{"id":6143,"date":"2024-03-12T10:02:14","date_gmt":"2024-03-12T08:02:14","guid":{"rendered":"https:\/\/security-robotics.de\/?p=6143"},"modified":"2024-04-24T10:09:16","modified_gmt":"2024-04-24T08:09:16","slug":"application-scenarios","status":"publish","type":"post","link":"https:\/\/security-robotics.de\/en\/glossary\/application-scenarios","title":{"rendered":"Application scenarios"},"content":{"rendered":"\n<p><a rel=\"popover\" data-title=\"Application scenarios\" data-post-id=\"6143\" class=\"sr-glossary-link\" aria-label=\"Application scenarios\" href=\"https:\/\/security-robotics.de\/en\/glossary\/application-scenarios\">Application scenarios<\/a> are the various areas of application in which <a rel=\"popover\" data-title=\"robotics\" data-post-id=\"5878\" class=\"sr-glossary-link\" aria-label=\"Robotics\" href=\"https:\/\/security-robotics.de\/en\/glossary\/robotics\">robotics<\/a> solutions for security and surveillance can be used. This can include, for example, the monitoring of industrial plants, public places or critical infrastructures.<\/p>","protected":false},"excerpt":{"rendered":"<p>Application scenarios are the various areas of application in which robotics solutions for security and surveillance can be used. This can include, for example, the monitoring of industrial plants, public places or critical infrastructures.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[388],"tags":[534,535],"class_list":["post-6143","post","type-post","status-publish","format-standard","hentry","category-glossary","tag-application-scenarios","tag-operational-scenarios"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.1 (Yoast SEO v24.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Application scenarios - Security Robotics<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/security-robotics.de\/en\/glossary\/application-scenarios\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Application scenarios\" \/>\n<meta property=\"og:description\" content=\"Application scenarios are the various areas of application in which robotics solutions for security and surveillance can be used. This can include, for example, the monitoring of industrial plants, public places or critical infrastructures.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/security-robotics.de\/en\/glossary\/application-scenarios\" \/>\n<meta property=\"og:site_name\" content=\"Security Robotics\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-12T08:02:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-24T08:09:16+00:00\" \/>\n<meta name=\"author\" content=\"Michael Engel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Engel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/security-robotics.de\/en\/glossary\/application-scenarios\",\"url\":\"https:\/\/security-robotics.de\/en\/glossary\/application-scenarios\",\"name\":\"Application scenarios - Security Robotics\",\"isPartOf\":{\"@id\":\"https:\/\/security-robotics.de\/en#website\"},\"datePublished\":\"2024-03-12T08:02:14+00:00\",\"dateModified\":\"2024-04-24T08:09:16+00:00\",\"author\":{\"@id\":\"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56\"},\"breadcrumb\":{\"@id\":\"https:\/\/security-robotics.de\/en\/glossary\/application-scenarios#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/security-robotics.de\/en\/glossary\/application-scenarios\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/security-robotics.de\/en\/glossary\/application-scenarios#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/security-robotics.de\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Application scenarios\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/security-robotics.de\/en#website\",\"url\":\"https:\/\/security-robotics.de\/en\",\"name\":\"Security Robotics\",\"description\":\"Innovative Security-Roboter | \u00dcberwachung, Messung, Zutritt\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/security-robotics.de\/en?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56\",\"name\":\"Michael Engel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/security-robotics.de\/en#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g\",\"caption\":\"Michael Engel\"},\"url\":\"https:\/\/security-robotics.de\/en\/author\/m-engel\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Application scenarios - Security Robotics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/security-robotics.de\/en\/glossary\/application-scenarios","og_locale":"en_US","og_type":"article","og_title":"Application scenarios","og_description":"Application scenarios are the various areas of application in which robotics solutions for security and surveillance can be used. This can include, for example, the monitoring of industrial plants, public places or critical infrastructures.","og_url":"https:\/\/security-robotics.de\/en\/glossary\/application-scenarios","og_site_name":"Security Robotics","article_published_time":"2024-03-12T08:02:14+00:00","article_modified_time":"2024-04-24T08:09:16+00:00","author":"Michael Engel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Engel","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/security-robotics.de\/en\/glossary\/application-scenarios","url":"https:\/\/security-robotics.de\/en\/glossary\/application-scenarios","name":"Application scenarios - Security Robotics","isPartOf":{"@id":"https:\/\/security-robotics.de\/en#website"},"datePublished":"2024-03-12T08:02:14+00:00","dateModified":"2024-04-24T08:09:16+00:00","author":{"@id":"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56"},"breadcrumb":{"@id":"https:\/\/security-robotics.de\/en\/glossary\/application-scenarios#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/security-robotics.de\/en\/glossary\/application-scenarios"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/security-robotics.de\/en\/glossary\/application-scenarios#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/security-robotics.de\/en"},{"@type":"ListItem","position":2,"name":"Application scenarios"}]},{"@type":"WebSite","@id":"https:\/\/security-robotics.de\/en#website","url":"https:\/\/security-robotics.de\/en","name":"Security Robotics","description":"Innovative Security-Roboter | \u00dcberwachung, Messung, Zutritt","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/security-robotics.de\/en?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56","name":"Michael Engel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/security-robotics.de\/en#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g","caption":"Michael Engel"},"url":"https:\/\/security-robotics.de\/en\/author\/m-engel"}]}},"_links":{"self":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts\/6143","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/comments?post=6143"}],"version-history":[{"count":1,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts\/6143\/revisions"}],"predecessor-version":[{"id":6163,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts\/6143\/revisions\/6163"}],"wp:attachment":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/media?parent=6143"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/categories?post=6143"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/tags?post=6143"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}