Sfitex. The meeting place cannot be changed.
Sfitex. The meeting place cannot be changed. For many years now, leading security experts have been gathering in St. Petersburg in the fall. Their meeting place is traditionally the exhibition…
Zelenograd streets will be illuminated by the latest energy-saving LEDs.
The article «Saving on a Light Bulb», published in «Vedomosti», is dedicated to the innovative technologies of the company «TSERS», which develops LED lighting equipment and recently became a resident…
The success of the QNX Technology Day confirmed the interest of the Russian IT community in the latest QNX RTOS technologies.
The success of the «QNX Technology Day» confirmed the interest of the Russian IT community in the latest QNX RTOS technologies. The success of the «QNX Technology Day» confirmed the…
From July 1, the construction industry will switch from a licensing system to self-regulation.
From July 1, the construction industry switches from the licensing system to self-regulation. From July 1, the construction industry switches from the licensing system to self-regulation From July 1, the…
SystemGroup has implemented an innovative solution, “Queue Killer,” in the KARAVAN hypermarket.
SystemGroup has implemented an innovative solution, «Queue Killer,» in the KARAVAN hypermarket. SystemGroup has implemented an innovative solution, «Queue Killer,» in the KARAVAN hypermarket. SystemGroup has implemented an innovative solution,…
Recession or restructuring? The crisis creates conditions for strengthening the positions of Russian companies working in the high-tech sector.
Recession or Perestroika? The crisis creates conditions for strengthening the positions of Russian companies operating in the field of high technology. Recession or Perestroika? The crisis creates conditions for strengthening…
Professionals unite
Professionals Unite Since January 1, 2010, the only permit for an organization to operate in the construction industry is a certificate of admission issued by a self-regulatory organization. By this…
MIRAX GROUP and Jones Lang LaSalle have signed a cooperation agreement.
MIRAX GROUP and Jones Lang LaSalle have signed a cooperation agreement. According to the agreement signed by the parties for a period of three years, Jones Lang LaSalle specialists will…
KNX has gone international.
KNX has become an international standard: ISO/IEC 14543-3 KNX is a globally recognized INTERNATIONAL STANDARD for home networks and building management. KNX has already proven its compliance with the requirements…
Excursion to the Federation Moscow City complex.
Excursion to the Federation Complex Moscow City. On November 14, 2006, MIRAX GROUP organized an exclusive excursion for the BIG-RU association to the towers of the Federation complex under construction.…
ARMO-Group demonstrated the benefits of building automation.
«ARMO-Group» demonstrated the benefits of building automation. The company «ARMO-Group» took part in the 7th International Exhibition HI-TECH BUILDING & House, dedicated to modern technologies for equipping, automating and operating…
A new stage in the development of system integration: “system master – integrator”.
A new stage in the development of system integration: «system master — integrator». The development of today's open systems market is leading to a dramatic change in business relations in…
YORK Johnson Controls: Automation of high-rise refrigeration systems.
YORK Johnson Controls: Automation of high-rise refrigeration. YORK Johnson Controls has its own special examples of the implementation of automated control systems for the refrigeration of high-rise buildings. In accordance…
Implementation of “Intelligent Building” class solutions during reconstruction of buildings and structures.
Implementation of “Intelligent Building” class solutions during reconstruction of buildings and structures. Today, when large cities in Russia are experiencing an upswing in construction production, the condition of a significant…
Technical and economic assessment of “Intelligent building” class solutions for reconstruction of buildings and structures.
Technical and economic assessment of solutions of the “Intelligent Building” class in the reconstruction of buildings and structures. Technical and economic assessment of the effectiveness of the application of specific…
A fresh look at building automation and air filtration.
A fresh look at building automation and air filtration. Ken Bloom, President, Precision Air Technology, Inc. The issue of regular replacement of air filters is not exclusive to any modern…
Disposer or how to grind everything into powder.
Disposer or how to wipe everything into dust. Most of the problems in our lives arise from garbage: the one in our heads prevents us from adequately perceiving the world…
Payback periods for energy-saving equipment.
Payback periods for energy-saving equipment. The practice of using energy-saving equipment, namely frequency converters, which are used to change the performance of fans, pumps, compressors, shows that this type of…
NRG Systems Energy Efficiency System – LEED Gold Certified for Industrial Buildings.
NRG Systems Energy Saving System – LEED Gold Certified in Industrial Building Construction. Joy Null, Director of Public Relations, Watt Stopper/Legrand June 2007, Santa Clara (USA, California). NRG Systems, headquartered…
Automation system for the residential complex «Blizhnyaya Dacha».
Automation system of the residential complex «Blizhnyaya Dacha». Author: Zakharov N.S. Leading specialist in air conditioning systems, Moscow representative office of Mitsubishi Electric In the spring of 2006, the residential…
The greenest skyscraper in New York.
The greenest skyscraper in New York. The owner of the skyscraper, Douglas Durst, and the chief architect, Robert Fox, hope that their building will become the most environmentally friendly in…
Building automation systems market in the USA.
The building automation systems market in the USA. The company «BCS Partners» recently published an analysis of the North American building automation systems (BAS) market («BCS/2006: The Building Control Systems…
NEXA Software by Citect
NEXA software from Citect Citect has been a software supplier and successful player in the market of automation of buildings, infrastructure facilities, housing and utilities for over 30 years. To…
LEED Program: Models and Reality.
LEED Program: Models and Reality. Assessing the Effectiveness of Water and Energy Consumption Reduction Measures in 11 New Buildings in the Pacific Northwest. Cathy Turner New Buildings Institute Inc., Washington,…
Selling fear.
Selling fear. Service engineering is one of the few professional fields of activity where, as a tool for increasing revenue for service providers, it is possible to use the client's…
BACnet Practical Workshop – New Possibilities for Building Automation.
BACnet Practical Seminar – New Possibilities for Building Automation. When: May 15, 2007 Where: St. Petersburg, North-West RF Exhibition Center (building of the Research Institute «Electronstandart», pl. Pobedy, 2 (metro…
Apartment heat metering: problems and solutions.
Apartment-by-apartment heat metering: problems and solutions. Introduction Yu. Luzhkov: Muscovites are too wasteful in consuming energy resources. (Prime-TASS). Muscovites are excessively wasteful in consuming energy resources, according to Moscow Mayor…
Training of specialists in the field of automation of buildings and structures at MGSU: history and development prospects.
Training of specialists in the field of automation of buildings and structures at MGSU: history and development prospects. The history of training engineering personnel in the automation of buildings and…
What do customers want?
From the editors You've probably already guessed that the topic of the March issue of our newsletter is «What do customers want?». This question has intrigued us for a long…
Heating and ventilation of cottages.
Heating and ventilation of cottages. Recently, the idea of multifunctionality has been extended to all inventions, and at the moment there are already enough ways to combine all the functions…
Basics of warehouse operations using the latest WI-FI technologies.
To optimize work in a warehouse, it is necessary to automate it and establish a certain system of movement of goods in it. A warehouse is one of the most…
Not savings, but profit.
Not savings, but profit. Paul Ehrlich, an information systems consultant, presented a number of figures at his Building Intelligence Tour Seminar at the ASHRAE Winter Convention that can help building…
Multifunctional complexes today: a problem, a necessity or an inevitability?
Multifunctional complexes today: a problem, a necessity or an inevitability?. Multifunctional complexes today: a problem, a necessity or an inevitability? Multifunctional complexes today: a problem, a necessity or an inevitability?…
Maximum monitoring capabilities.
Maximum monitoring capabilities. Maximum monitoring capabilities Maximum monitoring capabilities First, answer the test question: «Which of the following options best describes the frequency with which you use your energy monitoring…
Leonid Nikolaev. Hotels need intelligence.
Hotels need intelligence The correspondent met with Leonid Nikolaev, First Vice President of JSC GAO MOSCOW, an organization authorized by the capital's government to coordinate work and conduct monitoring within…
Integrated dispatching system for engineering systems of the Avtoframos plant.
Integrated dispatching system for engineering systems of the Avtoframos plant. Integrated dispatching system for engineering systems of the Avtoframos plant Integrated dispatching system for engineering systems of the Avtoframos plant…
How to organize a “breathing” office.
How to organize a “breathing” office. How to organize a “breathing” office How to organize a “breathing” office City dwellers spend at least a third of their lives in the…
Intelligent buildings – from practice to theory.
Intelligent buildings — from practice to theory. Author: Volkov A.A. Doctor of Engineering Sciences, Professor, Dean of the Faculty of ISTAS MGSU The article continues a series of publications presenting…
Intelligent systems for modern operation.
Intelligent systems. Author: L.N. Makeev, Leading Specialist of the Automation and Dispatching Department of JSC NPO SEM The Automation and Dispatching Department of JSC NPO SEM (DAD) has completed another…
Integrated solutions based on BACnet and KNX protocols.
Solutions based on BACnet and KNX protocols. Neues Kranzler Eck (Berlin, Germany) The Neues Kranzler Eck office centre with an office area of 45,000 square metres offers space for 1,800…
Engineering systems of a sports and recreation complex.
Engineering systems of the sports & health complex. Engineering systems of the sports & health complex. Engineering systems of the sports & health complex. health complex Since 1992, the engineering…
Hotels and hotel business.
Marina Smirnova is the Deputy Director of the Consulting Department, Head of the Hotel Consulting Group at Colliers International. About the company: Colliers International is an international consulting company providing…
Homeostat of buildings and structures.
Author: Volkov A.A.Doctor of Engineering Sciences, Professor, Dean of the Faculty of ISTAS MGSU This article continues a series of publications presenting the fundamentals of the promising science of designing…
Functional management of buildings.
Functional management of buildings. This article continues a series of publications presenting the fundamentals of promising applied science for designing “intelligent” buildings, directly aimed at eliminating the existing methodological gap…
Once again about skyscrapers.
A little about skyscrapers. They talk and write a lot now about the fact that in our climate conditions, and especially in the absence of experienced specialists in Russia, it…
Once again about the convergence of IP and IT.
Anto Budjarjo, President and CEO of Clasma Events Inc There is a lot of talk these days about the convergence of information technology (IT) and building automation systems. When I…
Saving on household expenses.
Five years ago, utility bills were annoying because you had to fill out a lot of receipts, although the bills themselves were pennies. Now they send us ready-made receipts, but…
Gesis component system for electrical installations in buildings and structures.
Gesis component system for electrical installation in buildings and structures. Gesis component system for electrical installation in buildings and structures Gesis component system for electrical installation in buildings and structures…
What is an Intelligent Building?
Andrey Golovin, Editor-in-Chief Dear readers! You are holding in your hands the first issue of the bulletin «Automation of Buildings in Russia», established and prepared by the BIG-RU Building Automation…
The battle for heat in light of building automation.
The battle for heat in the light of building automation.. The battle for heat in the light of building automation. The battle for heat in the light of building automation.…
Biometrics in fitness clubs: visitors value safety and comfort.
Biometrics in fitness clubs: visitors value safety and comfort. Biometrics in fitness clubs: visitors value safety and comfort Biometrics in fitness clubs: visitors value safety and comfort Metalink and BioLink…
Bill Clinton: $5 billion for building energy efficiency.
The goal of the program is to reduce energy consumption in existing buildings. The program's partners were: The American Society of Engineers ASHRAE, the United States Green Building Council (USGBC).…
Automation of high-rise buildings.
Automation of high-rise buildings. The topic of the October issue is high-rise buildings. We deliberately chose it, realizing that today this is a TOP-direction and the materials will be of…
Automation of shopping and shopping and entertainment centers.
Automation of shopping centers and shopping and entertainment complexes. Automation and control systems in shopping and entertainment centers, as a rule, have a standard set of subsystems: automation of heating,…
Automation of school building.
School automation. Caroline Cadieux Marketing Manager Distech Controls, Inc. American high school wins Energy efficiency award Situation analysis Connolly High School, located in Tempe, Arizona (USA), won the Governor's Award…
Automation is the only way to create an effective management system
Automation is a way to create an effective control system. The main goal of automatic remote control systems is to continuous monitoring of the ventilation systems, refrigeration center, boiler and…
Objective metrics for assessing the quality of video codecs.
Objective metrics for assessing the quality of video codecs. Objective metrics for assessing the quality of video codecs IN SEARCH OF A SUPPORT POINTOne of the trends in the CCTV…
MPEG-4 vs H.264.
MPEG-4 vs H.264. MPEG-4 vs H.264 Of course, it is incorrect to contrast MPEG-4 and H.264, since H.264 and MPEG-4 (part 10) are the same thing. However, it turned out…
Selecting fiber optic video transmitters.
Selecting fiber-optic video signal transmitters. Selecting fiber-optic video signal transmitters It has long been known that copper lines are limited in their capabilities. The kilohertz spectrum of telephone channels can…
Image processing in CVS systems.
Image processing in CVS systems. In CVS computer television systems, the amplitude and spectral characteristics of images in each frame are analyzed. The results of the analysis are then used…
Quick search for a needle in a haystack, or how to properly organize work with a video archive.
Quick search for a needle in a haystack, or how to properly organize work with a video archive. Technologies do not stand still, their development is daily pushed by the…
Selecting the exposure time for a security camera in single-shot video signal generation mode.
Selection of exposure time for a security camera in the single-shot video signal generation mode. Vyacheslav Mikhailovich SMELKOV, Candidate of Technical Sciences SELECTION OF EXPOSURE TIME FOR A SECURITY CAMERA…
Television photography of a test object with pulsed exposure of a photodetector by a packet of flashes.
Television photography of the test object with pulsed exposure of the photodetector by a flash pack.. Television photography of the test object with pulsed exposure of the photodetector by a…
Television observations in difficult conditions.
Television observations in difficult conditions. Kulikov Alexander Nikolaevich TELEVISION OBSERVATIONS IN DIFFICULT CONDITIONS. Quite recently, in 1970, a microprocessor and a charge-coupled device (CCD) appeared simultaneously [1]. Modern life is…
Different units – different results of measuring the sensitivity of television cameras.
Different units — different results of measuring the sensitivity of television cameras.. Different units — different results of measuring the sensitivity of television cameras. KRUTIK Mikhail Ilyich, MAYOROV Viktor Petrovich…
FEATURES OF TECHNOLOGICAL EQUIPMENT FOR ALIGNMENT OF THE TELEVISION SYSTEM'S SIGHTING AXIS.
FEATURES OF TECHNOLOGICAL EQUIPMENT FOR ALIGNMENT OF THE SIGHTING AXIS OF A TELEVISION SYSTEM.. FEATURES OF TECHNOLOGICAL EQUIPMENT FOR ALIGNMENT OF THE SIGHTING AXIS OF A TELEVISION SYSTEM. Vyacheslav Mikhailovich…
METHOD OF INCREASING THE RESOLUTION OF A TELEVISION CAMERA FOR FORENSIC DIAGNOSTICS.
Vyacheslav Mikhailovich SMELKOV, PhD in Engineering, Associate Professor METHOD OF INCREASING THE RESOLUTION OF A TELEVISION CAMERA FOR FORENSIC DIAGNOSTICS Due to the non-destructive nature of reading information and the…
“PIR” METHOD FOR 24-HOUR SECURITY CAMERA.
THE “PIR” METHOD FOR A 24-HOUR SECURITY CAMERA.. THE “PIR” METHOD FOR A 24-HOUR SECURITY CAMERA. SMELKOV Vyacheslav Mikhailovich THE “PiP” METHOD FOR A 24-HOUR SECURITY CAMERA The term “PiP”…
PRESS THE BUTTON… What do we see on the screen when we try to play back CCTV recordings?
PRESS THE BUTTON… What do we see on the screen when trying to play back CCTV recordings?. PRESS THE BUTTON… What do we see on the screen when trying to…
What the IP era has in store for us…
What the IP era has in store for us…. If you look at all the well-known media resources covering the security industry in recent months of this year, it is…
ISS is the first to implement international standards for technical support.
ISS is the first to implement international technical support standards. ISS has always paid great attention to technical support issues. The qualifications of specialists, the list of services provided, their…
Advanced functionality of modern cameras.
Expanded functionality of modern cameras. The use of digital signal processors (DSP) in the circuitry of modern analog cameras has made it possible not only to improve the quality of…
AXIS Q1910 thermal IP cameras can “see” even a black cat in a dark room.
AXIS Q1910 thermal IP cameras will “see” even a black cat in a dark room. The Q1910 Series thermal network cameras are the first AXIS Communications devices to combine the…
Innovation as a strategy.
Innovation as a strategy. The brief of the company «Nedap» gives the following definition of its activities: «Nedap is an innovative commercial enterprise.» For my part, I am ready to…
Communication interfaces for access control systems.
Communication interfaces for access control systems. Let me make a reservation right away: I am not writing these notes at all to compare the most frequently used communication interfaces for…
Parsec — reliable and functional!
Parsec is reliable and functional! Sergey Stasenko, Relvest Group of Companies sserg@relvest.ru ParsecNET 2.5: a new level of reliability A new version of software for the ParsecNET integrated security system…
RFID — prospects and reality.
RFID — Prospects and Reality. Let the reader not be confused by some violation of the sequence of words in the construction of the title. I did this intentionally: after…
NEDAP-AEOS Access Control System: Concentration of Advantages.
NEDAP-AEOS access control system: concentration of advantages. NEDAP-AEOS access control system: concentration of advantages NEDAP-AEOS access control system: concentration of advantages PROGRAMMABLE CONTROLLER One of the unique features of the…
Access control system NEDAP-AEOS. A new look at security management.
NEDAP-AEOS Access Control System. A New Look at Security Management. NEDAP-AEOS Access Control System. A New Look at Security Management NEDAP-AEOS Access Control System. A New Look at Security Management…
ACS: access via Ethernet.
ACS: access via Ethernet. Everyone talks and writes about the IP revolution in access control systems (ACS). What is it in practice? Why Ethernet? Let's start with the fact that…
ACS: savings and accounting.
ACS: savings and accounting. In most cases, any security systems, including ACS, are often considered by property owners as a kind of burden — something that requires additional (sometimes considerable)…
ACS and IP: no need to build barricades.
ACS and IP: no need to build barricades. I may disappoint some readers, but there will be no revolutionary pathos in these notes, typical of many publications on the introduction…
Current state of the network access control system market in Saint Petersburg.
Current state of the network access control system market in St. Petersburg. In the spring of 2010, specialists from the Club of Business and Politics Consultants conducted a telephone survey…
Selection and design of access control systems: basic mistakes and miscalculations.
Selecting and designing an ACS: basic mistakes and miscalculations. As the saying goes, only he who does nothing makes no mistakes. However, in relation to the topic of this article,…
What is long-range identification for? What tasks does it solve?
What is long-range identification for? What tasks does it solve?. Long-range identification is identification based on radio frequency identification (RFID) technology. When we talk about long-range identification, we are talking…
Mechatronic access control and management systems VERSO CLIQ from Effeff IKON ASSA ABLOY Sicherheitstechnik GmbH.
Mechatronic access control and management systems VERSO CLIQ from effeff IKON ASSA ABLOY Sicherheitstechnik GmbH.
Automatic parking operation: problems and solutions.
Automatic parking operation: problems and solutions. If there are traffic rules and technical means for this, then there must be rules for road standing and, accordingly, equipment for this. That…
Access point operating modes.
Access point operating modes. Recently, I've been hearing more and more often that access control systems are competing in some system parameters — one can work with 10,000 cards, and…
Hands must be touched. Biometric readers by ZKSoftware.
Hands are a must. Biometric readers from ZKSoftware. Any access control system (ACS) starts with keys that are given to each user. In this case, the key in modern ACS…
Symbiosis of 1C:Enterprise and access control systems. A new look.
Symbiosis of 1C:Enterprise and access control systems. A new look. The intensive development of IT technologies for enterprise management and security technologies inevitably had to lead to their intersection. This…
Time and attendance terminals.
#Time tracking Time tracking terminals. Purpose The efficiency of any enterprise largely depends on the efficiency of its employees. The issue of labor discipline plays an important role in this…
Technologies for protection against intruders.
Technologies for protecting against intruders. Technologies for protection against intruders Technologies for protection against intruders In recent years, we have seen rapid changes in the field of network technologies and…
Features of creating access control systems in universities.
Features of creating ACS in universities. Since 1993-1996, information technologies have been actively introduced into all areas of educational institutions, and especially into the educational process. At present, any university…
Road and parking blockers.
Road and parking blockers. Devices for blocking the passage of vehicles are used, as a rule, as part of access control and management systems of the general complex of security…
Parking systems for above-ground and underground paid parking.
Parking systems for above-ground and underground paid parking lots. Speaking about parking, it should be noted that it is a mandatory element of the infrastructure, for example, of a shopping…
Modern perimeter security systems. Article updated 09.04 in 2023.
Modern perimeter security systems. Vvedenskiy Boris Sergeevich, candidate of physical and mathematical sciences MODERN PERIMETER SECURITY SYSTEMS (End. Beginning in Nos. 3, 4, 1999) Introduction Previous issues examined perimeter security…
Modern perimeter security systems. Article updated 03.04 in 2023.
Modern perimeter security systems. Boris Sergeevich Vvedensky, Candidate of Physical and Mathematical Sciences MODERN PERIMETER SECURITY SYSTEMS (Continued. Beginning in No. 3, 1999) Introduction In the first part of…
PERIMETER SECURITY SYSTEMS WITH FIBER OPTIC SENSORS..
PERIMETER SECURITY SYSTEMS WITH FIBER-OPTIC SENSORS.. PERIMETER SECURITY SYSTEMS WITH FIBER-OPTIC SENSORS. VVEDENSKY Boris Sergeevich, Candidate of Physical and Mathematical Sciences PERIMETER SECURITY SYSTEMS WITH FIBER-OPTIC SENSORS General principles of…
Office surveillance rules.
Office surveillance rules. Office Surveillance Rules Office Surveillance Rules At the gate — an access control system with magnetic readers. At the entrance to the office — a revolving door…
Wireless systems for perimeter security.
Radio beam and combined systems The American company Southwest Microwave produces a wireless radio beam system M.I.L. PAC 316, which is a development of the well-known system M.I.L. PAC 310B.…
Alarm messages over the Internet: feasibility, installation and use features.
Alarm messages on the Internet: feasibility, installation and use features. First of all, I will warn you that in the article, in order not to advertise either myself or competitors,…
Rapidly deployable perimeter security systems.
Rapidly deployable perimeter security systems. Modern perimeter security systems are characterized by a wide variety of physical principles and design options. Technological advances enable developers to create compact security systems…
Invisible gates. Beam IR barriers of the Activa series for security systems of internal and external perimeters of objects.
Invisible gates. Beam IR barriers of the Activa series for security systems of internal and external perimeters of objects. Active IR motion sensors from Satel are designed to protect shop…
Automation of design.
Design automation. Rare is the manager who was not outraged by the slowness of projects in his own organization. Indignation is often accompanied by the desire to disperse the design…
Intelligent detectors for open spaces.
Intelligent detectors for open spaces. Among professional manufacturers of security detectors, the Swiss company ASIM Technologies has always stood apart due to a number of unique technical solutions and the…
PIR detectors with anti-masking.
PIR detectors with anti-masking. Passive infrared (PIR) detectors, which have become widespread in the last 10 years, are one of the main technical means of security alarms for protecting premises…
Vibrating microphone detection devices.
Vibration microphone detection devices. Vibration microphone detection devices (SDD) are designed to detect an intruder by the vibrations they create in a strong engineering barrier (physical barrier) during penetration into…
Vibrating fiber optic detection devices.
Vibrating fiber-optic detection devices. Vibrating fiber-optic detection devices are designed to detect an intruder by the vibrations of the alarm barrier they create during penetration into the protected facility. The…
Combined alarm sensors.
Combined security alarm sensors. Combined security alarm sensors Andreev S.P. COMBINED SECURITY ALARM SENSORS Source: magazine «Special Equipment» Combination sensors, also called dual technology sensors, are relatively new and are…
RAPIDLY DEPLOYABLE DETECTION AND ALARM SYSTEMS.
RAPIDLY DEPLOYABLE DETECTION AND SECURITY ALARM SYSTEMS. RAPIDLY DEPLOYABLE DETECTION MEANS AND SECURITY ALARM SYSTEMS ZVEZHINSKY Stanislav Sigismundovich, Candidate of Technical Sciences RAPIDLY DEPLOYABLE DETECTION MEANS AND SECURITY ALARM…
If you can't see it, you can't steal it!
You can't see — you can't steal! The modern Russian security market offers a wide range of alarm systems aimed at effectively solving the problem of protecting property. The most…
The security guard gets up early.
Security gets up early. Security rises early Guards rise early Do you think there is nothing to steal in your apartment? You are wrong – such ordinary things as a…
What you need to know about protecting your electrical grid.
What you need to know about protecting the electrical network. What you need to know about protecting the electrical network. What you need to know about protecting the electrical network.…
Electrical wiring diagram.
Electrical wiring diagram. Electrical wiring diagram Electrical wiring diagram Electrical wiring diagramwill also help in identifying faults, which can be especially difficult to do if there is hidden wiring. For…
Basic electrical protective equipment and its operation.
Basic electrical protective equipment and their operation. Basic electrical protective equipment and their operation Basic electrical protective equipment and their operation Basic electrical protective equipmentInsulating electrical protective equipment is a…
Semiconductor gas sensors.
Semiconductor gas sensors. Semiconductor gas sensors Semiconductor gas sensors Gas sensors made of semiconductor materials are no less popular — semiconductor gas sensors. The operation of this type of sensor…
Rules for installation of household gas cylinders.
Rules for installing household gas cylinders. Rules for installing household gas cylinders Rules for installing household gas cylinders According to official data from a special commission, in most incidents where…
Contradictions between Federal Law 94 and consumer rights.
Contradictions of Federal Law 94 to consumer rights. Contradictions of Federal Law 94 to consumer rights Contradictions of Federal Law 94 to consumer rights The President of the Russian Federation…
Russian top-class anti-theft systems.
Russian top-class anti-theft systems. Russian high-end anti-theft systems Russian high-end anti-theft systems This anti-theft system is designed to protect your goods from theft, and also serve as a high-quality advertisement…
HDCCTV: comparative analysis.
HDCCTV – the transition to the HD standard without the use of IP technologies – has recently been the subject of close attention from the press. However, it remains unclear…
Automation of control and safety of an industrial facility.
Automation of control and safety of an industrial facility. Prerequisites A comprehensive safety system for an industrial facility (hereinafter referred to as CSSF) is defined as a complex ergotechnical system…
What is the difference between a CCD sensor and a CMOS sensor?
What is the difference between a CCD matrix and a CMOS matrix? What is the difference between a CCD matrix and a CMOS matrix? What is the difference between a…
Security alarm sensor: overview of the working mechanism.
Security alarm sensor: an overview of the working mechanism. Security alarm sensor: an overview of the working mechanism. Security alarm sensor: an overview of the working mechanism. You can design…
Graphical user interface for public address and music broadcasting systems.
Graphical user interface for public address and music broadcasting systems. Graphical user interface for public address and music broadcasting systems Graphical user interface for public address and music broadcasting systems.…
Which video intercom to choose?
Which video intercom to choose?. Which video intercom to choose? Which video intercom to choose? Video intercom in a city apartment The optimal option for installing an individual video intercom…
Concepts for selecting the number and placement of video cameras to build a digital video monitoring system at a retail facility with self-service trading.
Concepts for selecting the number and placement of video cameras to build a digital video monitoring system at a retail facility with self-service trading. Concepts for selecting the number and…
Methods for protecting databases from internal attackers
INSIDE – how much is in this sound… It is probably unnecessary to talk about the relevance of the problem again. It is only worth defining it more specifically in…
Multichannel notification transmission subsystem.
Multi-channel notification transmission subsystem. Multi-channel notification transmission subsystem Multi-channel notification transmission subsystem To understand the fundamental differences between notification transmission systems, we offer a brief historical excursion. For a long…
Some aspects of automatic recognition of vehicle license plates.
Some aspects of automatic recognition of vehicle license plates. Some aspects of automatic recognition of vehicle license plates Some aspects of automatic recognition of vehicle license plates Currently, there are…
General information about the Mirage/Siberia monitoring systems.
General information about the Mirage/Siberia monitoring systems. General information about the Mirage/Siberia monitoring systems General information about the Mirage/Siberia monitoring systems Criterion 1. Information delivery time The well-known axiom «Time…
Organization of work of the head of the marketing department for product promotion in the security systems market.
Organization of work of the head of the marketing department for product promotion in the security systems market. Organization of work of the head of the marketing department for product…
Features and differences of two-position perimeter security systems.
Features and differences of two-position perimeter security means. Features and differences of two-position perimeter security means. Features and differences of two-position perimeter security means. An attempt to make a choice…
New additions to the class of radio wave detectors.
New additions to the class of radio wave detectors. New additions to the class of radio wave detectors New additions to the class of radio wave detectors Radio wave detectors…
Position of the Russian National Standardization Committee TC — 234 on the draft international standard IEC 62642-2-2.
Position of the Russian National Standardization Committee TC 234 on the draft international standard IEC 62642-2-2. Position of the Russian National Standardization Committee TC 234 on the draft international standard…
Practical solution to security issues through information technology.
Practical solution to security issues through information technology. Practical solution to security issues through information technology Practical solution to security issues through information technology Several years ago, the owner of…
Proximity cards – the way is open.
Proximity cards – the way is open. Proximity cards – the way is open. Proximity cards – the way is open. A plastic contactless card operating using Proximity technology at…
Working with fiber optics: not as scary as it seems.
Working with fiber optics: not as scary as it seems. Working with fiber optics: not as scary as it seems. Working with fiber optics: not as scary as it seems.…
Reducing losses in trade.
Reducing losses in trading. Reducing losses in trading Reducing Losses in Trade One of the most effective means of attracting customers in retail is openly available goods. It has been…
Technical means of perimeter protection. Options for protecting objects and territories.
Technical means of perimeter protection. Options for protecting objects and territories.. Technical means of perimeter protection. Options for protecting objects and territories. Technical means of perimeter protection. Options for protecting…
Transformer and switching power supplies.
#power supplies Transformer and pulse power supplies. Transformer power supplies A classic power supply is a transformer power supply. In general, it consists of a step-down transformer or autotransformer, whose…
Hi-End class video recorders.
Hi-End class video recorders. Hi-End class video recorders Hi-End class video recorders INTRODUCTION Earlier in the articles we described the classification of recorders, dividing them into 4 classes:1. Budget, so-called…
What's good for a hypermarket is death for a bookstore.
What's good for a hypermarket is death for a bookstore. What's good for a hypermarket is death for a bookstore. Anti-theft systems are divided into four main technologies: acoustomagnetic, radio…
Two heads are better than one.
Two heads are better than one. when security depends on eliminating unwanted alarms and detecting real threats In an ongoing effort to replicate the human brain's analytical skills in recognizing…
Computer networks: basic concepts.
Computer networks: basic concepts. Computer networks: basic concepts Computer networks: basic concepts The security of the user's personal data starts from the basics, so it is important to have general…
Briefly about new antivirus programs and the concept of «light antivirus».
Briefly about new antivirus programs and the concept of «light antivirus». Briefly about new antivirus programs and the concept of «light antivirus» Briefly about new antivirus programs and the concept…
Review of estimating programs.
9 estimating programs that an estimator should know about. Despite the fact that the algorithm for calculating estimates, in theory, should be universal for any user, nevertheless, manufacturers often orient…
Copenhagen Airport installs thermal imaging cameras
With the threat of attack or, worse, terrorist attacks, passenger safety at the airport is a top priority for airlines and airport authorities. However, it is not just passengers who…
What processor does your analog camera have?
What processor does your analog camera have?. The question is not trivial. If 10 years ago the competition between major CCTV camera manufacturers was directly related to the technologies and…
Open Technologies reported on the work of the St. Petersburg branch.
Open Technologies reported on the work of the St. Petersburg branch. Open Technologies has been operating in the Russian system integration market since 1994. The company's key areas of activity…
Vulnerability scanner.
Vulnerability scanner. Vulnerability scanner Vulnerability scanner A vulnerability scanner is a software or hardware tool used to diagnose and monitor network computers. This device allows you to analyze the security…
The USB universal host controller is an important hardware component.
USB universal host controller is an important hardware component. Today it is very important that the hardware program «standard usb host controller driver» has ready-made top-level drivers and libraries for…
Types of malware.
Types of malware. Windows blockers Windows blockers are malicious programs that, according to the classification, are called Trojan.Winlock. Windows blockers when the Windows system starts, display a message on top…
Software for IP systems.
Software for IP systems. In previous reviews (TZ No. 5, 6 – 2007) we considered the IP system as a software and hardware complex, in which each device performs a…
Intelligent system for monitoring and diagnostics of high-voltage equipment of power plants.
Intelligent system for monitoring and diagnostics of high-voltage equipment of power plants. Intelligent system for monitoring and diagnostics of high-voltage equipment of power plants. Intelligent system for monitoring and diagnostics…
How to choose the right video intercom?
How to choose the right video intercom?. How to choose the right video intercom? How to choose the right video intercom? The best option for installing an individual video intercom…
Review of the L4 ACS controller from Legos.
Review of the L4 ACS controller by Legos. Review of the L4 ACS controller by Legos Review of the L4 ACS controller by Legos. The equipment set provided for testing…
Intercall IP ward alarm system, Intercall IP staff call systems.
Intercall IP ward signaling, Intercall IP staff call systems. Intercall IP ward signaling, Intercall IP staff call systems Intercall IP Ward Alarm, Intercall IP Staff Call Systems The Intercall IP…
DAIWON OPTICAL Co., Ltd.
DAIWON OPTICAL Co., Ltd. Founded in 1988, the South Korean company DAIWON OPTICAL COMPANY (that was its original name) entered the market as a manufacturer of lenses for binoculars, as…
The device and diagram of the gas analyzer.
Gas analyzer design and circuit. Design and circuit of the gas analyzer Design and circuit of the gas analyzer A gas analyzer is a device that analyzes gas mixtures in…
Super-economical floodlight for illuminating the perimeter of objects.
Super-efficient floodlight for illuminating the perimeter of objects. Super-efficient floodlight for illuminating the perimeter of objects. Super-efficient floodlight for illuminating the perimeter of objects. The use of LEDs with a…
Telephone call recording systems.
Telephone call recording systems. Telephone call recording systems Telephone call recording systems Technologies are developing by leaps and bounds today. A couple of decades ago, computers were bulky and slow,…
New generation warning systems.
New generation warning systems. New generation warning systems New generation warning systems Sometimes life presents us with tragic events without a happy ending. We must be prepared for them. We…
Series of video intercoms PVD-704C.
Series of video intercoms PVD-704C. PVD-704C video intercom series Video intercom series PVD-704C Video intercom series PVD-704C: choose your memory size The company «Security Technologies», a supplier of security equipment…
RVi-R04SA — video recorder for budget solutions.
RVi-R04SA — video recorder for budget solutions. RVi-R04SA — video recorder for budget solutions RVi-R04SA — video recorder for budget solutions RVi-R04SA — video recorder for budget solutions. Most RVi…
Division of the detection zone into several subzones using the example of radio wave single-position detectors ZEBRA-30 and ZEBRA-60. The article was updated in 2023.
Division of the detection zone into several subzones using the example of ZEBRA-30 and ZEBRA-60 single-position radio wave detectors Division of the detection zone into several subzones using the example…
Anti-ram and barrier installations. Review.
Anti-ram and barrier installations. The problem of terrorism is of particular concern in our country. It is no coincidence that the Concept of National Security of the Russian Federation, in…
Entrance video intercoms.
Entrance video intercoms. Entrance video intercoms Entrance video intercoms Entrance video intercom refers to access control systems for premises designed for use in a small office, apartment or residential building.…
Single-position radio wave detector «Agat-7».
Single-position radio wave detector «Agat-7». Single-position radio wave detector «Agat-7» Single-position radio wave detector «Agat-7» Characteristics and parameters: The detector uses sawtooth frequency modulation of the transmitter carrier frequency and…
New in the class of radio wave two-position detectors.
New in the class of radio wave two-position detectors. New in the class of radio wave two-position detectors New in the class of radio wave two-position detectors Despite their great…
New control panel of the SP Spectra series — SP4000.
New control panel of the SP Spectra series — SP4000. New control panel of the SP Spectra series — SP4000 New control panel of the SP Spectra series — SP4000…
Murena-2 for those who value Godograph.
Murena-2 for those who value Godograph. Murena-2 for those who value Godograph. «Murena-2» for those who value Godograph. The new generation of vibration detectors of the MURENA-2 series has a…
What should be the care of the battery?
How to care for a battery. As has been proven more than once, a battery is the most economical and convenient device among all power supplies. Although its life is…
K-engineering increases the level of Service.
K-engineering improves the level of Service. K-engineering improves the level of Service K-engineering improves the level of Service RELIABLE, stable, constant, instilling confidence… What do these words tell us? What…
GSM alarm in one sensor.
GSM alarm in one EPIR sensor Information security system via mobile phone. If someone enters the premises, the EPIR GSM alarm automatically informs the owner by SMS message and call.…
Two-way security system for commercial vehicles SCHER-KHAN TAIGA.
Two-way security system for commercial vehicles SCHER-KHAN TAIGA. Two-way security system for commercial vehicles SCHER-KHAN TAIGA Two-way security system for commercial vehicles SCHER-KHAN TAIGA Several thousand cases of theft and…
Oubau door closers.
Oubau door closers. Oubau door closers Oubau door closers About OUBAO OUBAO is one of the largest manufacturers of door closers in the world. OUBAO has American UL, UL10C, ETL,…
Biometrics in the service of security.
Biometrics in the service of security. Biometrics in the service of security Biometrics in the service of security Various biometric security systems can be compared with each other using several…
Pelco: equipment for industrial facilities.
#Pelco Pelco: equipment for industrial facilities. It is known that the term CCTV covers not only security systems, but also technological television surveillance, as well as remote object monitoring systems.…
New equipment — new opportunities from Tedd Electronics.
New equipment — new opportunities from Tedd Electronics. The range of equipment manufactured under the Tedd Electronics brand is expanding. The Formula Bezopasnosti company presents new budget video recorders with…
PELCO digital recording systems. Article updated in 2023.
PELCO digital recording systems The main event of 2007 for PELCO was the company's entry into the financial and industrial group Schneider Electric and the actual unification of its engineering,…
Basler IP cameras: criteria of German quality.
Basler IP cameras: criteria for German quality. What do you expect from your surveillance system? Is it supposed to record images 24/7 to reliably protect your property? You may even…
Foreign arched metal detectors. Informed choice.
#metal detectors Foreign arched metal detectors — a conscious choice. Sinelytsykov Georgy Alexandrovich Metal detectors for searching weapons during personal inspections have become an integral part of most security systems.…
Technical characteristics of some domestic rapidly deployable detection equipment.
Table 1. Technical characteristics of some domestic rapidly deployable detection tools Name, manufacturer- supplier Features of the detection tool (DS) Detection zone, m Power parameters and operating temperature range, oC…
PANORAMIC MEASURING RECEIVER ARK-D1TR..
PANORAMIC MEASURING RECEIVER ARK-D1TR.. PANORAMIC MEASURING RECEIVER ARK-D1TR. SERGEEV Viktor Borisovich, SERGIENKO Alexander Rostislavovich, PEREVERZEV Sergey Borisovich. PANORAMIC MEASURING RECEIVER ARC-D1TR This article discusses the panoramic measuring receiver ARK-D1TR, the…
Portable Spectral Video Comparator VSC-4C..
Portable spectral video comparator VSC-4C.. Portable spectral video comparator VSC-4C. Vadim Antoninovich Shelkov PORTABLE SPECTRAL VIDEO COMPARATOR VSC-4c FOR FORENSIC EXAMINATION OF DOCUMENTS Determining the authenticity and integrity of various…
Portable device for checking documents “Korund-MTV”.
Portable device for checking documents «Korund-MTV».. Portable device for checking documents «Korund-MTV». KOVALEV Aleksey Alekseevich POLYAKOV Yury Alekseevich SINELNIKOVA Elena Nikolaevna STUDITSKY Aleksandr Sergeevich KHNYKOV Yury Alekseevich PORTABLE DEVICE FOR…
Portable system for radio monitoring and determination of the location of radio emission sources.
Portable system for radio monitoring and determining the location of radio emission sources.. Portable system for radio monitoring and determining the location of radio emission sources. ASHIKHMIN Aleksandr Vladimirovich, Candidate…
Exclusive models of LCD TVs from Pioneer..
Exclusive models of liquid crystal televisions from Pioneer.. Exclusive models of liquid crystal televisions from Pioneer. Exclusive models of LCD TVs from Pioneer. Pioneer has launched the production of a…
ISUTS: international cooperation.
MSUC: international cooperation. We have already told our readers (No. 6-2010) about the Federal State Institution «Intersectoral Special Training Center» (FSI MSUC). Of course, this first material gave only a…
Search for hidden danger.
Search for hidden danger. Camille Shieh's article analyzes the problem of detecting chemical, biological, radiological and nuclear substances. The use of weapons of mass destruction, the author notes, can lead…
Certified by the International Standards Centre.
Certified in MSUC. Certification of equipment from leading manufacturers in the OIT system (equipment, products and technologies for nuclear installations, radiation sources and storage facilities) is becoming a noticeable trend…
Journal TZ — Methodology for assessing the state of engineering and technical security of objects.
Journal TZ — Methodology for assessing the state of engineering and technical security of objects. Author: Alexander MALTSEV, Technical Director of Intel Tectum, PhD in Engineering When planning capital expenditures…
A supplier without technical support is a waste of money.
A supplier without technical support is a waste of money.. Supply of security systems is a kind of art, requiring active maneuvering among competitive offers and hard work to create…
Mines, quarries and associated facilities.
Mines, pits and related facilities. My experience with mines is rather negative. It is very difficult to meet mine explosion safety requirements, so I have never been able to place…
Subtleties of using a long-range identification system.
Subtleties of using a long-range identification system. We have recently covered some applications of long-range identification systems at sites, in particular for monitoring parking lots, access to premises and entry…
The other side of Microsoft Project.
The Other Side of Microsoft Project. More and more often, managers of large companies are faced with the issue of effective project management. Its solution requires modern management approaches. One…
Strengths of combining BACnet and KNX.
Strengths of combining BACnet and KNX. Strengths of combining BACnet and KNX Strengths of combining BACnet and KNX Richard Staub (Richard Staub),BUS-House Recently, we have increasingly seen the process of…
B2b according to Kotler, or Biometric system for Kamenskaya.
b2b according to Kotler, or a Biometric System for Kamenskaya. Float like a butterfly and sting like a bee Mohammed Ali Advertising for washing powder, yoghurts, sanitary pads and beer…
Marketing communications of the security market in figures. Part 2.
Marketing communications of the security market in figures. Part 2. The first part, “Marketing communications of the security market in figures” (TZ No. 4-2009), presented data characterizing advertising in the…
Security systems sales managers: myths and reality of modern requirements.
Sales managers of security systems: myths and reality of modern requirements. Regardless of whether your company's sales managers are focused on actively searching for clients or on working with «incoming…
Journal TZ — Methodology for assessing the qualifications of security service personnel.
Journal TZ — Methodology for assessing the qualifications of security personnel. Author: Alexander MALTSEV, Technical Director of Intel Tectum, PhD in Engineering The tasks of assessing the qualification level of…
Sales and Marketing: Who is to Blame and What to Do?
Sales and Marketing: Who's to Blame and What to Do?. The sacramental questions for Russians that I risked putting in the title are relevant in many life situations that, in…
Visibility of vehicle license plates.
Visibility of license plates. When designing security television systems, the task of estimating the maximum size of the horizontal field of view at which manual or automatic recognition of a…
Tattoo-ID: comparison of tattoos for personal identification.
Tattoo-ID: comparing tattoos for personal identification. A researcher from Michigan State University has developed an automatic image search and identification system that allows law enforcement agencies to compare scars, birthmarks,…
Consulting in the TSB market. Article updated in 2023.
Consulting in the TSB market Two opinions on the current problem of the technical security equipment market We'll see Alexander Zhukov — expert In the classical sense, consulting means professional…
I don't see any prospects yet.
I don't see any prospects yet. I'll make a reservation right away: I'm one of those (I don't know how many of my colleagues from the EU countries have also…
Study, study and study…
Study, study and study…. An analysis of the existing European market of technical security equipment shows that there is no problem with exporting Russian-made products as such. Because the volume…
Are there any errors when carrying out activities aimed at monitoring security activities?
Are there any errors in carrying out activities aimed at monitoring security activities? Are there any errors in carrying out activities aimed at monitoring security activities? Are there any errors…
What is the staffing structure of the Ministry of Internal Affairs in Russia?
What is the staffing structure of the Ministry of Internal Affairs in Russia? Let's consider the changes that have occurred in the structure of the internal affairs bodies of the…
Competitive Intelligence in Business. «Whites Start and Win!»
Competitive intelligence in business. «Whites start and win!» Competitive intelligence in business. «Whites start and win!» Competitive intelligence in business. «Whites start and win!» For business, information possession is one…
On the issue of motivation of security service employees of hypermarkets.
On the issue of motivating employees of the security service of hypermarkets. On the issue of motivating employees of the security service of hypermarkets On the issue of motivating employees…
Store security is a delicate matter.
Store security is a delicate matter. Store security is a delicate matter Store security is a delicate matter Store security is a delicate matter. Citizens, when you go to the…
Planning the work of the security service department of a trading enterprise.
Planning the work of the security service unit of a trading enterprise. Planning the work of the security service unit of a trading enterprise Planning the work of the security…
Security guard rights.
What is allowed for a private security company employee. Dear readers, please note that private detective and security activities are regulated by the law «On private detective and security activities…
Psychological preparation.
Psychological preparation. Psychological preparation. Psychological preparation. Nothing can be taught — everything can be learned. At the end of last year, it was considered good form in the media to…
Psychology of influence on people.
Psychology of influencing people. Psychology of influencing people Psychology of influencing people From early childhood, we are all exposed to stereotypes (psychological principles), and they haunt us throughout our lives.…
Remote security: features of choice
#Remote control security If you decide to engage in remote control security, the most important issue will be the choice of equipment. It is no secret that mistakes made when…
Commercial transport control system in the Russian Federation.
Commercial transport control system in the Russian Federation. Commercial transport control system in the Russian Federation Commercial transport control system in the Russian Federation It is recognized that the main…
Biometric locks — a new generation of security guard.
Biometric locks — a new generation security guard. Biometric locks — a new generation security guard Biometric locks — new generation security guard Biometric locksBiometric locks– these are new generation…
What a burglar-proof door should be like.
What a burglar-proof door should be like. What a burglar-proof door should be like. What a burglar-proof door should be like. Burglar-proof doorsOne of the most important characteristics is burglar-proof…
How to bypass security alarms?
How to bypass security alarms?. How to bypass security alarms? How to bypass security alarms? However, experienced professionals know several loopholes that allow you to fool even the most advanced…
Coordinate, digital and wireless intercoms and their features.
Coordinate, digital and wireless intercoms and their features. Coordinate, digital and wireless intercoms and their features Coordinate, digital and wireless intercoms and their features Coordinate intercoms Coordinate intercomsare the most…
Repellent lighting.
Repellent lighting. Repellent lighting Deterrent lighting Lighting devices are an effective addition to mechanical protection. Their use has a deterrent effect on burglars. Nothing makes a burglar feel more insecure…
The concept of theft in domestic forensics.
The concept of theft in domestic forensics. Forensics — definition: The very definition of forensicsas a science is based on several main points: development of a system of special techniques,…
A safe door is an excellent option for an entrance door for a city apartment.
A safe door is a great option for an entrance door to a city apartment. A safe door is a great option for an entrance door to a city apartment.…
Safe Cracking: From Origins to Modern Times.
Safecracking: from the origins to the present.. Safecracking: from the origins to the present. Safecracking: from the origins to the present. As soon as the concept of private property appeared,…
Locks for safes.
Safe locks. Safe locks Safe locks The burglar resistance of a safe is ensured by four types of locks known today. Safe locks are key, mechanical combination locks of different…
European standard for protective fog comes into force.
European standard for protective fog comes into effect. European standard for protective fog comes into effect. European standard for protective fog comes into effect. The thief is only two steps…
What is included in the concept of crime prevention?
What is included in the concept of crime prevention. What is included in the concept of crime prevention. What is included in the concept of crime prevention. The concept of…
A brief overview of numbered sealing products-access control indicators.
Brief overview of numbered sealing products-access control indicators. Brief overview of numbered sealing products-access control indicators. Brief overview of numbered sealing products-access control indicators. Most likely, everyone in their life…
Qualification of theft in the Criminal Code of the Russian Federation.
Theft qualification in the Criminal Code of the Russian Federation. Theft qualification in the Criminal Code of the Russian Federation Theft qualification in the Criminal Code of the Russian Federation…
Several examples of the use of indicator seals to prevent theft.
Several examples of using indicator seals to prevent theft. Several examples of using indicator seals to prevent theft. Several examples of using indicator seals to prevent theft. Huge amounts to…
New federal law on security of the Russian Federation.
New federal law On security of the Russian Federation. New federal law On security of the Russian Federation. New federal law «On security» of the Russian Federation. Previous The Federal…
Russian legislation on countering terrorism.
Russian legislation on counteracting terrorism. Russian legislation on counteracting terrorism Russian legislation on counteracting terrorism Law on Combating Terrorismdefines terrorism as the commission of an explosion, arson or other actions…
Aspects of design and implementation of access control and management systems (ACS).
Aspects of design and implementation of access control and management systems ACS. At present, access control and management systems (ACS) are an integral part of the comprehensive security system of…
Housing Code and personal data. Expert commentary.
Housing Code and personal data. Expert commentary. Housing Code and personal data. Expert commentary Housing Code and personal data. Expert commentary Part 2 of Article 6 of Federal Law No.…
How to avoid becoming a victim: signs of mobile phone wiretapping.
How not to become a victim: signs of mobile phone wiretapping. How not to become a victim: signs of mobile phone wiretapping. How not to become a victim: signs of…
How is it done and how to prevent network password hacking.
How to hack a network password and how to prevent it. How to hack a network password and how to prevent it. How to hack a network password and how…
Computer attacks: some types and methods of combating them.
Computer attacks: some types and methods of struggle. Computer attacks: some types and methods of struggle Computer attacks: some types and methods of struggle Computer attacksToday, there are so many…
Information security model.
Information security model. Information security model Information security model In order to protect users from unauthorized intrusion and theft of information resources and confidential data, specialists have developed an information…
Fundamentals and principles of copyright today.
Fundamentals and principles of copyright today. Fundamentals and principles of copyright today Fundamentals and principles of copyright today Principles of copyrightTo define the concept, let us turn to the interpretation…
The rules change during the game.
The rules change during the game. The rules change during the game The rules change during the game The law, in particular, provides that regulatory legal acts on certain issues…
A unique method of depersonalizing personal data.
A unique method of depersonalizing personal data. A unique method of depersonalizing personal data. A unique method of depersonalizing personal data. According to the definition given in the Federal Law…
Recover information from a flash drive yourself.
Recover information from a flash drive yourself. Recover information from a flash drive yourself Recover information from a flash drive yourself It's no secret that today a flash card is…
Protection of information rights. Regulatory aspect.
Protection of information rights. Regulatory aspect. Protection of information rights. Regulatory aspect Protection of information rights. Regulatory aspect The main modern source of information is the Internet. Information resources of…
PROTECTION FROM UNAUTHORIZED ACCESS. PASSWORD SYSTEM.
PROTECTION AGAINST UNAUTHORIZED ACCESS. PASSWORD SYSTEM. PROTECTION AGAINST UNAUTHORIZED ACCESS. PASSWORD SYSTEM MASYUK Mikhail Igorevich PROTECTION AGAINST UNAUTHORIZED ACCESS. PASSWORD SYSTEM The password system as an integral part of the…
Information protection devices for VHF radio communications. Scramblers.
#Scramblers, #scrambler, #ultrasound Information security devices for VHF radio communications. Ovchinnikov A.M., Lazin A.S. Source: Special Equipment» magazine The article discusses information security devices — scramblers, which can be used…
Removal of traces of other phono-objects from a speech signal by decomposing them into microwave elements.
Removing traces of other phono-objects from a speech signal by decomposing them into microwave elements.. Removing traces of other phono-objects from a speech signal by decomposing them into microwave elements.…
Technical support for conducting examination of the authenticity of documents as one of the aspects of economic security. Article updated in 2023.
Technical support for conducting an examination of the authenticity of documents as one of the aspects of economic security. Trukhachev Valery Vladimirovich TECHNICAL SUPPORT FOR CONDUCTING AN EXAMINATION OF THE…
Evaluation of the effectiveness of means of destroying information stored in hard disk drives.
Evaluation of the effectiveness of means of destroying information stored in hard disk drives. Evaluation of the effectiveness of means of destroying information stored in hard disk drives Boborykin Sergey…
CURRENT STATE AND TACTICAL POSSIBILITIES OF USING ELECTROMAGNETIC RADIATION INDICATORS.
CURRENT STATE AND TACTICAL CAPABILITIES OF USING ELECTROMAGNETIC RADIATION INDICATORS.. CURRENT STATE AND TACTICAL CAPABILITIES OF USING ELECTROMAGNETIC RADIATION INDICATORS. LOBASHEV Aleksey Konstantinovich, Candidate of Technical Sciences, Associate Professor, LOSEV…
Problems of optimization of the process of instrumental control of information processing equipment.
Problems of optimizing the process of instrumental control of information processing equipment. Problems of optimizing the process of instrumental control of information processing equipment Goryachev Sergey Vyacheslavovich PROBLEMS OF OPTIMIZING…
Problems of detection and identification of radio signals of covert information control means.
Problems of detection and identification of radio signals of covert information control means. Problems of detection and identification of radio signals of covert information control means Part 1. Basic requirements…
Problems of active protection of vibroacoustic channels.
Problems of active protection of vibroacoustic channels. Kargashin Viktor Leonidovich, Candidate of Technical Sciences PROBLEMS OF ACTIVE PROTECTION OF VIBRAO-ACOUSTIC CHANNELS Source: magazine «Special Equipment» In recent years, the development…
ENSURING THE PROTECTION OF INFORMATION FROM UNINTENDED INFLUENCE BY TECHNICAL MEANS.
ENSURING THE PROTECTION OF INFORMATION FROM UNINTENDED INFLUENCE BY TECHNICAL MEANS. PROTECTING INFORMATION FROM UNINTENDED INFLUENCE BY TECHNICAL MEANS Vakhlakov Valery Rudolfovich PROTECTING INFORMATION FROM UNINTENDED INFLUENCE BY TECHNICAL MEANS…
NSD: THEORY AND PRACTICE. UNAUTHORIZED ACCESS.
#unauthorized access, #NSD NSD: THEORY AND PRACTICE. MASYUK Mikhail Igorevich Terminology When setting the task of information security, it is necessary to take into account the implementation of a…
New solution for protecting confidential negotiations.
New solution for protecting confidential negotiations. Valery Ivanovich Zolotarev, PhD in Engineering NEW SOLUTION FOR PROTECTING CONFIDENTIAL NEGOTIATIONS In the information age, the well-known principle applies: whoever owns the…
New technology for protecting telephone conversations.
New technology for protecting telephone conversations. New technology for protecting telephone conversations. Doctor of Engineering Sciences, Professor E. I. Abalmazov The need to improve the means of physical protection of…
Methods and means of protecting telephone lines.
Methods and means of protecting telephone lines.. Methods and means of protecting telephone lines. Anatoly Anatolyevich Khorev, Doctor of Technical Sciences METHODS AND MEANS OF PROTECTION OF TELEPHONE LINES …
Masking of speech messages based on modern computer technologies.
Masking of speech messages based on modern computer technologies.. Masking of speech messages based on modern computer technologies. Dvoryankin Sergey Vladimirovich, Doctor of Technical Sciences Klochkova Ekaterina Nikolaevna Kaluzhin Roman…
Cryptographic protection of telephone messages.
Cryptographic protection of telephone messages. Igor Vasilievich Sudarev, Doctor of Technical Sciences CRYPTOGRAPHIC PROTECTION OF TELEPHONE MESSAGES Source: «Special Equipment» magazine No. 2, 1998. This article summarizes the methods of…
Car GPS tracker to protect your vehicle.
Car GPS tracker on guard of your transport. Car GPS tracker is a modern reliable equipment that is used for car monitoring. Such systems, by the way, are characterized by…
Car recorder PVDR-0163.
Car DVR PVDR- 0163. The company «Security Technologies» presents a new product of the Polyvision brand — a single-channel car DVR PVDR-0163 auto (Korea). The device acts as a «black…
Interview with the General Director of Armor Group, O.N. Gusarovsky.
Interview with the General Director of «Armor Group» Gusarovsky O.N. Interview with the General Director of «Armor Group» Gusarovsky O.N. Interview with the General Director of «Armor Group» Gusarovsky O.N.…
Car security systems yesterday and today.
Car safety systems yesterday and today. Car safety systems yesterday and today Car safety systems yesterday and today Car safety systemsIt is impossible to give a 100% guarantee that there…
Immobilizer device.
Immobilizer device. Immobilizer device Immobilizer device It is no secret that not everyone will dare to leave their car unattended for a long time today. More precisely, almost all car…
Modern technologies for transport control and enterprise fleet management.
Modern technologies for transport control and enterprise fleet management. Modern technologies for transport control and enterprise fleet management. Modern technologies for transport control and enterprise fleet management GPS/GLONASS transport monitoring.…
What is good about a satellite security system?
What is good about a satellite security system. What is good about a satellite security system. What is good about a satellite security system. Satellite security systemWhen talking about an…
Every year various new GPS products appear.
Various new GPS products appear every year. Various new GPS products appear every year Various new GPS products appear every year GPS navigator typesVarious GPS navigator types are distinguished based…
ERA GLONASS against road accidents.
ERA GLONASS versus road accidents. ERA GLONASS versus road accidents ERA GLONASS versus road accidents In recent years, the GLONASS navigation system has been distributed at the regional level, —…
History of GLONASS in Russia.
The history of GLONASS in Russia. The Russian global satellite positioning system, which is an analogue of the American GPS system — one of the global positioning systems. The global…
Basics of the functioning of the GPS navigation system.
Basics of the GPS navigation system. Basics of the GPS navigation system. Basics of the GPS navigation system. The abbreviation GPS stands for Global Positioning System. GPS navigation systemsare based…
Transmission of radio signal.
Radio signal transmission. Radio signal transmission Radio signal transmission Radio signals, which are the basis, in particular, of satellite communications and other types of communications, are electromagnetic waves. The communication…
The principle of operation of the satellite system.
The principle of operation of the satellite system. The principle of operation of the satellite system The principle of operation of the satellite system It is believed that satellite navigation…
Satellite monitoring of transport: control and optimization.
Satellite monitoring of transport: control and optimization. Satellite monitoring of transport: control and optimization. Satellite monitoring of transport: control and optimization. Satellite monitoring of transport belongs to the category of…
Application of satellite radio navigation methods.
Application of satellite radio navigation methods.. Application of satellite radio navigation methods. Petrov Nikolay Nikolaevich, Candidate of Technical Sciences APPLICATION OF SATELLITE RADIONAVIGATION METHODSFOR THE CREATION OF SYSTEMS AND COMPLEXES…
Positioning of moving objects based on satellite navigation systems.
Location of moving objects based on satellite navigation systems.. Location of moving objects based on satellite navigation systems. Petrov Nikolay Nikolaevich, Candidate of Technical Sciences LOCATION OF MOBILE OBJECTS BASED…
Batteries for mobile devices and portable appliances. Condition assessment.
#Batteries for mobile devices Batteries for mobile devices and portable devices. Condition assessment. VASILIEV Vladimir Yuryevich It is no secret that the trouble-free operation of mobile devices or devices with…
Batteries. History, technology, reality.
#Battery Batteries. History, technology, reality. Vasiliev Vladimir Yuryevich Petrov Nikolay Nikolaevich, Candidate of Technical Sciences The article attempts to present information about batteries currently used in radio engineering equipment in…
Active protection in vibroacoustic channels.
Requirements for interference generating equipment. In recent years, the development of devices for creating vibration and acoustic interference designed to ensure the protection of speech information from its leakage from…
Acoustic protection of confidential negotiations.
Acoustic protection of confidential negotiations. In the information age, when the principle applies: whoever owns the information, owns the world. There are more than enough people who want to take…
WAVELET video compression algorithm.
Any image entered into a computer is digitized and stored in it in the form of a so-called bitmap or, in other words, a matrix, each element of which describes…
Spectrum analyzer.
Spectrum Analyzers. A good spectrum analyzer is the “workhorse” of the TSCM industry and, when combined with a computer, printer, and vector signal analyzer, will detect any RF eavesdropping devices…
Analysis of paper used to package drugs.
Analysis of paper used to package drugs. The International Criminal Police Review has published an article devoted to issues related to the analysis of paper used to package drugs. Paper…
Analysis of existing regulatory, technical and methodological documents in terms of ensuring the reliability of communication facilities.
Analysis of existing regulatory, technical and methodological documents in terms of ensuring the reliability of communication facilities. An analysis of existing regulatory, technical and methodological documents in terms of ensuring…
Analysis of explosion versions. Domestic explosion or terrorist act?
Analysis of the versions of the explosions. «We live in conditions of the threatening spread of terrorism. And this means — it is necessary to unite all the forces of…
Analysis of the possibilities of preventing leakage of information stored on hard drives.
Analysis of the possibilities of preventing leakage of information stored on hard drives. 1. Introduction The total computerization of the infrastructure of industrialized countries has currently led to the rapid…
Analysis of ATM network security.
Analysis of ATM network security. The article provides an analysis of information security issues in data transmission networks built on the basis of technical means of ATM technology, taking into…
Analog cellular mobile radio communication system of AMPS standards.
Analog cellular system of mobile radio communication of AMPS standards. ANALOG CELLULAR SYSTEM OF MOBILE RADIO COMMUNICATION EMX-2500 BY MOTOROLA FOR AMPS, TAGS, E-TACS, J-TACS STANDARDS 5.1 Structural diagram of…
Antenna-contact method for detecting local objects in concealing environments.
Antenna-contact method for detecting local objects in sheltering environments. A new method for detecting local objects in a semiconducting medium is proposed. The essence of the method is to use…
Intelligence enhancing equipment.
Intelligibility enhancement equipment. Intelligibility enhancement equipment. Intelligibility enhancement equipment. General Provisions. During the process of receiving and recording audio information, interference and noise may occur due to various reasons:…
Hardware for verifying the authenticity of documents based on the optical method of non-destructive testing.
Hardware for verifying the authenticity of documents based on the optical method of non-destructive testing. KEKIN Aleksey Gennadievich, KOVALEV Aleksey Alekseevich, KOVALEV Dmitry Alekseevich, STUDITSKY Aleksandr Sergeevich, FEDOTOV Aleksey…
Automated systems. Protection from unauthorized access to information.
AUTOMATED SYSTEMS PROTECTION AGAINST UNAUTHORIZED ACCESS TO INFORMATION CLASSIFICATION OF AUTOMATED SYSTEMS AND REQUIREMENTS FOR INFORMATION PROTECTION This guideline document establishes the classification of automated systems subject to protection against…
Autonomous power supply for miniature electronic equipment.
Autonomous power supply of miniature radio-electronic equipment. Nizhnikovsky Evgeny Aleksandrovich, candidate of chemical sciences, Serdyukov Petr Nikolaevich, doctor of technical sciences AUTONOMOUS POWER SUPPLY OF MINIATURE RADIO-ELECTRONIC EQUIPMENT The operation…
Ajax-8 is a portable camera.
Ayaks-8 — portable photo camera. The first Soviet portable photo camera «Ayaks-8» was designed in 1948 in a special photo-optical laboratory of the MGB in Moscow for covert photography of…
Federal Bureau of Investigation electronic imaging database.
The Federal Bureau of Investigation's Electronic Image Database. Law Enforcement Technology.- 1996.- November.- P. 56 57. Even before the 1996 Summer Olympics in Atlanta, more than 15,000 color photographs were…