FAQ

On this page you will find all frequently asked questions. Scroll down to the area you would like to learn about.

CCTV

What is CCTV?

CCTV stands for Closed-Circuit Television. It is a system of cameras and other equipment used to monitor and record video footage of a specific area or building.

There are several benefits of using CCTV, including improved security, deterrence of criminal activity, monitoring of employee performance, and remote access to video footage.

CCTV systems typically include cameras, video recorders, and monitors. The cameras capture video footage of the designated area, which is then transmitted to the video recorder where it is stored for later viewing. The monitors allow operators to view live or recorded footage.

There are several types of cameras used in CCTV systems, including dome cameras, bullet cameras, and PTZ (pan-tilt-zoom) cameras. Dome cameras are commonly used in indoor environments, while bullet cameras are typically used for outdoor surveillance. PTZ cameras are versatile and can be used in both indoor and outdoor environments.

Analog CCTV systems use coaxial cables to transmit video signals, while digital CCTV systems use IP (Internet Protocol) networks to transmit video data. Digital CCTV systems offer higher resolution and greater flexibility, while analog CCTV systems are typically less expensive and easier to install.

Regulations on CCTV installations vary depending on the country and region. In some areas, a license is required to install CCTV cameras, while in others it is not. It is important to research local regulations and obtain any necessary permits before installing a CCTV system.

Yes, like any technology, CCTV systems are vulnerable to hacking. It is important to take appropriate cybersecurity measures, such as strong passwords and encryption, to protect against unauthorized access to CCTV systems.

The use of CCTV cameras is legal in most countries, but regulations on their use vary. It is important to research local laws and regulations before installing a CCTV system to ensure compliance.

Servers

What is a server for CCTV?

A server for CCTV is a computer system that is used to store and manage video footage from CCTV cameras.

A server is needed for CCTV because it provides a centralized location for storing and managing video footage. This makes it easier to access and search for video footage when needed.

The requirements for a CCTV server depend on the number of cameras being used and the amount of video footage being stored. Generally, a CCTV server should have a fast processor, large amounts of storage space, and plenty of RAM.

There are several types of storage used in CCTV servers, including hard disk drives (HDD), solid-state drives (SSD), and network-attached storage (NAS). HDDs are the most common type of storage used, but SSDs and NAS can offer higher performance and greater flexibility.

The number of cameras that a CCTV server can support depends on the specifications of the server and the resolution and frame rate of the cameras being used. A higher number of cameras will require a more powerful server.

CCTV cameras can be connected to a server using a variety of methods, including Ethernet cables, Wi-Fi, or wireless bridges. The cameras must be configured to send video footage to the server, either through a dedicated network connection or through the internet.

The lifespan of a CCTV server depends on the quality of the components used and how well the server is maintained. With proper maintenance, a CCTV server can last for several years.

To ensure the security of a CCTV server, it is important to take appropriate cybersecurity measures, such as strong passwords, encryption, and regular software updates. Access to the server should be restricted to authorized personnel only, and regular backups should be performed to prevent data loss.

Network cameras

A network camera, also known as an IP camera, is a type of digital camera used for video surveillance that connects to a network, such as the internet or a local area network (LAN). Unlike analog CCTV cameras that use coaxial cables to transmit video signals to a recorder, network cameras use digital data to transmit video over a network.

Network cameras typically have built-in web servers that allow users to access video footage remotely through a web browser or mobile app. They may also have additional features such as motion detection, night vision, and two-way audio. Because they are digital, network cameras can offer higher resolution and image quality than analog CCTV cameras. They can also be more easily integrated into other network-based systems, such as access control or alarm systems. Network cameras are often used in commercial, industrial, and public spaces for surveillance and security purposes.

Network

The best network infrastructure depends on the specific needs and requirements of the organization. There are several factors to consider when designing a network infrastructure, including the size of the organization, the number of devices and users, the types of applications and services used, and the level of security required.

Some common network infrastructure components include switches, routers, firewalls, access points, and servers. These components can be configured and connected in different ways depending on the organization's needs.

In general, a robust and secure network infrastructure should have redundancy and failover mechanisms to ensure uptime and minimize downtime. It should also have strong security measures in place, such as firewalls, intrusion detection and prevention systems, and regular security audits and updates.

Additionally, a network infrastructure should be scalable and flexible to accommodate growth and changes in technology. It is important to work with experienced IT professionals to design and implement a network infrastructure that meets the organization's current and future needs.

The main difference between L1, L2, and L3 switches is the layer of the Open Systems Interconnection (OSI) model at which they operate.

L1 switches, also known as physical layer switches, operate at the lowest layer of the OSI model, the physical layer. They are responsible for transmitting data across physical network links, such as Ethernet cables or fiber optic cables, and do not have any intelligence to understand the content of the data.

L2 switches, also known as data link layer switches, operate at the second layer of the OSI model, the data link layer. They are capable of forwarding and filtering data packets based on the physical addresses of the devices connected to the network, using the Media Access Control (MAC) address. L2 switches can also support network segmentation through VLANs (Virtual Local Area Networks).

L3 switches, also known as network layer switches, operate at the third layer of the OSI model, the network layer. They can perform all the functions of L2 switches, but also have the ability to forward and route data packets based on the logical addresses of devices connected to the network, such as IP addresses. L3 switches are typically used to connect different network segments or subnets, and to provide routing between them.

In summary, L1 switches are responsible for transmitting data across physical links, L2 switches are responsible for forwarding and filtering data packets based on MAC addresses, and L3 switches are responsible for forwarding and routing data packets based on IP addresses. The choice of switch depends on the specific requirements of the network and the layer at which the switch needs to operate.

RAID stands for Redundant Array of Independent Disks, and it's a technology used to increase the reliability and performance of data storage. There are several different RAID levels, each with its own advantages and disadvantages. Here's a brief overview of some of the most common RAID levels:

  1. RAID 0: Also known as striping, RAID 0 splits data across multiple disks, increasing performance by allowing multiple disks to be accessed simultaneously. However, there is no redundancy, meaning that if one disk fails, all data is lost.
  2. RAID 1: Also known as mirroring, RAID 1 involves creating an exact copy of data on two disks. This provides redundancy, so if one disk fails, the other can still be used to retrieve data. However, it doesn't increase performance as there is no striping.
  3. RAID 5: RAID 5 uses striping like RAID 0, but also includes parity data across all disks. This provides redundancy, so if one disk fails, data can be reconstructed using the parity data. However, write performance can be slower due to the need to calculate parity data.
  4. RAID 6: RAID 6 is similar to RAID 5, but includes two sets of parity data instead of one. This provides even greater redundancy, allowing for up to two disk failures without data loss. However, write performance is slower than RAID 5.
  5. RAID 10: Also known as RAID 1+0, RAID 10 combines the mirroring of RAID 1 with the striping of RAID 0. It requires at least four disks, and provides both performance and redundancy. However, it is more expensive to implement than other RAID levels.

These are just a few examples of the different RAID levels available, and the best one for a particular server will depend on its specific needs and requirements.

Video Walls

Video Wall Questions:

  1. How many displays/projectors do you want to run in total?
  2. What is the per screen/projector resolution?
  3. Do you require the wall desktop to appear as a single entity to the operating system (stretched/extended desktop configuration = taskbar stretched across all bottom displays, single big desktop; or taskbar only on primary display, all other display appear standalone)
  4. What is the application/content you would like to show?
  5. What should happen with the content? (e.g. single video across all screens or individual videos, fixed to display frames or freely across the wall)
  6. Will the content be installed on the same workstation running the video wall card or will there be external signals?
  7. If there are external signals, what nature will they have? (DVI, HDMI, DP, IP, VGA, Composite, component S-video, CCTV)
  8. If there are external signals, what should be done with them and can everyone accessing the wall manipulate their placement?
  9. How should their placement work (on personal trigger, automatically, with animated display functions?)

Question 6 will be the second differentiator besides the amount of displays, if we need to go for Mura or regular graphic cards. The amount of cards is driven by the numbers of inputs and outputs, simple maths. With C-series, we have the possibility to create layout surfaces with applications installed on the same PC (to avoid more expensive inputs). The software package we do provide is called Mura Control for Windows. We recommend to test such a configuration, as different applications may behave differently within a layout then within the regular windows desktop.

Question 8 and 9 will decide, if our own software “Mura control” can do the job or if we should involve a partner or if you are able to program your own way of managing layouts. There are APIs available.

A video wall is a multi-monitor setup that consists of multiple screens, panels, or projectors tiled together contiguously or overlapped to form one large screen.

Video walls can be built with several types of display technologies, including LCD panels, LED arrays, DLP tiles, and rear projection screens.

Video walls are used in a variety of applications, including digital signage, advertising, entertainment, and information displays. They're commonly seen in places like control rooms, stadiums, broadcast studios, retail stores, and public spaces.

Video walls offer a few advantages over single large screens. They can display content at a much higher resolution, have greater flexibility in terms of shape and size, and are often more cost-effective for very large display areas.

A video wall controller is a device that splits a single image into parts to be displayed on individual screens. It can also manage content from multiple inputs and display them on the video wall in different configurations.

Video walls are typically installed and configured by professionals who specialize in AV installations. The process includes physically mounting the screens, connecting them to the controller, and calibrating them for uniform brightness and color.

Content can be managed through the video wall controller, which may have its own software or interface. More advanced systems may also support remote management, allowing you to change the displayed content from a computer or mobile device.

When planning a video wall, consider factors like the size and shape of the wall, the type of content to be displayed, the viewing distance, and the ambient lighting conditions. You should also consider the hardware and installation costs, as well as ongoing maintenance needs.

Yes, most video wall controllers can display multiple inputs on the video wall at once. This allows you to show several different pieces of content simultaneously, each on its own portion of the wall.

Yes, there are video wall solutions designed for outdoor use. These are typically built with LED panels, which are bright enough to see in daylight and are more resistant to weather. However, outdoor video walls are typically more expensive than indoor ones.

Digital Signage

Digital signage refers to the use of digital displays, such as LCD screens, LED panels, or projectors, to display multimedia content for advertising, information, or entertainment purposes. This technology is often used in public spaces, such as retail stores, airports, restaurants, and hotels, to convey messages to customers or visitors.

Digital signage can display a variety of content, including videos, images, text, and interactive media. The content can be updated in real-time or scheduled to play at specific times and dates. Digital signage can also be networked to display content across multiple screens or locations.

Digital signage is a popular marketing tool because it allows businesses to reach a large audience with targeted messages. The dynamic and interactive nature of digital signage can capture attention and increase engagement with customers.

Additionally, digital signage can be more cost-effective and environmentally friendly than traditional print media.

There are several components used for digital signage, including:

  1. Display screens: This is the most visible component of digital signage, and it can be an LCD, LED, or projection screen. The display screen is where the content is displayed to the audience.
  2. Media players: These devices are used to store and play the content on the display screen. Media players can be built into the display screen, or they can be separate devices that connect to the screen through cables or a wireless network.
  3. Content management software: This software is used to create, edit, and schedule the content to be displayed on the digital signage. It can also monitor the performance of the system and provide analytics on how the content is being received by the audience.
  4. Mounting hardware: This includes brackets, stands, and mounts that are used to securely install the display screens in their intended location.
  5. Network connectivity: Digital signage systems often require a network connection to receive updates and new content, as well as to collect data on usage and performance.
  6. Power supply: Digital signage systems require a reliable power supply to ensure that the display screens and media players operate continuously without interruption.
  7. Audio components: If audio is part of the content being displayed, digital signage systems may include speakers, amplifiers, or other audio components to ensure that the sound quality is sufficient for the intended audience.

Digital signage refers to digital displays used to convey information, advertising, and other messages. It uses technologies like LCD, LED, and projection to display content such as digital images, videos, web pages, weather data, or text.

Digital signage is used in many public and private environments such as retail stores, hotels, restaurants, corporate buildings, healthcare facilities, and transportation systems for advertising, way-finding, and informational purposes.

A digital signage system typically involves a content management system (CMS), digital signage software, media players, and the displays themselves. Content is created and managed via the CMS, then pushed to the media players which display the content on the screens.

Almost any type of digital content can be displayed on digital signage. This includes text, images, videos, web pages, live feeds, social media feeds, weather updates, and interactive content.

Digital signage offers many benefits, such as the ability to update content quickly, display dynamic content, improve audience engagement, provide interactivity, and reduce print costs. It can also provide analytics and insights into audience behavior.

Interactive digital signage refers to digital displays that respond to users' touch, gestures, or other interactions, providing a two-way communication between the user and the system. This can enhance customer engagement and provide a more personalized experience.

The cost of digital signage can vary widely depending on the complexity of the system, the number of displays, the type of software and hardware used, and the content creation and management needs.

A digital signage player, also known as a media player, is a device that stores and plays the digital content on the display screen. It receives the content from the digital signage software and ensures it's displayed correctly on the screen.

While some digital signage systems can operate offline, having an internet connection allows for real-time updates, live content streaming, remote management, and usage analytics.

Yes, many digital signage software solutions include content creation tools, or you can use separate graphic design and video editing software. You can also hire professional content creator if needed.

Mobile Solutions

Mobile telescopic masts, also known as telescoping towers or mobile towers, are structures that can be raised or lowered to provide temporary or portable support for equipment such as antennas, cameras, lights, or sensors. They are typically used in applications where quick deployment and flexibility are required, such as emergency response, military operations, or events.

Mobile telescopic masts consist of several sections that can be extended or retracted using a hydraulic or pneumatic system. The height of the mast can be adjusted to suit the needs of the application, with some models capable of reaching heights of up to 30 meters or more. The masts are usually mounted on a trailer or a vehicle for transport, and they can be deployed quickly and easily using a winch or hydraulic system.

Mobile telescopic masts are designed to be sturdy and durable, able to withstand harsh weather conditions and environmental factors. They can be used in a variety of applications, such as telecommunications, broadcasting, surveillance, and lighting. They are often used as a temporary solution when permanent structures are not feasible or practical.

 

Mobile telescopic masts typically consist of several components that work together to provide support and adjust the height of the mast. These components include:

  1. Mast sections: Mobile telescopic masts are composed of multiple sections that can be extended or retracted using a hydraulic or pneumatic system. The number of sections depends on the height of the mast and the required payload capacity.
  2. Mast base: The mast base is the foundation of the mast, and it is usually mounted on a trailer or vehicle. The base contains the hydraulic or pneumatic system that raises and lowers the mast.
  3. Guy wires: Guy wires are used to provide additional stability to the mast, especially when it is fully extended. The guy wires are anchored to the ground and attached to the mast at various points.
  4. Winch system: A winch system is used to raise and lower the mast. The winch is usually located at the base of the mast and can be operated manually or through a remote control.
  5. Payload mount: The payload mount is the location where the equipment to be supported is attached to the mast. The mount can be customized to accommodate different types of equipment, such as antennas, cameras, or lights.
  6. Control system: The control system is used to operate the mast and control the height and direction of the equipment being supported. The control system can be manual or automated, depending on the complexity of the application.

A Telescopic Mast Mobile Solution is a mobile system featuring a retractable mast that can be extended to various heights. These masts are typically mounted on vehicles or trailers and are used to support equipment like antennas, cameras, lights, or sensors at elevated heights.

Telescopic mast solutions are widely used in telecommunications, broadcasting, surveillance, environmental monitoring, and emergency services. They can provide temporary, mobile high-altitude platforms for equipment that require a clear line of sight or elevated positioning.

The height a telescopic mast can reach varies depending on its design. Some masts can extend to heights of over 100 feet. The actual height will depend on the specific model and the weight of the equipment it needs to carry.

Most telescopic masts use pneumatic (air pressure), mechanical (winch or crank), or hydraulic systems to extend and retract the mast. The specific method depends on the design and model of the mast.

A wide variety of equipment can be mounted on a telescopic mast, including antennas, cameras, lights, sensors, and wind turbines. The exact type of equipment will depend on the intended use of the mast.

Yes, telescopic masts are designed to withstand a range of weather conditions. However, the specific resilience to wind, rain, or other environmental factors will depend on the design and construction of the mast.

The power requirements for a telescopic mast depend on its mechanism of extension and the equipment it supports. Some may require an external power source, while others may use a vehicle's power system or have their own independent power supply.

The weight a telescopic mast can carry, also known as its payload capacity, varies depending on the design of the mast. Some masts can carry several hundred pounds, but the specific capacity should be checked for each model.

Yes, some telescopic mast systems come with remote control capabilities, allowing operators to extend, retract, and sometimes rotate the mast from a distance.

While telescopic masts are designed to be user-friendly, some training may be required to operate them safely and effectively. This will typically involve learning how to extend and retract the mast, how to mount equipment, and how to troubleshoot any issues.

Cyber Security

Ernitec is a technology company that specializes in the development of video surveillance and security systems. As a company that deals with sensitive information, Ernitec takes cybersecurity seriously to protect their customers and their own assets.

To maintain a high level of cybersecurity, Ernitec has implemented several measures. First, they have implemented access control measures to ensure that only authorized personnel can access their systems. This includes two-factor authentication, strong password policies, and role-based access control.

Secondly, Ernitec has implemented measures to protect against malware, ransomware, and other types of cyber threats. They have implemented antivirus and anti-malware software and regularly update them to protect against the latest threats. They also conduct regular vulnerability assessments and penetration testing to identify and remediate any vulnerabilities in their systems.

Ernitec also ensures the confidentiality and integrity of their data by implementing encryption measures. They use encryption protocols to protect sensitive data in transit and at rest, and they regularly review and update their encryption protocols to ensure they are up to date with industry standards.

Finally, Ernitec has implemented employee training programs to raise awareness about cybersecurity threats and best practices. They train their employees on how to identify and prevent cyber threats and conduct regular security awareness training to keep their employees up to date on the latest threats and best practices.

In summary, Ernitec takes cybersecurity seriously and has implemented several measures to protect their customers and their own assets. These measures include access control, malware protection, encryption, and employee training programs.

Cybersecurity refers to the practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from digital attacks, damage, or unauthorized access. It encompasses everything from data security to network security and information technology security.

With an increasing amount of data being stored and shared digitally, cybersecurity is crucial to prevent unauthorized access, data breaches, identity theft, and to maintain the integrity and confidentiality of sensitive information. It's also critical for the functioning of a range of sectors including finance, healthcare, government, and transportation.

Common threats include malware such as viruses, worms, ransomware; phishing; denial of service (DoS) attacks; man-in-the-middle attacks; and zero-day exploits. These threats can lead to data loss, unauthorized access, or system damage.

A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. It acts as a barrier between a trusted and an untrusted network.

Encryption is a method of converting data into a coded form (called ciphertext) to prevent unauthorized access. Only those with the decryption key can convert the data back into its original form (plaintext).

Two-factor authentication is a security measure that requires two types of identification to access an account or system. This often includes something you know (a password) and something you have (a mobile device to receive a verification code, for example).

Common protection measures include using strong, unique passwords; enabling two-factor authentication; keeping software and systems updated; using antivirus software; and being cautious about the emails you open and the websites you visit.

A Virtual Private Network (VPN) creates a private network from a public internet connection, providing anonymity and security. It masks your IP address and encrypts data transfer, enhancing security and protecting sensitive data.

A cybersecurity risk assessment identifies the information assets that could be affected by a cyber-attack, evaluates the risks that could affect those assets, and implements appropriate controls to protect them.

A Virtual Private Network (VPN) creates a private network from a public internet connection, providing anonymity and security. It masks your IP address and encrypts data transfer, enhancing security and protecting sensitive data.

Social engineering is a tactic used by cybercriminals that manipulates individuals into revealing sensitive information. It can take many forms, but often involves impersonating a trusted entity to gain access to systems or data.

How to choose an IP camera

An IP camera, or Internet Protocol camera, is a type of digital video camera that can send and receive data via a computer network and the Internet. Unlike traditional CCTV cameras, IP cameras offer the ability to record directly to network-attached storage devices, or internal flash, for completely standalone operation.

Consider factors like resolution, field of view, low-light performance, audio capabilities, video analytics features, durability, and compatibility with your existing systems.

Camera resolution refers to the number of pixels that the camera's image sensor has. The higher the resolution, the more detailed the picture. High resolution can be particularly important for security applications where identifying details like faces or license plates is important.

The field of view refers to how wide an area the camera can cover. A wider field of view means the camera can monitor a larger area, but the size of objects in the scene will be smaller. A narrower field of view will show less area but objects will appear larger.

Low-light performance is critical if you need to capture clear images in poorly lit or night-time conditions. Look for cameras with good low-light ratings and features like infrared (IR) illumination.

Video analytics features include motion detection, facial recognition, line crossing detection, and more. These features can help in automatically identifying security incidents and triggering alarms or notifications.

The need for audio depends on your use case. In some situations, having audio can provide additional information beyond the visual feed. But remember, in certain jurisdictions, recording audio without consent can be illegal, so it's crucial to understand local laws before implementing.

Durability refers to the camera's ability to withstand environmental conditions. If you're installing the camera outdoors or in harsh environments, look for cameras with weatherproof, dustproof, and vandal-resistant features. This is often indicated by an IP (Ingress Protection) rating.

IP cameras can connect to your network wirelessly via Wi-Fi or through a wired connection using Ethernet. The best choice depends on your specific installation needs and the available network infrastructure.

It's important to ensure the IP camera you choose is compatible with your existing surveillance system and video management software. This allows you to integrate the new camera smoothly into your current setup.