Research some of the newest security technology in edge-based video surveillance by going to this article: Living on the edge. https://www.securityinfowatch.com/video-surveillance/article/10946600/the-benefits-of-edgebased-video-surveillance-technologyHow does edge-based security affect the cost, functionality, and maintenance requirements of a surveillance system?Fully address the questions in this discussion; provide a valid rationale or a citation for your choices; your initial post is due by Thursday, and you must respond to at least two other students’ views.The initial post should be at least 350 words in length. Each reply post should be at least 150 words in length.APA format
Research some of the newest security technology in edge-based video surveillance by going to this article: Living on the edge. https://www.securityinfowatch.com/video-surveillance/article/10946600/t
Nipulkumar Hitenchandra Patel  Edge-based security COLLAPSE Top of Form How does edge-based security affect the cost, functionality, and maintenance requirements of a surveillance system?             Security continues to be a very necessary part of our lives. Barriers and other cautionary measures are always employed to protect people and their belongings from outside threats and attacks. One of the ways to get additional protection is by using video surveillance. This provides security by monitoring all that is happening at a certain location and providing evidence if need be. There is a growing need for high-resolution video surveillance has led to advancements in video camera technology. However, high-resolution videos require a lot of financial investment while security budgets are still tight. There also arises a need to have better networking structures due to the use of IP cameras (Gorski, 2013). These cameras transmit all their recordings to a central server which needs the capability to store all the high resolutions recordings. Organizations are then required to have quality and multiple servers which can process the high-resolution videos recorded which add to the overall costs. Most times, these videos are compressed which in turn means that they are not ideal for forensic purposes.             Edge-based security has become a better solution “for greater accuracy, more detailed images, and more intuitive capabilities” (Gorski, 2013). Edge-based surveillance used the camera for storage on an SD or memory card. The storage is sufficient enough for the day-to-day recordings. The storage can also be added as needed without incurring many additional costs. Furthermore, newer versions of these cameras have advanced storage settings where they only start recording if triggered such as using noise or motion (Gorski, 2013). The users can also purchase the cameras based on their needs such as size and surveillance needs.             These systems also reduce costs due to scalability where if more cameras are added, the only thing needed is additional storage, and no recording software licenses are required. They also provide less costly maintenance. This is because, there are “no server maintenance, no complex proprietary hardware and software, and no storage or scaling limitations” (Gorski, 2013). This then requires very little maintenance. Bottom of Form Shamimul Islam  Week 7 discussion COLLAPSE Top of Form Security Technology in Edge-based Video Surveillance Initially, analog CCTVs were used for surveillance. Then later, IP cameras were introduced for the same, where videos were relayed over network cables (centralized approach). With the digitization of videos, developers would cleverly use algorithms to analyze digital videos automatically (Alalouff, 2020). In the recent past, many trends have been observed towards more analytics occurring at the camera end, a concept called the network’s edge. It has the benefit of analyzing videos locally without sending them over networks and consuming much bandwidth. Still, instead, the analytics results are sent to the Video Management Software (VMS) in use as lightweight information (Alalouff, 2020). The amount of storage space and bandwidth required for the practice is reduced. Also, there is no need to have an operator monitor the moves when nothing is going on. The high-resolution video demanded much from the central server and the whole network. When more cameras are loaded to the set-up, the restriction becomes greater, decelerating the entire network, and the users are therefore forced to spend more resources on more servers (Gorski, 2013). Besides, constraints on bandwidth force an organization to compress the visual data from the cameras with high resolutions. Even though compressing videos makes it easy for storage and transferring, the resultant video after compression is not ideal for forensic investigative purposes.  In the edge-based security approach, on the other hand, video intelligence is driven to the network’s edge, an aspect that has a great result on the cost, maintenance, and functionality needs of a surveillance system (Gorski, 2013). The costly nature of the centralized systems is countered in edge-based systems by minimizing the number of cameras used in the system, thus reducing the cost of purchases. The maintenance of edge-based systems is also less costly as compared to a centralized system. This happens because there is no central server, and complex software, hardware system, and scaling and storage limitations are involved. Bottom of Form




Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.