Z-COM, Inc.
Z-COM has been dedicated to hardware and software R&D and the manufacture of wireless networking equipment for decades.
Specializing in RF (Radio Frequency) R&D and network integration software, Z-COM has worked with international telecoms companies to successfully deploy millions of access points worldwide.
Entering into 5G, wireless broadband networks will connect not only people to people, but also people to things and machine to machine. A new era with everything connected is coming. Z-COM will keep focusing on the updated wireless communication standards of 5G, Wi-Fi, Bluetooth, and ZigBee, etc., following the SDN/NFV and mobile edge computing trend, to develop solutions with hardware and software of next advanced wireless networking technologies. Partner with our system integrator and Telecom carrier clients, we strive to answer the future demands on faster wireless broadband connectivity and “smarter” AIoT applications for surveillance, education, manufacturing, transportation and many others.
Wireless Surveillance Solution
Solution Description
The need of video surveillance has increased with the issues of campus, public places security and intelligent transportation. What’s more, high-resolution image, identification, analysis and AIoT applications are getting popular than before. People are strict in the performance of transmission and computing.
Internet communication technology has entered a new era as well.
To achieve intelligent service, zMEC ’s platform as service through Kubernetes-based architecture which can not only integrate with the third-party but also expand different AIoT software application modules, such as identification and analysis, electronic fence.
Besides, the technology of edge computing can reduce the demand of video and audio data for cloud center computing access and network bandwidth resources, so as to make up for the problem of traditional cloud computing delay and unsafe transmission link. It meets the need of high frequency bandwidth and low latency, and to satisfy the needs of information security and privacy protection.