sponsored by Transition Networks, Inc.
Posted:  04 Sep 2008
Published:  04 Sep 2008
Format:  PDF
Length:  8  Page(s)
Type:  White Paper
Language:  English
Video security and surveillance has become increasingly important the last few years, not only as a topic of conversation, but also as a corporate and government strategy reality. Whether retailers are monitoring for shoplifting or employee theft, corporations identifying visitors and employees or monitoring hazardous work areas, governments and municipalities combating street crime and terrorism, casinos preventing cheating and fraud or even homeowner's protecting their families and assets, one cannot deny the benefits of an effective video security system.

In recent years, demand for these applications has increased and technology has advanced so rapidly that there are now a myriad of choices among components. In fact, when one looks only at cameras, we can find many models, each with a specific use for time of day, fixed or pan, tilt and zoom (PTZ) capability, resolution quality, analog or IPbased video, etc. Unfortunately, one common component that is often overlooked in video systems is the quality of the cabling infrastructure used to transport these video images from camera to monitor or from camera to storage device. Designing your video network around coaxial, un-shielded twisted pair (UTP) or fiber-optics will have tremendous impact on the quality, bandwidth and distance capabilities of your video security and surveillance system.

Cassette Tapes | Fiber Optic Cable | LAN | Radio Services | Security | Televisions | Video Equipment | Video Systems

View All Resources sponsored by Transition Networks, Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement