Check out our special report on Artificial Intelligence
TeleEye CMS V3 - central monitoring station version 3.0 for 30 monitoring sites
Technical Specification
- Make: TeleEye
- Model code: CMD-030
- Software Type: Surveillance Software
30 monitoring sites. Funtional modules: Central data server (Microsoft SQL server); Information server; Video server; Playback server; Video viewer. Site map (CMS3-SM): Freely allocates and views cameras on site map; Performs PTZ operations to camera locations; Event alert on map upon alarm occurrence; Clear alarm; Switch site map; Controls audio operations. Compliant with TeleEye RX Series, NX Series, CX Series. System requirements: CPU: Pentium (R) Dual-Core 2.2GHz or above; RAM: 2GB or above; HDD: 1GB of free disk space or above; Display: 1024x768 pixels, 24-bit colour; OS: MS Windows 2003, XP, Vista.
Read more| Make | TeleEye |
|---|---|
| Manufacturer | TeleEye Europe Ltd. |
| Category | CCTV>CCTV software |
| Model code | CMD-030 |
| Software Type | Surveillance Software |
| Additional info |
30 monitoring sites. Funtional modules: Central data server (Microsoft SQL server); Information server; Video server; Playback server; Video viewer. Site map (CMS3-SM): Freely allocates and views cameras on site map; Performs PTZ operations to camera locations; Event alert on map upon alarm occurrence; Clear alarm; Switch site map; Controls audio operations. Compliant with TeleEye RX Series, NX Series, CX Series. System requirements: CPU: Pentium (R) Dual-Core 2.2GHz or above; RAM: 2GB or above; HDD: 1GB of free disk space or above; Display: 1024x768 pixels, 24-bit colour; OS: MS Windows 2003, XP, Vista. |
You might be interested in these products
Related Whitepapers
The benefits of Edge AI + Cloud for security systems
Video technology: making cities safer & improving lives
Unified physical security
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

