This document outlines the scope for a CCTV central monitoring system software application. The key aspects are:
1) The software will allow observers to monitor live and recorded video from 54 store locations from a central location and send alerts to store managers about any incidents.
2) It will integrate workflows for setting up reporting items, assigning observers to locations, and alerts for incidents.
3) The software will convert analog camera feeds to digital format and allow simultaneous viewing, playback, recording and archiving of video across the network. It will also include user authorization controls and settings for video quality.
Aftek provides services for verticals such as Telecom, Home Automation, Security Control, Transportation, Energy and Automotive.
We provide business solutions for Mobile and Wireless applications, Embedded systems, e-Business, Real-time applications, Enterprise applications and Networking.
Cellocator CelloFamily is a family of products offering enhanced fleet management, vehicle security and safety services, as well as advanced telematics applications and functionality.
Aftek provides services for verticals such as Telecom, Home Automation, Security Control, Transportation, Energy and Automotive.
We provide business solutions for Mobile and Wireless applications, Embedded systems, e-Business, Real-time applications, Enterprise applications and Networking.
Cellocator CelloFamily is a family of products offering enhanced fleet management, vehicle security and safety services, as well as advanced telematics applications and functionality.
Android Live Streaming Box
This presentation will help create a android streaming box with low cost. its business plan for Multi purpose Android box with technical
Media box with live streaming
Streaming multimedia application for mobile devices for audio & videoMike Taylor
Streaming Multimedia Application for Mobile Devices for interactive streaming of audio and video files, editing, manipulation & tagging platform for content distribution.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
2. Scope
This document covers the scope of the project forCCTV central monitoring system. The client requires a
software application which can convert the existing analog videos into digital format which shall be
continuously monitored by a team of observers. The client presently has 54 different store locations
where the cameras have been installed. The observers need to access all the videos in one location. The
observers should be able send alerts for any incidents observed to local store managers. Workflows to
setup the reporting items, assigning observers for each location and alerts for incidents have to
incorporated into the software. Our understanding for the various features required for this application
are given below:
Our Understanding
Overview
There will be a team of observers in the central monitoring unit who shall be assigned and
monitoring the surveillance cameras for specific number of stores. The number of cameras for all the
stores and their IP address will assigned to the specific observers. If there are any incidents found by
the observer while monitoring, they should be able to trigger an alert through the application and
alert the corresponding store managers.
The Digital Video Recording and Management Network Software shall meet the requirements of
business surveillance applications. The software shall be unique and power a line of Network Video
Recorders, Digital Video Recorders, Encoders/Decoders, IP Cameras and Workstations. The software
shall be available on CD-R format and provide a complete and comprehensive application for the
operation and maintenance of a video surveillance system. It shall provide full live digital video and
audio surveillance over a standard 100/1000Base-T network by the use of a GUI incorporating video
display areas, toolbars, control palettes, site/device lists and camera grouping lists.
Board: +91-80-49531111
Private & Confidential
www.sdlglobe.com
3. The software shall be available in two versions. One shall have full functionality except for recording
capability. The second shall have full functionality plus recording capability. Both version of the
software shall also be available preloaded in a workstation. The workstation shall be a preconfigured
PC ready to review and record (version dependent) video over a LAN, WAN and the Internet, with
proper registration.
The software shall offer network connectivity to other family components that share all video and
control data over the Ethernet network. The number of network-connected components is only
limited to the number of assigned IP addresses.
The software shall provide an open platform that allows integration with IP cameras, encoders
and IP edge devices, including megapixel cameras, from numerous industry-leading manufacturers.
It shall support Unicast or Multicast according to the edge device capability. Additionally, the
software interface shall have an integrated video intelligence. There shall be support for the GUI on
a widescreen monitor (16:9/16:10).
The software, without any degradation to video quality, shall simultaneously offer:
1.
2.
3.
4.
Multi-channel continuous video playback.
Multi -channel video playback transmission to the Ethernet network.
Multi -channel continuous video receiving from the Ethernet network.
Recording of multiple cameras on a single NVR, depending on resolution, quality
and fps settings.
5. User selectable video archiving of pre-existing recording.
The software shall employ a compression algorithm based on:
1. Optimized MPEG-4 and JPEG (Normal and Full).
2. User selectable levels of resolution (quality) depending on camera (see item
M.6) not requiring a need to restart the application or the digital video recorder.
It shall be selectable using a 4-position bar from the main screen. There shall be
4 levels of resolution (4 CIF, 2 CIF, CIF, and HCIF) with 2 levels of compression
comprising 8 quality levels total, which shall be accessible from the Setup menu
selections.
The networked system shall be comprised of:
1. The software platform.
2. Recorders including DVRs and NVRs.
3. PC workstations provided by the manufacturer or system owner as specified by
the manufacturer.
The software installed in both recorders and workstations shall be similar in:
Graphical User Interface, therefore an operator shall need to learn only one
interface for both control and programming of the system.
2. Functions, offering the ability to remotely configure most system components
from any recorder or workstation.
1.
Board: +91-80-49531111
Private & Confidential
www.sdlglobe.com
4. The software shall offer features including the simultaneous display, playback, distribution and
archive of multiple channels of video and audio. It shall collect multiple channels of analog video and
digitize them for the purpose of display, archive and requested distribution across the network.
Cameras, microphones and sensors shall be the primary analog input devices. Each channel of video
and audio data shall have the capability of being displayed, played back, distributed and archived
simultaneously across several servers and clients across the network. The software shall allow
recording (version dependent) and viewing at different frame rates (fps) without additional video
streams. Each sensor channel shall support a NO or NC device. The software shall also have full WAN
and Internet capability, offering expandability beyond a corporate LAN.
The software shall also offer a full multi-user authorization login application. This application shall
offer levels of authorization based on defined sites and functions. In addition, a full setup utility shall
be available for the Administrator to configure authorizations. The login window shall consist of a
User Name and Password field. A user shall be able to log in by default, as an Administrator or Guest.
Guest authorization shall be configurable for specific system operations. Authorization rights setup
shall be performed using the Site Authorization screen. Group rights shall be available to configure
by specific site. Rights shall provide authority to perform all system functions. The software shall
offer a full multi-user authorization process as follows:
1. User groups shall be created once globally and shall function in all components
connected to the network.
2. Users shall be created once globally and shall be given rights to particular
3.
4.
5.
6.
7.
groups.
Groups shall be authorized and given specific access to each unit, permitting
“function-specific” profiles.
Users created and authorized for each unit shall be able to log in to any recorder
and workstation and automatically have their group rights for that machine
follow them.
There shall be no virtual limit on the number of groups and users that can be
authorized in the software on DVRs.
The number of groups and users authorized on the IP cameras and
encoders/decoders will be limited to 20 groups and 100 users.
The software shall allow for each group to be authorized or denied access, per
component, to:
a. Login.
b. Logout.
c. Site List.
d. Setup.
1) Network Setup & Site Name
2) User and Group Management
3) Site Authorization
4) Auto Login
5) Macro Create-Edit
6) Alarm Setup
7) Authentication Settings
8) Camera, Microphone and Device Setup
9) Pre & Post Alarm
Board: +91-80-49531111
Private & Confidential
www.sdlglobe.com
5. Storage Database Utilities
Auto Record
Exit to OS
RS-232/422/485 Setup
Picture Quality and Resolution Setup
Registration
Manual Record and Playback Setup
Central Failure Notification
Recording Verification
Auto/Manual fps Setup
Texting and Email
Display Settings
Low Bandwidth
Language Translation Utility (LTU) Setup
Map Sets
Reset Nucleus
Backup and Restore
Settings Summary
Scheduler for Macros
Camera Grouping
I-Onyx and Third Party Cameras
Third Party Format
Video Analytics Engine
Reports.
1) Device Status
2) Alarm History
3) Recording Status
4) Audit Log
5) RVS Log
6) CFN Log
7) Save Logs
Scheduler/Macro.
1) Run Macro
2) Stop Macro
3) Stop all Macro & Scheduler
4) Resume Scheduler
5) Show Macro
Shutdown.
Manual Record.
Stop.
Video Quality.
Change fps.
Change Low Bandwidth.
Site Map.
Groups.
Picture.
Audio.
Controls.
Matrix.
10)
11)
12)
13)
14)
15)
16)
17)
18)
19)
20)
21)
22)
23)
24)
25)
26)
27)
28)
29)
30)
31)
32)
e.
f.
g.
g.
h.
i.
j.
k.
l.
m.
n.
o.
p.
q.
Board: +91-80-49531111
Private & Confidential
www.sdlglobe.com
6. r.
s.
t.
u.
Export Image.
Print.
PTZ.
Playback.
All users created shall be able to log in to any workstation on the system. A user, given appropriate
access, shall be able to remotely configure all components connected to the network. The
programming shall include the complete operation of the recorders, including but not limited to:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
Network Settings and Site Name.
Site Authorization.
Auto Login.
Storage Database.
Registration.
Macro Editor.
Schedule for Macros.
Alarms.
Manual Record and Quality Buttons on Screen.
Recording Verification.
Authentication.
Map Sets.
RS232/422/485 Controls.
LTU.
The Main Window shall provide the following:
1. The Site and Device List depicting all recorders, servers and workstations connected to
the network.
2. Within the Site and Device List, each unit shall be depicted with all connected devices
such as:
a. Cameras connected, differentiating between PTZ and fixed cameras.
b. Microphones.
3. A multi-screen display area that allows for screen displays of:
a. Single Camera
b. Quad
c. 3 x 3
d. 4 x 4
e. 6-way
f. Full screen of any of the above selected multi-screens shall allow for the viewing of
the particular multi-screen in full screen mode by hiding the graphical user interface.
Access to programming and more advanced screens shall be done by means of an immobile,
permanently docked toolbar located on the top live screen. The toolbar shall provide access to the
following major functionality of the system:
1.
2.
3.
4.
The Scheduler/Macro.
Reports.
Setup.
Logout and Shutdown buttons.
Board: +91-80-49531111
Private & Confidential
www.sdlglobe.com
7. The software shall provide an advanced method for creating and executing extensive software
commands. This shall be achieved by the use of macros. Macro configuration shall be defined for
recorded cameras and microphones, command duration, recording location (version dependent),
local viewing, device ID, picture quality, refresh mode, recording rate (fps) (version dependent),
related devices (sensors) and alarm activation.
Macros shall allow an authorized user to create and schedule software commands that shall include
but are not limited to:
1.
2.
3.
4.
5.
6.
7.
Sequencing cameras, including multi-screen displays, in a local and remote recorder.
Execute remote macros existing on recorders currently connected to the network.
Record cameras at different qualities and frame rates from any recorder on the network
(version dependent).
Send alarm condition to any recorder and workstation on the network. By the use of
macros, an authorized user shall be able to program the destination component of the
alarm condition.
An authorized user shall be able to program and execute macros remotely without the
need to be physically located at the recorder that the macros will be programmed on.
The Schedule/Macro button shall allow the running of preconfigured combinations of
camera, sensor and PTZ programmed routines.
Macro scheduling shall include but is not limited to:
a.
Days of the week when a macro is active.
b.
Start and end time for when a macro is active.
c.
If a macro is to run continuously or not.
d.
A macro shall be able to run every:
1) 5 min, 10 min, 1/4 hour, 1/2 hour, 3/4 hour, 1 hour, 2 hours, 3 hours, 4 hours, 6
hours, 8 hours, 12 hours.
2) A macro shall be able to be scheduled to run for 1-256 cycles.
The network and sites configuration shall allow:
1. Setup of a system Nucleus and Backup Nucleus. The Backup Nucleus shall act as the hotstandby Nucleus in the event that the primary Nucleus goes offline, providing
uninterrupted system functionality. A Network Settings menu shall provide a
comprehensive worksheet for each networked device. When all units have been set up,
the resulting connected devices shall define the site.
2. Time synchronization of all components on the network.
3. All appropriate networking features including each server IP, Subnet and Gateway.
Device configuration shall have the ability to be configured for system recognition and operation.
Valid devices shall be:
1.
2.
3.
4.
Cameras, fixed or with integrated PTZ.
Microphones.
Sensors.
Relays.
Board: +91-80-49531111
Private & Confidential
www.sdlglobe.com
8. All devices shall be assigned a unique ID number and title descriptor. PTZ cameras shall be setup for
RS-422 protocol and supported with existing manufacturer's drivers where applicable.
There shall be a Recording Verification System (RVS) used to identify and log any recording errors
encountered during normal system operation. The log shall be manually reviewed for possible video
segment errors earmarked with a Recording Site, Device Name, Date/Time, Verified Site, Macro
Name and Error Description stamp. There shall be a Central Failure Notification (CFN) System used
to identify all possible site errors. The CFN shall be accessible from only the Nucleus unit. The log
shall be in a time/date order and be manually reviewed for errors.
There shall be a Site Map feature. It shall allow the installation and configuration of a custom screen
map used to identify and access site-installed components (recorders, cameras, microphones, etc.).
The ideal map shall be a jpg image format in the size of 980 x 735 pixels. In addition, text boxes and
sub-maps shall be added to maps, further defining the layout. The utility shall also provide full
installation, configuration and editing of maps. Maps of smaller sizes shall have the ability to be
moved anywhere on the screen.
There shall be a Language Translation Utility (LTU). It shall allow a manual translation of the entire
GUI into any language that uses varying alpha-numeric character sets. The utility shall also store files
for simple changing from one language to another.
The system shall provide alarm notification via e-mail, text messaging, and work station text. Macros
can be created to view/listen and record video and audio, PTZ cameras at preset positions, trigger
alarms over the network and send email or text message for alarms or on schedule.
Storage Database Utilities shall allow setup and usage of detected hard disks locally. Any networked
recorder, workstation or server shall be a candidate to add to the picture database. Once
established, any recorder shall use established hard disks for recording data.
Authentication shall be configured using the Authentication Settings screen. Authentication display
shall be configured by site and affect the destination video. A check box shall be available to enable
video authentication and view the status of the video generated. The video authentication scheme
shall utilize a 128 bit MD5 algorithm.
The software shall be installed on an appropriate workstation computer running a Microsoft®
Windows® XP operating system. When installed and run, the application shall display a Main
Window and Login Window, where all configuration and operation begins.
1. The login window shall consist of a User Name and Password field.
2. Configuration of the system shall include setup of:
a. Remote cameras and alarm names.
b. Users and groups.
c. Data storage allocation.
d. Macro programming.
e. Scheduling, display and alarm notification.
f. Remote pre/post alarm recording.
g. Backup utility for setup configuration.
Board: +91-80-49531111
Private & Confidential
www.sdlglobe.com
9. An Access Control system shall be available for integration with SDL. The Security Management
System (SMS) shall meet the requirements of business and government access control systems. The
system shall monitor and control facility access as well as video detection, temperature and
communications loss monitoring. Virtual inputs such as video loss and building occupancy limits
exceeded shall also be supported. The system shall be controlled from a web browser and require no
software installation or client licenses. The system shall provide control and access to users on Local
Area Networks (LAN), Wide Area Networks (WAN), wireless networks and the Internet. The system
shall provide email and/or text message alerts for all alarm conditions and threats. The system shall
provide SDL video viewing playback and PTZ control from its web browser interface.
2.5
DIGITAL VIDEO RECORDING AND NETWORK WORKSTATION
A.
B.
C.
The workstation shall be a PC computer running Windows XP Professional/7. It shall
be fully equipped with the Digital Video Recording and Network Software. The
workstation shall require an external monitor for operation.
As a minimum, the workstation shall have an ATX platform motherboard and 450
watt power supply using an Intel® Core™ 2 Duo, 2.66 GHz processor. It shall have 2
GB of RAM memory, a minimum 250 GB hard drive, a CD-RW drive, 6 USB ports, a 1
GB LAN Card, a VGA Adapter with onboard 128 MB of RAM memory and additional
case fan cooling. The workstation shall be equipped with a PS-2 or USB wheel mouse
and 101-key keyboard.
The workstation shall be housed in a mid-height tower case with all suitable
connectors available on the back panel. It shall be constructed of steel and plastic
materials. A rack-mounted version shall also be available. It shall also be operated
indoors in a temperature range not to exceed 32 to 104° F (0 to 40° C) and a
humidity range not to exceed 0 to 95% relative, in a non-condensing atmosphere.
The workstation shall employ a Universal Voltage Power Supply requiring 105 - 240
VAC @ 50 - 60 Hz.
VIRTUAL MATRIX CONTROLLER SOFTWARE, DECODER, KEYPAD AND WORKSTATION
A.
B.
The Virtual Matrix Controller (VMC) software shall run on Microsoft Windows XP
Professional. The VMC shall provide the following capabilities:
1. Display any analog or IP camera on the network on any monitor on the network.
2. Allow the use of both composite and VGA monitors.
3. Allow control of the system from PC GUI, PLC or a CCTV keypad.
4. Supports 2 CCTV keypads per workstation.
5. Map capability.
A decoder shall be provided to convert the SDL IP data into analog video outputs for
viewing on a standalone monitor. Three outputs shall be provided: composite (3
each), S-video (2 each) and VGA (2 each) to support viewing on 3 monitors. One of
the monitors shall have the ability to display a quad view. The decoder shall be rack
mountable with a compact size so that multiple decoders are able to be mounted in
a rack. The decoder’s dimensions shall be:
Board: +91-80-49531111
Private & Confidential
www.sdlglobe.com
10. 1. Height (H): 1.73 in. (44 mm); Width (W): 8.5 in. (216 mm); Depth (D): 6.75 in.
(153 mm).
2. Weight: 2.25 lb. (1.0 kg).
C.
D.
A CCTV keypad shall be provided to provide the following functions:
1. Control PTZ functions.
2. Control camera switching to monitor.
3. Control quick playback to monitor.
The Virtual Matrix Controller shall be a PC computer running Windows XP
Professional/7. It shall be fully equipped with the VMC software, and include a
special GUI that shows the monitors and control camera switching. The workstation
shall require an external monitor for operation. The processing unit shall be housed
in a small-form case and will be supplied with a 101-key keyboard and wheel mouse.
Two serial connections shall be provided, one for CCTV keypad connection and ne
for PLC or other ASCI control.
DIGITAL VIDEO RECORDER
A.
The Digital Video Recorder (DVR) shall be a custom PC-based appliance running Windows XP
Professional. It shall be fully equipped with the DIGITAL VIDEO RECORDING MANAGEMENT
SYSTEM SOFTWARE. The DVR shall require an external monitor for setup and local operation.
B.
The DVR shall be equipped with a PS-2 wheel mouse and 101-key keyboard.
C.
The local recorder shall collect up to 16 channels of analog video and digitize them for the
purpose of display, archive and requested distribution across the Ethernet network.
Cameras shall be the primary analog input devices. Each channel of video data shall have
the capability of being displayed, played back, distributed and archived locally. The DVR
shall also have full WAN and Internet capability, offering expandability beyond a corporate
LAN. The DVR shall employ a compression algorithm based on:
1. Selectable optimized hybrid MPEG-4 or M-JPEG.
2. The DVR shall have a recording capability of 30, 60, 120, 240 or 480 fps, depending
on model. All versions shall, by default, divide the total fps by the actual number of
camera inputs. The actual fps rate shall have the ability to be set, by camera. The
recorder shall have external RAID device connection capability to extend the total
recording time beyond the limits of the specific internal hard drive.
D.
A Hybrid version of the DVR shall be available which collects 8 channels of digital video from
IP cameras or video encoders in addition to the 16 channels of analog video and all of the
capabilities of analog DVR.
E.
Contractor shall supply quantity of DVRs as required to record all cameras.
Board: +91-80-49531111
Private & Confidential
www.sdlglobe.com
11. Role Based Access
The application should allow users to be added and the roles to be defined.
Each user will be assigned different access levels – Observers and managers
The observers in the central monitoring unit should be able to send alerts of any incidents to
managers at the corresponding locations.
The number of cameras in every store and the departments in which they have been
installed should be captured.
They should be able to send alerts for any incidents in their corresponding stores. The
managers should be able to view reports in the corresponding stores.
The Admin role will be able to view all the reports and assign user levels for each role.
Setup Reporting Items
For all the stores there will be user level access given for observers and managers.
They should be able to set up the reporting items for their corresponding stores.
View reports for the reporting items in each store.
Masters can be created to add new reporting items.
Observers’ team monitoring all the stores shall be able to view the reporting items of the
assigned stores.
Reports & Alerts
Reports and alerts should be provided at every store level.
The application should be configurable to trigger the type of alerts for the
corresponding incidents.
The central monitoring system should be able to view reports at each store level.
Any incident should automatically trigger an alert to the central monitoring system.
Board: +91-80-49531111
Private & Confidential
www.sdlglobe.com
12. ContactUs
Our Location:
Sales Enquires:
Business Partnerships:
SmartDrive Labs Technologies India Pvt. Ltd.
# 521, 4thMain, 4th Block,
HBR Layout, Bangalore – 560 043
Karnataka, India.
Mr. Mahesh K Parvathareddy
Ms. Vani Sathvik
mahesh@sdlglobe.com
http://www.sdlglobe.com
vani@sdlglobe.com
http://www.sdlglobe.com/
Board: +91-80-49531111
Private & Confidential
www.sdlglobe.com