{"id":1715,"date":"2021-05-20T15:09:42","date_gmt":"2021-05-20T13:09:42","guid":{"rendered":"https:\/\/www.sctinformatica.it\/progetti\/protezioni-perimetrali\/"},"modified":"2021-06-03T14:53:42","modified_gmt":"2021-06-03T12:53:42","slug":"perimeter-protections","status":"publish","type":"software","link":"https:\/\/www.sctinformatica.it\/en\/projects\/perimeter-protections\/","title":{"rendered":"Perimeter Protections"},"content":{"rendered":"<section class=\"title-text-section\">\n\t<div class=\"container\">\n\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-12\">\n\t\t\t\t\t\t\t\t\t\t<p>The program, integrated in CAD, takes care of the Design, preparation and simple budgeting of <strong>perimeter protections<\/strong>.<\/p>\n<p>The software provides the operator with drawing software tools to design modular fences made up of panels, posts, doors and other accessory elements such as screws, brackets and locks that can be selected from a library.<\/p>\n<p>The design system makes use of internal automatic logics and guided manual commands for the construction of the various elements, uses easy editing functions to finalize the project and exploits all the graphic potential of Autocad to complete the technical presentation of the drawings.<\/p>\n<p>Allows you to automatically extract:<\/p>\n<ul>\n<li> The 2D dimensioned layout <\/li>\n<li> The 3D layout <\/li>\n<li> the list of drawn articles <\/li>\n<li> the quote <\/li>\n<li> STEP file <\/li>\n<li> PDF3D file <\/li>\n<\/ul>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n<section class=\"gallery-list-block-section\">\n\t<div class=\"container small-gutter\">\n\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t<div class=\"col-12 col-lg-3\">\n\t\t\t\t<picture class=\"gallerylink\"><a href=\"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/rs_image029-1.jpg\" data-pswp-width=\"780\" data-pswp-height=\"1024\"><img decoding=\"async\" src=\"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/rs_image029-1.jpg\" alt=\"Protezioni Perimetrali\"><\/picture><\/a>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"col-12 col-lg-3\">\n\t\t\t\t<picture class=\"gallerylink\"><a href=\"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/rs_image030-1.jpg\" data-pswp-width=\"501\" data-pswp-height=\"1024\"><img decoding=\"async\" src=\"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/rs_image030-1.jpg\" alt=\"Protezioni Perimetrali\"><\/picture><\/a>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"col-12 col-lg-3\">\n\t\t\t\t<picture class=\"gallerylink\"><a href=\"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/rs_protezioni1-1.png\" data-pswp-width=\"980\" data-pswp-height=\"663\"><img decoding=\"async\" src=\"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/rs_protezioni1-1.png\" alt=\"Protezioni Perimetrali\"><\/picture><\/a>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"col-12 col-lg-3\">\n\t\t\t\t<picture class=\"gallerylink\"><a href=\"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/rs_protezioni2-1.png\" data-pswp-width=\"980\" data-pswp-height=\"443\"><img decoding=\"async\" src=\"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/rs_protezioni2-1.png\" alt=\"Protezioni Perimetrali\"><\/picture><\/a>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"col-12 col-lg-3\">\n\t\t\t\t<picture class=\"gallerylink\"><a href=\"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/rs_protezioni3-1.png\" data-pswp-width=\"980\" data-pswp-height=\"960\"><img decoding=\"async\" src=\"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/rs_protezioni3-1.png\" alt=\"Protezioni Perimetrali\"><\/picture><\/a>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"col-12 col-lg-3\">\n\t\t\t\t<picture class=\"gallerylink\"><a href=\"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/rs_protezioni4-1.png\" data-pswp-width=\"980\" data-pswp-height=\"344\"><img decoding=\"async\" src=\"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/rs_protezioni4-1.png\" alt=\"Protezioni Perimetrali\"><\/picture><\/a>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"col-12 col-lg-3\">\n\t\t\t\t<picture class=\"gallerylink\"><a href=\"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/rs_protezioni5-1.png\" data-pswp-width=\"980\" data-pswp-height=\"145\"><img decoding=\"async\" src=\"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/rs_protezioni5-1.png\" alt=\"Protezioni Perimetrali\"><\/picture><\/a>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"col-12 col-lg-3\">\n\t\t\t\t<picture class=\"gallerylink\"><a href=\"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/rs_protezioni6-1.png\" data-pswp-width=\"980\" data-pswp-height=\"164\"><img decoding=\"async\" src=\"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/rs_protezioni6-1.png\" alt=\"Protezioni Perimetrali\"><\/picture><\/a>\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t<\/div>\n<\/section>\n\n<script type=\"module\">\n\/\/ Include Lightbox\nimport PhotoSwipeLightbox from 'https:\/\/www.sctinformatica.it\/wp-content\/themes\/sct\/library\/js\/vendor\/photoswipe-lightbox.esm.min.js';\n\nconst lightbox = new PhotoSwipeLightbox({\n    gallerySelector: '.gallery-list-block-section',\n\t  childSelector: 'a',\n\t  pswpModule: 'https:\/\/www.sctinformatica.it\/wp-content\/themes\/sct\/library\/js\/vendor\/photoswipe.esm.min.js',\n\t});\nlightbox.init();\n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>The program, integrated in CAD, takes care of the design, preparation and simple budgeting of perimeter protections.<\/p>\n","protected":false},"featured_media":1408,"parent":0,"template":"","class_list":["post-1715","software","type-software","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Perimeter Protections | SCT CAD Solutions<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sctinformatica.it\/en\/projects\/perimeter-protections\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Perimeter Protections | SCT CAD Solutions\" \/>\n<meta property=\"og:description\" content=\"The program, integrated in CAD, takes care of the design, preparation and simple budgeting of perimeter protections.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sctinformatica.it\/en\/projects\/perimeter-protections\/\" \/>\n<meta property=\"og:site_name\" content=\"SCT CAD Solutions\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-03T12:53:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/rs_image029-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"980\" \/>\n\t<meta property=\"og:image:height\" content=\"1286\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sctinformatica.it\/en\/projects\/perimeter-protections\/\",\"url\":\"https:\/\/www.sctinformatica.it\/en\/projects\/perimeter-protections\/\",\"name\":\"Perimeter Protections | SCT CAD Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/www.sctinformatica.it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sctinformatica.it\/en\/projects\/perimeter-protections\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sctinformatica.it\/en\/projects\/perimeter-protections\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/rs_image029-1.jpg\",\"datePublished\":\"2021-05-20T13:09:42+00:00\",\"dateModified\":\"2021-06-03T12:53:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sctinformatica.it\/en\/projects\/perimeter-protections\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sctinformatica.it\/en\/projects\/perimeter-protections\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sctinformatica.it\/en\/projects\/perimeter-protections\/#primaryimage\",\"url\":\"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/rs_image029-1.jpg\",\"contentUrl\":\"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/rs_image029-1.jpg\",\"width\":980,\"height\":1286,\"caption\":\"Protezioni Perimetrali\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sctinformatica.it\/en\/projects\/perimeter-protections\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sctinformatica.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Projects\",\"item\":\"https:\/\/www.sctinformatica.it\/en\/projects\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Perimeter Protections\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sctinformatica.it\/#website\",\"url\":\"https:\/\/www.sctinformatica.it\/\",\"name\":\"SCT CAD Solutions\",\"description\":\"Soluzioni software per la progettazione, l&#039;ingegneria e la produzione\",\"publisher\":{\"@id\":\"https:\/\/www.sctinformatica.it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sctinformatica.it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.sctinformatica.it\/#organization\",\"name\":\"SCT Informatica Srl\",\"url\":\"https:\/\/www.sctinformatica.it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sctinformatica.it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/logo-sct-cad-solutions-black.png\",\"contentUrl\":\"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/logo-sct-cad-solutions-black.png\",\"width\":382,\"height\":176,\"caption\":\"SCT Informatica Srl\"},\"image\":{\"@id\":\"https:\/\/www.sctinformatica.it\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Perimeter Protections | SCT CAD Solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sctinformatica.it\/en\/projects\/perimeter-protections\/","og_locale":"en_US","og_type":"article","og_title":"Perimeter Protections | SCT CAD Solutions","og_description":"The program, integrated in CAD, takes care of the design, preparation and simple budgeting of perimeter protections.","og_url":"https:\/\/www.sctinformatica.it\/en\/projects\/perimeter-protections\/","og_site_name":"SCT CAD Solutions","article_modified_time":"2021-06-03T12:53:42+00:00","og_image":[{"width":980,"height":1286,"url":"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/rs_image029-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.sctinformatica.it\/en\/projects\/perimeter-protections\/","url":"https:\/\/www.sctinformatica.it\/en\/projects\/perimeter-protections\/","name":"Perimeter Protections | SCT CAD Solutions","isPartOf":{"@id":"https:\/\/www.sctinformatica.it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sctinformatica.it\/en\/projects\/perimeter-protections\/#primaryimage"},"image":{"@id":"https:\/\/www.sctinformatica.it\/en\/projects\/perimeter-protections\/#primaryimage"},"thumbnailUrl":"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/rs_image029-1.jpg","datePublished":"2021-05-20T13:09:42+00:00","dateModified":"2021-06-03T12:53:42+00:00","breadcrumb":{"@id":"https:\/\/www.sctinformatica.it\/en\/projects\/perimeter-protections\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sctinformatica.it\/en\/projects\/perimeter-protections\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sctinformatica.it\/en\/projects\/perimeter-protections\/#primaryimage","url":"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/rs_image029-1.jpg","contentUrl":"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/rs_image029-1.jpg","width":980,"height":1286,"caption":"Protezioni Perimetrali"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sctinformatica.it\/en\/projects\/perimeter-protections\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sctinformatica.it\/en\/"},{"@type":"ListItem","position":2,"name":"Projects","item":"https:\/\/www.sctinformatica.it\/en\/projects\/"},{"@type":"ListItem","position":3,"name":"Perimeter Protections"}]},{"@type":"WebSite","@id":"https:\/\/www.sctinformatica.it\/#website","url":"https:\/\/www.sctinformatica.it\/","name":"SCT CAD Solutions","description":"Soluzioni software per la progettazione, l&#039;ingegneria e la produzione","publisher":{"@id":"https:\/\/www.sctinformatica.it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sctinformatica.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.sctinformatica.it\/#organization","name":"SCT Informatica Srl","url":"https:\/\/www.sctinformatica.it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sctinformatica.it\/#\/schema\/logo\/image\/","url":"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/logo-sct-cad-solutions-black.png","contentUrl":"https:\/\/www.sctinformatica.it\/wp-content\/uploads\/2021\/05\/logo-sct-cad-solutions-black.png","width":382,"height":176,"caption":"SCT Informatica Srl"},"image":{"@id":"https:\/\/www.sctinformatica.it\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.sctinformatica.it\/en\/wp-json\/wp\/v2\/software\/1715","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sctinformatica.it\/en\/wp-json\/wp\/v2\/software"}],"about":[{"href":"https:\/\/www.sctinformatica.it\/en\/wp-json\/wp\/v2\/types\/software"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sctinformatica.it\/en\/wp-json\/wp\/v2\/media\/1408"}],"wp:attachment":[{"href":"https:\/\/www.sctinformatica.it\/en\/wp-json\/wp\/v2\/media?parent=1715"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}