To embed or not to embed

October 2002 Surveillance

PC-based systems generally have a higher development rate than that of embedded technology, and as a result these products often have an advantage over embedded units in their feature offering.

However, according to Ultrak, this being said, the fundamental video management criteria have been met within various embedded DVRs available today. These fundamentals are frame rates, effective compression resulting in efficient long-term storage, storage medium flexibility, remote software via network, ISDN or PSTN medium.

Furthermore, Ultrak believes that a system's design should not revolve around the technology as such but rather the technology should be appropriate for the solution. According to the company, PCs have been designed as general-purpose devices and as a result there are many processes occurring in the background that are often not relevant to the actual systems application. This along with viruses and finger trouble may result in potential 'hang ups'. "Dedicated systems or embedded technology on the other hand only run dedicated operations, cannot read common PC viruses and finger trouble will generally not cause any major harm," says Ultrak.

Mission-critical

Security systems are mission-critical and render themselves useless if they crash. As a result there has always been a large emphasis placed on the offline capability of technology-based security systems. The prime reason for this trend, says Ultrak, is that the market users feel more confident in having the mission-critical aspects of their security systems managed by dedicated 'embedded' systems. "The biggest example of this can be found in the access control arena," says the company. "Access control systems appear more mission-critical to CCTV systems to many users. The prime reason being that in the event of a failure it is well known to the user as the access point is either locked or wide open. Although the user may not be as aware of the mission-critical element of the CCTV system it does not make it less so. It is generally only when critical video footage is required that this becomes apparent."

Ultrak believes that both the PC and embedded platforms have a critical role to play in the overall system solution. However, it is logical to use both of them in their areas of strength and try reducing reliance on their weak aspects.

"The history of access control systems have proven this by relying on embedded technology to run the mission-critical 'offline' aspect of the system and the PC and network environment to take care of database management. The PC and its flexible network environment come into their own when it comes to drawing reports and managing data, etc by multiple users on multiple sites simultaneously. Should the network, however, 'crash' or be shut down for any reason the critical data storage and mission-critical processes continue.

"The question is, 'Why should CCTV systems be any different?'" asks the company. "As mentioned above, security CCTV systems are just as mission-critical as access control systems. Therefore use the strength of both platforms by designing the CCTV system with the 'offline' aspect in mind."

Video management

Ultrak goes on to state that video management is not always used in a security application and often only used for various management processes. "In these applications, the system may not be mission-critical. It also may very well require customised database management that may not be found in the embedded environment making a PC-based solution more appropriate. Embedded technology requires volumes to make the manufacture thereof economically viable. Naturally with this borne in mind the manufacturers have to apply the 80%/20% principle. Embedded DVRs will continually increase in offering and decrease in price, making them more and more attractive for security-based video management. PC-based operating systems are certainly becoming more reliable and their flexibility definitely has the edge for specialised and customised management applications.

"We at Ultrak have found that the market has been confused by the variety and nature of DVRs available. All too often clients are not sure what priority to place on the various aspects of the DVRs they are assessing. The focus should primarily reside in the benefits of the system as opposed to the features."

According to the company, the list below should be the order of priority when selecting a CCTV solution primarily used for security purposes:

* Operating system - embedded (RTOS) or PC-based - critical to the reliability of the system.

* Frame rate - irrespective of picture quality, the picture cannot be viewed if it is not there.

* Picture quality - often resolution is confused with useable picture quality. A higher resolution in pixel rating can often produce a poorer picture quality than a lower pixel rating that is compressed more effectively.

* Compression method - the efficiency of storage is critical to network bandwidth and storage limitations affecting the overall system cost.

* Auto archiving - critical, as second to the operating system, the next weakest link is the hard drive. As in various raid set-ups it is a good idea for the system to allow for the duplication of recordings to two hard drives.

* Networkability - the system should be networkable. The system's flexibility is not decided by the choice of operating system but rather its network limitations.

* Archive ability - efficient compression and increased hard drive size limits the need for mass archiving. However, valuable incidents may need to be stored in a less volatile medium such as a CD. The networkability of most good systems available today automatically offers this flexibility.

"Naturally," says Ultrak, "one may add to this list of priorities for specific applications. However, when it comes to good reliable video management for security purposes the above should be the deciding factors. Do not allow the icon on the left or right, colour of the screen or box, to confuse your decision."

For more information contact Ultrak SA, 011 608 2251, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Technews Publishing SMART Security Solutions Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
LiDAR protects railways from new and existing dangers
Surveillance
3D LiDAR (Light Detection and Ranging) sensors are being installed to monitor rail traffic and ensure safety of passengers as well as individuals walking near the tracks, or trying to perform dangerous stunts for social media.

Read more...
Securing South Africa’s logistics sector
Secutel Technologies Products & Solutions Surveillance Logistics (Industry)
Unlike traditional guarding services, Visual Verifier operates on an ‘Always On’ principle, ensuring continuous 24/7 coverage of warehouses, depots, transit hubs, and delivery points.

Read more...
Unlock the future of security operations in Bloemfontein
DeepAlert News & Events Surveillance
Security professionals and business leaders are invited to revolutionise their offsite monitoring operations at the DeepAlert Product Road Show, taking place on 16 – 17 September 2025, at the Schoemanspark Golf Club, Bloemfontein.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
Secure, modernise and optimise CCTV
Surveillance Products & Solutions
Industrial and commercial organisations are navigating complex digital transformation processes. With SecuVue, companies can bridge the gap between operational technology and information technology for safer, smarter operations.

Read more...
Eagle Eye Precision Person & Vehicle Detection
Surveillance Products & Solutions AI & Data Analytics
Eagle Eye’s new Precision Person & Vehicle Detection feature detects people and vehicles at long distances with high accuracy and is especially designed for customers who actively monitor for intruders

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.