top of page

Services _

 

Computers, laptop, printers, CCTV, VDP, Fire Alarm System, Attendance Machine, Cloud Networking etc sales & service at reliable cost. Annual maintenance also available.

New and Old Computer Services
All Type of Desktop and Laptop are Repairing
Network Solution Service are Provide
Annual Maintenance are also Provide

1)buy/sell old and new systems
2) licensed antivirus available
3) desktop/laptop/tablet repairing-formatting
4) motherboard repairing, software installation
5) computers parts available with warranty
6) printer cartridge refilling

7)CCTV sales and service

8)Attendance machine sales and service (ESSL. Real time----Etc)

9)Video Door phone

 

Also Listed in

 

  • Electrical Contractors

  • CCTV Dealers

  • CCTV On Hire

  • Video Door Phone Dealers

  • Access Control System Dealers

  • Video Door Phone Dealers-Commax

  • IP Camera Dealers

  • Wireless CCTV Dealers

  • Access Control System Dealers-Himax

  • CCTV Installation Services

  • Biometric Attendance Recording System Dealers

  • Computer AMC

  • Security System Dealers

  • Computer Hardware AMC

  • Computer Networking Solution Providers

 

  1. Video Surveillance and storage

  2. Asset Tracking

  3. Article Surveillance

  4. Access Control

  5. Intrusion Alarm and robbery detection

  6. Credential Management

  7. Lockdown system and Gun detection

  8. Mass Notification

  9. Fire detection and Evacuation

  10. Voice and data infrastructure

  11. Paging, Supervised Radio, Background Sound

  12. Climate control systems

  13. Critical system montoring

  14. Utility sub metering systems

  15. Lightning control  and management system

  16. Emergency  operations and command centers

  17. Energy management systems

 

 

2. Asset Tracking

Asset tracking refers to the method of tracking physical assets, either by scanning bar code labels attached to the assets or by using tags using GPS or RFID which broadcast their location

RFID

'Passive' RFID tags broadcast their location but have limited transmission range (typically a few meters). Longer-range "smart tags" use 'active' RFID -where a radio transmitter is powered by a battery and can transmit up to 2000 meters (6,600 feet) in optimum conditions An asset tracking system can record the location and usage of the assets and generate various reports.

Bar codes

Assets can be tracked via manually scanning bar codes such as QR codes. QR codes can be scanned using smart phones with cameras and dedicated apps, as well as with bar code readers.

NFC

Latest trend in asset tracking is using NFCNFC technology simplifies tracking of assets by tapping the assets and getting the details. This is an advantage for tracking critical assets where user needs to see the condition of the asset to be tracked.

GPS asset tracking

Assets may also be tracked globally using devices which combine the GPS system and mobile phone and/or satellite phone technology. Such devices are known as GPS asset trackers and are different from other GPS tracking units in that they rely on an internal battery for power rather than being hard-wired to a vehicle's battery. The frequency with which the position of the device must be known or available dictates the quality, size or type of GPS asset tracker required.

 

3. Electronic Article Surveillance

                   

             Electronic article surveillance (EAS) is a technological method for preventing shoplifting from retail storespilferage of books from libraries or removal of properties from office buildings. Special tags are fixed to merchandise or books. These tags are removed or deactivated by the clerks when the item is properly bought or checked out. At the exits of the store, a detection system sounds an alarm or otherwise alerts the staff when it senses active tags. Some stores also have detection systems at the entrance to the restroomsthat sound an alarm if someone tries to take unpaid merchandise with them into the restroom.

4. Access Control

         

           Access control a is way of limiting access to a system or to physical or virtual resources. In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resources

Types of readers

Access control readers may be classified by the functions they are able to perform:

  • Basic (non-intelligent) readers: simply read card number or PIN, and forward it to a control panel. In case of biometric identification, such readers output the ID number of a user. Typically, Wiegand protocol is used for transmitting data to the control panel, but other options such as RS-232, RS-485 and Clock/Data are not uncommon. This is the most popular type of access control readers.

  • Semi-intelligent readers: have all inputs and outputs necessary to control door hardware (lock, door contact, exit button), but do not make any access decisions. When a user presents a card or enters a PIN, the reader sends information to the main controller, and waits for its response. If the connection to the main controller is interrupted, such readers stop working, or function in a degraded mode. Usually semi-intelligent readers are connected to a control panel via an RS-485 bus.

  • Intelligent readers: have all inputs and outputs necessary to control door hardware; they also have memory and processing power necessary to make access decisions independently. Like semi-intelligent readers, they are connected to a control panel via an RS-485 bus.

5. Intrusion Alarm and robbery detection

 

Common types of Intrusion Detection:

Network Based (Network IDS)

Network based intrusion detection attempts to identify unauthorized, illicit, and anomalous behavior based solely on network traffic. A network IDS, using either a network tap, span port, or hub collects packets that traverse a given network. Using the captured data, the IDS system processes and flags any suspicious traffic. Unlike an intrusion prevention system, an intrusion detection system does not actively block network traffic. The role of a network IDS is passive, only gathering, identifying, logging and alerting

Host Based (HIDS)

Often referred to as HIDS, host based intrusion detection attempts to identify unauthorized, illicit, and anomalous behavior on a specific device. HIDS generally involves an agent installed on each system, monitoring and alerting on local OS and application activity. The installed agent uses a combination of signatures, rules, and heuristics to identify unauthorized activity. The role of a host IDS is passive, only gathering, identifying, logging, and alerting.

 

Physical or Perimeter Intrusion

PIDS not only detects potential intruders but also tracks them. Before an intruder enters a region of interest at a fixed distance from the fence, a camera is automatically pointed to the specific threat and a video recording is started. The system can be configured to generate an alarm or event at that point, or just track and follow until a higher priority event occurs. As the intruder advances, the fence detection systems raise alarms.

Perimeter Intrusion Detection is a suite of technologies that includes:

  • Radar Video Surveillance (RVS): Integrates a number of sensors such as radar, sonar, Automatic Identification System (AIS) and GPS with configurable rules, to provide alarms and map coordinates to the video surveillance system providing the highest value of all-weather wide area surveillance systems

  • Advanced video analytics and video motion detection

  • Physical control with fencing, turnstiles, vehicle barriers and blockers for land-based facilities, and water barriers and vessel arrest solutions for deployment offshore and on waterfront facilities

  • Fiber optic-based solutions installed on the fence line or buried in sterile areas

  • Other technologies, including electromagnetic, microwave and infrared beams. 

 

6. Credential Management

Credential Management is the set of practices that an organization uses to issue, track, update, and revoke credentials for identities within their context.

A CREDENTIAL is authoritative evidence of an individual’s claimed identity. Credentials come in many types, from physical papers and cards (such as a passport or ATM card) to electronic items (such as a password or digital certificate), and often incorporate anti-tamper features. 

 

Credential Management Services

The Credential Management services in the Federal ICAM architecture include Sponsorship, Registration, Issuance, Maintenance, and Revocation.

 

Sponsorship

Formally establishing that a person or entity requires a credential. 
Keywords: Sponsor, Authorizing Official, Affiliation, Request

Registration

Collecting the information needed from a person or entity to issue them a credential. 
Keywords: Enrollment

Issuance

Transferring a credential to a person or entity.
Keywords: Activation, Token

Maintenance

Maintaining a credential over its life cycle. Keywords: Renewal, Reset, Suspension, Blocking, Reissuance

Revocation

Withdrawing a credential from a person or entity.
Keywords: Termination

 

 

7. Lockdown system and Gun detection

 

 A lockdown is an emergency protocol to prevent people or information from escaping, which usually can only be ordered by someone in command. Lockdowns are also used to protect people inside a facility or, for example, a computing system, from a dangerous external event.

There may be various levels of lockdown. For example, in the case of buildings, a partial lockdown means that the doors leading outside of the building are locked and people may not exit or enter the building. A full lockdown means that people must stay where they are and may not exit or enter a classroom, apartment unit, store unit, an office space, condo unit or the building. If people are in a hallway they must go into the nearest classroom, apartment unit, condo unit, office space or store unit.

A gunfire locator or gunshot detection system is a system that detects and conveys the location of gunfire or other weapon fire using acoustic, optical, or potentially other types of sensors, as well as a combination of such sensors. These systems are used by law enforcement, security, military and businesses to identify the source and, in some cases, the direction of gunfire and/or the type of weapon fired. Most systems possess three main components:

  • An array of microphones or sensors either co-located or geographically dispersed

  • A processing unit

  • A user-interface that displays gunfire alerts.

 

8. Mass Notification

         A mass notification system (MNS) is a platform that sends one-way messages to inform employees and the public of an emergency. Organizations best served by a mass notification system include fire and police departments; emergency management organizations; federal, state and local governments.

         Such systems can improve the safety and security of an organization by providing alerts and real-time instruction during a crisis.

         Mass notification systems have a database of names, phone numbers, email addresses and delivery methods. Emergency notification software must have a strong communicationsinfrastructure with enough bandwidth to deliver thousands of messages. People and organizations can be contacted via prerecorded phone calls, text messages, emails and social media. Human action can activate an MNS, as can sensing devices such as smoke or gas detectors and specialized task-specific systems for such things as security.

9. Fire detection and Evacuation

      

         A fire alarm system has a number of devices working together to detect and warn people through visual and audio appliances when smokefire,carbon monoxide or other emergencies are present. These alarms may be activated automatically from smoke detectors, and heat detectors or may also be activated via manual fire alarm activation devices such as manual call points or pull stations. Alarms can be either motorized bells or wall mountable sounders or horns. They can also be speaker strobes which sound an alarm, followed by a voice evacuation message which warns people inside the building not to use the elevators

         Emergency evacuation is the urgent immediate egress or escape of people away from an area that contains an imminent threat, an on-going threat or a hazard to lives or property.

Evacuation sequence

The sequence of an evacuation can be divided into the following phases:

  1. detection

  2. decision

  3. alarm

  4. reaction

  5. movement to an area of refuge or an assembly station

  6. transportation

10. Voice and data infrastructure

      Voice/Data Infrastructure is a critical system that affects the operation of any enterprise at the highest level. 

      Voice and Data Infrastructure consists of the wire, connectors, back boxes, switches, routers, physical support structure, racks, and conduits necessary to distribute data wire or fiber throughout a facility. This infrastructure supplies the communication pathways for telephone, computer, surveillance, access control, climate control, video broadcast systems and more. Part of data infrastructure usually includes a wireless network, which is typically utilized for mobile devices within and around the building.

11. Paging, Supervised Radio, Background Sound

         Paging systems audibly announce messages to occupants of a building utilizing microphones and speakers. Paging systems can be zoned so that only certain areas are paged accordingly. Wireless supervised radios can also function as a microphone to the paging system. Background sound systems are typically part of the paging platform and provide the amplifier and speaker portion of the system. When paging is not being utilized, the system plays music or other background sound.

 

 

 

 

12. Climate control systems

 

 Properly controlling your thermostats for heaters, airconditioners, and freezers can save money and the environment. Our climate control systems can utilze cloud-based analytics to detect HVAC inefficiencies and help to save up to 28% in energy costs.

         Climate Control Systems utilize thermostats in a building to control heating and air conditioning systems (HVAC). Further temperature adjustments are also based on individual preference and the time of day. These systems can have advanced modeling features to sense when HVAC units are malfunctioning and when to setback temperatures based on outdoor/indoor temperatures and building occupancy.

13. Critical system monitoring

                There are times which you need to act quickly on critical systems. With critical sensing equipment, you can                      automatically shut down or change operation of critical systems (freezers, refrigerators, backup generators, switchgear, ups) and be contacted via email, text, or call.

 Critical systems typically consist of: generators, back up batteries, solar systems, electrical switching gear, IT infrastructure, freezers, air cooling and heating units, climate control systems, surveillance systems, fire alarm systems, intrusion systems, gas supply and flow systems, gas leak detection, freeze warning systems, water flow and water detection systems and much more.

Many types of alarm systems will monitor all or most of these critical systems. The critical systems monitoring equipment typically logs and sounds an alarm as appropriate. Further action would consist locking doors, shutting off valves, turning on generators or any number of actions which are designed to reduce or eliminate further damage caused by the critical system failure. Finally, the system typically notifies authorities, owners, and maintenance personnel as appropriate through a monitoring center, email, text, or phone call.

 

 

 

14. Utility sub metering systems

 

Submetering monitors the supply and use of resources, including water, natural gas, and electricity allowing the building managers to save by making individual tenants more accountable.

 

SubMetering Systems connect directly to electrical or other utility supply lines and measure the amount of resources being consumed at any given time. SubMetering systems are designed to divide the load into specific areas so as to measure the consumption in more detail for accurate accountability of resources used by tenents, structures, areas or even individual machines. These systems feed information into advanced system software for analyzing the data, which provides reports and possible ways to lower the consumption of resources.

 

  1. Lightning control  and management system

 

 

Lighting accounts for the second highest energy consumption in commercial buildings. If you are not effectively managing your lighting, you are wasting energy, as well as money.

 

Lighting control systems turn lights on and off or dim them based on time, occupancy, events, alarms or manual override. The lighting system software and computer control light switches or circuit breakers either by a control wire, wireless, or by multiplexing the signal through the electrical system of the building. Often times, the lighting control system will also control window shades and active skylights as part of a total lighting solution.

 

  1.  Emergency  operations and command centers

 

 

Command and Control Centers receive signals from dozens, hundreds or even thousands of other systems. When a signal is received, the control center software processes the signal by determining what it is and what other associated field equipment may offer more information and possibly what other signals may be relevant to the first signal. Once processed, the system calls this an event, the system routes (event routing) all of this information to an operator who is authorized to evaluate the situation. A situation may include several events, which of course may each comprise of multiple signals.

 

The operator is oriented to the situation by the system, which provides graphical maps, video, audible, and textual information, pdf files, and more. The system may also suggest actions for the operator to take. Operator actions and automatic actions may consist of: locking doors, changing the security credentials to open doors, placing phone calls, texts, or interrupting computer operations, sounding alarms, evacuating areas, shutting down HVAC units, recalling elevators, dispatching guards, starting generators, and much more.

 

  1. Energy management systems

 

Energy Management Systems connect directly to electrical generation or supply lines and measure the amount of power being consumed at any given time. These systems feed information into advanced system software for analyzing the data, which provides reports and possible ways to lower the consumption of resources

Service 1 _
 

I'm a paragraph. Click here to add your own text and edit me. I’m a great place for you to tell a story and let your users know a little more about you.

Service 2 _
 

I'm a paragraph. Click here to add your own text and edit me. I’m a great place for you to tell a story and let your users know a little more about you.

Service 3 _
 

I'm a paragraph. Click here to add your own text and edit me. I’m a great place for you to tell a story and let your users know a little more about you.

Service 4 _
 

I'm a paragraph. Click here to add your own text and edit me. I’m a great place for you to tell a story and let your users know a little more about you.

Service 5 _
 

I'm a paragraph. Click here to add your own text and edit me. I’m a great place for you to tell a story and let your users know a little more about you.

Service 6 _
 

I'm a paragraph. Click here to add your own text and edit me. I’m a great place for you to tell a story and let your users know a little more about you.

bottom of page