Bailey Systems Blog

Thermal Imaging to Screen for COVID-19

August 27th, 2020 8:13 am

An article from our friends @ The Leading Edge –
Several LeadingAge Provider Members have inquired about temperature check and thermal monitoring systems to help screen residents, staff, and visitors for fevers that may indicate COVID-19. CAST Executive Director Majd Alwan, Ph.D., has provided guidance to help you review your More >

Posted in Blog

Thermal Cameras and COVID – 19 (Department of Defense)

August 18th, 2020 2:25 pm

Thermal imaging uses heat signatures to form an image or video based on differences of temperature.
As part of the COVID-19 response, three Army programs — the Army Rapid Equipping Force, Program Executive Office Soldier and the C5ISR Center of U.S. Army Combat Capabilities Development Command — led the initiative to More >

Posted in Blog

Cat6 vs Cat7 vs Cat8 Cable: What’s the Difference?

March 12th, 2020 2:23 pm

As we know, Ethernet cable can be divided into many types such as Cat5, Cat5e, Cat6, Cat6a, Cat7, Cat8, etc. However, not everyone knows the exact difference between them on the comparison of Cat6 vs Cat7, Cat7 vs Cat8, etc. Therefore, many people are at a loss on More >

Posted in Blog

5G is coming to your home or business sooner than you think

February 25th, 2020 7:59 am

5G is a hot topic right now, and it is already here! T-Mobile has 5G available throughout Virginia, and Verizon has extended 5G through areas of Washington, DC and is adding more every day.
It may still be little soon to upgrade all of your telecommunications devices, but we’ll More >

Posted in Blog, News

Conference room cable management: make a great impression

November 5th, 2019 8:30 am

If you have an office space, then you have a conference room (or several). Conference rooms are a hub. They’re the place where you meet with clients and where colleagues gather to collaborate. They make an impression on everyone who uses them. The conference room cable management system is More >

Posted in Blog, network cabling, office design

3 Must Have Technology Tools for Office Hoteling

October 22nd, 2019 8:28 am

Office hoteling is the future for business that want to attract a mobile workforce, reduce their carbon footprint, and save money by reducing the amount of office space they have. Many business focus on the space design, which is critical. But equally critical is the technology for office hoteling More >

Posted in Blog, office design

3 ways to take your conference room to the next level

October 8th, 2019 9:42 am

Conference room technology is about more than cable management (which we discussed in Conference room cable management: make a great impression). Cabling helps make your conference room atheistically pleasing and safe—both of which are good. Now here is what to do to take your conference room to the next More >

Posted in Blog

IT requirements for your mobile workforce office design

September 17th, 2019 6:43 am

As companies search for mobile workforce solutions, open offices are a popular choice for the office design solution. Open offices with their hoteling features provide a place for workers to land and have easy access to the technology they need.
According to the Commercial Buildings Energy Consumption Survey that office More >

Posted in Blog

The importance of network access control

July 30th, 2019 7:35 am

It’s almost impossible to imagine a business that does NOT have an IT network these days. In fact, I can’t think of a single one. Computer networks, and the amazing software tools they enable, make doing business significantly more efficient than it was when I entered the workforce. The More >

Posted in Blog, Security

What computer security access controls do I need?

July 11th, 2019 7:30 am

To grant access or not grant access. That is the question… at least when it comes to computer security. If you haven’t been paying attention to access control, now is the time to start. Computer and network security hinge on having the appropriate access controls in place to protect your More >

Posted in Blog, Security

« Older Entries