Pages

Friday, May 30, 2014

Fishy Incidents — Industry Perspectives

Spot the fishy incidents — 10 perspectives from the industry

Panoramic fisheye cameras have seen fast growth in the surveillance industry. With the key feature in surround view monitoring and the advantage in reduction of installation cost, they are becoming the popular adoption in security system. With a promising market ahead, differentiation of product and market strategy from competitors is the way for major manufacturers to think when planning next moves.
EU and US regions
We here presented 10 worldwide providers from the security industry – VIVOTEK, Sony, Axis Communications, Hikvision Digital Technology, Samsung Techwin, Dahua Technology, Merit LILIN, EverFocus Electronics, Panasonic System Networks & AMG System.
Asia regions
VIVOTEKTaiwan
“The 360-degree cameras can be especially ideal for intercom or retail applications. Retail stores especially demand for a cost-effective and comprehensive surveillance system, which dissuades shoplifting and pickpocketing,” said Steve Ma, Executive Vice President of VIVOTEK. “With several unique features and wide surveillance coverage that can be delivered by the 360-degree fisheye camera under complicated environment, retail stores tend to deploy 360-degree fisheye camera the most.”
“The deployment of 360-degree fisheye cameras could be financially and technically beneficial. It is worth to note that just one 360-degree fisheye camera can deliver the same coverage as 6 to7 cameras that have been used in the stores. With the installation of panoramic models, the total number of cameras needed by the clients can be significantly reduced,” explained Ma.
VIVOTEK has made our fisheye camera as a pro-active smart sensor through our superior algorithms, making fisheye cameras performing intelligently, like people counting, field detection, trip wire, according to Ma. “With the technology evolvement and rising awareness of cost-effective solutions, the prevalent adoption of 360-degree fisheye camera for wide open area surveillance in the following years is foreseen. In addition, a 360-degree fisheye camera with intelligent capacity is undoubtedly to be a trend.”

SonyJapan
“With its multiple security benefits and associated cost savings for end users, it is easy to understand why the 360-degree security camera has been highlighted by IHS as one of the key drivers for the video surveillance camera market in 2014 – which is slated for double-digit growth this year. Sony also recognizes the importance of these cameras in addressing the ever changing security environments of the modern world, and will continue to advance in the 360-degree security camera market with our end users,” said Riki Nishimura, General Manager of Visual Security Solutions, Professional Solutions Company (PSAP) at Sony Electronics Asia Pacific.

AXISSweden  
“According to IHS Research, sales of network video start to overtake analog in 2014 due to the powerful functions of advanced video processing and analytics. This is especially true in the retailer sector, as 360-degree cameras allow for an overview of all activities in a given area while being affordable for users having to work with tight-budgets in for example the retail and education sectors,” said Petra Bennermark, Product Manager at Axis Communications. 
“In a study by Axis Communications, more than half (58%) of UK retailers are planning to migrate from analog to network video in order to integrate network cameras with business intelligence (BI) applications. BI application integration was considered the most significant reason for UK retailers to move to network video.”

HikvisionDigitalTechnologyChina
“Normally, SMB users may tend to use entry-level fixed cameras instead of panoramic cameras, since the latter are mainly targeted for middle-to high-end project use, and price are relatively higher. Therefore, Hikvision plans to introduce economical mini panoramic cameras to penetrate into SMB market in the middle of this year,” said Adler Wu, Product Marketing Manager of Hikvision Digital Technology.
“And for Hikvision, we forecast to increase at an annual growth rate of 60%-70% [before 2017], according to our company strategy, product planning and the market development. Panoramic camera would develop in two different ways in the future, one for SMB adoption and the other for high-end application. With more and more manufacturers joining in the competition, the price of panoramic camera may decrease to a level, allowing the cameras to enter SMB market; for high-end use, due to the wide coverage of panoramic camera, more images/ scenes could be achieved compared to common IP camera. Therefore, how to well make use of this advantage could be a breakthrough to eventually benefit the end users.”
“Considering lots of manufacturers have introduced their panoramic cameras, it becomes very important for us to provide innovative products to differ from the others at this stage.”

SamsungTechwinKorea 
“360-degree cameras are increasingly being specified for projects where there is a requirement to monitor activity 24/7 in environments such as banks, offices, retail, transportation and warehouses. The advantage they offer is that a single 360-degree observational camera is all that might be needed to efficiently and cost effectively covers a whole area where a much larger number of standard cameras might normally be required, to avoid any blind spots,” suggested Tim Biddulph, Product Manager of Samsung Techwin Europe.
Samsung Techwin's 360 degree camera is part of the company's extensive range of IP network cameras. Tim Biddulph emphasizes the importance of fully understanding clients' needs first, before endeavoring to persuade them to migrate to 360-degree or other products and technologies.

DahuaChina  
Fisheye cameras are mostly deployed for indoor surveillance, getting more and more popular in public buildings, pointed out by Peter Pan, Product Manager from Dahua. Seen as the economic choice for security system deployment, one single fisheye camera can achieve wider coverage of monitoring than other non-panoramic camera.
This is even true to public units, hotels, and schools. They often have budget concerns; theses users are not too demanding in security image details while their purpose of surveillance system is mainly for prevention, Pan suggested. 
“At present, many surveillance camera manufacturers have proposed new thoughts of design,” he continued. Currently, end users start to use 360-degree cameras and PTZ speed domes altogether, featuring both wide-coverage and detailed monitoring views. The 360-degree cameras are going to become an essential solution in surveillance systems, according to Pan. 
“Although fisheye cameras are expecting fast growth in the near future, the 360-degree cameras won't become the majority in surveillance camera market due to their own pitfalls such as low pixel counts at the edge of images, and image distortion,” explained Pan.
However, as Pan mentioned, the technical improvement related to these pitfalls has been essential to manufacturers in the industry. Meanwhile, some manufacturers have started enhancing camera capacities in IR support for advanced day/night monitoring.

MeritLILINTaiwan
“Fisheye cameras are all about seeing everything in a scene more efficiently than with multiple cameras; therefore, providing security managers the ability to cover an entire scene in a logical way without gaps of coverage is prominent,” according to Chris Hsu, Global Marketing Manager at LILIN. “LILIN panoramic IP camera is an ideal choice for open-ended lobby areas such as entrances, exits, and lobbies.”
“The current leading technology trend in global market is ‘less is more'. We expect cameras can cover a range of area such as 360-degree fisheye camera is an ideal all-in-one product will definitely continue to shine in the following years.”

EverFocusElectronicsTaiwan
Douglass Wang, Deputy Project Manager of EverFocus Electronics, emphasized the importance of fisheye and speed dome cameras' synergy, combining advantages from both types of cameras, and adding value for wide-area surveillance without compromising the optimal image quality. “The end users can finely utilize pan, tilt, and zoom functions on speed dome to keep tracking region of interest, while monitoring the entire area through 360-degree camera view, more importantly, without any blind spot,” Wang said.
As panoramic camera is favored to be applied with speed dome in areas such as airport, warehouse, public space, and parking lot, end users might hesitate due to complicated cameras configurations. “EverFocus provides end users a 4-steps image calibration which dramatically reduces configuration time,” Wang highlighted.

PanasonicJapan 
It is forecast that a growth of more than 50% will be seen in the panoramic camera market – more than current security market trend expectation – as higher image resolution will expand the deployment and acceptance of fisheye camera in more vertical markets, commented Akihito Akiyama, product planning manager at Panasonic.
According to Mr. Akiyama, Panasonic has strengthened its 360-degree cameras by continuingly progressing at technology development, including dewarp, super dynamic function, and vandal resistance. With the solid technical base, the 360-degree cameras are capable for high-resolution image quality with even edges, stable performance under various lighting environments, and last but not least, durability.

AMGUK  
Fisheye cameras, compared to other types of cameras, offer a number of key advantages — monitoring of surround view without blind spot and reduction of installation cost and work — whilst still keeping high-resolution recording quality, David J. Myers, Technical Director of AMG, highlighted. AMG have noted that 360-degree fisheye cameras are becoming the mainstream when analog CCTV is gradually replaced by IP CCTV systems. 
“We are not sure that there is one particular market deploying the most 360 degree cameras. In the USA, the retail market is strong. And transportation is a natural market for wide-angle camera when one single camera can cover whole view of a bus, or a train carriage,” Myers said. “Banks, schools, colleges, museums, and public buildings are also the target market of 360-degree cameras. So are car parks and outdoor perimeters.”

-I would like to thanks Michelle Chu from Asmag

Friday, May 23, 2014

Multi-factor authentication (MFA)

Multi-factor authentication

Multi-factor authentication is a method of multi-faceted access control which a user can pass by successfully presenting authentication factors from at least two of the three categories:
Knowledge factors (“things only the user knows”), such as passwords or passcodes;
possession factors (“things only the user has”), such as ATM cards or hardware tokens; and
inherence factors (“things only the user is”), such as biometrics,
(e.g. a fingerprint or retina scan)

Knowledge factors are the most commonly used form of authentication. In this form, the user is required to prove knowledge of a secret in order to authenticate, such as a password.

A password is a secret word or string of characters that is used for user authentication. This is the most commonly used mechanism of authentication. Many multi-factor authentication techniques rely on password as one factor of authentication. Variations include both longer ones formed from multiple words (a passphrase) and the shorter, purely numeric, personal identification number (PIN) commonly used for ATM access. Traditionally, passwords are expected be memorized.

Many secret questions such as “Where were you born?”, are poor examples of a knowledge factor because they may be known to a wide group of people, or be able to be researched.
Possession factors include both connected and disconnected tokens. Connected tokens are devices that are physically connected to the computer to be used, and transmit data automatically. There are a number of different types, including card readers, wireless tags and USB tokens. Disconnected tokens have no connections to the client computer. They typically use a built-in screen to display the generated authentication data, which is manually typed in by the user.

Inherited factors are usually associated with the user, and typically include biometric methods, including fingerprint readers, retina scanners or voice recognition.
Requiring more than one independent factor increases the difficulty of providing false credentials. Two-factor authentication requires the use of two of three independent authentication factors, as identified above. The number and the independence of factors is important, since more independent factors imply higher probabilities that the bearer of the identity credential actually does hold that identity.


Multi-factor authentication is sometimes confused with “strong authentication”. However, “strong authentication” and “multi-factor authentication”, are fundamentally different processes. Soliciting multiple answers to challenge questions can typically be considered strong authentication, but, unless the process also retrieves “something the user has” or “something the user is”, it is not considered multi-factor authentication.

Wednesday, May 21, 2014

Accepting Real-World Access Control Challenge

I write about change quite a bit because I am fascinated with all of the various elements that make change both interesting and dreaded by most people. To write about a subject, many writers research the subject matter they are tackling. I do this too, but I prefer hands-on experience. Reality changes in a hurry in our business world. What can this principle teach us in the world of convergence security technology?
Plenty, if it means you have the responsibility of delivering sustainable security solutions your customers count on every day. So let’s use a real-life example to more closely examine the tactical side of security. The challenge was to design, sell, install and commission a replacement of a 30-year-old+ mag stripe electronic access control system with a new IP-based system. Now, for plenty of you this challenge is a walk in the park, part of your everyday security business life. For others, it is not — including yours truly. Yes, I have security system integrator experience with a large company and founded an IP video integration company, but it’s been a few years since I strapped on a 33-inch tool belt. Wisdom and waist size have both grown a bit over the years, but that didn’t stop me. I was up to the challenge and charged forward.
Changing the Mindset on Decades-Old Ways
What I know about security technology from an application and elemental building blocks perspective is much different than putting the IP system puzzle pieces together onsite at 5:30 a.m. because the customer opens for business at 11 a.m. Ladders are unsightly, liability increases and the business operations are impacted — not to mention dropping fiberglass from the ceiling tiles into someone’s glass of beer.
The pressure of doing an IP installation properly in the correct sequence, and coordinating other contractors and supplier support while wrestling with old technology, is as close to “ground truth” as you can expect in the civilian world. Schedules and timing are important when you cut over an access control system. The old system has to continue operating while a new system is readied to take over the workload on a very specific date (no pressure here to get it right!). Now add to this the expectation of your customer for a significant operational improvement and you are involved with a bare-knuckle fight with change. Did I mention that I love a good challenge with change?

Here’s how this installation tale began. An acquaintance is a controller for a chapter of a large, well-known fraternal organization that has thousands of chapters worldwide. And he is not just any controller ... he was recognized nationally in 2012 as the best in the country, a guy who knows a thing or two about business and return on investment. He knew I worked in the security field so we started talking about the mechanics and costs of membership-based organizations that restrict/permit access based on bylaws and being current with their dues. Now add some size to this challenge. This particular chapter has approximately 800 male and female members, each with separate requirements.
So how were they managing access privileges? Every year the chapter needed to order new magstripe cards for all its members. This is an old credentials technology, so you can understand some of the cost factors. These credentials had to be replaced every year when membership dues were due. To this cost add the management time for physically handing over a new credential once dues were paid. This process has obviously worked for 30+ years, but what would the future look like for 30-year-old+ magstripe readers and 24VAC electric strikes? How long would they last? Could they even be repaired? How long could they disrupt operations if they did fail? Perhaps it is time to consider a change in electronic access control technology and upgrade the system.
Analyze Your Recommended Technology Applications to Ensure They Are Appropriate
I initially recommended a biometric solution since it would entirely eliminate the cost and management of card credentials. I like cool technology that is affordable and reliable (and I just wrote about this technology a few months ago, noting that it is an obvious solution to recommend).
But not so fast — remember, blindly recommending the application of technology can be dangerous, as well as narrow-minded and myopic. Does this sound like anyone you know or work with perhaps? We all are guilty of sticking with a “true blue” product or supplier because it is the path of least resistance. Guilty as charged.
How can you avoid the automatic product choices in your comfort zone? Ask the right questions. While biometric fingerprint technology is affordable and reliable, it isn’t a panacea. There is a large percentage of chapter membership groups that evolved in the late 1950s, and using new technology can be intimidating and less effective with their older members. Consider the lifetime use of older members’ hands and the gradual deterioration of their skin.
Biometric fingerprint technology has come a long way in the past five years but still has its limitations. What about facial recognition biometrics? Yes, the technology does work better in this application, but consider the perception of the older members and their comfort level of using card credentials for the past 30+ years vs. presenting their face to a reader or camera … it might feel a bit Orwellian, no?
Applying new technology and, more importantly, the right technology means asking your prospect/customer the right questions then considering the impact of change your solution delivers.
In this particular installation challenge, what was the best choice? An RFID credential solution made the most sense from a cost, application and functionality perspective. With several good choices for reliable IP access control systems I chose a new supplier, breaking out of my comfort zone, that I had done some consulting with to test my thinking.
I started by asking the appropriate questions to ensure the technology would fit the application. For example, how simple would it be to manage from a customer’s perspective? How cost effective would it be now and in the future? Once I got the answers I needed, it was time to kick the tires and light the fires.
The hardware and software components were fairly straightforward and not overly complex to process. Actually they were quite simple, and who doesn’t love simple? The documentation gets a C+ in my book and has room for improvement.
The supplier’s customer support in the field at crunch time — you know, when the customer is looking over your shoulder — was an A. The price vs. value delivery was in the A+ range, allowing me to provide additional spare parts and lots of extra credentials, which all IP systems you sell should absolutely have. This will ensure that any future service or maintenance will be fast, which is especially pertinent for electronic access control installations. What other challenges should you consider?
Thanks to Mr. Paul Boucherle for help.

Sunday, May 11, 2014

What is difference between ORACLE and SQL-SERVER

What is difference between ORACLE and SQL-SERVER ?

1. Oracle runs on many platforms, SQL on Windows only.
2. Oracle includes IFS (Internet File System), Java integration; SQL is more of a pure database.
3. Oracle requires client install and setup (Not difficult, but very UNIX-like for Windows users)
4. SQL is #1 in Cost/Performance and overall Performance, although Oracle will refute that.
5. Replication is much easier in SQL.
6. Failover support in SQL is much, much easier
7. JDBC support is much better in Oracle, although Microsoft is working on it 
8. ODBC support in both.
9. SQL is ANSI-SQL '92 compliant; making it easier to convert to another ANSI compliant database, theoretically anyway (truth is every database has proprietary extensions). Oracle is generally more proprietary and their main goal is to keep their customers locked-in.
10. SQL natively supports ODBC, OLEDB, XML, XML Query, XML updates. Oracle natively supports proprietary connections, JDBC. Not sure about XML support though.
11. SQL Server is much easier to administrate, with GUI and command- line tools. Most of Oracle is command-line (Back in SQL, 12 days I had a customer (at Kolkata) who was so proud that after a day's worth of work he had managed to script his database. I showed him how it was a 3 click operation in SQL.
12. Oracle requires add-ons for transaction monitors, failover, etc. SQL has COM+, uses NT clustering and generally has everything built-in.
13. SQL Analysis Services is included (A very powerful OLAP server). For Oracle it is a separate purchase.

Hope this post help you to select right database for your Access Control System, Attendance System, Video Analysis etc.