Archive for the ‘Intelligence’ Category

READER TO CONTROLLER INTERFACE

Thursday, August 5th, 2010

The Wiegand Reader-to-Controller Interface: An interface defines how two devices communicate with one another. Various readers can communicate with access control panels using a variety of well-established, industry-standard interfaces including: • Wiegand • Serial (RS232, RS422, RS485) • Clock-and-Data (Magnetic Stripe Track/2) – Also known as ABA format. We will concentrate on the Wiegand interface… Read more >>

Tags: , , , ,

Understanding WEIGAND

Monday, August 2nd, 2010

 The term Weigand is applied to several characteristics related to Access Control readers and cards. Unfortunately, the word is often used very carelessly and can lead to unnecessary confusion. Here are the basic facts:   Weigand is: 1.      A specific reader-to-Card Interface. 2.      A specific binary reader-to-Controller Interface. 3.      An electronic signal carrying data. 4.     … Read more >>

Tags: , , , ,

Integration of BLUETOOTH with SECURITY SYSTEM

Friday, July 30th, 2010

Computer is the backbone of Security System as because it can store, manage and Simplify the toughest job. In the setup of a Computer, several peripherals are used such as Printer, Scanners, Keyboard, Mouse, Speaker and other input & output devices.  Wired Communication is very common from several years till today. It requires a long… Read more >>

RSS and iWatch Systems

Tuesday, July 27th, 2010

iWatch System’s Technical Blog provides the basic knowledge of electronics, knowledge of Computer including their configuration, management and server environment, as well as the all new feature of iWatch Access Control Panel, expansion Board, LCD, Relays etc and etc.. RSS: By using RSS it will be more easy for an end user to browse through… Read more >>

ENCLOSURE (Indoor/Outdoor)

Monday, July 26th, 2010

iWatch Access Control Panel provides an ultimate Security Solution. It supports various modes of Surveillance including Video Surveillance, Access Control, Time and Attendance, Visitor Management. The iWatch Access Control Panel is the Master Controller and can be used anywhere in the open environment for Security purpose. Since the panel consists of semiconductors and delicate circuitry… Read more >>

IWatch Technical Expert View: BACKUP

Friday, July 23rd, 2010

Data is the most important part in the Security System, as it contains the complete information including the Sound and Video. Most of the CCTV and other live video monitoring system can produce high resolution data, because of that they require more storage space in comparison to low quality Video. Today the amount of data… Read more >>

CONNECTING CABLE (CAT 5E, CROSS OVER)

Wednesday, July 21st, 2010

The best feature of iWatch Access Control Panel is that it depends on the TCP/IP and it can be controlled from anywhere around the globe. The connectivity is provided with the help of cable. The cable is of normal CAT 5E standard type. As the Panel is directly communicating with the network peripherals it must… Read more >>

SURGE PROTECTION (Secure the Security)

Wednesday, July 21st, 2010

A surge protector also known as surge suppressor is an appliance designed to protect electrical devices from voltage spikes. A surge protector attempts to regulate the voltage supplied to an electric device by either blocking or by shorting to ground voltages above a safe threshold. A power surge, or transient voltage, is an increase in… Read more >>

UPS (Backup your Security System)

Wednesday, July 21st, 2010

Computers are the brains of todays security systems totally depend on the Computers and high end server.  Without that computer you can be in serious trouble.  For this reason a UPS is must for the protection of your critical security system. A UPS or Uninterruptible Power Supply, is simply a battery backup system that will… Read more >>

iWatch technical Expert view: OPERATING ENVIRONMENT

Monday, July 19th, 2010

No matter how small or how big the Security System is, the heart of all Security System is Computer. Computer is the master regulator or chief controller behind the Setup of Security System. Since there are several delicate components like Microprocessor, chips etc & etc, a proper environment is required for their normal function. Overheating… Read more >>