Wednesday, February 26, 2014

P2P Networking – the fast way to connect camera

A Peer to Peer network (often shortened to P2P) is a connection process where two or more IP Camera / DVR/ NVR / PCs connected to each other can share resources , peripherals as equals  without the need of a central dedicated server.

It is a distributed application architecture that divides tasks / workloads among Peers. Peers refer to the workstations connected to the P2P network which are participants in the application and which are all equally able to perform any function necessary for the network. A computer connected to this network is called a node.


The reason for the popularity of a P2P network is that it can be set up anywhere- Homes, offices, online business etc. The only requirement is that all the participants of the network should be using the same or a compatible program, (client), to connect to each other.

The first P2P app was Napster, released in 1999.

Basic overview
In a P2P network each node is essentially a client as well as a server, thereby eliminating the need for special high performance machines to act as servers. Accessing files is basically governed by the user setting different sharing permissions on their own machines.

Advantages
Due to the inherent characteristic of P2P networks it is the clients who are responsible for providing network resources such as bandwidth, system power, and storage. This feature is tremendously useful to original content distributors, because it reduces the setup as well as running costs very small.

Due to the decentralized nature of the network, if one peer  ceases to function properly, it does not affect the whole network. As long as there is even one properly functioning PC, the network will be alive.

Also important to note is the lack of a system administrator or a central authority. This leads to a more efficient and stable network owing to lack of a full staff needed to ensure smooth running.

Weaknesses
Just like any kind of file sharing system, users are vulnerable to malicious attacks from harmful content that may allow remote access to the user’s PC. This can even affect the whole network.

Network Security
For one thing, sharing files with random strangers on the internet does call for some sort of caution. It is recommended that you at least have a firewall or an antivirus scanning each of your downloads to protect against potential backdoors and malware. Another way would be to just use trusted sources.
P2P networks represent one of the most important issues in the ongoing controversy of network neutrality. Internet Service Providers have been known to cut off P2P file sharing traffic on account of its high bandwidth usage.


But still we can expect this form of networking to only grow and grow more for its pros far outweigh its cons.

So P2P is a standard approach to network design that eliminates the need for dedicated servers. P2P is also a popular term for freely available Internet file sharing software systems.

Tuesday, February 18, 2014

What’s New in SQL Server 2014 since SQL Server 2008

Whats New in SQL Server 2014 since SQL Server 2008
PERFORMANCE & SCALE
o        In-Memory OLTP
o        Enhanced In-Memory ColumnStore for DW
o        Support for 640 logical proc. & 4 TB memory
o        Support to 15,000 partitions
o        Resource Governor IO governance
o        Buffer Pool Extension to SSDs
o        Query optimization enhancements
o        SysPrep at cluster level
o        Predictable performance with tiering of compute, network, and storage with Windows Server 2012 R2
o        Data Compression with USC-2 Unicode support
o        Backup Compression

HIGH AVAILABILITY
o        SQL Server AlwaysOn
o        Delayed Durability
o        Recovery Advisor
o        Windows Server Core
o        Live Migration
o        Online Operations enhancements
o        Clustered Shared Volume support, VHDX support (Windows Server 2012 R2)
o        Manage on-premises and cloud apps (System Center 2012 R2)

SECURITY
o        User-Defined Server Roles
o        Default Schema for Groups
o        SQL Server Audit
o        SQL Server Fine-grained Auditing
o        Enhanced separation of duty
o        CC certification at High Assurance Level
o        Backup encryption support

PROGRAMMABILITY
o        SQL Server Data Tools
o        Local DB runtime (Express)
o        Data-tier Application Component project template
o        Data-Tier Application Framework (DAC Fx)
o        Query optimization enhancements
o        Interoperability support (ADO.NET, ODBC, JDBC, PDO, ADO APIs and .NET C/C++, Java, Linux, and PHP platforms)

T-SQL ENHANCEMENTS
o        Enhanced support for ANSI SQL standards
o        Transact-SQL Static Code Analysis tools
o        Transact-SQL code snippets
o        Intellisense

UNSTRUCTURED & COMPLEX DATA SUPPORT
o        FileTable built on FILESTREAM
o        Remote Blob Storage with SharePoint 2010
o        Statistical Semantic Search
o        Spatial features, including Full Globe & arcs
o        Large user-defined data types

MANAGEABILITY
o        Distributed Replay
o        Contained Database Authentication
o        System Center Management Pack for SQL Server 2012
o        Windows PowerShell 2.0 support
o        Multi-server Management with SQL Server Utility Control Point
o        Data-Tier Application Component

ACCESS ANY DATA
o        Power Query
o        Windows Azure HDInsight Service
o        Analytics Platform System (PDW V2)
o        Mash up data from different sources, such as Oracle & Hadoop

INSIGHTS WITH FAMILIAR TOOLS
o        Power BI in Office 365
o        Power Map for Excel
o        Mobile interfaces for Power BI

COMPLETE BI SOLUTION
o        SQL Server BI Edition
o        HA for StreamInsight, complex event processing
o        BI Semantic Model
o        SQL Server Data Tools support for BI
o        Change Data Capture for Oracle

ANALYSIS SERVICES
o        Import PowerPivot models into Analysis Services
o        Enhancements on productivity, performance

REPORTING SERVICES
o        Power View
o        Configurable reporting alerts
o        Reporting as SharePoint Shared Service
o        Report Builder 3.0

DATA QUALITY SERVICES
o        Build organizational knowledge base
o        Connect to 3rd party data cleansing providers

MASTER DATA SERVICES
o        Master Data Hub
o        Master Data Services Add-in for Microsoft Excel

INTEGRATION SERVICES
o        Graphical tools in SSIS
o        Extensible object model
o        SSIS as a Server
o        Broader data integration with more sources; DB vendors, cloud, Hadoop
o        Pipeline improvements

HYBRID CLOUD SOLUTIONS
o        Simplified backup to Windows Azure
o        Support for backup of previous versions of SQL Server to Windows Azure
o        Cloud back-up encryption support
o        Simplified cloud Disaster Recovery with AlwaysOn replicas in Windows Azure VMs

EASY ON-RAMP TO THE CLOUD
o        New Windows Azure Deployment UI for SQL Server
o        Larger SQL Server VMs and memory sizes now available in Windows Azure
o        DAC enhancements: Import/export with Windows Azure SQL Database

COMPLETE AND CONSISTENT FROM ON-PREM TO CLOUD
o        SQL Server Data Tools
o        License Mobility (with SA)
o        Resource Governor enhancements
o        Snapshot backups to Windows Azure via SQL Server Management Studio

Wednesday, February 5, 2014

Most Ignored CCTV Codes and Laws

artical we discuss Most Ignored CCTV Codes and Laws.

Let’s be honest, not all security integrators and installers take the proper precautions to make sure they aren’t violating any CCTV “laws” before installing. Many install them on the notion of protecting property, keeping an eye on employees, or some other common video surveillance goal. We forget that there are rules that we need to follow. It’s all fun and games until you go to court for misuse of CCTV video. Below you will find a list of 10 most ignored Codes or Laws for security camera usage for the distributor and the consumer. So avoid getting in trouble by taking a look at this list of laws and code of conduct.

What are the most ignored CCTV codes?

Staff should be informed of any cameras placed in their working area:
This is a courtesy act, but is not required, unless the cameras are observing unionized  labor workers. In the case of a union, they must be notified if a hidden camera is going to be installed and used. Cameras are usually placed in working areas to keep employees on their best behavior, and warning them they are being watched is only fair. Some employment contracts may include a clause about hidden cameras.

Sales staff should inform the consumer of the advantages and weaknesses of each product:
Not all customers are tech savvy and know how to read spec sheets, so it is the salesperson’s responsibility to inform (enlighten) the client of such things. This is often overlooked and ignored. Some Technical background Sales people / Technician or Engineer always offers the best products, and will list for you any disadvantages a product has.

Sales Staff need to communicate to the customer how to maintain product:
This includes how to clean it and how to install it in order to keep the product working and in good shape.  Some expert sales staff always educates there customers on products and are trained to ask about the area the camera will be installed in to give corresponding care instructions.

Police are limited in their surveillance operations:
Because of the fourth amendment, police cannot install cameras with audio surveillance without a warrant. For instance, installing ‘bugs’ for investigations may be permissible if they have a probable cause. A public phone booth, however, is a place where installing audio surveillance is not permissible.


Except for law enforcement purposes, footage should not be given to any other third party:
This code is completely disregarded. Sometimes videos are posted online for entertainment or other purposes. If you go to Youtube and search CCTV, you will find many videos there, which is in complete violation of this code.

Although nannies do not have to be notified, it is still courteous to tell her she is being observed:
The footage of the nanny abusing the child was used as evidence even though it came from a hidden camera. This was ruled under the notion that one should not expect privacy in other people’s homes.

Cameras should be positioned only to view the premises:
Anything outside of your property is not your business, so anybody not visiting your property should not be caught on your footage. Some states prohibit cameras from pointing into other people’s houses or backyards, as it is a violation of privacy.  You can use Privacy Making to block out sensitive areas that you do not wish to monitor.

Some states require security cameras in certain areas:
Some states, require the installation of cameras at certain cabarets and public dance halls. This is required in the case of a crime, and is given to the cops immediately for investigation.

Regardless of the state, it is almost always illegal to record a conversation to which you are not a party, do not have consent to tape, and could not naturally overhear (RCFP):
This means any situation in which you would have eavesdropped on that conversation but recorded it, is illegal. In the following states, the one recording must notify everyone being recorded that the recording is taking place: Mumbai, Chennai, Bengaluru, Kolkata & New Delhi.

It is prohibited to place hidden cameras in private places:
In some states prohibit the placement and use of covert cameras without the permission of those being recorded. They must be warned that they are being watched and recorded. So what is a private place? It is anywhere where the person has an expectation of privacy, or outside of the public sector, i.e., bathroom, locker room, hotel room, or fitting room.

So when you are installing your surveillance system, make sure to continue by these rules. This will ensure your videos will be admissible as evidence in a court of law. When signing your employment contract, pay attention to the small things they add in there.