Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/showpost/34324.aspx
INSIGHTS

Painting a 3-D Picture in Security

Painting a 3-D Picture in Security
Regardless of the type of 3-D technology, there are inevitably certain hardware and software requirements. Ultimately, “when it comes to 3-D technology, the question comes down to processing power and the ability to visualize 3-D content in a timely manner. In the context of a security environment, this becomes especially important as you need to ensure real-time access to data and do not want to be in a position of overloading the system,” said Rémi Bréval, Associate Director of Product Technologies at Genetec.

Hardware and Software Requirements
Regardless of the type of 3-D technology, there are inevitably certain hardware and software requirements. Ultimately, “when it comes to 3-D technology, the question comes down to processing power and the ability to visualize 3-D content in a timely manner. In the context of a security environment, this becomes especially important as you need to ensure real-time access to data and do not want to be in a position of overloading the system,” said Rémi Bréval, Associate Director of Product Technologies at Genetec.

Furthermore, “consideration should be given to which 3-D technology is required,” said Keith Bloodworth, CEO of CNL Software. For example,...



Product Adopted:
Others
Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to: