Check out our special report on Artificial Intelligence
iPIX iPIXVS Software CCTV software
Technical Specification
- Make: iPIX
- Model code: iPIXVS Software
- Accessories: Software Development Tools
Integrate the software into the viewing modules of existing software to enable you camera & recorder system to view 360 degrees. The iPIXVS software processes the display of the video image just prior to display. The image is corrected to remove any distortion from the fisheye lens and is presented in your choice of multiple or single formats: Panoramic, normal (4:3 aspect ratio) and variable (set the width and height of the display to desired point of view). In each of the views, the video images can be panned, tilted, and zoomed using the same controls used for mechanical pan/tilt/zoom cameras or simple mouse-based controls from iPIX.
Read more| Make | iPIX |
|---|---|
| Manufacturer | IPIX Corporation |
| Category | CCTV>CCTV software |
| Model code | iPIXVS Software |
| Accessories | Software Development Tools |
| Additional info | Integrate the software into the viewing modules of existing software to enable you camera & recorder system to view 360 degrees. The iPIXVS software processes the display of the video image just prior to display. The image is corrected to remove any distortion from the fisheye lens and is presented in your choice of multiple or single formats: Panoramic, normal (4:3 aspect ratio) and variable (set the width and height of the display to desired point of view). In each of the views, the video images can be panned, tilted, and zoomed using the same controls used for mechanical pan/tilt/zoom cameras or simple mouse-based controls from iPIX. |
You might be interested in these products
Related Whitepapers
The benefits of Edge AI + Cloud for security systems
Video technology: making cities safer & improving lives
Unified physical security
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
