• Login
  • Sign Up
Member Area
  • Login
  • Sign Up
 English
    • Afrikaans formal
    • Afrikaans informal
    • Arabic
    • Azerbaijan
    • Brazilian
    • Bulgarian
    • Catalan
    • Chinese simplified
    • Chinese traditional
    • Croatian
    • Czech
    • Danish
    • Dutch
    • English
    • Estonian
    • Finnish
    • French
    • Georgian
    • German
    • Greek
    • Hebrew
    • Hungarian
    • Icelandic
    • Indonesian
    • Italian
    • Japanese
    • Latvian
    • Lithuanian
    • Malaysian
    • Norwegian
    • Persian
    • Polish
    • Portuguese
    • Romanian
    • Russian
    • Serbian
    • Slovakian
    • Slovenian
    • Spanish
    • Swedish
    • Thai
    • Turkish
    • Ukrainian
    • Vietnamese
VideotonStock
Your Shopping Cart is empty.
  • Files

    Stock

    • Photo
    • Video

    Special offer

    • Collections
    • Packages
    • Lightboxes

    Licenses

    • Royalty free
    • Rights managed
    • Creative
    • Editorial

    Items

    • Most downloaded
    • Featured
    • Most popular
    • New
    • Free
  • Categories

    Browse categories

  • Site info

    Site info

    • About
    • Support
    • Privacy Policy
    • Privacy Policy
    • FAQ
    • Contact Us
    • Contact Us
    • Terms and Conditions
    • Buyer Agreement
    • Seller Agreement

    Customers

    • Users
    • Credits

    Photographers

    • Boby Richards   0
    • Boby Richards   0
    • Videoton1   286
Search
Keywords:
Creator ID:
Type:
Categories:
Languages:
Orientation:
Color:
Model property release:
Duration Video:

Results (0)

 Auto paging
 Menu
Fully automated pantyhose knitting machine with a yarn break detection system for quality control in a hosiery line
Fully automated pantyhose knitting machine with a yarn break detection system for quality control in a hosiery line

Facial recognition technology scan and detect people face for identification in crowded places. IOT CCTV, security camera motion detection system recognizes and identifies people using big data and AI
Facial recognition technology scan and detect people face for identification in crowded places. IOT CCTV, security camera motion detection system recognizes and identifies people using big data and AI

Cyber Threat Intelligence Concept - 3D Illustration
Cyber Threat Intelligence Concept - 3D Illustration

Thermal camera used for maintenance service in oil and gas industry detects heat leaks and ensures safety in industrial operations
Thermal camera used for maintenance service in oil and gas industry detects heat leaks and ensures safety in industrial operations

Research lab developing AI-powered tools for early disease detection
Research lab developing AI-powered tools for early disease detection

radar detection icon Thin line illustration
radar detection icon Thin line illustration

Technician checking plumbing pipes for leakage under a newly built house. Featuring plumbing inspections and leak detection
Technician checking plumbing pipes for leakage under a newly built house. Featuring plumbing inspections and leak detection

Colorful seismograph data pattern for earthquake detection technology
Colorful seismograph data pattern for earthquake detection technology

Leak Detection Icon Outline
Leak Detection Icon Outline

solid icon isolated silence detection algorithm silence soundproof panel silence noise meter silence sensor threshold silence mode switch silence period waveform
solid icon isolated silence detection algorithm silence soundproof panel silence noise meter silence sensor threshold silence mode switch silence period waveform

Find the code bug. Error detection. Troubleshooting. Debugging, testing and code review. Programming. Fault or glitch that causes software to malfunction. Determine the cause of equipment failure.
Find the code bug. Error detection. Troubleshooting. Debugging, testing and code review. Programming. Fault or glitch that causes software to malfunction. Determine the cause of equipment failure.

A realtime threat detection system that utilizes machine learning and AI to continuously learn and adapt to emerging threats staying one step ahead of potential hackers. .
A realtime threat detection system that utilizes machine learning and AI to continuously learn and adapt to emerging threats staying one step ahead of potential hackers. .

Intrusion detection system alerting suspicious network activity
Intrusion detection system alerting suspicious network activity

Blue light Radar or Sonar detection unknown target. Green radar vector
Blue light Radar or Sonar detection unknown target. Green radar vector

Incident Management Icon Set Collection. Containing Measurement, Procedure, Risk Management, Evaluation, Prepared, Response, Investigation, Evacuation, Communication. Simple Blue Vector Illustration.
Incident Management Icon Set Collection. Containing Measurement, Procedure, Risk Management, Evaluation, Prepared, Response, Investigation, Evacuation, Communication. Simple Blue Vector Illustration.

Satellite Using Laser Technology on the Moon Surface for Research and Exploration in Outer Space
Satellite Using Laser Technology on the Moon Surface for Research and Exploration in Outer Space

Wireless sensor signal or network connection sign with neon glow. Vector isolated digital radar or sonar, sound wave of round shape. Wifi technology, monitoring and electronic protection
Wireless sensor signal or network connection sign with neon glow. Vector isolated digital radar or sonar, sound wave of round shape. Wifi technology, monitoring and electronic protection

fraud detection glyph gradient icon
fraud detection glyph gradient icon

Quantum Smuggling Ring: Criminal network exploiting quantum entanglement to transport illegal goods across dimensions, evading traditional detection methods
Quantum Smuggling Ring: Criminal network exploiting quantum entanglement to transport illegal goods across dimensions, evading traditional detection methods

Deep fake and AI deepfake. Theft or fraud video. Face recognition and photo detection with artificial intelligence. Machine learning and computer id analysis system technology.
Deep fake and AI deepfake. Theft or fraud video. Face recognition and photo detection with artificial intelligence. Machine learning and computer id analysis system technology.

Rail flaw detection vehicle with magnetic induction coils and warning decals
Rail flaw detection vehicle with magnetic induction coils and warning decals

Pipeline technician performing leak detection on pipeline equipment. Featuring leak detection
Pipeline technician performing leak detection on pipeline equipment. Featuring leak detection

System hacked warning alert. Person use laptop with virtual warning sign for cyber attack. Ransomware, Virus, Spyware, Malware or Malicious software, Data breach, Cyber security and cybercrime.
System hacked warning alert. Person use laptop with virtual warning sign for cyber attack. Ransomware, Virus, Spyware, Malware or Malicious software, Data breach, Cyber security and cybercrime.

Futuristic AI assisted cancer detection system analyzing complex medical scans
Futuristic AI assisted cancer detection system analyzing complex medical scans

Melanois
Melanois

home surveillance with motion detection systems and technology. PIR Passive Infrared motion sensors detecting body heat for precise movement tracking
home surveillance with motion detection systems and technology. PIR Passive Infrared motion sensors detecting body heat for precise movement tracking

CCTV shot with visual effects identifying people and objects on private property, business colleagues walking and talking in courtyard during lunch break
CCTV shot with visual effects identifying people and objects on private property, business colleagues walking and talking in courtyard during lunch break

Error detection and troubleshooting of system development or coding. Event logging for system monitoring and debugging. System engineer troubleshooting computer network system issues.
Error detection and troubleshooting of system development or coding. Event logging for system monitoring and debugging. System engineer troubleshooting computer network system issues.

Healthcare engineer applying AI for predictive diagnostics in cancer research labs, high-tech medical lab with AI systems analyzing patient data for early detection of cancer, Scientific style
Healthcare engineer applying AI for predictive diagnostics in cancer research labs, high-tech medical lab with AI systems analyzing patient data for early detection of cancer, Scientific style

A digital representation water pipeline incorporating AI ML IoT smart leak detection highlighting advanced technology water management maintenance efficient resource use
A digital representation water pipeline incorporating AI ML IoT smart leak detection highlighting advanced technology water management maintenance efficient resource use

Carbon monoxide detection in a cozy bedroom setting. Featuring awareness and comfort
Carbon monoxide detection in a cozy bedroom setting. Featuring awareness and comfort

Enhance cybersecurity through effective threat monitoring techniques for detection and prevention
Enhance cybersecurity through effective threat monitoring techniques for detection and prevention

Modern Smoke Detector Installed On Office Ceiling, Ensuring Safety and Security in the Workplace
Modern Smoke Detector Installed On Office Ceiling, Ensuring Safety and Security in the Workplace

A cybersecurity professional surrounded by holographic threat detection icons and protective digital walls
A cybersecurity professional surrounded by holographic threat detection icons and protective digital walls

AI-driven fraud detection systems in China strengthen financial security and risk management.
AI-driven fraud detection systems in China strengthen financial security and risk management.

A high-tech holographic counterfeit detection system scanning a glowing digital banknote, identifying flaws in a cyber-security environment
A high-tech holographic counterfeit detection system scanning a glowing digital banknote, identifying flaws in a cyber-security environment

Maintaining Safety Measures At An Industrial Site: Technician Utilizes Gas Leak Detector For Inspection
Maintaining Safety Measures At An Industrial Site: Technician Utilizes Gas Leak Detector For Inspection

red binary numbers falling matrix corrupted data with hazard sign to warning or danger about cyber attack or hacking network
red binary numbers falling matrix corrupted data with hazard sign to warning or danger about cyber attack or hacking network

detection icon isolated in white and black colors. detection outline vector icon from artificial intellegence collection for web, mobile apps and ui.
detection icon isolated in white and black colors. detection outline vector icon from artificial intellegence collection for web, mobile apps and ui.

radar detection icon vector logo set collection for web app ui
radar detection icon vector logo set collection for web app ui

Hand holding magnifying glass, security engineer identifying data security vulnerabilities in internet network, unlocked padlock icon and many more locked padlock icons.
Hand holding magnifying glass, security engineer identifying data security vulnerabilities in internet network, unlocked padlock icon and many more locked padlock icons.

Cholesterol test in a healthcare setting. Featuring heart health checks and early detection
Cholesterol test in a healthcare setting. Featuring heart health checks and early detection

Thief alert in a home appliance store, employees noticing unusual behavior. Featuring swift detection and store protection
Thief alert in a home appliance store, employees noticing unusual behavior. Featuring swift detection and store protection

A cybersecurity expert in a dark room, surrounded by multiple screens showing AI-driven threat detection systems, as they defend a network against cyberattacks in real-time
A cybersecurity expert in a dark room, surrounded by multiple screens showing AI-driven threat detection systems, as they defend a network against cyberattacks in real-time

Digital transformation AI cybersecurity concept. A close-up of AI-powered malware detection software scanning files on a laptop
Digital transformation AI cybersecurity concept. A close-up of AI-powered malware detection software scanning files on a laptop

Chemical substance content detection experimental equipment
Chemical substance content detection experimental equipment

remote health prevention services. Preventive Oncology Services Using remote diagnostics and risk assessments for early cancer detection
remote health prevention services. Preventive Oncology Services Using remote diagnostics and risk assessments for early cancer detection

Dark background with a digital firewall barrier blocking red data attacks, concept of intrusion detection system and cyber defense mechanism
Dark background with a digital firewall barrier blocking red data attacks, concept of intrusion detection system and cyber defense mechanism

Smart watch detection arrythmia electrocardiography atrial fibrillation heart attack prevention monitor device technology concept
Smart watch detection arrythmia electrocardiography atrial fibrillation heart attack prevention monitor device technology concept

Error Detection in Verified Systems  Key Concepts
Error Detection in Verified Systems Key Concepts

plumbing leak detection
plumbing leak detection

Privacy Control Through Video Surveillance
Privacy Control Through Video Surveillance

Scientist working with radioactivity wearing protective suit
Scientist working with radioactivity wearing protective suit

Inductive sensor with a non-flush design and LED status light for object detection in a textile mill.
Inductive sensor with a non-flush design and LED status light for object detection in a textile mill.

5g powered IoT flood detection network providing real time emergency update
5g powered IoT flood detection network providing real time emergency update

Abstract representation of insurance fraud detection with investigative elements like magnifying glasses and documents.
Abstract representation of insurance fraud detection with investigative elements like magnifying glasses and documents.

Fire detection switch on wall
Fire detection switch on wall

Using digital radar to map terrain, communication technology concept
Using digital radar to map terrain, communication technology concept

Geometric face outline symbolizing biometric facial recognition technology.
Geometric face outline symbolizing biometric facial recognition technology.

Top view of two cars using advanced driver-assistance system with radar detection on a road, visualizing autonomous vehicle technology and safe driving distance.
Top view of two cars using advanced driver-assistance system with radar detection on a road, visualizing autonomous vehicle technology and safe driving distance.

HeroRat Training in Cambodia
HeroRat Training in Cambodia

Intrusion detection Icon
Intrusion detection Icon

Heat detection in an outdoor setting to monitor fire risks. Featuring environmental safety and precision
Heat detection in an outdoor setting to monitor fire risks. Featuring environmental safety and precision

A futuristic digital representation of a water pipeline incorporating advanced technologies like AI, ML, and IoT for smart leak detection and sustainable management.
A futuristic digital representation of a water pipeline incorporating advanced technologies like AI, ML, and IoT for smart leak detection and sustainable management.

A radiation detection specialist using a Geiger counter in a nuclear facility, measuring radiation levels and safety data
A radiation detection specialist using a Geiger counter in a nuclear facility, measuring radiation levels and safety data

An AI powered system improving water conservation by analyzing consumption patterns, AI-assisted resource optimization, and real-time leak detection for more sustainable water usage
An AI powered system improving water conservation by analyzing consumption patterns, AI-assisted resource optimization, and real-time leak detection for more sustainable water usage

face detection icon with white background vector stock illustration
face detection icon with white background vector stock illustration

A cross section of dark matter interacting with normal matter showing gravitational effects using theoretical detection camera
A cross section of dark matter interacting with normal matter showing gravitational effects using theoretical detection camera

Businessman using AI technology for cybersecurity enhances threat detection and response capabilities
Businessman using AI technology for cybersecurity enhances threat detection and response capabilities

virus detection scans laptop malware bugs triggering antivirus alerts flat cartoon vector icons digital emergency
virus detection scans laptop malware bugs triggering antivirus alerts flat cartoon vector icons digital emergency

digital blue exclamation mark icon with glowing data streams, ai in alert systems, anomaly detection algorithms, emergency response coordination
digital blue exclamation mark icon with glowing data streams, ai in alert systems, anomaly detection algorithms, emergency response coordination

Incident Management Icon Set Collection. Containing Measurement, Procedure, Risk Management, Evaluation, Prepared, Response, Investigation, Evacuation, Communication. Simple Line Vector Illustration.
Incident Management Icon Set Collection. Containing Measurement, Procedure, Risk Management, Evaluation, Prepared, Response, Investigation, Evacuation, Communication. Simple Line Vector Illustration.

Opportunity detection icon Flat fill set collection
Opportunity detection icon Flat fill set collection

AI in fraud detection
AI in fraud detection

Futuristic AI Powered Pipeline Leak Detection and Monitoring System for Efficient Underground Infrastructure Management and Optimization
Futuristic AI Powered Pipeline Leak Detection and Monitoring System for Efficient Underground Infrastructure Management and Optimization

Thief alert in a car dealership with security staff monitoring the lot. Featuring immediate detection and response
Thief alert in a car dealership with security staff monitoring the lot. Featuring immediate detection and response

Line style icons of cybersecurity and privacy: intrusion detection icon, monitoring alert badge, unauthorized access screen, IDS panel layout, suspicious activity graph, threat signal card, detection
Line style icons of cybersecurity and privacy: intrusion detection icon, monitoring alert badge, unauthorized access screen, IDS panel layout, suspicious activity graph, threat signal card, detection

Mobile security icon with lock overlays phone screen with threat detection layers and signal protection.
Mobile security icon with lock overlays phone screen with threat detection layers and signal protection.

An AI-equipped camera scans circuit boards, triggering a red “Defect detected” alert on a monitor. Concept of automated quality control.
An AI-equipped camera scans circuit boards, triggering a red “Defect detected” alert on a monitor. Concept of automated quality control.

Carbon monoxide detector on a wall near a gas fireplace. Featuring detection and prevention
Carbon monoxide detector on a wall near a gas fireplace. Featuring detection and prevention

A stylized diagram of Earth showing gravitational wave signals being picked up by global detection stations
A stylized diagram of Earth showing gravitational wave signals being picked up by global detection stations

4K Aerial surveillance of city intersection with AI detection boxes, cyber HUD interface, pixel glitch effects and CRT-style distortion, motion graphics overlay, screen mode, urban monitoring system
4K Aerial surveillance of city intersection with AI detection boxes, cyber HUD interface, pixel glitch effects and CRT-style distortion, motion graphics overlay, screen mode, urban monitoring system

Arduino Sensor Module   gyroscope touch soil ultrasonic IR microcontroller sensor interface plc industrial component isometric Isolated vector illustration cartoon
Arduino Sensor Module gyroscope touch soil ultrasonic IR microcontroller sensor interface plc industrial component isometric Isolated vector illustration cartoon

Advanced gas leak detection sensors with digital displays are installed in a natural gas facility, showcasing industrial safety and modern monitoring technology
Advanced gas leak detection sensors with digital displays are installed in a natural gas facility, showcasing industrial safety and modern monitoring technology

Businessman using smartphone touch microphone button on virtual screen. Blog blog speak talk advertising presentation,Voice recognition, speech detection and deep learning application,Voice Assistance
Businessman using smartphone touch microphone button on virtual screen. Blog blog speak talk advertising presentation,Voice recognition, speech detection and deep learning application,Voice Assistance

An AI powered system enhancing cybersecurity incident response by analyzing system vulnerabilities, attack signatures, and network traffic to provide proactive security measures
An AI powered system enhancing cybersecurity incident response by analyzing system vulnerabilities, attack signatures, and network traffic to provide proactive security measures

Man working in a greenhouse during seeding
Man working in a greenhouse during seeding

protocol conflict detection in smart network system, ai resolving real time packet loss with diagnostic overlays
protocol conflict detection in smart network system, ai resolving real time packet loss with diagnostic overlays

Heat detection for inspecting fire safety systems in offices. Featuring diagnostics and safety checks
Heat detection for inspecting fire safety systems in offices. Featuring diagnostics and safety checks

Hightech cancer detection lab
Hightech cancer detection lab

straight perfect stroke icon mono icons style isolated warning panel signpost arrow decoder ring pattern chart detection camera langua
straight perfect stroke icon mono icons style isolated warning panel signpost arrow decoder ring pattern chart detection camera langua

Healthcare for mental health disorders featuring therapy apps, telehealth access, medication tools, support programs, and early detection solutions for improved outcomes.
Healthcare for mental health disorders featuring therapy apps, telehealth access, medication tools, support programs, and early detection solutions for improved outcomes.

Security camera view motion detection system recognizes identifies people with big data and AI. Facial recognition technology scan detect people face for identification in crowded places. IOT CCTV10
Security camera view motion detection system recognizes identifies people with big data and AI. Facial recognition technology scan detect people face for identification in crowded places. IOT CCTV10

City monitoring with computer vision system recognizing objects and faces to identify threats and intelligently control traffic
City monitoring with computer vision system recognizing objects and faces to identify threats and intelligently control traffic

Autonomous drone flying over cityscape, utilizing computer vision technology for navigation and object detection
Autonomous drone flying over cityscape, utilizing computer vision technology for navigation and object detection

A closeup of an AI camera system designed for material recognition revealing a lens focused on a mixed pile of waste with LEDs illuminating the area to enhance object detection accuracy.
A closeup of an AI camera system designed for material recognition revealing a lens focused on a mixed pile of waste with LEDs illuminating the area to enhance object detection accuracy.

A digital representation water pipeline incorporating AI ML IoT smart leak detection highlighting advanced technology water management maintenance efficient resource use
A digital representation water pipeline incorporating AI ML IoT smart leak detection highlighting advanced technology water management maintenance efficient resource use

Contemporary artistic collage depicting hands holding binoculars against isolated on transparent or white background with space for text
Contemporary artistic collage depicting hands holding binoculars against isolated on transparent or white background with space for text

Plumber repairing a leaking pipe in a basement. Featuring plumbing repairs and leak detection
Plumber repairing a leaking pipe in a basement. Featuring plumbing repairs and leak detection

anomaly detection system powered by ai, machine learning scanning cloud drives and glowing hot zones of security breaches.
anomaly detection system powered by ai, machine learning scanning cloud drives and glowing hot zones of security breaches.

  • Home
  • About
  • Support
  • Privacy Policy
  • News

Copyright © 2022 Videoton Media Stock