Ajax Systems announce the launch of a new tool - Fibra power supply calculator. It will help the installers of Ajax’s wired products to check wired security systems before installation.

Fibra power calculator

The Fibra power calculator provides security specialists with comprehensive information about the power consumption of devices and allows to check whether the wired system project will work in practice. Once the calculations are finished, installers can download results as a PDF file.

As soon as the programme detects problem areas in the project, it highlights them and offers different solutions. In addition, installers can easily adjust object configuration to fix power issues: replace the cable, turn off or remove devices, change distances — everything is monitored in real time.

A quick guide

Here’s a quick guide on how Fibra Calculator works:

  • To start the calculation, select your hub model
  • Add the line of devices to the hub
  • Enter cable resistance for every 100 m length of cable in Ohms
  • Add the devices to the Fibra line by indicating the cable length between the previous and the next device
  • Obtain power and voltage calculations for each device.

Discover how AI, biometrics, and analytics are transforming casino security

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...