TITLE

Video Surveillance Storage - New Ways to Solve Old Problems

AUTHOR(S)
Elliott, David
PUB. DATE
April 2010
SOURCE
Security: Solutions for Enterprise Security Leaders;Apr2010, Vol. 47 Issue 4, p52
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the changes in video surveillance systems in terms of storing data. It says that various changes have been made to improve storing video data, which is considered the camera's most utilized and significant function. The quality of video encryption using H.264 standard shows sign of good development which only requires less storage space. It also mentions the utilization of information technology (IT)-based network on video recorders and Internet protocol (IP) cameras.
ACCESSION #
50801061

 

Related Articles

  • Quantum leap. Seife, Charles // New Scientist;09/19/98, Vol. 159 Issue 2152, p23 

    States that two research teams have taken steps to overcome the problem of creating perfect copies of information stored in quantum computers. How ordinary computers store information; Quantum computers' use of quantum bits, or qubits to store information; How measuring qubits destroys the...

  • An Innovative Encryption Method for Agriculture Intelligent Information System based on Cloud Computing Platform. Wen Xue Tan; Chun Jiang Zhao; Hua Rui Wu; Xi Ping Wang // Journal of Software (1796217X);Jan2014, Vol. 9 Issue 1, p1 

    Along with a rapid growth of cloud computing technology and its deep application in Agriculture Intelligent Information System, Agriculture Industry information security and privacy has become a highlight of the issue about Agriculture Cloud Information System. Encrypting is a conventional...

  • Homomorphic linear authentication schemes from а-ASU2 functions for proofs of retrievability. Shengli Liu; Kefei Chen // Control & Cybernetics;2012, Vol. 42 Issue 2, p335 

    Proof of Retrievability (POR) refers to interactive auditing protocols executed between a storage server and clients, so that clients can be convinced that their data is available at the storage server, ready to be retrieved when needed. In an interactive POR protocol, clients initiate...

  • A Novel XOR-based Visual Secret Sharing Scheme with Random Grid. Pati, Ram Sekher; Nag, Amitava // Smart Computing Review;Oct2015, Vol. 5 Issue 5, p400 

    The basic concept of secret image sharing is to encrypt a secret image into a number of meaningless share images. Except for all the images, no information should leak out from any of the share images. The original secret image is printed onto transparencies, and stacking these transparencies...

  • Your guide to retrieving deleted files. Bradbury, Danny // Computer Weekly;6/19/2007, p44 

    The article discusses the guide in retrieving deleted files from the computer system. According to the author, simply hitting the delete key in the personal computers (PCs) or laptops will not completely erase the data from the system. He denotes that the forensic technology experts can find...

  • Security in the Ether. Talbot, David // Technology Review;Jan/Feb2010, Vol. 113 Issue 1, p36 

    The article discusses the significance of Elastic Compute Cloud (EC2) introduced by Amazon.com Inc. in 2006 in the U.S. It cites that cloud computing service was efficient, cheap, and accessible to individuals, companies, and government agencies. It mentions that cloud computing can mishandle...

  • Taking Ownership. Lemos, Robert // Information Security;Oct2015, Vol. 17 Issue 8, p23 

    The article reports on the partnership between the computer security service provider QuintessenceLabs and the financial services company Westpac Group for the deployment of quantum encryption to enhance the data security of the financial firm in Australia. It states that strategic investments...

  • Mobile device lockdown. Cummings, Joanne // Network World;3/19/2007, Vol. 24 Issue 11, p40 

    The article provides information on the five fundamental steps needed to guarantee data safety in mobile devices. According to the author, securing company data in needed to protect company's interest, resources and customers' welfare and to avoid any further damages that it may contribute. The...

  • IP video: Lower costs, greater capabilities.  // Casino Journal;Nov2009, Vol. 22 Issue 11, p68 

    The article focuses on the benefits of information processing (IP) systems in the gaming industry. It notes that IP can be safely integrated with access-control systems, point-of-sale devices or network video recorders to efficiently and intelligently manage data and video. Furthermore, IP also...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics