Features

Clearfix
Wed
03
Jun
fvadmin's picture

High performance

VIDEO surveillance is in the midst of a revolution that will change the nature of CCTV. But while there’s a lot of talk about the technology and its benefits, it’s not always easy to pin down the facts. What percentage of systems installed are IP and which standards will prevail in the world of networked video? And just what are the keys to high performance?

More than that – just what is an IP camera? Is it a CMOS-based IP camera delivering 4CIF of H264 compressed video? Is it a CMOS HD camera working at 1020p? Is it a CMOS-based megapixel camera delivering a potential image of 16 Megapixels? Or a 3-sensor CMOS Megapixel camera giving an atmospheric view? Is an IP camera only a full digital camera or is it a network-enabled analog camera with an onboard encoder? Not surprisingly, the answers depend on who you talk to.

Read More
Tue
10
Mar
fvadmin's picture

Building a Cat-7 network

IF you need to handle video surveillance, video conferencing and VoIP without going to fibre the most practical and appropriate cabling solution is a Class F copper cabling solution. This sort of network meet all demands of a hungry network while providing the lowest risk for the customer and you as the installation company.

Class F cabling technology is capable of supporting all the known networking protocols including the forthcoming 10 gigabit Ethernet. A solid option would be the AMP NETCONNECT shielded twisted pair ACO solution. This Class F installation is a shielded balanced pair cabling system that is slowly gaining acceptance in the Australian market place as a future-proofed copper cabling solution.

Read More
Tue
10
Mar
fvadmin's picture

Understanding H.264 video compression

SO what is H.264 and what are the advantages and disadvantages of this new compression technology? Essentially, H.264 is a new video compression scheme which is set to become the worldwide digital video standard for consumer electronics and personal computers. H.264 has already been selected as a key compression scheme (codec) for the new optical disc formats, such as Blu-ray disc.

The intent of the H.264 standard project was to create a standard capable of providing good video quality at substantially lower bit rates than previous standards (e.g. half or less the bit rate of MPEG-2, H.263, or MPEG-4 Part 2), without increasing the complexity of design so much that it would be impractical or excessively expensive to implement.

Read More
Tue
10
Mar
fvadmin's picture

Voices in your head

YOUR customers go with VoIP because it’s inexpensive – very inexpensive compared to standard phone calls. Trouble is, sharing a space with VoIP can be a challenge for many alarm systems. The last thing you want is to install a solution that keeps dragging you half-way across town for constant tweaking.

VoIP is essentially a process where a phone is connected to the Internet via a VoIP adapter in the same way any computer gets connected. This adaptor imitates the way a switched phone line functions but uses the Internet as the calling path rather than the phone line itself. It’s confusing in a way because all this is going on across the same piece of copper. The key is to think of these different paths as being different frequencies on the same physical copper line, with each frequency having a different bandwidth and being modulated onto a different voltage.

Read More
Sat
21
Feb
fvadmin's picture

Secure security networks

A FUNCTIONAL security solution depends on a series of layers whether you’re dealing with physical or logical security issues. You need walls and gates, well-lit places where attacks are obvious, gatehouses where incoming traffic can be checked and access controlled doors driven by an up-to-date access database. You also need intrusion alarms alerting of unauthorized entry and a surveillance system that lets you oversee what’s happening on the network.

You will need high security locations on a network just as you do in physical sites where there may be a systems room, a bond store or a security control room. And finally you’ll need a response and management team with a clearly defined chain of command. Think about the security of your networked security devices in this way and you won’t go wrong.

Read More
Thu
19
Feb
fvadmin's picture

Disaster recover and fault tolerance

SOME manufacturers may claim that off-the-shelf computer products are as reliable as the best proprietary DVR solutions but this is not the case. Most computer systems operate in an environment that does not demand perfect operation and there is less emphasis on reliability and onboard redundancy.

Better DVRs are custom-built for their role with powerful streaming capabilities, bulletproof operating systems, multiple ports and either mirrored HDDs or onboard RAID storage. They also have the ability to support multiple monitors and analogue CCTV cameras. As part of your disaster recovery plans you need to think hard about which type of solution will greatest reliability.

Read More
Sun
16
Jul
fvadmin's picture

Feel The Motion

SafePods for Internet Explorer is a pending patented technology that is not an anti-virus tool, not a firewall, not an anti- spyware tool, and does not ask the user any security questions. "We wanted to create a real, out of the box solution, one that would allow users to be secured, be free and manage less. This is what SafePods for Internet Explorer is all about," explained Mark Wright, chief engineer of Computers In Motion. "It passively terminates commercial espionage, Trojan horses, spyware, viruses, etc - In fact it makes them all irrelevant, while the organization doesn't lose its connectivity, productivity yet reduces its TCO." Operating SafePods for Internet Explorer is simple and effective, the technology is designed to support an "install-and-forget" working mode, hence there are no configuration requirements, and there is no need to manage SafePods for Internet Explorer.

Read More
Sun
27
Nov
fvadmin's picture

Intel Doubles Stand Size At Secutech Show

To show its determination in the digital surveillance arena, Intel has double expanded its exhibition area from 54 sq.m. to of 108 sq.m. at Asia's leading ninth annual SecuTech Expo for its twelve software design and CCTV manufacturer partners from Taiwan. Intel's presence at SecuTech Expo 2006 has proven IT market in digital surveillance area has grown raptly with opportunities. In addition to exhibiting, Intel is the keynote speaker at GDSF 2006. Intel is in the plan to overview the network technologies applied to digital surveillance, along with the development outlook on the application intelligent of IP.

Read More
Wed
22
Jun
fvadmin's picture

Internal Attacks Dog Banks

About 35 per cent of respondents confirmed encountering attacks from inside their organization within the last 12 months (up from 14 percent in 2004) compared to 26 percent from external sources (up from 23 percent in 2004).

The third annual Global Security Survey acts as global benchmark for DTT and its member firms for the state of IT security in the financial sector and consisted of interviews with senior security officers from the world's top 100 global financial institutions.

Phishing and pharming (luring people to disclose sensitive information by using bogus emails and websites) are two new additions to the top security threats financial institutions faced in the past year, underscoring the human factor as a new and growing weakness in the security chain.

Read More
Wed
08
Jun
fvadmin's picture

Five Most Hyped It Security Threats Revealed

The 5 threats include:

Read More

Pages