Engineers teach you to make a discharge stick with a charged alarm function. In 2016, ADI has three major tools for video security in the field of video security. What are the difficulties that security vendors want for free cloud storage? The drone will become security. The emerging darling of the field, what are the main applications of face recognition technology in China's security system equipment? In 2016, there have been many major events in the safety equipment system industry, and there have been many good application design solutions. Let's summarize the new events in the field of safety equipment.
1. The engineer teaches you to develop a dedicated discharge bar with a charged alarm function.
In the daily maintenance, repair, pre-test, etc. of the capacitors in the substation, the capacitor bank and the single capacitor must be discharged before work, because the "Safety Regulations" clearly stipulates that the cables and capacitors should be fully discharged phase by phase before grounding. The neutral point of the star-connected capacitor should be grounded, the series capacitor and the capacitor disconnected from the entire set of capacitors should be discharged one by one.
2, ADI: three swords in the field of video security
ADI, the world's leading provider of high-performance signal processing solutions, has its own unique secret weapon in the field of video security, namely HD surveillance matrix chips. Zhang Peng, manager of ADI, mentioned in the ADI high-definition monitoring matrix chip: "Because the video bandwidth of the transmission is increasing, the high-frequency signal has different attenuation at different frequencies in the line, so the requirements for long-line driving are very strict. Pre-emphasis and equalization (EQ) is added to the chip and this function is programmable to accommodate different line lengths."
3. The “free†era of cloud storage that security vendors want
With the maturity of cloud storage technology, many Internet companies and operators have launched cloud leasing services. In the civilian general market, storage free services for individual users are no longer new. At the same time, with the storage of free services, many manufacturers with general security products, throwing out surveillance camera rentals, and even free service operation mode, once again stimulated the fierce security of the civilian security market.
4, drone or will be the new darling of the security industry
UAV products have been widely used in various scenes of our lives. Although some manufacturers in the security industry have already launched drone products, the real attention of the whole industry is in 2015 Shenzhen Auto Expo Shanghai Kang Weishi launched the drone products, and the industry's attention to drones has soared.
5, the recent application of face recognition technology in China
With the rapid impact of the Internet, the demand for information security and the need for personal identity authentication continue to increase. Under this background, the concept of biometrics in China has become increasingly hot. Among them, fingerprint recognition technology has matured in the past, and face recognition technology with higher recognition rate is coming. A good opportunity for development. Since 2015, face recognition technology has continued to be hot in the technology circle, and various face recognition applications have emerged one after another. Here, we have counted several applications related to the recently introduced face recognition technology.
6. Hikvision releases low-power camera system solution
In the remote areas, it is not convenient to find the power supply. What should I do if the power supply is difficult? In remote areas, it is not suitable for wiring construction and there is no fiber resources, and it is impossible to set up a network. What should I do? Recently, Hikvision has released a 1.3 megapixel low-power camera (DS-2CS14C2D-IR2) system solution, which solves the problem of difficult power supply.
7, Infineon OPTIGATM TPM chip escorts the new Microsoft Surface terminal
Munich, Germany, January 20, 2016 – Microsoft focuses on hardware-based security solutions to protect user-sensitive data stored in networked devices. Microsoft's latest personal computing terminals -- including the next-generation Surface Pro 4 tablet and the first Microsoft-branded portable Surface Book -- are from Infineon Technologies AG (FSE code: IFX / OTCQX code: IFNNY) OPTIGATM TPM product (Trusted Platform Module).
8, four building intercom host easy to appear problems and maintenance methods
The building intercom system is a management system that enables visitors, residents and property management centers to talk to each other, exchange information and control the safe access of the community in a multi-storey or high-rise building, commonly known as the doorbell system. How to repair when the following problems occur in the building intercom host?
9, 3D fingerprint access control is slightly better than traditional access control?
In order to prevent theft, many companies and communities have adopted electronic access control systems, mainly based on card access control systems. With the news that the access control card was copied at random in many communities in the past two years, the user questioned the safety factor of the card access control system. A safer access control system is in urgent need of access to the access control market.
10. In-depth discussion of the transformation of building intercom
As a security product for real estate projects, building intercom and real estate can be described as fate. On the one hand, the country's vigorous promotion of affordable housing and affordable housing has greatly improved the sales of low-end products in the building intercom; on the other hand, with the active promotion of smart communities and smart homes, users are on the high end. The demand for building intercom equipment has gradually emerged, and the entire building intercom industry has shown a trend of polarization!
11, smart door lock is more insecure than you think, simple equipment can be easily cracked
The Internet of Things gives us a good future, but one issue that is always overlooked is security. At this week's DEF CON contest, two researchers, Anthony Rose and Ben Ramsey, showed us this again, and they easily hacked into 12 BLE Bluetooth Smart Door Locks.
12, the rise of mobile phones equipped with iris recognition trend to inject a strong heart for mobile payment
The iris recognition, which was originally regarded as a sci-fi plot, has become an actual function on high-end smartphones and tablet devices under the efforts of manufacturers. EMVCo and FIDO also signed a Memorandum of Understanding (MOU) recently to re-inject a strong heart for biometric verification (including fingerprint, iris, voiceprint, etc.) in mobile payment applications.
13. Haisi 4K/H.265+ SoC-Hi3519 has Huawei's independent IP video technology
The world's leading semiconductor manufacturer of video surveillance - HiSilicon has been focusing on the development of a new generation of HEVC / H.265 super, providing high-definition IP video surveillance products and solutions, the most advanced technology, cost-effective, and fast mass production. At this public safety product fair, Hess brings its latest 4K / H.265 SoC - Hi3519, which uses Hais (Huawei) proprietary intellectual property and innovative IP video technology.
14. Design and implementation of a fully automatic rice cooker system
The designed rice cooker is in standby mode when it is not working. When the SIM900A module receives the SMS or GPRS control command sent by the user's mobile phone, it sends the command to the STM32F103 MCU, and the MCU analyzes the command, and then controls the rice cooker to automatically leak rice and pan. The whole process of rice and rice cooking, and the temperature sensor is used to detect the working temperature of the rice cooker in real time. At the same time, the alarm can be intelligently alarmed according to the working state of the rice cooker, which ensures the reliable and stable operation of the rice cooker.
15. China UnionPay officially launched two-dimensional code payment standards including two specifications for security and application.
On December 12, 澎湃News was informed by China UnionPay official website that China UnionPay officially launched the UnionPay two-dimensional code payment standard. "UnionPay QR Code Payment Standard" mainly includes two specifications of "China UnionPay QR Code Payment Security Specification" ("Safety Specification") and "China UnionPay QR Code Payment Application Specification" ("Application Specification").
16. Where will the smart camera generated by smart home go?
In recent years, smart homes have spawned a large number of enterprises to leap into this market. The slow-growing traditional business owners can't stand the temptation of the Internet to get rich quickly. They have “sewed into the water†and marched toward the Internet market, which can achieve the goal of “transformation and upgradingâ€. And can attack the invasion of Internet companies.
17, railway HD video surveillance system solutions
The railway integrated video surveillance system is a large-scale networked video surveillance system with multi-level management, multi-level forwarding and multi-level storage. According to the current situation and demand analysis of railway video surveillance, under the framework of "Technical Specification for Railway Integrated Video Surveillance System", Dahua has tailored different solutions for the railway industry.
18, single fire line source solution for smart home
The technical difficulty of the single fire line intelligent switch: Since the single fire line switch takes any point of electricity to flow through the lamp, when the power consumption of the switch is greater than about 220V/50uA, when the power reaches the internal capacitance charging requirement of the lamp At that time, a momentary current is formed, and a small power W number lamp, such as a 2W LED, is bound to flash. Because of the 2W lamp, it illuminates very little current = 2W/220V = 9mA. This is the so-called "ghost fire", which is the flashing phenomenon of the lamp in the off state.
19, Huawei Haisi security chip selection is integrated can also become king?
Huawei security, as well as Huawei's Haisi security chip, has always been an indispensable part of the security industry. It gives people the impression that they are pioneers in technology and solutions, but they cannot feel in the real security industry chain and industry projects. To its unique value, if one word is used to describe it, in the security field, Huawei is looming, not the engine of the industry, but silently exists, but it will not be ignored.
20. Design scheme of building equipment monitoring system based on intelligent router
Most of the current online equipment fault monitoring systems use a capture card and PC mode. The acquisition card is responsible for collecting data, and the PC is responsible for data processing and transmission. Such systems are bulky and expensive, and are not suitable for applications where production equipment is dispersed and the field work environment is harsh. In order to solve these problems, this paper applies the intelligent router related technology and Internet technology to the design of the equipment monitoring system, so that the equipment fault detection system has remote monitoring function.
Magnetic Switch,Magnetic Reed Switch,Magnetic Door Switch,Magnetic Contact Switch
NINGBO SANCO ELECTRONICS CO., LTD. , https://www.sancobuzzer.com