Archive by Author
IP CCTV high level integration to software house access control and security

Software House Certifies IndigoVision Integration

IndigoVision, leading manufacturer of end-to-end security solutions, releases a new integration module for Software House C•CURE 9000 access control. This supports C•CURE 9000 versions 2.0 and 2.01 and has been tested and certified by Software House for use with SMS 4, IndigoVision’s Security Management System platform.   This integration allows events and alarms from C•CURE […]

NASA Astronaut Visit IndigoVision's office

NASA makes a show at Edinburgh HQ

recent visit to IndigoVision, the Edinburgh-based IP Video Security solutions manufacturer, was a remarkable event for the company. Nicole was a crew member on the historic 39th and final mission of space shuttle Discovery in February 2011, a 13-day flight to the (ISS). She has had a distinguished career in NASA and as an engineer […]

720p Zoomed

Why your $800 lead will spend $3000 with me

The sales fight to the lowest price is a common occurrence in the video surveillance industry and I won’t participate in it. In fact I would rather walk away from the sale than enter this market. Why would I turn down a sale? Because I know in most applications, the $800 system just won’t work!I […]

Soloshot2 tracking camera

Imaging if this was a CCTV product!

I know we can do similar with tracking PTZ cameras but I just thought this was so cool I had to share it. It’s called the SoloShot2 and it works but tracking a transponder (Tag in their terms) that you carry and the camera will follow. You can even tell the camera to start, stop and […]

effectiveness of CCTV cameras

57 Channels and Nothing on – Why Your CCTV Is Not Working

In 1992 Bruce Springsteen released the song 57 Channels (and Nothin’ On). Back then I was in the 4th year of my electronics apprenticeship in the security industry and CCTV cameras were only for the rich – high risk companies such as banks. I feel the level of professionalism around the installation and positioning of […]

Weak security alarm code 1970

The 5 Most Used Password in the past 4 Years – and How to Remember a Better One

Over the past 4 years the most used passwords in the world have been identified. It turns out that some people are just plain stupid with what they consider to be a password and over the 4 year period, the top 5 have remained almost consistent.  So before you find out if you are in the stupid […]

The result of a 4K CCTV camera in a car park

The Best CCTV Design for Video Surveillance of Open Car Parks

Camera in outdoor car parks catch heaps of action but are typically  – well – useless for evidence.  Their intent is typically used to observe behavior and be a visual deterrent. Activities of interest include vandalism, loitering, theft, assault and carpark misuse but in reality, for most installations I have reviewed, you would have more […]

Window Cleaner security breach

Can You Stop A Terrorist – Reassessing Security Plans

I just found this post relating to facility management and Reassessing Security Plans as Terrorist Networks Become Decentralized. While not talking specifics, there are aspects of all forms of security that can be implemented to improve your overall awareness of who is accessing your building without authorisation. The reality is your biggest weakness in your buildings […]

Factory Acceptance Test

What is a FAT?

In a recent meeting with a builder and a consultant, we were talking about the early stages of a project’s time line what the term FAT came up between myself and the consultant. The builder spoke up asking “what is a FAT?” A FAT stands for a Factory Acceptance Test. A process where you build […]


6 ways to use the CCTV Design tool to improve your surveillance system

In the coming weeks we will be starting a new series of posts on how to use a CCTV CAD software to improve your CCTV system design What to know when getting started with a CCTV design CAD software Defining the scene type and best resolution How to design a CCTV system to reliably identify […]