Axis Communications

Displaying 1 - 5 of 5 results

  • Night Lessons - Lighting for Network Cameras

    White Papers // Jun 2012 // provided by Axis Communications

    Network camera experts - Axis, and CCTV lighting specialists - Raytec, held a series of test nights throughout the dark winter months of 2011 and 2012. The test nights were designed to help all security professionals tackle some of the most common practical issues when using lighting in conjunction with ...

    Download Now
  • Shielded or Unshielded Network Cables

    White Papers // Mar 2012 // provided by Axis Communications

    All electric and electronic devices emit electromagnetic energy, also referred to as Radio Frequency emission or RF emission. RF emissions are a byproduct of electrical or magnetic activity. Unfortunately, the emissions from one device can interfere with other devices and could potentially cause problems. Interference can lead to data loss, ...

    Download Now
  • Thermal Network Cameras

    White Papers // Nov 2011 // provided by Axis Communications

    Thermal cameras have many advantages, such as allowing users to detect people, objects and incidents in complete darkness and difficult conditions such as smoke, haze, dust and light fog. Eliminating the need for flood lights, they reduce light pollution. In addition, a thermal camera is a reliable platform for integrating ...

    Download Now
  • 10 Strategies To Maximize Store Productivity

    White Papers // Jan 2010 // provided by Axis Communications

    When it comes to in-store business intelligence, retailers can now literally remove the blindfold that has been holding them back. With the use of real-time, affordable visual intelligence, today's retailers can clearly see the path to understanding daily activity in the store and maximizing the use of every square foot. ...

    Download Now
  • IEEE802.1X and Axis? Implementation

    White Papers // Dec 2009 // provided by Axis Communications

    Network security is a very important issue in the IP world. There are different levels of security when it comes to securing information being sent over IP networks. The first level is authentication and authorization. The user or device identifies itself to the network and the remote end by a ...

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?