Sensormatic combines the strengths of Motorola's Power PC and Microsoft's Windows CE to develop new network controller

May 2000 Access Control & Identity Management

Sensormatic Electronics Corporation has announced that its Access Control and SensorID Division is developing a new network controller that will use Motorola's embedded PowerPC processor. The new integrated network controller is the first to utilise both Motorola PowerPC and Microsoft Windows CE in a multifunctional modular control device. This innovative design creates a strong application backed by products that are regarded as industry standards.

This new product from Sensormatic ACD, scheduled for release later this year, is an intelligent modular controller that can integrate such applications as access control, alarm management, RFID/asset management, parking management, video multiplexing and transmission and video surveillance camera control from a single controller. This intelligent controller takes these complex operations and packages them into one streamlined product.

"Sensormatic's leading position in the access control and security system market is enhanced by this innovative product," said Don Chouinard, Marketing Manager of Windows CE at Microsoft. "By powering their new controller with the very well regarded embedded Motorola PowerPC and infusing it with the rich system services of Windows CE they have created a true front runner."

"We are very excited about this new endeavour and believe the technical advantages that Motorola PowerPC and Windows CE offer can greatly benefit us as we prepare to launch our new controller," said Steve Cannellos, Senior Vice President and General Manager of Sensormatic's ACD and RFID Division.

Smart technology pairing

"Sensormatic's design is smart," said Barbara Calapristi, Marketing Manager for PowerPC Solutions for Windows CE at Motorola Semiconductor Products Sector. They have captured the signature communication features of the Motorola PowerPC MPC860 and married it to the strong features of Windows CE. This is a great example of smart pairing between Motorola PowerPC and Microsoft's Windows CE."

Sensormatic's C(CURE 800/8000) scalable security management system, manufactured and marketed by ACD, is the industry's most advanced product for access control and integrated control of related security system components.

For details, contact Sensormatic Distribution's Brian Hill on tel: (011) 466 0190 or fax: (011) 466 0198 or e-mail: [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who has access to your face?
Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts,

Read more...
Advanced time & attendance solutions
Technews Publishing Access Control & Identity Management Products & Solutions
From biometric devices to a powerful mobile app, you will see how businesses of all sizes save time, cut costs, and improve productivity with BioSyn.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Visitor management views
Entry Pro ATG Digital Technews Publishing SMART Security Solutions Access Control & Identity Management Residential Estate (Industry)
Visitor management is always changing, taking technology and legislation into account. SMART Security Solutions examines the latest trends with input from ATG Digital and Entry Pro.

Read more...
Securing your estate beyond the gate
ATG Digital Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
Protecting gated communities and lifestyle estates requires a modern, intelligent approach. A truly intelligent system protects both physical and digital perimeters, it must be a fully integrated ecosystem.

Read more...
Reliability, innovation and flexibility
Entry Pro Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Through constant innovation and advancement in technology and systems, Entry Pro strives to provide its clients with not only the most suitable, but also the most advanced solution.

Read more...
Smarter security with automated visitor management
LD Africa Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Automated visitor management solutions, like LD Access, are transforming this process by reducing human workload, while enhancing security and efficiency.

Read more...
Paxton enhances installer loyalty programme
Paxton Access Control & Identity Management News & Events
Paxton has made it easier for security installers to benefit from its popular loyalty programme, Paxton Rewards, with points now added automatically when purchasing through approved distribution partners.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Rethinking access control in high-risk logistics environments
ATG Digital Access Control & Identity Management Transport (Industry) Logistics (Industry) Facilities & Building Management
South Africa’s logistics sector is under constant pressure, not only from external threats like hijackings and cargo theft, but also from internal vulnerabilities, operational blind spots, and limited support.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.