Найти в Дзене
Smart Future
On April 21, 2017, at the Shanghai International Auto Show, the 2017 Huayang Automotive Electronics New Product Launch Conference with the theme of “Smart Future” was held at the Hyatt on the Bund. At the press conference, Huayang Group officially released the smart cockpit multi-screen integrated interconnection control solution and 12.3 inch dual horizontal screen system, FDM streaming media rearview mirror, HUD and other new products. The depot customer representative and many domestic mainstream media reporters Witnessed this important moment...
5 лет назад
Smart door lock
Recently, smart door lock manufacturer Yunding Technology released a new generation of products, Lok Touch, as the new home smart door lock brand of Yunding, the first product launched by Luke, and the world's first artificial intelligence door. lock. The "Yen" and "Brain" Luke smart door locks have attracted attention as soon as they appeared. The "door lock iPhone" has become the market's most evaluation of this new product. Below, please take a look at the details together with the safety net...
5 лет назад
Xiamen Di Nike and China Telecom
Recently, China Telecom Fujian Corporation IoT Partner Conference was held in Fuzhou. As a partner of China Telecom's Internet of Things, Xiamen Di Nike Electronic Technology Co., Ltd. was invited to participate in the signing of the NB-IoT key project cooperation agreement. China's new generation of Internet of Things is in full swing. Recently, the China Telecom Fujian Company IoT Partner Conference, with the theme of “Improvement of New Reality in the IOT”, was held in Fuzhou. The leaders of...
5 лет назад
iHouse
On May 27th, the “2017 Hangzhou (International) Future Life Festival”, Hongyan Electric brought a new “iHouse Whole House Smart Solution” to the show. The program will be remote control, one-button arming, self-sensing startup, and so on. It can be seen in the science fiction film, and it is integrated into the family life without any sense of disobedience, which makes the audience open their eyes. 1. Control simpler "full house intelligence" For a long time, many smart home systems have problems in that the control of mobile phones is complicated and the products are not practical enough...
5 лет назад
Network DVR features
First, easy to use, easy to operate Network DVRs have very simple and convenient use and operation features, so you don't have to worry about the operation and use of networked monitoring. Second, flexible and reliable storage Network DVRs also have highly integrated and convenient video storage features, which can be centrally stored through local hard drives, and can meet massive storage needs through external storage devices. The front end in the DVR system is an analog device, which cannot be used for front-end storage...
5 лет назад
Webcam features
By using the existing integrated wiring network to transmit images, the real-time monitoring system requires fewer front-end devices, and the connection is simple. The back-end only needs a software system. The main equipment network camera adopts the embedded real-time operating system, the required equipment is simple, and the image transmission is realized through the integrated wiring network, and the system reliability is quite high. The required equipment is extremely simple, and the control...
5 лет назад
Fingerprint
2017 can be said to be a year of the explosion of the fingerprint lock market. With the improvement of their respective technologies and continuous breakthroughs, new products are also constantly. As a well-known brand of fingerprint locks, Deschman, because of the good reputation of many classic styles, every release is always looking forward to. According to reliable news, Deschman started again, the new product launch is coming soon, and all kinds of features and prices for the new machine are full of speculation...
5 лет назад
China Smart Lock Security Index White Paper" officially released
On the morning of May 27th, at the 8th China (Yongkang) International Door Industry Expo held at Yongkang International Convention and Exhibition Center, initiated by Wang Lian Anti-Tech Co., Ltd., China Security Products Industry Association, China Door and Window Association Curtain Wall Branch, China Architecture The China Smart Lock Security Index white paper jointly supported by the Decoration Association Materials Branch was officially released. Below, please take a look at the details together with the safety net...
5 лет назад
Network security(part 3)
How mobile phones are attacked and leaked Then, in such a flood of mobile phone leakage environment, where should China's mobile phone information security protection go? How to use the mobile phone network safely? 1. Download the mobile application software from the regular software release mall. For smartphones with Android or IOS Apple mobile phone system, the application function of the smartphone is expanded by installing some application software, but this also brings some security risks...
5 лет назад
Network security(part 1)
With the continuous development of the Internet and smart terminals, mobile phones have long become an indispensable tool for people's work, life and entertainment. It is also because of its powerful function, a little careless, and the situation of "injury" to oneself is of course more common. So, how should daily mobile phone network security be protected? Safety net to tell the relevant network security tips. Definition of network security Network security means that the data in the hardware, software and systems of the network system is protected...
5 лет назад
Network security(part 2)
Mobile network dangers Information that is sent by a mobile device that is not encrypted during communication, such as e-mail. In addition, many applications are not encrypted by the data they send and receive on the network, and are easily intercepted. For example, if an application transmits data to an unencrypted WiFi network using HTTP (rather than secure HTTP), the data can be easily intercepted. When a wirelessly transmitted data is not encrypted, it can be easily intercepted. Users can download applications that contain malware...
5 лет назад
Information Security (part 3)
We continue on the prevention of information leakage Technical precautions against network leakage: First, identity authentication. The identification of the user by the computer is mainly to check the password input by the user. The use of the resource information by the legitimate user in the network also has the problem of using the right, so the use of the password must be strictly managed. Of course, there are other methods for identifying the user, such as using magnetic cards, fingerprints, sounds, retina images, etc...
5 лет назад