• Bhubaneswar India
  • Contact+ 91-9938772605
  • Mon - Sat : 10:00AM - 6:00PM

Category: technology

Know Your CCTV Storage Devices

Know Your CCTV Storage Devices

(Attributed to Khalid Wani, Senior Director – Sales, India, Western Digital)

As the CCTV camera becomes better and shoots videos in higher resolutions, the storage requirement also increases drastically. New-gen IP cameras generate richer videos and need far more storage than their analog predecessors did. Here is what you need to know about your CCTV storage solutions that you may not know.

1.       Write cycles

Video surveillance workloads are different from traditional IT workloads.  Why? Because while a standard computer hard disk drive (HDD) is designed to read, write, and transfer data, a surveillance drive is designed to focus mainly on writing data to the drive. Users in the security industry tend to check the recorded video, based on certain incidents happening more infrequently. Therefore, general desktop HDDs are typically not tested for the high write workloads of surveillance HDDs, which are optimized to prioritize writing. One example is the Western Digital WD Purple® portfolio, which is built from the ground up for video surveillance.

2.      Quality and Quantity of Data

A network video recorder (NVR) encodes and processes data on the camera before transmitting it to the recorder for storage and remote viewing. It connects to an IP camera system over an Ethernet or a Wi-Fi connection. When image quality and clarity are a priority, investing in an NVR that supports a higher resolution of video is critical. Additionally, HDD capacity also plays a key role in defining the quantity and quality of data that an NVR can store. It is important to use high-performance and high-capacity drives such as the Western Digital WD Purple Pro Surveillance Hard Drive that comes in up to 22TB[1] capacities.

3.      Local Storage

As the use of Artificial Intelligence (AI) applications and 4K video rise in adoption, they are driving the demand for storage to hold increasing amounts of data on the camera. Edge storage offers high-performance and can provide real-time analysis of data and becomes critical for backing up a connection to the cloud or if there is a sudden drop in network availability. As surveillance or CCTV cameras typically enable long, continuous recordings, the storage used must be built for high reliability and performance. The storage should be a cost-effective combination of ultra-endurance, high performance, and high capacity such as Western Digital’s WD Purple SC QD101 Ultra Endurance microSD™ Card that comes in up to 1TB of storage capacity and is built especially for video surveillance.

4.       Multiple Video Storage Levels

The video surveillance storage chosen depends on the use case and the camera types and the number of cameras installed. Today’s security cameras often record video continuously in 1080p, but 4K-compliant cameras are projected to make up over 24% of all network cameras shipped by 20232.  So, the CCTV or surveillance camera will generate even more data in the near future. This drives the need for cost-effective storage systems to manage the ever-growing data. Multiple storage tiers can help cost-effectively manage data on different storage devices, depending on the use cases and the storage costs and benefits evaluation.

5.       Cloud-Based Storage

For deeper insights and to reveal patterns from a massive amount of data it should be moved to the cloud. AI and DL need thousands of hours of training video, and petabytes of data. These workloads depend on the high-capacity capabilities of enterprise-class hard drives (HDDs) – such as 22TB drives from Western Digital and high-performance enterprise SSD flash devices, platforms, or arrays.  Western Digital offers enterprise-class NVMe™ SSDs; these performance NVMe SSDs target cloud compute and enterprise workloads that require low latency and high availability of data.

Tenable Research Reveals India Ranked Second in Total Number of Breaches Exposed in 2022

Solana hack | Comment from Satnam Narang, Sr. Staff Research Engineer, Tenable

The Solana hack that led to the theft of over $5 million dollars was the result of a leak of seed phrases (or mnemonic phrases), a group of random words that are used to help users access or recover their cryptocurrency wallet, by a wallet made by Slope Finance.

Users that want to interact with various blockchains typically create what are called hot wallets, which can be easily accessed through browser extensions or mobile and desktop applications. As part of its application’s logging functionality, Slope Finance stored users’ seed phrases in plaintext within these logs, which has been determined to be the source of the breach. Users that created wallets using Slope Wallet or imported their wallets into Slope from other wallets like Phantom, have been affected.

Anyone that possesses a seed phrase or mnemonic phrase can assume control of users’ cryptocurrency and NFTs, which is why conventional advice to never share your seed phrase is so prominent. Unfortunately in this instance, users weren’t at fault and the plaintext storage of their seed phrases is what led to the theft of their funds.

For cryptocurrency enthusiasts looking to interact with various blockchains, we strongly advise doing your own research to verify if a project has conducted any third-party audits or pentesting of their applications or infrastructure before trusting your funds to these applications. Additionally, users are strongly encouraged to consider using a cold wallet, which includes hardware wallets, paper wallets, or offline USB/CD wallets that are not as easily accessible, to store their cryptocurrencies for the long term. – Satnam Narang, Sr. Staff Research Engineer, Tenable

Cyient recognized as “Rising star” for Managed Services in U.S. region in ISG Internet of Things report

India, 4 Aug, 2022: Cyient, a leading consulting-led, industry-centric global technology solutions company announced that it has been recognized as the ‘Rising Star’ For Managed Services in the US region in ISG Provider Lens™ 2022 report on the Internet of Things – services and solutions.

According to ISG, a leading Global Technology Research & Advisory Firm’s quadrant report, managed IoT service models focus on optimizing performance and driving continuous improvement. Intelligent tools and analytics identify root causes of problems, define new sources of value, and reveal continually evolving security threats. Remote monitoring and OTA capabilities optimize efficiency and scale resources across multiple geographies – a critical capability in a tight labor market.

The report highlighted Cyient’s flexible deployments through usage-based modular services. The suite of managed services offerings enables remote monitoring, predictive analytics, lifecycle cost modeling of IoT devices, and the range of offerings through strategic acquisitions as the basis for Cyient’s recognition as a “Rising Star.”

On the ISG recognition, Pierre Carpentier, Global Head of Digital Technologies, Solutions, and Partnerships, Cyient said, “We are thrilled to be recognized by ISG as Rising Stars in IoT. This is proof that integrating our digital technology capabilities under our IntelliCyient suite of I4.0 solutions is accelerating our customers’ digital transformations in the asset-intensive industries we serve.”

Speaking about the recognition, Alex Kozlov, lead analyst at ISG Research, said, “Cyient combines industry expertise and a robust partner ecosystem to address key IoT challenges. These included enabling integration and interoperability between disparate systems and platforms, as well as leveraging data analytics to solve business problems and identify new opportunities.”

Managed services also play a key role in sustainability by leveraging analytics from day-to-day operations to minimize carbon impact, reduce energy consumption and increase user device efficiency.

The complete ISG Provider Lens™ Internet of Things – services and solutions June 2022 US report can be accessed here.

Micro Focus

Micro Focus LoadRunner SaaS Solutions Named a Leader by GigaOm Radar for Cloud Performance Testing Tools Report

Bangalore – August 4, 2022 – Micro Focus (LSE: MCRO; NYSE: MFGP) today announced that its SaaS offerings for the LoadRunner family of performance engineering solutions have achieved a leadership position in the GigaOm Radar for Cloud Performance Testing Tools in 2022. LoadRunner SaaS received consistently high marks across key criteria and evaluation metrics for cloud performance testing tools. In fact, the report said, “The LoadRunner product line from Micro Focus is still the strongest performer in this market, with the largest set of functionalities.”

According to the report, LoadRunner SaaS solutions received a high rating because of capabilities not available from competitors. “Simulated network behavior is a game changer for achieving real user experience testing and is unique in this market. The ability to consume the output of open-source testing tools as the basis for high-scale testing is also unique in this cloud market. The breadth of what network functions can be tested and how the tests can be structured confirms this solution’s positioning as a Leader,” the report said.

“LoadRunner has been at the forefront of best-in-class performance engineering solutions for decades,” said Vicky Giavelli, Director of Performance Engineering Product Management at Micro Focus. “With cloud and SaaS offerings now the de-facto way of doing business, LoadRunner leads the way for how dev teams deploy high-performing applications, allowing them to engineer quality and optimize performance at any point in the DevOps pipeline.” Micro Focus believes that performance testing must evolve into a proactive, continuous performance engineering discipline. Hence, LoadRunner is right-sized for different users, exploits test reuse, and delivers a scalable, shared infrastructure that helps establish a performance engineering ecosystem.

The GigaOm report also provided a recap of some other LoadRunner SaaS advantages. “Benefits include fluid licensing to avoid shelfware, stiff competition on price with its peers, and its ability to work with open-source development tools, which allows for easier integration with developers and DevOps teams.”

The LoadRunner family of performance engineering solutions includes LoadRunner Professional, LoadRunner Enterprise, LoadRunner Cloud and LoadRunner Developer. These help teams deliver high-performing apps that surpass customer expectations through end-to-end performance engineering.

Tenable Research Reveals India Ranked Second in Total Number of Breaches Exposed in 2022

Instagram account of Imran Khan hacked; Comment from Satnam Narang, Sr. Staff Research Engineer, Tenable

By Satnam Narang, Sr. Staff Research Engineer at Tenable

“It’s a lot more common to see verified Twitter accounts hacked to promote cryptocurrency giveaways through impersonations of individuals like Elon Musk and his associated companies. So seeing Imran Khan’s Instagram account hacked and used to post a screenshot of a fake tweet from Musk goes to show that even on alternative platforms like Instagram, Musk’s brand, his interest in cryptocurrencies and status as the richest man in the world remains a valuable lure in a scammer’s toolbox to take advantage of unsuspecting users interested in cryptocurrencies.

The website mentioned in the screenshots will take users to a page promising users to double their cryptocurrency, also known as advanced fee fraud. Users are asked to send a small portion of cryptocurrency upfront, anywhere from 0.1 Bitcoin to 10 Bitcoin in order to double it from anywhere between 0.2 Bitcoin up to 20 Bitcoin or more.

Unfortunately for users, they won’t receive anything in return. Unlike traditional finance, where users have some type of recourse to recover funds from a centralized authority, there is no way for them to recover their stolen cryptocurrency, which is why scammers have pivoted towards more cryptocurrency focused scams. No matter who posts about the possibility of doubling your cryptocurrency, be it a verified celebrity or political figure or a person with a large following on social media, just know that if it sounds too good to be true, it is.”

Pi Green Innovations receives a patent for its filterless technology in India

Pi Green Innovations receives a patent for its filterless technology in India

Pi Green Innovations Pvt Ltd, one of the emerging cleantech start-ups has been granted the India patent for its filterless technology, Carbon Cutter. The patented Pi Green Carbon Cutter Technology is used to manufacture retrofit devices for diesel generators and heavy vehicles. Pi Green Innovations filed for its India patent in 2017. The company develops technology-driven solutions to reduce particulate matter emissions (PM 2.5/PM 10) at the source and from ambient air. The company already holds patents for Carbon Cutter in the USA, China, UK, European Union & Singapore. The patents will enable Pi Green Innovations to present opportunities for businesses to adopt technology that will help address emissions at the source and contribute toward a sustainable future.

Pi Green Carbon Cutter, is a fully automatic, filterless solution that can be installed on diesel generators, heavy vehicles and industrial boilers to capture over 70% particulate matter. The company has several customers across key sectors like Auto, Hospitality, FMCG, Ports, SEZs, Heavy Engineering and Manufacturing etc. Pi Green’s Carbon Cutter solution has also been recognized as one of the best technologies for air purification globally at Smogathon 2018, a global summit conducted in Poland.

Commenting on this, Mr. Irfan Pathan, Co-Founder & CEO at Pi Green Innovations said, “We are delighted to receive this recognition for Pi Green’s Carbon Cutter technology. This is an encouraging validation for the entire team on how innovative and meaningful initiatives can lead to significant transformation. We aim to make clean air accessible to all and with India patent we are a step closer to our mission.”

Mr. Rizwan Shaikh, Co-Founder & Chief Invention Officer at Pi Green Innovations said, “Since early college days, I had a dream of making India proud on a global platform through innovation, Pi Green’s Carbon Cutter is a mix of some very basic scientific concepts with path-breaking innovation in the field of environment. It was satisfying to be granted patents across the Europe Union, USA, Singapore, China and UK, but being granted the patents in India is a dream come true. Going forward, my team and I will continue to contribute towards cleaning the air in India and make it a better place to breathe.”

The company was founded in 2017 as a five-member team operating out of a 150-sq-ft workshop and has since grown into an established Cleantech start-up with a team of over 100 operating from a 50,000-sq-ft. manufacturing facility in Pune. This is a company that is working to reduce pollution at source at the grassroot level.

Road to Using Drones and Rovers on Mars Begins on Active Volcano in Italy

Skypersonic – a division of Red Cat Holdings – has been hired by NASA to provide technology for simulated Mars mission

CATANIA, Italy, Aug. 3, 2022 – Skypersonic, which in 2021 signed a five-year contract with NASA to provide drone and rover software, hardware and support to NASA’s simulated Mars mission, has validated its software and hardware on Mt. Etna, an active volcano in Sicily where the landscape is similar to Martian geology.

Skypersonic’s “Skycopter” drone can be piloted virtually anywhere, from virtually anywhere, as the Skypersonic team demonstrated on Mt. Etna during a 15-day test. Using Skypersonic’s ground-breaking Long Range Real-Time Remote Piloting System, the drone and rover on the active volcano in Italy were controlled by personnel in Houston, Texas, in real time. Whereas most drones cannot be piloted without connecting to the GPS network, Skycopter uses technology that is able to control and track the drone in locations – such as Mars – where GPS is not available.

“This was a grueling test that we passed with flying colors,” said Skypersonic CEO Giuseppe Santangelo. “We look forward to the ultimate test – on Earth, at least – when our technology will be used during NASA’s upcoming yearlong simulated Mars mission. We are confident of also passing this test. During the simulated Mars mission, four crew members living and working in a 1,700-square-foot module on Earth, called Mars Dune Alpha, will carry out a series of missions – including remotely guided exploration and collection of specimens from rugged terrain elsewhere on Earth, up to thousands of miles away.”

The results of the successful test on Sicily’s active volcano – which included the collection of samples by the rover, an essential capability for Martian robotic exploration – were demonstrated to Italian media during a July press conference on Mt. Etna near the Catania Astrophysical Observatory. On hand for the demonstration were Santangelo and Dr. Salvatore Caffo, executive volcanologist at Etna Park. Once again, the pilot was in Houston. The project was a collaboration between Skypersonic, the University of Turin and Etna Park.

Managing Data in a regulated world- How financial institutions can navigate data risks while ensuring compliance

By- Varun Putchala Principal Consultant at Capco, Glenn Kurban Partner at Capco

Financial institutions are a major target of data breaches and deliberate attacks by cybercriminals. These data breaches can infringe upon the privacy of all stakeholders, often from unauthorized access to sensitive personally identifiable information (PII) data, such as social security numbers. Roughly 147 million customers were potentially affected by the Equifax data breach in September 2017. Numerous recent violations have occurred in areas of security, integrity, and confidentiality. This trend prompted regulators to strengthen existing laws, rules, and regulations to ensure firms prevent breaches or at least contain the risk substantially when a breach occurs. With this increase in regulatory mandates and the unpredictable nature of “what comes next,” firms are struggling to manage their data in a compliant manner.

Regulatory compliance is an often-underserved area. Since data is increasingly treated as an asset that drives decision-making, financial institutions can no longer ignore regulatory compliance. They must now remain fully compliant with all applicable regulatory obligations. By adopting a data governance program coupled with a regulatory intelligence function, financial institutions can govern their data effectively. Most importantly, this approach ensures adherence to regulatory compliance in an ever-changing regulatory landscape. Financial institutions can leverage the guidance in this paper to enact effective programs from scratch or improve existing ones.

General Viewpoint-

Data is growing exponentially, and the regulatory landscape continues evolving. As financial institutions strive to keep up with the pace of change, substantial gaps are forming resulting in non-compliance. Regulatory compliance is the adherence to laws, rules, and regulations (LRRs) that are created by government and industry regulatory authorities. Financial institutions must demonstrate full compliance with LRRs to ensure they are not met with regulatory fines.

Regulatory compliance can go unnoticed if it is not strictly enforced internally within the institution. A primary diagnostic of non-compliance is a data breach. These breaches expose the inadequate state of a compliance program in a public and often detrimental fashion. Regulatory examinations of the existing datamanagement practices have revealed clear violations or at least the lack of a mature regulatory compliant data program.

The repercussion of Non-Compliance-

Regulatory compliance is emerging as a critical area, and institutions are left with no choice but to remain compliant with regulatory obligations. Regulations are created to ensure banks operate lawfully while protecting customers, stakeholders, employees, and the company itself. Institutions that cannot demonstrate compliance or those subject to violations may face any or all the following repercussions:

  1. Monetary Penalties / Fines – Regulators are not hesitant to impose penalties on banks that do not meet regulatory obligations. Data acquired from the Bank Fines Report 2020 by Finbold.com indicates a total of $15.13 billion in aggregated fines in 2020. The United States accounts for the highest fines, at $11.11 billion or 73.4 percent of the issued fines.
  2. Audits – Breaches are often the trigger points for an audit. It prompts regulators to investigate the bank’s functions, processes, and financials more regularly.
  3. Reputational Damage – Non-compliance can negatively influence an institution’s public reputation. This can result in a loss of confidence among customers, resulting in a loss of market share and valuation in the case of a publicly traded company.
  4. Cessation of Business – An increase in the frequency of violations can adversely affect the institution. They will ultimately be left with no choice but to cease business operations.

Enabling regulatory compliant data governance program-

Financial institutions can easily ensure their data supports regulatory compliance. This can be accomplished by building an effective data governance program alongside regulatory guidance.

  1. An effective data governance program – Data management defines systems, processes, and standards that determine the way data is created, stored, consumed, and reported in an organization. Data governance is a function of data management; it is the strategy applied to govern its management and facilitate the sequence of a datalifecycle. This function involves documenting data types, ownership, and consumers, and assessing its fit for the desired purpose. It democratizes data and ensures it is trusted at its source and is readily available while establishing high levels of integrity, quality, consistency, accuracy, confidentiality, privacy, and security.
  1. Data Classification and Catalog – The first essential step in data governance is classifying the organization’s data into structured and unstructured formats. It is necessary that this data is organized and managed in data catalogs. As part of this step, all data attributes need to be identified and mapped onto locations where they are physically stored. Simultaneously, banks can also establish their Authoritative Data Sources to ensure data is trusted at its source.
  2. Fit for use and purpose – Organizations have long been using their enterprise information assets for inappropriate applications. Hence, their use must be periodically reviewed to determine the purpose and their utility for fulfilling the needs of consumers. The data residing in these information assets must be usable and achieve the intended purpose. This review can be accomplished as part of the firm’s recertification process when enterprise assets are verified and certified based othen criticality/sensitivity of data residing within applications and EUCs.
  3. Data Lineage – Documenting the journey of data from its source and to the destination (i.e., where it is consumed) is necessary for organizations to ensure traceability. This process illustrates the flow of data through applications and EUCs while undergoing various transformations along the way. All necessary interfaces that facilitate the flow of data must be documented, as well.
  4. Minimum Controls – After the enterprise information assets and data residing within are documented, classified, and rated for risks; minimum controls need to be determined. A controls framework may be established for this purpose to document and organize the institution’s internal controls. These guidelines associate controls to the risks for a financial institution. As controls are applied, it is necessary that periodic gap assessments relative to the existing control environment are performed to ensure high levels of data integrity and quality.
  1. Minimum Controls – After the enterprise information assets and data residing within are documented, classified, and rated for risks; minimum controls need to be determined. A controls framework may be established for this purpose to document and organize the institution’s internal controls. These guidelines associate controls to the risks for a financial institution. As controls are applied, it is necessary that periodic gap assessments relative to the existing control environment are performed to ensure high levels of data integrity and quality.

Capco’s center for Regulatory Intelligence- Risk management and compliance functions are overwhelmed by the velocity and volume of regulatory information, often missing key trends and context leading to missed compliance obligations that can be mapped. Capco’s Regulatory Intelligence Library and Regulatory Data Feed helps clients minimize risk by illuminating regulator expectations, identifying obligations, and defining the risks and controls. Capco supports institutions as they work to minimize risk, by proactively identifying legal and regulatory requirements and supervisory expectations and analyzing the impact of geopolitical events on their business. Our Center for Regulatory Intelligence (“CRI”) is a single source of comprehensive research and analysis from primary source documents, government surveillance, industry networks, and qualitative and quantitative data.

Sharat V. Rao, Joint Secretary, Indian Plumbing Association

IoT – Internet of Things – Revolutionizing the Water & Sewer Management Landscape

By Sharat V. Rao, Joint Secretary, Indian Plumbing Association

The water supply infrastructure in India today is plagued by a wide range of problems. To solve them, we need to implement new age technologies, like the “Internet of Things”. IoT-based water management systems use real-time data from the sensors and help us automate different processes in the water supply infra and reduce water wastage and losses.

IoT helps connect the physical world with the digital world. Sensors collect data from the environment, and actuators interact with and transform the physical world. IoT devices connect, and the Internet ensures that all information we need about our water supply is available at our fingertips. All this can be accessed using a mobile or web dashboard, anytime anywhere in the world. Some applications in water management where IoT can help us optimize our water management are:

  1. Smart Water Distribution

Using IoT and data solutions for asset management, companies can keep essential measurements such as water pressure, temperature, flow, etc., at hand, integrate predictive maintenance and avoid breakage and downtime of equipment. It can also help enhance the efficiency of water systems such as water collectors, treatment plants, distribution mains and wastewater recycling centres.

  1. Smart Billing System

Smart meters and monitoring hubs allow real-time water consumption measuring, help identify excessive usage and waste points, correct usage patterns, and make predictions for future consumption. This water management technology is helpful for production and distribution managers and bulk households. We can correct water consumption routines using smart meters and water monitoring systems and reach sustainability and budgeting goals.

  1. Water Level Controllers

IoT-based water management systems help optimise and control water usage at different levels — households, communities, countries and the whole planet- based on real-time supply and demand data. It brings transparency and improved control to the entire water supply chain, from a freshwater reservoir to wastewater collecting and recycling. This category includes IoT devices for water management, systems and software tools that help optimize water production, distribution and consumption and enable innovative water treatment practices.

  1. Water Quality Monitoring

With devices like sensors and probes, several water parameters can be measured in real-time from remote locations. These devices share live data about the quality of a water body to a platform suite. By using this platform, a person or a company can take practical actions to ensure optimum water quality. By tracking TDS, pH and Hardness at water supply nodes and building inlets, residents and govt. Authorities can gauge the effectiveness of water treatment measures.

  1. Storm Drain/ Sewer Line Management

Ultrasonic is the most popular technology to detect where debris/ choke points exist in the network. This is due to that fact that ultrasonic sensors are small, mobile and they have no moving parts; they are easy to use, affordable and they do not require much maintenance.