{"id":32137,"date":"2017-06-16T10:00:20","date_gmt":"2017-06-16T02:00:20","guid":{"rendered":"http:\/\/www.mec.ph\/?p=32137"},"modified":"2022-02-24T14:44:34","modified_gmt":"2022-02-24T06:44:34","slug":"bosch-security-tips-part-1","status":"publish","type":"post","link":"https:\/\/mec.ph\/blogs\/bosch-security-tips-part-1\/","title":{"rendered":"ICTip #10: Bosch Security Tips (Part 1)"},"content":{"rendered":"\t\t
When we say Bosch, the first thing that may come to mind are power tools for constructions and spark plugs for automotive, but the Bosch product portfolio is much larger than this.\u00a0Bosch Security<\/strong> consists of the brand\u2019s security & safety products that ensure the safety of the people and assets. Bosch Security provides\u00a0end-to-end solutions with its range of\u00a0IP Cameras (Bosch), Video Management Software (Bosch) and even Storage (Bosch) all coming from the\u00a0same brand\/manufacturer.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t With Bosch Video Systems it ensures that it delivers crisp images with its camera that is built for security, equipped with the latest technology of sensors and lens it delivers colored images even in low light conditions with its\u00a0STARLIGHT<\/b>\u00a0Technology<\/strong>.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t Bosch Video Systems can also retrieve recorded videos with its\u00a0Forensic Search\u00a0<\/b>feature wherein the system finds the playback video within the timeline depending on the parameters that the operator\/s has been set. It uses built-in analytics to find a certain video thus reducing the time of reviewing the saved videos.<\/p> \u00a0<\/p> #ICTipsByMEC #ICTMonth2017<\/strong><\/p> \u00a0<\/p> \u2014 Rian Panado, Technical Consultant for Physical Security<\/strong><\/p> \u00a0<\/p><\/div><\/div> \u00a0<\/p>Starlight Technology<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
Forensic Search<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
We distribute:<\/h3>