IBM Corporation Denver, CO Successful administrative, finance, sales support, sales management and middle management positionsTelecom Remarketing Corp. of America (TRCA) Denton, TX Account Executive and Sales ManagerZepco Sales & Service, Inc Richardson, TX President and co-owner
Education:
York College York, NE Associate of Science in Business AdministrationLubbock Christian College Lubbock, TX Bachelor of Business Administration
Joel Pat Latham - Arlington TX, US Steven Wayne Belden - Lucas TX, US Greig Stovall Latham - Lucas TX, US Barry Arthur Hall - Bowie TX, US Michael A. Ramsey - Doubleoak TX, US Matt Kyle - Garland TX, US
International Classification:
G08B 13/00 G08B 25/00
US Classification:
340522, 340541, 340550
Abstract:
A security system used to detect, deter, and/or document security events and information from a secured area. The security system may include an intelligence system for distinguishing between false alarms and actual alarm events. The security system may also include multiple deter devices actionable upon detection of an actual alarm event. The security system may further include a security event data collection system that collects event or alarm data pertaining to security events either onsite or remote and a video/camera system that records images of security events.
Joel Pat Latham - Arlington TX, US Steven Wayne Belden - Lucas TX, US Greig Stovall Latham - Lucas TX, US Barry Arthur Hall - Bowie TX, US Michael A. Ramsey - Doubleoak TX, US Matt Kyle - Garland TX, US
International Classification:
H04N 7/18
US Classification:
348155
Abstract:
A security system and network used to detect and deter adverse events in an area to be secured. The security system may include an operator for supervising the area, and a wireless communication system for transceiving data indicative of detection events received from the secured area, wherein the operator can determine if a deter device is to be actuated based on the data. The security system may include an intelligence system for distinguishing between false alarms and actual alarm events, for also actuating a deter device, and for notifying operators. The security system and network may also include a plurality of areas to be secured, wherein each area is serviced by a different wireless hub within the wireless communication system.
Joel Pat Latham - Arlington TX, US Steven Wayne Belden - Lucas TX, US Greig Stovall Latham - Lucas TX, US Barry Arthur Hall - Bowie TX, US Michael A. Ramsey - Double Oak TX, US Matt Kyle - Garland TX, US
International Classification:
H04N 7/18
US Classification:
348155, 348E07085
Abstract:
A method for detecting events/activities at a secured location in which the security method may include an operator and/or determination application for supervising the location, and a transmission network for transceiving data indicative of determined activities of the secured location, wherein the determination application and the operator can initiate a deter device in response to adverse activities. The determination application of the security method may include an intelligence system for distinguishing between normal and adverse conditions. The method may also include an application for the transfer of activity data to a storage device in which operator(s) may access the stored data.