Wednesday, April 30, 2014

DTE & DCE / DB25 & DB9 Port

DTE & DCE / DB25 & DB9 Port


Let's talk about DCE (Data Communications Equipment) and DTE (Data Terminal Equipment) devices. The difference between DCE and DTE is largely in the Plug and the direction if each pin (input or output). Your desktop PC is termed as a DTE device.
DCE devices use a 25-pin female connector while a DTE device uses a 25 pin male connector. Also, complimentary signals lines like transmit and receive are "swapped" between the two types. Thus, a straight-through cable can be used to connect a DCE device to a DTE device.
DTEDCE
25 pin Male pinout25 pin Female pinout
Pin 1 - Shield GroundPin 1 - Shield Ground
Pin 2 - Transmitted Data (TD) outputPin 2 - Transmitted Data (TD) input
Pin 3 - Receive Data (RD) inputPin 3 - Receive Data (RD) output
Pin 4 - Request To Send (RTS) outputPin 4 - Request To Send (RTS) input
Pin 5 - Clear To Send (CTS) inputPin 5 - Clear To Send (CTS) output
Pin 6 - Data Set Ready (DSR) inputPin 6 - Data Set Ready (DSR) output
Pin 7 - Signal GroundPin 7 - Signal Ground
Pin 8 - Carrier Detect (CD) inputPin 8 - Carrier Detect (CD) output
Pin 20 - Data Terminal Ready (DTR) outputPin 20 - Data Terminal Ready (DTR) input
Pin 22 - Ring Indicator (RI) inputPin 22 - Ring Indicator (RI) output
You can effectively convert DCE/DTE devices by using a NULL Modem cable. The null modem cable swaps the complimentary signals and allows a DCE device to act like a DTE and vice-versa.
The following chart depicts the cabling of the DB9 connector found on an IBM-PC type computer.
DTE
9 pin Male pinout
Pin 1 - Carrier Detect (CD) input
Pin 2 - Receive Data (RD) input
Pin 3 - Transmitted Data (TD) output
Pin 4 - Data Terminal Ready (DTR) output
Pin 5 - Signal Ground
Pin 6 - Data Set Ready (DSR) input
Pin 7 - Request To Send (RTS) output
Pin 8 - Clear To Send (CTS) input
Pin 9 - Ring Indicator (RI) input

What are the actual speeds of GPRS, EDGE, UMTS, HSPA, etc in Video Surveillance?

What are the actual speeds of GPRS, EDGE, UMTS, HSPA, etc in Video Surveillance?

Theoretical maximum speeds of 4G LTE reach 100Mbps so you’re Video is Real time and no buffering... However, actual performance of mobile data is much lower, considering signal strength, frequencies used, congestion, etc.


Here are the real-life speed ranges of the various mobile wireless standards commonly used in the India today:-


GSM (Global System for Mobile Communications) 2G -- 9Kbps
GPRS (General packet radio services) 2.5G -- 20Kbps to 100kbps
EDGE (Enhanced Data rates for GSM Evolution) 2.75G -- 100Kbps to 175Kbps
UMTS (Universal Mobile Telecommunications System) 3G -- 175Kbps to 1Mbps
HSPA (High Speed Packet Access / software upgrade to UMTS, theoretical 42Mbps) 3.5G -- 600Kbps to 10Mbps, averages 1-3Mbps
WiMAX/LTE "4G" (theoretical 100Mbps) -- 3Mbps to 10Mbps average, 20Mbps+ peak download speeds.
5G -- 250Mbps to 500Mbps in South Korea & Japan on 2014

So select your Mode for traveling path of Video Surveillance data.

3G/4G Video Surveillance Advantages
  • 3G/4G Performance = faster upload speeds = higher frame rates & better resolution
  • Connect multiple Wired and Wireless IP cameras to 1 LAN-Cell
  • Bandwidth Management features to prioritize video traffic
  • Port Mapping, Redirection & DMZ features to minimize changes to camera configuration
  • Dynamic DNS support to access cameras by name or IP address
  • Deploy a single platform on CDMA & GSM networks worldwide

Tuesday, April 1, 2014

Router Compatibility for Internet Enabled Wireless CCTV Systems

The modern replacement for old analogue CCTV cameras is the wireless internet CCTV, also known as IP CCTV. The wireless CCTV system that is internet enabled has a great advantage over old system. You can see your property from anywhere in the world. You can see live images and video of your business property or your house, from wherever you are, just with the help of internet.
The technology has come in the market, but not many people know how to best use to. In order to get the best out of your wireless internet CCTV system, we must also look at the requirements and features that a router would need in order to be used successfully with the wireless system. There are a lot of things that goes into deciding your router for the wireless internet CCTV.

Broadband Type and Router Compatibility

You can have a broadband service that can come through either a phone line or a satellite CCTV box. In case the broadband service is through a phone line, you will require an ADSL modem/router also known as the DSL modem/router. Alternatively, if your broadband comes from your cable supplier, you would then require a cable router. This is another box that plugs in to your cable box.
The router part of your DSL modem/router or the cable router is basically the same. Manufacturers just make the DSL or cable version of the router that has the same features.
Router Features for Wireless CCTV System
  • The router must be set up so that the port number, a special code, is allocated to the camera. When you type the IP address and the port number in the internet browser from any system, the router sees the port number and passes the message to the camera. Without this facility, it will not be possible to view your property through internet.
  • With broadband suppliers changing your IP address at will, DDNS i.e. dynamic DNS support comes in. It helps you to use a third-party service to link a domain name you your IP address. The router’s DDNS feature makes sure that the router will tell the DDNS provider about your current IP address. Thus, even if your IP address changes, you can contact your camera with the domain name of the DDNS.
  • Having your router remain connected is very important. This is important especially when you go out on a vacation. You don’t want to find that you cannot connect to your camera because your router disconnected due to power failure. In case of power cut, the DSL line or cable may drop for some time. Not many home routers are able to handle this, but with technology, new routers are able to reconnect by themselves after power cut. The router is able to sort itself out once the power is back and provides you hassle free access to your camera from anywhere in the world.
Thus, a router is an important device that enables you to monitor the security of your home and business’s wireless cctv systems from anywhere in the world.

Choosing Routers for Wireless Internet CCTV

Wireless Internet CCTV, also known as IP CCTV, is the modern replacement for old analogue CCTV cameras, and has the great advantage that you can see your property, live, from wherever you happen to be, using the internet. Now that the technology has become popular in homes and businesses, people need to know how to get the best out of it. In this article, I want to look at the minimum set of features that a router needs in order to be used successfully with wireless CCTV.
First, a quick note about types of broadband and router compatibility. Your broadband service is likely to come through your phone line or perhaps via a satellite CCTV box. If it’s through a phone line, you will need an ADSL modem/router, sometimes called a DSL modem/router. The modem part of the box is what talks to the phone line. On the other hand, if you have broadband from your cable supplier, you need a cable router. This is not the cable box itself, but another box that plugs into your cable box. The router part of a cable router or a DSL modem/router is usually the same, with many manufacturers making cable and DSL versions of what is essentially a router with the same features. Now, let’s take a look at the features you will need to get the most out of your wireless internet CCTV system:
  • Virtual Server/Port Forwarding. This just means having the ability to set up the router so that a special code known as a port number is allocated to the camera. When you open an internet browser window and type in the URL or address of the camera, you add this special port number onto the end of the camera’s address, (e.g. for port 8765, you would type “http://:8765″) and when the router sees the port number it knows the message is to be passed to the camera. Without this facility, you would not be able to see your property over the internet.
  • DDNS Support. It stands for Dynamic DNS and is used where the address of your home or business on the broadband system, known as the IP address, is changed at will by the broadband supplier. Most DSL broadband services have changing IP addresses, also known as dynamic IP addresses. Say you have an IP address of 91.103.218.59 (they tend to look like this) today, with dynamic IP addressing it could be something different tomorrow. This means you would never know what address to use to access your camera over the internet, and that is where DDNS support comes in. Basically, you use a third party service to link a domain name to an IP address. This service is provided by a separate DDNS provider and can be free, e.g. dyndns.com. The router’s DDNS feature means that the router makes sure it always tells the DDNS provider what your current broadband IP address is. Therefore, even if the IP address changes, you can always contact your camera by using the same dyndns address, e.g. “http://myipcamera.dyndns.com:8765″.
  • Keep alive or auto-reconnect feature. This feature is all about making sure the router stays connected. You may have a power cut, or the DSL line/ cable connection may drop for a few moments. In these scenarios, you want the router to sort itself out. Earlier models of home router did not handle this well, and even today some can still be bought that don’t reconnect after a power cut or especially a broadband fault. The last thing you want is to go on holiday and then find you cannot log into your camera because a power cut several days ago left the router disconnected, so this is important.
  • Encryption. Most routers these days offer some sort of encryption, usually known as WEP or WPA. WPA is stronger and preferable. Encryption is simply encoding the messages on your wireless network so that they cannot be intercepted easily. Make sure you get a router that offers at least one type of encryption that your wireless internet CCTV cameras offer. For example, it is no good getting a router which only does WPA encryption if your cameras can only do WEP.
As always, if what you have read here leaves you dizzy and you just want an internet CCTV system to monitor your home or business without all this technical complication, my advice is to get a fully-configured wireless CCTV camera pack from a specialist supplier.

Monday, March 31, 2014

Difference between SQL SERVER 2000,2005,2008 and 2012

SQL SERVER 2000:
1.Query Analyser and Enterprise manager are separate.
2.No XML datatype is used.
3.We can create maximum of 65,535 databases.
4.Cant compress the tables and indexes.

5.Datetime datatype is used for both date and time.
6.No varchar(max) or varbinary(max) is available.
7.No table datatype is included.
8.No SSIS is included.
9.CMS (Cenntral Management Server) is not available.
10.PBM (Policy Based Management) is not available.
11.High Availability Clustering or Log Shipping require Enterprise Edition. Expensive hardware.
SQL SERVER 2005:
1.Both are combined as SSMS(Sql Server management Studio).
2.XML datatype is introduced.
3.We can create 2(pow(20))-1 databases.
4.Exception Handling
5.Varchar(Max) data type
6.DDL Triggers
7.DataBase Mirroring
8.RowNumber function for paging
9.Table fragmentation
10.Full Text Search
11.Bulk Copy Update
12.Cant encrypt the entire database.
13.Can Compress tables and indexes.(Introduced in 2005 SP2)
14.Datetime is used for both date and time.
15.Varchar(max) and varbinary(max) is used.
16.No table datatype is included.
17.SSIS is started using.
18.CMS is not available.
19.PBM is not available.

20. High Availability Clustering, Database Mirroring or Log Shipping available in Standard Edition. Database Mirroring can use cheap hardware. 

SQL SERVER 2008:
1.Both are combined as SSMS(Sql Server management Studio).
2.XML datatype is used.
3.We can create 2(pow(20))-1 databases.
4.Exception Handling
5.Varchar(Max) data type
6.DDL Triggers
7.DataBase Mirroring
8.RowNumber function for paging
9.Table fragmentation
10.Full Text Search
11.Bulk Copy Update
12.TDE (Transparent Data Encryption) to encrypt the entire database introduced in 2008.
13.Can compress tables and indexes.
14.Date and time are separately used for date and time datatype,spatial and timestamps with internal timezone is used.
15.Varchar(max) and varbinary(max) is used.
16.Table datatype introduced.
17.SSIS avails in this version.
18.Central Management Server(CMS) is Introduced.
19.Policy based management(PBM) server is Introduced.
20. Auditing - monitoring of data access.
21. Resource Governor. Restrict users or groups from consuming high levels or resources.
22. Activity monitor: consolidates this information by detailing running and recently executed processes, graphically.
23. Backup compression.


SQL Server 2008 to SQL Server R2• Backup compression is available in R2 standard (was only in Enterprise)
• SQL Server 2008 R2 Express Edition database size limit increased to 10 GB (from 4GB)
• PowerPivot for SharePoint introduced for loading, querying, and managing PowerPivot workbooks that you publish to a SharePoint 2010 server
• PowerPivot for Excel is used to assemble and create relationships in large amounts of data from different sources, and then use that data as the basis for PivotTables and other data visualization objects that support data analysis in Excel.
• Utility Explorer introduced for centralized management of managed SQL instances.
• Master Data Services introduced to manage master (reference) data and maintain an auditable record of that data as it changes over time.
• Enhanced security to prevent an authentication relay attack.


SQL SERVER 2012:




1.The SQL Server 2012 uses 48 bit precision for spatial
2.In SQL server 2012 has unlimited concurrent connections
3.By default it supports 15,000 partitions
4.Available new string functions CONCATE and FORMAT
5.Available new conversion  functions are PARSE ,TRY_CONVERT,TRY_PARSE
6.
Microsoft.SqlServer.Dac and Microsoft.SqlServer.Dac.Extensions are introduced to perform  operations on Packages.

SQL Server 2008R2 to 2012• Inclusion of Visual Studio 2010 (BI edition)
• AlwaysOn technology – allowing automatic replication and switching to mirrored database/server in the event of problems
• In most instances, the performance is 10 times faster than the predecessor (Microsoft claim)
• Buffer rate is high in SQL Server 2012 because of data compression.
• Data visualization tool is available in SQL Server 2012.This allows snapshots of data.
• Support for persistent computed columns and extra geographical approach is possible with spatial features in SQL Server 2012.
• Allows for warm Service Patch patching – meaning SQL or server does not have to be rebooted/restarted to apply patches
• New ‘Contained Databases’ feature allowing easier movement of database instances between servers
• New ‘ColumnStore’ indexes – which turn indexes 90 degrees in use (instead of one index per row, you get multiple column indexes per row which has a major impact on performance)
• New TRY_CONVERT T-SQL command, which will perform data type conversion, but will NULL rather than error where conversion fails.
• New OFFSET/FETCH command which allows automatic capture of pages of rows (like SELECT TOP 90 * from…, but gives a starting row number for the page)
• Redesign of SQL Server management studio – providing new features, better intellisense, new viewing tools and cleaner interface
• Custom user server roles – meaning you can define roles with specific access (such as BI data reader) and assign these custom roles to defined users (therefore faster user maintenance)
• New virtual Windows FileTable commands in T-SQL lets you manage a folder like a table of documents, but still have external control over the contents: UPDATE C:\Docs\*.* SET ReadOnly = 1 WHERE Author = ‘Bob’ AND Created < ’20100101′;)
• NEGATIVE – SQL Server Management Studio will no longer run on XP. Needs Windows Vista, 7 or 8.
• NEGATIVE – SQL Server is no longer licenced on server, but either CALS or Cores in server CPU which could increase costs for large user connection scenarios.
• NEGATIVE – AWE is no longer supported, meaning your SQL Server instance on x86 with 32GB of RAM is only going to be able to use 4GB. Note – SQL now designed to run on 64bit hardware.

During the CCTV / Access Management Software installation the mail Database is on SQL based. So you must know Difference between SQL SERVER 2000,2005,2008 and 2012.

Saturday, March 22, 2014

360p, 480p, 720p, 1080p Measure Up

360p
This is an Animoto video’s default resolution. The majority of YouTube and Hulu videos are displayed in 360p, so that’s about the video quality that 360 lines of resolution provides. This (as well as the 480p) is a great resolution for mobile devices since the mobile screen rarely has enough pixels or enough memory to support HD videos.

480p

640x480 (480p) is the resolution that almost every camera can shoot at, most digicams from the last two years shoot at least 480p. Although there are lower resolutions (typically for high speed video), 640x480 should really be the lowest resolution to consider. 640x480 is a pretty good resolution, its not HD but its the resolution of standard definition television (SDTV) and a good quality source at 480p can look pretty good. Most people will be happy with this resolution but those who love the idea of widescreen, high definition home movies will want to venture into the two HDTV options. A 480p video will play beautifully on both your laptop and desktop monitors, and though it isn’t quite HD, it is definitely good enough to view on that spiffy new flatscreen TV you just bought

How does 480p Measure Up?

§  480p vs 720p: 480p has 1/3 the resolution
§  480p vs 1080p: 480p has about 1/7 the resolution
§  Click on the full resolution sample and you'll see that a clean 480p image can be fantastic - DVD is after all "only" 480p
720p (1280x720)
1280x720 (720p) is the lowest of two HDTV resolutions. The ability for digital cameras to shoot high definition video started to pick up in 2009 and is now available on many cameras. 720p provides fantastic video quality that is perfect for large screen TVs and high definition home movies. An HD 720p Animoto video is crisp, sharp, and takes full advantage of any display you want to view it on

How does 720p Measure Up

§  720p vs 480p: 720p has 3X the resolution
§  720p vs 1080p: 720p has about 1/2 the resolution
§  720p is a fantastic high definition resolution to shoot at
 1080p (1920x1080)
1920x1080 (1080p) is the highest of two HDTV resolutions. 1080p is also known as Full HD and is very high resolution video. Because of it's extreme size it requires more storage space, faster computers to edit, more powerful camera processors and a very large TV to notice the difference. Currently 12 of 500 cameras released in the last 2 years shoot 1080p

How does 1080p Measure Up?

§  1080p vs 480p: 1080p has 7X the resolution
§  1080p vs 720p: 1080p has about 2X the resolution
§  1080p is a fantastic high definition resolution to shoot at
§  1080p is the pinnacle of HD quality - but more suited for pros and hard core enthusiasts.

High Definition Formats (I.E. HDTV):
720p - The Resolution is 1280x720 pixels, sent at 60 complete frames per second.
1080i - The Resolution is 1920x1080 pixels, sent at 60 interlaced frames per second or 30 complete frames per second.
1080p - The Resolution is 1920x1080 pixels, sent at 60 complete frames per second.

Tuesday, March 11, 2014

Security Camera with VMS and Access Control Integration

Controlling access to business facilities and private property is often a requirement in today’s world, even more so than in the past.

Application varies, of course, but you might see anything from keypads to biometric scanners on doors, gates, or other entry and access points throughout a facility. These systems are in place to protect company assets and employees from both internal and external threats.

In the past, integrating these access control systems with security cameras to create a more comprehensive solution

Now, however, with advances in IP network surveillance and access control technology, we can design and implement much more complex and useful systems that integrate high quality CCTV cameras with access control systems.and allow for true identification and cataloging of individuals or vehicles was difficult, clunky, low quality, and plagued with functionality issues.

CCTV Camera & Access Control Integration Video

These complete access control surveillance systems capture photo and video of the user, which is then attached to the access logs for archival and review purposes. Data is transmitted over the facilities computer network, stored using network attached storage devices, and is even accessible via mobile devices.
More complex security camera and access control systems use facial or license plate recognition, along with other forms of authentication, to allow or deny entry to individuals or vehicles.
Administrators can review video and data logs, and even control access functionality, such as locking or unlocking a door, remotely from their phone, tablet, or laptops. Real-time text and e-mail alerts, multi-level authorization, event triggered recording, and integration with alarm and fire systems are all features we also include in many installations.

This type of access control functionality was unheard of just a few short years ago, when it was only seen in TV shows and movies, but is becoming more commonplace today as companies and enterprises tighten security to cut internal losses and protect themselves from external threats.

Both Access Control software and Video Management Software (VMS) have become vital components in modern security systems. However, many are confused as to how exactly the two should be deployed.

It is important to get this right, as the two have very different strengths and features, and deploying the wrong one as the front end could leave end users without features that could be useful, or even vital to their security system.

In this article, we will examine the strengths of both Access Control and VMS, and how the two can be used to enhance each other and provide a better all-round security system.

The Strength of Access Control
Access Control systems are designed with immediacy in mind. Whenever someone interacts with the system, by swiping an ID card for example, the system immediately informs the operator who is requesting clearance, and what they are attempting to access.
It does this by accessing an extensive database, which can include information such as names, pass codes etc.

One striking aspect of this process is how the system relies on the person in question co-operating with it; in order to be effective, it requires the subject to willingly interact with the system. Let's take, as an example, a member of staff walking up to a door to swipe their ID card; they actively wish to be identified as they know they are.

Access Control software, even with video integration, is designed for this type of installation. Video functionality is often a basic “live video” pop up, giving visual verification along with the Access Control database information.

Unfortunately, Access Control systems are ill-equipped to deal with an intruder actively seeking to bypass the system by forcing entry through a door or gate. It is also limited when dealing with intruders bypassing controlled entry points altogether by forcing entry through a window or fence. In cases such as this, basic video display in the Access Control software provides limited information beyond the initial alarm, making it difficult to establish precisely what happened and has limited pre and post-event video analysis capabilities.

The Advantages of Video Management
This is where VMS comes into its own, with its more proactive nature allowing it to detect intruders whether they choose to engage with the surveillance system or not.
This means that VMS can provide a complete visual account of events before during and after an incident, leaving operators in no doubt as to what transpired.

Indeed, the ability to review evidence from before during and after an event is one of VMS' greatest strengths. Designed with a more forensic-based approach in mind, VMS features tools, such as thumbnails and bookmarks, to allow specific clips to be marked, searched and reviewed effortlessly. The footage can then be easily exported to the appropriate authorities.

This means that VMS can quickly establish a detailed timeline of events leading up to and following the main incident, which can provide vital information in an investigation, or key evidence in a trial. IndigoVision's Control Center even water marks video, both at the point of recording and again at the point of export, to guarantee that the video is authentic and has not been tampered with.

The superior analytics the VMS supports such as motion detection are another asset, as they offer a wider variety of logics to trigger alarms. In the case of IndigoVision's Control Center there is an additional benefit in the form of Activity Controlled Frame rate, which allows cameras to function at low frame rate and only increase to full frame rate if an analytic is triggered with no impact on video quality, while greatly reducing storage.

It is also worth noting that the VMS offers far more comprehensive surveillance, for example if a building is protected by Access Control alone and a car outside is stolen, the system will be of limited help. A strong VMS however could capture the incident and provide valuable evidence to resolve the situation.
So while Access Control performs one specific function exceptionally well, VMS is able to provide the security surveillance for a variety of areas of the property to be secured, creating a more adaptable and comprehensive surveillance system. All of these features mean that VMS is highly effective in open areas, areas of high traffic where checkpoints are not feasible, or areas with multiple points of entry, such as an airport.

Integration – The Best of Both
With this in mind, it should come as no surprise to learn that Access Control and VMS providers have been working to integrate with one another.

This allows Access Control systems to employ more video functionality such as live & playback video and PTZ control & export, while VMS can monitor Access Control events such as elevator control, card tracing and advanced door monitoring.

In most cases though, it is still best to deploy Access Control and VMS side by side, as this creates a more robust and well-rounded system. If the security system has been designed around limited entry points, with Access Control entry, and the operator only requires a basic visual verification, then Access Control software may be sufficient.

However, the more advanced analytics and forensic capabilities of VMS, combined with its versatility and wider coverage, make it better suited for monitoring larger areas with numerous entry points. Therefore in these environments, VMS should be the front-end, with an integrated Access Control plugin to allow management of events and alarms.

Wednesday, February 26, 2014

P2P Networking – the fast way to connect camera

A Peer to Peer network (often shortened to P2P) is a connection process where two or more IP Camera / DVR/ NVR / PCs connected to each other can share resources , peripherals as equals  without the need of a central dedicated server.

It is a distributed application architecture that divides tasks / workloads among Peers. Peers refer to the workstations connected to the P2P network which are participants in the application and which are all equally able to perform any function necessary for the network. A computer connected to this network is called a node.


The reason for the popularity of a P2P network is that it can be set up anywhere- Homes, offices, online business etc. The only requirement is that all the participants of the network should be using the same or a compatible program, (client), to connect to each other.

The first P2P app was Napster, released in 1999.

Basic overview
In a P2P network each node is essentially a client as well as a server, thereby eliminating the need for special high performance machines to act as servers. Accessing files is basically governed by the user setting different sharing permissions on their own machines.

Advantages
Due to the inherent characteristic of P2P networks it is the clients who are responsible for providing network resources such as bandwidth, system power, and storage. This feature is tremendously useful to original content distributors, because it reduces the setup as well as running costs very small.

Due to the decentralized nature of the network, if one peer  ceases to function properly, it does not affect the whole network. As long as there is even one properly functioning PC, the network will be alive.

Also important to note is the lack of a system administrator or a central authority. This leads to a more efficient and stable network owing to lack of a full staff needed to ensure smooth running.

Weaknesses
Just like any kind of file sharing system, users are vulnerable to malicious attacks from harmful content that may allow remote access to the user’s PC. This can even affect the whole network.

Network Security
For one thing, sharing files with random strangers on the internet does call for some sort of caution. It is recommended that you at least have a firewall or an antivirus scanning each of your downloads to protect against potential backdoors and malware. Another way would be to just use trusted sources.
P2P networks represent one of the most important issues in the ongoing controversy of network neutrality. Internet Service Providers have been known to cut off P2P file sharing traffic on account of its high bandwidth usage.


But still we can expect this form of networking to only grow and grow more for its pros far outweigh its cons.

So P2P is a standard approach to network design that eliminates the need for dedicated servers. P2P is also a popular term for freely available Internet file sharing software systems.

Tuesday, February 18, 2014

What’s New in SQL Server 2014 since SQL Server 2008

Whats New in SQL Server 2014 since SQL Server 2008
PERFORMANCE & SCALE
o        In-Memory OLTP
o        Enhanced In-Memory ColumnStore for DW
o        Support for 640 logical proc. & 4 TB memory
o        Support to 15,000 partitions
o        Resource Governor IO governance
o        Buffer Pool Extension to SSDs
o        Query optimization enhancements
o        SysPrep at cluster level
o        Predictable performance with tiering of compute, network, and storage with Windows Server 2012 R2
o        Data Compression with USC-2 Unicode support
o        Backup Compression

HIGH AVAILABILITY
o        SQL Server AlwaysOn
o        Delayed Durability
o        Recovery Advisor
o        Windows Server Core
o        Live Migration
o        Online Operations enhancements
o        Clustered Shared Volume support, VHDX support (Windows Server 2012 R2)
o        Manage on-premises and cloud apps (System Center 2012 R2)

SECURITY
o        User-Defined Server Roles
o        Default Schema for Groups
o        SQL Server Audit
o        SQL Server Fine-grained Auditing
o        Enhanced separation of duty
o        CC certification at High Assurance Level
o        Backup encryption support

PROGRAMMABILITY
o        SQL Server Data Tools
o        Local DB runtime (Express)
o        Data-tier Application Component project template
o        Data-Tier Application Framework (DAC Fx)
o        Query optimization enhancements
o        Interoperability support (ADO.NET, ODBC, JDBC, PDO, ADO APIs and .NET C/C++, Java, Linux, and PHP platforms)

T-SQL ENHANCEMENTS
o        Enhanced support for ANSI SQL standards
o        Transact-SQL Static Code Analysis tools
o        Transact-SQL code snippets
o        Intellisense

UNSTRUCTURED & COMPLEX DATA SUPPORT
o        FileTable built on FILESTREAM
o        Remote Blob Storage with SharePoint 2010
o        Statistical Semantic Search
o        Spatial features, including Full Globe & arcs
o        Large user-defined data types

MANAGEABILITY
o        Distributed Replay
o        Contained Database Authentication
o        System Center Management Pack for SQL Server 2012
o        Windows PowerShell 2.0 support
o        Multi-server Management with SQL Server Utility Control Point
o        Data-Tier Application Component

ACCESS ANY DATA
o        Power Query
o        Windows Azure HDInsight Service
o        Analytics Platform System (PDW V2)
o        Mash up data from different sources, such as Oracle & Hadoop

INSIGHTS WITH FAMILIAR TOOLS
o        Power BI in Office 365
o        Power Map for Excel
o        Mobile interfaces for Power BI

COMPLETE BI SOLUTION
o        SQL Server BI Edition
o        HA for StreamInsight, complex event processing
o        BI Semantic Model
o        SQL Server Data Tools support for BI
o        Change Data Capture for Oracle

ANALYSIS SERVICES
o        Import PowerPivot models into Analysis Services
o        Enhancements on productivity, performance

REPORTING SERVICES
o        Power View
o        Configurable reporting alerts
o        Reporting as SharePoint Shared Service
o        Report Builder 3.0

DATA QUALITY SERVICES
o        Build organizational knowledge base
o        Connect to 3rd party data cleansing providers

MASTER DATA SERVICES
o        Master Data Hub
o        Master Data Services Add-in for Microsoft Excel

INTEGRATION SERVICES
o        Graphical tools in SSIS
o        Extensible object model
o        SSIS as a Server
o        Broader data integration with more sources; DB vendors, cloud, Hadoop
o        Pipeline improvements

HYBRID CLOUD SOLUTIONS
o        Simplified backup to Windows Azure
o        Support for backup of previous versions of SQL Server to Windows Azure
o        Cloud back-up encryption support
o        Simplified cloud Disaster Recovery with AlwaysOn replicas in Windows Azure VMs

EASY ON-RAMP TO THE CLOUD
o        New Windows Azure Deployment UI for SQL Server
o        Larger SQL Server VMs and memory sizes now available in Windows Azure
o        DAC enhancements: Import/export with Windows Azure SQL Database

COMPLETE AND CONSISTENT FROM ON-PREM TO CLOUD
o        SQL Server Data Tools
o        License Mobility (with SA)
o        Resource Governor enhancements
o        Snapshot backups to Windows Azure via SQL Server Management Studio