Inside Two-i

A video series that gives a glimpse of what is happening behind closed doors.

AI Bridge: an alliance VMS + VCA | Inside Two-i
Invest in protection | Inside Two-i
Focus : essential information | Inside Two-i
The Two-i update is now available | Inside Two-i
Happy 4th Anniversary Two-i | Inside Two-i
Upcoming new features | Inside Two-i
Training in a virtual environment | Inside Two-i
Optimize alerts with smart detections | Inside Two-i
Define the concept of anomaly to artificial intelligences | Inside Two-i
From beginner to expert: mastering the Two-i software | Inside-Two-i
Communication between industries | Inside Two-i
Action units: decoding emotions | Inside Two-i
Optimizing security with business intelligence | Inside Two-i
The secret of the reliability of our detection algorithms | Inside Two-i
Perimeter protection by intelligent video analysis | Inside Two-i
Smart Metering | Inside Two-i
How our solutions respect privacy | Inside Two-i
Weapon Detection Algorithm | Inside Two-i
Intrusion detection with VCA technology | Inside Two-i
Training detection algorithms | Inside Two-i
Investing in Local Video Analytics | Inside Two-i
Heatmap & Areas of Interest | Inside Two-i
The Importance of Video Analytics for VMS | Inside Two-i
Working 4 days a week | Inside Two-i
Advanced analysis and statistical data on the STATS page | Inside Two-i
Introduction to Deep Learning | Inside Two-i
Export data to PDF and CSV for easy reporting | Inside Two-i
Automated Video Protection | Inside Two-i
Facilitate Installation and Maintenance | Inside Two-i
Predicting the Future | Inside Two-i
Facilitate searches with Backtester | Inside Two-i
LOG | Business Audit for Better System Control | Inside Two-i
SEE MORE

You might be interested
in those pages

Two-i in ActionTwo-i Tech Talk
Exit icon
Exit icon