In the security monitoring industry to mention the concept of "cloud", not chasing fashion, but standing in the entire security monitoring industry development trend, security monitoring system of User demand analysis, "cloud computing" and other technologies such as in-depth understanding of the use of the concept, after in-depth research and argumentation, will be "cloud computing" the essence of Thought, Integrated into the Security monitoring System design framework.
"Cloud computing" contains a lot of new technologies and ideas, for the security monitoring industry, with an open and positive posture, absorbing the "cloud computing" technology is the essence of a suitable and wise choice. Not all new technologies and ideas, in the current is suitable for the security monitoring industry, security cloud characteristics and core idea is through the idea of virtualization, the realization of cloud storage and on demand, through the bus architecture, to achieve in-depth information fusion sharing linkage, through service-oriented architecture, to achieve thin client. At present, the virtualization and SOA architecture in "cloud computing" combined with technology, openness rather than the concept of liberalisation, in the current and future period, security monitoring is a good development of effective driving force. From the "cloud" already have IaaS, PAAs and SaaS technology and extended business model, can be used as a reference for security monitoring industry development.
Many IT companies proposed cloud computing, more is to try to deploy cloud computing platform system, for more users to provide leasing or other means of cloud services, through centralized management, division deployment, unified maintenance, etc., to achieve users, especially enterprise users of it hosting services. In more cases, it is a public cloud or a mixed cloud. Security Cloud is more private cloud. The two are interlinked in some core technical concepts.
"Into the cloud" security companies to do?
Security monitoring digital, network development direction, more and more clearly clear, this change, the direct impact on users, is to narrow the user side and monitor the distance sense of the front end. Monitoring the front-end and monitoring center between the user and Monitoring center, can be based on the actual situation, choose a variety of network methods, including Wired, wireless, with a variety of network infrastructure constantly improve the security monitoring applications are more and more. In fact, some advanced security monitoring system, already can bring 5W service to users, that is, users can at any time, anywhere, using any terminal, through any network, see any information with permissions.
Security monitoring system, the first must have digital, networked, in order to "walk in the Clouds", so for the simulation of security monitoring system, need to first digital and networked upgrades. In addition, for the user client, the cloud of a basic idea is "thin client", will be more computing and service deployment in the background, and the client's hardware and software requirements more and more simple and convenient, so it is necessary in the original security monitoring system for the redefinition of the structure and division of work. At present, whether from customer demand or technical support, are satisfied. In the direction of improvement, we need to gradually clarify the relationship between the user needs, the original system and the upgraded part, and grasp the scale of the gradual implementation.
Cloud technology to go into security can better meet the needs of users
User demand is always the industry market, technology development of the original driving force. For the security monitoring industry, the user needs more and more diverse. To video surveillance For example, the original user needs can be seen, and later developed to be able to see clearly, now more and more developed to be able to see well. What is good? Network Video Surveillance Scale is more and more large, rely on a person on duty on a long time work mode, has been unrealistic. However, in case of emergency, it needs to be found in time, linkage alarm, and afterwards can obtain "useful" information from massive data. These requirements require us to adopt new technologies.
"Cloud technology" in the bus architecture of the multi-system collaboration, a variety of subsystems related to the depth of information fusion operations, service-oriented architecture, can provide security monitoring industry development.
"Intelligent" is also born in the user's actual needs, security monitoring system is more and more large, integrated subsystems are more and more, if there is no "intelligent" technology to join, security monitoring system will become more and more poor usability, in fact, this is the industry to put forward the combination of civil air defense, physical defense, technology and defense is part of the reason. Cloud technology, you can have a lot of technical essence, promote the development of intelligent security monitoring, such as the overall sense of the front-end, on-demand deployment, the central information sharing linkage, are to promote intelligent security monitoring system design and construction of advanced technology.
Cloud technology, to the security monitoring system architecture, equipment deployment and so on to bring far-reaching impact. The most important change is to improve the resource utilization of unit equipment. As a simple example, the average of 10 hours of work per day, the average performance of 30% equipment, may become an average of 20 hours a day, the average performance of 50% of the working mode, so in terms of the energy consumption of individual equipment will increase, but because of the changes in system architecture, In the overall scale of security monitoring to a certain extent, the total number of equipment will be reduced. So from the overall security monitoring system energy consumption, there will be a critical point, above the critical point, the overall energy consumption is reduced, the critical point, there may be increased energy consumption.
(Responsible editor: The good of the Legacy)