Glossary

Previous  Print this Topic

A

ACL - ACL stands for access control list. It is a table that tells a computer operating system the access rights that each user has to a system object, such as a file directory or an individual file. Each object has a security attribute that identifies its access control list. The list has an entry for each system user with access privileges. The most common privileges include the ability to read files, to write files, and to execute the files.

Administrator - Administrators have complete and unrestricted access to a computer or domain.

Analog camera - A surveillance camera which uses older technology video cable to transfer images to a recording device, such as a VCR.  It is similar to the yellow RCA/BNC cable that older television sets use to connect to a VCR.

Analytics - A technology used to analyze video for specific data, behavior, objects or attitude.  It can be used to automate alarms and make searching through video easier.

Automatic fail-over - If there is more than one Vault available, clients can divide their use of the available Vaults. Clients fail-over from the current Vault in use to another Vault, should the current Vault fail.

B

C

Camera Policies - A policy is a set of rules which define how to record video from cameras.

Camera Pool - A camera pool is a user defined virtual grouping of cameras used to search video from specified cameras. For example, suppose you have a camera pool called "Doors". It is comprised of all the cameras that watch over the doors of your business. When you need to see who's come or gone, select the "Doors" camera pool as a search criteria, and only video captured from this camera pool are included. There is no limit to the number of camera pools your Phoenix RSM solution may have.

Channel - The name traditionally used to describe the connection between a camera and the recorder.

CIF - CIF refers to the size of the video in pixels. CIF is a video image 352x288. Other common sizes include QCIF (176x144), 4CIF (704x480), and 16CIF (1408x1152).

Client - Clients provide interfaces for system administrators and end users. With Phoenix RSM's balanced, extended client/server architecture, clients often play roles normally supported by servers. This enables increased Information Repository flexibility, security, robustness and capacity.

Clip Name - Most video editing systems and digital cameras have a machine-assigned file name (such as 123abc_ffx2) for a piece of video. "Clip Name" is a metadata value of a human-assigned name (such as jon_talking) for that video clip. Clip Name is also used by the video editing systems to identify a video. Both the machine-assigned filename and the human-assigned clip name are searchable in Phoenix RSM and therefore are separate search criteria.

Collapsing Data - When data is removed from the primary hard disk storage tier and replaced with a pointer file. A copy of the file exists in the Information Repository and a pointer to the file exists in the computer's file system. Data that is collapsed appears to the networked computer's file system as if it resides locally.

Communications Timeout - If the product is unable to connect with a computer on the network or communications are interrupted during a job, it waits a predefined period of time before completely dropping the connection. This period of time is called the "communications timeout."

Component - A component is a single application or utility that could interact with or have dependencies on other applications. Phoenix RSM software consists of several separate components that work together to protect your files.

CRC - Cyclic redundancy check is used to ensure data integrity by detecting accidental alterations of data during transmission or storage. A unique numeric value is assigned to captured or ingested files, and then an algorithm calculates this value based on data stream, file size, and other characteristics. The CRC value is compared on client and server, and validated.

D

Data Service Policies - These policies are sets of rules which define how the videos or files are duplicated, moved, or deleted across multiple storage devices.

Data Services Service - Data Services Service enforces or implements the Data Service Policies.

Default - A default value or setting used by a device or program when no other value or setting has been specified.

DHCP - A network configuration protocol used to assign addresses to computers on a network.

Digital camera - A surveillance camera which uses newer network cable to transfer images to a recording computer, such as a NVR. These cameras connect to your network like your computer.

Digital fingerprinting - A checksum (or digital fingerprint) that uniquely identifies video with a "fingerprint". It is a numerical value calculated from the SHA256 hash algorithm.

DVR - A device which records video from an analog source, converts it to a digital format, and then stores it on a disk or some other similar storage medium.

Dynamic resource allocation - The process used by Phoenix RSM to find and use storage resources that may be available across multiple storage devices.

E

Encoder - A device which takes the video signal created by an analog camera and converts it to a digital format as created by newer digital cameras. It is most often seen when using older cameras in newer digital systems.

F

Forensics - The process of reviewing recorded surveillance video to determine what happened in the past. Phoenix RSM is a forensic video system.

Frames per second (FPS) - Frames per second, is an expression of frame rate. Surveillance cameras record anywhere from less than 1 FPS to greater than 30 FPS. For the best chance of conviction based on video evidence in a court of law, chain of custody procedures require 30 FPS.The higher the frame rate, the smoother the video looks.  

G

H

H264 - A term used to describe the format of digital video. H264 is commonly used by digital surveillance cameras.

Header - In data storage, a header is an area on media where the parameters assigned during preparation of the media are stored. The information contained in the header includes access control lists (ACL), storage pool information, media size, type, etc.

Histogram - Statistically, a histogram visually shows the distribution of data.

Host - The computer where files originate or where the policy resides.

I

Information Lifecycle Management (ILM) - The policies, processes, practices, and tools used to align the business value of information with the most appropriate and cost-effective IT infrastructure from the time information is conceived through its final disposition. When ILM is video aware, it is called Video Lifecycle Management (VLM).

Information Repository - The Information Repository is where data is stored. Since a Vault is a storage device used to store files, the Information Repository is made up of all the storage devices, clients and Vaults on your network.

Ingesting - The process of using Phoenix RSM clients to archive or move data, including metadata, from a networked computer into the Information Repository. Capturing video from RTSP enabled IP cameras is a type of ingesting.

J

K

L

Label - A label (or media label) is a name assigned to a unit of media. Assigned manually to media, unless a barcode system is available, the labels are used for media identification. If a barcode system is in use, the label name is superseded by the barcode on the media. When media is loaded into a drive, the Information Repository's first task is to read the label to identify and ensure that the proper media unit is being used.

lic - File extension for a license file. To be seen by the Information Repository, the license file(s) must be in the <install-dir>/Config folder.

Live Viewer - The application that is used to watch what is being seen by your surveillance camera.

Load balancing - Load balancing is the distribution of jobs and data throughout the Information Repository. Phoenix RSM queries each Vault regarding the best match for processing requirements, storage resources, free space, and then establishes a connection to the Vault and copies files to the Vault. The network remains load balanced.

Locator Service - The Locator Service makes dynamic resource allocation possible which delivers unlimited storage resource accessibility within the network. It works as a virtual middle tier to provide information that enables clients and Vaults to work like a traditional client/server system, but without the need for hard-coded static links between clients and servers. In contrast, the Locator architecture is flexible to allow dynamic client access to any storage resource on your network. The Locator maintains a list of currently available product services, by using a multicast and beacon technology, and it provides this list to clients on the network as needed. To accomplish this, the Locator constantly "listens" for active registered vaults. The Locator list notes Vault status and location changes. Every Locator is self-propagating and shares information with other Locators within the Information Repository.

Log file - Error logs are created only when the program encounters a problem. Set the pathname in Vault Admin > Vault Properties > logs to define where error logs are written and stored. An activity log provides logistical information about jobs.

Log file rotation - When a new log file is created (error log or activity log), the older file is renamed and the newer log becomes the primary log file. This is log file rotation. You can specify the maximum file size, maximum number of files to keep, and the interval for how often to check if rotation is needed.

Logging - The ability to create log entries that are associated with a certain video clip. These log entries contain information about a clip such as time in and time out, the user who created it, date and time created, bullet color associated with the clip, and the title and description of the clip

Low-resolution companion/proxy file - Playable video, a fraction of the size of the original video, created when video is captured. This primary video footage remains online and is always teamed with the original source video, even if original is stored near-line or offline. This allows for quick and easy search and play back of video, or seamless video export video to a desktop.

M

Media - Recording media is a device used to store data or information. Examples of media are hard disk, optical disc, and data tapes.

Megapixel (HD) - A megapixel is one million pixels; representing the number of pixels in an image, or the number of elements in a digital display. HD is a type of megapixel camera.

Metadata - Data describing digital content.

Migrate - The process of moving video and files from one storage area to another. This process is managed by the Data Services Service.

N

NAS - Network Attached Storage. Networked computer that provides file-based data storage.

Network Activity - Application used to monitor all data, media, and Vault operations within the Information Repository in real-time.

NVR - Network Video Recorder records video in a digital format over a network. The video is encoded and processed at the camera and then streamed into the NVR for storage or viewing. The video is of good quality, with high megapixel resolution.

O

On-Media Catalog - The metadata catalog, stored on every media unit, that contains metadata for all the files. The on-media catalog is an Information Repository safeguard. Should a Vault catalog become lost or corrupted, the on-media catalogs are used to rebuild it.

P

Patrols - A group of layouts, where each layout in a patrol is displayed in the Live Viewer for a set amount of time before the next layout is displayed.

Physical Media - A physical unit of media, such as a tape, that is independent of its drive. An individual unit of physical media can be used in a single stand-alone drive, or can be one of several units of media within an automated library system. In automated libraries, storage units use robotics to move units of media. With systems based on physical media, there can be one or more drives and several units of media per drive.

POE - Power Over Ethernet is a technology used to power network-connected devices through the network.

Policies - Phoenix RSM employs the use of "policies". They are the method outlined by parameters and options for managing all your digital assets effectively. In Camera policies, recording policies control from which cameras videos are being captured and when. In Data Service policies, policies control when files are moved, copied, and purged in the Information Repository.

PTZ - Pan-Tilt-Zoom is a term used to refer to cameras which have the ability to change their view remotely through a viewer.

Purge - The process of deleting video and files from the storage. This process is managed by the Data Services Service.

Q

R

Replicate - The process of copying video and files from one storage area to another. This process is managed by the Data Services Service.

Resolution - Resolution refers to the horizontal and vertical size of video in pixels.  The larger the frame size, the larger the picture or video in pixels. Higher resolution is normally equated to better quality video.

RTSP - Real-Time Streaming Protocol (RTSP) is a network control protocol to control streaming media servers for establishing media sessions between end points. This product is compatible with over 1,000 camera models from over 170 network camera manufacturers.

S

Server - Unlike servers that require dedicated computers, product servers can run on any of the computers on your network. The server is composed of various components that manage several operations: registration of location with service modules, responding to client queries about resource availability, negotiating connections with client components, receiving data from clients and storing it properly, receiving metadata from clients and updating the Vault, receiving CRC data from clients and using it for media write validation, informing clients of success and failure during processing, informing client components of matches and mismatches of the CRC, on-media data formatting, receiving data lookup requests from clients, locating restore data within the Vault, responding to client requests for data retrieval, and supplying data to clients as required. During installation, the "Server" version refers to the full suite of Phoenix RSM applications, including Vaults. In contrast, the "Client" version does not include Vaults.

Service - A process that runs in the background and performs a specific operation at predefined times or in response to certain events.

Source - Refers to the location where data is captured, ingested, or extracted.

Static IP - A network address which does not change. Normally used to refer to the process of manually setting the IP address of network devices.

Storage Pool - One or more pieces of media grouped for a common use. Additional media can be added to storage pools at any time, and searches can be limited to single storage pools with countless units of media, regardless of which Vaults the media resides on.

stx - A file that includes all the video dialog and dialog time codes associated in the video. The .stx file is necessary for searching content in videos, and the name of it matches the video file name.

Surveillance Video Manager - Application to search, review, and export video (and metadata) managed in the Information Repository to any computer on the network.

T

Thumbnail - A thumbnail is a picture or snap shot in time of a video.  Thumbnails are used to help the user get a glimpse of activity in video at specified intervals.

U

URL - Stands for Uniform Resource Locator. A URL is a resource identifier that specifies where an identified resource is available. URLs of RTSP-enabled IP cameras are used to connect them to Phoenix RSM.

V

Vault - A Vault is comprised of a central processing unit (CPU), Phoenix RSM (software), and storage. Each Vault requires its own capacity license because of its scalable possibilities. The Vaults on the network make up the Information Repository to manage all your data storage needs. The Vaults have attributes associated to them like licensing, media, and files, and are easy to upgrade. They are decentralized, making the Information Repository a distributed solution across your network.

Vault Admin - Optional desktop client application used to prepare media and manage media in the Information Repository Vaults.

Vault Service - The Vault service manages the video and storage devices.

Video Lifecycle Management (VLM) - A video aware subset of Information Lifecycle Management, providing a comprehensive approach to managing captured video and its associated metadata.

Virtual Media - Space set aside for use by a Vault on a storage device also used for other purposes. A hard disk is an example of virtual media. Media units on a hard disk are actually file system directories set up by the Vault. Mapping a Vault to an entire hard disk, Virtual hard disk media units enable you to remove removable disks from Vaults just as you would physical media (such as tapes). Virtual media units can span multiple disk drives or be set so that several virtual media units reside on a single disk drive.

W

Watermark - Marking video with embedded information to serve as visible identification.

X

Y

Z

2015, 6.5