{"id":1179,"date":"2012-10-17T08:38:42","date_gmt":"2012-10-17T08:38:42","guid":{"rendered":"http:\/\/154.66.198.29\/?p=1179"},"modified":"2012-10-17T08:38:42","modified_gmt":"2012-10-17T08:38:42","slug":"centurion-uses-key-technologies-to-help-keep-you-safe","status":"publish","type":"post","link":"https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe\/","title":{"rendered":"CENTURION Uses Key Technologies to Help Keep You Safe"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;3.22&#8243;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]\u201cAnd slowly, and surely, they drew their plans against us\u201d<\/p>\n<p>This iconic line forms part of the introduction to one of the most famous radio plays ever to be recorded, the Orson Welles adaptation of H.G. Wells\u2019 unnerving sci-fi tour de force, <em>The War of the Worlds<\/em>. Of course, the conspirators Wells was referring to here were malicious otherworldly intelligences intent on destroying our planet and\/or enslaving the human race. It was gripping stuff; so gripping, in fact, that it sowed widespread panic when it was broadcast sometime during the beginning of the previous century.<\/p>\n<p>So how does the father of modern science fiction\u2019s ominous opening words \u2013 so utterly ripe with foreboding \u2013 relate to the <strong>current security situation in South Africa<\/strong>?<\/p>\n<p>It\u2019s quite simple, really. The reality is that yes, South Africa sleeps, but it is an uneasy sleep plagued by nightmares of home invasions and crooks lurking about in the night. In this sense, we are akin to <em>War<\/em>\u2019s protagonist (and indeed, all of mankind), our eyes darting nervously about as we await the imminent invasion and the terrible fate that awaits us.<\/p>\n<p>But it need not be that way. If there is one prevailing theme throughout the history of mankind, it is the triumph of good over evil. We, the average citizens of this country, the home and business owners, are Good, while the criminals represent the forces of Evil.<\/p>\n<p>Centurion Systems has developed a number of <strong>key technologies<\/strong> to aid the forces of Good in this eternal struggle, and to help South Africans sleep more soundly, secure in the knowledge that their homes and families are <strong>safe<\/strong>. It is worth noting that <strong>CENTURION is a South African company<\/strong> with South African sensibilities, always in tune with the <strong>unique security needs<\/strong> of the country.<\/p>\n<p><strong>CENTURION<\/strong>\u2019s ongoing influence in the fight against crime is clearly evident in the following technologies:<\/p>\n<p><strong><u>Intruder-detection Alarms<\/u><\/strong><\/p>\n<p>As children, the majority of us were told cautionary tales and feared the \u201cbogeyman\u201d: an exaggerated evil entity that would come for us if we misbehaved. But, in our childlike innocence, we knew that switching on the light would render the bogeyman powerless and banish him to the realms of shadow whence he came.<\/p>\n<p>In the slightly imagination-stripped world of adulthood, the bogeyman takes the shape of criminals wanting to get their hands on our possessions \u2013 or otherwise cause us harm \u2013 and the entrance gate is the typical point where they would try breach <strong>perimeter security<\/strong>. From following hapless homeowners into their properties to obstructing the gate safety beams so that the gate stays open, criminals have devised all sorts of clever ways of gaining entrance.<\/p>\n<p>The <strong>Intruder-detection Alarm feature-set<\/strong> is <strong>CENTURION<\/strong>\u2019s interpretation of \u201cswitching on the light\u201d and catching the bogeyman in the act.\u00a0 These alarms \u2013 consisting of the <strong>Break-in Alarm<\/strong> and <strong>Ambush Alarm<\/strong> \u2013 work by sounding the onboard buzzer of your <strong>D-Series operator<\/strong> (D10\/D10 Turbo, D5-Evo, SECTOR, VECTOR2) whenever the infrared gate safety beams are interrupted, or remain interrupted for a predefined period of time.<\/p>\n<p>Consider, if you will, the practical application of these alarms: A potential intruder has been staking out your house for a couple of nights and knows your habits, your comings and goings. Then, one night, the criminal sees you enter your property and decides to stick some insulation tape over the lenses of the beams, thereby keeping the gate open and affording himself ample opportunity to enter the yard.<\/p>\n<p>But the joke\u2019s on him, because you have enabled the Ambush Alarm which promptly picks up that the beams have been obstructed for the preset period of time, and it triggers the alarm which you have relayed to your security company. The armed response chaps arrive and arrest the would-be burglar. Threat neutralised.<\/p>\n<p><strong><u>ChronoGuard<\/u><\/strong><\/p>\n<p>As you can most probably deduce from its name, <strong>ChronoGuard<\/strong> was named after the Greek word for time, \u201c<strong>chronos<\/strong>\u201d, which is also used as a prefix in English words related to time (think: \u201cchronological\u201d).<\/p>\n<p>Yes, the ChronoGuard is a timer, but it is a timer that opens up a world of <strong>access control\u00a0<\/strong>possibilities.<\/p>\n<p>Take, for example, the <strong>Auto-activations<\/strong> feature offered by ChronoGuard. Using the onboard Real Time Clock and Calendar found in <strong>CENTURION<\/strong> D-Series controllers, this feature allows you to set up to <strong>100 unique time periods<\/strong> that can be used to perform a myriad automatic activations. Among them:<\/p>\n<ul>\n<li>Opening your gate during busy times, such as in the mornings, so that your gate motor\u2019s battery is not run flat from continually opening and closing<\/li>\n<li>Interfacing with an irrigation system to water your garden at certain times of the day<\/li>\n<li>Automatically switching on a security light only at night so as not to waste electricity<\/li>\n<\/ul>\n<p>The possibilities are virtually endless.<\/p>\n<p>Then there\u2019s the <strong>Time-barring functionality<\/strong>. This security feature is useful to anyone from home-owners to managers who want to restrict access to their property after work or during weekends. Time-barring can be used to inhibit signals from remote controls or even physical triggers, so criminals won\u2019t be able to simply short-circuit wires in order to get the gate to open.<\/p>\n<p>From a practical application perspective, this is very handy since employers who have issued their staff with remotes can configure their D-Series gate motor or traffic barrier to work during normal office hours, but ignore inputs from remotes after hours. Hey presto \u2013 you now have a highly effective access control system without having to buy any expensive additional equipment. All that is needed is your <strong>CENTURION<\/strong> D-Series operator.<\/p>\n<p><strong><u>Code-hopping Technology<\/u><\/strong><\/p>\n<p>\u201cAnd slowly, and surely, they drew their plans against us\u201d<\/p>\n<p>That menacing line makes a final appearance. Criminals have always attempted to use our own tools and technology against us and, at times, it even seemed as though they had succeeded.<\/p>\n<p>\u201cCode grabbing\u201d is one way in which tech-savvy crooks have been doing this; taking the wonderful convenience of remote controls and using it for their own dark purposes. What basically happens is this: a homeowner stops at his entrance gate and presses his remote, oblivious to the fact that in the bushes nearby a crook is hiding wielding a makeshift signal-grabbing device. The crook than uses this device to \u201cgrab\u201d the code transmitted by the homeowner\u2019s remote, and so gets carte blanche for helping himself to the homeowner\u2019s possessions.<\/p>\n<p>In an effort to combat this malfeasance, <strong>CENTURION<\/strong> has implemented <strong>code-hopping technology<\/strong>. What this means, is that every code transmitted by the <strong>CENTURION\u00a0<\/strong>transmitter is completely and randomly different to the previous one, making code-grabbing more or less impossible. It is worth noting that this is the same sort of secure technology currently employed by leading vehicle manufacturers.<\/p>\n<p>From the development and implementation of these innovative technologies it is clear that in actuality it is us drawing our plans against the criminals, and not vise versa.<br \/>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cAnd slowly, and surely, they drew their plans against us\u201d This iconic line forms part of the introduction to one of the most famous radio plays ever to be recorded, the Orson Welles adaptation of H.G. Wells\u2019 unnerving sci-fi tour de force, The War of the Worlds. Of course, the conspirators Wells was referring to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","_joinchat":[],"footnotes":""},"categories":[23],"tags":[],"class_list":["post-1179","post","type-post","status-publish","format-standard","hentry","category-blog-posts"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>CENTURION Uses Key Technologies to Help Keep You Safe - Centurion Systems French<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"CENTURION Uses Key Technologies to Help Keep You Safe - Centurion Systems French\" \/>\r\n<meta property=\"og:description\" content=\"\u201cAnd slowly, and surely, they drew their plans against us\u201d This iconic line forms part of the introduction to one of the most famous radio plays ever to be recorded, the Orson Welles adaptation of H.G. Wells\u2019 unnerving sci-fi tour de force, The War of the Worlds. Of course, the conspirators Wells was referring to [&hellip;]\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Centurion Systems French\" \/>\r\n<meta property=\"article:published_time\" content=\"2012-10-17T08:38:42+00:00\" \/>\r\n<meta name=\"author\" content=\"Eddie\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eddie\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/centurion-uses-key-technologies-to-help-keep-you-safe\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/centurion-uses-key-technologies-to-help-keep-you-safe\\\/\"},\"author\":{\"name\":\"Eddie\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/c355edff49bbe36c125a1888a740b883\"},\"headline\":\"CENTURION Uses Key Technologies to Help Keep You Safe\",\"datePublished\":\"2012-10-17T08:38:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/centurion-uses-key-technologies-to-help-keep-you-safe\\\/\"},\"wordCount\":1232,\"commentCount\":0,\"articleSection\":[\"Blog Posts\"],\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/centurion-uses-key-technologies-to-help-keep-you-safe\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/centurion-uses-key-technologies-to-help-keep-you-safe\\\/\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/centurion-uses-key-technologies-to-help-keep-you-safe\\\/\",\"name\":\"CENTURION Uses Key Technologies to Help Keep You Safe - Centurion Systems French\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\"},\"datePublished\":\"2012-10-17T08:38:42+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/c355edff49bbe36c125a1888a740b883\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/centurion-uses-key-technologies-to-help-keep-you-safe\\\/#breadcrumb\"},\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/centurion-uses-key-technologies-to-help-keep-you-safe\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/centurion-uses-key-technologies-to-help-keep-you-safe\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CENTURION Uses Key Technologies to Help Keep You Safe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\",\"name\":\"Centurion Systems French\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-ZA\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/c355edff49bbe36c125a1888a740b883\",\"name\":\"Eddie\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g\",\"caption\":\"Eddie\"},\"sameAs\":[\"http:\\\/\\\/www.centsys.com\\\/fr\"],\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/author\\\/eddie\\\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CENTURION Uses Key Technologies to Help Keep You Safe - Centurion Systems French","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe\/","og_locale":"en_US","og_type":"article","og_title":"CENTURION Uses Key Technologies to Help Keep You Safe - Centurion Systems French","og_description":"\u201cAnd slowly, and surely, they drew their plans against us\u201d This iconic line forms part of the introduction to one of the most famous radio plays ever to be recorded, the Orson Welles adaptation of H.G. Wells\u2019 unnerving sci-fi tour de force, The War of the Worlds. Of course, the conspirators Wells was referring to [&hellip;]","og_url":"https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe\/","og_site_name":"Centurion Systems French","article_published_time":"2012-10-17T08:38:42+00:00","author":"Eddie","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Eddie","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe\/#article","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe\/"},"author":{"name":"Eddie","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/c355edff49bbe36c125a1888a740b883"},"headline":"CENTURION Uses Key Technologies to Help Keep You Safe","datePublished":"2012-10-17T08:38:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe\/"},"wordCount":1232,"commentCount":0,"articleSection":["Blog Posts"],"inLanguage":"en-ZA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe\/","url":"https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe\/","name":"CENTURION Uses Key Technologies to Help Keep You Safe - Centurion Systems French","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/#website"},"datePublished":"2012-10-17T08:38:42+00:00","author":{"@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/c355edff49bbe36c125a1888a740b883"},"breadcrumb":{"@id":"https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe\/#breadcrumb"},"inLanguage":"en-ZA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.centsys.com\/fr\/"},{"@type":"ListItem","position":2,"name":"CENTURION Uses Key Technologies to Help Keep You Safe"}]},{"@type":"WebSite","@id":"https:\/\/www.centsys.com\/fr\/#website","url":"https:\/\/www.centsys.com\/fr\/","name":"Centurion Systems French","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.centsys.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ZA"},{"@type":"Person","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/c355edff49bbe36c125a1888a740b883","name":"Eddie","image":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/secure.gravatar.com\/avatar\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g","caption":"Eddie"},"sameAs":["http:\/\/www.centsys.com\/fr"],"url":"https:\/\/www.centsys.com\/fr\/author\/eddie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/1179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/comments?post=1179"}],"version-history":[{"count":0,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/1179\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/media?parent=1179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/categories?post=1179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/tags?post=1179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}