Becoming the Host With the Most
It isn’t news that the Convergence Wave opened up a variety of ways to move video over long distances. As long as sufficient network bandwidth is available, a video stream can be sent literally around the world.
Monitoring cameras remotely isn’t the only use for IP technology, however. Several companies are realizing a new business model is emerging: hosted services. Hosting a service essentially means that a device or application normally housed locally at a customer’s facility is moved across the Internet to a facility used for housing Web or other types of servers.
This new method of providing service isn’t limited to the security industry. Most of the large software providers like Microsoft are looking at hosted versions of their most popular software packages. Google has created hosted versions of word processing and spreadsheet applications, not to mention its popular maps feature.
There are lots of reasons why hosted services should be considered for the right application. There are just as many why it may not be appropriate. The professional integrator needs to consider all sides of the discussion before committing itself and its customer to a hosting plan. As with all new or unfamiliar technologies, do your homework. Let’s get that started.
Who Are Host Providers?
Not everyone can afford the extremely large bandwidth pipes needed for serving up Web pages and applications used by thousands or even millions of people every day. Throughout the country, companies started popping up providing Internet connections as well as space on a provided server, or physical space in a secure location (in a cage, essentially) for a server or appliance that the customer themselves supplies.
They provided security, redundancy and high speed access to everyone else. Some were very large, opening branches across the country and paying for large optical carrier (OC) fiber connections that form part of the backbone of the Internet. Some could be smaller, regional or local companies that could host servers for smaller, local customers that didn’t necessarily need the huge backbone pipes, but needed to give the public access to information.
Through the use of generators, complex power management and redundancy systems, these providers could guarantee a high level of quality and service to their customers.
Since IP security used the same network technologies and standards as the servers and appliances they were already running, it made sense to offer the same services to our industry.
Making the Case for Hosting
For the security industry, there are currently two main areas that hosting has gained in acceptance, remote video storage and access control databases.
Access control saw the earliest implementation of the new remote network technology. With a conventional access control system, the central database for the system would be located on a server at the customer’s facility. They or the integrator would be responsible for maintaining not only the database but the hardware it was stored on. If the customer required redundancy of both hardware and software, elaborate RAID storage and power conditioning systems were needed, all at great expense.
Once it was determined that the database could be located anywhere on the LAN, the next logical conclusion was that it could also be located across the WAN or even the Internet, with a hosting provider. The hosting provider would simply store the database on their server, and give the customer access across the Internet to make changes. Some providers would develop their own user interfaces with Web technologies to simplify management for the user. It is these value-added services that usually separate one provider from another.
Security Is Our Business, Too
For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add sales to your bottom line.
A free subscription to the #1 resource for the residential and commercial security industry will prove to be invaluable. Subscribe today!
Recommended For You
Cloud security can present a paradox: companies love the flexibility and versatility of cloud security management, but are unsure if the cloud itself is secure enough to house their vitally important systems.
From processing power to lens selection to proper positioning, here are 13 tips to help shed light on proper installation of cameras in low-light conditions.