Search

security systems - search results

Filter by Categories

Ever Thought of Starting A Venture of Your Own?

Looking for a job today, that too in one of the core industries, in the current environment seems like an uphill task. Even among...

Which Wireless Technology Should You Use?

  There are a large number of wireless technologies available, both standardised and proprietary. Having assessed the most used technologies (to ensure a decent level...

Wi-Fi Embedded Webcam

This project is built around an MRF24WBOMA Wi-Fi module, a PIC microcontroller and a camera module using the TCP-IP protocol. The camera captures live...

The New world of Plasma Antennas

Transmission and reception of electromagnetic waves have become an integral part of the present day civilisation. Antenna is an essential device for this process....

Countdown to True Wireless Broadband 2, 2.5, 3, 3.5… 4G!

AUGUST 2011: Of late, there appears to be more talk about looters than routers, and amidst burgeoning news about money made and lost, the...

Analogue Design: A Challenging But Satisfying Option

With good understanding and skills in areas such as custom circuit layout, electrical design and simulation, analogue designers plan, organise, execute and document as...

“The traditional challenge of getting everything to go faster, hasn’t eased up a bit”

Q. What is the major challenges facing T&M players today and how are you trying to circumvent it? A. One would be the traditional...

How Secure is your GSM network?

The idea of cell-based mobile radio systems originated at Bell Laboratories, USA, in the early 1970s. However, mobile cellular systems were not introduced for...

Why Global Tech Companies Are Setting Up R&D Centers in India

Today, India is looked at as one of the cheapest R&D destinations with highly talented engineers. The setting up of an R&D base by...

How to Secure your Laptop

Just having your laptop locked up in a laptop bag is not enough to deter thieves. You need to have certain measures in place...