{"id":10154,"date":"2017-11-27T12:24:31","date_gmt":"2017-11-27T10:24:31","guid":{"rendered":"http:\/\/www.centsys.co.za\/?p=10154"},"modified":"2017-11-27T12:24:31","modified_gmt":"2017-11-27T10:24:31","slug":"build-intruder-detection-system-heres","status":"publish","type":"post","link":"https:\/\/www.centsys.com\/fr\/build-intruder-detection-system-heres\/","title":{"rendered":"Build Your Own Intruder-Detection System. Here&#8217;s How"},"content":{"rendered":"<p>One&#8217;s entrance gate represents the\u00a0<strong>first line of defense<\/strong>\u00a0against intrusion and other breaches of the perimeter, making it critically important that this access point is\u00a0<strong>sufficiently secured<\/strong>.<\/p>\n<p>When CENTURION product specialist\u00a0<strong>Louis Groenewald<\/strong>\u00a0was recently approached to design a working\u00a0<strong>intruder-detection system<\/strong>\u00a0for a client whose home had suffered a spate of break-ins, Louis knew he would have to get creative.<\/p>\n<p>&#8220;The client had multiple break-ins during which the perpetrators lifted the gate [from the rail], thereby gaining entry to the property,&#8221; explains Louis.<\/p>\n<p>&#8220;[The homeowner does have]\u00a0safety beams installed at the gate but, for their own\u00a0reasons, they didn&#8217;t\u00a0want to connect the beams as safety devices.<\/p>\n<p>This automatically eliminated the use of the built in beam alarm function as an option. They also wanted a\u00a0<strong>two-stage warning system<\/strong>,\u00a0 whereby the first activation would\u00a0be a &#8216;softer&#8217;\u00a0sound bomb and, should the would-be intruder continue\u00a0to tamper, a &#8216;louder&#8217;\u00a0sound bomb would activate.<\/p>\n<p>Being an entry way, one wouldn&#8217;t\u00a0want the alarm\u00a0to activate while the gate is open.\u00a0That is where the external relay linked to the gate status by means of the XIO output comes in.&#8221;<\/p>\n<p>Louis stresses, however, that\u00a0<strong>it is entirely possible to use the CENTURION D-Series&#8217; built-in Intruder-detection Alarm feature-set to achieve exactly the same results<\/strong>.<\/p>\n<p>&#8220;This is merely an alternative\u00a0to using beam alarms, especially where\u00a0the beams aren\u2019t being used for safety purposes &#8211; in other words, not connected to the safety close input on a D-Series controller &#8211;\u00a0and for gate perimeter monitoring for tampering purposes.<\/p>\n<p>The safety beams will still &#8216;click&#8217;\u00a0when they are obstructed, creating the illusion of standard safety beams&#8221;.<\/p>\n<p>Check out Louis&#8217; innovative solution <a href=\"https:\/\/gallery.mailchimp.com\/d0e9356493bcab69464abd890\/files\/e8e7ed92-4145-466a-a284-a7d2b93e400a\/Two_Stage_Intruder_Alarm_Circuit.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One&#8217;s entrance gate represents the\u00a0first line of defense\u00a0against intrusion and other breaches of the perimeter, making it critically important that this access point is\u00a0sufficiently secured. When CENTURION product specialist\u00a0Louis Groenewald\u00a0was recently approached to design a working\u00a0intruder-detection system\u00a0for a client whose home had suffered a spate of break-ins, Louis knew he would have to get creative. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":10157,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_joinchat":[],"footnotes":""},"categories":[9],"tags":[],"class_list":["post-10154","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-alarm-systems"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>Build Your Own Intruder-Detection System. Here&#039;s How - Centurion Systems French<\/title>\r\n<meta name=\"description\" content=\"In this article, one of our resident product specialists tells you how to build your own intruder-detection system\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.centsys.com\/fr\/build-intruder-detection-system-heres\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Build Your Own Intruder-Detection System. Here&#039;s How - Centurion Systems French\" \/>\r\n<meta property=\"og:description\" content=\"In this article, one of our resident product specialists tells you how to build your own intruder-detection system\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.centsys.com\/fr\/build-intruder-detection-system-heres\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Centurion Systems French\" \/>\r\n<meta property=\"article:published_time\" content=\"2017-11-27T10:24:31+00:00\" \/>\r\n<meta name=\"author\" content=\"Charl Mijnhardt\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Charl Mijnhardt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/build-intruder-detection-system-heres\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/build-intruder-detection-system-heres\\\/\"},\"author\":{\"name\":\"Charl Mijnhardt\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\"},\"headline\":\"Build Your Own Intruder-Detection System. Here&#8217;s How\",\"datePublished\":\"2017-11-27T10:24:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/build-intruder-detection-system-heres\\\/\"},\"wordCount\":288,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/build-intruder-detection-system-heres\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"alarm systems\"],\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/build-intruder-detection-system-heres\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/build-intruder-detection-system-heres\\\/\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/build-intruder-detection-system-heres\\\/\",\"name\":\"Build Your Own Intruder-Detection System. Here's How - Centurion Systems French\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/build-intruder-detection-system-heres\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/build-intruder-detection-system-heres\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2017-11-27T10:24:31+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\"},\"description\":\"In this article, one of our resident product specialists tells you how to build your own intruder-detection system\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/build-intruder-detection-system-heres\\\/#breadcrumb\"},\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/build-intruder-detection-system-heres\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/build-intruder-detection-system-heres\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/build-intruder-detection-system-heres\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Build Your Own Intruder-Detection System. Here&#8217;s How\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\",\"name\":\"Centurion Systems French\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-ZA\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\",\"name\":\"Charl Mijnhardt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"caption\":\"Charl Mijnhardt\"},\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/author\\\/charl\\\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Build Your Own Intruder-Detection System. Here's How - Centurion Systems French","description":"In this article, one of our resident product specialists tells you how to build your own intruder-detection system","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.centsys.com\/fr\/build-intruder-detection-system-heres\/","og_locale":"en_US","og_type":"article","og_title":"Build Your Own Intruder-Detection System. Here's How - Centurion Systems French","og_description":"In this article, one of our resident product specialists tells you how to build your own intruder-detection system","og_url":"https:\/\/www.centsys.com\/fr\/build-intruder-detection-system-heres\/","og_site_name":"Centurion Systems French","article_published_time":"2017-11-27T10:24:31+00:00","author":"Charl Mijnhardt","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Charl Mijnhardt","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.centsys.com\/fr\/build-intruder-detection-system-heres\/#article","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/build-intruder-detection-system-heres\/"},"author":{"name":"Charl Mijnhardt","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23"},"headline":"Build Your Own Intruder-Detection System. Here&#8217;s How","datePublished":"2017-11-27T10:24:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/build-intruder-detection-system-heres\/"},"wordCount":288,"commentCount":0,"image":{"@id":"https:\/\/www.centsys.com\/fr\/build-intruder-detection-system-heres\/#primaryimage"},"thumbnailUrl":"","articleSection":["alarm systems"],"inLanguage":"en-ZA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.centsys.com\/fr\/build-intruder-detection-system-heres\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.centsys.com\/fr\/build-intruder-detection-system-heres\/","url":"https:\/\/www.centsys.com\/fr\/build-intruder-detection-system-heres\/","name":"Build Your Own Intruder-Detection System. Here's How - Centurion Systems French","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/build-intruder-detection-system-heres\/#primaryimage"},"image":{"@id":"https:\/\/www.centsys.com\/fr\/build-intruder-detection-system-heres\/#primaryimage"},"thumbnailUrl":"","datePublished":"2017-11-27T10:24:31+00:00","author":{"@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23"},"description":"In this article, one of our resident product specialists tells you how to build your own intruder-detection system","breadcrumb":{"@id":"https:\/\/www.centsys.com\/fr\/build-intruder-detection-system-heres\/#breadcrumb"},"inLanguage":"en-ZA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.centsys.com\/fr\/build-intruder-detection-system-heres\/"]}]},{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/www.centsys.com\/fr\/build-intruder-detection-system-heres\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.centsys.com\/fr\/build-intruder-detection-system-heres\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.centsys.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Build Your Own Intruder-Detection System. Here&#8217;s How"}]},{"@type":"WebSite","@id":"https:\/\/www.centsys.com\/fr\/#website","url":"https:\/\/www.centsys.com\/fr\/","name":"Centurion Systems French","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.centsys.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ZA"},{"@type":"Person","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23","name":"Charl Mijnhardt","image":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","caption":"Charl Mijnhardt"},"url":"https:\/\/www.centsys.com\/fr\/author\/charl\/"}]}},"_links":{"self":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/10154","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/comments?post=10154"}],"version-history":[{"count":0,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/10154\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/media?parent=10154"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/categories?post=10154"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/tags?post=10154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}