TITLE

Four Steps to Make IP Video ROI Friendly

AUTHOR(S)
Shark, Steve
PUB. DATE
May 2007
SOURCE
Security: Solutions for Enterprise Security Leaders;May2007, Vol. 44 Issue 5, p60
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses how to implement video surveillance through an Internet Protocol (IP)-based solution to improve return on investment. The four key areas of the solution include software, hardware, networking and site assessment. Scalability, usability and accessibility are important features needed for software. The author also provides tips on how to select appropriate hardware needs like cameras and computers. He also suggests a thorough inspection of the surveillance site.
ACCESSION #
25018081

 

Related Articles

  • On Testing IPv6 in Small ISP's Networks. Sienkiewicz, Konrad; Gajewski, Mariusz; Batalla, Jordi Mongay // Journal of Telecommunications & Information Technology;2011, Vol. 2011 Issue 2, p37 

    No abstract available.

  • FOUNDRY NETWORKS LAUNCHES IPV6 ROUTING UPGRADE.  // Computer Protocols;Jun2008, Vol. 21 Issue 6, p3 

    The article reports on the launch of IronWareâ„¢ software release 4.1.00 and IPv6 routing upgrades by Foundry Networks Inc. The upgrades are intended for the company's FastIron Edge X/XE and FastIron Super X/SX IPv6 hardware-ready models. IPv6, considered as the next generation Internet...

  • Troubleshooting the Network. Engebretson, David J. // SDM: Security Distributing & Marketing;Nov2010, Vol. 40 Issue 11, p65 

    The article focuses on the installation and management of physical security equipment run by Internet Protocol (IP). It states that IP-based security devices will not be functional if not connected with a local area network (LAN). It also adds that problems dealing with the installation phase of...

  • Analytics improve IP surveillance. Doron, Dvir // Communications News;Dec2007, Vol. 44 Issue 12, p26 

    The article examines why IP-based hardware edge devices, such as IP cameras and encoders, can sidestep network performance issues. Companies that deploy an edge device is one method to reduce the strain on the network in terms of system requirements and bandwidth. The article explains that...

  • Debate.  // SC Magazine: For IT Security Professionals (UK Edition);Dec2005, p17 

    This article presents contrasting views of two information technology executives on the use of Internet Protocol (IP) telephony in the infrastructure of organizations. Tim Keanini of nCircle comments that IP telephony can be used in the infrastructure. He argues that VoIP might not be considered...

  • Juniper pitching big switch, fast apps: IP WAN acceleration box promises cost savings. Greene, Tim // Network World;10/16/2006, Vol. 23 Issue 40, p1 

    The article reports on various hardware and software from Juniper, which are aimed at speeding up remote-site and data center traffic as well as help customers reduce hardware and save money. The company will launch Internet protocol wide area network (WAN) acceleration appliances that boost...

  • New offerings to enhance card usage.  // Automatic I.D. News;Aug99, Vol. 15 Issue 9, p27 

    Presents several products in the computer industry in the United States. Includes Mag-Tek Device Drivers, OPOS ActiveX controls, MT-95 HiCo Card Encoder and Card Present by Mag-Tek Inc.; Visa Open Platform, a system architecture by Fargo Electronics; ID Card Maker computer software by Polaroid.

  • States of interdependence.  // Australian Personal Computer;Jun96, Vol. 17 Issue 6, p108 

    Stresses the need to provide different departments within an organization with basic networking, applications and hardware. Requirements from a basic network system; Simplicity of application services; Considerations in choosing a database software.

  • Develop Both Remote Measurement Systems and Data Servers with Measurement Studio.  // Instrumentation Newsletter;Feb2001, Vol. 13 Issue 1, p17 

    Features Measurement Studio, a software used to monitor and control computer hardware via the Internet in the United States. Details of complexities of low-level TCP and UDP programming; Specifications of the architecture to minimize network traffic; Integration of necessary tools to automate...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics