iWatch Technical Experts View: How to choose a DVR for CCTV applications ?

Posted on July 14th, 2010 by Ron Gibson

   1. Number of channels: Most DVRs are classified by the number of channels or cameras that can be connected. Typical configuration are 1,4,9 or 16 channels. Consider carefully how many cameras are required, both now and in the future. It is sensible to pay a little more now and have room for expansion at… Read more >>

LCD (Trim Pot)

Posted on July 13th, 2010 by Ron Gibson

Presence of LCD is an attractive feature of iwatch Access Control Panel. LCD can be connected to Control Panel with the help of a flat cable. The LCD is used to display Greeting Message or any important Instruction to users. An additional feature is provided on the iWatch Access Control Panel and that is the… Read more >>

JUMPER SETTINGS

Posted on July 13th, 2010 by Ron Gibson

iWatch Access Control Panel provides two Modes of communication. 1) Weigand Communication. 2) Serial Communication. We can achieve any desired type of communication protocol just by selecting the Jumpers or Changing the Jumper Settings. When a jumper is placed over two or more jumper pins, an electrical connection is made between them, and the equipment… Read more >>

PARKING GENIUS – IPARK SOFTWARE

Posted on July 2nd, 2010 by Andy Smith

Ipark software provides an intelligent approach towards the parking problems faced in day –today life. Ipark software has good graphical look and it is very user-friendly. Ipark software is also very easy to install.  Ipark software is very secure. No one can theft the data and make the changes in the software because it is… Read more >>

RELAY

Posted on June 30th, 2010 by Ron Gibson

On the Control Panel there are four relays present in a straight line, parallel to the Terminals. A relay is an electrically operated switch. Many relays use an electromagnet to operate a switching mechanism, but other operating principles are also used. Relays find applications where it is necessary to control a circuit by a low-power… Read more >>

SENSOR LOOP

Posted on June 30th, 2010 by Ron Gibson

  The Loop detector works with the loop embedded in the ground. The sensor loop used in the Loop Detector is basically an inductor. It is simply a coil of wire. An inductor or a reactor is a passive electrical component that can store energy in a magnetic field created by the electric current passing… Read more >>

LOOP DETECTOR

Posted on June 26th, 2010 by Ron Gibson

Are you bored of coming out of car for opening the gate door ??, now onwards forget about that.  This Automatic  Guard Gate System can open the Gate for you just after perceiving your vehicle. This excellent feature of sensing vehicle is provided by Digital Loop Detector. PRINCIPLE OF LOOP DETECTOR: With Loop Detector an Inductive loop is… Read more >>

WEB-MODULE (Freedom to Fly)

Posted on June 26th, 2010 by Ron Gibson

If you want to feel the all new freedom to operate our software from all over the globe, then Wait for few months for an all new exciting  iWatch .Net Web-module, which  is an easy and very efficient tool to maintain and manage the records for users and Visitors. It will provide the direct remote… Read more >>

MODE OF COMMUNICATION

Posted on June 26th, 2010 by Andy Smith

iWatch Security Product Supports two types of Communication:- 1) Serial Communication (RS232&RS485) 2) Wiegand Communication Serial Communication (RS232&RS485) Introduction to RS-232: RS-232 (Recommended standard-232) is a standard interface for connecting serial devices. In other words, RS-232 is a long established standard that describes the physical interface and protocol for relatively low-speed serial data communication between… Read more >>

Iwatch Access Control Software Successfully Tested Over – Windows 7

Posted on June 25th, 2010 by Andy Smith

  The integration of iWatch Server with;   Windows 7 compatibility is the most latest feature of iWatch System Softwares. This feature will provide you the advance features of VISTA with the Speedy Boot and easy controls of Windows XP. With the combination of the power of access control, digital video surveillance and intrusion into one standalone… Read more >>