anyone has ideas to share with?
I prefer the standalone solution of Network Video Recorders and here are advantages which I have gathered for standalone version:
1) Linux based – no viruses, no Win failure, no unexpected system restart, no influence of other applications
2) "Invisible" black-box – easy to hide on safe place
3) Lower power consumption in comparison with standard PC so you can save money on the electricity costs
4) Much lower risk of data losing or uninstalling the interface due to unprofessional handling (in comparison with PC with multiple users)
5) No need of a client software installation – just Java within InternetExplorer, Mozilla Firefox, Google Chrome or Apple Safari
6) Client platform independent (Win, Linux and Mac)
7) Cost-effective in comparison with buying a new PC for the software NVR (although software itself may be for free)
Here is the one example of the standalone NVR: http://www.ipcorder.com/en/showroom
Both these recording solutions provide a storage facility for the content captured by security cameras and take care of the functions of managing the cameras, recording content, viewing content, and archiving content. The differences between the two lie in how they operate and the features they provide.
the manipulation must be as easy as possible, with lower cost of course, families usually use another PC to do the remote monitoring or search events after being triggered...500GB HDD should be enough for recording for weeks.
See all the latest links and resources that supplement the current issue of Security Management magazine.
Security Management is the award-winning publication of ASIS International, the preeminent international
organization for security professionals, with more than 38,000 members worldwide.
ASIS International, Inc. Worldwide Headquarters, 1625 Prince Street, Alexandria, Virginia 22314-2818 U.S.A.
703.519.6200 | fax 703.519.6299 | www.asisonline.org
© 2014 Security Management
This site is protected by copyright and trade mark laws under U.S. and International law.
No part of this work may be reproduced without the written permission of Security Management.