Aiphone Power supplies & batteries (1)
Browse Power supplies & batteries
Power supply & battery products updated recently
In daily work and life, various locks have always played the role of protecting asset safety. In different usage scenarios, the most appropriate lock must be selected to maximize benefits. In the past applications, the difficulties encountered by managers are as follows. Unlocking authority is difficult to control, unclear access records, emergency unlocking, and troublesome upgrade and installation. Through the following points, how the key-centric access management system solves such problems. Access management system The key-centric access management system, also known as intelligent passive electronic lock system, which is based on three elements: electronic keys, electronic cylinders and management software, can provide powerful and traceable access control. Each smart key is unique and cannot be copied, and in the event of loss or theft, these keys can be quickly disabled. Each smart key is unique and cannot be copied, and in the event of loss or theft, these keys can be disabledIn the process of using traditional mechanical locks, it is not difficult to find that it is quite complex to realize the access control of unlocking. The difficulty is that the keys can be copied at will, the use records are not clear, and the credibility of employees cannot be guaranteed... etc. For managers, this is a safety issue that cannot be ignored. Mechanical lock system And through the key-centric access management system, we can accurately assign access authority for each user, and set different access authority for locks in different areas. For example, we can set the XX user to have access to the archive room (A) from 10:00 on May 1, 2021 to 17:00 on June 1, 2021, within this time range. Outside this time range, there will be no unlock authority. The flexibility of the traditional mechanical lock system is insufficient. There is no clear record to determine who entered the area. It is usually a simple paper record that records the unlocking records of the employees. The authenticity and validity of the system need to be examined. In the key-centric access management system, when an employee unlocks the lock, the unlock record will be synchronized to the management terminal. Remote authorized unlocking With the key-centric access management system, remote authorized unlocking can be realized Through secondary records, managers can easily track employees and supervise employees' visits to each area. In daily work, there are often emergencies that require temporary visits to certain specific areas. If you encounter a situation where the distance is extremely long, and you don’t have the key to that area, you can imagine how bad this is. The process of fetching the keys back and forth is time-consuming and laborious. With the key-centric access management system, remote authorized unlocking can be realized. You can apply for the unlocking authority through the mobile APP, or you can temporarily issue the unlocking authority for the area on the management terminal, which saves time and effort. When faced with the failure of ordinary mechanical locks to meet management needs, some managers can already think of upgrading their management system, that is, the intelligent access control system. Passive electronic locks But before making this decision, the manager will inevitably consider the various costs brought about by the upgrade, including installation costs (cable cost), learning costs, and maintenance costs. Since most of the universal intelligent access control systems on the market require wiring and power supply, the cost of transformation and upgrading is quite high for managers who have such a huge amount of engineering. The key-centric access management system is the ‘gospel’ for managers. Since passive electronic locks and ordinary mechanical locks have the same size, they can be directly retrofitted to existing hardware, and they can be replaced step by step simply and easily. At present, the key-centric access management system is being known and applied by more and more managers and enterprises. Application industries include, such as power utilities, water utilities, public security, telecommunication industry, transportation, etc.
The 2020s will be a wireless decade in access control, says Russell Wagstaff from ASSA ABLOY Opening Solutions EMEA. He examines the trends data, and looks beyond mobile keys to brand new security roles for the smartphone. The benefits of wire-free electronic access control are well rehearsed. They are also more relevant than ever. A wireless solution gives facility managers deeper, more flexible control over who should have access, where and when, because installing, operating and integrating them is easier and less expensive than wiring more doors. Battery powered locks Many procurement teams are now aware of these cost advantages, but perhaps not their scale. Research for an ASSA ABLOY Opening Solutions (AAOS) benchmarking exercise found installation stage to be the largest contributor to cost reduction. Comparing a typical installation of battery-powered Aperio locks versus wired locks at the same scale, the research projected an 80% saving in installers’ labor costs for customers who go cable-free. Battery powered locks all consume much less energy than traditional wired locks Operating costs are also lower for wireless: Battery powered locks all consume much less energy than traditional wired locks, which normally work via magnets connected permanently to electricity. Wireless locks only ‘wake up’ when presented with a credential for which they must make an access decision. AAOS estimated a 70% saving in energy use over a comparable lock’s lifetime. Find out more about wireless access control at ASSA ABLOY's upcoming June webinar Deploying wireless locks In short, every time a business chooses a wireless lock rather than a wired door, they benefit from both installation and operating cost savings. A recent report from IFSEC Global, AAOS and Omdia reveals the extent to which the advantages of wireless are cutting through. Responses to a large survey of security professionals — end-users, installers, integrators and consultants serving large corporations and small- to medium-sized organizations in education, healthcare, industrial, commercial, infrastructure, retail, banking and other sectors — suggest almost four locations in ten (38%) have now deployed wireless locks as a part or the whole of their access solution. The corresponding data point from AAOS’s 2014 Report was 23%. Electronic access control Electronic access control is less dependent than ever on cabling Without doubt, electronic access control is less dependent than ever on cabling: Even after a year when many investments have been deferred or curtailed, the data reveals fast-growing adoption of wireless locks, technologies and systems. Is mobile access control — based on digital credentials or ‘virtual keys’ stored on a smartphone — an ideal security technology for this wire-free future? In fact, the same report finds mobile access is growing fast right now. Among those surveyed, 26% of end-users already offer mobile compatibility; 39% plan to roll out mobile access within two years. Before the mid-2020s, around two-thirds of access systems will employ the smartphone in some way. The smartphone is also convenient for gathering system insights Driving rapid adoption What is driving such rapid adoption? The convenience benefits for everyday users are obvious — witness the mobile boom in banking and payments, travel or event ticketing, transport, food delivery and countless more areas of modern life. Access control is a natural fit. If you have your phone, you are already carrying your keys: What could be easier? IBM forecasts that 1.87 billion people globally will be mobile workers by 2022 Less often discussed are the ways mobile management makes life easier for facility and security managers, too. Among those polled for the new Wireless Access Control Report, almost half (47%) agreed that ‘Mobile was more flexible than physical credentials, and 36% believe that mobile credentials make it easier to upgrade employee access rights at any time.’ IBM forecasts that 1.87 billion people globally will be mobile workers by 2022. Workers in every impacted sector require solutions which can get the job done from anywhere: Access management via smartphone offers this. Site management device The smartphone is also convenient for gathering system insights. For example, one new reporting and analytics tool for CLIQ key-based access control systems uses an app to collect, visualise and evaluate access data. Security system data could contribute to business success. The app’s clear, visual layout helps managers to instantly spot relevant trends, anomalies or patterns. It’s simple to export, to share insights across the business. Reinvented for learning — not just as a ‘key’ or site management device — the phone will help businesses make smarter, data-informed decisions. The smartphone will also play a major role in security — and everything else — for an exciting new generation of smart buildings. These buildings will derive their intelligence from interoperability. Over 90% of the report’s survey respondents highlighted the importance of integration across building functions including access control, CCTV, alarm and visitor management systems. Genuinely seamless integration They offer greater peace of mind than proprietary solutions which ‘lock you in’ for the long term Yet in practise, stumbling blocks remain on the road to deeper, genuinely seamless integration. More than a quarter of those polled felt held back by a lack of solutions developed to open standards. ‘Open standards are key for the momentum behind the shift towards system integration,’ notes the Report. As well as being more flexible, open solutions are better futureproofed. Shared standards ensure investments can be made today with confidence that hardware and firmware may be built on seamlessly in the future. They offer greater peace of mind than proprietary solutions which ‘lock you in’ for the long term. Open solutions and mobile management are critical to achieving the goals which end-users in every vertical are chasing: scalability, flexibility, sustainability, cost-efficiency and convenience.
In 2017, DITEK saw how power surges from the many natural disasters that took place damaged many businesses. In a natural disaster, or even everyday business operations, a facility’s entire investment in security, life safety and surveillance systems technology can be disabled or rendered useless in a few seconds. Surge protection solutions can mitigate those risks and protect security investments. Proactive Approach To Risk Mitigation Throughout 2017, we also witnessed a change in how enterprises view surge protection, which included how investments are being made in surge protection to protect valuable security, life safety and surveillance systems, while also reducing downtime, manpower costs, liability vulnerabilities, and possibly compliance issues that can force businesses to actually cease operations. Effective security management is about mitigating risks. But risks cannot be mitigated without a proactive approach. Enterprises and integrators, who take the time to assess risk and to develop a strategy to incorporate effective detection, deter and response criteria to protect physical assets will be successful in 2018. 2018 And Beyond That strategy includes designing surge protection into new security systems, while also adding surge protection to existing systems. Enterprises and security integrators who implement a surge protection strategy during security planning processes – or after – will be exercising prevention and mitigation, and they will be successful in 2018 and beyond. Surge protection devices have an untapped potential for enterprise surveillance and security systems In 2017, Ditek continued to offer security end users a solid surge protection solution. We also successfully educated system integrators, who are seeking value-added products or services to incorporate into their portfolios, on the importance of surge protection devices. Educating Security Integrators We believe that surge protection devices have an untapped potential for enterprise video surveillance and security systems, because they can and do meet safety and security challenges that have been rarely identified in the past. We are looking forward to 2018, when we will continue to develop new surge protection products – including a new product engineered to protect up to twelve individual fuel dispensers, which is critical to the financial operation of convenience stores. We will also continue to educate security integrators about the importance of including surge protection in the design/build RFP, to not only secure an enterprise’s valuable security equipment, but also to help integrators to differentiate their capabilities and knowledge from the competition.
A Southeastern U.S. company operating rock and asphalt quarries required a reliable, simple, and cost-effective way for truck drivers and dispatchers to communicate — often while in different states. Aiphone IX Series IP video intercoms provide an instant sight-and-sound connection via the company network. After loading their trucks at one of 10 Southeastern U.S. rock and asphalt quarries, drivers are required to stop at scales, weigh their loads, and check in with quarry dispatchers. Not all quarries had onsite dispatchers, sometimes the nearest dispatcher might be more than 100 miles away. Networked communications system For years, the quarries used IP-based video cameras to allow dispatchers to record license plate and other truck information and landline telephones to talk with drivers. But some drivers new to a quarry didn’t see the phone and would sit and wait as the lineup to use the scales grew longer. The almost constant line of trucks also made it difficult for a dispatcher to step away from the desk, even for a few minutes. Noise from the trucks’ diesel engines made communication difficult Noise from the trucks’ diesel engines and nearby quarry operations made communication difficult. And dispatchers required additional phone lines in order to talk with one another. Connect truck drivers and dispatchers with an easy-to-use, networked communications system that could stand up to an often harsh, and always noisy environment. Requirements of the Quarries were as follows. An intuitive system simple for all drivers to use, including those making their first visit to a quarry The ability to connect drivers with any currently available dispatcher on the company network A system able to operate outdoors in extreme heat and cold while delivering powerful, clear audio Several telephone lines “The same Aiphone IX Series system intercoms are used to connect the dispatchers to each other, alleviating the need for several telephone lines. Our customer hadn’t even asked for that.” Rex Free Owner, Amber Video & Audio Service. “From my standpoint, there is nothing more pleasing than working with a company that supports you. The fact I can pick up the phone and talk to somebody that knows what I do, is great. If it’s an intercom, it’s Aiphone, period.” Rex Free Owner, Amber Video & Audio Services. Necessary communications link The Aiphone IX Series video intercom provided the necessary communications link The Aiphone IX Series video intercom provided the necessary communications link. Dispatchers gained additional video information, while accepting or initiating calls to walk drivers through the weigh-in process. Calls from a quarry can now be handled by any dispatcher on the network — no matter how far away. Before leaving their desks, dispatchers can set stations to transfer calls to another office to avoid delays in processing drivers. To overcome ambient noise, the quarries’ systems integrator, Amber Video and Audio, added an amplifier and horn speaker to the first installed IX Series intercom. Handling intercompany communications However, the extra equipment was eliminated from future installations as the intercoms provided sufficient volume on their own. Also, the stainless steel IX Series models stood up to the rugged environment including limestone dust, extreme temperatures, and even the occasional grazing from a truck sideview mirror. As an added plus, the integrator suggested dispatchers use the IX Series intercoms to communicate with one another, resulting in the elimination of several costly telephone lines. The systems have performed so well there are plans to add more locations to handle intercompany communications.
Keeping out unwanted visitors is a major task in a district with 16,000 students, 2,500 employees and 2,100 regular volunteers. Aiphone’s IX Series and a visitor management system work together to control and protect each school’s single visitor entry. “The mission of anything we do in security must enhance the ability for teachers to teach and students to learn,” said Guy Grace, Director of Security & Emergency Preparedness, Littleton Public Schools. Littleton Public Schools (LPS) operates 24 campuses in suburban communities within the Denver, Colorado metropolitan area. Increasing entry security Keeping out unwanted visitors is a major task in a district with 16,000 students, 2,500 employees and 2,100 regular volunteers. Many campus security issues begin at the front door. The LPS security team works diligently to keep out unwanted visitors. However, this is a major task in a district with 16,000 students, 2,500 employees and 2,100 regular volunteers. Protect the entries at 13 elementary, 5 middle, 4 high school campuses, and 2 charter schools Enable security and other trained district staff to clearly see and speak with visitors before remotely unlocking a door Unify multiple systems to increase entry security Visitor management system Employees enter through assigned doors using an access control card All exterior doors at elementary and middle schools remain locked 24/7. Security officers are assigned to the two entries on each high school campus that remain unlocked during parts of each school day. Employees enter through assigned doors using an access control card and reader or a personal identification number entered on a keypad. An Aiphone IX Series video intercom, three security cameras, and a visitor management system protect each school’s single visitor entry. Visitors pushing the intercom call button gain the attention of a staff member using a master station in the school office. A trained employee can see and conduct a two-way conversation with the visitor before remotely unlocking the door. Intercoms are also installed at delivery bays and the front doors of 13 school-age childcare centers. Video management system The intercoms can be locally monitored and operated on campus or by security officers in the district’s unified command center. In fact, the Littleton Public Schools Security team keeps the Aiphone camera and microphone on 24/7. The district also uses 190 Android™ tablets equipped with the IX Series Mobile App. These tablets allow district staff to leave the office and interact with children, while still maintaining control of the entry intercoms. The intercoms and security cameras provide live video to eliminate piggybacking The intercoms and security cameras provide live video to eliminate a practice known as piggybacking, in which additional people enter a door along with an approved visitor. The district’s video management system (VMS) records all IX Series audio and video for later review of incidents. Inside the school building, staff requires visitors to present a government-issued ID card which gets swiped through a visitor management system. Local criminal databases The card’s data will be compared to online federal and local criminal databases and sex offender registries. Approved visitors receive an adhesive ID badge to be worn while on campus. THE RESULTS Aiphone’s IX Series video intercoms are now a vital part of the district’s successful entry-control plan. Two to four video intercoms are installed at each district school. The units have helped staff keep non-custodial parents from gaining entry. “Let’s say we have a disgruntled, non-custodial parent show up at an elementary school – and this has happened more than once,” said Guy Grace, Director of Security and Emergency Preparedness, Littleton Public Schools. Valuable security equipment The units are always monitored including nights, weekends, and holidays “We don’t want that person in the building; he or she may be a potential threat. The Aiphone IX Series intercoms provide us with the information we need to get a sense of the person’s state of mind. That’s why I think this is one of our most valuable pieces of security equipment.” The ability of staff to communicate with people at school entries has helped break up fights and deter vandals. Students feeling threatened while on school property are instructed to use the intercoms to reach a security officer. The units are always monitored including nights, weekends, and holidays and can act as emergency ‘blue phones’ for people who use the school grounds. Remotely provide access The IX Series intercoms also let security officers remotely provide access to community groups, such as scouts, using school buildings after hours. It also helps the district to ensure that the facility user is following the after-hours facility use agreements. Aiphone’s IX Series video intercoms are now a vital part of the district’s successful entry-control plan. The IX Series intercoms also let security officers remotely provide access to community groups, such as scouts, using school buildings after hours.
Secure schools while safely permitting appropriate individuals into buildings. Install Aiphone’s AX series exchange‑based video intercom to provide reliable communication and to control access points. “When they see how easy the system works, and the minimal effort involved, they become dependent on the system,” said George Kadamian, Supervisor of Operations, Racine Unified School District. Located in the state of Wisconsin, the Racine Unified School District is an urban school district comprised of 37 buildings and covers over 21 square miles. Providing reliable communication The district operates three senior high schools, five middle schools, two middle/ high school alternative schools, four ancillary buildings, and 23 elementary schools. Secure schools throughout the entire district while safely permitting appropriate individuals into buildings. Secondarily, supply a system that did not cause personnel to feel daunted by a complicated interface. Install the AX Series, an easy‑to‑use exchange‑based video intercom, to provide reliable communication and to control access points. Supports up to 8 master stations and 120 doors/sub stations in a single system Easy homerun wiring with dedicated Cat-5e cable Integrates with CCTV systems for a broader view Convenient remote door unlocking Keyless entry with embedded card reader stations Providing quality education A secure school means everyone inside can concentrate on the subject matter at hand The importance of school security cannot be understated. A secure school means everyone inside can concentrate on the subject matter at hand, which is providing quality education. Sometimes the school staff, who are often in charge of operating certain aspects of the security system, feel they are being imposed with yet another duty. However, they usually find that having a reliable security system makes their job easier. George Kadamian is the Supervisor of Operations for the Racine Unified School District. “One of my primary goals is asset and facility protection during unoccupied hours, including the maintenance and upgrade of all district security systems,” says Kadamian. “I work closely with our security provider, response team provider, and local law enforcement agencies.” Good sound quality As with many school districts, security has been heightened since the tragic loss of lives witnessed at schools like Columbine and Virginia Tech. Over the last eight years, the Racine Unified School District has systematically installed Aiphone intercom units so buildings can be locked down while still providing access to parents and visitors. “In addition to being an urban district, there is a need, especially in the elementary schools, to prevent non-custodial parents or relatives from entering the buildings and removing children,” Kadamian explains. “An Aiphone unit was used 15 years ago in an application,” he continues. “Minimal repair and good sound quality of this sole unit resulted in me staying with Aiphone through the years, especially with the introduction of the integral camera/communicator units several years ago.” Features of AX Series Visitor screening with crisp audio and clear video Normal or priority call levels Hands-free or push-to-talk communication All call between master stations Selective call between master stations and from master stations to door stations PC programmable with a variety of settings Electronic access control It integrates with CCTV, electronic access control and transfers calls to a telephone line Presently, the Aiphone AX Series is being installed at the schools. This system compliments the existing security in place. It integrates with CCTV, electronic access control and transfers calls to a telephone line. The AX Series supports up to 8 master stations and 120 door stations all wired on Cat-5e cable. It is PC programmable for easy system set up. The master stations include a bright 3-1/2” color TFT LCD while the system utilizes open voice communication with both Push-to-Talk and VOX communication over two talk channels. Other features include: call transfer, priority calling, private communication, selective contacts for door release, scan monitoring, selective call, and master-to-master all call. Embedded card reader audio-video door stations are available for an all-in-one solution and are ideal for keyless entry. Door strike portion Centec Security of Waukesha, WI has performed all of the Aiphone installations over the years for the Racine School District. “The nature of the building (high school vs. elementary), itinerant staff, and designated visitor/parent entrance will dictate the number of units required,” states Kadamian. “Generally we try to limit access to three doors in any one building and in all applications two internal monitors/ strike controls are installed in each office area.” Centec coordinates well with their lock shop sub-contractor so that the installation is seamless" The installation in most cases is completed within two days. “This installation is based on the mapping of wire runs, penetrations if applicable, wire mold runs and interior station locations,” explains the supervisor of operations. “Centec coordinates well with their lock shop sub-contractor so that the installation is seamless.” Centec Security sub-contracts with a lock shop in Madison, WI to perform the door strike portion of the installation. Sturdy master stations The AX Series is easy to install for the professionals at Centec. The AX Series’ intuitive programming not only saves time but saves on costs as well. A wide variety of door and sub stations, combined with sleek and sturdy master stations provide a system that is versatile, comprehensive, and simple for the user to operate. Kadamian agrees, describing the system as: outstanding, extremely reliable with minimal repairs needed. “Picture and sound quality are good,” he adds. There is a comfort level achieved by the school staff when they know that the students, as well as they themselves, are more secure. While at Racine the intercom units are used mainly to control the entrance of visitors and to prevent the unwanted removal of children by non-custodial/placement parents, school officials are aware that they can depend on the system to do much more if need be. Video output feature The video output feature allows composite video to be recorded or seen on a larger screen For example, the video output feature allows composite video to be recorded or seen on a larger screen. With the Paging feature, one can broadcast important announcements and the telephone transfer feature allows them to contact roaming guards. Master stations have the ability to use all call and group call features between other master stations. “Secretaries and clerks when advised that systems are being installed complain because they view it as just another job,” quips Kadamian. “However, when they see how easy the system works, and the minimal effort involved, they become dependent on the system. In those rare instances where repairs have been needed, the secretary or clerk is quick to contact me so that repairs can be affected.” As the person in charge, Kadamian uses one word to describe the AX Series: “Great! We won’t use anything else,” he comments. “The district is in line to receive a significant grant for CCTV and access control. Aiphone will continue to be our vendor of choice for visual/controlled access of specific entrances in all district buildings.”
Smart And Reliable Rail And Metro OperationsDownload
5 Ways RFID Readers Can Secure Your WorkplaceDownload
Simplified Security for Utilities & Critical InfrastructureDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload
- Identiv Shares Details On Why Bahnhof Data Centre Is One Of The World’s Most Secure Buildings
- ASSA ABLOY Secures Thiepval Museums In Northern France With Their eCLIQ Electronic Locking System
- Leonardo Receives Contract For Two More COSMO-SKyMed Second Generation (CSG) Satellites From The Italian Space Agency
- Leonardo Photovoltaic Panels For JUICE Mission Of The Cosmic Vision Interplanetary Space Program Ready For Deployment