IP VIDEO MARGIN is the amount of signal level above the digital cliff that you have in your system to prevent a failure from occurring. The question is how much margin is there in your IP video system, how close are you to falling off
Access control has been evolving to meet the requirements of the new IP video technology. Now it is possible to add contact relay access control to any IP video without degrading the picture quality or functionality of the IP system.
In recent years good quality consumer electronic equipment has found its way into many Broadcast TV and Cable TV systems because of its high quality and low price. While this equipment is reliable, low cost, and high quality it does lack some of the features
The SDI video camera has emerged as a popular way to use existing CCTV cables once used for analog cameras, to transmit a digital high definition camera images. As the use of these SDI cameras expand a problem has emerged that if gone unchecked can
Every CCTV installer has experienced this phenomenon when running long wires to power a camera or other devices. The voltage delivered to the camera is never the same as the voltage measured at the power supply location. There are several factors that affect this voltage
Most CCTV installers are familiar with the use of IP (Internet Protocol) cameras and the CAT-5 and CAT-6 (Category) 5/6 cables that are used to deliver a digital camera signal to the NVR (Network Video Recorder). However not much thought is given to the add-on
One of the major problems facing users of SDI camera signal transmission systems is that the coaxial cable frequently develops greater losses than the Coaxial Cable Manufacturer claims for their product. This excess loss can creep into the cable in many different ways that have
Now there is a new application of this technology that allows the user to type a custom message on the video screen and then turn it on or off at will with the use of external switches or contacts. As many as ten separate messages
There is a new application of this technology that allows the user to type a custom message on the video screen and then turn it on or off at will with the use of external switches. As many as ten separate messages up to 25
When you discover tampering in a CCTV security system it normally occurs at the most vulnerable and exposed part of the system, the IP video camera. Normally the camera is mounted outside of the security of locked rooms and under the eye of the public.