SensoScientific – Temperature censor on WIFI platform

SensoScientific, Inc. is fast becoming an industry leader in pushing the boundaries of detection technology. With the release of our newest WIFI product line we are introducing not only a State of the Art Web-embedded WIFI platform technology, that provides for precise measurement and data logging of temperature and humidity, plus we have raised the bar to allow our clients to measure ANY process or condition with a highly accurate WIFI transmitter. This allows access to your data from any web browser in the world, all without the need for costly stand-alone computers and proprietary software and virus protection updates. With its advance notification services it automatically, and immediately, sends SMS, Voice & Data, Email or Text message alerts to any number of necessary personnel in the case of a temperature failure, and fully documents the user through the corrective action necessary to meet regulatory and audit requirements.

  • 100% web/wireless embedded technology
  • Digital sensors
  • Any user, with a valid ID and password, equipped with a web browser can access any device
  • Current temperature readings
  • Equipment performance reports(monthly/yearly)
  • Monthly, weekly and daily reports
  • Graphical temperature trend analysis
  • Alert and corrective action history
  • Automatic temperature reports by email
  • Allows for automatic and scheduled backup
  • Ensures regulatory compliance for Joint Commission, HACCP, AABB, and CAP, and is 21 CFR Part 11 complaint

To know more, Click here

 

Mount ISO image on Virtual server

If you ever planning to mount ISO image rather than inserting CD for software installation, this is how you do.

  • Open  the Hyper-V console
  • Select the Virtual machine you want to mount the image
  • Choose the Settings from the right side panel (as shown below)
  • Select the DVD drive from the Left panel
  • On the right panel, select image file
  • Browse the ISO image file path
  • Click OK

Network Camera – Installation tips

What is IP-Surveillance? IP-Surveillance is a term for a security system that gives users the ability to monitor and record video and/or audio over an IP (Internet Protocol-based) computer network such as a local area network (LAN) or the Internet. In a simple IP-Surveillance system, this involves the use of a network camera (or an analog camera with a video encoder/video server), a network switch, a PC for viewing, managing and storing video, and video management software.

Indoor or outdoor. Outdoor network cameras must have an auto iris lens to regulate how much light is received. Many outdoor cameras require a protective housing. Others may already be designed with a protective enclosure. Housings are also available for indoor cameras that require protection from harsh environments such as dust and humidity, and from vandalism or tampering. A network camera with built-in wireless support is a consideration when running a cable between a LAN and a network camera is impractical, difficult or expensive. Wireless network cameras are suitable for use in outdoor situations, in environments such as historic buildings where the installation of cables would damage the interior, or in cases where there is a need to move cameras to new locations on a regular basis, such as in a supermarket. Ensure that the wireless network camera supports security protocols such as IEEE 802.1X and WPA/WPA2 (Wi-Fi Protected Access), which will help secure the wireless communication.

A megapixel network camera (i.e. one that delivers an image comprised of 1 million or more pixels) can also offer resolutions greater than what an analog camera can offer, which means that more detail or larger areas can be covered. High image quality is essential in a security surveillance application. You want to be able to clearly capture an incident in progress and identify persons or objects involved. In a network video system, the quality of images produced can be more easily retained than in an analog surveillance system. A network camera that uses progressive scan technology provides clearer images of moving objects because the whole image is presented at one time. With an analog video signal, two consecutive interlaced fields of lines are presented to form an image, and when displayed on a PC monitor, blurriness occurs when objects move between the image capture of the two interlaced fields.

PoE enables networked devices to receive power from a PoE-enabled switch or midspan through the same standard cable that transmits data (video). Power over Ethernet (PoE) (IEEE 802.3af) When a network camera supports this feature, it means that the camera can receive power through the same cable as for data. Hiring a certified electrician and installing a separate power line are not needed—a big advantage, particularly in difficult-to-reach areas. With PoE, network cameras/video encoders will also be able to receive centralized backup power from a server room with an Uninterruptible Power Supply; so in the event of a power failure, the cameras/video encoders will still be able to operate.

Network management features: They include support for Quality of Service (QoS), which can prioritize and reserve network capacity for mission-critical surveillance in a QoS aware network, and support for Internet Protocol version 6 (IPv6) in addition to IPv4 addresses. Network switches allow devices such as network cameras, servers and PCs to communicate with each other to share information and, in some cases, a common Internet connection. Network designs can take many forms and may vary in terms of performance and security. First, determine what your company is using the network for and how congested your local area network (LAN) or wide area network (WAN) is. If you are implementing a smaller surveillance system involving 8 to 10 cameras, you should be able to use a basic 100-megabit (Mbit) network switch (Now a days gigabit switches are more cheaper to buy) without having to consider bandwidth limitations. With more than 12 to 15 cameras, you should consider using a switch with a gigabit (Gbit) backbone. If a gigabit-supporting switch is used, the server that runs the video management software should have a gigabit network adapter installed on the running machine. When running wireless camera, make sure the AP supports gigabit, inorder to avoid slow frames.

Remote accessibility: You can access live and recorded video at any time and from virtually any networked location in the world. Multiple, authorized users at different locations may be able to access live or recorded video. This is advantageous if your company wants a third-party, such as a security firm, to benefit from and have access to the video.

Hardware (server, softwareand storage): The hardware requirements of an IP-Surveillance system are not complex. Simply use standard components found in the IT industry. Today’s PC, with a Pentium processor and Windows operating system, is able to run a video management software, and record and store video from up to 50 cameras. If the hard disk on the actual server running the recording application is not enough, there are solutions that enable you to increase storage space and achieve increased flexibility and recoverability. As larger hard drives are produced at lower costs, it is becoming less expensive to store large amounts of video. A wide range of software is available to help you in the preparation, installation and management of an IP-Surveillance system Eg: Axis Camera Management, if you buy Axis cameras, Video Insight etc.

H.264 Storeage calculation:

  • Bit rate / 8(bits in a byte) x 3600s = Kilobyte (KB) per hour / 1000 = Megabyte (MB) per hour
  • MB per hour x hours of operation per day / 1000 = Gigabyte (GB) per day
  • GB per day x requested period of storage = Storage need

MPEG-4 calculation:

  • Bit rate / 8(bits in a byte) x 3600s = KB per hour / 1000 = MB per hour
  • MB per hour x hours of operation per day / 1000 = GB per day
  • GB per day x requested period of storage = Storage need

Motion JPEG calculation:

  • Image size x frames per second x 3600s = KB per hour/1000 = MB per hour
  • MB per hour x hours of operation per day / 1000 = GB per day
  • GB per day x requested period of storage = Storage need

Legal considerations: Video surveillance can be restricted or prohibited by laws that vary from country to country. It is advisable to check the laws in your local region before installing a video surveillance system. You may need to register or get a license from an authority to conduct video surveillance, particularly in public areas. You may have to place signs to warn the public that they are entering a zone covered by surveillance equipment and there may be rules regarding the signage. Video recordings, for instance, may be required to have time and date stamped.

PTZ network cameras: The camera’s view can be remotely controlled, either manually or automatically, for panning from side to side, tilting up and down, and zooming in and out of an area or object. There are now mechanical as well as non-mechanical PTZ cameras.

Automatic day/night functionality: This feature is incorporated into some outdoor cameras and enables the automatic removal of the infrared (IR) cut filter that is incorporated into all color cameras to prevent color distortion from near-infrared light. When there is light, the IR-cut filter is on and the camera delivers color video. In dark conditions, the camera removes the filter to make use of near-infrared light to deliver infrared-sensitive black and white video. Infrared or day/night cameras are particularly useful in outdoor environments or situations that restrict the use of artificial light. These situations include discreet and covert surveillance applications.

Minimum illumination/light sensitivity: A network camera’s light sensitivity is often specified in terms of lux, which corresponds to a level of illuminance in which a camera produces an acceptable image.

Type of video compression: There are three main video compression standards in use today. Motion JPEG, MPEG-4 and H.264. H.264 is the latest standard that is expected to become the video standard of choice in the coming years. Without compromising image quality, H.264 can reduce bandwidth and storage requirements by more than 80 percent compared with Motion JPEG and as much as 50 percent more than with the MPEG-4 Part 2 standard.

Enjoy!!!

Microsoft System Centre 2012 – A new look

Game Changer – with System Center 2012, you get the most cost effective and flexible platform for managing your traditional datacenters, private and public clouds, and client computers and devices.

Microsoft System Center 2012 Configuration Manager and System Center 2012 Endpoint Protection provide a unified infrastructure to manage and protect physical, virtual, and mobile client environments, helping IT:

  • Empower users to be productive from anywhere, on whatever device they choose.
  • Provide a unified infrastructure for client management and protection.
  • Make it easier and faster to administer client systems and maintain system compliance.

Deliver flexible, cost-effective infrastructure using what you already own

Products included

  • System Center 2012 Unified Installer is a utility designed to perform new, clean installations of System Center 2012 for testing and evaluation purposes only.
  • System Center 2012 App Controller provides a common self-service experience across private and public clouds that can help you empower application owners to easily build, configure, deploy, and manage new services.
  • System Center 2012 Configuration Manager provides comprehensive configuration management for the Microsoft platform that can help you empower users with the devices and applications they need to be productive while maintaining corporate compliance and control.
  • System Center 2012 Data Protection Manager provides unified data protection for Windows servers and clients that can help you deliver scalable, manageable, and cost-effective protection and restore scenarios from disk, tape, and off premise.
  • System Center 2012 Endpoint Protection, built on System Center Configuration Manager, provides industry-leading threat detection of malware and exploits as part of a unified infrastructure for managing client security and compliance that can help you simplify and improve endpoint protection.
  • System Center 2012 Operations Manager provides deep application diagnostics and infrastructure monitoring that can help you ensure the predictable performance and availability of vital applications and offers a comprehensive view of your datacenter, private cloud, and public clouds.
  • System Center 2012 Orchestrator provides orchestration, integration, and automation of IT processes through the creation of runbooks that can help you to define and standardize best practices and improve operational efficiency.
  • System Center 2012 Service Manager provides flexible self-service experiences and standardized datacenter processes that can help you integrate people, workflows, and knowledge across enterprise infrastructure and applications.
  • System Center 2012 Virtual Machine Manager provides virtual machine management and services deployment with support for multi-hypervisor environments that can help you deliver a flexible and cost effective private cloud environment.

Heterogeneous support

  • System Center 2012 enables you to integrate a wide range of technologies into a coherent private cloud:
  • Manage different hypervisors centrally from a single pane of glass with support for Windows Server Hyper-V, VMWare vSphere, and Citrix XenServer.
  • Monitor Windows Server, Sun Solaris, and various Linux and Unix distributions.
  • Integrate toolsets from HP, CA, BMC, EMC, and VMware into automated workflows.

 Download the trial (180days) System Centre 2012…Click here

Articles you may interest in

Enjoy!!!

 

Microsoft® SQL Server® 2012 Performance Dashboard Reports

The SQL Server 2012 Performance Dashboard Reports are Reporting Services report files designed to be used with the Custom Reports feature of SQL Server Management Studio. The reports allow a database administrator to quickly identify whether there is a current bottleneck on their system, and if a bottleneck is present, capture additional diagnostic data that may be necessary to resolve the problem.

Common performance problems that the dashboard reports may help to resolve include:

  • CPU bottlenecks (and what queries are consuming the most CPU)
  • IO bottlenecks (and what queries are performing the most IO)
  • Index recommendations generated by the query optimizer (missing indexes)
  • Blocking
  • Latch contention

The information captured in the reports is retrieved from SQL Server’s dynamic management views. There is no additional tracing or data capture required, which means the information is always available and this is a very inexpensive means of monitoring your server.

Few report examples

Apple World Wide Developers Conference – 2012

WWDC 2012…Scheduled between June 11 and 15 at San Francisco’s Moscone Center, the conference has been known for launching Apple’s newest products, software, and technologies. Rumors circulating around the web are pointing towards a MacBook Pro refresh, the release of OS X Mountain Lion and announcements surrounding the hotly anticipated release of iOS 6, Apple’s reported next-generation mobile operating system…etc. Mountain Lion is one of the highlights of WWDC 2012, and with the new operating system, Apple might announce the redesigned MacBook Pro that sports the MacBook Air-like design (with no optical drive) and will come with a new processor, a new iSight camera and might ship with 4G LTE support…..

Enjoy!!!

Microsoft SQL Server 2012

Editions overview

The SQL Server 2012 Editions have been streamlined to better align with how customers are deploying applications and solutions.  SQL Server 2012 will be released in 3 main editions*:

  • Enterprise for mission critical applications and large scale data warehousing
  • Business Intelligence, a new product edition, providing premium corporate and self-service BI
  • Standard for basic database, reporting and analytics capabilities

Refer to Datasheet and FAQ for more details

Top Features

  • AlwaysOn Availability Groups
  • Windows Server Core Support
  • Columnstore Indexes
  • BI Semantic Model
  • User-Defined Server Roles
  • Enhanced Auditing Features
  • Sequence Objects
  • Enhanced PowerShell Support
  • Distributed Replay
  • PowerView
  • SQL Azure Enhancements
  • Big Data Support

 

 

 

Seagate® Constellation® ES fourth-generation drives

Among 3TB enterprise drives, Constellation® ES.2 features the lowest operating power in the industry — less than 11.3W on average. Also, Constellation ES drives enable further power reductions with enhanced PowerChoice™ technology. Purpose-built for enterprise environments, the PowerChoice feature enables the T10-compliant power management standard for organisations to tailor systems for optimal energy usage. The result: up to 90% more power savings. Constellation ES drives offer a range of capacities along with two interface options: a traditional SATA 6Gb/s and the latest 6Gb/s SAS. Every generation of Constellation ES drives features the highest l vel of multi-drive reliability for a 24×7 capacity-optimised drive experience.

  •  1.2M MTBF and 0.73% AFR
  • Data is stored accurately with SAS-based advanced error detection and correction
  • Best-in class rotational and linear vibration tolerance ensures consistent, reliable data access and performance in multi-drive systems
  • Multi-drive firmware maximised for enterprise system availability.

Constellation ES.2 Hard Drive Data sheet…click here

Perfect when you need to:

  • Maximise capacity for bulk data centre solutions
  • Build mainstream enterprise external storage arrays (SAN, NAS, DAS)
  • Create high-capacity cloud storage
  • Store data from centralised surveillance systems
  • Simplify drive life extension and retirement strategies
  • Back up and Restore — D2D, Virtual Tape

What do you get?

  • Highest capacities and best power efficiencies available in a 3.5 inch enterprise-class nearline drive
  • Unparalleled energy efficiency
  • Self-Encrypting Drive and FIPS 140-2 SED options
  • SAS-based, end-to-end data integrity and enhanced error correction for accurate data storage