News RSS
How to transfer settings and devices from one hub to another
Ajax security system allows the transfer of user data, settings, and connected devices between hubs operating on OS Malevich 2.9 or later. Use this feature to switch to a new hub without connecting each device separately and reconfiguring the system. This feature will also be useful if you need to resume the security of the object quickly, but your hub is out of order: settings can be transferred from the hub, which is offline. The time it takes to import data to a new hub depends on the number of connected devices and the specified detector ping interval: the longer the...
Ajax Special Event: new products in a broadcast to 96 countries
“Now, you can use Ajax to protect what you couldn’t have before: boats, commercial cars, even camper vans. And millions of users of old wired systems can now easily and quickly get the modern level of security”, said Aleksandr Konotopskyi, CEO of Ajax Systems.
How to calculate the time of operation of the central panel from an external battery?
Divide the capacity of the external battery by the power consumption of the central panel. Power consumption of the central panel depends mostly on active communication modules — the average values are indicated in the table: Central panel Active communication modules Average input current Hub GSM 42 mA Ethernet 80 mA GSM+Ethernet 90 mA Hub Plus GSM 35 mA Ethernet 72 mA GSM+Ethernet 93 mA Wi-Fi 20 mA Wi-Fi+GSM 42 mA Wi-Fi+Ethernet 80 mA Wi-Fi+GSM+Ethernet 96 mA Hub 2 GSM 33 mA Ethernet 80 mA GSM+Ethernet 86 mA ReX — 20 mA For instance, when connected to a 40A·h battery,...
Facial Recognition or FaceID, how does it work?
With the launch of the new iPhone X and latest models, Apple again sets the technological trend for the coming years, both in Smartphones and in the world of electronics. The presentation of their face recognition system, Apple calls theirs Face ID, has sparked many questions as to how it actually works. Facial recognition has been around for many years and its use in security has been very successful, albeit expensive, for controlling access to high security installations. Early devices had a relatively slow recognition time which has gradually been improved upon over the years. Facial recognition systems...
AJAX Hubs differences
Ajax Hub model Hub Hub Plus Hub 2 Devices 100 150 100 Cameras and DVRs 10 50 25 Range extenders 1 5 5 Users 50 99 50 Security groups 9 25 9 Scenarios1 5 64 32 Visual alarm verification support No No Yes Communication channels 2G2 1xSIMEthernet 2G/3G3 2хSIMEthernetWi-Fi 2G2 2хSIMEthernet 1 Scenarios "By arming and disarming" are not included in the overall limit of the hub’s scenarios. The number of such scenarios depends on how many automation devices are connected to the security system — one scenario per one automation device 2 GSM 850/900/1800/1900 MHz 3 2G (GSM 900/DCS 1800), 3G (WCDMA...