FLIR Systems DVT - KBD Telemetry transmitters and controllers
Technical Specification
- Make: FLIR Systems
- Previously known as: DVTEL
- Model code: DVT - KBD
- Telemetry Type: Coax/Twisted Pair
- Video Inputs: 2 channels
When connected to a DVTel Decoder, the CCTV Keyboard becomes a fully operational control-center. The Decoder provides the ability to view digital video on a traditional analog CCTV monitor, while the Keyboard possesses all the features for camera placement and PTZ controls. In addition to the basic operations of a matrix switcher, the Keyboard permits an authorized user to access the instant replay function.
Read more| Make | FLIR Systems |
|---|---|
| Manufacturer | FLIR Systems |
| Previously known as | DVTEL |
| Category | CCTV>Telemetry transmitters and controllers |
| Model code | DVT - KBD |
| Telemetry Type | Coax/Twisted Pair |
| Video Inputs | 2 channels |
| Video Outputs | 2 outputs |
| with Joystick | Yes |
| Signal Mode | PAL / NTSC |
| Electrical Specifications |
Voltage: 120/230 AC Power Consumption: 5 W |
| Environmental Specifications | Operating Temp oC: 0 ~ 50 |
| Physical Specifications |
Dimensions mm: 115 x 5.6 x 1.25 Weight g: 2.7 kg |
| Additional info |
When connected to a DVTel Decoder, the CCTV Keyboard becomes a fully operational control-center. The Decoder provides the ability to view digital video on a traditional analog CCTV monitor, while the Keyboard possesses all the features for camera placement and PTZ controls. In addition to the basic operations of a matrix switcher, the Keyboard permits an authorized user to access the instant replay function. |
You might be interested in these products
Related Whitepapers
Lawrence, Massachusetts deploys FLIR video system for safety
How to catch shoplifters with thermal imaging
Future-proof IP surveillance for harsh environments
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
