artec EX-IO Video server (IP transmission)
Technical Specification
- Make: artec
- Model code: EX-IO
- Series: MULTIEYE Series
- Video Inputs: 6 channels
- Video Outputs: 6
When connected directly to a computer network, the EX-IO provides you with a ready-to-run network server, six non-potential contact inputs and six switch outputs via TCP/IP - there where you need them. That saves installation costs and expands the action radius of your MULTIEYE system, due to TCP/IP communications, devices can be accessed or processes (such as image recording or messaging via SMS, Email, etc.) can be activated around the world via the inter-net.
Read more| Make | artec |
|---|---|
| Manufacturer | artec technologies AG |
| Category | CCTV>Video servers (IP transmission) |
| Model code | EX-IO |
| Video Inputs | 6 channels |
| Video Outputs | 6 |
| Interface | RJ 45, 10/100 BaseT Ethernet |
| Electrical Specifications |
Power Consumption: 2 W Voltage: 10 ~ 30 V DC |
| Video Inputs Overview | 6 digital inputs |
| Additional info |
When connected directly to a computer network, the EX-IO provides you with a ready-to-run network server, six non-potential contact inputs and six switch outputs via TCP/IP - there where you need them. That saves installation costs and expands the action radius of your MULTIEYE system, due to TCP/IP communications, devices can be accessed or processes (such as image recording or messaging via SMS, Email, etc.) can be activated around the world via the inter-net. |
- See other artec products
- artec Digital video recorders (DVRs)
- artec CCTV software
- artec Network video recorders (NVRs)
Related Whitepapers
The benefits of Edge AI + Cloud for security systems
Video technology: making cities safer & improving lives
Choosing the right storage technology for video surveillance
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

