-
The design principles of the government network security scheme When designing and planning the government network system security scheme, the following principles should be followed: 1. The principle of demand, risk and cost balance analysis is difficult to achieve absolute security for any network, and it is not necessarily necessary. It is necessary to conduct actual research on a network (including tasks, performance, structure, reliability and maintainability
Published on: January 5, 2019 Number of hits: 838
-
Based on a deep understanding of information security, referring to advanced standards and concepts at home and abroad, and based on years of experience in security field construction, Shanghai Dehang Technology has summarized and refined an information security assurance system for the power industry that can fully meet the current and future development needs of the power industry. With "information assurance (IA)" as the center, and "in-depth defense" and "comprehensive prevention" as the guidance, With "Information
Published on: January 5, 2019 Number of hits: 272
-
Cloud computing means that data is transferred to a machine outside the sovereign control of users, that is, the hands of cloud computing service providers. As the main driver of cloud computing, there are nine major security issues: 1. privileged user access 2. regulatory compliance 3. data location 4. data isolation&
Published on: January 5, 2019 Number of hits: 216
-
Impact of water ingress on the cabling infrastructure: 1. Impact on the performance of electronic equipment Water ingress into the data cabling system may have a significant impact on the ability of the cable to support high-speed data applications. In some cases, cables that are close to the upper limit of link length specified in the standard (and therefore close to the upper limit of attenuation budget)
Published on: January 5, 2019 Number of hits: 226
-
IT outsourcing service content 1. Computer desktop service DeAir Technology provides customers with various software and hardware desktop service software: operating systems of various platforms, various application software, various database systems, and various networks
Published on: January 5, 2019 Number of hits: 4256
-
Proposal and overview of the access control and attendance system Attendance management, as its name implies, is to manage the attendance of staff on and off duty or attending meetings. The specific attendance date and time can be clearly recorded by reading the card. At the end of the month, the working hours of all staff shall be comprehensively counted and submitted to the Finance Department to provide basis for rewards and punishments on each staff's salary
Published on: January 5, 2019 Number of hits: 499
-
The serviceability of the data center refers to its ability to provide diversified, efficient, professional and sustainable services. It is mainly reflected in three aspects: maintainability, service controllability and operation service capability. (1) Maintainability is a measure of the ease of repair and maintenance during operation. The maintainability of the data center is the premise and guarantee of sustainable development. In data
Published on: January 5, 2019 Number of hits: 289
-
We have finished talking about the power system in IDC data center. Next, we would like to introduce other system environment control systems that we should pay attention to in the data center. Usually, precision air conditioners in the computer room are used to adjust the environment of the data center to ensure the operating environment of IT equipment such as servers. For high fever
Published on: January 5, 2019 Number of hits: 481
-
Network video server (DVS, digitalvideoserver), Also known as digital video encoder, it is a professional network transmission equipment for compressing and processing audio and video data. It consists of audio and video compression codec chip, input and output channels, network interface, audio and video interface, RS4
Published on: January 5, 2019 Number of hits: 201
-
There are the following ten common problems in purchasing and installing intrusion detectors: Question 1: Generally speaking, there is a rule in selecting and installing intrusion detectors, that is, "indoor passive, outdoor active". Is this the general selection principle of intrusion detectors? Answer: The so-called passive and active are distinguished by the detection means of the detector. Passive infrared detector refers to
Published on: January 5, 2019 Number of hits: 300
-
The main body of the camera part is the camera, whose function is to observe and collect information. The performance of the camera and its installation mode are important factors that determine the quality of the system. The following parameters should be noted when selecting the surveillance camera: 1) Color: There are two types of cameras: black and white and color. Generally, the horizontal definition of black and white cameras is higher than that of color cameras, and
Published on: January 5, 2019 Number of hits: 220
-
When installing the access control system, attention should be paid to the following three aspects: First, electromagnetic interference prevention. For card readers and door opening buttons, special attention should be paid to electromagnetic interference prevention, especially the interference of lighting switches, electric typewriters and computers. If possible, the card reader shall be installed 30c away from the strong current power supply
Published on: January 5, 2019 Number of hits: 542
-
In recent years, infrared technology has been widely used in the field of security monitoring because it can achieve clear shooting in the zero illumination environment at night. The infrared camera needs an auxiliary light source to complete the monitoring work in the nightscape or zero illumination environment. It has developed from the early high-power halogen lamp to the current LED array infrared lamp and infrared camera technology
Published on: January 5, 2019 Number of hits: 215
-
Video monitoring system has been widely used in roads, public security, forest fire prevention, buildings, factories, shopping malls and other industries. China's security monitoring system for safe cities has been fully implemented in all provinces and cities across the country, and has achieved remarkable results. In the huge monitoring system, there are countless fastballs and cameras in the front end; Large monitoring system
Published on: January 5, 2019 Number of hits: 237
-
Different lens brands have different definitions of megapixel lens. Taking 1.5 megapixel lens as an example, some Japanese brands define that 70% of the image area can reach 1.5 megapixel from the center of the image to the four sides of the image, and other parts can reach 1 million pixels. Such a lens is called a 1.5 megapixel lens; Some Japanese brands define: 65% of the picture
Published on: January 5, 2019 Number of hits: 213
-
Wuxi Monitoring - With the increasing progress of CCD and DSP technology, the low illumination infrared camera is becoming more mature and stable. Many manufacturers (merchants) have marked the illuminance parameter of camera 110 lower and lower, from 1.0lux to 0.1lux, then to 0.001lux, etc., but the camera may not really have such high sensitivity, so that everyone can truly understand the low
Published on: January 5, 2019 Number of hits: 220
-
With the increasing progress of CCD and DSP technology, the low illumination infrared camera has become increasingly mature and stable. Many manufacturers (merchants) have marked the illuminance parameter of camera 110 lower and lower, from 1.0lux to 0.1lux, to 0.001lux, etc., but the camera may not really have such high sensitivity, so that everyone can really understand the low illumination infrared camera
Published on: January 5, 2019 Number of hits: 234
-
WiFi is a wireless network composed of AP (AccessPoint) and wireless network card. AP is generally called network bridge or access point, which is the bridge between traditional wired LAN and wireless LAN. Therefore, any PC equipped with wireless network card can share the resources of wired LAN or even WAN through AP. Its working principle is similar
Published on: January 5, 2019 Number of hits: 197
-
Wireless WIFI technology II - WIFI and 3G and Bluetooth technology I - WIFI and 3G technology 1. Voice and WLAN are more suitable for broadcast voice services than 3G technology that meets large traffic and multi-user number (P
Published on: January 5, 2019 Number of hits: 239
-
Wuxi Surveillance, the protective covers of surveillance cameras can be divided into indoor type and outdoor type according to the different places of use. Here is a brief introduction of the two types. 1、 Indoor protective cover The indoor protective cover must be able to protect the camera and lens from dust, impurities and corrosive gases
Published on: January 5, 2019 Number of hits: 293
346 in total
20 entries per page
Page: 17/18