Check out our special report on casino security
DSX DSX Virtual Outputs software application
Technical Specification
- Make: DSX
- Model code: DSX Virtual Outputs
Within WinDSX, Linking is a flexible and powerful feature. Linking to Inputs controls their armed state. Linking to Outputs controls their on/off state. Linking to Time Zones overrides their schedule either on or off. Inputs can link to Inputs, Outputs, and to Time Zones. Outputs can link to Outputs, Inputs, and to Time Zones. Virtual Outputs are Outputs that do not physically exist but can be used in linking schemes. Outputs that do not physically exist are not supervised but the system manipulates them as if they were actually there. Their status is displayed in Workstation and they can be used in conjunction with Time Zones and Linking.
Read more| Make | DSX |
|---|---|
| Manufacturer | DSX - Europe Ltd. |
| Category | Access Control>Access control software |
| Model code | DSX Virtual Outputs |
| Additional info | Within WinDSX, Linking is a flexible and powerful feature. Linking to Inputs controls their armed state. Linking to Outputs controls their on/off state. Linking to Time Zones overrides their schedule either on or off. Inputs can link to Inputs, Outputs, and to Time Zones. Outputs can link to Outputs, Inputs, and to Time Zones. Virtual Outputs are Outputs that do not physically exist but can be used in linking schemes. Outputs that do not physically exist are not supervised but the system manipulates them as if they were actually there. Their status is displayed in Workstation and they can be used in conjunction with Time Zones and Linking. |
You might be interested in these products
Related Whitepapers
Access and security in the age of hybrid working
Cybersecurity in keyless access management
The critical role of access control in K-12 school security
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

