Archive for the ‘The power of “i”’ Category
Wednesday, August 25th, 2010
In a normal security system setup, one depends on the guard-on-duty to be watching the video from different cameras, looking for any abnormal activity. With Video Analytics, we wake up the guard when there is an abnormal event. Simplest example of such an event is when there is “Motion” in the field of view of… Read more >>
Tags: egomotion estimation, Video Analytics, video tracking
Posted in Access Control, Biometric Systems, CCTV, Information, Intelligence, iWatch Access Control System, iWatch Visitor Management System •
22 Comments »
Monday, August 23rd, 2010
A motion detector security camera is a device that captures video or still images and is activated by motion within a targeted area. This prevents hours of footage being gathered of nothing happening, while activating the device when people, vehicles, or animals come into or move through an area. These devices can be used both… Read more >>
Tags: motion detection technique, Motion Sensor, What is Motion Detection
Posted in Access Control, Biometric Systems, CCTV, Information, Integration of security system, Intelligence, iWatch Access Control System, TCP/ IP platform, The power of “i” •
25 Comments »
Friday, August 13th, 2010
LED stands for Light Emitting Diode. Basically is comes under the category of Semiconductors as because they are used in Electronics and in Printed Circuit Board. In the past days LEDs was of very less intensity and with only one color, but now a days different types of LEDs are available having different types of… Read more >>
Posted in Access Control, Biometric Systems, Discretionary access control, Information, Intelligence, iWatch Access Control System, The power of “i” •
No Comments »
Thursday, August 5th, 2010
The Wiegand Reader-to-Controller Interface: An interface defines how two devices communicate with one another. Various readers can communicate with access control panels using a variety of well-established, industry-standard interfaces including: • Wiegand • Serial (RS232, RS422, RS485) • Clock-and-Data (Magnetic Stripe Track/2) – Also known as ABA format. We will concentrate on the Wiegand interface… Read more >>
Tags: 26bit format, Card Reader, Weigand Interface, weigand protocol, Weigand Reader to Controller Interface
Posted in Access Control, Discretionary access control, Information, Intelligence, iWatch Access Control System, iWatch Visitor Management System, Mandatory access control, TCP/ IP platform, The power of “i” •
2 Comments »
Monday, August 2nd, 2010
The term Weigand is applied to several characteristics related to Access Control readers and cards. Unfortunately, the word is often used very carelessly and can lead to unnecessary confusion. Here are the basic facts: Weigand is: 1. A specific reader-to-Card Interface. 2. A specific binary reader-to-Controller Interface. 3. An electronic signal carrying data. 4. … Read more >>
Tags: 26 bit binary card data format, access control, card technology, security panels, weigand protocol
Posted in Access Control, Biometric Systems, Discretionary access control, Intelligence, iWatch Access Control System, iWatch Visitor Management System, Mandatory access control, The power of “i” •
90 Comments »
Friday, July 30th, 2010
Computer is the backbone of Security System as because it can store, manage and Simplify the toughest job. In the setup of a Computer, several peripherals are used such as Printer, Scanners, Keyboard, Mouse, Speaker and other input & output devices. Wired Communication is very common from several years till today. It requires a long… Read more >>
Posted in Access Control, Biometric Systems, CCTV, Discretionary access control, Information, Integration of security system, Intelligence, Mandatory access control, TCP/ IP platform •
114 Comments »
Tuesday, July 27th, 2010
iWatch System’s Technical Blog provides the basic knowledge of electronics, knowledge of Computer including their configuration, management and server environment, as well as the all new feature of iWatch Access Control Panel, expansion Board, LCD, Relays etc and etc.. RSS: By using RSS it will be more easy for an end user to browse through… Read more >>
Posted in Access Control, Discretionary access control, Information, Integration of security system, Intelligence, iWatch Access Control System, The power of “i” •
13 Comments »
Monday, July 26th, 2010
iWatch Access Control Panel provides an ultimate Security Solution. It supports various modes of Surveillance including Video Surveillance, Access Control, Time and Attendance, Visitor Management. The iWatch Access Control Panel is the Master Controller and can be used anywhere in the open environment for Security purpose. Since the panel consists of semiconductors and delicate circuitry… Read more >>
Posted in Access Control, Biometric Systems, CCTV, Discretionary access control, Integration of security system, Intelligence, iWatch Access Control System, iWatch Visitor Management System, Mandatory access control, TCP/ IP platform, The power of “i” •
8 Comments »
Friday, July 23rd, 2010
Data is the most important part in the Security System, as it contains the complete information including the Sound and Video. Most of the CCTV and other live video monitoring system can produce high resolution data, because of that they require more storage space in comparison to low quality Video. Today the amount of data… Read more >>
Posted in Access Control, Biometric Systems, CCTV, Intelligence, iWatch Access Control System, iWatch Visitor Management System, Mandatory access control, TCP/ IP platform, The power of “i” •
20 Comments »
Wednesday, July 21st, 2010
The best feature of iWatch Access Control Panel is that it depends on the TCP/IP and it can be controlled from anywhere around the globe. The connectivity is provided with the help of cable. The cable is of normal CAT 5E standard type. As the Panel is directly communicating with the network peripherals it must… Read more >>
Posted in Access Control, Biometric Systems, Discretionary access control, Information, Intelligence, iWatch Access Control System, Mandatory access control, TCP/ IP platform •
18 Comments »