Magal DreamBox CCTV software
Technical Specification
![Magal Magal](https://www.sourcesecurity.com/img/noimage/400x400.jpg)
- Make: Magal
- Model code: DreamBox
- Software Type: Surveillance Software
DreamBox is a real time synergetic multimedia surveillance system for homeland security and general CTV use. DreamBox, with is built-in ETX Pentium and 11 DSP's, processes information such as video, sudio and data. This allows multiple users to view, analyse in real-time, transmit, respond, record, playback, smart-search, manage, debrief and archive simultaneously in a secured and redundant manner.DB performs a number of independent processes, which include video compression, audio/video transmission, digital recording, content analysis algorithms (such as outdoor and indoor video motion detection), digital/analog acquisition, data transfer over multiple network types, synchronized playback of video and audio, digital switching between cameras, videophone and security management software integration to external computerized systems.
Read moreMake | Magal |
---|---|
Manufacturer | Magal Security Systems, Ltd. |
Category | CCTV>CCTV software |
Model code | DreamBox |
Software Type | Surveillance Software |
Additional info | DreamBox is a real time synergetic multimedia surveillance system for homeland security and general CTV use. DreamBox, with is built-in ETX Pentium and 11 DSP's, processes information such as video, sudio and data. This allows multiple users to view, analyse in real-time, transmit, respond, record, playback, smart-search, manage, debrief and archive simultaneously in a secured and redundant manner.DB performs a number of independent processes, which include video compression, audio/video transmission, digital recording, content analysis algorithms (such as outdoor and indoor video motion detection), digital/analog acquisition, data transfer over multiple network types, synchronized playback of video and audio, digital switching between cameras, videophone and security management software integration to external computerized systems. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
The benefits of Edge AI + Cloud for security systems
Video technology: making cities safer & improving lives
Unified physical security
2025 Trends in video surveillance
Download7 proven solutions for law enforcement key control and asset management
DownloadMaximising security and performance
DownloadGuide for HAAS: New choice of SMB security system
DownloadThe truth behind 9 mobile access myths
Download