<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Telecommunications Design &amp; Installation - Modern Edge Technologies</title>
	<atom:link href="https://modernedgetechnologies.com/tag/telecommunications-design-installation/feed/" rel="self" type="application/rss+xml" />
	<link>https://modernedgetechnologies.com</link>
	<description>A full service systems company that specializes in Fire Alarm, Access Control, Nurse Call, Wander Guard, Video, AV and Security systems.</description>
	<lastBuildDate>Mon, 05 Feb 2018 20:15:20 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>CCTV</title>
		<link>https://modernedgetechnologies.com/2018/01/30/cctv/</link>
		
		<dc:creator><![CDATA[Admin]]></dc:creator>
		<pubDate>Tue, 30 Jan 2018 19:34:22 +0000</pubDate>
				<category><![CDATA[AV]]></category>
		<category><![CDATA[Fiber Optics]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Structured Cabling]]></category>
		<category><![CDATA[Telecommunications]]></category>
		<category><![CDATA[Video]]></category>
		<category><![CDATA[Access Control Installation]]></category>
		<category><![CDATA[Asheville]]></category>
		<category><![CDATA[AV Installation]]></category>
		<category><![CDATA[Charlotte]]></category>
		<category><![CDATA[Fayetteville]]></category>
		<category><![CDATA[Greensboro]]></category>
		<category><![CDATA[High Point]]></category>
		<category><![CDATA[NC]]></category>
		<category><![CDATA[North Carolina]]></category>
		<category><![CDATA[Raleigh]]></category>
		<category><![CDATA[Security Installation]]></category>
		<category><![CDATA[South Carolina]]></category>
		<category><![CDATA[Structured Cabling Installation]]></category>
		<category><![CDATA[Telecommunications Design & Installation]]></category>
		<category><![CDATA[Triad]]></category>
		<category><![CDATA[Video Installation]]></category>
		<category><![CDATA[Winston Salem]]></category>
		<guid isPermaLink="false">https://modernedgetechnologies.com/?p=556</guid>

					<description><![CDATA[<p>Monitor employees Organizations use CCTV to monitor the actions of workers. Every action is recorded as an information block with subtitles that explain the performed operation. This helps to track the actions of workers, especially when they are making critical financial transactions, such canceling or cancelling of a sale, withdrawing money or altering personal information.&#8230;</p>
<p>The post <a href="https://modernedgetechnologies.com/2018/01/30/cctv/">CCTV</a> first appeared on <a href="https://modernedgetechnologies.com">Modern Edge Technologies</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><strong>Monitor employees</strong><br />
Organizations use CCTV to monitor the actions of workers. Every action is recorded as an information block with subtitles that explain the performed operation. This helps to track the actions of workers, especially when they are making critical financial transactions, such canceling or cancelling of a sale, withdrawing money or altering personal information.</p>
<p>Actions which an employer may wish to monitor could include:</p>
<p>Scanning of goods, selection of goods, introduction of price and quantity;<br />
Input and output of operators in the system when entering passwords;<br />
Deleting operations and modifying existing documents;<br />
Implementation of certain operations, such as financial statements or operations with cash;<br />
Moving goods, revaluation scrapping and counting;<br />
Control in the kitchen of fast food restaurants;<br />
Change of settings, reports and other official functions.<br />
Each of these operations is transmitted with a description, allowing detailed monitoring of all actions of the operator. Some systems allow the user to search for a specific event by time of occurrence and text description, and perform statistical evaluation of operator behaviour. This allows the software to predict deviations from the standard workflow and record only anomalous behaviour.</p>
<p><strong>Use in schools</strong><br />
CCTV is widely used in schools due to its success in preventing bullying, vandalism, monitoring visitors and maintaining a record of evidence in the event of a crime. There are some restrictions on installation, with cameras not being installed in an area where there is a &#8220;reasonable expectation of privacy&#8221;, such as bathrooms, gym locker areas and private offices (unless consent by the office occupant is given). Сameras are generally acceptable in hallways, parking lots, front offices where students, employees, and parents come and go, gymnasiums, cafeterias, supply rooms and classrooms. The installation of cameras in classrooms may be objected to by some teachers.</p>
<p><strong>Criminal use</strong><br />
Criminals may use surveillance cameras to monitor the public. For example, a hidden camera at an ATM can capture people&#8217;s PINs as they are entered, without their knowledge. The devices are small enough not to be noticed, and are placed where they can monitor the keypad of the machine as people enter their PINs. Images may be transmitted wirelessly to the criminal.</p><p>The post <a href="https://modernedgetechnologies.com/2018/01/30/cctv/">CCTV</a> first appeared on <a href="https://modernedgetechnologies.com">Modern Edge Technologies</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Security Systems</title>
		<link>https://modernedgetechnologies.com/2018/01/16/security-systems/</link>
		
		<dc:creator><![CDATA[Admin]]></dc:creator>
		<pubDate>Tue, 16 Jan 2018 19:29:18 +0000</pubDate>
				<category><![CDATA[Access Control]]></category>
		<category><![CDATA[AV]]></category>
		<category><![CDATA[Fiber optic cabling]]></category>
		<category><![CDATA[Fire Alarm]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Structured Cabling]]></category>
		<category><![CDATA[Telecommunications]]></category>
		<category><![CDATA[Video]]></category>
		<category><![CDATA[Access Control Installation]]></category>
		<category><![CDATA[Asheville]]></category>
		<category><![CDATA[AV Installation]]></category>
		<category><![CDATA[Charlotte]]></category>
		<category><![CDATA[Fayetteville]]></category>
		<category><![CDATA[Fire Alarm Installation]]></category>
		<category><![CDATA[Greensboro]]></category>
		<category><![CDATA[High Point]]></category>
		<category><![CDATA[NC]]></category>
		<category><![CDATA[North Carolina]]></category>
		<category><![CDATA[Raleigh]]></category>
		<category><![CDATA[Security Installation]]></category>
		<category><![CDATA[South Carolina]]></category>
		<category><![CDATA[Structured Cabling Installation]]></category>
		<category><![CDATA[Telecommunications Design & Installation]]></category>
		<category><![CDATA[Triad]]></category>
		<category><![CDATA[Video Installation]]></category>
		<category><![CDATA[Winston Salem]]></category>
		<guid isPermaLink="false">https://modernedgetechnologies.com/?p=552</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>Modern Edge Technologies deploys Security Systems that provide many specific functions based on the client&#8217;s needs. Most popular are IDS (Intrusion Detection) and Fire Alarm Systems. Both require proper design and installation and have many customizable options that can accommodate any needs. We are able to program our systems to meet any specifications. Below is a description of the two most common Security systems that we install and service.</p>

		</div>
	</div>

	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h3>Intrusion Detection</h3>

		</div>
	</div>

	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any detected activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources and uses alarm filtering techniques to distinguish malicious activity from false alarms.</p>
<p>There is a wide spectrum of IDS, varying from antivirus software to hierarchical systems that monitor the traffic of an entire backbone network.[citation needed] The most common classifications are network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS). A system that monitors important operating system files is an example of a HIDS, while a system that analyzes incoming network traffic is an example of a NIDS. It is also possible to classify IDS by detection approach: the most well-known variants are signature-based detection (recognizing bad patterns, such as malware) and anomaly-based detection (detecting deviations from a model of &#8220;good&#8221; traffic, which often relies on machine learning). Some IDS have the ability to respond to detected intrusions. Systems with response capabilities are typically referred to as an intrusion prevention system.</p>

		</div>
	</div>

	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h3>Fire Alarm System</h3>

		</div>
	</div>

	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>A fire alarm system has a number of devices working together to detect and warn people through visual and audio appliances when smoke, fire, carbon monoxide or other emergencies are present. These alarms may be activated automatically from smoke detectors, and heat detectors or may also be activated via manual fire alarm activation devices such as manual call points or pull stations. Alarms can be either motorized bells or wall mountable sounders or horns. They can also be speaker strobes which sound an alarm, followed by a voice evacuation message which warns people inside the building not to use the elevators. Fire alarm sounders can be set to certain frequencies and different tones including low, medium and high, depending on the country and manufacturer of the device. Most fire alarm systems in Europe sound like a siren with alternating frequencies. Fire alarm electronic devices are known as horns in the United States and Canada can be either continuous or set to different codes such as Code 3. Fire alarm warning devices can also be set to different volume levels. Fire Alarm systems in the United Kingdom are tested at a weekly basis in compliance with the BS-fire 2013 regulations.</p>

		</div>
	</div>
</div></div></div></div>
</div><p>The post <a href="https://modernedgetechnologies.com/2018/01/16/security-systems/">Security Systems</a> first appeared on <a href="https://modernedgetechnologies.com">Modern Edge Technologies</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Access Control &#8211; Identity Based</title>
		<link>https://modernedgetechnologies.com/2017/11/07/access-control/</link>
		
		<dc:creator><![CDATA[Admin]]></dc:creator>
		<pubDate>Tue, 07 Nov 2017 19:43:17 +0000</pubDate>
				<category><![CDATA[Access Control]]></category>
		<category><![CDATA[AV]]></category>
		<category><![CDATA[Fire Alarm]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Structured Cabling]]></category>
		<category><![CDATA[Telecommunications]]></category>
		<category><![CDATA[Video]]></category>
		<category><![CDATA[Wander Guard]]></category>
		<category><![CDATA[Access Control Installation]]></category>
		<category><![CDATA[Asheville]]></category>
		<category><![CDATA[AV Installation]]></category>
		<category><![CDATA[Charlotte]]></category>
		<category><![CDATA[Fayetteville]]></category>
		<category><![CDATA[Fire Alarm Installation]]></category>
		<category><![CDATA[Greensboro]]></category>
		<category><![CDATA[High Point]]></category>
		<category><![CDATA[NC]]></category>
		<category><![CDATA[North Carolina]]></category>
		<category><![CDATA[Raleigh]]></category>
		<category><![CDATA[Security Installation]]></category>
		<category><![CDATA[South Carolina]]></category>
		<category><![CDATA[Structured Cabling Installation]]></category>
		<category><![CDATA[Telecommunications Design & Installation]]></category>
		<category><![CDATA[Triad]]></category>
		<category><![CDATA[Video Installation]]></category>
		<category><![CDATA[Winston Salem]]></category>
		<guid isPermaLink="false">https://modernedgetechnologies.com/?p=554</guid>

					<description><![CDATA[<p>Identity-based security is an approach to control access to a digital product or service based on the authenticated identity of an individual. This allows organizations to grant access to specific users to access a variety of digital services using the same credentials, ensuring the accurate match between what users are entitled to and what they&#8230;</p>
<p>The post <a href="https://modernedgetechnologies.com/2017/11/07/access-control/">Access Control – Identity Based</a> first appeared on <a href="https://modernedgetechnologies.com">Modern Edge Technologies</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Identity-based security is an approach to control access to a digital product or service based on the authenticated identity of an individual. This allows organizations to grant access to specific users to access a variety of digital services using the same credentials, ensuring the accurate match between what users are entitled to and what they actually receive while also permitting other access constraints such as company, device, location and application type (attributes). Underpinning the identity-based security approach is the Identity-Based Access Control (IBAC), (or identity-based licensing) concept.</p>
<p>NIST defines identity-based security policies as policies &#8220;based on the identities and/or attributes of the object (system resource) being accessed and of the subject (user, group of users, process, or device) requesting access.&#8221;</p>
<p>Some of the advantages of the identity-based security approach include the ability to exercise very fine-grained control over who is allowed to use which services and which functions those users can perform, and that it is device-agnostic, offering the possibility to enforce access control policy across a variety of devices, such as smartphones, tablets, and PCs.</p>
<p>For more information on how Modern Edge Technologies can build the right Access Control solution for your business, visit our <a href="https://modernedgetechnologies.com/products-services/security/access-control/">solution page</a> or call us for a consultation.</p><p>The post <a href="https://modernedgetechnologies.com/2017/11/07/access-control/">Access Control – Identity Based</a> first appeared on <a href="https://modernedgetechnologies.com">Modern Edge Technologies</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fire Alarm / Voice Evacuation</title>
		<link>https://modernedgetechnologies.com/2017/11/01/fire-alarm-voice-evacuation/</link>
		
		<dc:creator><![CDATA[Admin]]></dc:creator>
		<pubDate>Wed, 01 Nov 2017 17:58:39 +0000</pubDate>
				<category><![CDATA[Access Control]]></category>
		<category><![CDATA[Fire Alarm]]></category>
		<category><![CDATA[Nurse Call]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Structured Cabling]]></category>
		<category><![CDATA[Telecommunications]]></category>
		<category><![CDATA[Video]]></category>
		<category><![CDATA[Wander Guard]]></category>
		<category><![CDATA[Access Control Installation]]></category>
		<category><![CDATA[Asheville]]></category>
		<category><![CDATA[AV Installation]]></category>
		<category><![CDATA[Charlotte]]></category>
		<category><![CDATA[Fayetteville]]></category>
		<category><![CDATA[Fire Alarm Installation]]></category>
		<category><![CDATA[Greensboro]]></category>
		<category><![CDATA[High Point]]></category>
		<category><![CDATA[NC]]></category>
		<category><![CDATA[North Carolina]]></category>
		<category><![CDATA[Nurse Call Installation]]></category>
		<category><![CDATA[Raleigh]]></category>
		<category><![CDATA[Security Installation]]></category>
		<category><![CDATA[South Carolina]]></category>
		<category><![CDATA[Structured Cabling Installation]]></category>
		<category><![CDATA[Telecommunications Design & Installation]]></category>
		<category><![CDATA[Triad]]></category>
		<category><![CDATA[Video Installation]]></category>
		<category><![CDATA[Wander Guard Installation]]></category>
		<category><![CDATA[Winston Salem]]></category>
		<guid isPermaLink="false">https://modernedgetechnologies.com/?p=536</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img fetchpriority="high" decoding="async" width="432" height="550" src="https://modernedgetechnologies.com/wp-content/uploads/2017/10/tx3-touch-s15-b-front.jpg" class="vc_single_image-img attachment-full" alt="" title="tx3-touch-s15-b-front" srcset="https://modernedgetechnologies.com/wp-content/uploads/2017/10/tx3-touch-s15-b-front.jpg 432w, https://modernedgetechnologies.com/wp-content/uploads/2017/10/tx3-touch-s15-b-front-236x300.jpg 236w" sizes="(max-width: 432px) 100vw, 432px"  data-dt-location="https://modernedgetechnologies.com/2017/11/01/fire-alarm-voice-evacuation/tx3-touch-s15-b-front/" /></div>
		</figure>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h3>COMING SOON THE</h3>
<h1 class="mircom_product_display">TX3 NANO</h1>
<p><strong>Save Money</strong> – use SIP to consolidate communication through the building’s existing IP Network.</p>
<p><strong>Control from your Smart Phone or Tablet</strong> with our Android and Apple Apps.</p>
<p><strong>Built-in Camera</strong> that allows you to SEE who is at the door on your smartphone or tablet.</p>
<p><strong>Built-In Access Control</strong> – open the door with your smartphone or tablet.</p>
<p><strong>Easy Retro-fit</strong> to existing doorways.</p>
<p><strong>Fully Compatible</strong> with the complete TX3 Series.</p>
<p>The TX3 is the expandable and scalable solution for your business.</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h4>FEATURES</h4>
<h5>SMALL FOOTPRINT, ATTRACTIVE DESIGN</h5>
<p>Attractive weather-resistant surface mount design with illuminated scrolling name directory. And in a compact design that fits on a single gang electrical box: 8.7&#8243; x 5.7&#8243; x 1.8&#8243;</p>
<h5>VISIBLE IN ALL LIGHTING</h5>
<p>Positive visual identification of incoming visitors is provided by a built-in camera with Infrared illumination.</p>
<h5>SUPPORTS ALL COMMUNICATIONS PROTOCOLS</h5>
<p>Supports all communication protocols; VoIP, POTS, and GSM. The TX3 Nano is a door station that can retrofit to existing entrance locations and/or integrate to modern communication networks.</p>
<h5>BUILT-IN DOOR CONTROL OUTPUT</h5>
<p>This is not just an intercom. This is a powerful Access Control station that allows you to control Door Entry from your smartphone or tablet.</p>
<h5>COMPATIBLE WITH BOTH ANDROID AND APPLE</h5>
<p>Turn your smartphone or tablet into a powerful Home Automation tool with our Apps. Android: 4.1 (or more recent) Apple: iOS 9 (or more recent).</p>
<h5>FULLY TX3 AND SMART CONDO COMPATIBLE</h5>
<p>The TX3 Nano is fully compatible with the entire suite of TX3 products and services.</p>
<p>It is also fully supported by Mircom’s New Smart Condo solution for apartments and condominiums.</p>
<p>&nbsp;</p>
<p>Modern Edge Technologies integrates new technology to support improved services for Fire alarm and voice evacuation into new and existing building. When you have a need for Fire Alarm, Voice Evacuation, or any other technology system requirement, rely on Modern Edge Technologies.</p>
<p>&nbsp;</p>
<p>Source: <a href="https://www.mircom.com/product-listing/voice-entry/integrated-telephone-access-systems/tx3-nano" target="_blank" rel="noopener">https://www.mircom.com/product-listing/voice-entry/integrated-telephone-access-systems/tx3-nano</a></p>

		</div>
	</div>
</div></div></div></div>
</div><p>The post <a href="https://modernedgetechnologies.com/2017/11/01/fire-alarm-voice-evacuation/">Fire Alarm / Voice Evacuation</a> first appeared on <a href="https://modernedgetechnologies.com">Modern Edge Technologies</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Nurse Call Systems</title>
		<link>https://modernedgetechnologies.com/2017/10/01/nurse-call-systems/</link>
		
		<dc:creator><![CDATA[Admin]]></dc:creator>
		<pubDate>Sun, 01 Oct 2017 17:41:16 +0000</pubDate>
				<category><![CDATA[Nurse Call]]></category>
		<category><![CDATA[Structured Cabling]]></category>
		<category><![CDATA[Telecommunications]]></category>
		<category><![CDATA[Access Control Installation]]></category>
		<category><![CDATA[Asheville]]></category>
		<category><![CDATA[Charlotte]]></category>
		<category><![CDATA[Fayetteville]]></category>
		<category><![CDATA[Greensboro]]></category>
		<category><![CDATA[High Point]]></category>
		<category><![CDATA[NC]]></category>
		<category><![CDATA[North Carolina]]></category>
		<category><![CDATA[Nurse Call Installation]]></category>
		<category><![CDATA[Raleigh]]></category>
		<category><![CDATA[South Carolina]]></category>
		<category><![CDATA[Telecommunications Design & Installation]]></category>
		<category><![CDATA[Triad]]></category>
		<category><![CDATA[Winston Salem]]></category>
		<guid isPermaLink="false">https://modernedgetechnologies.com/?p=540</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>Modern Edge Technologies provides Nurse Call Solutions in the Triad NC and surrounding areas. Check out this nice video by Accu-Tech for TekTone&#8217;s Wonder management solution which Modern Edge Technologies can assist, support and install in your health care facility.</p>

		</div>
	</div>

	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>See our Services page for more information about <a href="https://modernedgetechnologies.com/products-services/nurse-call-systems/">Nurse Call Solutions</a>.</p>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_video_widget wpb_content_element vc_clearfix   vc_video-aspect-ratio-169 vc_video-el-width-100 vc_video-align-left" >
		<div class="wpb_wrapper">
			
			<div class="wpb_video_wrapper"><iframe title="Tek-CARE®700 Wander Management System" width="500" height="281" src="https://www.youtube.com/embed/3sACga0BJd8?start=16&feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe></div>
		</div>
	</div>

	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>The Tek-CARE<sup>®</sup>700 Wander Management System gives Alzheimer&#8217;s, dementia and other at-risk residents the ability to move freely about your facility while receiving the protection they need. It allows staff to easily manage residents who might otherwise wander off or stray into dangerous areas, without impeding the movement of staff and visitors.</p>
<p>Tek-CARE<sup>®</sup>700 provides resident ID, loiter and door-ajar monitoring, low tag battery and several more alerts. It runs on our proprietary Tek-BRIDGE<sup>®</sup> server, which can connect simultaneously to any TekTone<sup>®</sup> nurse call system and a variety of foreign systems, such as fire alarm and security systems.</p>

		</div>
	</div>
</div></div></div></div>
</div><p>The post <a href="https://modernedgetechnologies.com/2017/10/01/nurse-call-systems/">Nurse Call Systems</a> first appeared on <a href="https://modernedgetechnologies.com">Modern Edge Technologies</a>.</p>]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
