posted Oct 30, 2016, 9:13 AM by Sami Lehtinen
updated Oct 30, 2016, 9:14 AM
- Played around at one site with Tomographic Motion Detector TMD network being installed. Worked really well. I also liked the concept. It also provides nice visual field disturbance map, which makes it very easy to check video feed what's triggering the motion detection in quite high accuracy. It can be used to automatically lock on and follow targets if there are turret (pan & tilt & zoom) cams. As well as external secure perimeter Protection sensing system. In many of these cases one of primary goals is to provide prewarning of possible impending intrusion or surveillance near the area. One of the neat stuff for TMD network was feature which allows people to carry RF identifier transmitters which disables alarm only for small perimeter around them. This actually allows monitoring large spaces so that people can be working in the area when alarm is armed. If anything / anyone is moving in the area without such device, the alarm will go on. No more sneaking around or tail gating. kw: security, motion detection, perimeter intrusion detection system, electronic fencing, laser fencing, security system, IDS.
- Yet for most of physical security same rules apply as on computer & networks side. Nobody really cares. The ones who really care, are extremely rare exceptions.
- Lol, Microsoft. Now it seems that the bridging between Skype for Business and the regular Skype is broken. All contacts are just "updating status". After very long wait the state of Skype users turned in to Unknown. - It's ridiculous how much Microsoft can fail with these quite simple tasks and integrating between two of their own products. I would understand there are issues if it would be just two developers, from two different companies. But now it's plenty of developers from large corporation. They should get this kind of stuff done quickly and well. - This is great example about the efficiency question I asked earlier. Why some small companies get so much done, and some huge companies with vast resources doesn't seem to get much done at all.
- S-Ryhmä large Finnish retailer started to use e-Receipts with their mobile app. But the information on the receipt isn't detailed at all. It's only "ambiguous name of the article" + price. No article code, VAT group / percentage, etc. - I wonder if this is done on purpose to hide some of the things which made retailers afraid about electronic receipts.
- Business as usual. First they complains that something is expensive. Then they complain it's not as good as the expensive option. Then they complain again about the better and more expensive option being more expensive. - I guess I can't really comment this because I don't have anything possible to say about this.
- Studied Ficolo Services. Finnish Co-Location is underground data center facility. As well as Capnova.
- Wondered if I should bother to setup DMARK. But so far it seems that I won't bother. It's not that necessary. I wonder why Outlook.com leaks out private addresses and causes SPF failures. I think it's pretty much fail. Wtf are they doing? "received-spf: SoftFail (protection.outlook.com: domain of transitioning outlook.com discourages use of 10.152.4.59 as permitted sender) " - I think their spam protection is totally failing on multiple levels.
- Laughed at one operator, which seems to think that VDSL2 is superior technology, compared to single-mode otpical fiber and cat6 Ethernet cabling. Of course it's possible to run VDSL2 over CAT6 cabling, but ... Phew. It seems that even 10 Gbit/s should be well possible on 20 meters of Cat6 cabling without major problems in this kind of residential setup. Yet the cables go along with power lines, so it might be (?) potential source of problems.
- Studied NFPA 704 Diamond. Good to know, even if it's usually best to avoid any situations when there should be any hazards around or generally environmental parameters out of ordinary range.
- Reminded my self about Super-Seeding. They claim it's something specia, even if it's something extremely obvious if you want to minimize your bandwidth utilization. Just like the algorithm where you pick always the rarest block to be downloader or use weighted probabilities to prefer 'rarer' blocks. Yet always picking the rarest could also lead to situations where almost all peers start to download that single rare block. Yet in some cases, that's something which might save file from becoming permanently partitially available.