Dedicated Micros V-serve 80 Video server (IP transmission)
Technical Specification
- Make: Dedicated Micros
- Model code: V-serve 80
- Video Inputs: 8 channels
- Other Inputs: 21
- Video Outputs: 8
User definable single image file sizes from 6 to 30KB per image & individual image title, time and date embedded in header file. Support available for a single IDE/Ultra ATA/66 internal hard disk. Currently available disks allow an internal capacity of 75GB.
Read more| Make | Dedicated Micros |
|---|---|
| Manufacturer | Dedicated Micros |
| Category | CCTV>Video servers (IP transmission) |
| Model code | V-serve 80 |
| Video Inputs | 8 channels |
| Other Inputs | 21 |
| Video Outputs | 8 |
| Compression Type | M-JPEG |
| Network Protocols | TCP/IP, HTTP, FTP, Telnet |
| Interface | 10base-T Ethernet |
| Resolution TVL | 640 x 256 |
| Image per second (IPS) | 25 PAL |
| System Requirements | System Requirements: PIII 300MHz, 64MB RAM, Netscape Nav. v3+, IE v5+ |
| Physical Specifications |
Dimensions mm: 45 x 432 x 390 Weight g: 4300 |
| Electrical Specifications | Voltage: 100-240 in 12vDC out |
| Environmental Specifications |
Operating Temperature oC: 5-55 Operating Humidity %: 5-85% |
| Video Inputs Overview | 8 auto-terminating inputs via 75ohm BNC connectors. |
| Additional info | User definable single image file sizes from 6 to 30KB per image & individual image title, time and date embedded in header file. Support available for a single IDE/Ultra ATA/66 internal hard disk. Currently available disks allow an internal capacity of 75GB. |
Compare Dedicated Micros V-serve 80 with Video servers (IP transmission) from other manufacturers
Related Whitepapers
The benefits of Edge AI + Cloud for security systems
Video technology: making cities safer & improving lives
Choosing the right storage technology for video surveillance
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

