heat metering: problems and solutions.

Apartment-by-apartment heat metering: problems and solutions. Introduction Yu. Luzhkov: Muscovites are too wasteful in consuming energy resources. (Prime-TASS). Muscovites are excessively wasteful in consuming energy resources, according to Moscow Mayor Yuri Luzhkov. “According to various sources, Moscow consumes 4 tons of equivalent fuel per person per year — this is the most wasteful consumption compared …

Apartment heat metering: problems and solutions.Далее …

podgotovka specialistov v oblasti avtomatizacii zdanii i 2

Training of specialists in the field of automation of buildings and structures at MGSU: history and development prospects.

Training of specialists in the field of automation of buildings and structures at MGSU: history and development prospects. The history of training engineering personnel in the automation of buildings and structures (gas stations) is relatively young. As an independent specialty, “Automation of technological processes and production (in construction)”, has existed for less than 50 years, …

Training of specialists in the field of automation of buildings and structures at MGSU: history and development prospects.Далее …

ot redakcii

What do customers want?

From the editors You've probably already guessed that the topic of the March issue of our newsletter is «What do customers want?». This question has intrigued us for a long time, since at present the need to equip modern buildings with automation systems is obvious to everyone, but there are nuances in the relationship between …

What do customers want?Далее …

logo11d 4 1

Basics of warehouse operations using the latest WI-FI technologies.

To optimize work in a warehouse, it is necessary to automate it and establish a certain system of movement of goods in it. A warehouse is one of the most important links in the structure of any company that owns it. An automated warehouse contributes to the successful operation of a company, its superiority over …

Basics of warehouse operations using the latest WI-FI technologies.Далее …

logo11d 4 1

Not savings, but profit.

Not savings, but profit. Paul Ehrlich, an information systems consultant, presented a number of figures at his Building Intelligence Tour Seminar at the ASHRAE Winter Convention that can help building engineers convince their clients of the economic feasibility of creating and using information systems for managing building engineering systems. He looked at scenarios for an …

Not savings, but profit.Далее …

logo11d 4 1

Multifunctional complexes today: a problem, a necessity or an inevitability?

Multifunctional complexes today: a problem, a necessity or an inevitability?. Multifunctional complexes today: a problem, a necessity or an inevitability? Multifunctional complexes today: a problem, a necessity or an inevitability? Nika Pologovaya The main trend in the real estate markets of Europe and the USA, which are followed by the development of the markets of …

Multifunctional complexes today: a problem, a necessity or an inevitability?Далее …

leonid nikolaev otelyam nujen intellekt 2

Leonid Nikolaev. Hotels need intelligence.

Hotels need intelligence The correspondent met with Leonid Nikolaev, First Vice President of JSC GAO MOSCOW, an organization authorized by the capital's government to coordinate work and conduct monitoring within the framework of the hotel construction program. Corr.: The General Development Plan for Moscow and the hotel construction program have been adopted and approved. That …

Leonid Nikolaev. Hotels need intelligence.Далее …

Integrated dispatching system for engineering systems of the Avtoframos plant.

Integrated dispatching system for engineering systems of the Avtoframos plant. Integrated dispatching system for engineering systems of the Avtoframos plant Integrated dispatching system for engineering systems of the Avtoframos plant OAO Avtoframos is a joint venture of the French concern Renault and the Moscow government for the production of Renault Logan cars. Renault specialists have …

Integrated dispatching system for engineering systems of the Avtoframos plant.Далее …

intellektualnie zdaniya ot praktiki k teorii 2

Intelligent buildings – from practice to theory.

Intelligent buildings — from practice to theory. Author: Volkov A.A. Doctor of Engineering Sciences, Professor, Dean of the Faculty of ISTAS MGSU The article continues a series of publications presenting the foundations of the promising science of designing “intelligent” buildings, directly aimed at eliminating the existing methodological gap between practice and theory in creating building …

Intelligent buildings – from practice to theory.Далее …

intellektualnie sistemi dlya sovremennoi ekspluatacii

Intelligent systems for modern operation.

Intelligent systems. Author: L.N. Makeev, Leading Specialist of the Automation and Dispatching Department of JSC NPO SEM The Automation and Dispatching Department of JSC NPO SEM (DAD) has completed another major project to create an automated control and management system for engineering equipment in the Pokrovskoe-Glebovo residential complex in Moscow. The property is an elite …

Intelligent systems for modern operation.Далее …

logo11d 4 1

Integrated solutions based on BACnet and KNX protocols.

Solutions based on BACnet and KNX protocols. Neues Kranzler Eck (Berlin, Germany) The Neues Kranzler Eck office centre with an office area of ​​45,000 square metres offers space for 1,800 to 2,000 workstations. The building automation system was implemented using the KNX protocol, which is linked to the control level via BACnet gateways and is …

Integrated solutions based on BACnet and KNX protocols.Далее …

injenernie sistemi sportivno ozdorovitelnogo kompleksa 2

Engineering systems of a sports and recreation complex.

Engineering systems of the sports & health complex. Engineering systems of the sports & health complex. Engineering systems of the sports & health complex. health complex Since 1992, the engineering equipment in the building has been controlled using Sauter controllers. Last year, the entire building and automation were reconstructed. A unified engineering systems control system …

Engineering systems of a sports and recreation complex.Далее …

gostinici i gostinichnii biznes 2

Hotels and hotel business.

Marina Smirnova is the Deputy Director of the Consulting Department, Head of the Hotel Consulting Group at Colliers International. About the company: Colliers International is an international consulting company providing services in the field of commercial real estate. It unites offices in North and South America, Europe and Asia, which makes it possible to apply …

Hotels and hotel business.Далее …

gomeostat zdanii i soorujenii 2

Homeostat of buildings and structures.

Author: Volkov A.A.Doctor of Engineering Sciences, Professor, Dean of the Faculty of ISTAS MGSU This article continues a series of publications presenting the fundamentals of the promising science of designing “intelligent” buildings, directly aimed at eliminating the existing methodological gap between practice and theory in creating automation systems for buildings and structures at all levels …

Homeostat of buildings and structures.Далее …

funkcionalnoe upravlenie zdaniyami 2

Functional management of buildings.

Functional management of buildings. This article continues a series of publications presenting the fundamentals of promising applied science for designing “intelligent” buildings, directly aimed at eliminating the existing methodological gap between practice and theory in creating automation systems for buildings and structures at all levels (see AZ Bulletin, No. 5, 2006). The necessary terms and …

Functional management of buildings.Далее …

logo11d 4 1

Gesis component system for electrical installations in buildings and structures.

Gesis component system for electrical installation in buildings and structures. Gesis component system for electrical installation in buildings and structures Gesis component system for electrical installation in buildings and structures The German company Wieland Electric GmbH offers the revolutionary Gesis component system for power supply systems and building infrastructure management. The use of Gesis allows …

Gesis component system for electrical installations in buildings and structures.Далее …

logo11d 4 1

What is an Intelligent Building?

Andrey Golovin, Editor-in-Chief Dear readers! You are holding in your hands the first issue of the bulletin «Automation of Buildings in Russia», established and prepared by the BIG-RU Building Automation Association and the ALTpress publishing house. Probably, many will ask why another publication about building engineering systems is needed? Of course, today in Russia there …

What is an Intelligent Building?Далее …

logo11d 4 1

The battle for heat in light of building automation.

The battle for heat in the light of building automation.. The battle for heat in the light of building automation. The battle for heat in the light of building automation. In Sverdlovsk Oblast, funding for the energy conservation program is being increased. USTU-UPI proposes to prohibit the connection of buildings built in violation of heat …

The battle for heat in light of building automation.Далее …

logo11d 4 1

Biometrics in fitness clubs: visitors value safety and comfort.

Biometrics in fitness clubs: visitors value safety and comfort. Biometrics in fitness clubs: visitors value safety and comfort Biometrics in fitness clubs: visitors value safety and comfort Metalink and BioLink have integrated biometric identification technologies into the Metalink Fitness Manager management accounting system used in fitness clubs in Russia and the CIS. Fingerprint identification has …

Biometrics in fitness clubs: visitors value safety and comfort.Далее …

bill klinton 5 milliardov dollarov na energoeffektivnost 2

Bill Clinton: $5 billion for building energy efficiency.

The goal of the program is to reduce energy consumption in existing buildings. The program's partners were: The American Society of Engineers ASHRAE, the United States Green Building Council (USGBC). With their direct participation, standards for the design of building engineering systems will be developed to successfully achieve this goal. Clinton noted: ”Climate change is …

Bill Clinton: $5 billion for building energy efficiency.Далее …

avtomatizaciya torgovix i torgovo

Automation of shopping and shopping and entertainment centers.

Automation of shopping centers and shopping and entertainment complexes. Automation and control systems in shopping and entertainment centers, as a rule, have a standard set of subsystems: automation of heating, ventilation and air conditioning systems, security systems. A typical task for such systems is to control the climate in large shopping areas, when there are …

Automation of shopping and shopping and entertainment centers.Далее …

avtomatizaciya shkolnogo zdaniya

Automation of school building.

School automation. Caroline Cadieux Marketing Manager Distech Controls, Inc. American high school wins Energy efficiency award Situation analysis Connolly High School, located in Tempe, Arizona (USA), won the Governor's Award for Energy Efficiency in 2005. These prestigious awards are presented annually to public institutions that have demonstrated the greatest optimization of energy use through the …

Automation of school building.Далее …

avtomatizaciya edinstvennii sposob sozdaniya effektivno 2

Automation is the only way to create an effective management system

Automation is a way to create an effective control system. The main goal of automatic remote control systems is to continuous monitoring of the ventilation systems, refrigeration center, boiler and heating points. The main difference of the project is the provision of data on controlled objects to the Internet. In automatic remote control systems, continuous …

Automation is the only way to create an effective management systemДалее …

obektivnie metriki dlya ocenki kachestva videokodekov

Objective metrics for assessing the quality of video codecs.

Objective metrics for assessing the quality of video codecs. Objective metrics for assessing the quality of video codecs IN SEARCH OF A SUPPORT POINTOne of the trends in the CCTV market is the diversity of video codecs present in it. Almost every developer of CCTV software and hardware strives to develop their own unique video …

Objective metrics for assessing the quality of video codecs.Далее …

mpeg 4 vs h264

MPEG-4 vs H.264.

MPEG-4 vs H.264. MPEG-4 vs H.264 Of course, it is incorrect to contrast MPEG-4 and H.264, since H.264 and MPEG-4 (part 10) are the same thing. However, it turned out to be more convenient to write the main part of the article, understanding MPEG-4 only as MPEG-4 (part 2). MPEG-4 structure and a bit of …

MPEG-4 vs H.264.Далее …

Selecting fiber optic video transmitters.

Selecting fiber-optic video signal transmitters. Selecting fiber-optic video signal transmitters It has long been known that copper lines are limited in their capabilities. The kilohertz spectrum of telephone channels can be transmitted over tens of kilometers. The megahertz spectrum of a video signal — over hundreds of meters. And this is under optimal conditions, in …

Selecting fiber optic video transmitters.Далее …

Image processing in CVS systems.

Image processing in CVS systems. In CVS computer television systems, the amplitude and spectral characteristics of images in each frame are analyzed. The results of the analysis are then used to improve the image, the operation of motion and activity detectors, deinterlacing, eliminating redundancy, compression and transmission of images over the network. Digital video recorders …

Image processing in CVS systems.Далее …

bistrii poisk igolki v stoge sena ili kak pravilno organi

Quick search for a needle in a haystack, or how to properly organize work with a video archive.

Quick search for a needle in a haystack, or how to properly organize work with a video archive. Technologies do not stand still, their development is daily pushed by the ever-increasing demands of consumers. Indeed, if 3-4 years ago recording at a speed of 50 fields per second on 16 channels did not raise any …

Quick search for a needle in a haystack, or how to properly organize work with a video archive.Далее …

Selecting the exposure time for a security camera in single-shot video signal generation mode.

Selection of exposure time for a security camera in the single-shot video signal generation mode. Vyacheslav Mikhailovich SMELKOV, Candidate of Technical Sciences SELECTION OF EXPOSURE TIME FOR A SECURITY CAMERA IN THE SINGLE-SHOT VIDEO SIGNAL GENERATING MODE   The article analyzes possible methods for automatic selection of accumulation time depending on the parameters of the …

Selecting the exposure time for a security camera in single-shot video signal generation mode.Далее …

televizionnoe fotografirovanie obektakontrolya pri impuls

Television photography of a test object with pulsed exposure of a photodetector by a packet of flashes.

Television photography of the test object with pulsed exposure of the photodetector by a flash pack.. Television photography of the test object with pulsed exposure of the photodetector by a flash pack. Smelkov Vyacheslav Mikhailovich, Candidate of Technical Sciences, Associate Professor TELEVISION PHOTOGRAPHY OF THE CONTROL OBJECT WITH PULSE EXPOSURE OF THE PHOTO DETECTOR WITH …

Television photography of a test object with pulsed exposure of a photodetector by a packet of flashes.Далее …

Television observations in difficult conditions.

Television observations in difficult conditions. Kulikov Alexander Nikolaevich TELEVISION OBSERVATIONS IN DIFFICULT CONDITIONS. Quite recently, in 1970, a microprocessor and a charge-coupled device (CCD) appeared simultaneously [1]. Modern life is already unthinkable without computers and CCD cameras. The electronic revolution continues and amazes us every year with new products and unprecedented price reductions. It is …

Television observations in difficult conditions.Далее …

razlichnie edinici razlichnie rezultatiizmereniya chuvst

Different units – different results of measuring the sensitivity of television cameras.

Different units — different results of measuring the sensitivity of television cameras.. Different units — different results of measuring the sensitivity of television cameras. KRUTIK Mikhail Ilyich, MAYOROV Viktor Petrovich LUMENS, CANDELAS, WATTS AND PHOTONS. DIFFERENT UNITS – DIFFERENT RESULTS OF MEASURING THE SENSITIVITY OF TV CAMERAS BASED ON IMAGE TUBE AND CCD The authors …

Different units – different results of measuring the sensitivity of television cameras.Далее …

FEATURES OF TECHNOLOGICAL EQUIPMENT FOR ALIGNMENT OF THE TELEVISION SYSTEM'S SIGHTING AXIS.

FEATURES OF TECHNOLOGICAL EQUIPMENT FOR ALIGNMENT OF THE SIGHTING AXIS OF A TELEVISION SYSTEM.. FEATURES OF TECHNOLOGICAL EQUIPMENT FOR ALIGNMENT OF THE SIGHTING AXIS OF A TELEVISION SYSTEM. Vyacheslav Mikhailovich SMELKOV, Candidate of Technical Sciences, Associate Professor FEATURES OF TECHNOLOGICAL EQUIPMENT FOR ALIGNMENT OF THE SIGHTING AXIS OF A TELEVISION SYSTEM In [1], a method …

FEATURES OF TECHNOLOGICAL EQUIPMENT FOR ALIGNMENT OF THE TELEVISION SYSTEM'S SIGHTING AXIS.Далее …

metod povisheniya razreshayushei sposobnosti telekameri d

METHOD OF INCREASING THE RESOLUTION OF A TELEVISION CAMERA FOR FORENSIC DIAGNOSTICS.

Vyacheslav Mikhailovich SMELKOV, PhD in Engineering, Associate Professor METHOD OF INCREASING THE RESOLUTION OF A TELEVISION CAMERA FOR FORENSIC DIAGNOSTICS Due to the non-destructive nature of reading information and the convenience of providing it to the consumer, the television method is preferred in conducting various forensic studies. The most important link in the television hardware …

METHOD OF INCREASING THE RESOLUTION OF A TELEVISION CAMERA FOR FORENSIC DIAGNOSTICS.Далее …

“PIR” METHOD FOR 24-HOUR SECURITY CAMERA.

THE “PIR” METHOD FOR A 24-HOUR SECURITY CAMERA.. THE “PIR” METHOD FOR A 24-HOUR SECURITY CAMERA. SMELKOV Vyacheslav Mikhailovich THE “PiP” METHOD FOR A 24-HOUR SECURITY CAMERA The term “PiP” is an English abbreviation for the phrase “picture in picture”, which means “image in image” or “picture in picture”. Looking back at the “PiP” method …

“PIR” METHOD FOR 24-HOUR SECURITY CAMERA.Далее …

logo11d 4 1

PRESS THE BUTTON… What do we see on the screen when we try to play back CCTV recordings?

PRESS THE BUTTON… What do we see on the screen when trying to play back CCTV recordings?. PRESS THE BUTTON… What do we see on the screen when trying to play back CCTV recordings? PRESS THE BUTTON… What do we see on the screen when we try to play back CCTV recordings? CCTV is at …

PRESS THE BUTTON… What do we see on the screen when we try to play back CCTV recordings?Далее …

ISS is the first to implement international standards for technical support.

ISS is the first to implement international technical support standards. ISS has always paid great attention to technical support issues. The qualifications of specialists, the list of services provided, their quality and efficiency — all this plays an important role in working with Partners. ISS announces an improvement in the quality of service and the …

ISS is the first to implement international standards for technical support.Далее …

logo11d 4 1

AXIS Q1910 thermal IP cameras can “see” even a black cat in a dark room.

AXIS Q1910 thermal IP cameras will “see” even a black cat in a dark room. The Q1910 Series thermal network cameras are the first AXIS Communications devices to combine the functionality of IP cameras with the advantages of infrared cameras. They can operate indoors or outdoors in absolute darkness, detecting objects at any time of …

AXIS Q1910 thermal IP cameras can “see” even a black cat in a dark room.Далее …

parsec nadejno i funkcionalno

Parsec — reliable and functional!

Parsec is reliable and functional! Sergey Stasenko, Relvest Group of Companies sserg@relvest.ru ParsecNET 2.5: a new level of reliability A new version of software for the ParsecNET integrated security system has been released. The user will find very few external differences, but «inside» — this is completely different software. Maintaining a user-friendly external interface was …

Parsec — reliable and functional!Далее …

sistema kontrolya dostupa nedap aeos koncentraciya preimu

NEDAP-AEOS Access Control System: Concentration of Advantages.

NEDAP-AEOS access control system: concentration of advantages. NEDAP-AEOS access control system: concentration of advantages NEDAP-AEOS access control system: concentration of advantages PROGRAMMABLE CONTROLLER One of the unique features of the AEOS system is the ability to “behaviourally” program the operation of your controllers.The server contains the necessary software components describing all possible system configurations, from …

NEDAP-AEOS Access Control System: Concentration of Advantages.Далее …

sistema kontrolya dostupa nedap aeos novii vzglyad na upr

Access control system NEDAP-AEOS. A new look at security management.

NEDAP-AEOS Access Control System. A New Look at Security Management. NEDAP-AEOS Access Control System. A New Look at Security Management NEDAP-AEOS Access Control System. A New Look at Security Management The role of management in the technical security of a company is constantly growing. Keeping up with the latest technologies and realizing all their benefits …

Access control system NEDAP-AEOS. A new look at security management.Далее …

sovremennoe sostoyanie rinka setevix skud v sankt peterbu

Current state of the network access control system market in Saint Petersburg.

Current state of the network access control system market in St. Petersburg. In the spring of 2010, specialists from the Club of Business and Politics Consultants conducted a telephone survey of organizations engaged in the sale and installation of security systems in St. Petersburg. Of the 528 registered enterprises, 244 (46%) took part in the …

Current state of the network access control system market in Saint Petersburg.Далее …

vibor i proektirovanie skud osnovnie oshibki i proscheti

Selection and design of access control systems: basic mistakes and miscalculations.

Selecting and designing an ACS: basic mistakes and miscalculations. As the saying goes, only he who does nothing makes no mistakes. However, in relation to the topic of this article, there are a number of fairly common miscalculations and mistakes, avoiding which can save your nerves and the customer's. Plus, you can save money. The …

Selection and design of access control systems: basic mistakes and miscalculations.Далее …

dlya chego nujna dalnyaya identifikaciya kakie zadachi on

What is long-range identification for? What tasks does it solve?

What is long-range identification for? What tasks does it solve?. Long-range identification is identification based on radio frequency identification (RFID) technology. When we talk about long-range identification, we are talking about reading tags at long distances. This can be 5-10 meters, and for some tasks, 50-100 meters. One of the areas of application of long-range …

What is long-range identification for? What tasks does it solve?Далее …

rabota avtomaticheskoi parkovki problemi i resheniya

Automatic parking operation: problems and solutions.

Automatic parking operation: problems and solutions. If there are traffic rules and technical means for this, then there must be rules for road standing and, accordingly, equipment for this. That is, there must be areas and buildings for parking cars, there must be a system for informing drivers about the location of such facilities and …

Automatic parking operation: problems and solutions.Далее …

simbioz 1spredpriyatie i sistem kontrolya dostupa novii v

Symbiosis of 1C:Enterprise and access control systems. A new look.

Symbiosis of 1C:Enterprise and access control systems. A new look. The intensive development of IT technologies for enterprise management and security technologies inevitably had to lead to their intersection. This process has been going on for a number of years and is actively discussed on the pages of various publications by both industrial automation specialists …

Symbiosis of 1C:Enterprise and access control systems. A new look.Далее …

logo11d 4 1

Technologies for protection against intruders.

Technologies for protecting against intruders. Technologies for protection against intruders Technologies for protection against intruders In recent years, we have seen rapid changes in the field of network technologies and the economic conditions in which they are used. It has become increasingly clear that existing approaches to such an area of ​​activity as security management …

Technologies for protection against intruders.Далее …

Features of creating access control systems in universities.

Features of creating ACS in universities. Since 1993-1996, information technologies have been actively introduced into all areas of educational institutions, and especially into the educational process. At present, any university has the following automated information systems (AIS): AIS «Student Contingent Management» — end-to-end accounting of students in the relevant structural divisions of the university; AIS …

Features of creating access control systems in universities.Далее …

dorojnie i parkovochnie blokiratori

Road and parking blockers.

Road and parking blockers. Devices for blocking the passage of vehicles are used, as a rule, as part of access control and management systems of the general complex of security systems of any facility: banking institutions, office centers, strategically important facilities, for example, defense enterprises, embassy buildings. The device for blocking the passage of vehicles …

Road and parking blockers.Далее …

Parking systems for above-ground and underground paid parking.

Parking systems for above-ground and underground paid parking lots. Speaking about parking, it should be noted that it is a mandatory element of the infrastructure, for example, of a shopping center. The buyer will leave his money where he can park his car without problems, and then quickly find it. Without worrying about the fate …

Parking systems for above-ground and underground paid parking.Далее …

shlagbaumi

Barriers.

Barriers. A barrier, as is known, is one of the most common peripheral actuators for controlling the movement of vehicles within the framework of a general security system at a facility, for example, an ACS. At the same time, in parallel with the security market, this device is no less popular in the market of …

Barriers.Далее …

Modern perimeter security systems. Article updated 09.04 in 2023.

Modern perimeter security systems. Vvedenskiy Boris Sergeevich, candidate of physical and mathematical sciences MODERN PERIMETER SECURITY SYSTEMS (End. Beginning in Nos. 3, 4, 1999) Introduction Previous issues examined perimeter security systems of various types: optical, radio wave, radio beam, capacitive, etc. This final part of the article describes perimeter systems that are sensitive to vibrations …

Modern perimeter security systems. Article updated 09.04 in 2023.Далее …

Modern perimeter security systems. Article updated 03.04 in 2023.

Modern perimeter security systems. Boris Sergeevich Vvedensky, Candidate of Physical and Mathematical Sciences MODERN PERIMETER SECURITY SYSTEMS   (Continued. Beginning in No. 3, 1999) Introduction In the first part of the article we looked at some perimeter security systems using radio emission — radio beam and radio wave. This section describes security systems based on …

Modern perimeter security systems. Article updated 03.04 in 2023.Далее …

sistemi oxrani perimetrov s volokonno opticheskimi sensor

PERIMETER SECURITY SYSTEMS WITH FIBER OPTIC SENSORS..

PERIMETER SECURITY SYSTEMS WITH FIBER-OPTIC SENSORS.. PERIMETER SECURITY SYSTEMS WITH FIBER-OPTIC SENSORS. VVEDENSKY Boris Sergeevich, Candidate of Physical and Mathematical Sciences PERIMETER SECURITY SYSTEMS WITH FIBER-OPTIC SENSORS General principles of operation of security systems with fiber-optic sensors Fiber optic cables, which are usually used for transmitting information, can also be used as sensors for perimeter …

PERIMETER SECURITY SYSTEMS WITH FIBER OPTIC SENSORS..Далее …

logo11d 4 1

Office surveillance rules.

Office surveillance rules. Office Surveillance Rules Office Surveillance Rules At the gate — an access control system with magnetic readers. At the entrance to the office — a revolving door with plastic keys. On the floors — electronic locks. Today it is difficult to find an administrative building in which some access control systems would …

Office surveillance rules.Далее …

trevojnie soobsheniya po setyam internet celesoobraznost

Alarm messages over the Internet: feasibility, installation and use features.

Alarm messages on the Internet: feasibility, installation and use features. First of all, I will warn you that in the article, in order not to advertise either myself or competitors, there are no mentions of specific brands and models of products. Do not be upset, specific products can easily be «googled» using Yandex. I will …

Alarm messages over the Internet: feasibility, installation and use features.Далее …

Rapidly deployable perimeter security systems.

Rapidly deployable perimeter security systems. Modern perimeter security systems are characterized by a wide variety of physical principles and design options. Technological advances enable developers to create compact security systems that can quickly organize signal lines even in unprepared areas. Such systems are usually distinguished by covert installation of sensors. They are often used to …

Rapidly deployable perimeter security systems.Далее …

nevidimie vorota luchevie ik bareri serii activa dlya sis

Invisible gates. Beam IR barriers of the Activa series for security systems of internal and external perimeters of objects.

Invisible gates. Beam IR barriers of the Activa series for security systems of internal and external perimeters of objects. Active IR motion sensors from Satel are designed to protect shop windows, museums, window openings and external perimeters of objects from unauthorized intrusion. The Activa series includes 7 models, differing from each other in the number …

Invisible gates. Beam IR barriers of the Activa series for security systems of internal and external perimeters of objects.Далее …

avtomatizaciya proektirovaniya

Automation of design.

Design automation. Rare is the manager who was not outraged by the slowness of projects in his own organization. Indignation is often accompanied by the desire to disperse the design department. In addition to the radical one, there is another way to solve the problem. It is not implemented so quickly and requires financial costs, …

Automation of design.Далее …

Intelligent detectors for open spaces.

Intelligent detectors for open spaces. Among professional manufacturers of security detectors, the Swiss company ASIM Technologies has always stood apart due to a number of unique technical solutions and the highest quality of its products. With the loss of independence and inclusion in the international corporation Xtralis, the company has not lost its technological potential …

Intelligent detectors for open spaces.Далее …

vibracionnie mikrofonnie sredstva obnarujeniya

Vibrating microphone detection devices.

Vibration microphone detection devices. Vibration microphone detection devices (SDD) are designed to detect an intruder by the vibrations they create in a strong engineering barrier (physical barrier) during penetration into a protected facility.The operating principle of such detection devices is based on recording mechanical vibrations or movements of the fence that occur when an intruder …

Vibrating microphone detection devices.Далее …

vibracionnie volokonno opticheskie sredstva obnarujeniya

Vibrating fiber optic detection devices.

Vibrating fiber-optic detection devices. Vibrating fiber-optic detection devices are designed to detect an intruder by the vibrations of the alarm barrier they create during penetration into the protected facility. The operating principle of vibrating fiber-optic detection devices is based on recording mechanical vibrations or movements of the barrier that occur when an intruder attempts to …

Vibrating fiber optic detection devices.Далее …

Combined alarm sensors.

Combined security alarm sensors. Combined security alarm sensors Andreev S.P. COMBINED SECURITY ALARM SENSORS Source: magazine «Special Equipment» Combination sensors, also called dual technology sensors, are relatively new and are currently becoming increasingly popular. The advantage of such sensors is a significant reduction in the frequency of false alarms. This is achieved by using a …

Combined alarm sensors.Далее …

logo11d 4 1

RAPIDLY DEPLOYABLE DETECTION AND ALARM SYSTEMS.

RAPIDLY DEPLOYABLE DETECTION AND SECURITY ALARM SYSTEMS. RAPIDLY DEPLOYABLE DETECTION MEANS AND SECURITY ALARM SYSTEMS   ZVEZHINSKY Stanislav Sigismundovich, Candidate of Technical Sciences RAPIDLY DEPLOYABLE DETECTION MEANS AND SECURITY ALARM SYSTEMS   Perimeter alarm systems (PAS), designed to detect intruders on the ground, are an important part of automated physical protection systems for facilities and …

RAPIDLY DEPLOYABLE DETECTION AND ALARM SYSTEMS.Далее …

chto nujno znat o zashite elektroseti

What you need to know about protecting your electrical grid.

What you need to know about protecting the electrical network. What you need to know about protecting the electrical network. What you need to know about protecting the electrical network. Operation of electrical networksIn production, industrial and other similar premises from operation of electrical networksthe main part of the work depends on, so it is …

What you need to know about protecting your electrical grid.Далее …

Electrical wiring diagram.

Electrical wiring diagram. Electrical wiring diagram Electrical wiring diagram Electrical wiring diagramwill also help in identifying faults, which can be especially difficult to do if there is hidden wiring. For example, due to the serial and parallel connection of individual sections of the circuit, the disappearance of voltage on any terminal device can be caused …

Electrical wiring diagram.Далее …

Basic electrical protective equipment and its operation.

Basic electrical protective equipment and their operation. Basic electrical protective equipment and their operation Basic electrical protective equipment and their operation Basic electrical protective equipmentInsulating electrical protective equipment is a means of protection against electric shock, used to ensure electrical safety. The classification of personal protective equipment includes this type of equipment. They are divided …

Basic electrical protective equipment and its operation.Далее …

Rules for installation of household gas cylinders.

Rules for installing household gas cylinders. Rules for installing household gas cylinders Rules for installing household gas cylinders According to official data from a special commission, in most incidents where a gas cylinder explodes, the cause lies in disregard for the rules for using cylinders. Gas cylinders are used in various premises — both residential …

Rules for installation of household gas cylinders.Далее …

logo11d 4 1

Contradictions between Federal Law 94 and consumer rights.

Contradictions of Federal Law 94 to consumer rights. Contradictions of Federal Law 94 to consumer rights Contradictions of Federal Law 94 to consumer rights The President of the Russian Federation proposed to jail those who profit from government procurement for a long time. Conscientious participants in competitions and tenders even claim that the legislation on …

Contradictions between Federal Law 94 and consumer rights.Далее …

avtomatizaciya kontrolya i obespecheniya bezopasnosti pro

Automation of control and safety of an industrial facility.

Automation of control and safety of an industrial facility. Prerequisites A comprehensive safety system for an industrial facility (hereinafter referred to as CSSF) is defined as a complex ergotechnical system designed to protect an industrial facility (PF) from the impact of external and internal sources of security threats, as well as to prevent offenses, the …

Automation of control and safety of an industrial facility.Далее …

Security alarm sensor: overview of the working mechanism.

Security alarm sensor: an overview of the working mechanism. Security alarm sensor: an overview of the working mechanism. Security alarm sensor: an overview of the working mechanism. You can design a security alarm system without leaving your home. Today, contactless sensors that react to thermal radiation inside the alarm device are extremely common. Optical proximity …

Security alarm sensor: overview of the working mechanism.Далее …

graficheskii interfeis polzovatelya dlya sistem gromkogo

Graphical user interface for public address and music broadcasting systems.

Graphical user interface for public address and music broadcasting systems. Graphical user interface for public address and music broadcasting systems Graphical user interface for public address and music broadcasting systems. In our time of rapid development of information technologies and structured cabling systems, more and more engineering systems of the building use network solutions for …

Graphical user interface for public address and music broadcasting systems.Далее …

koncepcii vibora kolichestva i rasstanovki videokamer dly

Concepts for selecting the number and placement of video cameras to build a digital video monitoring system at a retail facility with self-service trading.

Concepts for selecting the number and placement of video cameras to build a digital video monitoring system at a retail facility with self-service trading. Concepts for selecting the number and placement of video cameras to build a digital video monitoring system at a retail facility with a self-service trading form Concepts for selecting the number …

Concepts for selecting the number and placement of video cameras to build a digital video monitoring system at a retail facility with self-service trading.Далее …

mnogokanalnaya podsistema peredachi izveshenii

Multichannel notification transmission subsystem.

Multi-channel notification transmission subsystem. Multi-channel notification transmission subsystem Multi-channel notification transmission subsystem To understand the fundamental differences between notification transmission systems, we offer a brief historical excursion. For a long time, up until the 2000s, monitoring systems based on low-speed communication channels dominated in the world, mainly using dial-up telephone lines and radio channels, and …

Multichannel notification transmission subsystem.Далее …

nekotorie aspekti avtomaticheskogo raspoznavaniya avtomob

Some aspects of automatic recognition of vehicle license plates.

Some aspects of automatic recognition of vehicle license plates. Some aspects of automatic recognition of vehicle license plates Some aspects of automatic recognition of vehicle license plates Currently, there are more than half a billion cars on the roads in the world. All these vehicles have a unique identification number as the main identification mark. …

Some aspects of automatic recognition of vehicle license plates.Далее …

General information about the Mirage/Siberia monitoring systems.

General information about the Mirage/Siberia monitoring systems. General information about the Mirage/Siberia monitoring systems General information about the Mirage/Siberia monitoring systems Criterion 1. Information delivery time The well-known axiom «Time is money» in security systems has a special, clearly expressed material meaning. The total response time to an alarm event consists of several components, the …

General information about the Mirage/Siberia monitoring systems.Далее …

organizaciya truda rukovoditelya otdela marketinga po pro

Organization of work of the head of the marketing department for product promotion in the security systems market.

Organization of work of the head of the marketing department for product promotion in the security systems market. Organization of work of the head of the marketing department for product promotion in the security systems market. Organization of work of the head of the marketing department for product promotion in the security systems market.  The …

Organization of work of the head of the marketing department for product promotion in the security systems market.Далее …

Features and differences of two-position perimeter security systems.

Features and differences of two-position perimeter security means. Features and differences of two-position perimeter security means. Features and differences of two-position perimeter security means. An attempt to make a choice based on advertising materials leads to the conclusion that all detectors are practically the same. All have certificates of conformity. Prices for models with similar …

Features and differences of two-position perimeter security systems.Далее …

poziciya rossiiskogo nacionalnogo komiteta po standartiza

Position of the Russian National Standardization Committee TC — 234 on the draft international standard IEC 62642-2-2.

Position of the Russian National Standardization Committee TC 234 on the draft international standard IEC 62642-2-2. Position of the Russian National Standardization Committee TC 234 on the draft international standard IEC 62642-2-2. Position of the Russian National Standardization Committee TC 234 on the draft international standard IEC 62642-2-2 The prospect of Russia joining the WTO …

Position of the Russian National Standardization Committee TC — 234 on the draft international standard IEC 62642-2-2.Далее …

prakticheskoe reshenie voprosov bezopasnosti cherez infot

Practical solution to security issues through information technology.

Practical solution to security issues through information technology. Practical solution to security issues through information technology Practical solution to security issues through information technology Several years ago, the owner of a sports complex in the Moscow suburbs expressed a desire to create an unprecedented security system at this facility. A corresponding tender was announced, and …

Practical solution to security issues through information technology.Далее …

Technical means of perimeter protection. Options for protecting objects and territories.

Technical means of perimeter protection. Options for protecting objects and territories.. Technical means of perimeter protection. Options for protecting objects and territories. Technical means of perimeter protection. Options for protecting objects and territories. Today, there are quite a lot of different systems and methods for protecting objects and territories. In the conditions of rapid development …

Technical means of perimeter protection. Options for protecting objects and territories.Далее …

transformatornie i impulsnie istochniki pitaniya.jpeg

Transformer and switching power supplies.

#power supplies Transformer and pulse power supplies. Transformer power supplies A classic power supply is a transformer power supply. In general, it consists of a step-down transformer or autotransformer, whose primary winding is designed for line voltage. Then a rectifier is installed, converting alternating voltage to direct voltage (pulsating unidirectional). In most cases, the rectifier …

Transformer and switching power supplies.Далее …

videoregistratori hi end klassa.jpeg

Hi-End class video recorders.

Hi-End class video recorders. Hi-End class video recorders Hi-End class video recorders INTRODUCTION Earlier in the articles we described the classification of recorders, dividing them into 4 classes:1. Budget, so-called Econom-class.2. Average, Medium*class, or, using computer terminology, SOHO (for small offices and home use).3. Professional, Professional — class.4. Hi-End class.A table of dividing DVRs into …

Hi-End class video recorders.Далее …

What's good for a hypermarket is death for a bookstore.

What's good for a hypermarket is death for a bookstore. What's good for a hypermarket is death for a bookstore. Anti-theft systems are divided into four main technologies: acoustomagnetic, radio frequency, electromagnetic and radio magnetic. All of them have a very wide range of applications, but in each specific case it is necessary to analyze …

What's good for a hypermarket is death for a bookstore.Далее …

kompyuternie seti osnovnie ponyatiya

Computer networks: basic concepts.

Computer networks: basic concepts. Computer networks: basic concepts Computer networks: basic concepts The security of the user's personal data starts from the basics, so it is important to have general information about how a computer network is structured. Computer networks. Basic conceptsFirst, it is necessary to define the concept of computer networks. Basic conceptswill be …

Computer networks: basic concepts.Далее …

Briefly about new antivirus programs and the concept of «light antivirus».

Briefly about new antivirus programs and the concept of «light antivirus». Briefly about new antivirus programs and the concept of «light antivirus» Briefly about new antivirus programs and the concept of «light antivirus» New antivirus programsThere are quite a few companies that produce special protective software. Some of them are extremely popular and known throughout …

Briefly about new antivirus programs and the concept of «light antivirus».Далее …

aeroport kopengagena ustanavlivaet teplovizori

Copenhagen Airport installs thermal imaging cameras

With the threat of attack or, worse, terrorist attacks, passenger safety at the airport is a top priority for airlines and airport authorities. However, it is not just passengers who need protection, but also staff and valuable equipment. FLIR Systems SR-100 thermal imaging cameras help raise the level of security at Copenhagen Airport to an …

Copenhagen Airport installs thermal imaging camerasДалее …

kakoi processor u vashei analogovoi kameri

What processor does your analog camera have?

What processor does your analog camera have?. The question is not trivial. If 10 years ago the competition between major CCTV camera manufacturers was directly related to the technologies and characteristics of CCD, today there is a rivalry between digital signal processors – DSP (Digital Signal Processor). They are designed to process digital signals in …

What processor does your analog camera have?Далее …

logo11d 4 1

Open Technologies reported on the work of the St. Petersburg branch.

Open Technologies reported on the work of the St. Petersburg branch. Open Technologies has been operating in the Russian system integration market since 1994. The company's key areas of activity are solving infrastructure problems, including network integration, supply of computing equipment, data storage and processing equipment, construction of telecommunication networks, and software services. Among the …

Open Technologies reported on the work of the St. Petersburg branch.Далее …

skaner uyazvimostei

Vulnerability scanner.

Vulnerability scanner. Vulnerability scanner Vulnerability scanner A vulnerability scanner is a software or hardware tool used to diagnose and monitor network computers. This device allows you to analyze the security of networks, computers, and applications to detect possible problems in the security system. A vulnerability scanner operates in the field of assessment and troubleshooting. A …

Vulnerability scanner.Далее …

The USB universal host controller is an important hardware component.

USB universal host controller is an important hardware component. Today it is very important that the hardware program «standard usb host controller driver» has ready-made top-level drivers and libraries for working with them, as well as a simple interface for communicating with an external processor. What you need to know about this type of application. …

The USB universal host controller is an important hardware component.Далее …

Types of malware.

Types of malware. Windows blockers Windows blockers are malicious programs that, according to the classification, are called Trojan.Winlock. Windows blockers when the Windows system starts, display a message on top of all windows stating that access to the system is blocked, and in order for this window to disappear, you must send a paid SMS …

Types of malware.Далее …

intellektualnaya sistema monitoringa i diagnostiki visoko

Intelligent system for monitoring and diagnostics of high-voltage equipment of power plants.

Intelligent system for monitoring and diagnostics of high-voltage equipment of power plants. Intelligent system for monitoring and diagnostics of high-voltage equipment of power plants. Intelligent system for monitoring and diagnostics of high-voltage equipment of power industry The MVKS system is designed for continuous monitoring of the temperature of cable lines in real time, to ensure …

Intelligent system for monitoring and diagnostics of high-voltage equipment of power plants.Далее …

palatnaya signalizaciya intercall ip sistemi vizova perso

Intercall IP ward alarm system, Intercall IP staff call systems.

Intercall IP ward signaling, Intercall IP staff call systems. Intercall IP ward signaling, Intercall IP staff call systems Intercall IP Ward Alarm, Intercall IP Staff Call Systems The Intercall IP system is the leading medical staff call system in the UK. This system provides, in addition to the ability to exchange voice, allows the patient …

Intercall IP ward alarm system, Intercall IP staff call systems.Далее …

trezor

TREZOR.

TREZOR. Perimeter equipment under the TREZOR brand appeared on the security systems market in 2004. The TREZOR line is represented by the following equipment: TREZOR-R — radio wave detection devices, TREZOR-V — vibration detection devices, TREZOR-M — microwave detection devices, as well as installation accessories (junction boxes, cable splicing stand). Today, TREZOR detectors have found …

TREZOR.Далее …

OPTEX.

OPTEX. OPTEX was founded in the Japanese city of Otsu in 1979 with the aim of developing and advancing sensor technologies that had previously been used exclusively in the space, military and medical industries. The company's engineers proposed a revolutionary idea for that time of using infrared technologies in everyday life and already in 1980 …

OPTEX.Далее …

daiwon optical co ltd

DAIWON OPTICAL Co., Ltd.

DAIWON OPTICAL Co., Ltd. Founded in 1988, the South Korean company DAIWON OPTICAL COMPANY (that was its original name) entered the market as a manufacturer of lenses for binoculars, as well as photo and video cameras. Just four years later, the company firmly occupied its niche in the market of technical security equipment, having started …

DAIWON OPTICAL Co., Ltd.Далее …

superekonomichnii projektor dlya osvesheniya perimetra ob.jpeg

Super-economical floodlight for illuminating the perimeter of objects.

Super-efficient floodlight for illuminating the perimeter of objects. Super-efficient floodlight for illuminating the perimeter of objects. Super-efficient floodlight for illuminating the perimeter of objects. The use of LEDs with a built-in lens allows you to organize the illumination of perimeter sections up to 50 meters long. At the same time, the illumination of the observed …

Super-economical floodlight for illuminating the perimeter of objects.Далее …

seriya videodofonov pvd 704c

Series of video intercoms PVD-704C.

Series of video intercoms PVD-704C. PVD-704C video intercom series Video intercom series PVD-704C Video intercom series PVD-704C: choose your memory size The company «Security Technologies», a supplier of security equipment under the Polyvision brand, announces the start of deliveries of color intercoms of the PVD-704 series. The 704th series of Polyvision intercoms includes 3 models …

Series of video intercoms PVD-704C.Далее …

rvi r04sa

RVi-R04SA — video recorder for budget solutions.

RVi-R04SA — video recorder for budget solutions. RVi-R04SA — video recorder for budget solutions RVi-R04SA — video recorder for budget solutions RVi-R04SA — video recorder for budget solutions. Most RVi video recorders are very functional devices. However, in some cases, not all capabilities are actually used, and the recording device is used only for its …

RVi-R04SA — video recorder for budget solutions.Далее …

razdelenie zoni obnarujeniya na neskolko podzon na primer

Division of the detection zone into several subzones using the example of radio wave single-position detectors ZEBRA-30 and ZEBRA-60. The article was updated in 2023.

Division of the detection zone into several subzones using the example of ZEBRA-30 and ZEBRA-60 single-position radio wave detectors Division of the detection zone into several subzones using the example of ZEBRA-30 and ZEBRA-60 single-position radio wave detectors Radio wave single-position detectors ZEBRA-30 and ZEBRA-60 have a detection zone divided into 12 subzones in the …

Division of the detection zone into several subzones using the example of radio wave single-position detectors ZEBRA-30 and ZEBRA-60. The article was updated in 2023.Далее …

podezdnie videodomofoni

Entrance video intercoms.

Entrance video intercoms. Entrance video intercoms Entrance video intercoms Entrance video intercom  refers to access control systems for premises designed for use in a small office, apartment or residential building. There are several types of implementations in which entrance video intercoms are used. They can be installed at the entrance to the entrance, near the …

Entrance video intercoms.Далее …

odnopozicionnii radiovolnovoi izveshatel agat 7.jpeg

Single-position radio wave detector «Agat-7».

Single-position radio wave detector «Agat-7». Single-position radio wave detector «Agat-7» Single-position radio wave detector «Agat-7» Characteristics and parameters: The detector uses sawtooth frequency modulation of the transmitter carrier frequency and software signal processing at the receiver. There is gain and range adjustment, discrete threshold adjustment, relay and interface (RS-485) outputs. Unlike similar detectors operating on …

Single-position radio wave detector «Agat-7».Далее …

New in the class of radio wave two-position detectors.

New in the class of radio wave two-position detectors. New in the class of radio wave two-position detectors New in the class of radio wave two-position detectors Despite their great popularity and prevalence, more and more questions arise regarding their selection and conditions of use. The large range of manufactured detectors and their insufficiently clear …

New in the class of radio wave two-position detectors.Далее …

logo11d 4 1

K-engineering increases the level of Service.

K-engineering improves the level of Service. K-engineering improves the level of Service K-engineering improves the level of Service RELIABLE, stable, constant, instilling confidence… What do these words tell us? What do we expect from a company or product that uses them to describe its activities. Undoubtedly — success. After all, where there is success, there …

K-engineering increases the level of Service.Далее …

Two-way security system for commercial vehicles SCHER-KHAN TAIGA.

Two-way security system for commercial vehicles SCHER-KHAN TAIGA. Two-way security system for commercial vehicles SCHER-KHAN TAIGA Two-way security system for commercial vehicles SCHER-KHAN TAIGA Several thousand cases of theft and hijacking of commercial vehicles are registered in Russia every year, and the total damage from these criminal acts amounts to tens of millions of dollars. …

Two-way security system for commercial vehicles SCHER-KHAN TAIGA.Далее …

logo11d 4 1

Oubau door closers.

Oubau door closers. Oubau door closers Oubau door closers About OUBAO OUBAO is one of the largest manufacturers of door closers in the world. OUBAO has American UL, UL10C, ETL, ITS certificates and European TUV, CE, SP and EN1154 certificates. OBAO door closers are manufactured using modern manufacturing and assembly technologies, which ensures their high …

Oubau door closers.Далее …

biometrika na slujbe bezopasnosti

Biometrics in the service of security.

Biometrics in the service of security. Biometrics in the service of security Biometrics in the service of security Various biometric security systems can be compared with each other using several characteristics listed below. Biometrics (some calculations for security systems) Biometrics– is the registration of individual parameters of the human body. Special biometric systems must read …

Biometrics in the service of security.Далее …

Pelco: equipment for industrial facilities.

#Pelco Pelco: equipment for industrial facilities. It is known that the term CCTV covers not only security systems, but also technological television surveillance, as well as remote object monitoring systems. Despite the general principles of creating these systems, there are characteristic differences regarding the requirements for operational characteristics and the design of system elements. Indeed, …

Pelco: equipment for industrial facilities.Далее …

novoe oborudovanie novie vozmojnosti ot tedd electronic

New equipment — new opportunities from Tedd Electronics.

New equipment — new opportunities from Tedd Electronics. The range of equipment manufactured under the Tedd Electronics brand is expanding. The Formula Bezopasnosti company presents new budget video recorders with an optimal price/quality ratio for this equipment. All equipment has been tested and meets the declared parameters. In addition to DVR, the range includes small-sized …

New equipment — new opportunities from Tedd Electronics.Далее …

cistemi cifrovoi zapisi kompanii pelco

PELCO digital recording systems. Article updated in 2023.

PELCO digital recording systems The main event of 2007 for PELCO was the company's entry into the financial and industrial group Schneider Electric and the actual unification of its engineering, production and marketing potential with TAC, a well-known supplier of solutions for engineering support of buildings. The main goal of this step for PELCO was …

PELCO digital recording systems. Article updated in 2023.Далее …

zarubejnie arochnie metallo detektoriosoznannii vibor

Foreign arched metal detectors. Informed choice.

#metal detectors Foreign arched metal detectors — a conscious choice. Sinelytsykov Georgy Alexandrovich Metal detectors for searching weapons during personal inspections have become an integral part of most security systems. When building such a system, the consumer faces the task of choosing from 30 models and modifications of domestic and foreign metal detectors currently available …

Foreign arched metal detectors. Informed choice.Далее …

logo11d 4 1

Technical characteristics of some domestic rapidly deployable detection equipment.

Table 1. Technical characteristics of some domestic rapidly deployable detection tools Name, manufacturer- supplier Features of the detection tool (DS) Detection zone, m Power parameters and operating temperature range, oC Approximate cost with VAT, $ VITIM GUP SNPO ELERON” Moscow Radar system for guarding temporary-based facilities with a perimeter length of up to 1 km …

Technical characteristics of some domestic rapidly deployable detection equipment.Далее …

priemnik panoramnii izmeritelnii ark d1tr

PANORAMIC MEASURING RECEIVER ARK-D1TR..

PANORAMIC MEASURING RECEIVER ARK-D1TR.. PANORAMIC MEASURING RECEIVER ARK-D1TR. SERGEEV Viktor Borisovich, SERGIENKO Alexander Rostislavovich, PEREVERZEV Sergey Borisovich.  PANORAMIC MEASURING RECEIVER ARC-D1TR This article discusses the panoramic measuring receiver ARK-D1TR, the features of its use in stationary and mobile multifunctional measuring complexes and methods for calibrating the hardware and software part of the radio receiver and …

PANORAMIC MEASURING RECEIVER ARK-D1TR..Далее …

portativnii spektralnii videokomparatorvsc 4c

Portable Spectral Video Comparator VSC-4C..

Portable spectral video comparator VSC-4C.. Portable spectral video comparator VSC-4C. Vadim Antoninovich Shelkov PORTABLE SPECTRAL VIDEO COMPARATOR VSC-4c FOR FORENSIC EXAMINATION OF DOCUMENTS Determining the authenticity and integrity of various documents has always made up a significant share of the total volume of forensic investigations. Such work is usually carried out on special installations — …

Portable Spectral Video Comparator VSC-4C..Далее …

portativnii pribor dlya proverki dokumentov korund mtv

Portable device for checking documents “Korund-MTV”.

Portable device for checking documents «Korund-MTV».. Portable device for checking documents «Korund-MTV». KOVALEV Aleksey Alekseevich POLYAKOV Yury Alekseevich SINELNIKOVA Elena Nikolaevna STUDITSKY Aleksandr Sergeevich KHNYKOV Yury Alekseevich PORTABLE DEVICE FOR CHECKING DOCUMENTS “KORUND-MTV”   The portable device “Korund-MTV” is designed for visual inspection of documents in non-stationary conditions. The device implements a combination of inspection …

Portable device for checking documents “Korund-MTV”.Далее …

portativnaya sistema radiomonitoringa i opredeleniya mest

Portable system for radio monitoring and determination of the location of radio emission sources.

Portable system for radio monitoring and determining the location of radio emission sources.. Portable system for radio monitoring and determining the location of radio emission sources. ASHIKHMIN Aleksandr Vladimirovich, Candidate of Technical Sciences KOZMIN Vladimir Alekseevich, Candidate of Technical Sciences, Associate Professor REMBOVSKY Yuri Anatolyevich, Candidate of Physical and Mathematical Sciences Portable system for radio …

Portable system for radio monitoring and determination of the location of radio emission sources.Далее …

logo11d 4 1

Exclusive models of LCD TVs from Pioneer..

Exclusive models of liquid crystal televisions from Pioneer.. Exclusive models of liquid crystal televisions from Pioneer. Exclusive models of LCD TVs from Pioneer. Pioneer has launched the production of a limited series of KURO plasma TVs — KRP-500ABG and KRP-500AW. Designers have offered two color solutions especially for these models — classic white and delicate …

Exclusive models of LCD TVs from Pioneer..Далее …

poisk skritoi opasnosti

Search for hidden danger.

Search for hidden danger. Camille Shieh's article analyzes the problem of detecting chemical, biological, radiological and nuclear substances. The use of weapons of mass destruction, the author notes, can lead to numerous losses, so there is a high need for the use of advanced technical detection equipment. To prevent such a threat, it is necessary …

Search for hidden danger.Далее …

sertificirovano v msuc

Certified by the International Standards Centre.

Certified in MSUC. Certification of equipment from leading manufacturers in the OIT system (equipment, products and technologies for nuclear installations, radiation sources and storage facilities) is becoming a noticeable trend in the TSB market. For example, this year the German company GEUTEBRÜCK became the holder of such a certificate. Moreover, colleagues from Germany certified almost …

Certified by the International Standards Centre.Далее …

metodika ocenki sostoyaniya injenerno

Journal TZ — Methodology for assessing the state of engineering and technical security of objects.

Journal TZ — Methodology for assessing the state of engineering and technical security of objects. Author: Alexander MALTSEV, Technical Director of Intel Tectum, PhD in Engineering When planning capital expenditures on equipping facilities with engineering and technical security equipment, there is always the task of rational spending of material resources. To determine the need to …

Journal TZ — Methodology for assessing the state of engineering and technical security of objects.Далее …

logo11d 4 1

A supplier without technical support is a waste of money.

A supplier without technical support is a waste of money.. Supply of security systems is a kind of art, requiring active maneuvering among competitive offers and hard work to create and maintain your own reputation, trust of manufacturers and development of clients. Although we will not dissemble — the same picture is in other areas …

A supplier without technical support is a waste of money.Далее …

tonkosti primeneniya sistemi dalnei identifikacii

Subtleties of using a long-range identification system.

Subtleties of using a long-range identification system. We have recently covered some applications of long-range identification systems at sites, in particular for monitoring parking lots, access to premises and entry to parking lots. Today we will look at some more aspects of long-range identification applications using PR-G07 readers, manufactured under the Parsec brand. Standard Problems… …

Subtleties of using a long-range identification system.Далее …

Strengths of combining BACnet and KNX.

Strengths of combining BACnet and KNX. Strengths of combining BACnet and KNX Strengths of combining BACnet and KNX Richard Staub (Richard Staub),BUS-House Recently, we have increasingly seen the process of combining various protocols in the implementation of projects. One such example of cooperation is the St. Olavs University Hospital under construction at the University of …

Strengths of combining BACnet and KNX.Далее …

logo11d 4 1

B2b according to Kotler, or Biometric system for Kamenskaya.

b2b according to Kotler, or a Biometric System for Kamenskaya. Float like a butterfly and sting like a bee Mohammed Ali Advertising for washing powder, yoghurts, sanitary pads and beer (despite all the obstacles and restrictions on the advertising activity of manufacturers of one of the most popular drinks) has occupied wide and other screens …

B2b according to Kotler, or Biometric system for Kamenskaya.Далее …

Marketing communications of the security market in figures. Part 2.

Marketing communications of the security market in figures. Part 2. The first part, “Marketing communications of the security market in figures” (TZ No. 4-2009), presented data characterizing advertising in the technical security equipment market as a whole. This is the volume of advertising for 2008, the distribution of investments between communication means, such as special …

Marketing communications of the security market in figures. Part 2.Далее …

menedjeri po prodajam sistem bezopasnosti mifi i realnost

Security systems sales managers: myths and reality of modern requirements.

Sales managers of security systems: myths and reality of modern requirements. Regardless of whether your company's sales managers are focused on actively searching for clients or on working with «incoming requests» and an existing client base, carefully and painstakingly nurtured by an active marketing strategy and marketers, they interact with potential or existing clients every …

Security systems sales managers: myths and reality of modern requirements.Далее …

metodika ocenki kvalifikacii personala slujb bezopasnosti

Journal TZ — Methodology for assessing the qualifications of security service personnel.

Journal TZ — Methodology for assessing the qualifications of security personnel. Author: Alexander MALTSEV, Technical Director of Intel Tectum, PhD in Engineering The tasks of assessing the qualification level of security personnel (divisions), including specialists in engineering and technical security means (ITSM), arise when forming plans for training and retraining employees, conducting employee certification, and …

Journal TZ — Methodology for assessing the qualifications of security service personnel.Далее …

tattoo id sravnenie tatuirovok dlya identifikacii lichnos

Tattoo-ID: comparison of tattoos for personal identification.

Tattoo-ID: comparing tattoos for personal identification. A researcher from Michigan State University has developed an automatic image search and identification system that allows law enforcement agencies to compare scars, birthmarks, and tattoos to identify suspects and victims of crimes.“Traditionally, people identify themselves using passports, licenses, or personal identification numbers, but there are concerns about the …

Tattoo-ID: comparison of tattoos for personal identification.Далее …

Consulting in the TSB market. Article updated in 2023.

Consulting in the TSB market Two opinions on the current problem of the technical security equipment market We'll see Alexander Zhukov — expert In the classical sense, consulting means professional consulting in a particular area. Of course, each market segment has its own specific features of this activity. In our case, i.e. in the market …

Consulting in the TSB market. Article updated in 2023.Далее …

uchitsya uchitsya i uchitsya

Study, study and study…

Study, study and study…. An analysis of the existing European market of technical security equipment shows that there is no problem with exporting Russian-made products as such. Because the volume of these exports is extremely small. Attempts by individual Russian companies, including ours, to sell something abroad change the overall picture very little. No one …

Study, study and study…Далее …

bivayut li oshibki pri provedenii meropriyatii napravlenn

Are there any errors when carrying out activities aimed at monitoring security activities?

Are there any errors in carrying out activities aimed at monitoring security activities? Are there any errors in carrying out activities aimed at monitoring security activities? Are there any errors in carrying out activities aimed at monitoring security activities? Security activity control The Internal Affairs Directorate is empowered to carry out control activities. However, as …

Are there any errors when carrying out activities aimed at monitoring security activities?Далее …

chto predstavlyaet soboi shtatnaya struktura mvd v rossii

What is the staffing structure of the Ministry of Internal Affairs in Russia?

What is the staffing structure of the Ministry of Internal Affairs in Russia? Let's consider the changes that have occurred in the structure of the internal affairs bodies of the Russian Federation using the example of the structural framework of this government agency. Since changes have occurred not only in the sphere of practical activity, …

What is the staffing structure of the Ministry of Internal Affairs in Russia?Далее …

konkurentnaya razvedka v biznese belie nachinayut i viigr

Competitive Intelligence in Business. «Whites Start and Win!»

Competitive intelligence in business. «Whites start and win!» Competitive intelligence in business. «Whites start and win!» Competitive intelligence in business. «Whites start and win!» For business, information possession is one of the key factors of its success. Prompt information can have a dramatic impact on management and strategic decision-making. Intelligence is as old as the …

Competitive Intelligence in Business. «Whites Start and Win!»Далее …

k voprosu o motivacii sotrudnikov slujbi bezopasnosti gip

On the issue of motivation of security service employees of hypermarkets.

On the issue of motivating employees of the security service of hypermarkets. On the issue of motivating employees of the security service of hypermarkets On the issue of motivating employees of the security service of hypermarkets.   In this article, I would like to touch upon the issue of motivating employees of the security service …

On the issue of motivation of security service employees of hypermarkets.Далее …

logo11d 4 1

Planning the work of the security service department of a trading enterprise.

Planning the work of the security service unit of a trading enterprise. Planning the work of the security service unit of a trading enterprise Planning the work of the security service unit of a trading enterprise. The organization of work of any structural division of a trading enterprise, to ensure maximum efficiency of its functioning, …

Planning the work of the security service department of a trading enterprise.Далее …

Security guard rights.

What is allowed for a private security company employee. Dear readers, please note that private detective and security activities are regulated by the law «On private detective and security activities in the Russian Federation» and the order of the Ministry of Internal Affairs of Russia «On approval of the instructions on the organization of work …

Security guard rights.Далее …

Psychological preparation.

Psychological preparation. Psychological preparation. Psychological preparation. Nothing can be taught — everything can be learned. At the end of last year, it was considered good form in the media to badmouth Gennady Malakhov. But it's not that he was suggesting stupid things — the fact is that such a lifestyle, means and methods of treatment, …

Psychological preparation.Далее …

Psychology of influence on people.

Psychology of influencing people. Psychology of influencing people Psychology of influencing people From early childhood, we are all exposed to stereotypes (psychological principles), and they haunt us throughout our lives. Each such principle can be discovered and used as a tool for automatic influence on people. Here are described the principles of psychological influence on …

Psychology of influence on people.Далее …

sistema kontrolya kommercheskogo transporta v rossiiskoi

Commercial transport control system in the Russian Federation.

Commercial transport control system in the Russian Federation. Commercial transport control system in the Russian Federation Commercial transport control system in the Russian Federation It is recognized that the main cause of such accidents is the human factor, associated with violations of traffic rules and the work and rest regime of drivers. As a means …

Commercial transport control system in the Russian Federation.Далее …

biometricheskie zamki

Biometric locks — a new generation of security guard.

Biometric locks — a new generation security guard. Biometric locks — a new generation security guard Biometric locks — new generation security guard Biometric locksBiometric locks– these are new generation access control systems. The process of opening and closing the lock is carried out by placing a finger on the optical sensor, then the sensor …

Biometric locks — a new generation of security guard.Далее …

Coordinate, digital and wireless intercoms and their features.

Coordinate, digital and wireless intercoms and their features. Coordinate, digital and wireless intercoms and their features Coordinate, digital and wireless intercoms and their features Coordinate intercoms Coordinate intercomsare the most common type of access control system equipment. The operation of such intercoms is based on the principle of switching coordinate-matrix systems. When installed, coordinate intercoms …

Coordinate, digital and wireless intercoms and their features.Далее …

otpugivayushee osveshenie

Repellent lighting.

Repellent lighting. Repellent lighting Deterrent lighting Lighting devices are an effective addition to mechanical protection. Their use has a deterrent effect on burglars. Nothing makes a burglar feel more insecure than the danger of being seen at work. Lighting devices, correctly positioned in the area adjacent to the house and especially in «critical places», in …

Repellent lighting.Далее …

ponyatie kraji v otechestvennoi kriminalistike

The concept of theft in domestic forensics.

The concept of theft in domestic forensics. Forensics — definition: The very definition of forensicsas a science is based on several main points: development of a system of special techniques, methods and means of collecting, examining and evaluating forensic evidence; their application in criminal proceedings for the prevention, detection and investigation of crimes; their use …

The concept of theft in domestic forensics.Далее …

zamki dlya seifov

Locks for safes.

Safe locks. Safe locks Safe locks The burglar resistance of a safe is ensured by four types of locks known today. Safe locks are key, mechanical combination locks of different configurations, electronic locks and biometric locks. Let's start with key locks: cylinder-type key locks can be pin and frame. Safe locks key locks for opening …

Locks for safes.Далее …

logo11d 4 1

European standard for protective fog comes into force.

European standard for protective fog comes into effect. European standard for protective fog comes into effect. European standard for protective fog comes into effect. The thief is only two steps away from the treasured box, when suddenly… The room instantly fills with thick smoke, everything disappears in it, including the goal that seemed so close. …

European standard for protective fog comes into force.Далее …

kratkii obzor nomernix plombirovochnix izdelii indikatoro

A brief overview of numbered sealing products-access control indicators.

Brief overview of numbered sealing products-access control indicators. Brief overview of numbered sealing products-access control indicators. Brief overview of numbered sealing products-access control indicators. Most likely, everyone in their life and work faced problems of theft, pilferage, «mistakes» of employees, problems with customers and suppliers related to the «loss» of goods from closed containers, packaging …

A brief overview of numbered sealing products-access control indicators.Далее …

kvalifikaciya kraji v uk rf

Qualification of theft in the Criminal Code of the Russian Federation.

Theft qualification in the Criminal Code of the Russian Federation. Theft qualification in the Criminal Code of the Russian Federation Theft qualification in the Criminal Code of the Russian Federation Clause 1 of Article 158 of the Criminal Code of the Russian Federation provides the following definition of the concept of «theft» — secret theft …

Qualification of theft in the Criminal Code of the Russian Federation.Далее …

logo11d 4 1

Several examples of the use of indicator seals to prevent theft.

Several examples of using indicator seals to prevent theft. Several examples of using indicator seals to prevent theft. Several examples of using indicator seals to prevent theft. Huge amounts to be written off for «Shrinkage» and «Depreciation» of goods and products — as a result of problems with theft from warehouses and during transportation? World …

Several examples of the use of indicator seals to prevent theft.Далее …

rossiiskoe zakonodatelstvo o protivodeistvii terrorizmu

Russian legislation on countering terrorism.

Russian legislation on counteracting terrorism. Russian legislation on counteracting terrorism Russian legislation on counteracting terrorism Law on Combating Terrorismdefines terrorism as the commission of an explosion, arson or other actions that create a danger of loss of life, significant property damage or the occurrence of other socially dangerous consequences, if these actions are committed with …

Russian legislation on countering terrorism.Далее …

aspekti proektirovaniya i vnedreniya sistem kontrolya i u

Aspects of design and implementation of access control and management systems (ACS).

Aspects of design and implementation of access control and management systems ACS. At present, access control and management systems (ACS) are an integral part of the comprehensive security system of enterprises and organizations. The access subject (employee, visitor) must present some access identifier when accessing the facility (protected area, premises) for identification. The ACS, based …

Aspects of design and implementation of access control and management systems (ACS).Далее …

logo11d 4 1

Housing Code and personal data. Expert commentary.

Housing Code and personal data. Expert commentary. Housing Code and personal data. Expert commentary Housing Code and personal data. Expert commentary Part 2 of Article 6 of Federal Law No. 152 has been amended and supplemented with a new clause with the following content: «5.1) the processing of personal data is necessary for management organizations, …

Housing Code and personal data. Expert commentary.Далее …

kak ne stat jertvoi priznaki proslushki mobilnogo

How to avoid becoming a victim: signs of mobile phone wiretapping.

How not to become a victim: signs of mobile phone wiretapping. How not to become a victim: signs of mobile phone wiretapping. How not to become a victim: signs of mobile phone wiretapping. Mobile phone wiretapping. Protection of information rights assumes that wiretapping a mobile phone without the owner’s permission is illegal. There are several …

How to avoid becoming a victim: signs of mobile phone wiretapping.Далее …

model informacionnoi bezopasnosti

Information security model.

Information security model. Information security model Information security model In order to protect users from unauthorized intrusion and theft of information resources and confidential data, specialists have developed an information security model. The basis of the model is based on the fact that a modern information system is a complex multi-level mechanism, which consists of …

Information security model.Далее …

osnovi i principi avtorskogo prava segodnya

Fundamentals and principles of copyright today.

Fundamentals and principles of copyright today. Fundamentals and principles of copyright today Fundamentals and principles of copyright today Principles of copyrightTo define the concept, let us turn to the interpretation of the principles of copyrightin modern regulatory documents. Thus, copyright is usually understood as a set of norms of civil and other branches of law …

Fundamentals and principles of copyright today.Далее …

A unique method of depersonalizing personal data.

A unique method of depersonalizing personal data. A unique method of depersonalizing personal data. A unique method of depersonalizing personal data. According to the definition given in the Federal Law «On Personal Data» dated 26.07.2006 No. 152, depersonalization is a method of processing PD, as a result of which it is impossible to identify the …

A unique method of depersonalizing personal data.Далее …

Protection of information rights. Regulatory aspect.

Protection of information rights. Regulatory aspect. Protection of information rights. Regulatory aspect Protection of information rights. Regulatory aspect The main modern source of information is the Internet. Information resources of the World Wide Web include information in the form of electronic documents of various types — text, audio and video materials, graphic objects, databases, programs, …

Protection of information rights. Regulatory aspect.Далее …

zashita ot nesankcionirovannogo dostupa parolnaya sistema 2

PROTECTION FROM UNAUTHORIZED ACCESS. PASSWORD SYSTEM.

PROTECTION AGAINST UNAUTHORIZED ACCESS. PASSWORD SYSTEM. PROTECTION AGAINST UNAUTHORIZED ACCESS. PASSWORD SYSTEM MASYUK Mikhail Igorevich PROTECTION AGAINST UNAUTHORIZED ACCESS. PASSWORD SYSTEM The password system as an integral part of the access control subsystem of the information security system (ISS) is part of the “front line of defense” of the entire security system. Therefore, the password …

PROTECTION FROM UNAUTHORIZED ACCESS. PASSWORD SYSTEM.Далее …

logo11d 4 1

Information protection devices for VHF radio communications. Scramblers.

#Scramblers, #scrambler, #ultrasound Information security devices for VHF radio communications. Ovchinnikov A.M., Lazin A.S. Source: Special Equipment» magazine The article discusses information security devices — scramblers, which can be used in VHF radio communications. Possible principles of their implementation and main parameters are described. Specific models of scramblers are considered and their technical characteristics are …

Information protection devices for VHF radio communications. Scramblers.Далее …

Removal of traces of other phono-objects from a speech signal by decomposing them into microwave elements.

Removing traces of other phono-objects from a speech signal by decomposing them into microwave elements.. Removing traces of other phono-objects from a speech signal by decomposing them into microwave elements. Zhenilo Valery Romanovich, Doctor of Technical Sciences REMOVING TRACES OF OTHER PHONOOBJECTS FROM A SPEECH SIGNAL BY DECOMPOSING THEM INTO MICROWAVE ELEMENTS Source: «Special Technology» …

Removal of traces of other phono-objects from a speech signal by decomposing them into microwave elements.Далее …

Technical support for conducting examination of the authenticity of documents as one of the aspects of economic security. Article updated in 2023.

Technical support for conducting an examination of the authenticity of documents as one of the aspects of economic security. Trukhachev Valery Vladimirovich TECHNICAL SUPPORT FOR CONDUCTING AN EXAMINATION OF THE AUTHENTICITY OF DOCUMENTS AS ONE OF THE ASPECTS OF ECONOMIC SECURITY With the development of economic relations in society and the increase in the technical …

Technical support for conducting examination of the authenticity of documents as one of the aspects of economic security. Article updated in 2023.Далее …

Evaluation of the effectiveness of means of destroying information stored in hard disk drives.

Evaluation of the effectiveness of means of destroying information stored in hard disk drives. Evaluation of the effectiveness of means of destroying information stored in hard disk drives Boborykin Sergey Nikolaevich Ryzhikov Sergey Sergeevich, Candidate of Technical Sciences  ASSESSMENT OF THE EFFICIENCY OF MEANS OF DESTRUCTION OF INFORMATION STORED IN HARD MAGNETIC DISK DRIVES Source: …

Evaluation of the effectiveness of means of destroying information stored in hard disk drives.Далее …

sovremennoe sostoyanie i takticheskie vozmojnosti primene

CURRENT STATE AND TACTICAL POSSIBILITIES OF USING ELECTROMAGNETIC RADIATION INDICATORS.

CURRENT STATE AND TACTICAL CAPABILITIES OF USING ELECTROMAGNETIC RADIATION INDICATORS.. CURRENT STATE AND TACTICAL CAPABILITIES OF USING ELECTROMAGNETIC RADIATION INDICATORS. LOBASHEV Aleksey Konstantinovich, Candidate of Technical Sciences, Associate Professor, LOSEV Lev Sergeevich CURRENT STATE AND TACTICAL POSSIBILITIES OF USING ELECTROMAGNETIC RADIATION INDICATORS Devices designed to detect equipment for unauthorized transmission of information outside the controlled …

CURRENT STATE AND TACTICAL POSSIBILITIES OF USING ELECTROMAGNETIC RADIATION INDICATORS.Далее …

problemi optimizacii processa instrumentalnogo kontrolya

Problems of optimization of the process of instrumental control of information processing equipment.

Problems of optimizing the process of instrumental control of information processing equipment. Problems of optimizing the process of instrumental control of information processing equipment Goryachev Sergey Vyacheslavovich PROBLEMS OF OPTIMIZING THE PROCESS OF INSTRUMENTAL CONTROL OF INFORMATION PROCESSING EQUIPMENT Source: journal «Special Equipment» When determining the possibility of using certain technical means to process information …

Problems of optimization of the process of instrumental control of information processing equipment.Далее …

problemi obnarujeniya i identifikacii radiosignalov sreds

Problems of detection and identification of radio signals of covert information control means.

Problems of detection and identification of radio signals of covert information control means. Problems of detection and identification of radio signals of covert information control means Part 1. Basic requirements for radio signal detection systems Kargashin Viktor Leonidovich Candidate of Technical Sciences Special equipment, No. 3, 2000 Radio frequency signal detection and identification systems are …

Problems of detection and identification of radio signals of covert information control means.Далее …

logo11d 4 1

Problems of active protection of vibroacoustic channels.

Problems of active protection of vibroacoustic channels. Kargashin Viktor Leonidovich, Candidate of Technical Sciences PROBLEMS OF ACTIVE PROTECTION OF VIBRAO-ACOUSTIC CHANNELS Source: magazine «Special Equipment» In recent years, the development of devices for creating vibration and acoustic interference, designed to ensure the protection of speech information from its leakage from premises through building structures and …

Problems of active protection of vibroacoustic channels.Далее …

obespechenie zashiti informacii ot neprednamerennogo vozd

ENSURING THE PROTECTION OF INFORMATION FROM UNINTENDED INFLUENCE BY TECHNICAL MEANS.

ENSURING THE PROTECTION OF INFORMATION FROM UNINTENDED INFLUENCE BY TECHNICAL MEANS. PROTECTING INFORMATION FROM UNINTENDED INFLUENCE BY TECHNICAL MEANS Vakhlakov Valery Rudolfovich PROTECTING INFORMATION FROM UNINTENDED INFLUENCE BY TECHNICAL MEANS In modern conditions, possession of information in various forms of its manifestation is an important advantage. It is for this reason that the problem of …

ENSURING THE PROTECTION OF INFORMATION FROM UNINTENDED INFLUENCE BY TECHNICAL MEANS.Далее …

nsd teoriya i praktika

NSD: THEORY AND PRACTICE. UNAUTHORIZED ACCESS.

#unauthorized access, #NSD NSD: THEORY AND PRACTICE. MASYUK Mikhail Igorevich   Terminology When setting the task of information security, it is necessary to take into account the implementation of a whole range of measures. The components of this complex are protection against unauthorized access (UAA), against leakage via technical channels, against possibly introduced special electronic …

NSD: THEORY AND PRACTICE. UNAUTHORIZED ACCESS.Далее …

New solution for protecting confidential negotiations.

New solution for protecting confidential negotiations. Valery Ivanovich Zolotarev, PhD in Engineering   NEW SOLUTION FOR PROTECTING CONFIDENTIAL NEGOTIATIONS In the information age, the well-known principle applies: whoever owns the information, owns the world. There are more than enough people who want to take over the world in this way, which means there is a …

New solution for protecting confidential negotiations.Далее …

New technology for protecting telephone conversations.

New technology for protecting telephone conversations. New technology for protecting telephone conversations. Doctor of Engineering Sciences, Professor E. I. Abalmazov The need to improve the means of physical protection of telephone conversations from interception follows, as the author claims, from the analysis of modern “telephone” threats and existing countermeasures. In this regard, the capabilities of …

New technology for protecting telephone conversations.Далее …

Methods and means of protecting telephone lines.

Methods and means of protecting telephone lines.. Methods and means of protecting telephone lines. Anatoly Anatolyevich Khorev, Doctor of Technical Sciences METHODS AND MEANS OF PROTECTION OF TELEPHONE LINES   When organizing the protection of telephone lines, it is necessary to take into account several aspects: telephones (even when the receiver is hung up) can …

Methods and means of protecting telephone lines.Далее …

Masking of speech messages based on modern computer technologies.

Masking of speech messages based on modern computer technologies.. Masking of speech messages based on modern computer technologies. Dvoryankin Sergey Vladimirovich, Doctor of Technical Sciences Klochkova Ekaterina Nikolaevna Kaluzhin Roman Vladimirovich MASKING SPEECH MESSAGES BASED ON MODERN COMPUTER TECHNOLOGIES Source: magazine «Special Equipment» In recent years, the protection of confidential voice messages has received increasing …

Masking of speech messages based on modern computer technologies.Далее …

Cryptographic protection of telephone messages.

Cryptographic protection of telephone messages. Igor Vasilievich Sudarev, Doctor of Technical Sciences CRYPTOGRAPHIC PROTECTION OF TELEPHONE MESSAGES Source: «Special Equipment» magazine No. 2, 1998. This article summarizes the methods of cryptographic protection of telephone messages published in the open press and widely used in domestic and foreign practice. In modern conditions, information plays a decisive …

Cryptographic protection of telephone messages.Далее …

avtoregistrator pvdr 0163

Car recorder PVDR-0163.

Car DVR PVDR- 0163. The company «Security Technologies» presents a new product of the Polyvision brand — a single-channel car DVR PVDR-0163 auto (Korea). The device acts as a «black box» in the car — it records everything that happens on video, links the video to the time of shooting, location on the map, speed …

Car recorder PVDR-0163.Далее …

intervyu s generalnim direktorom armor grupp gusarovskim

Interview with the General Director of Armor Group, O.N. Gusarovsky.

Interview with the General Director of «Armor Group» Gusarovsky O.N. Interview with the General Director of «Armor Group» Gusarovsky O.N. Interview with the General Director of «Armor Group» Gusarovsky O.N. — Oleg Nikolaevich, you head one of the largest armored vehicle manufacturing companies in Russia – Armor Group. Please tell us about the specifics of …

Interview with the General Director of Armor Group, O.N. Gusarovsky.Далее …

ustroistvo immobilaizera

Immobilizer device.

Immobilizer device. Immobilizer device Immobilizer device It is no secret that not everyone will dare to leave their car unattended for a long time today. More precisely, almost all car owners have to do this, because such is the rhythm of life. But the anxiety does not go away: such a number of thefts committed …

Immobilizer device.Далее …

Modern technologies for transport control and enterprise fleet management.

Modern technologies for transport control and enterprise fleet management. Modern technologies for transport control and enterprise fleet management. Modern technologies for transport control and enterprise fleet management GPS/GLONASS transport monitoring. Any organization with its own vehicle fleet has problems with “left” trips, fuel theft, unauthorized downtime, and the use of equipment for personal purposes. All …

Modern technologies for transport control and enterprise fleet management.Далее …

What is good about a satellite security system?

What is good about a satellite security system. What is good about a satellite security system. What is good about a satellite security system. Satellite security systemWhen talking about an integrated approach to security today, a number of requirements are put forward: relative ease of installation and use, durability, reliability, wide functionality. It is safe …

What is good about a satellite security system?Далее …

osnovi funkcionirovaniya sistemi navigacii gps

Basics of the functioning of the GPS navigation system.

Basics of the GPS navigation system. Basics of the GPS navigation system. Basics of the GPS navigation system. The abbreviation GPS stands for Global Positioning System. GPS navigation systemsare based on the technology of receiving signals from satellites. In this case, the distance between the satellite at the time of emission and the object receiving …

Basics of the functioning of the GPS navigation system.Далее …

peredacha radiosignala

Transmission of radio signal.

Radio signal transmission. Radio signal transmission Radio signal transmission Radio signals, which are the basis, in particular, of satellite communications and other types of communications, are electromagnetic waves. The communication system uses various types of radio signals to transmit information through the air from one point to another. Radio signal transmissionThe radio signal is transmitted …

Transmission of radio signal.Далее …

princip raboti sputnikovoi sistemi

The principle of operation of the satellite system.

The principle of operation of the satellite system. The principle of operation of the satellite system The principle of operation of the satellite system It is believed that satellite navigation appeared on October 4, 1957 — then the first artificial Earth satellite was launched. The first satellite radio navigation system, which allows determining the coordinates …

The principle of operation of the satellite system.Далее …

sputnikovii monitoring transporta kontrol i optimizaciya

Satellite monitoring of transport: control and optimization.

Satellite monitoring of transport: control and optimization. Satellite monitoring of transport: control and optimization. Satellite monitoring of transport: control and optimization. Satellite monitoring of transport belongs to the category of satellite monitoring and control systems for mobile objects based on satellite navigation systems, equipment and technologies for cellular or radio communications, computing equipment and digital …

Satellite monitoring of transport: control and optimization.Далее …

logo11d 4 1

Application of satellite radio navigation methods.

Application of satellite radio navigation methods.. Application of satellite radio navigation methods. Petrov Nikolay Nikolaevich, Candidate of Technical Sciences APPLICATION OF SATELLITE RADIONAVIGATION METHODSFOR THE CREATION OF SYSTEMS AND COMPLEXES OF TECHNICAL MEANS FOR LOCATION OF MOBILE OBJECTS. Application of satellite radio navigation methods for the creation of systems and complexes of technical means for …

Application of satellite radio navigation methods.Далее …

logo11d 4 1

Positioning of moving objects based on satellite navigation systems.

Location of moving objects based on satellite navigation systems.. Location of moving objects based on satellite navigation systems. Petrov Nikolay Nikolaevich, Candidate of Technical Sciences LOCATION OF MOBILE OBJECTS BASED ON SATELLITE NAVIGATION SYSTEMS This article continues a series of articles devoted to positioning systems and their use to ensure the safety of mobile objects. …

Positioning of moving objects based on satellite navigation systems.Далее …

logo11d 4 1

Batteries for mobile devices and portable appliances. Condition assessment.

#Batteries for mobile devices Batteries for mobile devices and portable devices. Condition assessment. VASILIEV Vladimir Yuryevich It is no secret that the trouble-free operation of mobile devices or devices with backup (or uninterruptible) power supply directly depends on the condition of their batteries. In this regard, the correct and timely determination of the actual characteristics …

Batteries for mobile devices and portable appliances. Condition assessment.Далее …

logo11d 4 1

Batteries. History, technology, reality.

#Battery Batteries. History, technology, reality. Vasiliev Vladimir Yuryevich Petrov Nikolay Nikolaevich, Candidate of Technical Sciences The article attempts to present information about batteries currently used in radio engineering equipment in a concise form. The article is of a review nature and is intended for readers of our magazine working with batteries. All materials used are …

Batteries. History, technology, reality.Далее …

aktivnaya zashita v vibroakusticheskix kanalax e1714751112370

Active protection in vibroacoustic channels.

Requirements for interference generating equipment. In recent years, the development of devices for creating vibration and acoustic interference designed to ensure the protection of speech information from its leakage from premises through building structures and engineering communications has been intensively developing. The following should be noted as reasons that force developers of special equipment to …

Active protection in vibroacoustic channels.Далее …

analizatori spektra

Spectrum analyzer.

Spectrum Analyzers. A good spectrum analyzer is the “workhorse” of the TSCM industry and, when combined with a computer, printer, and vector signal analyzer, will detect any RF eavesdropping devices (including those used by the FBI, NSA, CIA, MI5, etc.)   Hewlett Packard HP 71910A/P Wideband Receiver and Vector Signal Analyzer The HP 89410A is …

Spectrum analyzer.Далее …

analiz sushestvuyushix normativno texnicheskix i metodich e1715433342323

Analysis of existing regulatory, technical and methodological documents in terms of ensuring the reliability of communication facilities.

Analysis of existing regulatory, technical and methodological documents in terms of ensuring the reliability of communication facilities. An analysis of existing regulatory, technical and methodological documents in terms of ensuring the reliability of communication facilities is provided. It is shown that the current and newly developed international, interstate military standards of the SRPPVT, SNT, SNVT, …

Analysis of existing regulatory, technical and methodological documents in terms of ensuring the reliability of communication facilities.Далее …

analiz versii vzrivov

Analysis of explosion versions. Domestic explosion or terrorist act?

Analysis of the versions of the explosions. «We live in conditions of the threatening spread of terrorism. And this means — it is necessary to unite all the forces of society and the state to repel the internal enemy. This enemy has no conscience, pity and honor. No face, nationality and faith.» (from the televised …

Analysis of explosion versions. Domestic explosion or terrorist act?Далее …

analiz vozmojnostei predotvrasheniya utechki informacii x e1715435514664

Analysis of the possibilities of preventing leakage of information stored on hard drives.

Analysis of the possibilities of preventing leakage of information stored on hard drives. 1. Introduction The total computerization of the infrastructure of industrialized countries has currently led to the rapid development of technical intelligence tools (TIS), allowing the extraction of confidential information from computers and computer networks. The prospects of this direction are determined by …

Analysis of the possibilities of preventing leakage of information stored on hard drives.Далее …

analiz zashishennosti setei atm e1715435939210

Analysis of ATM network security.

Analysis of ATM network security. The article provides an analysis of information security issues in data transmission networks built on the basis of technical means of ATM technology, taking into account the features of the interaction of various types of equipment and the architecture of the protocols used. Introduction The telecommunications and communication market offers …

Analysis of ATM network security.Далее …

analogovaya sotovaya sistema podvijnoi radiosvyazi standa

Analog cellular mobile radio communication system of AMPS standards.

Analog cellular system of mobile radio communication of AMPS standards. ANALOG CELLULAR SYSTEM OF MOBILE RADIO COMMUNICATION EMX-2500 BY MOTOROLA FOR AMPS, TAGS, E-TACS, J-TACS STANDARDS 5.1 Structural diagram of the EMX-2500 CCPS The EMX-2500 is a fully automatic analog cellular radiotelephone system. The system consists of hardware and software components for fixed and mobile …

Analog cellular mobile radio communication system of AMPS standards.Далее …

antenno kontaktnii metod obnarujeniya lokalnix obektov v e1715438312825

Antenna-contact method for detecting local objects in concealing environments.

Antenna-contact method for detecting local objects in sheltering environments. A new method for detecting local objects in a semiconducting medium is proposed. The essence of the method is to use the search object as a transmitting antenna. The method allows, with a single contact with the search object, to determine its geometric dimensions and electrical …

Antenna-contact method for detecting local objects in concealing environments.Далее …

apparatura povisheniya razborchivosti

Intelligence enhancing equipment.

Intelligibility enhancement equipment. Intelligibility enhancement equipment. Intelligibility enhancement equipment.   General Provisions. During the process of receiving and recording audio information, interference and noise may occur due to various reasons: street noise, rain, noise and interference from various electrical household and industrial devices, music, etc. The main means for cleaning audio information from the above-mentioned …

Intelligence enhancing equipment.Далее …

apparaturnie sredstva proverki podlinnosti dokumentov na

Hardware for verifying the authenticity of documents based on the optical method of non-destructive testing.

Hardware for verifying the authenticity of documents based on the optical method of non-destructive testing.   KEKIN Aleksey Gennadievich, KOVALEV Aleksey Alekseevich, KOVALEV Dmitry Alekseevich, STUDITSKY Aleksandr Sergeevich, FEDOTOV Aleksey Vladimirovich, KHNYKOV Yury Alekseevich The problem of determining the authenticity of documents arose simultaneously with their appearance. As for counterfeiters, they have always been there. …

Hardware for verifying the authenticity of documents based on the optical method of non-destructive testing.Далее …

logo11d 4 1

Automated systems. Protection from unauthorized access to information.

AUTOMATED SYSTEMS PROTECTION AGAINST UNAUTHORIZED ACCESS TO INFORMATION CLASSIFICATION OF AUTOMATED SYSTEMS AND REQUIREMENTS FOR INFORMATION PROTECTION This guideline document establishes the classification of automated systems subject to protection against unauthorized access to information, and requirements for information protection in AS of various classes. The guideline document has been developed in addition to GOST 34.003-90, …

Automated systems. Protection from unauthorized access to information.Далее …

logo11d 4 1

Autonomous power supply for miniature electronic equipment.

Autonomous power supply of miniature radio-electronic equipment. Nizhnikovsky Evgeny Aleksandrovich, candidate of chemical sciences, Serdyukov Petr Nikolaevich, doctor of technical sciences AUTONOMOUS POWER SUPPLY OF MINIATURE RADIO-ELECTRONIC EQUIPMENT The operation of most types of special-purpose radio-electronic equipment (REA) is impossible without modern, highly efficient and reliable power sources. Autonomous power supply of REA is provided …

Autonomous power supply for miniature electronic equipment.Далее …

ayaks 8 portativnaya fotokamera

Ajax-8 is a portable camera.

Ayaks-8 — portable photo camera. The first Soviet portable photo camera «Ayaks-8» was designed in 1948 in a special photo-optical laboratory of the MGB in Moscow for covert photography of objects «of operational interest», primarily people and their actions. Considering the post-war devastation and the acute shortage of developers and designers, this was an event …

Ajax-8 is a portable camera.Далее …

logo11d 4 1

Federal Bureau of Investigation electronic imaging database.

The Federal Bureau of Investigation's Electronic Image Database. Law Enforcement Technology.- 1996.- November.- P. 56 57. Even before the 1996 Summer Olympics in Atlanta, more than 15,000 color photographs were taken of the venues. But, unlike photographs published in newspapers and magazines, these photographs documenting the progress of the Olympic Games were never available to …

Federal Bureau of Investigation electronic imaging database.Далее …

Мы используем cookie-файлы для наилучшего представления нашего сайта. Продолжая использовать этот сайт, вы соглашаетесь с использованием cookie-файлов.
Принять