Software House CC9-ST-ADD5KR C•CURE IQ Microservices Add 5,000 Readers to a Series T

Technical Specification

Features:
  • Make: Software House
  • Model code: CC9-ST-ADD5KR
  • Operating System: Red Hat Enterprise Linux 7.9 with latest updates
Additional info:

C•CURE IQ Microservices is designed to allow smaller components of software (ex: software drivers) to interact with each other over a standard network protocol such as HTTP. With C•CURE IQ Microservices, the business logic is split into individually deployable services that are isolated from other services by network-based interfaces. This re-design allows for increased system scale, resiliency, and improved cybersecurity, by isolating the individual processes into their own containers. C•CURE IQ Microservices are built for the Kubernetes® platform. Kubernetes (also known as K8s®) is an open-source system for automating deployment, scaling, and management of containerized applications. 

Read more
Make Software House
Manufacturer Software House
Category Access Control>Access control software
Model code CC9-ST-ADD5KR
System Requirements Operating System: Red Hat Enterprise Linux 7.9 with latest updates
Additional info
  • C•CURE IQ Microservices is designed to allow smaller components of software (ex: software drivers) to interact with each other over a standard network protocol such as HTTP.
  • With C•CURE IQ Microservices, the business logic is split into individually deployable services that are isolated from other services by network-based interfaces. This re-design allows for increased system scale, resiliency, and improved cybersecurity, by isolating the individual processes into their own containers.
  • C•CURE IQ Microservices are built for the Kubernetes® platform. Kubernetes (also known as K8s®) is an open-source system for automating deployment, scaling, and management of containerized applications. 
Download PDF version Download PDF version

Related Whitepapers

The security challenges of data centers

The critical importance of Trusted Execution Environment in access control

Access and security in the age of hybrid working

Quick poll
What's the primary benefit of integrating access control with video surveillance?




Related tags