Difference between revisions of "Terminology"

From PTI Security Systems
Jump to: navigation, search
(C)
(B)
Line 8: Line 8:
  
 
====B====
 
====B====
 +
 +
;BDE
 +
:Short for Borland Database Engine, which is the database type used by DigiGate.
 +
 
====C====
 
====C====
  

Revision as of 10:04, 15 September 2014

Terms for Digitech Systems

A

Access PointA programming setup which combines other setups to define a method of access for a site. An "Input Point" is chosen, and a "Control Point". When a "good" code entry is entered at the Input Point, the Control Point is activated based on it's setups. Also included is an "Control Area" setting, which tells the system to either add a tenant into a specific area (such as Onsite), remove them from an area, or to do neither.
A programming setup which combines other setups to define a method of access for a site. An "Input PointA programming setup which corresponds to either a keypad or Wiegand device which is used to enter a code into the system, or a simple pushbutton. When combined with a "Control Point" it defines an "Access Point"." is chosen, and a "Control PointA programming setup which corresponds to a relay output on the system that can be programmed to activate under various circumstances. When combined with an "Input Point", it defines an "Access Point".". When a "good" code entry is entered at the Input PointA programming setup which corresponds to either a keypad or Wiegand device which is used to enter a code into the system, or a simple pushbutton. When combined with a "Control Point" it defines an "Access Point"., the Control PointA programming setup which corresponds to a relay output on the system that can be programmed to activate under various circumstances. When combined with an "Input Point", it defines an "Access Point". is activated based on it's setups. Also included is an "Control AreaA programming setup which defines areas of a facility that a user can be granted access into. A sites setups will always have a default "Onsite" area defined, and may have more depending on it's layout and equipment." setting, which tells the system to either add a tenant into a specific area (such as Onsite), remove them from an area, or to do neither.

B

BDEShort for Borland Database Engine, which is the database type used by DigiGate.
Short for Borland Database Engine, which is the database type used by DigiGate.

C

Control AreaA programming setup which defines areas of a facility that a user can be granted access into. A sites setups will always have a default "Onsite" area defined, and may have more depending on it's layout and equipment.
A programming setup which defines areas of a facility that a user can be granted access into. A sites setups will always have a default "Onsite" area defined, and may have more depending on it's layout and equipment.
Control PointA programming setup which corresponds to a relay output on the system that can be programmed to activate under various circumstances. When combined with an "Input Point", it defines an "Access Point".
A programming setup which corresponds to a relay output on the system that can be programmed to activate under various circumstances. When combined with an "Input PointA programming setup which corresponds to either a keypad or Wiegand device which is used to enter a code into the system, or a simple pushbutton. When combined with a "Control Point" it defines an "Access Point".", it defines an "Access PointA programming setup which combines other setups to define a method of access for a site. An "Input Point" is chosen, and a "Control Point". When a "good" code entry is entered at the Input Point, the Control Point is activated based on it's setups. Also included is an "Control Area" setting, which tells the system to either add a tenant into a specific area (such as Onsite), remove them from an area, or to do neither.".

D

DaughterboardModules that are installed in a Digitech Unimux. There are 3 different types of daughterboards, each with a different function.
daughterboardModules that are installed in a Digitech Unimux. There are 3 different types of daughterboards, each with a different function.
Modules that are installed in a Digitech Unimux. There are 3 different types of daughterboards, each with a different function.
DigiPortA device used for communication to a Syscon via a network connection. This can be an internal network, a VPN, or over the internet. A driver is installed on the machine running the DigiGate program and translates the serial data to network packets. These packets are then converted back to serial data and sent on to the Syscon by the DigiPort.
A device used for communication to a Syscon via a network connection. This can be an internal network, a VPN, or over the internet. A driver is installed on the machine running the DigiGate program and translates the serial data to network packets. These packets are then converted back to serial data and sent on to the Syscon by the DigiPortA device used for communication to a Syscon via a network connection. This can be an internal network, a VPN, or over the internet. A driver is installed on the machine running the DigiGate program and translates the serial data to network packets. These packets are then converted back to serial data and sent on to the Syscon by the DigiPort..

E

F

G

H

I

Input PointA programming setup which corresponds to either a keypad or Wiegand device which is used to enter a code into the system, or a simple pushbutton. When combined with a "Control Point" it defines an "Access Point".
A programming setup which corresponds to either a keypad or Wiegand device which is used to enter a code into the system, or a simple pushbutton. When combined with a "Control PointA programming setup which corresponds to a relay output on the system that can be programmed to activate under various circumstances. When combined with an "Input Point", it defines an "Access Point"." it defines an "Access PointA programming setup which combines other setups to define a method of access for a site. An "Input Point" is chosen, and a "Control Point". When a "good" code entry is entered at the Input Point, the Control Point is activated based on it's setups. Also included is an "Control Area" setting, which tells the system to either add a tenant into a specific area (such as Onsite), remove them from an area, or to do neither.".

J

K

Keypad Interface BoardA circuit board used in a Syscon. (Can be optional, but the majority of systems have them installed.) Provides inputs for up to 4 Standard 700 Keypads, and 6 Control Point outputs.
A circuit board used in a Syscon. (Can be optional, but the majority of systems have them installed.) Provides inputs for up to 4 Standard 700 Keypads, and 6 Control PointA programming setup which corresponds to a relay output on the system that can be programmed to activate under various circumstances. When combined with an "Input Point", it defines an "Access Point". outputs.

L

LC KeypadDigitech brand keypad that operates over a shared 2 conductor RS-485 network. Equipped with a 4 line backlit LCD screen with 20 characters per line.
Digitech brand keypad that operates over a shared 2 conductor RS-485 network. Equipped with a 4 line backlit LCD screen with 20 characters per line.
LX KeypadDigitech brand keypad that operates over a shared 2 conductor RS-485 network.
Digitech brand keypad that operates over a shared 2 conductor RS-485 network.

M

N

O

P

Q

R

S

Standard 700 KeypadDigitech brand keypad that operates over a dedicated 11 conductor shielded cable.
Digitech brand keypad that operates over a dedicated 11 conductor shielded cable.

T

U

V

W

X

Y

Z

Terms for PTI Systems

A

Access AreaA Setup used in StorLogix to define an area of the facility where users are allowed access. Used in conjunction with a "Time Schedule" to define an "Access Level". An access area can be a unit, a building, a floor of an elevator, an office or an area on the site. When a user is assigned to an Access Area, the user will inherit the Permissions to the items associated with that area.
A Setup used in StorLogix to define an area of the facility where users are allowed access. Used in conjunction with a "Time ScheduleThe hours that an operator, user or group of users are allowed to enter the site. Used in conjunction with an "Access Area" to define an "Access Level"." to define an "Access LevelA Setup used in StorLogix to define a user's access to the site, a building, or a unit. Access Levels are the access permissions for the user. The Access Level also contains the "Access Area" (defining what area the user may enter), and "Time Schedule" (what time of day the user may attempt access to the site or the assigned area).". An access area can be a unit, a building, a floor of an elevator, an office or an area on the site. When a user is assigned to an Access AreaA Setup used in StorLogix to define an area of the facility where users are allowed access. Used in conjunction with a "Time Schedule" to define an "Access Level". An access area can be a unit, a building, a floor of an elevator, an office or an area on the site. When a user is assigned to an Access Area, the user will inherit the Permissions to the items associated with that area., the user will inherit the PermissionsReferring collectively to the level of access an operator or user has to the site, the software, etc. May also refer to settings in Windows that allow a person logged into Windows to access functions of the Operating System. to the items associated with that area.
Access CodeA secret code, generally between 4 – 10 digits long that allows a user to enter and exit the site.
A secret code, generally between 4 – 10 digits long that allows a user to enter and exit the site.
Access LevelA Setup used in StorLogix to define a user's access to the site, a building, or a unit. Access Levels are the access permissions for the user. The Access Level also contains the "Access Area" (defining what area the user may enter), and "Time Schedule" (what time of day the user may attempt access to the site or the assigned area).
A Setup used in StorLogix to define a user's access to the site, a building, or a unit. Access Levels are the access permissions for the user. The Access LevelA Setup used in StorLogix to define a user's access to the site, a building, or a unit. Access Levels are the access permissions for the user. The Access Level also contains the "Access Area" (defining what area the user may enter), and "Time Schedule" (what time of day the user may attempt access to the site or the assigned area). also contains the "Access AreaA Setup used in StorLogix to define an area of the facility where users are allowed access. Used in conjunction with a "Time Schedule" to define an "Access Level". An access area can be a unit, a building, a floor of an elevator, an office or an area on the site. When a user is assigned to an Access Area, the user will inherit the Permissions to the items associated with that area." (defining what area the user may enter), and "Time ScheduleThe hours that an operator, user or group of users are allowed to enter the site. Used in conjunction with an "Access Area" to define an "Access Level"." (what time of day the user may attempt access to the site or the assigned area).
AdministratorThe administrator is the first unrestricted operator that is created with full access to all parts of the software.
The administrator is the first unrestricted operator that is created with full access to all parts of the software.
Advanced OptionsThere are two ways to setup a site. A basic setup is done using Quick Options that allow the site to quickly be setup with the most commonly used features of the StorLogix software. The Advanced Options allow a fully customized setup with many useful options and features that are outside the scope of the quick setup.
There are two ways to setup a site. A basic setup is done using Quick OptionsThere are two ways to setup a site. A basic setup is done using Quick Options that allow the site to quickly be setup using only the most commonly used features of the StorLogix software. The Advanced Options allow a fully customized setup with many useful options and features that are outside of the basic quick setup. that allow the site to quickly be setup with the most commonly used features of the StorLogix software. The Advanced OptionsThere are two ways to setup a site. A basic setup is done using Quick Options that allow the site to quickly be setup with the most commonly used features of the StorLogix software. The Advanced Options allow a fully customized setup with many useful options and features that are outside the scope of the quick setup. allow a fully customized setup with many useful options and features that are outside the scope of the quick setup.
AI DeviceAccess Interface Device. A general name referring to all PTI Keypads, Multiplexers, Relay Boards, and Wiegand Protocol Devices. In previous PTI systems these were occasionally referred to as remotes or remote devices.
Access InterfaceTo connect one software program to another for the purpose of sharing information. Generally, this will refer to the Management Interface or the connection between an accounting software such as TaskMaster used to handle the billing for a site to the StorLogix system used to handle access control and security. This allows the system to automatically lock out users who do not pay their bill. Device. A general name referring to all PTI Keypads, Multiplexers, Relay Boards, and Wiegand Protocol Devices. In previous PTI systems these were occasionally referred to as remotes or remote devices.
Alarm File(AKA Alarm.alm) The alarm file associates the number that is assigned to a door to a unit with the multiplexer address and channel that doors alarm contact. In previous PTI systems, this was referred to as the Alarm.alm file.
(AKA Alarm.alm) The alarm file associates the number that is assigned to a door to a unit with the multiplexer address and channel that doors alarm contact. In previous PTI systems, this was referred to as the Alarm.alm file.
Alarm ShuntA virtual bypass for an alarm contact, which allows the contact to be opened for a specific period of time without triggering an alarm. Most often used on access doors to allow the door to be opened after a code is entered at the door keypad without triggering that doors alarm.
A virtual bypass for an alarm contact, which allows the contact to be opened for a specific period of time without triggering an alarm. Most often used on access doors to allow the door to be opened after a code is entered at the door keypad without triggering that doors alarm.
Alarm ZoneAlarm Zones are a setup item that controls how and when an alarm is activated. The alarm zone is a component of an "Access Area". Its settings determine how long the alarm will sound and how often it will repeat, which allows the user to meet the local noise ordinances.A programming setup which defines settings used for alarms. These settings include which Control Point that will be activated when the devices assigned to this Alarm Zone go into alarm, and how long the alarm will sound before automatically rearming.
Alarm Zones are a setup item that controls how and when an alarm is activated. The alarm zone is a component of an "Access AreaA Setup used in StorLogix to define an area of the facility where users are allowed access. Used in conjunction with a "Time Schedule" to define an "Access Level". An access area can be a unit, a building, a floor of an elevator, an office or an area on the site. When a user is assigned to an Access Area, the user will inherit the Permissions to the items associated with that area.". Its settings determine how long the alarm will sound and how often it will repeat, which allows the user to meet the local noise ordinances.
AlertsAlerts are emails or text messages that setup to be automatically sent to an email box or cell phone when a specific event occurs. For example, a site can choose to setup an email to automatically go to the site owner if a door alarm is set off.
AlertsAlerts are emails or text messages that setup to be automatically sent to an email box or cell phone when a specific event occurs. For example, a site can choose to setup an email to automatically go to the site owner if a door alarm is set off. are emails or text messages that setup to be automatically sent to an email box or cell phone when a specific event occurs. For example, a site can choose to setup an email to automatically go to the site owner if a door alarm is set off.
Anti-PassbackAnti-Passback is a function to help prevent tailgating (one user following another through a gate or door without entering their own access code). Generally, anti-passback requires one exit for every entrance and one entrance for every exit. Therefore, if I didn’t enter my code to enter the site, the system won’t let me leave the site.
APBAnti-Passback is a function to help prevent tailgating (one user following another through a gate or door without entering their own access code). Generally, anti-passback requires one exit for every entrance and one entrance for every exit. Therefore, if I didn’t enter my code to enter the site, the system won’t let me leave the site.
Anti-PassbackAnti-Passback is a function to help prevent tailgating (one user following another through a gate or door without entering their own access code). Generally, anti-passback requires one exit for every entrance and one entrance for every exit. Therefore, if I didn’t enter my code to enter the site, the system won’t let me leave the site. is a function to help prevent tailgating (one user following another through a gate or door without entering their own access code). Generally, anti-passback requires one exit for every entrance and one entrance for every exit. Therefore, if I didn’t enter my code to enter the site, the system won’t let me leave the site.
Apex Series KeypadsApex Series Keypads are PTI’s newest and best keypads and access devices. They offer more functions and options than any other keypad that we sell.
Apex Series KeypadsApex Series Keypads are PTI’s newest and best keypads and access devices. They offer more functions and options than any other keypad that we sell. are PTI’s newest and best keypads and access devices. They offer more functions and options than any other keypad that we sell.
ArchiveA file containing historical events and data from a site. Information can be accessed if needed, but it is stored in a compressed format that allows large amounts of data to be stored without slowing down the system.
A file containing historical events and data from a site. Information can be accessed if needed, but it is stored in a compressed format that allows large amounts of data to be stored without slowing down the system.
Audit TrailA recorded history showing who has accessed the system and what operations they performed that is kept in order to maintain the security and offer the ability to recover lost or changed transactions.
A recorded history showing who has accessed the system and what operations they performed that is kept in order to maintain the security and offer the ability to recover lost or changed transactions.

B

BackupAn electronic file containing historical events, data, and setup information for a site. This should be kept in a separate off-site location to allow the quick repair of a site in case of catastrophic data loss such as physical destruction of the computer or office, computer crash, employee error, etc.
An electronic file containing historical events, data, and setup information for a site. This should be kept in a separate off-site location to allow the quick repair of a site in case of catastrophic data loss such as physical destruction of the computer or office, computer crash, employee error, etc.
Baud RateThis is the speed at which electronic communications flow. Used for setting communication parameters for both the PC to XT, and the RS485 Data network.
Bits per SecondThis is the speed at which electronic communications flow. Used for setting communication parameters for both the PC to XT, and the RS485 Data network.
BPSThis is the speed at which electronic communications flow. Used for setting communication parameters for both the PC to XT, and the RS485 Data network.
This is the speed at which electronic communications flow. Used for setting communication parameters for both the PC to XT, and the RS485A type of communications used for electronic devices. Generally, limited to four thousand total feet of wire length. Used for connecting the Falcon XT to AI Devices. Data network.
BuildingAn individual structure on a site that users and operators have access to, such as an office building, storage facility, parking structure, etc. Each building must be setup separately within StorLogix.
An individual structure on a site that users and operators have access to, such as an office building, storage facility, parking structure, etc. Each building must be setup separately within StorLogix.


C

CardsGenerally refers to Wiegand Protocol Proximity cards that allow a user access by presenting the card within a few inches of a proximity device. May also refer to magnetic swipe cards that are used for access by sliding them through a swipe reader.
Generally refers to Wiegand Protocol Proximity cards that allow a user access by presenting the card within a few inches of a proximity device. May also refer to magnetic swipe cards that are used for access by sliding them through a swipe reader.
CDInformation storage device used for software or file storage. CD-ROM is Read Only Memory or data that can only be read, but not changed. The StorLogix software comes on a CD-ROM. CD-R is recordable, meaning that files such as archives and backups can be saved to the CD and then taken elsewhere for storage or access. CD-R’s can only be written on once, but may be accessed indefinitely. CD-RW’s are re-writable meaning that files can be saved on them, then deleted or overwritten with new files multiple times. CD’s can hold up to 1GB of information or the equivalent of 700 floppy disks or about 300,000 pages of text.
CD-ROMInformation storage device used for software or file storage. CD-ROM is Read Only Memory or data that can only be read, but not changed. The StorLogix software comes on a CD-ROM. CD-R is recordable, meaning that files such as archives and backups can be saved to the CD and then taken elsewhere for storage or access. CD-R’s can only be written on once, but may be accessed indefinitely. CD-RW’s are re-writable meaning that files can be saved on them, then deleted or overwritten with new files multiple times. CD’s can hold up to 1GB of information or the equivalent of 700 floppy disks or about 300,000 pages of text.
CD-RInformation storage device used for software or file storage. CD-ROM is Read Only Memory or data that can only be read, but not changed. The StorLogix software comes on a CD-ROM. CD-R is recordable, meaning that files such as archives and backups can be saved to the CD and then taken elsewhere for storage or access. CD-R’s can only be written on once, but may be accessed indefinitely. CD-RW’s are re-writable meaning that files can be saved on them, then deleted or overwritten with new files multiple times. CD’s can hold up to 1GB of information or the equivalent of 700 floppy disks or about 300,000 pages of text.
CD-RWInformation storage device used for software or file storage. CD-ROM is Read Only Memory or data that can only be read, but not changed. The StorLogix software comes on a CD-ROM. CD-R is recordable, meaning that files such as archives and backups can be saved to the CD and then taken elsewhere for storage or access. CD-R’s can only be written on once, but may be accessed indefinitely. CD-RW’s are re-writable meaning that files can be saved on them, then deleted or overwritten with new files multiple times. CD’s can hold up to 1GB of information or the equivalent of 700 floppy disks or about 300,000 pages of text.
Compact DiscInformation storage device used for software or file storage. CD-ROM is Read Only Memory or data that can only be read, but not changed. The StorLogix software comes on a CD-ROM. CD-R is recordable, meaning that files such as archives and backups can be saved to the CD and then taken elsewhere for storage or access. CD-R’s can only be written on once, but may be accessed indefinitely. CD-RW’s are re-writable meaning that files can be saved on them, then deleted or overwritten with new files multiple times. CD’s can hold up to 1GB of information or the equivalent of 700 floppy disks or about 300,000 pages of text.
Information storage device used for software or file storage. CD-ROMInformation storage device used for software or file storage. CD-ROM is Read Only Memory or data that can only be read, but not changed. The StorLogix software comes on a CD-ROM. CD-R is recordable, meaning that files such as archives and backups can be saved to the CD and then taken elsewhere for storage or access. CD-R’s can only be written on once, but may be accessed indefinitely. CD-RW’s are re-writable meaning that files can be saved on them, then deleted or overwritten with new files multiple times. CD’s can hold up to 1GB of information or the equivalent of 700 floppy disks or about 300,000 pages of text. is Read Only Memory or data that can only be read, but not changed. The StorLogix software comes on a CD-ROMInformation storage device used for software or file storage. CD-ROM is Read Only Memory or data that can only be read, but not changed. The StorLogix software comes on a CD-ROM. CD-R is recordable, meaning that files such as archives and backups can be saved to the CD and then taken elsewhere for storage or access. CD-R’s can only be written on once, but may be accessed indefinitely. CD-RW’s are re-writable meaning that files can be saved on them, then deleted or overwritten with new files multiple times. CD’s can hold up to 1GB of information or the equivalent of 700 floppy disks or about 300,000 pages of text.. CD-RInformation storage device used for software or file storage. CD-ROM is Read Only Memory or data that can only be read, but not changed. The StorLogix software comes on a CD-ROM. CD-R is recordable, meaning that files such as archives and backups can be saved to the CD and then taken elsewhere for storage or access. CD-R’s can only be written on once, but may be accessed indefinitely. CD-RW’s are re-writable meaning that files can be saved on them, then deleted or overwritten with new files multiple times. CD’s can hold up to 1GB of information or the equivalent of 700 floppy disks or about 300,000 pages of text. is recordable, meaning that files such as archives and backups can be saved to the CDInformation storage device used for software or file storage. CD-ROM is Read Only Memory or data that can only be read, but not changed. The StorLogix software comes on a CD-ROM. CD-R is recordable, meaning that files such as archives and backups can be saved to the CD and then taken elsewhere for storage or access. CD-R’s can only be written on once, but may be accessed indefinitely. CD-RW’s are re-writable meaning that files can be saved on them, then deleted or overwritten with new files multiple times. CD’s can hold up to 1GB of information or the equivalent of 700 floppy disks or about 300,000 pages of text. and then taken elsewhere for storage or access. CD-RInformation storage device used for software or file storage. CD-ROM is Read Only Memory or data that can only be read, but not changed. The StorLogix software comes on a CD-ROM. CD-R is recordable, meaning that files such as archives and backups can be saved to the CD and then taken elsewhere for storage or access. CD-R’s can only be written on once, but may be accessed indefinitely. CD-RW’s are re-writable meaning that files can be saved on them, then deleted or overwritten with new files multiple times. CD’s can hold up to 1GB of information or the equivalent of 700 floppy disks or about 300,000 pages of text.’s can only be written on once, but may be accessed indefinitely. CD-RWInformation storage device used for software or file storage. CD-ROM is Read Only Memory or data that can only be read, but not changed. The StorLogix software comes on a CD-ROM. CD-R is recordable, meaning that files such as archives and backups can be saved to the CD and then taken elsewhere for storage or access. CD-R’s can only be written on once, but may be accessed indefinitely. CD-RW’s are re-writable meaning that files can be saved on them, then deleted or overwritten with new files multiple times. CD’s can hold up to 1GB of information or the equivalent of 700 floppy disks or about 300,000 pages of text.’s are re-writable meaning that files can be saved on them, then deleted or overwritten with new files multiple times. CDInformation storage device used for software or file storage. CD-ROM is Read Only Memory or data that can only be read, but not changed. The StorLogix software comes on a CD-ROM. CD-R is recordable, meaning that files such as archives and backups can be saved to the CD and then taken elsewhere for storage or access. CD-R’s can only be written on once, but may be accessed indefinitely. CD-RW’s are re-writable meaning that files can be saved on them, then deleted or overwritten with new files multiple times. CD’s can hold up to 1GB of information or the equivalent of 700 floppy disks or about 300,000 pages of text.’s can hold up to 1GB of information or the equivalent of 700 floppy disks or about 300,000 pages of text.
Change DatabaseStorLogix can be used to connect to different databases on different servers. Most commonly, a site owner might have multiple sites that are each being run locally by the local manager using StorLogix, but the owner can connect to any of the sites at any time using StorLogix at his home office to connect to each database at each different site. This allows the owner to monitor activity at multiple sites.
StorLogix can be used to connect to different databases on different servers. Most commonly, a site owner might have multiple sites that are each being run locally by the local manager using StorLogix, but the owner can connect to any of the sites at any time using StorLogix at his home office to connect to each database at each different site. This allows the owner to monitor activity at multiple sites.
ChannelIndividual input point on a multiplexer, Apex keypad, or XT that allows a door alarm sensor or contact to be connected to the system. One channel equals one door.
Individual input point on a multiplexer, Apex keypad, or XT that allows a door alarm sensor or contact to be connected to the system. One channel equals one door.
CodeXpress

A VP or Falcon Series cardswipe keypad that allows use of magnetic swipe cards for access control.

Com PortCommunications port on a computer that allows connection of RS232 or USB communication devices.
Communications port on a computer that allows connection of RS232A type of communications used for computers and serial devices. Generally, limited to fifty feet of wire length. One of the options used for connecting the Falcon XT to the StorLogix computer, but should be used only when the other options are not available. or USB communication devices.
Comm CountThe number of times that the Falcon XT will poll for an individual AI Device with no response before the system acknowledges that there is a communication error and reports it.
The number of times that the Falcon XTHardware controller used in conjunction with StorLogix software to control AI Devices at a site. will poll for an individual AI DeviceAccess Interface Device. A general name referring to all PTI Keypads, Multiplexers, Relay Boards, and Wiegand Protocol Devices. In previous PTI systems these were occasionally referred to as remotes or remote devices. with no response before the system acknowledges that there is a communication error and reports it.
CommunicationElectronic data flowing between devices. See also RS232, RS422, RS485, and USB.
Electronic data flowing between devices. See also RS232A type of communications used for computers and serial devices. Generally, limited to fifty feet of wire length. One of the options used for connecting the Falcon XT to the StorLogix computer, but should be used only when the other options are not available., RS422, RS485A type of communications used for electronic devices. Generally, limited to four thousand total feet of wire length. Used for connecting the Falcon XT to AI Devices., and USBA data port connection type that supports higher speed data transfer than RS232..
Contrast CodeA code used with older version 1 Falcon Series keypads that allows the display to be lightened or darkened so that the message is more visible. Not necessary on newer Falcon Series Keypads version 2 and higher, VP or Apex series keypads as these displays are backlit.
A code used with older version 1 Falcon Series keypads that allows the display to be lightened or darkened so that the message is more visible. Not necessary on newer Falcon Series Keypads version 2 and higher, VP or Apex series keypads as these displays are backlit.
ControllerTerm for the Falcon XT, Falcon Base Unit, or Master Security computer that ‘controls’ AI Devices.
Term for the Falcon XTHardware controller used in conjunction with StorLogix software to control AI Devices at a site., Falcon Base UnitPrevious hardware controller used to control remote devices at a site. Information from this unit sometimes may be uploaded to StorLogix as part of a site upgrade to the new product., or Master Security computer that ‘controls’ AI Devices.
Custom MessagesMessages that can be programmed into the Falcon XT that can be seen by specific customers as they come onto the site such as “Welcome Mr. Smith” or by all customers such as “We sell boxes”.
Messages that can be programmed into the Falcon XTHardware controller used in conjunction with StorLogix software to control AI Devices at a site. that can be seen by specific customers as they come onto the site such as “Welcome Mr. Smith” or by all customers such as “We sell boxes”.
Customized ScriptsCustom programming commands in LogixScript that allow a site to have customized actions. For example, the owner could program the system to check to see if the manager has shown up by 7:00 am. If not, the system can be programmed to automatically turn on the lights and send an alert to the owner that the site is unmanned.
Custom programming commands in LogixScriptSettings within StorLogix that allows a site to create custom scripts that will trigger certain things to occur if the conditions are met. For example, a site could use LogixScript to turn on a coffee pot if the manager logs on the site before 9:00 am but not turn it on if the manager logs on the site after 9:00 am. These scripts are very customizable and can be used to do almost anything that could be needed for a custom site setup with relays and conditions. that allow a site to have customized actions. For example, the owner could program the system to check to see if the manager has shown up by 7:00 am. If not, the system can be programmed to automatically turn on the lights and send an alert to the owner that the site is unmanned.


D

Data FieldAny field within StorLogix that may be used for information within reports.
Any field within StorLogix that may be used for information within reports.
Default MessagePreset messages within StorLogix that will display on keypads when access is attempted. These can be customized or left as is.
Preset messages within StorLogix that will display on keypads when access is attempted. These can be customized or left as is.
Device ManagerProgram within Microsoft Windows which lists all of the hardware devices installed on the computer and allows the user to change the properties of any of these devices. Specifically used in conjunction with StorLogix software to set the baud rate for the communications ports.
Program within Microsoft Windows which lists all of the hardware devices installed on the computer and allows the user to change the properties of any of these devices. Specifically used in conjunction with StorLogix software to set the baud rate for the communications ports.
Diagnostics ReportsA series of reports used for troubleshooting the setup of StorLogix, following up on the audit trail to trace security issues, and to research potential conflicts in the system.
A series of reports used for troubleshooting the setup of StorLogix, following up on the audit trail to trace security issues, and to research potential conflicts in the system.
Door ContactA switch used for alarming doors, usually consisting of a magnet installed on the door and a reed switch installed on the door frame to report the status of the door (either open or closed).
A switch used for alarming doors, usually consisting of a magnet installed on the door and a reed switch installed on the door frame to report the status of the door (either open or closed).
Door StrikeAn electronic device used to lock the door until proper access is allowed on a keypad or wiegand device connected to it.
An electronic device used to lock the door until proper access is allowed on a keypad or wiegand device connected to it.
DownloadTo copy information from a main source or computer into a peripheral, for example copying a file from the internet into your local computer.
To copy information from a main source or computer into a peripheral, for example copying a file from the internet into your local computer.
DVDInformation storage device used for software or file storage. DVD-ROM is Read Only Memory or data that can only be read, but not changed. DVD-RW’s are re-writable meaning that files can be saved on them, then deleted or overwritten with new files multiple times. DVD’s can hold between 4.7 and 17 GB of information or the equivalent of 3290 – 11,900 floppy disks or about 1,410,000 – 5,100,000 pages of text.
DVD-ROMInformation storage device used for software or file storage. DVD-ROM is Read Only Memory or data that can only be read, but not changed. DVD-RW’s are re-writable meaning that files can be saved on them, then deleted or overwritten with new files multiple times. DVD’s can hold between 4.7 and 17 GB of information or the equivalent of 3290 – 11,900 floppy disks or about 1,410,000 – 5,100,000 pages of text.
DVD-RWInformation storage device used for software or file storage. DVD-ROM is Read Only Memory or data that can only be read, but not changed. DVD-RW’s are re-writable meaning that files can be saved on them, then deleted or overwritten with new files multiple times. DVD’s can hold between 4.7 and 17 GB of information or the equivalent of 3290 – 11,900 floppy disks or about 1,410,000 – 5,100,000 pages of text.
Digital Video Disc.Information storage device used for software or file storage. DVD-ROM is Read Only Memory or data that can only be read, but not changed. DVD-RW’s are re-writable meaning that files can be saved on them, then deleted or overwritten with new files multiple times. DVD’s can hold between 4.7 and 17 GB of information or the equivalent of 3290 – 11,900 floppy disks or about 1,410,000 – 5,100,000 pages of text.
Information storage device used for software or file storage. DVD-ROMInformation storage device used for software or file storage. DVD-ROM is Read Only Memory or data that can only be read, but not changed. DVD-RW’s are re-writable meaning that files can be saved on them, then deleted or overwritten with new files multiple times. DVD’s can hold between 4.7 and 17 GB of information or the equivalent of 3290 – 11,900 floppy disks or about 1,410,000 – 5,100,000 pages of text. is Read Only Memory or data that can only be read, but not changed. DVD-RWInformation storage device used for software or file storage. DVD-ROM is Read Only Memory or data that can only be read, but not changed. DVD-RW’s are re-writable meaning that files can be saved on them, then deleted or overwritten with new files multiple times. DVD’s can hold between 4.7 and 17 GB of information or the equivalent of 3290 – 11,900 floppy disks or about 1,410,000 – 5,100,000 pages of text.’s are re-writable meaning that files can be saved on them, then deleted or overwritten with new files multiple times. DVDInformation storage device used for software or file storage. DVD-ROM is Read Only Memory or data that can only be read, but not changed. DVD-RW’s are re-writable meaning that files can be saved on them, then deleted or overwritten with new files multiple times. DVD’s can hold between 4.7 and 17 GB of information or the equivalent of 3290 – 11,900 floppy disks or about 1,410,000 – 5,100,000 pages of text.’s can hold between 4.7 and 17 GBA measurement used in reference to computer information storage equivalent to about 700 floppy disks or three hundred thousand pages of text. of information or the equivalent of 3290 – 11,900 floppy disks or about 1,410,000 – 5,100,000 pages of text.
DVRDigitally stores video from cameras on a hard drive. Can store much more information and access it faster than old analog VCR’s (Video Cassette Recorders).
Digital Video RecorderDigitally stores video from cameras on a hard drive. Can store much more information and access it faster than old analog VCR’s (Video Cassette Recorders).
Digitally stores video from cameras on a hard drive. Can store much more information and access it faster than old analog VCR’s (Video Cassette Recorders).
8-Channel Relay BoardPTI AI Device with eight relays that can be used to control up to eight lighting areas, elevator floors or any other relay functions.
PTI AI DeviceAccess Interface Device. A general name referring to all PTI Keypads, Multiplexers, Relay Boards, and Wiegand Protocol Devices. In previous PTI systems these were occasionally referred to as remotes or remote devices. with eight relays that can be used to control up to eight lighting areas, elevator floors or any other relay functions.


E

EmailShort for electronic mail. Messages transmitted over a network (usually the internet).
Short for electronic mail. Messages transmitted over a network (usually the internet).
ErrorA mistake or problem occurring in software. May be caused by any number of issues related to the computer, the operating system, peripheral devices, user mistakes, or the software itself. Generally these appear as small pop-up windows that explain the problem or symptom of the problem. It is a good idea to write down the complete message or take a screenshot of it before contacting a computer technician or technical support for assistance.
A mistake or problem occurring in software. May be caused by any number of issues related to the computer, the operating system, peripheral devices, user mistakes, or the software itself. Generally these appear as small pop-up windows that explain the problem or symptom of the problem. It is a good idea to write down the complete message or take a screenshot of it before contacting a computer technician or technical support for assistance.
EULAThe license agreement between the software company and the purchaser which allows the purchaser to use the software within certain limitations.
End User License AgreementThe license agreement between the software company and the purchaser which allows the purchaser to use the software within certain limitations.
The license agreement between the software company and the purchaser which allows the purchaser to use the software within certain limitations.
EventAn occurrence tracked by the StorLogix software in the Event Log and viewed using the QuickViewer or EventViewer. This may be a user entering the site, a change made to the software by an operator, an alarm in a unit, or any number of other occurrences on a site.
An occurrence tracked by the StorLogix software in the Event LogThe file of events that occur on a site as tracked and recorded by StorLogix. and viewed using the QuickViewerA version of the EventViewer which allows the site to view only the most recent 100 events. This does not allow the interface to the VideoViewer. or EventViewerOne of the two options for viewing the Event Log. This option allows you to see any number of events in historic order of occurrence and may be used in conjunction with the VideoViewer to see video of the event.. This may be a user entering the site, a change made to the software by an operator, an alarm in a unit, or any number of other occurrences on a site.
Event LogThe file of events that occur on a site as tracked and recorded by StorLogix.
The file of events that occur on a site as tracked and recorded by StorLogix.
EventViewerOne of the two options for viewing the Event Log. This option allows you to see any number of events in historic order of occurrence and may be used in conjunction with the VideoViewer to see video of the event.
One of the two options for viewing the Event LogThe file of events that occur on a site as tracked and recorded by StorLogix.. This option allows you to see any number of events in historic order of occurrence and may be used in conjunction with the VideoViewerModule in StorLogix that allows the viewing of video if a DVR is connected to the system. to see video of the event.
ExitTo close a program or window, generally by clicking on the red ⌧ in the upper right corner of the window. Also refers to a user leaving a facility by entering their code at a keypad that operates a gate or door, allowing egress from the site or building.
To close a program or window, generally by clicking on the red ⌧ in the upper right corner of the window. Also refers to a user leaving a facility by entering their code at a keypad that operates a gate or door, allowing egress from the site or building.
ExportTo transfer data from StorLogix into another program or file.
To transfer data from StorLogix into another program or file.
Extended Door ControlsProgramming options in the Apex Series keypads that allow one Apex keypad to completely control all aspects of one door, including entrance and exit of the door, alarming of the door, presence detection at the door, and intercom reporting as an event from the Apex at the door.
Programming options in the Apex Series keypads that allow one Apex keypad to completely control all aspects of one door, including entrance and exit of the door, alarming of the door, presence detection at the door, and intercom reporting as an event from the Apex at the door.

F

Falcon 2000Previous software used in conjunction with the Falcon Base Unit hardware to control remote devices at a site. Information from this software may be uploaded to StorLogix as part of a site upgrade to the new product.
Previous software used in conjunction with the Falcon Base UnitPrevious hardware controller used to control remote devices at a site. Information from this unit sometimes may be uploaded to StorLogix as part of a site upgrade to the new product. hardware to control remote devices at a site. Information from this software may be uploaded to StorLogix as part of a site upgrade to the new product.
FBUPrevious hardware controller used to control remote devices at a site. Information from this unit sometimes may be uploaded to StorLogix as part of a site upgrade to the new product.
Falcon Base UnitPrevious hardware controller used to control remote devices at a site. Information from this unit sometimes may be uploaded to StorLogix as part of a site upgrade to the new product.
Previous hardware controller used to control remote devices at a site. Information from this unit sometimes may be uploaded to StorLogix as part of a site upgrade to the new product.
Falcon XTHardware controller used in conjunction with StorLogix software to control AI Devices at a site.
Hardware controller used in conjunction with StorLogix software to control AI Devices at a site.
Fire alarmAn alarm system used to detect smoke, heat, or gasses and warn occupants of a building or a monitoring station if a fire should occur on the site.
An alarm system used to detect smoke, heat, or gasses and warn occupants of a building or a monitoring station if a fire should occur on the site.
FirewallA hardware or software ‘wall’ that helps to protect a computer or network from outside access by hackers, viruses, or other threats. Must be configured to allow PTI access through Symantec pcAnywhere or Windows Remote Desktop. May also need configuration if using StorLogix Sync EasyCode mobile applications.
A hardware or software ‘wall’ that helps to protect a computer or network from outside access by hackers, viruses, or other threats. Must be configured to allow PTI access through Symantec pcAnywhere or Windows Remote DesktopSoftware program by Microsoft that allows one computer to access and control another from a remote location. This is generally used by technical support to assist in troubleshooting a site. Remote computer access is required to receive technical support from PTI on the StorLogix program. See also JoinMe and ShowMyPC. May also need configuration if using StorLogix Sync EasyCodeA mobile application for tenants which allows them to use their phone or tablet for access in to or out of a facility. Also shows the tenant activity and alarms associated with their unit(s). Requires StorLogix 5.0 or above. mobile applications.
FirmwareThe programming data and commands within the microchips of a hardware controller such as the Falcon XT.
The programming data and commands within the microchips of a hardware controller such as the Falcon XTHardware controller used in conjunction with StorLogix software to control AI Devices at a site..
Function KeysThe ‘F’ keys along the top of a standard computer keyboard. Generally, F1 through F12. See also Shortcut Keys.
The ‘F’ keys along the top of a standard computer keyboard. Generally, F1 through F12. See also Shortcut KeysKeystrokes or combinations of keystrokes on the keyboard that allow an operator to access commonly used functions without using the mouse..

G

GBA measurement used in reference to computer information storage equivalent to about 700 floppy disks or three hundred thousand pages of text.
GigabyteA measurement used in reference to computer information storage equivalent to about 700 floppy disks or three hundred thousand pages of text.
A measurement used in reference to computer information storage equivalent to about 700 floppy disks or 300,000 pages of text.
GHzA measurement of computer processor speed where 1 GHz is equivalent to 1 billion cycles per second. Each computer instruction requires a certain number of cycles, so this is indicative of the processing speed of the computer.
GigahertzA measurement of computer processor speed where 1 GHz is equivalent to 1 billion cycles per second. Each computer instruction requires a certain number of cycles, so this is indicative of the processing speed of the computer.
A measurement of computer processor speed where 1 GHzA measurement of computer processor speed where 1 GHz is equivalent to 1 billion cycles per second. Each computer instruction requires a certain number of cycles, so this is indicative of the processing speed of the computer. is equivalent to 1 billion cycles per second. Each computer instruction requires a certain number of cycles, so this is indicative of the processing speed of the computer.
Global SirenThe global siren is the alarm relays on PTI Multipexers, and the piezo alarm on Apex and VP series keypads. These relays/piezos may be turned off, but are not addressable for any other relay purpose in the system.
The global siren is the alarm relays on PTI Multipexers, and the piezo alarm on Apex and VP series keypads. These relays/piezos may be turned off, but are not addressable for any other relay purpose in the system.

H

HolidayDay(s) set aside in StorLogix for different access zones and levels usually due to an actual holiday. For example, the site may be closed on Christmas day and therefore want to lock out all users that day. Holiday are custom programmed by the site and are not preset. They can be any day and do not actually have to coincide with real national holidays.
Day(s) set aside in StorLogix for different access zones and levels usually due to an actual holiday. For example, the site may be closed on Christmas day and therefore want to lock out all users that day. HolidayDay(s) set aside in StorLogix for different access zones and levels usually due to an actual holiday. For example, the site may be closed on Christmas day and therefore want to lock out all users that day. Holiday are custom programmed by the site and are not preset. They can be any day and do not actually have to coincide with real national holidays. are custom programmed by the site and are not preset. They can be any day and do not actually have to coincide with real national holidays.

I

IconsPictures or symbols on a computer that may be clicked on to activate a function or open a program.
Pictures or symbols on a computer that may be clicked on to activate a function or open a program.
ImportTo transfer data from another program or file into StorLogix.
To transfer data from another program or file into StorLogix.
InputsHardware in the PTI System that allows connection of a switch that can be monitored by StorLogix. Examples include Door Contacts, motion sensors, request-to-exit buttons, presence
Hardware in the PTI System that allows connection of a switch that can be monitored by StorLogix. Examples include Door Contacts, motion sensors, request-to-exit buttons, presence

indicating pads or loops, etc.

InterfaceTo connect one software program to another for the purpose of sharing information. Generally, this will refer to the Management Interface or the connection between an accounting software such as TaskMaster used to handle the billing for a site to the StorLogix system used to handle access control and security. This allows the system to automatically lock out users who do not pay their bill.
To connect one software program to another for the purpose of sharing information. Generally, this will refer to the Management InterfaceThe connection between an accounting software, such as TaskMaster, which is used to handle the billing for a site to the StorLogix system used to handle access control and security. This allows the system to automatically lock out users who do not pay their bill. or the connection between an accounting software such as TaskMaster used to handle the billing for a site to the StorLogix system used to handle access control and security. This allows the system to automatically lock out users who do not pay their bill.

J

JoinMeWeb based program used by PTI technical support to remotely view a PCs desktop.
Web based program used by PTI technical support to remotely view a PCs desktop.

K

KeypadA touchpad device used for access control. PTI has three series: the Falcon Series, VP Series, and Apex Series. Each series has several different options.
A touchpad device used for access control. PTI has three series: the Falcon Series, VP Series, and Apex Series. Each series has several different options.

L

Late ExitOptions that allow a user exit after their scheduled time slot. That is, if a user is allowed access to the property from 8:00 am to 5:00 pm, and they come on the property at 4:55; the Late Exit options allow the site to decide how long after 5:00 pm they have to exit or how many times after 5:00 pm their code may be used for exit.
Options that allow a user exit after their scheduled time slot. That is, if a user is allowed access to the property from 8:00 am to 5:00 pm, and they come on the property at 4:55; the Late ExitOptions that allow a user exit after their scheduled time slot. That is, if a user is allowed access to the property from 8:00 am to 5:00 pm, and they come on the property at 4:55; the Late Exit options allow the site to decide how long after 5:00 pm they have to exit or how many times after 5:00 pm their code may be used for exit. options allow the site to decide how long after 5:00 pm they have to exit or how many times after 5:00 pm their code may be used for exit.
Lighting AreasA StorLogix setup that defines zones within a building or site that allow the lights to remain off until a user in that area comes on the site. For example, the lights on the third floor of a building can remain off, saving energy, until a user with a unit on the third floor actually keys onto the site. This would activate the lights for that floor. As that user keys out of the site to leave, the lights will go back off until needed again.
A StorLogix setup that defines zones within a building or site that allow the lights to remain off until a user in that area comes on the site. For example, the lights on the third floor of a building can remain off, saving energy, until a user with a unit on the third floor actually keys onto the site. This would activate the lights for that floor. As that user keys out of the site to leave, the lights will go back off until needed again.
Log InWhen an operator enters the User Name and Password to open StorLogix.
When an operator enters the User Name and PasswordA secret series of numbers or letters up to fifteen characters that allows an operator to access the StorLogix program. to open StorLogix.
Log OffTo close a program or to exit a site by entering a valid code at an exit keypad.
Log OutTo close a program or to exit a site by entering a valid code at an exit keypad.
To close a program or to exit a site by entering a valid code at an exit keypad.
Log OnTo enter a site by entering a valid code at an entrance keypad.
To enter a site by entering a valid code at an entrance keypad.
LogixScriptSettings within StorLogix that allows a site to create custom scripts that will trigger certain things to occur if the conditions are met. For example, a site could use LogixScript to turn on a coffee pot if the manager logs on the site before 9:00 am but not turn it on if the manager logs on the site after 9:00 am. These scripts are very customizable and can be used to do almost anything that could be needed for a custom site setup with relays and conditions.
Settings within StorLogix that allows a site to create custom scripts that will trigger certain things to occur if the conditions are met. For example, a site could use LogixScriptSettings within StorLogix that allows a site to create custom scripts that will trigger certain things to occur if the conditions are met. For example, a site could use LogixScript to turn on a coffee pot if the manager logs on the site before 9:00 am but not turn it on if the manager logs on the site after 9:00 am. These scripts are very customizable and can be used to do almost anything that could be needed for a custom site setup with relays and conditions. to turn on a coffee pot if the manager logs on the site before 9:00 am but not turn it on if the manager logs on the site after 9:00 am. These scripts are very customizable and can be used to do almost anything that could be needed for a custom site setup with relays and conditions.
LogixServerLogixServer controls the transfer of information between the Falcon XT, the Event Log database and the StorLogix database. Later versions of this program run as a service and have a GUI called "Dashboard" which can handle connections to multiple sites and databases.
LogixServer DashboardLogixServer controls the transfer of information between the Falcon XT, the Event Log database and the StorLogix database. Later versions of this program run as a service and have a GUI called "Dashboard" which can handle connections to multiple sites and databases.
LogixServer controls the transfer of information between the Falcon XTHardware controller used in conjunction with StorLogix software to control AI Devices at a site., the Event LogThe file of events that occur on a site as tracked and recorded by StorLogix. database and the StorLogix database. Later versions of this program run as a service and have a GUI called "Dashboard" which can handle connections to multiple sites and databases.

M

Management InterfaceThe connection between an accounting software, such as TaskMaster, which is used to handle the billing for a site to the StorLogix system used to handle access control and security. This allows the system to automatically lock out users who do not pay their bill.
StorLogix InterfaceThe connection between an accounting software, such as TaskMaster, which is used to handle the billing for a site to the StorLogix system used to handle access control and security. This allows the system to automatically lock out users who do not pay their bill.
The connection between an accounting software, such as TaskMaster, which is used to handle the billing for a site to the StorLogix system used to handle access control and security. This allows the system to automatically lock out users who do not pay their bill.
Maximum Code LengthSetting within StorLogix which allows the site to limit access code sizes. Generally this is due to some accounting softwares allowing only seven, eight, or nine digit codes. PTI recommends that access codes always be longer than four to five digits for security.
Setting within StorLogix which allows the site to limit access code sizes. Generally this is due to some accounting softwares allowing only 7, 8, or 9 digit codes. PTI recommends that access codes always be longer than 4 - 5 digits for security.
MBA measurement used in reference to computer information storage equivalent to about 300 pages of text. A floppy disc is equal to one point four MB.
MegabyteA measurement used in reference to computer information storage equivalent to about 300 pages of text. A floppy disc is equal to one point four MB.
A measurement used in reference to computer information storage equivalent to about 300 pages of text. A floppy disc is equal to 1.4 MBA measurement used in reference to computer information storage equivalent to about 300 pages of text. A floppy disc is equal to one point four MB..
MenuA list of commands or options that the user can choose from.
A list of commands or options that the user can choose from.
Menu BarA bar along the top of any program that allows the operator to choose menus with options or commands for the program.
A bar along the top of any program that allows the operator to choose menus with options or commands for the program.
MuxDoor Alarm Multiplexers take multiple inputs from individual door contacts and convert them to a single output back to the controller. Camera Multiplexers are similar in that they take multiple inputs from different cameras and create a single output back to the recorder.
MUXDoor Alarm Multiplexers take multiple inputs from individual door contacts and convert them to a single output back to the controller. Camera Multiplexers are similar in that they take multiple inputs from different cameras and create a single output back to the recorder.
MultiplexerDoor Alarm Multiplexers take multiple inputs from individual door contacts and convert them to a single output back to the controller. Camera Multiplexers are similar in that they take multiple inputs from different cameras and create a single output back to the recorder.
Door Alarm Multiplexers take multiple inputs from individual door contacts and convert them to a single output back to the controller. Camera Multiplexers are similar in that they take multiple inputs from different cameras and create a single output back to the recorder.

O

Off Delay TimeUsed in setting up Lighting Areas. Defines how long you want the lights to stay on after the last user logs out of the area.
Used in setting up Lighting AreasA StorLogix setup that defines zones within a building or site that allow the lights to remain off until a user in that area comes on the site. For example, the lights on the third floor of a building can remain off, saving energy, until a user with a unit on the third floor actually keys onto the site. This would activate the lights for that floor. As that user keys out of the site to leave, the lights will go back off until needed again.. Defines how long you want the lights to stay on after the last user logs out of the area.
On-Site UsersUsers that have logged on the site at an entrance AI device but not yet logged off of the site at an exit AI device. This does not mean that the user is actually on the site, only that they have not logged out or did not log out when they left.
Users that have logged on the site at an entrance AI device but not yet logged off of the site at an exit AI device. This does not mean that the user is actually on the site, only that they have not logged out or did not log out when they left.
Open Door/Gate
Function that allows an operator to manually trigger a relay connected to a gate operator or door strike.
Operating SystemThe version of Windows used on the PC running StorLogix.
The version of Windows used on the PC running StorLogix.
OperatorA person that has the ability to access and use the StorLogix Software.
A person that has the ability to access and use the StorLogix Software.
Optional User PINA high security feature that allows a site that is using access cards (wiegand or swipe) to require the user to enter a pin number at the keypad also. This prevents a stolen card from being used to access the site.
A high security feature that allows a site that is using access cards (wiegand or swipe) to require the user to enter a pin number at the keypad also. This prevents a stolen card from being used to access the site.
OutputsRelays in the system that can be used to activate peripherals or functions based on inputs. For example, a user inputs their valid code at a keypad and the output relay triggers to open the gate.
Relays in the system that can be used to activate peripherals or functions based on inputs. For example, a user inputs their valid code at a keypad and the output relay triggers to open the gate.

P

Pass Through Lighting AreaA lighting area that must be passed through in order to get to another lighting area. Generally a hallway. This lighting area must be lit in order to create a path to get to the other area which is generally a controlled lighting area also.
A lighting area that must be passed through in order to get to another lighting area. Generally a hallway. This lighting area must be lit in order to create a path to get to the other area which is generally a controlled lighting area also.
PasswordA secret series of numbers or letters up to fifteen characters that allows an operator to access the StorLogix program.
A secret series of numbers or letters up to 15 characters that allows an operator to access the StorLogix program.
PCAnywhere

Software program by Symantec that allows one computer to access and control another from a remote location. This is generally used by technical support to assist in troubleshooting a site. Remote computer access is required to receive technical support from PTI on the StorLogix program. See also ShowMyPCWeb based program that allows remote access to a PC for technical support. and JoinMeWeb based program used by PTI technical support to remotely view a PCs desktop.

PermissionsReferring collectively to the level of access an operator or user has to the site, the software, etc. May also refer to settings in Windows that allow a person logged into Windows to access functions of the Operating System.
Referring collectively to the level of access an operator or user has to the site, the software, etc. May also refer to settings in Windows that allow a person logged into Windows to access functions of the Operating SystemThe version of Windows used on the PC running StorLogix..
Physical RelayAn actual relay or switch on a keypad, controller, or multiplexer that can be controlled from the StorLogix software.
An actual relay or switch on a keypad, controller, or multiplexer that can be controlled from the StorLogix software.
PINA secret number used in conjunction with a swipe or proximity card to prevent the use of the card in the event of theft.
Personal Identification NumberA secret number used in conjunction with a swipe or proximity card to prevent the use of the card in the event of theft.
A secret number used in conjunction with a swipe or proximity card to prevent the use of the card in the event of theft.
PollingThe process of the controller querying the AI devices to verify that they are still there and communicating. If the AI device answers yes, then it can transmit any data that it has to the controller. If the AI device does not answer then the controller will identify a communication error.
The process of the controller querying the AI devices to verify that they are still there and communicating. If the AI device answers yes, then it can transmit any data that it has to the controller. If the AI device does not answer then the controller will identify a communication error.
PortAn interface point on a computer that allows communication with a peripheral device. Most commonly, this will be an RS232, USB, or Serial communications port. Other port examples include TCP/IP, PS2, Parallel, and RS422.
An interface point on a computer that allows communication with a peripheral device. Most commonly, this will be an RS232A type of communications used for computers and serial devices. Generally, limited to fifty feet of wire length. One of the options used for connecting the Falcon XT to the StorLogix computer, but should be used only when the other options are not available., USBA data port connection type that supports higher speed data transfer than RS232., or Serial communications port. Other port examples include TCP/IP, PS2, Parallel, and RS422.

Q

Quick OptionsThere are two ways to setup a site. A basic setup is done using Quick Options that allow the site to quickly be setup using only the most commonly used features of the StorLogix software. The Advanced Options allow a fully customized setup with many useful options and features that are outside of the basic quick setup.
There are two ways to setup a site. A basic setup is done using Quick OptionsThere are two ways to setup a site. A basic setup is done using Quick Options that allow the site to quickly be setup using only the most commonly used features of the StorLogix software. The Advanced Options allow a fully customized setup with many useful options and features that are outside of the basic quick setup. that allow the site to quickly be setup using only the most commonly used features of the StorLogix software. The Advanced OptionsThere are two ways to setup a site. A basic setup is done using Quick Options that allow the site to quickly be setup with the most commonly used features of the StorLogix software. The Advanced Options allow a fully customized setup with many useful options and features that are outside the scope of the quick setup. allow a fully customized setup with many useful options and features that are outside of the basic quick setup.
QuickViewerA version of the EventViewer which allows the site to view only the most recent 100 events. This does not allow the interface to the VideoViewer.
A version of the EventViewerOne of the two options for viewing the Event Log. This option allows you to see any number of events in historic order of occurrence and may be used in conjunction with the VideoViewer to see video of the event. which allows the site to view only the most recent 100 events. This does not allow the interface to the VideoViewerModule in StorLogix that allows the viewing of video if a DVR is connected to the system..

R

RAMA type of memory in computers that can be changed and accessed as needed. In practice, this affects the speed at which a computer can perform functions.
Random Access MemoryA type of memory in computers that can be changed and accessed as needed. In practice, this affects the speed at which a computer can perform functions.
A type of memory in computers that can be changed and accessed as needed. In practice, this affects the speed at which a computer can perform functions.
Re-armThe process of re-activating a door alarm, turning off a lighting zone, or disallowing an elevator floor after a user in that area/unit has closed their door, left the area or logged off the site. There are several options that can be used to reactivate the alarm as the person logs off the site, after they close their door, at a specific time during the day, after a certain number of minutes after they close their door, etc.
The process of re-activating a door alarm, turning off a lighting zone, or disallowing an elevator floor after a user in that area/unit has closed their door, left the area or logged off the site. There are several options that can be used to reactivate the alarm as the person logs off the site, after they close their door, at a specific time during the day, after a certain number of minutes after they close their door, etc.
Red Letters WordsDescriptions StorLogix that appear in red type are required fields that must be entered before proceeding.
Descriptions StorLogix that appear in red type are required fields that must be entered before proceeding.
Relay

A switch that can be turned on or off in the system to trigger a function such as opening a gate or door, sounding a siren, turning on a light, activating an elevator, etc.

RemoteTerm used with previous PTI systems to refer to an AI Device. Now most commonly used to refer to a facility that is located some distance away from the office or PC that controls it.
Remote DeviceTerm used with previous PTI systems to refer to an AI Device. Now most commonly used to refer to a facility that is located some distance away from the office or PC that controls it.
Term used with previous PTI systems to refer to an AI DeviceAccess Interface Device. A general name referring to all PTI Keypads, Multiplexers, Relay Boards, and Wiegand Protocol Devices. In previous PTI systems these were occasionally referred to as remotes or remote devices.. Now most commonly used to refer to a facility that is located some distance away from the office or PC that controls it.
Remote DesktopSoftware program by Microsoft that allows one computer to access and control another from a remote location. This is generally used by technical support to assist in troubleshooting a site. Remote computer access is required to receive technical support from PTI on the StorLogix program. See also JoinMe and ShowMyPC
Software program by Microsoft that allows one computer to access and control another from a remote location. This is generally used by technical support to assist in troubleshooting a site. Remote computer access is required to receive technical support from PTI on the StorLogix program. See also JoinMeWeb based program used by PTI technical support to remotely view a PCs desktop. and ShowMyPCWeb based program that allows remote access to a PC for technical support.
Repeat CountThe number of times a message will display on a keypad or the number of times that a relay will be triggered on an event.
The number of times a message will display on a keypad or the number of times that a relay will be triggered on an event.
ReportA presentation of data in the system, formatted to be printed on paper from a printer.
A presentation of data in the system, formatted to be printed on paper from a printer.
Required Level On-SiteThis function allows the site to prevent users or lower level operators from entering a site until a higher level operator, for example a site manager, is actually on-site.
This function allows the site to prevent users or lower level operators from entering a site until a higher level operator, for example a site manager, is actually on-site.
RS232A type of communications used for computers and serial devices. Generally, limited to fifty feet of wire length. One of the options used for connecting the Falcon XT to the StorLogix computer, but should be used only when the other options are not available.
A type of communications used for computers and serial devices. Generally, limited to 50 feet of wire length. One of the options used for connecting the Falcon XTHardware controller used in conjunction with StorLogix software to control AI Devices at a site. to the StorLogix computer, but should be used only when the other options are not available.
RS485A type of communications used for electronic devices. Generally, limited to four thousand total feet of wire length. Used for connecting the Falcon XT to AI Devices.
A type of communications used for electronic devices. Generally, limited to 4000 feet of wire length. Used for connecting the Falcon XTHardware controller used in conjunction with StorLogix software to control AI Devices at a site. to AI Devices.
RX900PTI’s wireless door alarm system.
PTI’s wireless door alarm system.

S

ScriptsCustom commands programmed by the operator using LogixScript that cause certain tasks to be performed if certain conditions are met. See also LogixScript.
Custom commands programmed by the operator using LogixScriptSettings within StorLogix that allows a site to create custom scripts that will trigger certain things to occur if the conditions are met. For example, a site could use LogixScript to turn on a coffee pot if the manager logs on the site before 9:00 am but not turn it on if the manager logs on the site after 9:00 am. These scripts are very customizable and can be used to do almost anything that could be needed for a custom site setup with relays and conditions. that cause certain tasks to be performed if certain conditions are met. See also LogixScriptSettings within StorLogix that allows a site to create custom scripts that will trigger certain things to occur if the conditions are met. For example, a site could use LogixScript to turn on a coffee pot if the manager logs on the site before 9:00 am but not turn it on if the manager logs on the site after 9:00 am. These scripts are very customizable and can be used to do almost anything that could be needed for a custom site setup with relays and conditions..
Security LevelThe level of permission assigned to an operator in StorLogix, limiting them to certain areas and functions. An Unrestricted security level has access to every function in the program.
The level of permission assigned to an operator in StorLogix, limiting them to certain areas and functions. An Unrestricted security level has access to every function in the program.
ServerA computer, device, or program that manages resources for a network of multiple computers and devices.
A computer, device, or program that manages resources for a network of multiple computers and devices.
Shortcut KeysKeystrokes or combinations of keystrokes on the keyboard that allow an operator to access commonly used functions without using the mouse.
Keystrokes or combinations of keystrokes on the keyboard that allow an operator to access commonly used functions without using the mouse.
ShowMyPCWeb based program that allows remote access to a PC for technical support.
Web based program that allows remote access to a PC for technical support.
SiteA collective reference to the location or property controlled by StorLogix. May be one or many buildings and may actually be more than one physical location.
A collective reference to the location or property controlled by StorLogix. May be one or many buildings and may actually be more than one physical location.
Site ActivityEvents that occur on the site as monitored by StorLogix. These include users entering and exiting the site, alarms, actions on the software by the operators, etc.
Events that occur on the site as monitored by StorLogix. These include users entering and exiting the site, alarms, actions on the software by the operators, etc.
Site Code

The identifier for the Falcon XTHardware controller used in conjunction with StorLogix software to control AI Devices at a site. to retrieve the site information pertaining to your site from the StorLogix database.

Site GraphicsPTI Program that can be interfaced to StorLogix that provides a visual output of site events on a graphic representation of the site.
PTI Program that can be interfaced to StorLogix that provides a visual output of site events on a graphic representation of the site.
SQLDatabase format used by StorLogix.
Database format used by StorLogix.
Swinger ShutdownFunction that allows the system to ignore multiple alarms from the same door. This is generally used on a system with loose doors that shake with the wind or traffic vibrations, causing false alarms.
Function that allows the system to ignore multiple alarms from the same door. This is generally used on a system with loose doors that shake with the wind or traffic vibrations, causing false alarms.

T

2-Channel Relay BoardPTI AI Device with two relays that can be used to control two lighting areas, elevator floors, or any two other relay functions. This device is dual function; it can be either a Wiegand Protocol Device or a 2-Channel Relay Board.
PTI AI DeviceAccess Interface Device. A general name referring to all PTI Keypads, Multiplexers, Relay Boards, and Wiegand Protocol Devices. In previous PTI systems these were occasionally referred to as remotes or remote devices. with two relays that can be used to control two lighting areas, elevator floors, or any two other relay functions. This device is dual function; it can be either a Wiegand Protocol DevicePTI AI Device that can be used to connect proximity readers, fingerprint readers, keyfob entry devices and other Wiegand language devices. This device is dual function; it can be either a Wiegand Protocol Device or a 2-Channel Relay Board. or a 2-Channel Relay BoardPTI AI Device with two relays that can be used to control two lighting areas, elevator floors, or any two other relay functions. This device is dual function; it can be either a Wiegand Protocol Device or a 2-Channel Relay Board..
Tamper AlarmAn alarm switch on AI Devices that prevents the device from being opened. If it is opened, then an alarm will sound in the system.
An alarm switch on AI Devices that prevents the device from being opened. If it is opened, then an alarm will sound in the system.
Text MessageA short message, similar to an email that can be sent to a cell phone or text pager.
A short message, similar to an email that can be sent to a cell phone or text pager.
Time ScheduleThe hours that an operator, user or group of users are allowed to enter the site. Used in conjunction with an "Access Area" to define an "Access Level".
The hours that an operator, user or group of users are allowed to enter the site. Used in conjunction with an "Access AreaA Setup used in StorLogix to define an area of the facility where users are allowed access. Used in conjunction with a "Time Schedule" to define an "Access Level". An access area can be a unit, a building, a floor of an elevator, an office or an area on the site. When a user is assigned to an Access Area, the user will inherit the Permissions to the items associated with that area." to define an "Access LevelA Setup used in StorLogix to define a user's access to the site, a building, or a unit. Access Levels are the access permissions for the user. The Access Level also contains the "Access Area" (defining what area the user may enter), and "Time Schedule" (what time of day the user may attempt access to the site or the assigned area).".
Time SlotEight time periods that a time schedule can be set for. These are Monday, Tuesday, Wednesday, Thursday, Friday, Saturday, Sunday, and Holidays.
Eight time periods that a time schedule can be set for. These are Monday, Tuesday, Wednesday, Thursday, Friday, Saturday, Sunday, and Holidays.
Time SpanOne or more periods of time within a time slot that a user or operator can enter a site. For example: 8:00 am – 5:00 pm is a time slot.
One or more periods of time within a time slot that a user or operator can enter a site. For example: 8:00 am – 5:00 pm is a time slot.
ToolbarA bar along the top of a program that uses small icons to represent functions that can be accessed by an operator. Generally this is directly below the menu bar.
A bar along the top of a program that uses small icons to represent functions that can be accessed by an operator. Generally this is directly below the menu bar.
TriggerTo activate a switch or relay.
To activate a switch or relay.

U

UnitAn individual space or room that can be rented to a user and is generally off limits to other users.
An individual space or room that can be rented to a user and is generally off limits to other users.
Unknown InputsInputs that have not been programmed into the system, but have data reporting through them.
InputsHardware in the PTI System that allows connection of a switch that can be monitored by StorLogix. Examples include Door Contacts, motion sensors, request-to-exit buttons, presence that have not been programmed into the system, but have data reporting through them.
Unrestricted UserAn operator who has full access to all parts of the system.
An operator who has full access to all parts of the system.
UpdateA change, improvement, or fix for the system that must be downloaded. This will change the version.
A change, improvement, or fix for the system that must be downloaded. This will change the version.
UploadThe opposite of Download. This means to copy a file from one computer to another computer, generally going from the peripheral device to the main computer.
The opposite of DownloadTo copy information from a main source or computer into a peripheral, for example copying a file from the internet into your local computer.. This means to copy a file from one computer to another computer, generally going from the peripheral device to the main computer.
UPSProvides power surge protection, power conditioning, and battery backup. Recommended for all computers, including Site Graphics (if present).
Uninterruptible Power SupplyProvides power surge protection, power conditioning, and battery backup. Recommended for all computers, including Site Graphics (if present).
Provides power surge protection, power conditioning, and battery backup. Recommended for all computers, including Site GraphicsPTI Program that can be interfaced to StorLogix that provides a visual output of site events on a graphic representation of the site. (if present).
USBA data port connection type that supports higher speed data transfer than RS232.
Universal Serial BusA data port connection type that supports higher speed data transfer than RS232.
A data port connection type that supports higher speed data transfer than RS232A type of communications used for computers and serial devices. Generally, limited to fifty feet of wire length. One of the options used for connecting the Falcon XT to the StorLogix computer, but should be used only when the other options are not available..
USB Jump DriveA small portable computer information storage device that connects to a USB port as an extra disk drive.
Thumb DriveA small portable computer information storage device that connects to a USB port as an extra disk drive.
A small portable computer information storage device that connects to a USB port as an extra disk drive.
UserA person who uses the access control of a site, not necessarily an operator.
A person who uses the access control of a site, not necessarily an operator.
User GroupA customized group of users who have the same time schedules and access levels.
A customized group of users who have the same time schedules and access levels.

V

VersionA number designating the current release of the StorLogix product. This allows tracking of updates.
A number designating the current release of the StorLogix product. This allows tracking of updates.
VideoViewerModule in StorLogix that allows the viewing of video if a DVR is connected to the system.
Module in StorLogix that allows the viewing of video if a DVRDigitally stores video from cameras on a hard drive. Can store much more information and access it faster than old analog VCR’s (Video Cassette Recorders). is connected to the system.
Virtual RelaysTheoretical switches or commands that they system will perform based on events, using LogixScript.
Theoretical switches or commands that they system will perform based on events, using LogixScriptSettings within StorLogix that allows a site to create custom scripts that will trigger certain things to occur if the conditions are met. For example, a site could use LogixScript to turn on a coffee pot if the manager logs on the site before 9:00 am but not turn it on if the manager logs on the site after 9:00 am. These scripts are very customizable and can be used to do almost anything that could be needed for a custom site setup with relays and conditions..
VP Series KeypadsCurrent series of standard access keypad devices with basic and general functionality.
Current series of standard access keypad devices with basic and general functionality.

W

WiegandA protocol language for security devices such as proximity card readers and fingerprint readers.
A protocol language for security devices such as proximity card readers and fingerprint readers.
Wiegand Protocol DevicePTI AI Device that can be used to connect proximity readers, fingerprint readers, keyfob entry devices and other Wiegand language devices. This device is dual function; it can be either a Wiegand Protocol Device or a 2-Channel Relay Board.
PTI AI DeviceAccess Interface Device. A general name referring to all PTI Keypads, Multiplexers, Relay Boards, and Wiegand Protocol Devices. In previous PTI systems these were occasionally referred to as remotes or remote devices. that can be used to connect proximity readers, fingerprint readers, keyfob entry devices and other Wiegand language devices. This device is dual function; it can be either a Wiegand Protocol DevicePTI AI Device that can be used to connect proximity readers, fingerprint readers, keyfob entry devices and other Wiegand language devices. This device is dual function; it can be either a Wiegand Protocol Device or a 2-Channel Relay Board. or a 2-Channel Relay BoardPTI AI Device with two relays that can be used to control two lighting areas, elevator floors, or any two other relay functions. This device is dual function; it can be either a Wiegand Protocol Device or a 2-Channel Relay Board..
WizardAn application within StorLogix that takes the operator through a series of steps to easily setup a function.
An application within StorLogix that takes the operator through a series of steps to easily setup a function.