Showing posts with label Video Analytic. Show all posts
Showing posts with label Video Analytic. Show all posts

Saturday, October 15, 2022

Difference of Core i3, Core i5 & Core i7

Difference of Core i3, Core i5 & Core i7

 During Security Software installation we are giving some pre requisite to customer / we assumed what type of System hardware is required, accordingly get costing from Vendor. If you are System integrator, your design team must know about the processor.

Intel Core i3 Processor

This particular Intel processor is the entry level processor of this new series of Intel processors. While it may not be the fastest one of the bunch, it can get the job done, at least for most applications.

Mind you, if you need high speed, I suggest one of the other processors that I will unveil in front of your eyes later on in this post. Here’s some of the Core i3 features.

·        Uses 4 threads. Yes, it uses hyper-threading technology which is the latest craze due to its improved efficiency over earlier processors that were put on the market.

·        This processor consists of 2-4 cores, depending on which one you get your hands on.

·        Contains A 3-4 MB Cache

·        Uses less heat and energy than earlier processors, which is always a good thing in this day and age.

Intel Core i5 Processor

·        This is the mid-size processor of this bunch, recommended for those who demand a little speed, but not quite enough where the user will be running resource-intensive applications.

·        As with the Core i3 processor, this comes with 2-4 cores, the main difference is that it has a higher clock speed than the Core i3.

·        This is also a heat and energy efficient processor, but it does seem to be better at this particular job than the Core i3 processor.

·        The number of threads used in this is no different than the Core i3 with 2-4 threads, and it also uses hyper threading technology for a boost in performance.

·        The cache of the Core i5 is bigger than the Core i3, it’s at 3-8 MB.

·        The Core i5 is where the turbo mode is made available, this provides users with the opportunity to turn off a core if it’s not being utilized.

Intel Core i7 Processor

·        This is for the users that demand power, yes it does provide more power and if Tim Allen gets one of these, this would be the beast that he gets his hands on. Great for gamers and other resource intensive users. 

·        The cache on this one is 4-8 MB.

·        This processor comes with 8 threads, definitely enough to get the job done quickly, maybe even at the speed of light if you’re lucky.  And yes it also utilizes hyperthreading technology.

·        You will have four cores to take advantage of with this particular series.

·        And just like the other ones in this Intel series of processors, it is more energy efficient and produces less heat.

Below reviews the specifications (high-level) of 10th Gen Intel Core i7 processors as of late 2020.*

 

Cores/ Hyperthreading

Base Frequency

Maximum Turbo Frequency

Cache

Core i7 Laptops

4-8 / Yes

1.00-2.70 GHz

3.80-5.10 GHz

8-16 MB

(10th Generation)

Core i7 Desktops

8 / Yes

2.00-3.80 GHz

4.50-5.10 GHz

16 MB

(10th Generation)

The Intel Core i9 is often called Intel's processor line for "CPU enthusiasts," the early-adopters who always demand the industry’s latest and greatest. A Core i9-powered desktop or i9-powered laptop is great for users whose work requires extremely advanced computing capabilities (editing 4K video, for example). It’s also popular with high-end gamers who play live-action, multi-player, VR-based titles that can benefit from a CPU with hyper-fast cycle times and high core-thread counts.

The Core i9 debuted in 2017 along with a new socket-motherboard combination to support it. As this FAQ was written, the i9 had evolved to a deliver up to10 cores and 20 threads (desktop version). It costs more than the other members of the Intel Core family, but for certain applications, games and other workloads, the difference could be meaningful.

Table below lists the top-level specifications of Intel Core i9 processors (10th gen) as of late 2020.

 

Cores/ Hyperthreading

Base Frequency

Maximum Turbo Frequency

Cache

Core i9 Laptops

8 / Yes

2.40 GHz

5.30 GHz

16 MB

(10th Generation)

Core i9 Desktops

10 / Yes

1.90-3.70 GHz

4.60-5.30GHz

20 MB

(10th Generation)

Here are some broad statements addressing the comparative cost of Intel Core i9-enabled systems versus models with lesser processors, along with the kinds of users (and use cases) that are most likely to benefit from an advanced Core i9 PC:

  • Core i9 PC – Cost category
    • The Core i9 is the “enthusiast” line of Intel Core CPUs
  • Core i9 PC – Typical users
    • Processor early-adopters
    • Users of extremely demanding software
    • Gamers who always want the latest/greatest
    • Workstation users, server operators, etc.
  • Core i9 PC – Use cases
    • Everything the lesser Intel processors can do plus core-intensive activities such as editing huge video files, rendering complex engineering designs, acting as a server, and so on.

Wednesday, February 18, 2015

Cyber Law in INDIA

Why Cyberlaw in India ? 

When Internet was developed, the founding fathers of Internet hardly had any inclination that Internet could transform itself into an all pervading revolution which could be misused for criminal activities and which required regulation. Today, there are many disturbing things happening in cyberspace. Due to the anonymous nature of the Internet, it is possible to engage into a variety of criminal activities with impunity and people with intelligence, have been grossly misusing this aspect of the Internet to perpetuate criminal activities in cyberspace. Hence the need for Cyberlaws in India.

What is the importance of Cyberlaw ? 

Cyberlaw is important because it touches almost all aspects of transactions and activities on and concerning the Internet, the World Wide Web and Cyberspace. Initially it may seem that Cyberlaws is a very technical field and that it does not have any bearing to most activities in Cyberspace. But the actual truth is that nothing could be further than the truth. Whether we realize it or not, every action and every reaction in Cyberspace has some legal and Cyber legal perspectives.

Does Cyberlaw concern me ? 
Yes, Cyberlaw does concern you. As the nature of Internet is changing and this new medium is being seen as the ultimate medium ever evolved in human history, every activity of yours in Cyberspace can and will have a Cyberlegal perspective. From the time you register your Domain Name, to the time you set up your web site, to the time you promote your website, to the time when you send and receive emails , to the time you conduct electronic commerce transactions on the said site, at every point of time, there are various Cyberlaw issues involved. You may not be bothered about these issues today because you may feel that they are very distant from you and that they do not have an impact on your Cyber activities. But sooner or later, you will have to tighten your belts and take note of Cyberlaw for your own benefit.

Cyberlaw Awareness program 
Are your electronic transactions legally binding and authentic? Are you verifying your customers' identities to prevent identity theft? Does your online terms and conditions have binding effect? Are you providing appropriate information and clear steps for forming and concluding your online transactions? How are you ensuring data protection and information security on your web site? Are you recognising the rights of your data subjects?
Transacting on the Internet has wide legal implications as it alters the conventional methods of doing business. To build enduring relationships with your online customers the legal issues of e-transactions need to be addressed from the onset.

This Awareness program will cover
the basics of Internet Security
basic information on Indian Cyber Law
Impact of technology aided crime
Indian IT Act on covering the legal aspects of all Online Activities
Types of Internet policies required for an Organization.
Minium hardware and software, security measures required in an organization to protect data

Cyber laws are meant to set the definite pattern, some rules and guidelines that defined certain business activities going on through internet legal and certain illegal and hence punishable . The IT Act 2000, the cyber law of India , gives the legal framework so that information is not denied legal effect, validity or enforceability, solely on the ground that it is in the form of electronic records.

One cannot regard government as complete failure in shielding numerous e-commerce activities on the firm basis of which this industry has got to its skies, but then the law cannot be regarded as free from ambiguities.
MMS porn case in which the CEO of bazee.com(an Ebay Company) was arrested for allegedly selling the MMS clips involving school children on its website is the most apt example in this reference. Other cases where the law becomes hazy in its stand includes the case where the newspaper Mid-Daily published the pictures of the Indian actor kissing her boyfriend at the Bombay nightspot and the arrest of Krishan Kumar for illegally using the internet account of Col. (Retd.) J.S. Bajwa.

The IT Act 2000 attempts to change outdated laws and provides ways to deal with cyber crimes. Let’s have an overview of the law where it takes a firm stand and has got successful in the reason for which it was framed.
1. The E-commerce industry carries out its business via transactions and communications done through electronic records . It thus becomes essential that such transactions be made legal . Keeping this point in the consideration, the IT Act 2000 empowers the government departments to accept filing, creating and retention of official documents in the digital format. The Act also puts forward the proposal for setting up the legal framework essential for the authentication and origin of electronic records / communications through digital signature.
2. The Act legalizes the e-mail and gives it the status of being valid form of carrying out communication in India. This implies that e-mails can be duly produced and approved in a court of law , thus can be a regarded as substantial document to carry out legal proceedings.
3. The act also talks about digital signatures and digital records . These have been also awarded the status of being legal and valid means that can form strong basis for launching litigation in a court of law. It invites the corporate companies in the business of being Certifying Authorities for issuing secure Digital Signatures Certificates.
4. The Act now allows Government to issue notification on the web thus heralding e-governance.
5. It eases the task of companies of the filing any form, application or document by laying down the guidelines to be submitted at any appropriate office, authority, body or agency owned or controlled by the government. This will help in saving costs, time and manpower for the corporates.
6. The act also provides statutory remedy to the coporates in case the crime against the accused for breaking into their computer systems or network and damaging and copying the data is proven. The remedy provided by the Act is in the form of monetary damages, not exceeding Rs. 1 crore($200,000).
7. Also the law sets up the Territorial Jurisdiction of the Adjudicating Officers for cyber crimes and the Cyber Regulations Appellate Tribunal.
8. The law has also laid guidelines for providing Internet Services on a license on a non-exclusive basis.

The IT Law 2000, though appears to be self sufficient, it takes mixed stand when it comes to many practical situations. It looses its certainty at many places like:
1. The law misses out completely the issue of Intellectual Property Rights, and makes no provisions whatsoever for copyrighting, trade marking or patenting of electronic information and data. The law even doesn’t talk of the rights and liabilities of domain name holders , the first step of entering into the e-commerce.
2. The law even stays silent over the regulation of electronic payments gateway and segregates the negotiable instruments from the applicability of the IT Act , which may have major effect on the growth of e-commerce in India . It leads to make the banking and financial sectors irresolute in their stands .
3. The act empowers the Deputy Superintendent of Police to look up into the investigations and filling of charge sheet when any case related to cyber law is called. This approach is likely to result in misuse in the context of Corporate India as companies have public offices which would come within the ambit of "public place" under the Act. As a result, companies will not be able to escape potential harassment at the hands of the DSP.
4. Internet is a borderless medium ; it spreads to every corner of the world where life is possible and hence is the cyber criminal. Then how come is it possible to feel relaxed and secured once this law is enforced in the nation??

Friday, June 1, 2012

What the Difference between IP Cameras and CCTV Cameras ?


Many have speculated that the area of CCTV (closed-circuit television) cameras is coming to an end. These multi-purpose video cassette recorders and all their T-160 tapes are quickly being replaced by capture cards, embedded processors, codec, and more advanced devices. IP cameras have played a major role in phasing out CCTV cameras, as they offer many of the same benefits, yet provide much more. What’s the difference? Plenty! Let’s delve into some of the details and find out how IP cameras tower over their analog CCTV counterparts.

Remote Viewing

The major benefit of IP cameras is the luxury to view live video via the internet from any location in the world. While CCTV cameras can enable viewing over the internet, they require additional software and hardware components to function properly. An IP camera is integrated with all the necessary tools and doesn’t require any additional installations. Some of the newer models are even able to view live video on a cell phone or other mobile device over a 3G network.

Remote Recording

The primary function of a surveillance camera is to monitor a certain area when security and staff are unable to do so. While it serves its purpose for the most part, CCTV cameras are susceptible to security breaches, and the tapes they contain can be stolen. IP cameras enable recording to remote locations, which virtually eliminates such a scenario. Even if security is breached, the intruder will not be able to steal the tape or recording device because it is physically stationed at a remote location.

Wireless Capability

Because IP cameras leverage standard IP (Internet Protocol) networks, many of them are available in wireless variations to provide the ultimate in portability. All the device requires is a single cable for a power supply, which results in less work when installing the camera in the recording location.

Video Analytic

More IP cameras are being implemented with video analytics to provide advanced tracking and motion detection capability. This technology is so sophisticated that it has the ability to distinguish between the movement of a person, a car driving down the road, or a tree merely swaying in the wind.

More Advancements to Come

CCTV cameras aren’t completely obsolete, but are light-years behind in comparison to IP cameras. IP technology allows individuals and businesses to effectively monitor their home or office premises with little to no security risks. Evolving rapidly, it’s almost certain that you will be able to do much more with an IP camera in the very near future.

Sunday, February 27, 2011

Capturing Crystal Clear Images With Megapixel Technology

Megapixel surveillance is not a new concept — its applications and benefits are starkly clear. What has changed are smarter cameras, taking advantage of the added pixels and a better understanding of illumination in real life. In the first of a two-part report, A&S examines how smarter megapixel cameras are getting; the second part looks at best practices for optimal performance.

The big picture for megapixel surveillance cameras looks bright, in the wake of the recession. HD and megapixel cameras are expected to make up nearly 30 percent of network camera shipments in 2011, according to IMS Research. By 2015, it is forecast that more than 60 percent of network cameras shipped will be of megapixel resolution.

The resolution increase has a noted effect on the whole surveillance system. While a 2.1-megapixel or 1,080p HD image is six times larger than a D1 image, the additional pixels require a bigger pipe to transmit more data. The infrastructure and storage costs for megapixel are well-documented, with ROI and TCO being used as arguments in favor of bigger pictures. The fate of megapixel is linked to the future of IP networks, with HD forecast to make up most high-resolution cameras compared to megapixel, according to IMS.

Megapixel surveillance requires careful planning, but the benefits of added resolution boost the accuracy of analytics. Edge devices take advantage of faster processors, resulting in smarter use of pixels. Analytics can help reduce bandwidth, as an event will trigger video streaming, rather than constantly sending the same still images over the network. A more distributed architecture puts less strain on networks and makes life easier.

Clarity is the main driver for megapixel. “At the end of the day, you're putting in a security system to protect life and provide evidence in a court of law,” said Stephen Moody, Security Development Manager for ViS Security Solutions, an integrator in Ireland.

Cracking the Code
H.264 is the de facto standard compression for megapixel cameras, due to its efficiency in crunching large data files into smaller ones for transmission and storage. As compression evolved from M-JPEG's stills to MPEG-4 and now to H.264, a variety of profiles yield differences in performance. With 17 profiles in all, three are the most common: baseline, main and high, said Sachin Khanna, PM for CCTV, Bosch Security Systems.

By profile, the baseline is appropriate for video conferencing; the main profile is good for broadcast video; and high profile is most applicable for HD broadcast video. “H.264 requires a fair amount of processing power for encoding and decoding; this may limit the camera's frame rate and dictate the NVR platform to achieve the desired performance,” said Rich Pineau, CTO of Oncam Global.

Most H.264 profiles stem from 2-D applications, with not all profiles being capable of integration. “Even if both cameras are H.264 and the manufacturers are partners, the system could still not work,” said Patrick Lim, Director of Sales and Marketing for Ademco Far East. “The I/O and output are hard to integrate. Some engineers say it's easy to plug and play — there's no such thing.”