Archive for the ‘TCP/ IP platform’ Category
Monday, August 8th, 2011
CCTV video baluns, also known as UTP baluns, allow traditional coax cable to be replaced by (category 5) CAT5 and other forms of twisted pair wire in CCTV video camera & surveillance installations. Video baluns allow installers to use more cost effective structured cabling techniques to wire security cameras. By using video baluns, UTP (unshielded… Read more >>
Posted in Access Control, CCTV, Intelligence, iWatch Access Control System, iWatch Visitor Management System, Mandatory access control, TCP/ IP platform, The power of “i”, Video Surveillance •
No Comments »
Friday, July 1st, 2011
The BA-220 DualBeam Barcode Reader easily handles the harsh environmental conditions typical at roads and vehicle entrances. The unit is immune to interference or glare from the Sun as well as radio frequency interference from cell phones, radio antennas, power lines and microwave towers. The primary purpose of the BA-220 DualBeam Barcode Reader is to… Read more >>
Posted in Access Control, Discretionary access control, Intelligence, iWatch Access Control System, iWatch Visitor Management System, Mandatory access control, RFID, TCP/ IP platform, The power of “i” •
No Comments »
Wednesday, June 1st, 2011
A fingerprint scanner is an intelligent device which takes place of a human analyst by collecting a Fingerprint sample and comparing it to other samples on record. It has optical scanners and detectors which scans and record the unique pattern of Fingerprint ridges on the skin. A fingerprint scanner system has two basic objectives: (1)…. Read more >>
Posted in Access Control, Biometric Systems, Discretionary access control, Intelligence, iWatch Access Control System, iWatch Visitor Management System, TCP/ IP platform •
3 Comments »
Monday, May 2nd, 2011
What is Barcode: A barcode is an optical machine-readable representation of data. Barcodes represent data by varying the widths and spacing of parallel lines, and may be referred to as linear or 1 dimensional. Barcodes originally were scanned by special–optical scanners called barcode readers, scanners and interpretive software are available on devices including desktop printers…. Read more >>
Posted in Access Control, Discretionary access control, Information, Intelligence, iWatch Visitor Management System, TCP/ IP platform •
1 Comment »
Friday, April 1st, 2011
Features of Video Server: A good video server records, stores, and plays back multiple streams of video without any degradation in the video signal. Broadcast quality video servers often store hundreds of hours of compressed audio and video, play out multiple and synchronized simultaneous streams of video, and offer quality interfaces such as Serial Digital… Read more >>
Posted in Access Control, Biometric Systems, CCTV, Integration of security system, iWatch Access Control System, iWatch Visitor Management System, TCP/ IP platform, The power of “i”, Video Surveillance •
No Comments »
Thursday, March 3rd, 2011
The science of measurement and analysis of biological data is known as biometrics. The biological data mainly refers to certain unique characteristics of the human body. These characteristics include fingerprints, eye retinas and irises, DNA, facial patterns, voice patterns, hand measurements etc. They serve as excellent parameters for biometrics due to the fact that they… Read more >>
Posted in Access Control, Biometric Systems, Integration of security system, Intelligence, iWatch Visitor Management System, Mandatory access control, TCP/ IP platform, The power of “i” •
No Comments »
Wednesday, January 26th, 2011
WHAT IS PROXIMITY CARD: In the world of Security System and Access Control, Contactless Proximity Card plays a very vital role. Proximity cards are a custom programmed item. Many companies and organizations use proximity cards for their access control system as well as for the Identification of employees. iWatch Systems offers a wide range of… Read more >>
Posted in Access Control, Discretionary access control, Intelligence, iWatch Access Control System, iWatch Visitor Management System, Mandatory access control, TCP/ IP platform, The power of “i” •
No Comments »
Monday, December 13th, 2010
What is Fiber Optics: Data is of no use if the storage and transmission is not proper, transmission of Data is the main concern behind every Security System. An administrator can access and control his/her system from a long distance across seas. The long distance data transmission requires a special channel. One of the long… Read more >>
Posted in Access Control, Information, Integration of security system, Intelligence, Mandatory access control, TCP/ IP platform •
No Comments »
Thursday, December 9th, 2010
Serial transmission technology is increasingly used for the transmission of digital data. A large number of up-to-date communications networks apply serial transmission. The numerous applications include computer networks for office communications, Access Control, building and manufacturing automation, Internet etc. Serial data transmission implies that one bit is sent after another (bit-serial) on a single transmission… Read more >>
Posted in Access Control, Biometric Systems, Information, Integration of security system, Intelligence, iWatch Access Control System, iWatch Visitor Management System, TCP/ IP platform, The power of “i” •
2 Comments »
Friday, October 29th, 2010
Over the years, the use of thermal cameras has expanded. Once widely used only for surveillance and security, the current technology has made these cameras serve many other useful purposes. The infra red technology which detects heat energy can detect the minute temperature changes and this is generated as an image on a screen. The… Read more >>
Posted in Access Control, CCTV, Information, Intelligence, iWatch Access Control System, iWatch Visitor Management System, TCP/ IP platform, The power of “i” •
1 Comment »