
This rate of change is often mirrored in the high-tech security industry, especially CCTV, which means that a technical specification could be obsolete as soon as the ink is dry on the paper! Many are the security managers who have specified obsolete equipment, or who have found themselves the “beta testbed” for unproven new technology.
The solution, as delegates on the recent Security Management Stage 2 learned, is - unless there is a very strong case for the contrary - always to use a functional specification and to deal with a reputable system integrator. Of course, if you are happy with the terms ABF, HAD CCD, CMOS, 40pcs of IR LEDs, TVL, SNR, F1.2, VD2, VBS, ADNR, H.264, dual stream, DDNS support, 10/100BASE-T, DHCP, ARP, DNS and ICMP – and the dynamic interaction of each – go ahead and tech-specify!
The next Security Management Stage 2 Course, when the trainers will attempt to demystify this jargon, takes place 15-26 October.