Digital Security and Surveillance

Latest ideas for digital surveillance and security systems, including smart cameras, network video recorders, and storage systems

  • From Windows CE to an IoT RTOS

    From Windows CE to an IoT RTOS

    Read White Paper
  • ×

    Get the latest updates on IoT for digital security and surveillance.

    Country/Region
    Subscribe To Intel Updates
    Subscribe To Alliance Partner Updates
    By submitting a form on this site, you are confirming you are an adult 18 years or older and you agree to Intel and Intel® IoT Solutions Alliance members contacting you with marketing-related emails or by telephone. You may unsubscribe at any time. Intel's web sites and communications are subject to our Privacy Notice and Terms of Use.
    You are following this topic.
    Error - something went wrong!
  • Choosing Between the Intel® Xeon® D Processor and Intel® Xeon® Processor E5 for Embedded Applications

    Choosing Between the Intel® Xeon® D Processor and Intel® Xeon® Processor E5 for Embedded Applications

    Intel’s Xeon D and Xeon E5 families share a number of common features and CPU architectures. But there are important differences between the two...

    Read Article
  • Stop By Booth 3A-507 and Find Out Where the Future of IoT Is Heading

    Stop By Booth 3A-507 and Find Out Where the Future of IoT Is Heading

    Read Article
  • Make Rugged IoT Computing Cost-Effective

    Make Rugged IoT Computing Cost-Effective

    Designers of computing solutions for signage, industrial control, automation, and other IoT applications have ruggedness, space, performance, and reli...

    Read Article
  • Use Intel® SSF to Remove Bottlenecks to AI

    Use Intel® SSF to Remove Bottlenecks to AI

    Machine learning and AI push the limits of processing, data transport, and storage. To achieve performance and scalability while containing cost, desi...

    Read Article
  • 6 Things to See at embedded world

    6 Things to See at embedded world

    If you’re going to embedded world, you’ll want to check out the latest offerings from the 6 leading companies in the hardware and software...

    Read Article
  • "Zero Touch" IoT Security Is Key to Continued Growth

    "Zero Touch" IoT Security Is Key to Continued Growth

    By now it’s clear that the IoT will miss the much-touted target of 50B connected devices by 2020. The problem? IT managers are so worried about secu...

    Read Article
  • How Amazon Does Scalable Security on a Budget

    How Amazon Does Scalable Security on a Budget

    The need for security is well known, as are the means of achieving it. What’s less well recognized are the internal struggles within a company to ge...

    Read Article
  • GE Predix and LEDs Combine to Simplify IoT Deployment

    GE Predix and LEDs Combine to Simplify IoT Deployment

    Developers across industries are tasked with using the IoT to reduce downtime, increase operational efficiency, and lower cost. At the same time, they...

    Read Article
  • Self-Contained Edge Analytics and Sensor Connectivity

    Self-Contained Edge Analytics and Sensor Connectivity

    To deploy fog computing, analytics intelligence must be redistributed from the cloud to the edge. This implies a redistribution of processing resource...

    Read Article
  • Build an IoT Mobile App with a Few Clicks

    Build an IoT Mobile App with a Few Clicks

    The IoT gives us the ability to monitor and control connected embedded systems through mobile apps, which almost anyone can access with their smartpho...

    Read Article
  • Market Opportunities for IP Cameras in the Internet of Things

    Market Opportunities for IP Cameras in the Internet of Things

    Read White Paper
  • Solar-Powered Cameras Simplify Surveillance

    Solar-Powered Cameras Simplify Surveillance

    The surveillance market has traditionally been limited to locations where power and connectivity were easily accessible. For outdoor systems, that mea...

    Read Article
  • IoT Security Must Be Baked In, Not Bolted On

    IoT Security Must Be Baked In, Not Bolted On

    For device integrity, data protection, and device management, do-it-yourself (DIY) security won’t cut it – even if you’re a seasoned engineer. R...

    Read Article
  • The Need for IoT Advanced Security: Why Do-It-Yourself Isn’t Enough for IoT

    The Need for IoT Advanced Security: Why Do-It-Yourself Isn’t Enough for IoT

    Read White Paper
  • Advancing Transit System Security: IoT Enabled COTS Platforms for Intelligent, Data-Driven Video Surveillance

    Advancing Transit System Security: IoT Enabled COTS Platforms for Intelligent, Data-Driven Video Surveillance

    Read White Paper
  • Using Skylake-SP LGA Devices in Rugged Environments

    Using Skylake-SP LGA Devices in Rugged Environments

    Read White Paper
  • 5 Secrets to IoT Software Success

    5 Secrets to IoT Software Success

    Read White Paper
  • Double AI Performance in Surveillance Servers

    Double AI Performance in Surveillance Servers

    AI and machine learning are usually executed in the data center, where compute resources are plentiful. But for surveillance systems, this model contr...

    Read Article
  • Type 7 Modules Solve Complex IoT Edge-Node Processing Matrix

    Type 7 Modules Solve Complex IoT Edge-Node Processing Matrix

    The COM Express 3.0 Type 7 pinout removes display and audio interfaces in favor of 10GbE ports – making a great fit for headless servers. Add the ad...

    Read Article
  • loading
    Loading More...