Archive for August, 2010
Monday, August 30th, 2010
Main Points that we consider according to the need to Customers: End users want access control systems to do more than ever before, but don’t necessarily have the funds to invest in a lot of new hardware. Today’s top list of desired features could include many of the following: IP or Web-based — Using the… Read more >>
Posted in Access Control, Biometric Systems, CCTV, Discretionary access control, Information, Integration of security system, Intelligence, iWatch Access Control System, iWatch Visitor Management System, Mandatory access control, TCP/ IP platform, The power of “i” •
6 Comments »
Wednesday, August 25th, 2010
In a normal security system setup, one depends on the guard-on-duty to be watching the video from different cameras, looking for any abnormal activity. With Video Analytics, we wake up the guard when there is an abnormal event. Simplest example of such an event is when there is “Motion” in the field of view of… Read more >>
Tags: egomotion estimation, Video Analytics, video tracking
Posted in Access Control, Biometric Systems, CCTV, Information, Intelligence, iWatch Access Control System, iWatch Visitor Management System •
22 Comments »
Monday, August 23rd, 2010
A motion detector security camera is a device that captures video or still images and is activated by motion within a targeted area. This prevents hours of footage being gathered of nothing happening, while activating the device when people, vehicles, or animals come into or move through an area. These devices can be used both… Read more >>
Tags: motion detection technique, Motion Sensor, What is Motion Detection
Posted in Access Control, Biometric Systems, CCTV, Information, Integration of security system, Intelligence, iWatch Access Control System, TCP/ IP platform, The power of “i” •
25 Comments »
Friday, August 13th, 2010
LED stands for Light Emitting Diode. Basically is comes under the category of Semiconductors as because they are used in Electronics and in Printed Circuit Board. In the past days LEDs was of very less intensity and with only one color, but now a days different types of LEDs are available having different types of… Read more >>
Posted in Access Control, Biometric Systems, Discretionary access control, Information, Intelligence, iWatch Access Control System, The power of “i” •
No Comments »
Thursday, August 5th, 2010
The Wiegand Reader-to-Controller Interface: An interface defines how two devices communicate with one another. Various readers can communicate with access control panels using a variety of well-established, industry-standard interfaces including: • Wiegand • Serial (RS232, RS422, RS485) • Clock-and-Data (Magnetic Stripe Track/2) – Also known as ABA format. We will concentrate on the Wiegand interface… Read more >>
Tags: 26bit format, Card Reader, Weigand Interface, weigand protocol, Weigand Reader to Controller Interface
Posted in Access Control, Discretionary access control, Information, Intelligence, iWatch Access Control System, iWatch Visitor Management System, Mandatory access control, TCP/ IP platform, The power of “i” •
2 Comments »
Monday, August 2nd, 2010
The term Weigand is applied to several characteristics related to Access Control readers and cards. Unfortunately, the word is often used very carelessly and can lead to unnecessary confusion. Here are the basic facts: Weigand is: 1. A specific reader-to-Card Interface. 2. A specific binary reader-to-Controller Interface. 3. An electronic signal carrying data. 4. … Read more >>
Tags: 26 bit binary card data format, access control, card technology, security panels, weigand protocol
Posted in Access Control, Biometric Systems, Discretionary access control, Intelligence, iWatch Access Control System, iWatch Visitor Management System, Mandatory access control, The power of “i” •
90 Comments »