The document describes International Video-Conferencing Inc.'s streaming video solution. Key features include an easy-to-use presenter interface, customizable web viewer, question and answer sessions, immediate archival of presentations, and ease of administration. The solution provides live and on-demand streaming of high-quality video, synchronized slides, and other content across the internet or intranet for applications such as training, presentations, and meetings. It is built on open standards and can be deployed either as a public internet service or hosted privately.
Over the years, password management software has evolved from a simple self-service web application to reset forgotten passwords to a complex platform for managing multiple authentication factors and encryption keys.
This document describes the technological evolution and highlights the product capabilities that organizations should consider in order to have a lasting value from their investment.
In part, this document questions the benefits of investing in point solutions with limited functionality and expansion capabilities and in favor of investing in a platform capable of addressing both short- and long-term needs.
Sections:
- In the Beginning: A Simple Problem
- Proliferation of Passwords
- Locked-out Users, Mobile Users and Cached Passwords
- Multi-Factor Authentication: Smart Cards and Tokens
- Public Key Infrastructure and Encrypted Key Files
- Full Disk Encryption
- User Enrollment and Adoption
- Privileged Accounts and Passwords
- The Future
http://hitachi-id.com/
Managing credentials on-premise and in the cloud.
With over 12 million users worldwide, Hitachi ID Password Manager is the leading credential management solution. It lowers IT support cost and improves user service by eliminating problems and diverting resolution to self-service.
Password Manager includes password synchronization, single sign-on and self-service password reset.
http://hitachi-id.com/password-manager/
Organizations that either are considering deployment of Hitachi ID Password Manager or have already deployed it need to understand its security implications.
Hitachi ID Password Manager impacts authentication processes and standards. This document describes this impact, and how to ensure that it is a positive change.
Hitachi ID Password Manager is also a sensitive part of an organization's IT infrastructure, and consequently must be defended by strong security measures. The technology used by Hitachi ID Password Manager to protect against intrusions, as well as best practices to deploy that technology, are described here.
The remainder of this paper is organized into sections that describe challenges specific to managing passwords for mobile users, and how Hitachi ID Password Manager addresses each problem.
What is Hitachi ID Password Manager?
A brief description of Hitachi ID Password Manager, to give context to the subsequent sections.
Protected assets
A list of what information security, as implemented in Hitachi ID Password Manager, should protect.
Defining security violations
Some specific security attacks that Hitachi ID Password Manager defenses must repel.
Impact on authentication processes
How the features and processes created by Hitachi ID Password Manager affect authentication to IT infrastructure generally in an organization.
Server defenses
How the Hitachi ID Password Manager server can and should be protected.
Communication defenses
How data transmitted to and from each Hitachi ID Password Manager server is protected.
Data protection
How data stored on each Hitachi ID Password Manager server is protected.
The secure kiosk account
How the optional secure kiosk account impacts the security of the network operating system where it is installed.
Self-service functionality can assist with password resets, recoveries and account unlocks. By using multiple security questions and answers functionality PortalGuard is able to perform all resets directly from the end-user's machine if desired. This also includes Offline Mode, which allows the forgotten password to be shown to roaming users in clear text when they are offline, so as to continue work without returning to the office.
Tutorial: http://pg.portalguard.com/self-service_password_reset_tutorial 1
Over the years, password management software has evolved from a simple self-service web application to reset forgotten passwords to a complex platform for managing multiple authentication factors and encryption keys.
This document describes the technological evolution and highlights the product capabilities that organizations should consider in order to have a lasting value from their investment.
In part, this document questions the benefits of investing in point solutions with limited functionality and expansion capabilities and in favor of investing in a platform capable of addressing both short- and long-term needs.
Sections:
- In the Beginning: A Simple Problem
- Proliferation of Passwords
- Locked-out Users, Mobile Users and Cached Passwords
- Multi-Factor Authentication: Smart Cards and Tokens
- Public Key Infrastructure and Encrypted Key Files
- Full Disk Encryption
- User Enrollment and Adoption
- Privileged Accounts and Passwords
- The Future
http://hitachi-id.com/
Managing credentials on-premise and in the cloud.
With over 12 million users worldwide, Hitachi ID Password Manager is the leading credential management solution. It lowers IT support cost and improves user service by eliminating problems and diverting resolution to self-service.
Password Manager includes password synchronization, single sign-on and self-service password reset.
http://hitachi-id.com/password-manager/
Organizations that either are considering deployment of Hitachi ID Password Manager or have already deployed it need to understand its security implications.
Hitachi ID Password Manager impacts authentication processes and standards. This document describes this impact, and how to ensure that it is a positive change.
Hitachi ID Password Manager is also a sensitive part of an organization's IT infrastructure, and consequently must be defended by strong security measures. The technology used by Hitachi ID Password Manager to protect against intrusions, as well as best practices to deploy that technology, are described here.
The remainder of this paper is organized into sections that describe challenges specific to managing passwords for mobile users, and how Hitachi ID Password Manager addresses each problem.
What is Hitachi ID Password Manager?
A brief description of Hitachi ID Password Manager, to give context to the subsequent sections.
Protected assets
A list of what information security, as implemented in Hitachi ID Password Manager, should protect.
Defining security violations
Some specific security attacks that Hitachi ID Password Manager defenses must repel.
Impact on authentication processes
How the features and processes created by Hitachi ID Password Manager affect authentication to IT infrastructure generally in an organization.
Server defenses
How the Hitachi ID Password Manager server can and should be protected.
Communication defenses
How data transmitted to and from each Hitachi ID Password Manager server is protected.
Data protection
How data stored on each Hitachi ID Password Manager server is protected.
The secure kiosk account
How the optional secure kiosk account impacts the security of the network operating system where it is installed.
Self-service functionality can assist with password resets, recoveries and account unlocks. By using multiple security questions and answers functionality PortalGuard is able to perform all resets directly from the end-user's machine if desired. This also includes Offline Mode, which allows the forgotten password to be shown to roaming users in clear text when they are offline, so as to continue work without returning to the office.
Tutorial: http://pg.portalguard.com/self-service_password_reset_tutorial 1
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Richard Bullington-McGuire
Richard Bullington-McGuire presented this talk on PKI enabling web applications for the DoD at the 2009 MIL-OSS conference:
http://www.mil-oss.org/
It is a case study that shares some of the challenges and solutions surrounding the implementation of the Forge.mil system.
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Systems, Inc.
Hitachi ID Password Manager:
Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications
Integrated credential management for users:
passwords, encryption keys, tokens, smart cards and more.
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Systems, Inc.
Hitachi ID Identity Manager:
Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications.
User provisioning, RBAC, SoD and access certification.
http://hitachi-id.com/
Attack of the Content Clones: Saving the Internet from On-demand Video Streamingnishanthsastry
On-demand video streaming is undoubtedly one of the biggest successes of the past few years. What used to be a text or HTML oriented Internet about 10 years ago has now become overrun by rich media content clones from the likes of YouTube. Despite this success, delivering rich media content is still a complex and expensive affair. This presentation is an overview of our work with the BBC, one of the largest content providers in the UK, on how to decrease their network footprint. This is an ongoing research project, funded by EPSRC in the UK.
Vidizmo EnterpriseTube - Enterprise Video Streaming SolutionNadeem Khan
A perfect Enterprise Video Streaming Platform and Portal. Setup unlimited YouTube /Vimeo Style video channels, fully branded with corporate look and feel, each channel may use its own authentication system to authenticate users such as Enterprise AD, SAML-P, Google ID, Facebook ID or Microsoft ID or VIDIZMO ID or anonymous access.
Webinar: Delivering Static and Dynamic Content Using CloudFrontAmazon Web Services
In this presentation from our webinar titled “Delivering Static and Dynamic Content using Amazon CloudFront”, we provide an overview on how you can use Amazon CloudFront to help architect your site to deliver both static and dynamic content (portions of your site that change for each end-user). Andy Rosenbaum, Director of Desktop Development at Earth Networks, also joined and presented on why Earth Networks chose Amazon CloudFront to deliver their dynamic weather content.
AWS Webcast - Using JW Player and Amazon CloudFront to Stream HLS VideoAmazon Web Services
Learn how you can use Amazon CloudFront and JW Player to stream video in the HTTP Live Streaming Format to multiple devices. We will cover the encoding, storage and delivery of the video using AWS and will demonstrate how JW Player can be configured to play the content on your desktop and mobile devices.
AWS Webcast - On-Demand Video Streaming using Amazon CloudFront Amazon Web Services
Learn about how you can use Amazon CloudFront to deliver on-demand video over HTTP to various devices in a scalable manner using HLS and Smooth Streaming delivery protocols. During the webinar, we will walk through the steps needed to create a production quality video streaming stack and the choices you have in the AWS platform to help you address these by leveraging the power of the cloud.
AWS Webcast - Live Streaming using Amazon CloudFront and Wowza Media ServerAmazon Web Services
Learn how you can easily configure a production quality live streaming setup using Amazon CloudFront and Wowza Media Server (available through AWS Marketplace). We will take you step by step through the process of using AWS CloudFormation to provision the AWS resources, using an encoder to capture the live stream and delivering the stream at scale to various devices using Amazon CloudFront.
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Richard Bullington-McGuire
Richard Bullington-McGuire presented this talk on PKI enabling web applications for the DoD at the 2009 MIL-OSS conference:
http://www.mil-oss.org/
It is a case study that shares some of the challenges and solutions surrounding the implementation of the Forge.mil system.
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Systems, Inc.
Hitachi ID Password Manager:
Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications
Integrated credential management for users:
passwords, encryption keys, tokens, smart cards and more.
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Systems, Inc.
Hitachi ID Identity Manager:
Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications.
User provisioning, RBAC, SoD and access certification.
http://hitachi-id.com/
Attack of the Content Clones: Saving the Internet from On-demand Video Streamingnishanthsastry
On-demand video streaming is undoubtedly one of the biggest successes of the past few years. What used to be a text or HTML oriented Internet about 10 years ago has now become overrun by rich media content clones from the likes of YouTube. Despite this success, delivering rich media content is still a complex and expensive affair. This presentation is an overview of our work with the BBC, one of the largest content providers in the UK, on how to decrease their network footprint. This is an ongoing research project, funded by EPSRC in the UK.
Vidizmo EnterpriseTube - Enterprise Video Streaming SolutionNadeem Khan
A perfect Enterprise Video Streaming Platform and Portal. Setup unlimited YouTube /Vimeo Style video channels, fully branded with corporate look and feel, each channel may use its own authentication system to authenticate users such as Enterprise AD, SAML-P, Google ID, Facebook ID or Microsoft ID or VIDIZMO ID or anonymous access.
Webinar: Delivering Static and Dynamic Content Using CloudFrontAmazon Web Services
In this presentation from our webinar titled “Delivering Static and Dynamic Content using Amazon CloudFront”, we provide an overview on how you can use Amazon CloudFront to help architect your site to deliver both static and dynamic content (portions of your site that change for each end-user). Andy Rosenbaum, Director of Desktop Development at Earth Networks, also joined and presented on why Earth Networks chose Amazon CloudFront to deliver their dynamic weather content.
AWS Webcast - Using JW Player and Amazon CloudFront to Stream HLS VideoAmazon Web Services
Learn how you can use Amazon CloudFront and JW Player to stream video in the HTTP Live Streaming Format to multiple devices. We will cover the encoding, storage and delivery of the video using AWS and will demonstrate how JW Player can be configured to play the content on your desktop and mobile devices.
AWS Webcast - On-Demand Video Streaming using Amazon CloudFront Amazon Web Services
Learn about how you can use Amazon CloudFront to deliver on-demand video over HTTP to various devices in a scalable manner using HLS and Smooth Streaming delivery protocols. During the webinar, we will walk through the steps needed to create a production quality video streaming stack and the choices you have in the AWS platform to help you address these by leveraging the power of the cloud.
AWS Webcast - Live Streaming using Amazon CloudFront and Wowza Media ServerAmazon Web Services
Learn how you can easily configure a production quality live streaming setup using Amazon CloudFront and Wowza Media Server (available through AWS Marketplace). We will take you step by step through the process of using AWS CloudFormation to provision the AWS resources, using an encoder to capture the live stream and delivering the stream at scale to various devices using Amazon CloudFront.
ARC203 Highly Available Architecture at Netflix - AWS re: Invent 2012Amazon Web Services
This talk describes a set of architectural patterns that support highly available services that are also scalable, low cost, low latency and allow agile continuous deployment development practices. The building blocks for these patterns have been released at netflix.github.com as open source projects for others to use.
AWS Webcast - High Availability with Route 53 DNS FailoverAmazon Web Services
This webinar will be discussing how to use DNS Failover to a range of high-availability architectures, from a simple backup website to advanced multi-region architectures.
On-demand & Live Streaming with Amazon CloudFront in the Post-PC World (MED30...Amazon Web Services
Learn how AWS customers are using Amazon CloudFront to deliver their video content to users over HTTP(S) using a number of modern streaming protocols such as Smooth Streaming, HLS, DASH, etc. You also learn about options for end-to-end security of your video content—through both encryption and preventing access from unauthorized users based on their location. Finally, we demonstrate how easy it is to use CloudFront to deliver both your on-demand and live video to a global audience with great performance.
Every IT asset has at least one local, privileged login account. This includes workstations, servers, network devices, databases, applications and more. Some assets also have privileged accounts used to run services or authenticate one application to another.
Passwords for privileged accounts are used to install software, manage the device and perform technical support functions. They are often “all powerful,” having unlimited access to system functions and data. Consequently, compromise of privileged passwords is effectively compromise of the device.
Secure management of access to privileged accounts is essential to IT security. This document identifies technical challenges and offers solutions for effectively managing large numbers of sensitive passwords.
인터맥프린터 Intermec PX4i PX6i 열전사감열 RFID 산업용 바코드프린터 매뉴얼HION IT
인터맥, EasyCoder PX (PX4i, PX6i) 시리즈 바코드프린터는 까다로운 산업환경에 맞게 설계된 견고한 금속의 고성능 프린터로, 24시간 작동을 지원합니다.
개방된 모듈식 디자인은 프린터가 쉽게 적응, 유지보수 및 서비스를 제공받을 수 있도록 합니다.
인터맥 PX 시리즈, PX4i 및 PX6i 산업용 바코드 프린터는 각각 4인치 또는 6인치의 최대 인쇄폭 기능이 특징입니다.
제조업 환경에서의 간편한 통합을 위해 설계된 PX 시리즈 산업용 프린터는 사실상 어떠한 위치라도 장착할 수 있습니다.
다기능성 폼 팩터가 라벨 자동부착기 같은 주변장치와의 연결을 용이하게 합니다.
인터맥 EasyCoder PX 시리즈 프린터는 사용자 정의 프로그램을 실행, 독립적으로 작동할 수 있어서 PC가 필요하지 않습니다.
최대 7개의 유선 및 무선 연결 인터페이스를 통해 스캐너, 스케일, 기타 프린터 및 컨베이어를 포함한 생산라인 기계장치에서 작동할 수 있을 뿐만 아니라 네트워크 호스트에서 정보에 직접 액세스할 수 있습니다.
최대의 성능 및 인쇄품질- 분당 최대 115개까지 6인치 길이의 컴플라이언스 라벨 인쇄
견고한 금속 구조로 열악한 산업환경에서도 24시간 / 7일 인쇄제공
변화하는 호스팅 환경 및 응요운야에 쉽게 적응
자동화된 라벨 부착 응용분야의 통합을 위한 모듈화 디자인
PC 비용을 들이지 않는 독립형 프린터 응용지원
IPL 또는 Fingerprinter/DP 프린터 명령 언어 선택
203, 300 또는 400 dpi 인쇄 해상도의 선택 사항을 제공하는 교체 가능한 프린트 헤드
PHYSICAL CHARACTERISTICS
LxHxW : 482 x 238 x 275 mm (19.0 x 9.4 x 10.8 in)
Weight : 12.85 kg (28.4 lbs)
PRINT SPECIFICATIONS
Max. Print Width : 112 (DT)/110 (TT) mm (4.4/4.3 in)
Max. Length :
4095 mm (161 in) at 203 dpi
2775 mm (109 in) at 300 dpi
1016 mm (40 in) at 406 dpi
RFID STANDARD & FREQUENCIES
Supports ISO 18000-6B and 18000-6C / EPC
Generation 2
865-928 MHz radio configured to comply with local UHF RFID regulations including FCC and ETSI.
Contact local representative for availability in particular region.
PRINT SPEED
100 - 300 mm/s (4 - 12 ips) for 203/300dpi
100 - 250 mm/s (4 - 10 ips) for 406 dpi
MEDIA
Labels & Tags :
Max/Min Width : 120/ 25.4mm (4.72/ 1 in)
Thickness : 2.4 to 10.0 mil
Configuration : Roll-fed or fanfold
Sensing : Gap, notch, black mark, continuous
Label Roll Max Diameter : 213 mm (8.38 in)
Label Roll Core : 38-76mm (1.5-3 in)
Ribbons :
Roll Max Diameter : 80 mm (3.15in), approx. 450m
Core ID : 25.4 mm (1”)
Type : Wax, mid-range, resin
INTERFACE
Standard :
Ethernet 10/100 Mbps
RS-232, up to 115.2 kB/s
Supported Serial Protocols :
Fingerprint/Direct Protocol : XON/ XOFF, ENQ/ACK, DTR, RTS/CTS
IPL: XON/XOFF, Intermec Std. Protocol
USB 2.0
Optional :
Parallel IEEE 1284
Industrial Interface (8 digital in/out, 4 analog relays, 1 RS232/422/485 port)
Dual Serial ports RS-232, RS-422, RS-485 and 20mA Current Loop, Applicator Interface
Wireless :
IEEE 802.11 b/g
Wi-Fi Certified, Cisco® Compatible (CCX) version 3 Certified
WEP, WPA, WPA2, 802.11x (EAPTTLS, LEAP, PEAP, FAST), 802.11i
Multiple industrial antenna options for maximized coverage
Supported Protocols : TCP/IP-suite (TCP, UDP, ICMP, IGMP, etc.), LPR/LPD, FTP, BOOTP, DHCP, HTTP, SNMPv3, SMTP.SNMP-MIB II supported (over UDP/IP), private enterprise MIB included. Supports IPv4 and IPv6
>하이온아이티
주소 : 서울 금천구 가산디지털2로 165, 1304호 (백상스타타워2차)
대표번호 : 02-2038-0018 / 이메일 : hion@hionit.com
홈페이지 : http://hionsmart.com
This file is the final report for the course Digital Content Retrieval (DCR) presented at Pavia University as Computer Engineering Master's course. The report explains the procedure for the development of a personal website and a video curriculum describing its development aspects using proper project management techniques. The source of the personal website and the video curriculum are available at https://github.com/kooroshsajadi/personal-website and https://vimeo.com/843032358?share=copy respectively.
A- LES CONCEPTS
Comprehension du bim.
Travailler dans différentes vues.
Classement et hierarchie des éléments dans Revit.
B-L'ENVIRONNEMENT DE TRAVAIL
Page des fichiers rescents et grand R.
Le ruban.
Fenêtre des propriétés.
Explorateur du projet.
Navigation dans un modèle.(zoom, rotation et panoramique).
Selection des objets, et verouillage.
C-DEMARRAGE D'UN PROJET.
Les gabarits.
Travail collaboratif.
Configuration d'un nouveau projet.
Manipulation des niveaux.
Manipulation des files de projet.
Utilisation des cotes temporaires.
C- MODELISATION PAR OBJETS:
Ajout des murs.
Propriété et type de murs.
Utilisation des accroches.
Ajouts de poteaux et poutres.
Ajout de portes et fenêtres.
Ajout d'élements de plomberie et d'électricité.
Utilisation de la jonction entre murs.
Utilisation des contraintes.
D- LIENS, IMPORTS ET GROUPES:
Lier fichiers DWG/DXF/SKP
Création de topogrpahie d'un site à partir d'un fichier.
Création et gestion des groupes.
Création et gestion des liens Revit.
Utilisation du partage d'emplacement.
E- MODELISATION PAR ESQUISSE:
Sols., toits et plafonds.
Toit par extrusion.
Ouvertures.
F-ESCALIERS.
Edition avancée d'escalier.
Edition avancée de gardes corps.
G- EDITION AVANCEE DES MURS:
Création d'un nouveau type de murs..
Création et gestion des murs empilés.
Création et gestion des murs rideaux.
.
H- GESTION DES GRAPHISMES:
Gestion du style des objets.
Gestion du remplacement de la visibilité et du graphisme des éléments.
Création et application des gabarits de vue.
Cacher et isoler les éléments.
Cadrage de la vue.
Plage de vue et entendues.
Vue isométrique d'une selection.
Option d'affichage des graphismes.
I- PIECES:
Création et gestion des pièces.
J- NOMENCLATURE ET ETIQUETTES:
Gestion des étiquettes.
Création et gestion des nomenclatures.
Modification des nomenclatures.
Enrichissement des VCCTP par les nomenclatures.
K-ANNOTATIONS.
Textes.
Dimensions
Symboles.
Légendes.
Détails.
Définir ses annotations.
L- PARAMETRIQUE ET FAMILLES
Utilisation des paramètres en mode projet.
Concept de famille.
Création d'une famille.
Utilisation des contraintes.
Utilisation des formes solides.
M- FEUILLE, IMPRESSION, PUBLICATION:
Création d'une feuille d'impression.
Export CAO.
Publication.
Impression PDF.
N- TRUCS ET ASTUCES.
A découvrir en formation.
Video surveillance is a booming business, and installations become larger and larger. At the same time,
several studies have highlighted the hit and miss nature of human intervention to spot change in a surrounding
environment. And the challenge becomes larger as systems expand. In addition, a massive
amount of video is being recorded, but never watched or reviewed, due to lack of time.
As a result, events and activities are missed, and suspicious behavior is not noticed in time to prevent
incidents. This has led to the development of intelligent video (IV).
Software Defined Everything infrastructure that virtualizes compute, network, and storage resources and delivers it as a service. Rather than by the hardware components of the infrastructure, the management and control of the compute, network, and storage infrastructure are automated by intelligent software that is running on the Lenovo x86 platform.
Similar to Streaming Video Solutions White Paper (20)
3. INTERNATIONAL VIDEO-CONFERENCING, INC.
INTRODUCTION
IVCi's streaming solution by Conferserv is a new, powerful multimedia collaboration tool that enables
non-technical business professionals to easily record meetings and presentations and create interactive
presentations from in-house conference rooms with the same high quality results as professional media
studios. It combines high-end video with synchronized slides and interactivity to produce compelling
messages that inform, educate, and drive action.
IVCi provides a completely integrated collaboration environment that manages content, tracks who
receives it, who views it and drives real time communications and decision-making. The platform is
built on Microsoft .NET and other leading industry standards to ensure a robust and secure operating
environment.
The platform supports applications such as live and video on-demand (VOD) product announcements,
employee training, video mail marketing campaigns, sales news & success stories, company meetings,
and customer training - applications that provide competitive advantage!
IVCi can provide a choice of solutions ranging from a service on the public internet to hosting and
managing the streams in the secure IntelliNet environment to providing the solution in a customers
own infrastructure. The choice depends on how much security and performance is required along with
a preference to have unlimited access compared to pay by the minute.
The following information provides a summary of features and technology.
FEATURE SUMMARY
Easy to Use Presenter Interface
A simple to use and easy to navigate interface for content producers to create content. Using standard
videoconferencing remote controls, producers can preview slides, push slides, send web pages and
polls, gather detailed audience viewing parameters, and answer audience questions all without the
need of an auxiliary PC.
Customizable Web Viewer (Client)
The client runs on any standard Internet browser and does not require client-side software to be
installed. Features supported by the web viewer include:
• High-quality live and VOD audio and video
• PowerPoint Slides
• Q&A chat
• Author chapters
• Personalized bookmarks
• Custom links to web pages or other presentation supporting materials
• VCR control over content
3
4. INTERNATIONAL VIDEO-CONFERENCING, INC.
Question & Answer Sessions
The Q&A feature allows viewers of the videoconference to participate by communicating with the
moderator via back channel text communication. They no longer require an H.32x endpoint for
communication and are not limited to one-way communication.
Immediate Archival
Automatic archiving of live meetings, presentations, and Webcasts. Once the Webcast is concluded, the
content is immediately available as VOD. With competitive systems, the production time required to
convert live Webcast content to VOD is most often measured in days and weeks; the IVCi solution
ensures a VOD version of the Webcast is available for viewing within minutes of the event's conclusion.
Storage capacity will scale to meet the most demanding content archival requirements. The baseline
storage configuration can be determined based on anticipated usage. For example, assuming a
400Kbps payload (streaming content and data elements), one hour of streaming content will consume
approximately 180MB of available storage capacity. For enterprises that have a greater need for
increasingly sophisticated storage features and total capacity, the server is easily configured to support
fiber-based network and storage devices.
Ease of Administration
Administration is from a web-based user interface in any java enabled browser from anywhere on the
Internet, enabling the administrator to create content producer and end user accounts as well as
administer all live and archived videoconferences.
Each customer is provided with three powerful tools used for accessing and managing their account
and content:
1. Content Creation Port - A network connection to the server where video and other content is
captured and synchronized for encoding, streaming, and storage
2. Administration Portal - Web page where company administrators configure the account, manage
content, add/modify users, create groups, assign access rights, and privileges
3. Content Portal - Web page where all users access live or on-demand content such as meetings
being streamed, archived meetings or interactive presentations
Customers use their existing video conferencing systems to connect to a Network Content Creation Port
using either IP or ISDN. Once connected, they are required to enter a password for authentication and
then connected to their existing database where they are able to access all Conferserv services, such as
recording meetings or Webcasting presentations.
The administration portal allows each company to manage its own account and content through a
simple, easy to use web page available from any standard Internet browser. When an administrator
logs into the system, they are presented with only the information about their company's account,
users, and content, just as if they were accessing their own server on their own network.
4
5. INTERNATIONAL VIDEO-CONFERENCING, INC.
The Content Portal provides a convenient and powerful web interface that allows enterprise viewers to
log-in from a standard Internet browser and easily access the content for which they have been granted
privileges. The Content Portal also allows content to be organized in meaningful ways, such as by
department, division, or type of content.
Slide Show Tool
The presenter can present slides throughout the conference, enhancing their presentation.
High Resolution Video
Support is provided for 320X240 native video that can be shown full screen with the click of a button
(up to the max PC screen resolution).
Real-time Monitoring
This is enabled with a robust suite of content management and monitoring services. The reporting
applications are a move beyond basic SNMP data gathering to a more detailed and integrated set of
network and end user monitoring and analysis tools that provide a centralized view of all activity across
an enterprise.
Enhanced Security
Access is controlled to Networks, Channels, and Content by authenticating a content producer's or
participant's user ID and password. When creating a Webcast, the content producer has access to
detailed security control parameters which allow for a targeted content viewing and distribution profile
to be created and enforced. All administrative functions are supported with native SSL.
Video Mail Creation & Campaign Management
Presenters can leverage the system to record a video mail message and/or presentation. With the use
of simple templates, presenters can create, address, and send HTML email messages - your users
simply click on the embedded video link to view your video presentation. All viewer actions are
recoded for comprehensive campaign reporting. And since the actual video file is not sent with the
mail message, you never have to worry about your message be blocked by firewalls or subjected to
mailbox storage limits.
Integrated Multipoint Conferencing Unit (MCU)
Whether as part of the public service or the private IntelliNet hosted service there is a choice of MCU
options built in.
Intelligent Edge Caching
The next generation of intelligent content distribution technologies are enabled making major steps
forward in the area of media redirection and network load balancing. Like early generation load
balancing components, the system can parse URL's, HTTP Headers and perform content checks. In
addition to these supported rules, there are a suite of rich capabilities that enable SNMP checks,
scriptable content, geographic location, complex formula based redirection and more. In addition rules
are created by developing an XML based language where scripts can be located anywhere on the
Internet yet run within the distributed platform. Edge caching is not available as part of the public
internet service.
5
6. INTERNATIONAL VIDEO-CONFERENCING, INC.
H.32X Endpoint Agnostic
Significant interoperability testing has been done to ensure that the majority of H.32X-protocol
endpoints in use today for content creation are supported.
SOFTWARE AND IP-CENTRIC SOLUTION
The solution is designed to run on Microsoft Windows NT and 2000 servers. Network performance has
been optimized for each platform and structured as a software solution that can take advantage of
incremental hardware improvements.
Conferserv is designed as an n-tier, database-driven, web-based application comprised of several
tightly integrated, patent-pending software components. Each component was designed to tightly
integrate Microsoft Windows 2000, Windows SQL database, and Microsoft Windows Media.
Application modules can be divided into the following areas:
Figure 1 - Conferserv Software Architecture
Presentation Layer - Content and User Management System
The user interface (UI) is a browser-based, database driven front-end that has been developed using
Microsoft's Visual Studio .NET programming environment. The user interface leverages the MS.NET
Framework and the Microsoft Windows 2000 Web-server, IIS 5.0 to host web pages written in HTML,
Flash, asp, apsx, and XML.
Business Logic Layer - Validation and Application Rules
Business rules have been abstracted from both the presentation layer (so they can be easily re-used on
many different pages) and the data access layer (so that they can be modified without affecting the
structure of the database). The business logic layer consists of re-usable components, modules, and
.NET Web-services provide the application with input validation, database communications, user
authentication, Webcast notification, e-mail notification, PowerPoint upload, and JPG conversion and
other capabilities that result in sophisticated functionality and automation.
The business logic layer, in conjunction with the application UI and the SQL database, provides a
powerful and logical security model to define end-user access and capabilities in a familiar user/group
model. Moreover, the business layer provides several different levels of administrative privileges
providing fine-grain content, user, data, and application control.
6
7. INTERNATIONAL VIDEO-CONFERENCING, INC.
Data Access Layer - Security and Automation
While the Web-UI provides the user front-end, all of the component technologies are tightly integrated
via a sophisticated relational database running on Microsoft SQL 2000. There are hundreds of custom
developed, stored procedures used by the application to interact with the creation and management
schema, which is comprised of over 70 tables logically distributed among four (4) separate databases.
This fully normalized relational schema is the heart of the platform, and allows for great flexibility and
scalability in the way the solution is deployed, whether in an Enterprise or service provider or hosted
scenario.
IP-based Product for the Internet and Intranet
The system is an IP-centric solution that solves the problems associated with packet networks and
integration into the Web-based, distributed client/server paradigm. It is optimized for packet networks
and leverages advanced IP technologies to address network saturation.
SOPHISTICATED CONTENT CREATION
The solution features a powerful content creation application making it possible for authorized users to
create very high-quality video/audio/text from virtually any analog A/V source (camcorder, VCR, DVD,
production studio or videoconferencing end-point). These content creation components, or tools, allow
for synchronized delivery of live and/or on-demand streaming media with additional information
supplied and controlled by the creator in the form of slides (from PowerPoint), audience Q&A, audience
polling and webpage co-browsing. The encoding methodology accommodates both Internet and
intranet audiences.
The content creation sub-system is tightly coupled with industry standard H.323/H.320
videoconferencing codecs, enabling any authorized user to connect via ISDN or IP to create high-
quality video/audio from virtually anywhere in the world.
The encoding sub-system employs Windows Media Video 7 and AClep Audio CODECS. In rare cases,
when these CODECS are not pre-installed, the Microsoft Windows Media Player will automatically
request them from Microsoft.
The encoding sub-system automatically publishes three (3) streams for every live Webcast to
accommodate three (3) different connection speeds: low (target bit rate = 30K), medium (target bit rate
= 80K) and high (target bit rate 256K). These files are automatically archived (with synchronized data
elements such as PowerPoint slides, URL "pushes", and polling questions and answers) and used for on-
demand applications such as Video Mail and video on-demand.
Figure 2 - Conferserv Encoding Object
7
8. INTERNATIONAL VIDEO-CONFERENCING, INC.
INTELLIGENT, DISTRIBUTED CONFERENCING
The solution supports and promotes a distributed conferencing model with distributed server linking,
taking into consideration the major factors that affect bandwidth use and network performance in the
IP environment. When distributing content across a wide area network, multiple, distributed Conferserv
Distribution Nodes can be deployed to balance the conferencing load on the network - routing audio,
video, and data streams from distributed endpoints through appropriate local paths.
Through the use of static or dynamic server linking or cascading, coupled with intelligent content
routing and caching, administrators can create a Conferserv Enterprise topology that minimizes the
distribution of multiple copies of media across lower bandwidth-capable segments of a WAN or the
Internet.
Conferserv Distribution Node
The Conferserv Distribution Node helps organizations reduce bandwidth cost by accepting a single
ingress video and/or streaming source stream, and on egress, splitting that single source stream into
multiple individual content streams. For example, a Distribution Node deployed on a corporate LAN
will accept a single ingress stream and simultaneously split and distribute upon egress said content to
hundreds or event thousands of individuals. The Distribution Node's benefit in this situation is that it
eliminates the corporation's requirement to "pull" high bandwidth streams across the corporate border
gateway thus saving the enterprise substantial "upstream" bandwidth costs.
H.323 Simple Cascading
Simple cascading (H.243) is supported, which allows connection to other external MCUs to extend a
conference. In this mode, Conferserv is viewed as a single endpoint; and likewise the other MCUs
directly connected are viewed as a single endpoint. What this means is that the connected MCUs will
decide which audio and video stream to send to Conferserv and users connected will only see this
composite data.
Bandwidth Management
To ensure the best possible end user streaming experience, Conferserv features a compatibility
measurement utility called M.A.G.I.C., which stands for Multimedia Algorithm to Guaranteed Internet
Compatibility. MAGIC is a highly evolved measurement application that operates in conjunction with
the Enterprise Web server and database to automatically determine if the end viewer's PC has the
prerequisite streaming applications (OS, resolution, browser, player, security settings, and network
speed). Moreover, once the PC's compatibility is verified MAGIC then tests for the optimal bandwidth
between the user and the server. Using a mathematical algorithm, MAGIC then presents the viewer
with the optimal viewing rate for that viewer at that moment.
Additionally, the system negotiates bandwidth limits with clients when they connect. Dynamic
adjustments are made to allotted bandwidth based on network traffic congestion that is detected and
reported by clients. Audio is given first priority to assure minimum latency of audio delivery, even
during congested high-usage periods.
8
9. INTERNATIONAL VIDEO-CONFERENCING, INC.
In video applications, the bandwidth management engine intelligently prunes video streams -
eliminating intra-frames and key frames to individual endpoints as necessary. Each viewer receives a
coherent stream based on its bandwidth consumption capabilities. Performance for higher bandwidth
clients is not scaled down to the sending or receiving capabilities of lower bandwidth users. In
addition, data that cannot be used by lower-bandwidth recipients is not sent over the network.
Authentication
Access is controlled to Networks, Channels, and Content by authenticating a content producer's or
participant's user ID (email address) and password. When creating a Webcast, the content producer
has access to detailed security control parameters which allow for a targeted content viewing and
distribution profile to be created and enforced.
All administrative functions are supported with native SSL. The current product release does not
support SSL for the distribution of content, principally because of the CPU overhead associated with
media encryption.
Additionally, it can be configured to allow or disallow any routable IP address or subnet from an
individual conference.
System Security
Access to the content, data, and user information is governed by the security model - only authorized
Administrators can access the Administrative and Channel Portals. Each authorized Administrator's
user's login credentials (e-mail and password) will configure and present the Administrative Portal with
only the capabilities granted to that administrator, according to that user's highest administrative role
(the same administrator can have several different administrative roles for different Networks and
Channels). There are three (3) administrator roles:
• System Administrator
• Network Administrator
• Channel Administrator
System Administrator is the highest ranking administrator of the Conferserv system. Only one System
Administrator per Conferserv system can be configured.
The System Administrator is the only account that can create, inactivate, or permanently delete a
Conferserv Network. The System Administrator cannot login to any Channel Portals, and hence cannot
watch video, nor can the System Administrator upload synchronized slide presentations; this includes
the ability to upload a default channel presentation from the Administrative Portal.
Network Administrator privileges are granted by System Administrators; there can be any number of
Network Administrators per system. Network Administrators have unfettered access to view and modify
any content within all Channels in a given Network on the Conferserv system. Only Network
Administrators can create, modify, and delete Channels. Network Administrators can modify and
delete content belonging to any User, in any Channel, associated with the Network Administrator's
Network. A User could be designated as a Network Administrator in one Network, but have no rights
in another Network.
9
10. INTERNATIONAL VIDEO-CONFERENCING, INC.
Channel Administrator privileges are granted by the System or Network Administrators; there can be
any number of Channel Administrators per system. Channel Administrators have unfettered access to
any content within a given Channel within a given Network on the Conferserv system. Channel
Administrators can create and delete content belonging to any User in the designated Channel. A User
could be designated as a Network Administrator in one Network, a Channel Administrator in another
and a public user in a third.
Data Security
The security model used in the system is similar to a traditional Microsoft model. It is important for
administrators to periodically remind users not to share passwords. It is also important that the
physical server(s) are kept secure (physically and electronically) from unauthorized access.
System Monitoring
This is enabled with a robust suite of content management and monitoring services. The monitoring
sub-system is a move beyond basic SNMP data gathering to a more detailed and integrated set of
network, hardware, and application monitoring and analysis tools that provide a centralized view of all
activity across an enterprise or service provider network.
The monitoring system has the intelligence to notify a Network Operations Center, IT department,
customer care, or security personnel of content, server, network, core systems, and applications'
standard operating conditions, as well as problem or failure occurrences. Such notification is proactive
(notification of potential issues that can be reacted upon prior to an actual failure ex. fan failures) and
in real time. Monitoring enables organizations to:
• Gain insight into usage patterns with real-time tracking of system usage and
performance that enables enterprises to improve system effectiveness
• Reduce management overhead with centralized administration tools
• Proactively diagnose and prevent network problems from anywhere in the network
using a Web-based console
• Set and enforce QoS levels based on bandwidth availability, hardware performance,
audience location, or stream quality
• Improve response time, content quality, and save bandwidth by pre-loading popular
contentclose to the intended audience
Firewall Support
Monitoring enables organizations to:
The system uses standard Microsoft Windows Media streaming media and video conferencing ports for
system and end user communications. Assuming an Internet to intranet deployment scenario, the
following ports and associated protocols should be configured to allow communications properly
throughout the network and for viewers to be able to access content.
10