The Conditional Behavior Engine is a powerful and flexible component of the LightHouse System, used to analyze and coordinate the results of system and device status changes in an automated fashion, distinct from the unified/holistic/consolidated user-oriented view that the operator sees. Conditional Behavior Engine 'Behaviors' can perform various operations automatically based on a set of conditions.
One particular module for the Conditional Behaviors Engine is the 'Connector' behavior type. The Connector behavior allows that during certain configured LightHouse Schedules if a given set of conditions is met, a Macro will be executed. Conditions, in this case, can mean:
Any combination of the above can be set as the conditions necessary to meet the connector's requirements. When the requirements are fulfilled, a system Macro will be triggered. While Macro capabilities are another topic, macros can send almost any command to any device on the system, as well as perform automated audio announcements, notifications via email or SMS, message online system operators, and/or call the video to client screens, and more.
Conditions can also be configured to allow an online user to cancel the execution of the Macro, with a configurable delay time to allow the user to evaluate and decide whether to cancel or let the macro proceed. Further, a debounce time can be configured, prevent undesirable behavior caused by conditions being met too often (such as with a 'flapping' door contact).
The Connector behavior can be used for items such as:
For more information about the Connector Behavior, see the LightHouse™ System Administration manual, or contact email@example.com for more information. The Connector Behavior is an included component of the Network Harbor LightHouse™ System.
LightHouse™ is the pre-eminent physical security integration management (PSIM) platform, trusted by Federal, State, and Local governments, as well as corporations and educational institutions, providing command, control, communications, status, and alerting capabilities over a wide range of access control, video, intrusion detection, automation, building management, network infrastructure, mass notification, and more.