{"id":9329,"date":"2012-10-17T15:48:00","date_gmt":"2012-10-17T13:48:00","guid":{"rendered":"http:\/\/www.centsys.co.za\/centurion-uses-key-technologies-to-help-keep-you-safe-2\/"},"modified":"2012-10-17T15:48:00","modified_gmt":"2012-10-17T13:48:00","slug":"centurion-uses-key-technologies-to-help-keep-you-safe-2","status":"publish","type":"post","link":"https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe-2\/","title":{"rendered":"CENTURION Uses Key Technologies to Help Keep You Safe"},"content":{"rendered":"<div style=\"text-align: justify;\"><span style=\"font-family: Calibri;\">\u201cAnd slowly, and surely, they drew their plans against us\u201d<\/span><\/div>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">This iconic line forms part of the introduction to one of the most famous radio plays ever to be recorded, the Orson Welles adaptation of H.G. Wells\u2019 unnerving sci-fi tour de force, <i style=\"mso-bidi-font-style: normal;\">The War of the Worlds<\/i>. Of course, the conspirators Wells was referring to here were malicious otherworldly intelligences intent on destroying our planet and\/or enslaving the human race. It was gripping stuff; so gripping, in fact, that it sowed widespread panic when it was broadcast sometime during the beginning of the previous century.<\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"font-family: Calibri;\">So how does the father of modern science fiction\u2019s ominous opening words \u2013 so utterly ripe with foreboding \u2013 relate to the <strong>current security situation in South Africa<\/strong>?<\/span><\/div>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">It\u2019s quite simple, really. The reality is that yes, South Africa sleeps, but it is an uneasy sleep plagued by nightmares of home invasions and crooks lurking about in the night. In this sense, we are akin to <i style=\"mso-bidi-font-style: normal;\">War<\/i>\u2019s protagonist (and indeed, all of mankind), our eyes darting nervously about as we await the imminent invasion and the terrible fate that awaits us.<\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"font-family: Calibri;\">But it need not be that way. If there is one prevailing theme throughout the history of mankind, it is the triumph of good over evil. We, the average citizens of this country, the home and business owners, are Good, while the criminals represent the forces of Evil.<\/span><\/div>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\"><a href=\"http:\/\/www.centsys.co.za\/\">Centurion Systems<\/a> has developed a number of <strong>key technologies<\/strong> to aid the forces of Good in this eternal struggle, and to help South Africans sleep more soundly, secure in the knowledge that their homes and families are <strong>safe<\/strong>. It is worth noting that <strong>CENTURION is a South African company<\/strong> with South African sensibilities, always in tune with the <strong>unique security needs<\/strong> of the country.<\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"font-family: Calibri;\"><strong>CENTURION<\/strong>\u2019s ongoing influence in the fight against crime is clearly evident in the following technologies:<\/span><\/div>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><b style=\"mso-bidi-font-weight: normal;\"><u><span style=\"font-family: Calibri;\">Intruder-detection Alarms<\/span><\/u><\/b><\/div>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">As children, the majority of us were told cautionary tales and feared the \u201cbogeyman\u201d: an exaggerated evil entity that would come for us if we misbehaved. But, in our childlike innocence, we knew that switching on the light would render the bogeyman powerless and banish him to the realms of shadow whence he came. <\/span><\/div>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">In the slightly imagination-stripped world of adulthood, the bogeyman takes the shape of criminals wanting to get their hands on our possessions \u2013 or otherwise cause us harm \u2013 and the entrance gate is the typical point where they would try breach <strong>perimeter security<\/strong>. From following hapless homeowners into their properties to obstructing the gate safety beams so that the gate stays open, criminals have devised all sorts of clever ways of gaining entrance.<\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"font-family: Calibri;\">The <strong>Intruder-detection Alarm feature-set<\/strong> is <strong>CENTURION<\/strong>\u2019s interpretation of \u201cswitching on the light\u201d and catching the bogeyman in the act.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>These alarms \u2013 consisting of the <strong>Break-in Alarm<\/strong> and <strong>Ambush Alarm<\/strong> \u2013 work by sounding the onboard buzzer of your <strong>D-Series operator<\/strong> (<a href=\"http:\/\/www.centsys.co.za\/?q=cproduct,8,D10\">D10<\/a>\/<a href=\"http:\/\/www.centsys.co.za\/?q=cproduct,44,D10_Turbo\">D10 Turbo<\/a>, <a href=\"http:\/\/www.centsys.co.za\/?q=cproduct,7,D5Evo\">D5-Evo<\/a>, <a href=\"http:\/\/www.centsys.co.za\/?q=cproduct,17,SECTOR\">SECTOR<\/a>, <a href=\"http:\/\/www.centsys.co.za\/?q=cproduct,13,VECTOR2__Linear_Swing_Gate_Operator\">VECTOR2<\/a>) whenever the infrared gate safety beams are interrupted, or remain interrupted for a predefined period of time.<\/span><\/div>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">Consider, if you will, the practical application of these alarms: A potential intruder has been staking out your house for a couple of nights and knows your habits, your comings and goings. Then, one night, the criminal sees you enter your property and decides to stick some insulation tape over the lenses of the beams, thereby keeping the gate open and affording himself ample opportunity to enter the yard. <\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"font-family: Calibri;\">But the joke\u2019s on him, because you have enabled the Ambush Alarm which promptly picks up that the beams have been obstructed for the preset period of time, and it triggers the alarm which you have relayed to your security company. The armed response chaps arrive and arrest the would-be burglar. Threat neutralised.<\/span><\/div>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><b style=\"mso-bidi-font-weight: normal;\"><u><span style=\"font-family: Calibri;\">ChronoGuard<\/span><\/u><\/b><\/div>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">As you can most probably deduce from its name, <strong>ChronoGuard<\/strong> was named after the Greek word for time, \u201c<strong>chronos<\/strong>\u201d, which is also used as a prefix in English words related to time (think: \u201cchronological\u201d). <\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"font-family: Calibri;\">Yes, the ChronoGuard is a timer, but it is a timer that opens up a world of <strong>access control<\/strong> possibilities. <\/span><\/div>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"text-align: justify;\"><span style=\"font-family: Calibri;\">Take, for example, the <strong>Auto-activations<\/strong> feature offered by ChronoGuard. Using the onboard Real Time Clock and Calendar found in <strong>CENTURION<\/strong> D-Series controllers, this feature allows you to set up to <strong>100 unique time periods<\/strong> that can be used to perform a myriad automatic activations. Among them:<\/span><\/div>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"line-height: 150%; margin: 0cm 0cm 0pt 36pt; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18pt;\"><span style=\"font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">\u00b7<span style=\"font-size-adjust: none; font-stretch: normal; font: 7pt\/normal 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><\/span><span style=\"font-family: Calibri;\">Opening your gate during busy times, such as in the mornings, so that your gate motor\u2019s battery is not run flat from continually opening and closing<\/span><\/div>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"line-height: 150%; margin: 0cm 0cm 0pt 36pt; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18pt;\"><span style=\"font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">\u00b7<span style=\"font-size-adjust: none; font-stretch: normal; font: 7pt\/normal 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><\/span><span style=\"font-family: Calibri;\">Interfacing with an irrigation system to water your garden at certain times of the day<\/span><\/div>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt 36pt; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18pt;\"><span style=\"font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">\u00b7<span style=\"font-size-adjust: none; font-stretch: normal; font: 7pt\/normal 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><\/span><span style=\"font-family: Calibri;\">Automatically switching on a security light only at night so as not to waste electricity<\/span><\/div>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">The possibilities are virtually endless.<\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"font-family: Calibri;\">Then there\u2019s the <strong>Time-barring functionality<\/strong>. This security feature is useful to anyone from home-owners to managers who want to restrict access to their property after work or during weekends. Time-barring can be used to inhibit signals from remote controls or even physical triggers, so criminals won\u2019t be able to simply short-circuit wires in order to get the gate to open.<\/span><\/div>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">From a practical application perspective, this is very handy since employers who have issued their staff with remotes can configure their D-Series gate motor or traffic barrier to work during normal office hours, but ignore inputs from remotes after hours. Hey presto \u2013 you now have a highly effective access control system without having to buy any expensive additional equipment. All that is needed is your <strong>CENTURION<\/strong> D-Series operator.<\/span><\/div>\n<div style=\"text-align: justify;\"><b style=\"mso-bidi-font-weight: normal;\"><u><span style=\"font-family: Calibri;\">Code-hopping Technology<\/span><\/u><\/b><\/div>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">\u201cAnd slowly, and surely, they drew their plans against us\u201d<\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"font-family: Calibri;\">That menacing line makes a final appearance. Criminals have always attempted to use our own tools and technology against us and, at times, it even seemed as though they had succeeded.<\/span><\/div>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">\u201cCode grabbing\u201d is one way in which tech-savvy crooks have been doing this; taking the wonderful convenience of remote controls and using it for their own dark purposes. What basically happens is this: a homeowner stops at his entrance gate and presses his remote, oblivious to the fact that in the bushes nearby a crook is hiding wielding a makeshift signal-grabbing device. The crook than uses this device to \u201cgrab\u201d the code transmitted by the homeowner\u2019s remote, and so gets carte blanche for helping himself to the homeowner\u2019s possessions. <\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"font-family: Calibri;\">In an effort to combat this malfeasance, <strong>CENTURION<\/strong> has implemented <strong>code-hopping technology<\/strong>. What this means, is that every code transmitted by the <strong>CENTURION<\/strong> transmitter is completely and randomly different to the previous one, making code-grabbing more or less impossible. It is worth noting that this is the same sort of secure technology currently employed by leading vehicle manufacturers.<\/span><\/div>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">From the development and implementation of these innovative technologies it is clear that in actuality it is us drawing our plans against the criminals, and not vise versa.<\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u201cAnd slowly, and surely, they drew their plans against us\u201d This iconic line forms part of the introduction to one of the most famous radio plays ever to be recorded, the Orson Welles adaptation of H.G. Wells\u2019 unnerving sci-fi tour de force, The War of the Worlds. Of course, the conspirators Wells was referring to [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_joinchat":[],"footnotes":""},"categories":[5,27,50,135,177,206],"tags":[],"class_list":["post-9329","post","type-post","status-publish","format-standard","hentry","category-acces-control","category-centurion","category-centurion-systems","category-home-security","category-perimeter-security","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>CENTURION Uses Key Technologies to Help Keep You Safe - Centurion Systems French<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe-2\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"CENTURION Uses Key Technologies to Help Keep You Safe - Centurion Systems French\" \/>\r\n<meta property=\"og:description\" content=\"\u201cAnd slowly, and surely, they drew their plans against us\u201d This iconic line forms part of the introduction to one of the most famous radio plays ever to be recorded, the Orson Welles adaptation of H.G. Wells\u2019 unnerving sci-fi tour de force, The War of the Worlds. Of course, the conspirators Wells was referring to [&hellip;]\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe-2\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Centurion Systems French\" \/>\r\n<meta property=\"article:published_time\" content=\"2012-10-17T13:48:00+00:00\" \/>\r\n<meta name=\"author\" content=\"Charl Mijnhardt\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Charl Mijnhardt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/centurion-uses-key-technologies-to-help-keep-you-safe-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/centurion-uses-key-technologies-to-help-keep-you-safe-2\\\/\"},\"author\":{\"name\":\"Charl Mijnhardt\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\"},\"headline\":\"CENTURION Uses Key Technologies to Help Keep You Safe\",\"datePublished\":\"2012-10-17T13:48:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/centurion-uses-key-technologies-to-help-keep-you-safe-2\\\/\"},\"wordCount\":1153,\"commentCount\":0,\"articleSection\":[\"acces control\",\"centurion\",\"centurion systems\",\"home security\",\"perimeter security\",\"security\"],\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/centurion-uses-key-technologies-to-help-keep-you-safe-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/centurion-uses-key-technologies-to-help-keep-you-safe-2\\\/\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/centurion-uses-key-technologies-to-help-keep-you-safe-2\\\/\",\"name\":\"CENTURION Uses Key Technologies to Help Keep You Safe - Centurion Systems French\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\"},\"datePublished\":\"2012-10-17T13:48:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/centurion-uses-key-technologies-to-help-keep-you-safe-2\\\/#breadcrumb\"},\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/centurion-uses-key-technologies-to-help-keep-you-safe-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/centurion-uses-key-technologies-to-help-keep-you-safe-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CENTURION Uses Key Technologies to Help Keep You Safe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\",\"name\":\"Centurion Systems French\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-ZA\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\",\"name\":\"Charl Mijnhardt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"caption\":\"Charl Mijnhardt\"},\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/author\\\/charl\\\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CENTURION Uses Key Technologies to Help Keep You Safe - Centurion Systems French","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe-2\/","og_locale":"en_US","og_type":"article","og_title":"CENTURION Uses Key Technologies to Help Keep You Safe - Centurion Systems French","og_description":"\u201cAnd slowly, and surely, they drew their plans against us\u201d This iconic line forms part of the introduction to one of the most famous radio plays ever to be recorded, the Orson Welles adaptation of H.G. Wells\u2019 unnerving sci-fi tour de force, The War of the Worlds. Of course, the conspirators Wells was referring to [&hellip;]","og_url":"https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe-2\/","og_site_name":"Centurion Systems French","article_published_time":"2012-10-17T13:48:00+00:00","author":"Charl Mijnhardt","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Charl Mijnhardt","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe-2\/#article","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe-2\/"},"author":{"name":"Charl Mijnhardt","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23"},"headline":"CENTURION Uses Key Technologies to Help Keep You Safe","datePublished":"2012-10-17T13:48:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe-2\/"},"wordCount":1153,"commentCount":0,"articleSection":["acces control","centurion","centurion systems","home security","perimeter security","security"],"inLanguage":"en-ZA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe-2\/","url":"https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe-2\/","name":"CENTURION Uses Key Technologies to Help Keep You Safe - Centurion Systems French","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/#website"},"datePublished":"2012-10-17T13:48:00+00:00","author":{"@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23"},"breadcrumb":{"@id":"https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe-2\/#breadcrumb"},"inLanguage":"en-ZA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.centsys.com\/fr\/centurion-uses-key-technologies-to-help-keep-you-safe-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.centsys.com\/fr\/"},{"@type":"ListItem","position":2,"name":"CENTURION Uses Key Technologies to Help Keep You Safe"}]},{"@type":"WebSite","@id":"https:\/\/www.centsys.com\/fr\/#website","url":"https:\/\/www.centsys.com\/fr\/","name":"Centurion Systems French","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.centsys.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ZA"},{"@type":"Person","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23","name":"Charl Mijnhardt","image":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","caption":"Charl Mijnhardt"},"url":"https:\/\/www.centsys.com\/fr\/author\/charl\/"}]}},"_links":{"self":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/9329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/comments?post=9329"}],"version-history":[{"count":0,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/9329\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/media?parent=9329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/categories?post=9329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/tags?post=9329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}