Monday, March 31, 2014

Difference between SQL SERVER 2000,2005,2008 and 2012

SQL SERVER 2000:
1.Query Analyser and Enterprise manager are separate.
2.No XML datatype is used.
3.We can create maximum of 65,535 databases.
4.Cant compress the tables and indexes.

5.Datetime datatype is used for both date and time.
6.No varchar(max) or varbinary(max) is available.
7.No table datatype is included.
8.No SSIS is included.
9.CMS (Cenntral Management Server) is not available.
10.PBM (Policy Based Management) is not available.
11.High Availability Clustering or Log Shipping require Enterprise Edition. Expensive hardware.
SQL SERVER 2005:
1.Both are combined as SSMS(Sql Server management Studio).
2.XML datatype is introduced.
3.We can create 2(pow(20))-1 databases.
4.Exception Handling
5.Varchar(Max) data type
6.DDL Triggers
7.DataBase Mirroring
8.RowNumber function for paging
9.Table fragmentation
10.Full Text Search
11.Bulk Copy Update
12.Cant encrypt the entire database.
13.Can Compress tables and indexes.(Introduced in 2005 SP2)
14.Datetime is used for both date and time.
15.Varchar(max) and varbinary(max) is used.
16.No table datatype is included.
17.SSIS is started using.
18.CMS is not available.
19.PBM is not available.

20. High Availability Clustering, Database Mirroring or Log Shipping available in Standard Edition. Database Mirroring can use cheap hardware. 

SQL SERVER 2008:
1.Both are combined as SSMS(Sql Server management Studio).
2.XML datatype is used.
3.We can create 2(pow(20))-1 databases.
4.Exception Handling
5.Varchar(Max) data type
6.DDL Triggers
7.DataBase Mirroring
8.RowNumber function for paging
9.Table fragmentation
10.Full Text Search
11.Bulk Copy Update
12.TDE (Transparent Data Encryption) to encrypt the entire database introduced in 2008.
13.Can compress tables and indexes.
14.Date and time are separately used for date and time datatype,spatial and timestamps with internal timezone is used.
15.Varchar(max) and varbinary(max) is used.
16.Table datatype introduced.
17.SSIS avails in this version.
18.Central Management Server(CMS) is Introduced.
19.Policy based management(PBM) server is Introduced.
20. Auditing - monitoring of data access.
21. Resource Governor. Restrict users or groups from consuming high levels or resources.
22. Activity monitor: consolidates this information by detailing running and recently executed processes, graphically.
23. Backup compression.


SQL Server 2008 to SQL Server R2• Backup compression is available in R2 standard (was only in Enterprise)
• SQL Server 2008 R2 Express Edition database size limit increased to 10 GB (from 4GB)
• PowerPivot for SharePoint introduced for loading, querying, and managing PowerPivot workbooks that you publish to a SharePoint 2010 server
• PowerPivot for Excel is used to assemble and create relationships in large amounts of data from different sources, and then use that data as the basis for PivotTables and other data visualization objects that support data analysis in Excel.
• Utility Explorer introduced for centralized management of managed SQL instances.
• Master Data Services introduced to manage master (reference) data and maintain an auditable record of that data as it changes over time.
• Enhanced security to prevent an authentication relay attack.


SQL SERVER 2012:




1.The SQL Server 2012 uses 48 bit precision for spatial
2.In SQL server 2012 has unlimited concurrent connections
3.By default it supports 15,000 partitions
4.Available new string functions CONCATE and FORMAT
5.Available new conversion  functions are PARSE ,TRY_CONVERT,TRY_PARSE
6.
Microsoft.SqlServer.Dac and Microsoft.SqlServer.Dac.Extensions are introduced to perform  operations on Packages.

SQL Server 2008R2 to 2012• Inclusion of Visual Studio 2010 (BI edition)
• AlwaysOn technology – allowing automatic replication and switching to mirrored database/server in the event of problems
• In most instances, the performance is 10 times faster than the predecessor (Microsoft claim)
• Buffer rate is high in SQL Server 2012 because of data compression.
• Data visualization tool is available in SQL Server 2012.This allows snapshots of data.
• Support for persistent computed columns and extra geographical approach is possible with spatial features in SQL Server 2012.
• Allows for warm Service Patch patching – meaning SQL or server does not have to be rebooted/restarted to apply patches
• New ‘Contained Databases’ feature allowing easier movement of database instances between servers
• New ‘ColumnStore’ indexes – which turn indexes 90 degrees in use (instead of one index per row, you get multiple column indexes per row which has a major impact on performance)
• New TRY_CONVERT T-SQL command, which will perform data type conversion, but will NULL rather than error where conversion fails.
• New OFFSET/FETCH command which allows automatic capture of pages of rows (like SELECT TOP 90 * from…, but gives a starting row number for the page)
• Redesign of SQL Server management studio – providing new features, better intellisense, new viewing tools and cleaner interface
• Custom user server roles – meaning you can define roles with specific access (such as BI data reader) and assign these custom roles to defined users (therefore faster user maintenance)
• New virtual Windows FileTable commands in T-SQL lets you manage a folder like a table of documents, but still have external control over the contents: UPDATE C:\Docs\*.* SET ReadOnly = 1 WHERE Author = ‘Bob’ AND Created < ’20100101′;)
• NEGATIVE – SQL Server Management Studio will no longer run on XP. Needs Windows Vista, 7 or 8.
• NEGATIVE – SQL Server is no longer licenced on server, but either CALS or Cores in server CPU which could increase costs for large user connection scenarios.
• NEGATIVE – AWE is no longer supported, meaning your SQL Server instance on x86 with 32GB of RAM is only going to be able to use 4GB. Note – SQL now designed to run on 64bit hardware.

During the CCTV / Access Management Software installation the mail Database is on SQL based. So you must know Difference between SQL SERVER 2000,2005,2008 and 2012.

Saturday, March 22, 2014

360p, 480p, 720p, 1080p Measure Up

360p
This is an Animoto video’s default resolution. The majority of YouTube and Hulu videos are displayed in 360p, so that’s about the video quality that 360 lines of resolution provides. This (as well as the 480p) is a great resolution for mobile devices since the mobile screen rarely has enough pixels or enough memory to support HD videos.

480p

640x480 (480p) is the resolution that almost every camera can shoot at, most digicams from the last two years shoot at least 480p. Although there are lower resolutions (typically for high speed video), 640x480 should really be the lowest resolution to consider. 640x480 is a pretty good resolution, its not HD but its the resolution of standard definition television (SDTV) and a good quality source at 480p can look pretty good. Most people will be happy with this resolution but those who love the idea of widescreen, high definition home movies will want to venture into the two HDTV options. A 480p video will play beautifully on both your laptop and desktop monitors, and though it isn’t quite HD, it is definitely good enough to view on that spiffy new flatscreen TV you just bought

How does 480p Measure Up?

§  480p vs 720p: 480p has 1/3 the resolution
§  480p vs 1080p: 480p has about 1/7 the resolution
§  Click on the full resolution sample and you'll see that a clean 480p image can be fantastic - DVD is after all "only" 480p
720p (1280x720)
1280x720 (720p) is the lowest of two HDTV resolutions. The ability for digital cameras to shoot high definition video started to pick up in 2009 and is now available on many cameras. 720p provides fantastic video quality that is perfect for large screen TVs and high definition home movies. An HD 720p Animoto video is crisp, sharp, and takes full advantage of any display you want to view it on

How does 720p Measure Up

§  720p vs 480p: 720p has 3X the resolution
§  720p vs 1080p: 720p has about 1/2 the resolution
§  720p is a fantastic high definition resolution to shoot at
 1080p (1920x1080)
1920x1080 (1080p) is the highest of two HDTV resolutions. 1080p is also known as Full HD and is very high resolution video. Because of it's extreme size it requires more storage space, faster computers to edit, more powerful camera processors and a very large TV to notice the difference. Currently 12 of 500 cameras released in the last 2 years shoot 1080p

How does 1080p Measure Up?

§  1080p vs 480p: 1080p has 7X the resolution
§  1080p vs 720p: 1080p has about 2X the resolution
§  1080p is a fantastic high definition resolution to shoot at
§  1080p is the pinnacle of HD quality - but more suited for pros and hard core enthusiasts.

High Definition Formats (I.E. HDTV):
720p - The Resolution is 1280x720 pixels, sent at 60 complete frames per second.
1080i - The Resolution is 1920x1080 pixels, sent at 60 interlaced frames per second or 30 complete frames per second.
1080p - The Resolution is 1920x1080 pixels, sent at 60 complete frames per second.

Tuesday, March 11, 2014

Security Camera with VMS and Access Control Integration

Controlling access to business facilities and private property is often a requirement in today’s world, even more so than in the past.

Application varies, of course, but you might see anything from keypads to biometric scanners on doors, gates, or other entry and access points throughout a facility. These systems are in place to protect company assets and employees from both internal and external threats.

In the past, integrating these access control systems with security cameras to create a more comprehensive solution

Now, however, with advances in IP network surveillance and access control technology, we can design and implement much more complex and useful systems that integrate high quality CCTV cameras with access control systems.and allow for true identification and cataloging of individuals or vehicles was difficult, clunky, low quality, and plagued with functionality issues.

CCTV Camera & Access Control Integration Video

These complete access control surveillance systems capture photo and video of the user, which is then attached to the access logs for archival and review purposes. Data is transmitted over the facilities computer network, stored using network attached storage devices, and is even accessible via mobile devices.
More complex security camera and access control systems use facial or license plate recognition, along with other forms of authentication, to allow or deny entry to individuals or vehicles.
Administrators can review video and data logs, and even control access functionality, such as locking or unlocking a door, remotely from their phone, tablet, or laptops. Real-time text and e-mail alerts, multi-level authorization, event triggered recording, and integration with alarm and fire systems are all features we also include in many installations.

This type of access control functionality was unheard of just a few short years ago, when it was only seen in TV shows and movies, but is becoming more commonplace today as companies and enterprises tighten security to cut internal losses and protect themselves from external threats.

Both Access Control software and Video Management Software (VMS) have become vital components in modern security systems. However, many are confused as to how exactly the two should be deployed.

It is important to get this right, as the two have very different strengths and features, and deploying the wrong one as the front end could leave end users without features that could be useful, or even vital to their security system.

In this article, we will examine the strengths of both Access Control and VMS, and how the two can be used to enhance each other and provide a better all-round security system.

The Strength of Access Control
Access Control systems are designed with immediacy in mind. Whenever someone interacts with the system, by swiping an ID card for example, the system immediately informs the operator who is requesting clearance, and what they are attempting to access.
It does this by accessing an extensive database, which can include information such as names, pass codes etc.

One striking aspect of this process is how the system relies on the person in question co-operating with it; in order to be effective, it requires the subject to willingly interact with the system. Let's take, as an example, a member of staff walking up to a door to swipe their ID card; they actively wish to be identified as they know they are.

Access Control software, even with video integration, is designed for this type of installation. Video functionality is often a basic “live video” pop up, giving visual verification along with the Access Control database information.

Unfortunately, Access Control systems are ill-equipped to deal with an intruder actively seeking to bypass the system by forcing entry through a door or gate. It is also limited when dealing with intruders bypassing controlled entry points altogether by forcing entry through a window or fence. In cases such as this, basic video display in the Access Control software provides limited information beyond the initial alarm, making it difficult to establish precisely what happened and has limited pre and post-event video analysis capabilities.

The Advantages of Video Management
This is where VMS comes into its own, with its more proactive nature allowing it to detect intruders whether they choose to engage with the surveillance system or not.
This means that VMS can provide a complete visual account of events before during and after an incident, leaving operators in no doubt as to what transpired.

Indeed, the ability to review evidence from before during and after an event is one of VMS' greatest strengths. Designed with a more forensic-based approach in mind, VMS features tools, such as thumbnails and bookmarks, to allow specific clips to be marked, searched and reviewed effortlessly. The footage can then be easily exported to the appropriate authorities.

This means that VMS can quickly establish a detailed timeline of events leading up to and following the main incident, which can provide vital information in an investigation, or key evidence in a trial. IndigoVision's Control Center even water marks video, both at the point of recording and again at the point of export, to guarantee that the video is authentic and has not been tampered with.

The superior analytics the VMS supports such as motion detection are another asset, as they offer a wider variety of logics to trigger alarms. In the case of IndigoVision's Control Center there is an additional benefit in the form of Activity Controlled Frame rate, which allows cameras to function at low frame rate and only increase to full frame rate if an analytic is triggered with no impact on video quality, while greatly reducing storage.

It is also worth noting that the VMS offers far more comprehensive surveillance, for example if a building is protected by Access Control alone and a car outside is stolen, the system will be of limited help. A strong VMS however could capture the incident and provide valuable evidence to resolve the situation.
So while Access Control performs one specific function exceptionally well, VMS is able to provide the security surveillance for a variety of areas of the property to be secured, creating a more adaptable and comprehensive surveillance system. All of these features mean that VMS is highly effective in open areas, areas of high traffic where checkpoints are not feasible, or areas with multiple points of entry, such as an airport.

Integration – The Best of Both
With this in mind, it should come as no surprise to learn that Access Control and VMS providers have been working to integrate with one another.

This allows Access Control systems to employ more video functionality such as live & playback video and PTZ control & export, while VMS can monitor Access Control events such as elevator control, card tracing and advanced door monitoring.

In most cases though, it is still best to deploy Access Control and VMS side by side, as this creates a more robust and well-rounded system. If the security system has been designed around limited entry points, with Access Control entry, and the operator only requires a basic visual verification, then Access Control software may be sufficient.

However, the more advanced analytics and forensic capabilities of VMS, combined with its versatility and wider coverage, make it better suited for monitoring larger areas with numerous entry points. Therefore in these environments, VMS should be the front-end, with an integrated Access Control plugin to allow management of events and alarms.