Wednesday, July 2, 2014

What’s New in SQL Server 2014 since SQL Server 2008 R2

Whats New in SQL Server 2014 since SQL Server 2008 R2
PERFORMANCE & SCALE
o        In-Memory OLTP
o        Enhanced In-Memory ColumnStore for DW
o        Support for 640 logical proc. & 4 TB memory
o        Support to 15,000 partitions
o        Resource Governor IO governance
o        Buffer Pool Extension to SSDs
o        Query optimization enhancements
o        SysPrep at cluster level
o        Predictable performance with tiering of compute, network, and storage with Windows Server 2012 R2

HIGH AVAILABILITY
o        SQL Server AlwaysOn
o        Delayed Durability
o        Recovery Advisor
o        Windows Server Core
o        Live Migration
o        Online Operations enhancements
o        Clustered Shared Volume support, VHDX support (Windows Server 2012 R2)
o        Manage on-premises and cloud apps (System Center 2012 R2)

SECURITY
o        User-Defined Server Roles
o        Default Schema for Groups
o        SQL Server Audit
o        SQL Server Fine-grained Auditing
o        Enhanced separation of duty
o        CC certification at High Assurance Level
o        Backup encryption support

PROGRAMMABILITY
o        SQL Server Data Tools
o        Local DB runtime (Express)
o        Data-tier Application Component project template
o        Data-Tier Application Framework (DAC Fx)
o        Query optimization enhancements
o        Interoperability support (ADO.NET, ODBC, JDBC, PDO, ADO APIs and .NET C/C++, Java, Linux, and PHP platforms)

T-SQL ENHANCEMENTS
o        Enhanced support for ANSI SQL standards
o        Transact-SQL Static Code Analysis tools
o        Transact-SQL code snippets
o        Intellisense
o        Unstructured & Complex Data Support
o        FileTable built on FILESTREAM
o        Remote Blob Storage with SharePoint 2010
o        Statistical Semantic Search
o        Spatial features, including Full Globe & arcs
o        Large user-defined data types

MANAGEABILITY
o        Distributed Replay
o        Contained Database Authentication
o        System Center Management Pack for SQL Server 2012
o        Windows PowerShell 2.0 support
o        Multi-server Management with SQL Server Utility Control Point
o        Data-Tier Application Component

ACCESS ANY DATA
o        Power Query
o        Windows Azure HDInsight Service
o        Analytics Platform System (PDW V2)
o        Mash up data from different sources, such as Oracle & Hadoop

INSIGHTS WITH FAMILIAR TOOLS
o        Power BI in Office 365
o        Power Map for Excel
o        Mobile interfaces for Power BI

COMPLETE BI SOLUTION
o        SQL Server BI Edition
o        HA for StreamInsight, complex event processing
o        BI Semantic Model
o        SQL Server Data Tools support for BI
o        Change Data Capture for Oracle

ANALYSIS SERVICES
o        Import PowerPivot models into Analysis Services
o        Enhancements on productivity, performance

REPORTING SERVICES
o        Power View
o        Configurable reporting alerts
o        Reporting as SharePoint Shared Service
o        Report Builder 3.0

DATA QUALITY SERVICES
o        Build organizational knowledge base
o        Connect to 3rd party data cleansing providers

MASTER DATA SERVICES
o        Master Data Hub
o        Master Data Services Add-in for Microsoft Excel

INTEGRATION SERVICES
o        Graphical tools in SSIS
o        Extensible object model
o        SSIS as a Server
o        Broader data integration with more sources; DB vendors, cloud, Hadoop
o        Pipeline improvements

HYBRID CLOUD SOLUTIONS
o        Simplified backup to Windows Azure
o        Support for backup of previous versions of SQL Server to Windows Azure
o        Cloud back-up encryption support
o        Simplified cloud Disaster Recovery with AlwaysOn replicas in Windows Azure VMs

EASY ON-RAMP TO THE CLOUD
o        New Windows Azure Deployment UI for SQL Server
o        Larger SQL Server VMs and memory sizes now available in Windows Azure
o        DAC enhancements: Import/export with Windows Azure SQL Database

COMPLETE AND CONSISTENT FROM ON-PREM TO CLOUD
o        SQL Server Data Tools
o        License Mobility (with SA)
o        Resource Governor enhancements
o        Snapshot backups to Windows Azure via SQL Server Management Studio

Friday, June 27, 2014

Twisted Pair Cabling Connection Tips

Twisted Pair Cabling Connection Tips

 1. Recommend to use UY connectors for cable connection or soldering by parallel (as Picture.) Do not bent it for 90° (as Picture) to avoid any impendence not matching problem (Interference).

2. After cable connection, the cable joint point must be twisted back for same pair; the untwisted length must be less 10mm to avoid any interference.

3. After finish the joint cable, must be do “waterproof work” to avoid any oxidation after long time use, affect any picture quality.

4. Do not bend CAT 5 twisted pair during the cabling. To make angle less than 90° to avoid any impendence not matching problem. (Interference).

5. If your budget acceptable, then not use all 4 pairs for transmission. Leave one pairs as spare cable for any future added camera or help to resolve interference cable.

6. Do not put the remaining cable like a circle (as Picture) and not near any power box, transformers, motor, Fluorescent Lights. This way could avoid any interference caused.

Saturday, June 21, 2014

Fiber media converters For Video Surveillance Cameras

As a kind of Media Converter, Fiber media converters this known as fiber transceivers or Ethernet media converters, are quite obvious networking devices those make it possible for connecting two dissimilar media types such as twisted pair Cat-5 or Cat-6 cable with fiber optic cabling. They may be essential in interconnecting fiber optic cabling-based systems with existing copper-based, structured cabling systems. Fiber ethernet media converters support many different communication protocols including Ethernet, Fast Ethernet, Gigabit Ethernet, as well as multiple cabling types such as twisted pair, multi-mode and single-mode fiber optics. Fiber media converters can connect different Local area network (LAN) media, modifying duplex and speed settings.

For video security and surveillance professionals, analog video-based CCTV systems have been the tried-and-true technology for many years. However, these same professionals are the first to recognize the migration of Ethernet into new applications beyond the typical office LAN and how Ethernet is playing a role and introducing new challenges to video security networking.

For years, Transition Networks has been talking about the benefit of fiber optic cabling and how media converters can provide a cost effective method of deploying fiber in local area networks and overcome the limitations and drawbacks of copper UTP cabling. These same benefits can be realized by security and surveillance professionals when they integrate fiber into their video networks.

For example, switching media converters can connect legacy 10BASE-T network segments to more modern 100BASE-TX or 100BASE-FX Fast Ethernet infrastructure. For instance, existing Half-Duplex hubs may be attached to 100BASE-TX Fast Ethernet network segments over 100BASE-FX fiber. When expanding the reach with the LAN to span multiple locations, fiber transceivers are useful in connecting multiple LANs to form one large campus area network that spans more than a wide geographic area.

Fiber media converters support a variety of data communication protocols including Ethernet, Fast Ethernet, Gigabit Ethernet, T1/E1/J1, DS3/E3, as well as multiple cabling types for example coax, twisted pair, multi-mode and single-mode fiber optics. Media Converter types range from small standalone devices and PC card converters to high port-density chassis systems offering many advanced features for network management.

On some devices, Simple Network Management Protocol (SNMP) enables proactive management of link status, monitoring chassis environmental statistics and sending traps to network managers in case of a fiber break or perhaps link loss on the copper port.
 
Fiber media converters can connect different Local area network (LAN) media, modifying duplex and speed settings. Switching media converters can connect legacy 10BASE-T network segments to more recent 100BASE-TX or 100BASE-FX Fast Ethernet infrastructure. For instance, existing Half-Duplex hubs can be linked to 100BASE-TX Fast Ethernet network segments over 100BASE-FX fiber.

When expanding the reach of the LAN to span multiple locations, media converters are of help in connecting multiple LANs to make one large campus area network that spans more than a limited geographic area. As premises networks are primarily copper-based, media converters can extend the reach from the LAN over single-mode fiber approximately 130 kilometers with 1550 nm optics.
The coaxial cabling utilized in analog CCTV networks suffers from transmission distance issues. The accepted distance for coax is 185 meters. While this has worked well in the past, the demands for increasing the surveillance coverage have pushed camera locations beyond the standard distances.
As for Ethernet and IP cameras, this distance is even more restrictive at 100 meters. Offering transmission over greater distances, fiber cabling is starting to play a signifigant role in surveillance networks. Fiber cabling supports transmission distances up to 2km on multimode fiber without the need for repeaters or signal boosters - with even greater distances available on single mode fiber.

Indoor applications with florescent lights, electric motors, and other sources of electromagnetic interference (EMI) along with sources of radio frequency interference (RFI) can cause disruptions and poor picture quality issues for video over Coax and UTP cabling. The transmission from cameras located outdoors is susceptible to these same conditions as well as the effect from electrical/lightening storms. Due to the nature of how data is transmitted over fiber optic cabling, it does an excellent job of blocking
this electrical interference and protecting the quality of the data.

Wavelength-division multiplexing (WDM) technology in the LAN is very beneficial in situations where fiber is at limited supply or expensive for provision. In addition to conventional dual strand fiber converters, with separate receive and transmit ports, there are also single strand fiber converters, which can extend full-duplex data transmission approximately 70 kilometers more than one optical fiber.

Other benefits of media conversion include providing a gentle migration path from copper to fiber. Fiber connections can help to eliminate electromagnetic interference. Also fiber media converters pose being a cheap solution for many who need it switches for use with fiber along with have enough money to pay for them, they can buy ordinary switches and make use of fiber media converters to make use of making use of their fiber network.

As a fiber optic media converter, you can use it anywhere in the network to integrate newer technology with existing equipment to support new applications, technologies and future growth. Fiber Converters are key aspects of Optical Networking because its long distance operation, high bandwidth capacity and reliablity make fiber optics probably the most desired channel for data communications. Instead of costly, across-the-board upgrades, media converters can extend the productive lifetime of the existing cabling along with the active equipment. FiberStore offers a wide variety of professional fiber optic media converters for Fast Ethernet, Gigabit Ethernet, Serial Datacom interfaces and E1 or T1 voice/data communications.
  

To aid in the deployment of fiber in these security and surveillance networks, Transition Networks has specifically designed a copper to fiber media converter for analog video applications. These converters are available to support both fixed-focus cameras as well as pan-tilt-zoom (PTZ) cameras. As IP cameras begin to replace analog cameras, traditional Ethernet media converters can be used for the fiber integration. Most IP cameras also support power-over-Ethernet (PoE) technology which makes installation of the cameras easier since the camera can be powered over the UTP Ethernet cable. PoE switches, PoE injectors, and PoE media converters are all available to create the functional network needed in today’s hybrid video security and surveillance applications.

Friday, June 20, 2014

Dynamic DNS in Wireless CCTV Systems (For Beginners)

Wireless internet CCTV, also known as IP CCTV, communicates through your broadband line and onwards to the internet.  This can cause problems if your home broadband has a dynamic IP address, because when you want to connect to your cameras from outside, you won’t know what that address is.  This article shows you how to overcome the problem by using Dynamic DNS.

Most home ADSL packages still give you a dynamic or changing IP address, which is simply the address of your home’s network on the internet.  These addresses are allocated from a pool of available addresses and allow the internet provider to have fewer addresses than customers, saving money. 

This used to work well because early broadband modems “dialled” a connection when the attached computer requested it, rather like the old dial-up modems.  Nowadays, though, modern wireless modem/routers tend to remain connected permanently, so we are reaching the point where the internet provider is having to allow one IP address per customer, and may as well allocate a static or unchanging one.  However, as of today most people have dynamic addresses and this is an obstacle to contacting your wireless internet camera from the outside world, as I will explain in the next section.

Just as your broadband line has an IP address, so your camera has its own address or port.  For example, if your home IP address is 91.103.218.59 and the camera’s port is 8765, assuming your router is set up with port forwarding (outside the scope of this article) you can contact your camera by typing “http:// 91.103.218.59:8765” into a browser window.  This may work today, but by tomorrow that  91.103.218.59 IP address could have been allocated to someone else, and you will not find your camera on the end of it any more.  This is where Dynamic DNS or just “DDNS” comes in.
DDNS allows you to contact your wireless internet CCTV camera using an address that never changes, even when your broadband’s IP address changes.  It requires two things in order to work: a DDNS service provider and a router or camera that offers DDNS support.

Most modern wireless routers offer DDNS support, but few internet CCTV cameras do.  As long as either the camera or the router offers this feature, all is well.  First, you visit the website of the DDNS service provider and sign up for an account.  The most popular provider is dyndns.com and it’s free.  You choose your own unique internet address such as “mywirelesscamera.dyndns.org” and you will also have a user name and password.  (Incidentally, the purpose of this service is simply to make that link between your IP address, whatever it happens to be at the time, and a fixed address or domain name.)  Having registered a DDNS account, next you log into your router’s administration pages and find the DDNS section.

Here you simply key in the DDNS provider name, your account details and the address that you chose.  Now, whenever your broadband provider changes your home IP address, your router will tell dyndns.com, and this means you can always contact your camera from wherever you happen to be, by keying the same unchanging address into a browser window, in our example: “http://mywirelesscamera.dyndns.org:8765”.

Wednesday, June 18, 2014

Biometricization of systems in India

Heading towards “Biometricization” of systems in India

Biometrics Technologies are searching new ways to spread its limbs in recent technology driven era. Every system within the public domain is proposed to be made transparent, secure and safe in its operation. Looking at these demands, Government of India is trying to implement Biometrics Technology in their system under Digital India program. This initiative from Government is really appreciable and needs an applaud. This will really help to curb corruption, larceny, and truancy. Also, the implementation of biometric technology will help layman gain the services in more effective ways. 
We all know biometrics technology is one of the most secure, safe and reliable way of human identification. So, it is quite necessary to implement this technology in every process under Government of India. This will bring a fruitful result in comparison to other conventional methods. Through this blog, I would like to throw some light on a few sectors where Biometrics Technology has been implemented or are proposed to be implemented in the coming days.

Attendance System: As the new Govt took the charge at the center, they firstly implemented Biometric Attendance System in Government offices. Also, they launched an attendance portal www.attendance.gov.in where the attendance of every employee is monitored. Its implementation has really proved fruitful and now they are showing up at offices right in time. As a result, Govt. Officials are found in their workplace.

E-PDS Scheme: Slowly and steadily, every state governments are implementing biometrics technology in the Public Distribution System at different levels. This will show a drastic change in the whole process of ration distribution. The poor people who usually are kept aside from govt. aides now will be directly benefited. The mediators will vanish and e-ration card holder can enjoy their right to the food.

Skill Development: Under the skill development program, the implementation of Biometric technology is really an effective state. Each and every student's attendance is marked in biometric devices with its location and uploaded to the central server. This has reduced larceny and made the process more transparent and effective.

Passport system: Also, the government has proposed to make biometric characteristic a mandatory  verification during passport issue. This step has been taken to reduce the crime and illegal immigration. Effective implementation will lower down, the rate of crimes under different circumstances.

For Criminal Records: National Crime Record Bureau (NCRB) has decided to launch a software which will identify the criminals. The implementation of Biometrics will help officials to know whether the criminal had ever been previously prosecuted for any other crime. This will help in the faster procedure of judgments and other trials.

National ID for Fishermen: The major setback of fishermen is their identification. This also leads to prosecutions of fishermen and they are sent behind the bars without any charge. So to resolve this issue, the government has decided to issue National ID cards with biometric for fishermen.

The rapid implementation of Biometrics Technology in different fields is definitely going to solve major common issue every citizen faces into their day-to-day life. Biometrics Technology has a tendency to change the approach of Government officials towards safe, secure and transparent systems. So, Star Link India, being the largest Indian manufacturer of Biometric Attendance Systems, endorses the step of Govt. and promises full support from their side.

Friday, May 30, 2014

Fishy Incidents — Industry Perspectives

Spot the fishy incidents — 10 perspectives from the industry

Panoramic fisheye cameras have seen fast growth in the surveillance industry. With the key feature in surround view monitoring and the advantage in reduction of installation cost, they are becoming the popular adoption in security system. With a promising market ahead, differentiation of product and market strategy from competitors is the way for major manufacturers to think when planning next moves.
EU and US regions
We here presented 10 worldwide providers from the security industry – VIVOTEK, Sony, Axis Communications, Hikvision Digital Technology, Samsung Techwin, Dahua Technology, Merit LILIN, EverFocus Electronics, Panasonic System Networks & AMG System.
Asia regions
VIVOTEKTaiwan
“The 360-degree cameras can be especially ideal for intercom or retail applications. Retail stores especially demand for a cost-effective and comprehensive surveillance system, which dissuades shoplifting and pickpocketing,” said Steve Ma, Executive Vice President of VIVOTEK. “With several unique features and wide surveillance coverage that can be delivered by the 360-degree fisheye camera under complicated environment, retail stores tend to deploy 360-degree fisheye camera the most.”
“The deployment of 360-degree fisheye cameras could be financially and technically beneficial. It is worth to note that just one 360-degree fisheye camera can deliver the same coverage as 6 to7 cameras that have been used in the stores. With the installation of panoramic models, the total number of cameras needed by the clients can be significantly reduced,” explained Ma.
VIVOTEK has made our fisheye camera as a pro-active smart sensor through our superior algorithms, making fisheye cameras performing intelligently, like people counting, field detection, trip wire, according to Ma. “With the technology evolvement and rising awareness of cost-effective solutions, the prevalent adoption of 360-degree fisheye camera for wide open area surveillance in the following years is foreseen. In addition, a 360-degree fisheye camera with intelligent capacity is undoubtedly to be a trend.”

SonyJapan
“With its multiple security benefits and associated cost savings for end users, it is easy to understand why the 360-degree security camera has been highlighted by IHS as one of the key drivers for the video surveillance camera market in 2014 – which is slated for double-digit growth this year. Sony also recognizes the importance of these cameras in addressing the ever changing security environments of the modern world, and will continue to advance in the 360-degree security camera market with our end users,” said Riki Nishimura, General Manager of Visual Security Solutions, Professional Solutions Company (PSAP) at Sony Electronics Asia Pacific.

AXISSweden  
“According to IHS Research, sales of network video start to overtake analog in 2014 due to the powerful functions of advanced video processing and analytics. This is especially true in the retailer sector, as 360-degree cameras allow for an overview of all activities in a given area while being affordable for users having to work with tight-budgets in for example the retail and education sectors,” said Petra Bennermark, Product Manager at Axis Communications. 
“In a study by Axis Communications, more than half (58%) of UK retailers are planning to migrate from analog to network video in order to integrate network cameras with business intelligence (BI) applications. BI application integration was considered the most significant reason for UK retailers to move to network video.”

HikvisionDigitalTechnologyChina
“Normally, SMB users may tend to use entry-level fixed cameras instead of panoramic cameras, since the latter are mainly targeted for middle-to high-end project use, and price are relatively higher. Therefore, Hikvision plans to introduce economical mini panoramic cameras to penetrate into SMB market in the middle of this year,” said Adler Wu, Product Marketing Manager of Hikvision Digital Technology.
“And for Hikvision, we forecast to increase at an annual growth rate of 60%-70% [before 2017], according to our company strategy, product planning and the market development. Panoramic camera would develop in two different ways in the future, one for SMB adoption and the other for high-end application. With more and more manufacturers joining in the competition, the price of panoramic camera may decrease to a level, allowing the cameras to enter SMB market; for high-end use, due to the wide coverage of panoramic camera, more images/ scenes could be achieved compared to common IP camera. Therefore, how to well make use of this advantage could be a breakthrough to eventually benefit the end users.”
“Considering lots of manufacturers have introduced their panoramic cameras, it becomes very important for us to provide innovative products to differ from the others at this stage.”

SamsungTechwinKorea 
“360-degree cameras are increasingly being specified for projects where there is a requirement to monitor activity 24/7 in environments such as banks, offices, retail, transportation and warehouses. The advantage they offer is that a single 360-degree observational camera is all that might be needed to efficiently and cost effectively covers a whole area where a much larger number of standard cameras might normally be required, to avoid any blind spots,” suggested Tim Biddulph, Product Manager of Samsung Techwin Europe.
Samsung Techwin's 360 degree camera is part of the company's extensive range of IP network cameras. Tim Biddulph emphasizes the importance of fully understanding clients' needs first, before endeavoring to persuade them to migrate to 360-degree or other products and technologies.

DahuaChina  
Fisheye cameras are mostly deployed for indoor surveillance, getting more and more popular in public buildings, pointed out by Peter Pan, Product Manager from Dahua. Seen as the economic choice for security system deployment, one single fisheye camera can achieve wider coverage of monitoring than other non-panoramic camera.
This is even true to public units, hotels, and schools. They often have budget concerns; theses users are not too demanding in security image details while their purpose of surveillance system is mainly for prevention, Pan suggested. 
“At present, many surveillance camera manufacturers have proposed new thoughts of design,” he continued. Currently, end users start to use 360-degree cameras and PTZ speed domes altogether, featuring both wide-coverage and detailed monitoring views. The 360-degree cameras are going to become an essential solution in surveillance systems, according to Pan. 
“Although fisheye cameras are expecting fast growth in the near future, the 360-degree cameras won't become the majority in surveillance camera market due to their own pitfalls such as low pixel counts at the edge of images, and image distortion,” explained Pan.
However, as Pan mentioned, the technical improvement related to these pitfalls has been essential to manufacturers in the industry. Meanwhile, some manufacturers have started enhancing camera capacities in IR support for advanced day/night monitoring.

MeritLILINTaiwan
“Fisheye cameras are all about seeing everything in a scene more efficiently than with multiple cameras; therefore, providing security managers the ability to cover an entire scene in a logical way without gaps of coverage is prominent,” according to Chris Hsu, Global Marketing Manager at LILIN. “LILIN panoramic IP camera is an ideal choice for open-ended lobby areas such as entrances, exits, and lobbies.”
“The current leading technology trend in global market is ‘less is more'. We expect cameras can cover a range of area such as 360-degree fisheye camera is an ideal all-in-one product will definitely continue to shine in the following years.”

EverFocusElectronicsTaiwan
Douglass Wang, Deputy Project Manager of EverFocus Electronics, emphasized the importance of fisheye and speed dome cameras' synergy, combining advantages from both types of cameras, and adding value for wide-area surveillance without compromising the optimal image quality. “The end users can finely utilize pan, tilt, and zoom functions on speed dome to keep tracking region of interest, while monitoring the entire area through 360-degree camera view, more importantly, without any blind spot,” Wang said.
As panoramic camera is favored to be applied with speed dome in areas such as airport, warehouse, public space, and parking lot, end users might hesitate due to complicated cameras configurations. “EverFocus provides end users a 4-steps image calibration which dramatically reduces configuration time,” Wang highlighted.

PanasonicJapan 
It is forecast that a growth of more than 50% will be seen in the panoramic camera market – more than current security market trend expectation – as higher image resolution will expand the deployment and acceptance of fisheye camera in more vertical markets, commented Akihito Akiyama, product planning manager at Panasonic.
According to Mr. Akiyama, Panasonic has strengthened its 360-degree cameras by continuingly progressing at technology development, including dewarp, super dynamic function, and vandal resistance. With the solid technical base, the 360-degree cameras are capable for high-resolution image quality with even edges, stable performance under various lighting environments, and last but not least, durability.

AMGUK  
Fisheye cameras, compared to other types of cameras, offer a number of key advantages — monitoring of surround view without blind spot and reduction of installation cost and work — whilst still keeping high-resolution recording quality, David J. Myers, Technical Director of AMG, highlighted. AMG have noted that 360-degree fisheye cameras are becoming the mainstream when analog CCTV is gradually replaced by IP CCTV systems. 
“We are not sure that there is one particular market deploying the most 360 degree cameras. In the USA, the retail market is strong. And transportation is a natural market for wide-angle camera when one single camera can cover whole view of a bus, or a train carriage,” Myers said. “Banks, schools, colleges, museums, and public buildings are also the target market of 360-degree cameras. So are car parks and outdoor perimeters.”

-I would like to thanks Michelle Chu from Asmag

Friday, May 23, 2014

Multi-factor authentication (MFA)

Multi-factor authentication

Multi-factor authentication is a method of multi-faceted access control which a user can pass by successfully presenting authentication factors from at least two of the three categories:
Knowledge factors (“things only the user knows”), such as passwords or passcodes;
possession factors (“things only the user has”), such as ATM cards or hardware tokens; and
inherence factors (“things only the user is”), such as biometrics,
(e.g. a fingerprint or retina scan)

Knowledge factors are the most commonly used form of authentication. In this form, the user is required to prove knowledge of a secret in order to authenticate, such as a password.

A password is a secret word or string of characters that is used for user authentication. This is the most commonly used mechanism of authentication. Many multi-factor authentication techniques rely on password as one factor of authentication. Variations include both longer ones formed from multiple words (a passphrase) and the shorter, purely numeric, personal identification number (PIN) commonly used for ATM access. Traditionally, passwords are expected be memorized.

Many secret questions such as “Where were you born?”, are poor examples of a knowledge factor because they may be known to a wide group of people, or be able to be researched.
Possession factors include both connected and disconnected tokens. Connected tokens are devices that are physically connected to the computer to be used, and transmit data automatically. There are a number of different types, including card readers, wireless tags and USB tokens. Disconnected tokens have no connections to the client computer. They typically use a built-in screen to display the generated authentication data, which is manually typed in by the user.

Inherited factors are usually associated with the user, and typically include biometric methods, including fingerprint readers, retina scanners or voice recognition.
Requiring more than one independent factor increases the difficulty of providing false credentials. Two-factor authentication requires the use of two of three independent authentication factors, as identified above. The number and the independence of factors is important, since more independent factors imply higher probabilities that the bearer of the identity credential actually does hold that identity.


Multi-factor authentication is sometimes confused with “strong authentication”. However, “strong authentication” and “multi-factor authentication”, are fundamentally different processes. Soliciting multiple answers to challenge questions can typically be considered strong authentication, but, unless the process also retrieves “something the user has” or “something the user is”, it is not considered multi-factor authentication.

Wednesday, May 21, 2014

Accepting Real-World Access Control Challenge

I write about change quite a bit because I am fascinated with all of the various elements that make change both interesting and dreaded by most people. To write about a subject, many writers research the subject matter they are tackling. I do this too, but I prefer hands-on experience. Reality changes in a hurry in our business world. What can this principle teach us in the world of convergence security technology?
Plenty, if it means you have the responsibility of delivering sustainable security solutions your customers count on every day. So let’s use a real-life example to more closely examine the tactical side of security. The challenge was to design, sell, install and commission a replacement of a 30-year-old+ mag stripe electronic access control system with a new IP-based system. Now, for plenty of you this challenge is a walk in the park, part of your everyday security business life. For others, it is not — including yours truly. Yes, I have security system integrator experience with a large company and founded an IP video integration company, but it’s been a few years since I strapped on a 33-inch tool belt. Wisdom and waist size have both grown a bit over the years, but that didn’t stop me. I was up to the challenge and charged forward.
Changing the Mindset on Decades-Old Ways
What I know about security technology from an application and elemental building blocks perspective is much different than putting the IP system puzzle pieces together onsite at 5:30 a.m. because the customer opens for business at 11 a.m. Ladders are unsightly, liability increases and the business operations are impacted — not to mention dropping fiberglass from the ceiling tiles into someone’s glass of beer.
The pressure of doing an IP installation properly in the correct sequence, and coordinating other contractors and supplier support while wrestling with old technology, is as close to “ground truth” as you can expect in the civilian world. Schedules and timing are important when you cut over an access control system. The old system has to continue operating while a new system is readied to take over the workload on a very specific date (no pressure here to get it right!). Now add to this the expectation of your customer for a significant operational improvement and you are involved with a bare-knuckle fight with change. Did I mention that I love a good challenge with change?

Here’s how this installation tale began. An acquaintance is a controller for a chapter of a large, well-known fraternal organization that has thousands of chapters worldwide. And he is not just any controller ... he was recognized nationally in 2012 as the best in the country, a guy who knows a thing or two about business and return on investment. He knew I worked in the security field so we started talking about the mechanics and costs of membership-based organizations that restrict/permit access based on bylaws and being current with their dues. Now add some size to this challenge. This particular chapter has approximately 800 male and female members, each with separate requirements.
So how were they managing access privileges? Every year the chapter needed to order new magstripe cards for all its members. This is an old credentials technology, so you can understand some of the cost factors. These credentials had to be replaced every year when membership dues were due. To this cost add the management time for physically handing over a new credential once dues were paid. This process has obviously worked for 30+ years, but what would the future look like for 30-year-old+ magstripe readers and 24VAC electric strikes? How long would they last? Could they even be repaired? How long could they disrupt operations if they did fail? Perhaps it is time to consider a change in electronic access control technology and upgrade the system.
Analyze Your Recommended Technology Applications to Ensure They Are Appropriate
I initially recommended a biometric solution since it would entirely eliminate the cost and management of card credentials. I like cool technology that is affordable and reliable (and I just wrote about this technology a few months ago, noting that it is an obvious solution to recommend).
But not so fast — remember, blindly recommending the application of technology can be dangerous, as well as narrow-minded and myopic. Does this sound like anyone you know or work with perhaps? We all are guilty of sticking with a “true blue” product or supplier because it is the path of least resistance. Guilty as charged.
How can you avoid the automatic product choices in your comfort zone? Ask the right questions. While biometric fingerprint technology is affordable and reliable, it isn’t a panacea. There is a large percentage of chapter membership groups that evolved in the late 1950s, and using new technology can be intimidating and less effective with their older members. Consider the lifetime use of older members’ hands and the gradual deterioration of their skin.
Biometric fingerprint technology has come a long way in the past five years but still has its limitations. What about facial recognition biometrics? Yes, the technology does work better in this application, but consider the perception of the older members and their comfort level of using card credentials for the past 30+ years vs. presenting their face to a reader or camera … it might feel a bit Orwellian, no?
Applying new technology and, more importantly, the right technology means asking your prospect/customer the right questions then considering the impact of change your solution delivers.
In this particular installation challenge, what was the best choice? An RFID credential solution made the most sense from a cost, application and functionality perspective. With several good choices for reliable IP access control systems I chose a new supplier, breaking out of my comfort zone, that I had done some consulting with to test my thinking.
I started by asking the appropriate questions to ensure the technology would fit the application. For example, how simple would it be to manage from a customer’s perspective? How cost effective would it be now and in the future? Once I got the answers I needed, it was time to kick the tires and light the fires.
The hardware and software components were fairly straightforward and not overly complex to process. Actually they were quite simple, and who doesn’t love simple? The documentation gets a C+ in my book and has room for improvement.
The supplier’s customer support in the field at crunch time — you know, when the customer is looking over your shoulder — was an A. The price vs. value delivery was in the A+ range, allowing me to provide additional spare parts and lots of extra credentials, which all IP systems you sell should absolutely have. This will ensure that any future service or maintenance will be fast, which is especially pertinent for electronic access control installations. What other challenges should you consider?
Thanks to Mr. Paul Boucherle for help.

Sunday, May 11, 2014

What is difference between ORACLE and SQL-SERVER

What is difference between ORACLE and SQL-SERVER ?

1. Oracle runs on many platforms, SQL on Windows only.
2. Oracle includes IFS (Internet File System), Java integration; SQL is more of a pure database.
3. Oracle requires client install and setup (Not difficult, but very UNIX-like for Windows users)
4. SQL is #1 in Cost/Performance and overall Performance, although Oracle will refute that.
5. Replication is much easier in SQL.
6. Failover support in SQL is much, much easier
7. JDBC support is much better in Oracle, although Microsoft is working on it 
8. ODBC support in both.
9. SQL is ANSI-SQL '92 compliant; making it easier to convert to another ANSI compliant database, theoretically anyway (truth is every database has proprietary extensions). Oracle is generally more proprietary and their main goal is to keep their customers locked-in.
10. SQL natively supports ODBC, OLEDB, XML, XML Query, XML updates. Oracle natively supports proprietary connections, JDBC. Not sure about XML support though.
11. SQL Server is much easier to administrate, with GUI and command- line tools. Most of Oracle is command-line (Back in SQL, 12 days I had a customer (at Kolkata) who was so proud that after a day's worth of work he had managed to script his database. I showed him how it was a 3 click operation in SQL.
12. Oracle requires add-ons for transaction monitors, failover, etc. SQL has COM+, uses NT clustering and generally has everything built-in.
13. SQL Analysis Services is included (A very powerful OLAP server). For Oracle it is a separate purchase.

Hope this post help you to select right database for your Access Control System, Attendance System, Video Analysis etc.