SlideShare a Scribd company logo
1 of 12
Your security is our priority




               Introduction

     SMS – Smart Simulator
For the use of Military and Security forces
Your security is our priority




                    System Parts


Camera + basis   Laser + batteries   Barrel connector   Trigger micro switch




    Computer software and speakers          Projector with camera
Your security is our priority




System Configuration
                    Projector screen / wall
                                       Training range
                                       1-20 m.




        Cables

                       Projector + IR camera




                 Speakers       Laptop
Your security is our priority




System calibration and weapon zeroing




                    System calculate average hit
                    point and software process the
                    calibration
Your security is our priority




Friendly control on operation and data
Your security is our priority




1-4 trainees
Your security is our priority




On motion drills
Your security is our priority




Technical drills
Your security is our priority




Tactical drills
Your security is our priority




Graphic firing range drills
Your security is our priority




Video realistic drills
Your security is our priority




SMS – allow firing training to every end user

More Related Content

What's hot

CCTV & Security Products
CCTV & Security ProductsCCTV & Security Products
CCTV & Security ProductsGabriel Vasquez
 
Closed Circuit Television(CCTV)
Closed Circuit Television(CCTV)Closed Circuit Television(CCTV)
Closed Circuit Television(CCTV)Vaibhav Mudgal
 
Detailed Study of CCTV Cameras
Detailed Study of CCTV CamerasDetailed Study of CCTV Cameras
Detailed Study of CCTV CamerasHans Khanna
 
3.4 IP CCTV video monitors
3.4 IP CCTV video monitors3.4 IP CCTV video monitors
3.4 IP CCTV video monitorsNader Elmansi
 
Surveillance System, CCTV, BMS
Surveillance System, CCTV, BMSSurveillance System, CCTV, BMS
Surveillance System, CCTV, BMSMohammad Azam Khan
 
CCTV Camera Presentation
CCTV Camera PresentationCCTV Camera Presentation
CCTV Camera PresentationBasith JM
 
CCTV solutions and trends about security settings
CCTV solutions and trends about security settingsCCTV solutions and trends about security settings
CCTV solutions and trends about security settingsDavide De Bella
 
CCTV Security Cameras - Basics
CCTV Security Cameras - Basics CCTV Security Cameras - Basics
CCTV Security Cameras - Basics Emmanuel Kirui
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJPaheerathan Sabaratnam
 
Process of CCTV installation step by step
Process of CCTV installation step by stepProcess of CCTV installation step by step
Process of CCTV installation step by stepVivency Global
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJPaheerathan Sabaratnam
 
Types of CCTV Cameras & Uses - Techno Edge Systems
Types of CCTV Cameras & Uses  - Techno Edge SystemsTypes of CCTV Cameras & Uses  - Techno Edge Systems
Types of CCTV Cameras & Uses - Techno Edge SystemsCCTV Installation Dubai
 
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)Corporate Services
 
CCTV Camera
CCTV CameraCCTV Camera
CCTV CameraKaleem
 

What's hot (20)

CCTV & Security Products
CCTV & Security ProductsCCTV & Security Products
CCTV & Security Products
 
Closed Circuit Television(CCTV)
Closed Circuit Television(CCTV)Closed Circuit Television(CCTV)
Closed Circuit Television(CCTV)
 
6 threats to cctv cameras
6 threats to cctv cameras6 threats to cctv cameras
6 threats to cctv cameras
 
Detailed Study of CCTV Cameras
Detailed Study of CCTV CamerasDetailed Study of CCTV Cameras
Detailed Study of CCTV Cameras
 
3.4 IP CCTV video monitors
3.4 IP CCTV video monitors3.4 IP CCTV video monitors
3.4 IP CCTV video monitors
 
Surveillance System, CCTV, BMS
Surveillance System, CCTV, BMSSurveillance System, CCTV, BMS
Surveillance System, CCTV, BMS
 
CCTV Camera Presentation
CCTV Camera PresentationCCTV Camera Presentation
CCTV Camera Presentation
 
Cctv system in schools
Cctv system in schoolsCctv system in schools
Cctv system in schools
 
CCTV solutions and trends about security settings
CCTV solutions and trends about security settingsCCTV solutions and trends about security settings
CCTV solutions and trends about security settings
 
CCTV Security Cameras - Basics
CCTV Security Cameras - Basics CCTV Security Cameras - Basics
CCTV Security Cameras - Basics
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
 
Process of CCTV installation step by step
Process of CCTV installation step by stepProcess of CCTV installation step by step
Process of CCTV installation step by step
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
 
Cctv camera
Cctv cameraCctv camera
Cctv camera
 
Retail Loss Prevention Summit V1.0
Retail Loss Prevention Summit V1.0Retail Loss Prevention Summit V1.0
Retail Loss Prevention Summit V1.0
 
Advantages of cctv camera
Advantages of cctv cameraAdvantages of cctv camera
Advantages of cctv camera
 
At&t2
At&t2At&t2
At&t2
 
Types of CCTV Cameras & Uses - Techno Edge Systems
Types of CCTV Cameras & Uses  - Techno Edge SystemsTypes of CCTV Cameras & Uses  - Techno Edge Systems
Types of CCTV Cameras & Uses - Techno Edge Systems
 
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
 
CCTV Camera
CCTV CameraCCTV Camera
CCTV Camera
 

Viewers also liked

Nācija un nacionālās identitātes diskurss: politiskās elites vēstījumu analīze
Nācija un nacionālās identitātes diskurss: politiskās elites vēstījumu analīzeNācija un nacionālās identitātes diskurss: politiskās elites vēstījumu analīze
Nācija un nacionālās identitātes diskurss: politiskās elites vēstījumu analīzenacionalaidentitate
 
Thirst for water
Thirst for waterThirst for water
Thirst for waterAsif Iqbal
 
Two Products In One
Two Products In OneTwo Products In One
Two Products In OneMihex
 
1. interviewing revised feb 3 2015
1. interviewing revised feb 3 20151. interviewing revised feb 3 2015
1. interviewing revised feb 3 2015amgonzalezpineiro
 
Gamification and Special Asset Management (2015)
Gamification and Special Asset Management (2015)Gamification and Special Asset Management (2015)
Gamification and Special Asset Management (2015)Maarten Molenaar
 
A peek into the world of WordPress plugin development
A peek into the world of WordPress plugin developmentA peek into the world of WordPress plugin development
A peek into the world of WordPress plugin developmentR-Cubed Design Forge
 
Integrēta pieeja ekonomiskās drošības izpētē
Integrēta pieeja ekonomiskās drošības izpētēIntegrēta pieeja ekonomiskās drošības izpētē
Integrēta pieeja ekonomiskās drošības izpētēnacionalaidentitate
 
Civil war in Mali
Civil war in MaliCivil war in Mali
Civil war in MaliMihex
 
открытый решение показательных уравненийй 11 кл
открытый решение показательных уравненийй 11 клоткрытый решение показательных уравненийй 11 кл
открытый решение показательных уравненийй 11 клkravhenko
 
Keyboarding chapter 4 ppt
Keyboarding chapter 4 pptKeyboarding chapter 4 ppt
Keyboarding chapter 4 pptks0385
 
день матери
день материдень матери
день материkravhenko
 
Curriculumvitaeworkshopfall2014 141210221540-conversion-gate02
Curriculumvitaeworkshopfall2014 141210221540-conversion-gate02Curriculumvitaeworkshopfall2014 141210221540-conversion-gate02
Curriculumvitaeworkshopfall2014 141210221540-conversion-gate02amgonzalezpineiro
 
Switching On the Growth Engine in Your Small Consulting Practice
Switching On the Growth Engine in Your Small Consulting PracticeSwitching On the Growth Engine in Your Small Consulting Practice
Switching On the Growth Engine in Your Small Consulting PracticeGYK Antler
 
Day snowman
Day snowmanDay snowman
Day snowmanafresh65
 
Propaganda de cores
Propaganda de coresPropaganda de cores
Propaganda de coressavio95
 
The New UX and How to Not Waste Your Time
The New UX and How to Not Waste Your TimeThe New UX and How to Not Waste Your Time
The New UX and How to Not Waste Your TimeRichard Everts
 

Viewers also liked (20)

Nācija un nacionālās identitātes diskurss: politiskās elites vēstījumu analīze
Nācija un nacionālās identitātes diskurss: politiskās elites vēstījumu analīzeNācija un nacionālās identitātes diskurss: politiskās elites vēstījumu analīze
Nācija un nacionālās identitātes diskurss: politiskās elites vēstījumu analīze
 
Thirst for water
Thirst for waterThirst for water
Thirst for water
 
Two Products In One
Two Products In OneTwo Products In One
Two Products In One
 
1. interviewing revised feb 3 2015
1. interviewing revised feb 3 20151. interviewing revised feb 3 2015
1. interviewing revised feb 3 2015
 
Gamification and Special Asset Management (2015)
Gamification and Special Asset Management (2015)Gamification and Special Asset Management (2015)
Gamification and Special Asset Management (2015)
 
A peek into the world of WordPress plugin development
A peek into the world of WordPress plugin developmentA peek into the world of WordPress plugin development
A peek into the world of WordPress plugin development
 
Integrēta pieeja ekonomiskās drošības izpētē
Integrēta pieeja ekonomiskās drošības izpētēIntegrēta pieeja ekonomiskās drošības izpētē
Integrēta pieeja ekonomiskās drošības izpētē
 
Workbook sesion3
Workbook sesion3Workbook sesion3
Workbook sesion3
 
Civil war in Mali
Civil war in MaliCivil war in Mali
Civil war in Mali
 
открытый решение показательных уравненийй 11 кл
открытый решение показательных уравненийй 11 клоткрытый решение показательных уравненийй 11 кл
открытый решение показательных уравненийй 11 кл
 
Keyboarding chapter 4 ppt
Keyboarding chapter 4 pptKeyboarding chapter 4 ppt
Keyboarding chapter 4 ppt
 
день матери
день материдень матери
день матери
 
Curriculumvitaeworkshopfall2014 141210221540-conversion-gate02
Curriculumvitaeworkshopfall2014 141210221540-conversion-gate02Curriculumvitaeworkshopfall2014 141210221540-conversion-gate02
Curriculumvitaeworkshopfall2014 141210221540-conversion-gate02
 
Switching On the Growth Engine in Your Small Consulting Practice
Switching On the Growth Engine in Your Small Consulting PracticeSwitching On the Growth Engine in Your Small Consulting Practice
Switching On the Growth Engine in Your Small Consulting Practice
 
0 + 1 =
0 + 1 =0 + 1 =
0 + 1 =
 
Day snowman
Day snowmanDay snowman
Day snowman
 
Propaganda de cores
Propaganda de coresPropaganda de cores
Propaganda de cores
 
SANT JUSTÍ
SANT JUSTÍSANT JUSTÍ
SANT JUSTÍ
 
The New UX and How to Not Waste Your Time
The New UX and How to Not Waste Your TimeThe New UX and How to Not Waste Your Time
The New UX and How to Not Waste Your Time
 
Workbook9
Workbook9Workbook9
Workbook9
 

Similar to Presant

Doc sms1
Doc sms1Doc sms1
Doc sms1riskis
 
Doc sms good
Doc sms goodDoc sms good
Doc sms goodriskis
 
Doc sms identica
Doc sms identicaDoc sms identica
Doc sms identicariskis
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...Andris Soroka
 
Keeping up with the security features
Keeping up with the security featuresKeeping up with the security features
Keeping up with the security featuresTechnomine
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011dma1965
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentationhemanth102030
 
Orbit-Company Profile 2015
Orbit-Company Profile 2015Orbit-Company Profile 2015
Orbit-Company Profile 2015Tarek Medini
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutionsCanon Business CEE
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of SystemsJamal Jamali
 
CCTV Surveillance System Including Sensor For Infrastructure Protection
CCTV Surveillance System Including Sensor For Infrastructure ProtectionCCTV Surveillance System Including Sensor For Infrastructure Protection
CCTV Surveillance System Including Sensor For Infrastructure ProtectionNeometrix_Engineering_Pvt_Ltd
 
Defending our datacenters (BICSI 2016 ASEAN conference)
Defending our datacenters  (BICSI 2016 ASEAN  conference)Defending our datacenters  (BICSI 2016 ASEAN  conference)
Defending our datacenters (BICSI 2016 ASEAN conference)Jeffrey Lam
 
Total Defense Product Information
Total Defense Product InformationTotal Defense Product Information
Total Defense Product InformationZeeshan Humayun
 
IBM Security Intelligence
IBM Security IntelligenceIBM Security Intelligence
IBM Security IntelligenceAnna Landolfi
 
Ieee Meeting Anacapri
Ieee Meeting AnacapriIeee Meeting Anacapri
Ieee Meeting Anacapripasq_tlc
 
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMSkycure
 

Similar to Presant (20)

Doc sms1
Doc sms1Doc sms1
Doc sms1
 
Doc sms good
Doc sms goodDoc sms good
Doc sms good
 
Doc sms identica
Doc sms identicaDoc sms identica
Doc sms identica
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
 
Keeping up with the security features
Keeping up with the security featuresKeeping up with the security features
Keeping up with the security features
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentation
 
CCTV Surveillance
CCTV SurveillanceCCTV Surveillance
CCTV Surveillance
 
Orbit-Company Profile 2015
Orbit-Company Profile 2015Orbit-Company Profile 2015
Orbit-Company Profile 2015
 
C2MS
C2MSC2MS
C2MS
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
CCTV Surveillance System Including Sensor For Infrastructure Protection
CCTV Surveillance System Including Sensor For Infrastructure ProtectionCCTV Surveillance System Including Sensor For Infrastructure Protection
CCTV Surveillance System Including Sensor For Infrastructure Protection
 
Defending our datacenters (BICSI 2016 ASEAN conference)
Defending our datacenters  (BICSI 2016 ASEAN  conference)Defending our datacenters  (BICSI 2016 ASEAN  conference)
Defending our datacenters (BICSI 2016 ASEAN conference)
 
Total Defense Product Information
Total Defense Product InformationTotal Defense Product Information
Total Defense Product Information
 
IBM Security Intelligence
IBM Security IntelligenceIBM Security Intelligence
IBM Security Intelligence
 
Ieee Meeting Anacapri
Ieee Meeting AnacapriIeee Meeting Anacapri
Ieee Meeting Anacapri
 
Abacus Infotech, Mumbai, Security Systems
Abacus Infotech, Mumbai, Security SystemsAbacus Infotech, Mumbai, Security Systems
Abacus Infotech, Mumbai, Security Systems
 
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMM
 

More from riskis

RoboScan1MC datasheet
RoboScan1MC datasheetRoboScan1MC datasheet
RoboScan1MC datasheetriskis
 
RoboScan1MC description
RoboScan1MC descriptionRoboScan1MC description
RoboScan1MC descriptionriskis
 
RoboScan2M Aeria Datasheet
RoboScan2M Aeria DatasheetRoboScan2M Aeria Datasheet
RoboScan2M Aeria Datasheetriskis
 
RoboScan1M brochure
RoboScan1M brochureRoboScan1M brochure
RoboScan1M brochureriskis
 
RoboScan0M brochure
RoboScan0M brochureRoboScan0M brochure
RoboScan0M brochureriskis
 
Roboscan vs. Competition
Roboscan vs. CompetitionRoboscan vs. Competition
Roboscan vs. Competitionriskis
 
Gepard gm6 lynx x
Gepard gm6 lynx xGepard gm6 lynx x
Gepard gm6 lynx xriskis
 
Gepard presentation
Gepard presentationGepard presentation
Gepard presentationriskis
 
Car Vip Protection presentation
Car Vip Protection presentationCar Vip Protection presentation
Car Vip Protection presentationriskis
 
Car Vip Protection
Car Vip ProtectionCar Vip Protection
Car Vip Protectionriskis
 
Special tracking system mod rearanjat
Special tracking system mod rearanjatSpecial tracking system mod rearanjat
Special tracking system mod rearanjatriskis
 
Special tracking system mod
Special tracking system modSpecial tracking system mod
Special tracking system modriskis
 
1804 car vip protection
1804 car vip protection1804 car vip protection
1804 car vip protectionriskis
 
473 tactical cellular jamming system
473 tactical cellular jamming system473 tactical cellular jamming system
473 tactical cellular jamming systemriskis
 
1804 car vip protection
1804 car vip protection1804 car vip protection
1804 car vip protectionriskis
 
475 low power cellular jammer
475 low power cellular  jammer475 low power cellular  jammer
475 low power cellular jammerriskis
 
473 tactical cellular jamming system
473 tactical cellular jamming system473 tactical cellular jamming system
473 tactical cellular jamming systemriskis
 
472 smart cellular jammer
472 smart cellular jammer472 smart cellular jammer
472 smart cellular jammerriskis
 
471 1-mobile jammer
471 1-mobile jammer471 1-mobile jammer
471 1-mobile jammerriskis
 
Special tracking system mod
Special tracking system modSpecial tracking system mod
Special tracking system modriskis
 

More from riskis (20)

RoboScan1MC datasheet
RoboScan1MC datasheetRoboScan1MC datasheet
RoboScan1MC datasheet
 
RoboScan1MC description
RoboScan1MC descriptionRoboScan1MC description
RoboScan1MC description
 
RoboScan2M Aeria Datasheet
RoboScan2M Aeria DatasheetRoboScan2M Aeria Datasheet
RoboScan2M Aeria Datasheet
 
RoboScan1M brochure
RoboScan1M brochureRoboScan1M brochure
RoboScan1M brochure
 
RoboScan0M brochure
RoboScan0M brochureRoboScan0M brochure
RoboScan0M brochure
 
Roboscan vs. Competition
Roboscan vs. CompetitionRoboscan vs. Competition
Roboscan vs. Competition
 
Gepard gm6 lynx x
Gepard gm6 lynx xGepard gm6 lynx x
Gepard gm6 lynx x
 
Gepard presentation
Gepard presentationGepard presentation
Gepard presentation
 
Car Vip Protection presentation
Car Vip Protection presentationCar Vip Protection presentation
Car Vip Protection presentation
 
Car Vip Protection
Car Vip ProtectionCar Vip Protection
Car Vip Protection
 
Special tracking system mod rearanjat
Special tracking system mod rearanjatSpecial tracking system mod rearanjat
Special tracking system mod rearanjat
 
Special tracking system mod
Special tracking system modSpecial tracking system mod
Special tracking system mod
 
1804 car vip protection
1804 car vip protection1804 car vip protection
1804 car vip protection
 
473 tactical cellular jamming system
473 tactical cellular jamming system473 tactical cellular jamming system
473 tactical cellular jamming system
 
1804 car vip protection
1804 car vip protection1804 car vip protection
1804 car vip protection
 
475 low power cellular jammer
475 low power cellular  jammer475 low power cellular  jammer
475 low power cellular jammer
 
473 tactical cellular jamming system
473 tactical cellular jamming system473 tactical cellular jamming system
473 tactical cellular jamming system
 
472 smart cellular jammer
472 smart cellular jammer472 smart cellular jammer
472 smart cellular jammer
 
471 1-mobile jammer
471 1-mobile jammer471 1-mobile jammer
471 1-mobile jammer
 
Special tracking system mod
Special tracking system modSpecial tracking system mod
Special tracking system mod
 

Recently uploaded

Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Presant

  • 1. Your security is our priority Introduction SMS – Smart Simulator For the use of Military and Security forces
  • 2. Your security is our priority System Parts Camera + basis Laser + batteries Barrel connector Trigger micro switch Computer software and speakers Projector with camera
  • 3. Your security is our priority System Configuration Projector screen / wall Training range 1-20 m. Cables Projector + IR camera Speakers Laptop
  • 4. Your security is our priority System calibration and weapon zeroing System calculate average hit point and software process the calibration
  • 5. Your security is our priority Friendly control on operation and data
  • 6. Your security is our priority 1-4 trainees
  • 7. Your security is our priority On motion drills
  • 8. Your security is our priority Technical drills
  • 9. Your security is our priority Tactical drills
  • 10. Your security is our priority Graphic firing range drills
  • 11. Your security is our priority Video realistic drills
  • 12. Your security is our priority SMS – allow firing training to every end user