Bosch LTC 8850/00 CCTV software
Technical Specification
- Make: Bosch
- Model code: LTC 8850/00
- Software Type: Control Software
Control Software - GUI. The LTC 8850 Series are software packages (single user) utilizing a Graphical User Interface (GUI) to integrate and control security systems. The GUI interfaces directly to the Allegiant series of video switcher/control systems and provides complete control and programming of all system features. Requires Pentium 120 MHz CPU and SVGA Monitor, 8 Mbytes RAM (With Windows 95),16 Mbytes RAM (With Windows NT), 250 Mbytes Fixed Drive, and 3.5-inch High Density Floppy Disk Drive. Model LTC 8851/00 is a multi-user package (5 stations) and model LTC 8852/00 is for 10 stations.
Read more| Make | Bosch |
|---|---|
| Manufacturer | Bosch Security Systems |
| Category | CCTV>CCTV software |
| Model code | LTC 8850/00 |
| Software Type | Control Software |
| Additional info | Control Software - GUI. The LTC 8850 Series are software packages (single user) utilizing a Graphical User Interface (GUI) to integrate and control security systems. The GUI interfaces directly to the Allegiant series of video switcher/control systems and provides complete control and programming of all system features. Requires Pentium 120 MHz CPU and SVGA Monitor, 8 Mbytes RAM (With Windows 95),16 Mbytes RAM (With Windows NT), 250 Mbytes Fixed Drive, and 3.5-inch High Density Floppy Disk Drive. Model LTC 8851/00 is a multi-user package (5 stations) and model LTC 8852/00 is for 10 stations. |
You might be interested in these products
- See other Bosch products
- Bosch IP Dome cameras
- Bosch Dome cameras
- Bosch CCTV cameras
- Bosch Intruder detectors
- Bosch IP cameras
Related Whitepapers
The benefits of Edge AI + Cloud for security systems
Video technology: making cities safer & improving lives
Unified physical security
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
