Account
Please wait, authorizing ...

Don't have an account? Register here today.

×

Assimilation of Technology

Every security professional should be clear about the evolution of technology in this area, especially those that involve new developments with wireless technology.

by Horacio Cantú

Much has been said about technological convergence and the risks that ignorance of the technologies involved in this convergence represents for security companies.

On this occasion I will talk specifically about wireless technology, and I am not referring to the way in which the security industry has been using this technology for many years, and which has a very high level of security; but I refer to wireless transmission methods that involve the service of a third party, usually a cellular company whose business focus is on generating airtime and data consumption and not precisely the security of these.

That is, when we occupy data lines transmitted via cell phone, there is no guarantee of anything, it is enough to read the contract for the provision of services and realize it; However, we continue to transmit data from security systems despite all this and there is a good reason for this, because it is the cheapest and most effective option for now, and that is what I want to talk about on this occasion: the assimilation of technology related to the evolution that it has in relation to with security solutions, and the real risk that represents that the vast majority of security professionals are not able to express to their customers the limitations of these technologies, by not knowing the scope and real limitations of these.

Technological evolution

- Publicidad -

Now, evolution is in spite of this, it occurs and does not stop, much of this is explained in the book The Earth is Flat, by the American journalist Thomas Friedman, where he exposes in an unbeatable way this technological evolution its scope and risks; I consider this a must-read for every security and technology professional.

One of the central themes is the connectivity that leads man to form global communities just by being connected to the Internet or to global companies regardless of their infrastructure. Evolution involves moving forward despite problems and difficulties, tolerating failures and deviations, the assimilation of this way of thinking opens our eyes to what is to come and how we should assimilate it.

On one occasion an aircraft manufacturer was asked why airplanes fall, to which he replied: "everything that man does is susceptible to failure", or we can also see what a well-known character in the computer area answered when asked how many types of computer users had said: "there are two types of computer users, those who are about to lose their data and those who have already lost it"; not because an airplane falls we are going to stop using them, or because someone loses their data we are going to stop using computers, we will continue to do it even if they continue to fail, what is a reality is that they fail less and less and this reaches the security systems transmitted by cellular means.

The assimilation of conscious and knowledge-based technology, makes us move away from being carried away by evolution with a series of fears or overconfidence, so we become participants and not only spectators, technology is not only related to technique, it is only a part.

Food technology involves the plate and cutlery; we could go back to the principles of humanity and make an evolutionary chronology about this, touching on topics from rudimentary tools to eat to the cutlery we currently have, through eating habits and everything they can think of. The same happens with the technological evolution in security, we must be aware that the evolution we are living modifies the way of working and thinking in relation to security, we develop the necessary knowledge about our activity to dimension in a clear way the opportunities and risks of our profession, that is our responsibility.

Let's start with being aware and continue to specialize in the areas of Information Technology and telecommunications, today it is a market requirement, if we do not do it like this, we run the worst of risks, that our client knows more than us.

Julián Arcila Restrepo
Author: Julián Arcila Restrepo
Chief Marketer
Communications professional, MBA, specialized in designing and executing successful Public Relations and Digital Marketing campaigns with more than 14 years of experience in areas related to communications.

No thoughts on “Assimilation of Technology”

• If you're already registered, please log in first. Your email will not be published.

Leave your comment

In reply to Some User
Suscribase Gratis
SUBSCRIBE TO OUR ENGLISH NEWSLETTER
DO YOU NEED A SERVICE OR PRODUCT QUOTE?
LATEST INTERVIEWS

Webinar: NxWitness el VMS rápido fácil y ultra ligero

Webinar: Por qué elegir productos con certificaciones de calidad

Por: Eduardo Cortés Coronado, Representante Comercial - SECO-LARM USA INC La importancia de utilizar productos certificados por varias normas internacionales como UL , Ul294, CE , Rosh , Noms, hacen a tus instalciones mas seguras y confiables además de ser un herramienta más de venta que garantice nuestro trabajo, conociendo qué es lo que certifica cada norma para así dormir tranquilos sabiendo que van a durar muchos años con muy bajo mantenimiento. https://www.ventasdeseguridad.com/2...

Webinar: Anviz ONE - Solución integral para pymes

Por: Rogelio Stelzer, Gerente comercial LATAM - Anviz Presentación de la nueva plataforma Anviz ONE, en donde se integran todas nuestras soluciones de control de acceso y asistencia, video seguridad, cerraduras inteligentes y otros sensores. En Anviz ONE el usuario podrá personalizar las opciones según su necesidad, de forma sencilla y desde cualquier sitio que tenga internet. https://www.ventasdeseguridad.com/2...

Webinar: Aplicaciones del IoT y digitalización en la industria logística

Se presentarán los siguientes temas: • Aplicaciones del IoT y digitalización en la industria logística. • Claves para decidir el socio en telecomunicaciones. • La última milla. • Nuevas estrategias de logística y seguimiento de activos sostenibles https://www.ventasdeseguridad.com/2...

Sesión 5: Milestone, Plataforma Abierta que Potencializa sus Instalaciones Manteniéndolas Protegidas

Genaro Sanchez, Channel Business Manager - MILESTONE https://www.ventasdeseguridad.com/2...
Load more...
SITE SPONSORS










LATEST NEWSLETTER
Latest Newsletter