Check out our special report on Artificial Intelligence
iPIX NetCam Software CCTV software
Technical Specification
- Make: iPIX
- Model code: NetCam Software
- Series: 360VS Series
- Accessories: IP Vision Software
iPIX 360-degree NetCam java-based software enables networked cameras to deliver 360-degree digitally navigable views to Mac and Windows users with the simple addition of a fisheye lens. The software can be installed on a network camera, video server or on a hosting server for high-traffic Web sites. iPIX 360-degree NetCam software allows many simultaneous viewers to have their own individual viewing experience by panning within the digital image. As a security and observation solution, the iPIX NetCam software enables to survey an entire scene, with no blind spots, for monitoring sensitive areas such as airports and hazardous sites.
Read more| Make | iPIX |
|---|---|
| Manufacturer | IPIX Corporation |
| Category | CCTV>CCTV software |
| Model code | NetCam Software |
| Accessories | IP Vision Software |
| Additional info | iPIX 360-degree NetCam java-based software enables networked cameras to deliver 360-degree digitally navigable views to Mac and Windows users with the simple addition of a fisheye lens. The software can be installed on a network camera, video server or on a hosting server for high-traffic Web sites. iPIX 360-degree NetCam software allows many simultaneous viewers to have their own individual viewing experience by panning within the digital image. As a security and observation solution, the iPIX NetCam software enables to survey an entire scene, with no blind spots, for monitoring sensitive areas such as airports and hazardous sites. |
You might be interested in these products
Related Whitepapers
The benefits of Edge AI + Cloud for security systems
Video technology: making cities safer & improving lives
Unified physical security
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
