In this scenario, an alarm button is connected to the Adam unit and when this input is activated (close or open), a full screen camera image shows on the display. The display is always logged in the Operator Client for live camera view on the DIVAR IP 7000 AIO.
This attached document describes how Bosch Building Technologies handles the life-cycle of the BVMS, BIS, AMS, and APE, and in which state a specific release can reside.
This article describes the different components that Bosch Video Management System offers to to establish a connection between Bosch Video Management System and a 3rd party management system.
This description helps you in writing your own commands for controlling Bosch VMS from inside your management system.
Log4j 1.2.17 is not actively used or called by the SQL Server or by the BVMS. This means that the vulnerabilities are not exploitable unless you install some additional components that refer to the vulnerable component. Therefore, there is no risk of exploitation within the SQL Server or BVMS environment.
This document is specifically for DIP-71xx as it's the DIP which supports certain versions of BVMS (regular BVMS installer) and must be updated in a certain order. The document details how to upgrade from BVMS v8 to BVMS v12.0.1.
This document is specifically for DIP-73xx as it's the only DIP with Software Center.
The document details how to upgrade all the way from BVMS 10.1 with Software Center and to BVMS 12.1 with System Manager 2.3
Regular BVMS 12.1 installer will not run on any DIVAR IP all-in-one platform. The upgrade shall be performed via DIVAR IP System Manager application. Usually, we recommend to upgrade BVMS in steps. Each version should not be more than ~two years apart. This prevents potential issues in the upgrade process.
This article describes how to configure a generic Microsoft Windows Server (2012 R2, 2016 or 2019) based server to serve as an iSCSI target for a Bosch video surveillance environment.
SCSI (Small Computer System Interface) is most commonly used for the communication between computers and peripheral devices, such as hard drives.
iSCSI enables devices to use SCSI over a network interface, therefore it makes a lot of sense for cameras to use iSCSI to record video.
The camera is a small computer that needs a (network) connection to a "hard drive" to store video footage. In other systems this job is performed by the network video recorder (NVR).
This article explains how to use the settings as per the devices current configured capabilities if you just added a device to BVMS, you get the possible stream options as per a “Config table” known to BVMS.
The connection of 2N® Helios IP intercom to BVMS and Bosch Access Control System is possible thanks to the implementation of ONVIF and Wiegand protocols, which ensure mutual compatibility.
In the Logbook, you can search for particular events, alarms, devices, and strings of events. You have the possibility to save the BVMS Operator Client alarm logbook, before accepting and clearing it.
Starting with BVMS version 12.0, the Privacy overlay feature was introduced. This feature can be configured to blur objects of type Person, based on a powerful Bosch Artificial Intelligence (AI) function
When trying to get the Software Assurance Report from Remote Portal, it cannot be generated, and the red message below occurs: “Upload a valid system info file or Enter a valid System fingerprint”. Why?
Be sure that the MIC-7100i camera is configured in BVMS Configuration Client with "Bosch-AutoDome Bilinx" protocol and not with "Bosch-AutoDome" protocol or other options from the list.