Popularity of Sur-Gard MLR2 multi-line digital receiver set to continue

Dec '99 Perimeter Security, Alarms & Intruder Detection

As a principal development resource for the DSC Group, SUR-GARD’s alarm communications technology is incorporated into a diverse array of products marketed under the DSC and SUR-GARD nameplate. Known as one of the most successful manufacturers of digital receivers in the world, SUR-GARD will be entering the millennium with a feature-rich digital receiver, MLR2 which now incorporates even more features than before.

Separate liquid crystal displays, micropro­cessors and power supplies for each of the line cards and for the CPM2, combined with ­special programming, means total line card independence. They can even keep working with the CPM2 removed from the rack in manual mode. Each line card has two separate circuits to decode the pulse/tone data. The user or the ­microprocessor can determine which gives the best results for weak signals.

Growing with the MLR2

• Expandable to 14 lines (total of 7 DRL2A modules).

• Program memory space to spare-capacity to meet new demands and decode new formats, growing and changing with the needs of modern monitoring requirements.

• Generous data memory allows for large event buffers and easy, flexible user programming.

Control flexibility

• Choose the handshakes you want, and in what order.

• Tailor the output to the computer.

• Change the printer and computer output to be full time, back-up, or not used.

• Customising is done from the keypad and front panel switches or remote via serial port.

Diagnostics

• All programming can be verified on the LCD display or printed.

• Printer events, computer events and call display records can be examined on the LCD and copied to the printer.

• The CPM2 polls each line card regularly.

• Line cards supervise the CPM2 polling.

• The printer is checked for presence, paper out, etc.

• The computer communication is verified with heartbeat test signals. Signals are buffered ­during computer outages.

Security

• 16 master and operator passwords.

• Operator acknowledge with time/date printed and advised to computer.

Verification

• Two-way audio.

• Downlook video verification.

• Built-in Caller-ID display, gives the phone number from which the call originates. ‘Ghost’, mis-programmed, or malfunctioning diallers, as well as wilful interference can now be traced.

For details contact Elvey International on tel: (011) 401 6700, e-mail: [email protected] or visit www.elvey.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Adding AI analytics to security monitoring
SEON South Africa News & Events Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) AI & Data Analytics
SEON has announced its latest integration with Refraime, an AI-powered video analytics platform designed to elevate CCTV surveillance through real-time object detection and intelligent alerting.

Read more...
Keenfinity launches Radionix as new intrusion brand
Perimeter Security, Alarms & Intruder Detection News & Events
Keenfinity Group’s Intrusion & Access Business Unit has launched Radionix as its new brand for intrusion alarm systems, unlocking new potential and growth opportunities.

Read more...
The first choice for electric fence management
Stafix Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) Products & Solutions
In South Africa, over 500 housing estates use JVA Perimeter Patrol, making it a widely used Electric Fence Management providing seamless integration with alarms, CCTV, VMS, access control and control room third-party software.

Read more...
New JVA MBxL energiser range
Stafix Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) Products & Solutions
The latest MBxL energisers stand out for their simplicity, allowing you to push the “On” button and have the unit tick away, or to configure it through our virtual keypad (VKP).

Read more...
Smart protection for modern living
Products & Solutions Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry)
Recognised globally for their performance and sleek design, AJAX solutions combine professional-grade security with user-friendly control, making them ideal for both residential and commercial environments.

Read more...
How intrusion protection helps secure O&G operations
Axis Communications SA Surveillance Perimeter Security, Alarms & Intruder Detection Industrial (Industry)
For O&G operators in Africa, physical security remains one of the biggest considerations, particularly when it comes to perimeter protection and the ability to mitigate intruder-related incidents.

Read more...
New AI perimeter app package
Dallmeier Electronic Southern Africa Perimeter Security, Alarms & Intruder Detection
With the new AI Perimeter App Package, Dallmeier has extended the application range of its neural AI perimeter network. Previously only available for the Panomera S4 Perimeter camera, this technology is now also available for additional models.

Read more...
JVA 4-line LCD keypad
Perimeter Security, Alarms & Intruder Detection
The JVA 4-line LCD keypad is integral to the JVA Security Electric Fence product range and provides a centralised interface between the customer and their perimeter security solution.

Read more...
Gallagher’s Integrate 360 event in Durban
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security held its Integrate 360 event in Durban, South Africa. The event attracted 65 channel partners, end users, and consultants from across KwaZulu-Natal and broader South Africa to showcase the latest in Gallagher’s technology suite.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.