Access
Access is an action of entry into or exit from security controlled area. [SOURCE: DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04. Alarm systems – Terms and definitions. German version CLC/TR 50531:2009. English translation of DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04]
Access Control Unit
An acces control unit (controller) is a device which makes the decision to release one or several access points and manages the associated control sequence. [SOURCE: DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04. Alarm systems – Terms and definitions. German version CLC/TR 50531:2009. English translation of DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04]
Access Route
An access route is a defined route from the central fire alarm system to the respective building and within the building to the detector group.
Access Route Plan for Fire Services
An access route plan is an orientation guide for fire services to locate the triggered fire detector. It shows the way from the fire control panel to the triggered fire detector.
Acknowledge
Acknowledge is an action of a user to accept an indication. [SOURCE: DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04. Alarm systems – Terms and definitions. German version CLC/TR 50531:2009. English translation of DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04]
Administration
Administration is a perspective's name in Siveillance Control where settings for both, the runtime and engineering mode are dislayed and can be defined by the operator.
Alarm
An alarm is a warning of the presence of a hazard to life, property or the environment. [SOURCE: DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04. Alarm systems – Terms and definitions. German version CLC/TR 50531:2009. English translation of DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04]
Alarm Condition
An alarm condition is a condition of an alarm system, or part thereof, which results from the response of the system, or part thereof, to the presence of a hazard. An alarm condition is a condition following the pre-alarm condition. [SOURCE: DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04. Alarm systems – Terms and definitions. German version CLC/TR 50531:2009. English translation of DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04]
Alarm Message
An alarm message is a message conveying information regarding intruder, tamper or fault alarms. [SOURCE: DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04. Alarm systems – Terms and definitions. German version CLC/TR 50531:2009. English translation of DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04]
Alarm Monitor
An alarm monitor is a part of a typical operator's desk set-up including an alarm monitor, a spot monitor and a Siveillance Control Client. The alarm monitor is used as a global monitoring station to visualize video streams and camera recordings in case of an alarm.
Alarm Signal
An alarm signal is a signal generated by a detection device. [SOURCE: DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04. Alarm systems – Terms and definitions. German version CLC/TR 50531:2009. English translation of DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04]
Alarm System
An alarm system is the control panel for a security setup. It represents a specific type of the subsystem which detects potential dangers and automatically triggers an alarm or a message. An alarm or a message triggered by the alarm system is transmitted through OIS to the management system, such as Siveillance Control for example. Typically, an alarm system consists of several detectors and a control panel which are interconnected. Furthermore, it is equipped with a transmission device and a visual or acoustic sounder. For more information refer to: Hazard Alarm System.
Annotated Camera
Annotated cameras are cameras which you can assign to any device you receive an alarm from. For example, you can use an annotation to assign cameras to any door, area or sequence. In this case, the cameras do not need to be located in the same area.
Associated Camera
For more information refer to: Annotated Camera.
AVC
The AVC (Alarm Verification Concept) The 'Alarm Verification Concept' serves the purpose of delayed alarm transmission and takes into account the interaction of the operating personnel in the alarming sequence. Operating personnel are able to examine the indicated fire location in the event of a fire alarm. In the event of a false alarm or minor incident, the intervention of the fire brigade can be avoided. [SOURCE: Siemens (2018): FS720. Fire detection system. System Description. IP7. STEP Document ID: A6V10224675]
BLOB
BLOB (Binary Large Object) is a large file, typically an image or sound file that must be handled (e.g. uploaded, downloaded or stored in a database) in a special way because of its size. [SOURCE: TALUKDAR, Mrinal (): Dictionary of Computer & Information Technology. New Delhi : Prabhat Prakashan.]
Camera
A camera is a passive remote sensing system with one or a combination of sensors. [SOURCE: DIN 18716:2017-06. Photogrammetry and remote sensing - Terms and definitions]
CCTV Camera
A CCTV camera is a unit containing an imaging device producing a video signal from an optical image. [SOURCE: DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04. Alarm systems – Terms and definitions. German version CLC/TR 50531:2009. English translation of DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04]
Collective Detector Line
A collective detector line is a detector line technology where all detectors which are connected to the same detector line share a collective address. This makes it impossible to identify individual detectors.
Controller
For more information refer to: Access Control Unit.
Coupling
Coupling means a connection to the subsystem. The Cu-Handler couples the subsystem with the OIS.
Cu-Handler Unit
Cu-Handler unit ensures communication between OIS and the subsystem. By default, this unit is generally named like the subsystem.
CUPS
The CUPS (Common Unix Printing System) is a portable printing layer used on UNIX-based operating systems to provide a common printing interface across a local network. CUPS uses the Internet Printing Protocol (IPP) for managing print jobs, print queues and it adds network printer browsing and PostScript Printer Description-based printing options. [SOURCE: Webopedia (2018): "What is CUPS? Webopedia Definition". <https://www.webopedia.com/TERM/C/CUPS.html> (State: 2018 Access: 2018.10.12)]
Debian
Debian is a popular free and open source operating system for computers. It is based on the Linux kernel and other open source components from the GNU and other open source projects. Debian can be freely downloaded over the Internet or, for a small charge, obtained on CD. [SOURCE: WhatIs.com (2018): "Debian". <https://searchdatacenter.techtarget.com/definition/Debian> (State: 2006.11 Access: 2020.10.08)]
Detector
A detector is a device designed to generate an alarm signal or message in response to the sensing of an abnormal condition indicating the presence of a hazard. [SOURCE: DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04. Alarm systems – Terms and definitions. German version CLC/TR 50531:2009. English translation of DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04]
Detector Group
A detector group (alarm point) is one or more detector(s) providing a common signal or message, at the CIE (Control and Indicating Equipment) or at the ACE (Ancillary Control Equipment) for the purpose of indication or processing. [SOURCE: DIN EN 50131-3; VDE 0830-2-3:2010-02. Alarm systems – Intrusion and hold-up systems – Part 3: Control and indicating equipment. German version EN 50131-3:2009. English translation of DIN EN 50131-3; VDE 0830-2-3:2010-02]
DHCP
The DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate using IP. [SOURCE: TechTarget Network (2018): "DHCP (Dynamic Host Configuration Protocol)". <https://searchnetworking.techtarget.com/definition/DHCP> (State 2018 Access: 2018.10.11)]
DHCP Server
A DHCP (Dynamic Host Configuration Protocol) server is a network server that automatically provides and assigns IP addresses, default gateways and other network parameters to client devices. It relies on the standard protocol known as Dynamic Host Configuration Protocol or DHCP to respond to broadcast queries by clients. [SOURCE: Infoblox | Next Level Networking - Secure DNS, DHCP & IPAM (DDI) (2018): "What is a DHCP Server?". <https://www.infoblox.com/glossary/dhcp-server/> (State 2018 Access: 2018.10.16)]
DNS
The DNS (Domain Name System) is a protocol that enables hierarchical names for internet domains and addresses. The protocol includes the means to translate between numerical IP addresses and text hostnames. [SOURCE: IEC 62481-1-1:2017 Digital living network alliance (DLNA) home networked device interoperability guidelines - Part 1-1: Architecture and protocols - Core architecture and protocols]
DNS Server
A DNS (Domain Name System) server is a computer server that contains a database of public IP addresses and their associated hostnames, and in most cases, serves to resolve, or translate, those common names to IP addresses as requested. [SOURCE: Lifewire (2018): "What Is a DNS Server?". <https://www.lifewire.com/what-is-a-dns-server-2625854> (State 2018.08.26 Access: 2018.10.16)]
Escape Route
An escape route is a path of escape from any part of a building to a final exit. [SOURCE: ISO 7240-14:2013-08. Fire detection and alarm systems - Part 14: Design, installation, commissioning and service of fire detection and fire alarm systems in and around buildings]
Event
An event is a situation that requires action in response to an incident. Receipt of a call or data message initiates an event. An event has a defined geographic or physical location and can escalate or deescalate. Different types of events cause different response workflows (SOPs). An event ends when any potentially required response operations have been completed.
Event Button
When you click an event button, an event is created whose predefined operation procedure steps can be processed quickly and simply.
Event-Based Processing
Event-based processing is a mode which can be activated and deactivated. All messages are assigned to a filter and are subdivided according to their processing status with regard to event processing. In the default Message List view, only messages to be checked are displayed. Event-based processing is especially useful for large subsystems or configurations.
External System
An external system is a system or device connected to the management system. It provides messages, state updates or additional functionality, for example alarm system, video management station or email server.
FDAS
FDAS (Fire Detection and Fire Alarm System). For more information refer to: Fire Detection and Fire Alarm System.
Filtering
Filtering is a method by which a subset of data can be created according to specific criteria.
Fire Alarm Technology
Fire alarm technology is essentially based on the early detection and registration of various fire factors such as smoke, heat or CO2, and reacts by sounding the alarm and passing it on to a responsible location. [SOURCE: Sikom_Essra: "Brandmeldetechnik". English translation. <https://www.sikom-essra.at/sicherheitstechnik/brandmeldetechnik/> (State: ns Access: 2021.03.09)]
Fire Brigade Key Depot
The fire brigade key depot (fireman's key box or FSD) is used to store the object keys so that the fire brigade has quick non-violent access to the rooms/in the object in case of fire. It is a small, two-door safe that is easily accessible to the fire brigade and is best placed in a weatherproof location. It can be installed either in a wall or a free-standing column. [SOURCE: Baunetz_Wissen: "Feuerwehr-Schlüsseldepot". English translation. <https://www.baunetzwissen.de/glossar/f/feuerwehr-schluesseldepot-3157243> (State: ns Access: 2021.03.09)]
Fire Detection and Fire Alarm System
Fire detection and fire alarm system is an alarm system to detect the presence of fire in supervised premises and to raise the appropriate alarm. [SOURCE: DIN EN 50130-4; VDE 0830-1-4:2015-04. Alarm systems – Part 4: Electromagnetic compatibility – Product family standard: Immunity requirements for components of fire, intruder, hold up, CCTV, access control and social alarm systems. German version EN 50130-4:2011 + A1:2014. English translation of DIN EN 50130-4; VDE 0830-1-4:2015-04]
FQDN
FQDN (Fully Qualified Domain Name) is a domain name which specifies its exact location in the tree hierarchy of the domain name system (DNS). FQDN specifies all domain levels, starting from the host name up to the top-level domain. [SOURCE: DIN EN 50463-4, VDE 0115-480-4:2018-03. Railway applications – Energy measurement on board trains –Part 4: Communication. German version EN 50463-4:2017]. Example: md2wxeec.xy003.company.en. is a FQDN where “md2wxeec” is the hostname, “xy003” is the subdomain name, “company” is the domain name and “en” is the top-level domain name.
Gateway
One gateway is configured in the OIS for each connection to the subsystem. Several gateways can be created in the OIS. A gateway contains several units.
Gateway
A gateway is a unit connecting different networks or parts of one network and performing any necessary protocol translations. [SOURCE: DIN EN 50090-9-1:2004-11;VDE 0829-9-1:2004-11, Home and Building Electronic Systems (HBES) - Part 9-1: Installation requirements - Generic cabling for HBES Class 1 Twisted Pair]
GIS
GIS (Geographical Information Systems) in the strictest sense, a computer system capable of assembling, storing, manipulating, and displaying geographically referenced information, i.e. data identified according to their locations. [SOURCE: ISO 23611-6:2019-09. Soil quality - Sampling of soil invertebrates - Part 6: Guidance for the design of sampling programmes with soil invertebrates]
GUI
GUI (Graphical User Interface) is a program interface that takes advantage of the computer's graphics capabilities to make the program easier to use. [SOURCE: Webopedia (2018): "What is GUI - Graphical User Interface? Webopedia Definition". <https://www.webopedia.com/TERM/G/Graphical_User_Interface_GUI.html> (State: 2018 Access: 2018.10.16)]
Hazard Alarm System
Hazard alarm systems (HAS) originally belonged to the telecommunications systems. Hazard alarm systems are designed to reliably report hazards to persons and property. They form hazard alarms from information acquired automatically or caused by persons, output them and register faults. The transmission paths (wire or radio) must also be monitored. Failure is largely prevented by special measures. Hazard alarm systems are managed under a collective term and consist of fire alarm systems, intrusion alarm systems and hold-up alarm systems. [SOURCE: Baunetz_Wissen_: "Definition Gefahrenmeldeanlagen (GMA)". English translation. <https://www.baunetzwissen.de/sicherheitstechnik/fachwissen/gefahrenmeldeanlagen/definition-gefahrenmeldeanlagen-gma-165002> (State: ns Access: 2021.03.09)]
Hostname
A hostname is a unique identifier for a machine on a network. This identifier shall be unique within a local network. However, it may also be globally unique. The identifier can be an IP address. [SOURCE: DIN EN 62541-4:2015-10, OPC unified architecture - Part 4: Services (IEC 62541-4:2015)]
Hypervisor
A hypervisor, also known as a virtual machine monitor, is a piece of software usually not very big in terms of computer or storage footprint, which makes server virtualization possible. It forms an abstraction layer between the server's hardware resources and the operating system containers. There are two types of hypervisors defining two different types of approaches: Type 1 hypervisor (bare-metal hypervisor) and tType 2 hypervisor (hosted hypervisor). [SOURCE: ABHILASH, G B / FITZHUGH, Rebecca (2016): Learning Vmware vSphere. Lay the foundations for data center virtualization using VMware vSphere 6 and strengthen your understanding of its power. Birmingham : Packt Publishing Ltd., 10.]
Incident
An incident is a specific occurrence that is either part of an event or would likely lead to an event requiring reaction from the control center staff.
Incident Handling
Incident handling is the processing and evaluation of incoming messages by the operator supported by workflow routines such as automatic documentation, suggested actions, alarm routines etc.
Integration
Integration is understood as the way in which the subsystem is represented in Siveillance Control.
Intruder Alarm System
An intruder alarm system is an alarm system to detect and indicate the presence, entry or attempted entry of an intruder into supervised premises. [SOURCE: DIN EN 50130-4; VDE 0830-1-4:2015-04. Alarm systems – Part 4: Electromagnetic compatibility – Product family standard: Immunity requirements for components of fire, intruder, hold up, CCTV, access control and social alarm systems. German version EN 50130-4:2011 + A1:2014. English translation of DIN EN 50130-4; VDE 0830-1-4:2015-04]
Intrusion
An intrusion is an entry into the supervised premises by an unauthorised person(s). [SOURCE: DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04. Alarm systems – Terms and definitions. German version CLC/TR 50531:2009. English translation of DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04]
Intrusion Alarm Technology
The intrusion alarm technology is the collective term for the process of using intrusion detection systems to detect burglaries.
Intrusion Zone
Intrusion zones in intrusion alarm systems usually represent logical combinations of different sensors of the system within a certain location. These can be single rooms, corridors, floors, entire buildings or sections of a terrain.
Investigation Time
The investigation time is the time in which the operator can examine the indicated source of alarm and check the cause of the alarm.
JBoss
JBoss is an open-source and free Java 2 Enterprise Edition (J2EE) application server from the JBoss Group, implemented purely in Java. [SOURCE: KUNNUMPURATHU, Meeraj (2004): JBoss 3.2.Deployment and Administration. New York : Apress Media, LLC, 1.]
JRE
JRE (Java Runtime Environment) is a subset of the Java Development Kit that can be distributed to end users. It contains the Java virtual machine, core classes and supporting files. [SOURCE: BIDGOLI, Hossein (2004):The Internet Encyclopedia. Volume 2. Hoboken : John Wiley & Sons, Inc., 386.]
Live Stream
A live stream is a live transmission of an event over the Internet. [SOURCE: Lexico: "Live stream". <https://www.lexico.com/definition/live_stream> (State: 2021 Access: 2021.03.10)]
Mapping
Mapping means the merging of detector data from the graphic import (CAD graphic objects) with the alarm system data.
Message
A message is a series of signals routed via interconnections which include identification, function data and the various means for providing its own integrity, immunity and proper reception. [SOURCE: DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04. Alarm systems – Terms and definitions. German version CLC/TR 50531:2009. English translation of DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04]
Network Mirror
A network mirror is a mirror server where the installation files of the Linux distribution are located.
NGINX
NGINX is an open source HTTP web server and reverse proxy server. In addition to offering HTTP server capabilities, NGINX can also operate as an IMAP/POP3 mail proxy server as well as function as a load balancer and HTTP cache server. NGINX can run on Linux, Mac OS X, Solaris, AIX, HP-UX and BSD variants. [SOURCE: Webopedia (2018): "What is Nginx? Webopedia Definition". <https://www.webopedia.com/TERM/N/nginx.html> (State: 2018 Access: 2018.10.12)]
NTP
NTP (Network Time Protocol) is a standard for synchronizing computer system clocks in packet-based communication networks. NTP uses the connectionless network protocol UDP (see UDP) for enabling time to be reliably transmitted over networks with variable packet runtime. [SOURCE: DIN EN 62676-1-2:2014-11;VDE 0830-7-5-12:2014-11, Video surveillance systems for use in security applications - Part 1-2: System requirements - Performance requirements for video transmission (IEC 62676-1-2:2013)]
OIS
OIS (Open Interface Services) is a standard interface which allows intelligent interactions and data exchange between different subsystems and management stations.
OIS Component
An OIS component contains all OIS data points that belong to a subsystem. OIS components can be started and stopped. This automatically establishes or interrupts the OIS connection.
OIS Connection
The OIS connection provides the physical network connection to one or multiple OIS components.
Open-Vm-Tools
Open-vm-tools (Open Virtual Machine Tools) is the open source implementation of VMware Tools for Linux guest operating systems. [SOURCE: VMware Docs (2018): "Verwenden von open-vm-tools". <https://docs.vmware.com/en/VMware-Tools/10.3.0/com.vmware.vsphere.vmwaretools.doc/GUID-8B6EA5B7-453B-48AA-92E5-DB7F061341D1.html> (State: 2021 Access: 2021.09.28)]
Operator
An operator is a person responsible for the handling of messages presented at the annunciation equipment. [SOURCE: DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04. Alarm systems – Terms and definitions. German version CLC/TR 50531:2009. English translation of DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04]
Operator Log
An operator log is a record of performance, events, or day-to-day activities performed by the user. [SOURCE: Merriam-Webster (2018): "Log". <https://www.merriam-webster.com/dictionary/log> (State 2018 Access: 2018.10.11)]
OPS
OPS (Operation Procedure Step). For more information refer to: SOP.
Partitioning
Partitioning is the act of dividing a disk into logical areas that can be worked with separately. [SOURCE: NEGUS, Christopher (2008): Linux® Bible, 2008 Edition: Boot Up to Ubuntu®, Fedora®, KNOPPIX, Debian®, openSUSE®, and 11 Other Distributions. Indianapolis : Wiley Publishiing, Inc., 263.]
Playback
Playback means viewing of previously recorded images from storage media. [SOURCE: IEC 62676-1-1:2013-10. Video surveillance systems for use in security applications - Part 1-1: System requirements - General]
PLC Unit
PLC unit (Programmable Logic Controller unit) is a unit that contains the OIS logic and ensures communication between Siveillance Control and the subsystem. Furthermore, the PLC unit controls and checks incoming data and makes decisions.
Post-Alarm Recording
A post-alarm recording is a video recording of what happened after an incident.
Pre-Alarm Condition
A pre-alarm condition is a condition following the reception of an alarm triggering signal. [SOURCE: DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04. Alarm systems - Terms and definitions. German version CLC/TR 50531:2009. English translation of DIN EN 50131-1 Beiblatt 1:2010-04; VDE 0830-2-1 Beiblatt 1:2010-04]
Pre-Alarm Recording
A pre-alarm recording is a video recording of what happens before an incident.
PTZ
PTZ (Pan/Tilt/Zoom ) is a camera or function which refers to controlling a movable camera from a control point (typically with a PTZ keyboard, mouse, or touch-screen) to pan (left/right), tilt (up/down) and zoom (in/out). [SOURCE: IEC 62676-5:2018-06, Video surveillance systems for use in security applications – Part 5: Data specifications and image quality performance for camera devices]
PuTTY
PuTTY is a free Telnet and SSH terminal software for Windows and Unix platforms that enables users to remotely access computers over the Internet. [Webopedia (2018): "What is PuTTY? Webopedia Definition". <https://www.webopedia.com/TERM/P/PuTTY.html> (State: 2018 Access: 2018.10.12)]
Queue
A queue is a list of messages. [SOURCE: DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04. Alarm systems – Terms and definitions. German version CLC/TR 50531:2009. English translation of DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04]
Recording
A recording is a single container for a set of video, audio and metadata tracks with an endless timeline holding data at certain time frames or gaps without any information from any kind of real-time video source or input including associated non-video data stored on any kind of media. [SOURCE: IEC 62676-2-1:2013-11. Video surveillance systems for use in security applications - Part 2-1: Video transmission protocols - General requirements]
Related Camera
Related cameras are cameras which include all cameras contained in an area and all annotated cameras.
Relevant Camera
A relevant camera is a camera which receives the alarm.
SCP
SCP (Secure Copy Protocol) is a means of securely transferring computer files between a local host and a remote host or between two remote hosts. It is based on the Secure Shell (SSH) protocol. [SOURCE: Wikipedia (2018): "Secure copy". <https://en.wikipedia.org/wiki/Secure_copy> (State: 2018.10 Access: 2018.10.11)]
Single Sign-On
Single Sign-On (SSO). For more information refer to: SSO.
Site
A site is an instance of OIS. Sites contain one or more gateways. Multiple sites can be created in the OIS. Example: In building 1 there is a fire alarm system and a glass breakage warning system in building 2 there is an access control system. Then site 1 contains two gateways for the fire alarm system and the glass breakage warning system. Site 2 contains one gateway for the access control system.
Site Plan
A site plan is a drawing of the location of built-up areas, structures, buildings, rooms, components, assemblies or individual parts. [SOURCE: DIN EN ISO 10209:2012-11. Technical product documentation - Vocabulary - Terms relating to technical drawings, product definition and related documentation (ISO 10209:2012)]
Smoke Alarm Detector
A smoke alarm detector is a device containing within one housing all the components, except possibly the energy source, necessary for detecting smoke and for giving an audible alarm. [SOURCE: DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04. Alarm systems – Terms and definitions. German version CLC/TR 50531:2009. English translation of DIN EN 50131-1 Beiblatt 1; VDE 0830-2-1 Beiblatt 1:2010-04]
Snapshot
A snapshot is a still image at the time of the incident. It shows the state one second before the alarm.
SOP
SOP (Standard Operating Procedure) is an authorized, documented procedure, or set of procedures, work and test instructions. SOPs are issued to specifically instruct employees in areas of responsibility. [SOURCE: DIN EN ISO 15378:2018-04. Primary packaging materials for medicinal products – Particular requirements for the application of ISO 9001:2015, with reference to good manufacturing practice (GMP) (ISO 15378:2017). English version EN ISO 15378:2017. English translation of DIN EN ISO 15378:2018-04]
Spot Monitor
The spot monitor is a part of a typical operator desk set-up including an alarm monitor, a spot monitor and a Siveillance Control client. The spot monitor is used to visualize video streams and recordings of the cameras per workstation for an alarm that an operator has acknowledged.
Spring
Spring is an open source framework intended to make J2EE development easier. It consists of a container, a framework for configuring and assembling components, and a set of snap-in services for transactions, persistence, and web user interfaces. [SOURCE: TATE, Bruce A. / GEHTLAND, Justin (2004): Better, Faster, Lighter Java. Beijing : O'Reilly Media, Inc., 151.]
SSH
SSH (Secure Shell) is a program to log into another computer over a network, to send commands to a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels. It is a replacement for rlogin, rsh, rcp, and rdist. [SOURCE: Webopedia (2018): "What is Secure Shell (SSH)? Webopedia Definition". <https://www.webopedia.com/TERM/S/SSH.html> (State: 2018 Access: 2018.10.12)]
SSL
SSL (Secure Socket Layer) is an application layer security protocol to enable encrypted, authenticated communications across networks. [SOURCE: DIN EN 62676-1-2; VDE 0830-7-5-12:2014-11, Video surveillance systems for use in security applications - Part 1-2: System requirements - Performance requirements for video transmission (IEC 62676-1-2:2013)]
SSO
SSO (Single Sign-On) is a function enabling a user to access a number of websites or applications with a single User ID and password. [SOURCE: DIN ISO 20488. Online consumer reviews – Principles and requirements for their collection, moderation and publication (ISO 20488:2018). English translation of DIN ISO 20488:2019-03]
Stand-Alone Mode
A stand-alone mode is a mode of operation of the access control system without the communication between the access control unit and monitoring console. [SOURCE: IEC 60839-11-1:2013-05. Alarm and electronic security systems – Part 11-1: Electronic access control systems – System and components requirements]
Submessage
A submessage is subordinate to a message and contains additional details of a main message or main event.
Subnet Mask
A subnet mask is a method that allows one large network to be broken down into several smaller ones. [SOURCE: DIN EN 62676-1-2; VDE 0830-7-5-12:2014-11, Video surveillance systems for use in security applications - Part 1-2: System requirements - Performance requirements for video transmission (IEC 62676-1-2:2013)]
Subsystem
All systems that can be connected to Siveillance Control through an interface. That are for example intrusion detection systems or email server.
Subsystem Container
Subsystem containers are used as folders for grouping OIS elements in the System Tree. The subsystem container enables the switching on and off of all subsystems placed within it with a single action of the context menu.
Sum Detector
Detectors or detector groups can be assigned to a sum detector. Sum detectors can be configured flexibly. Thus, the most critical status of all assigned detectors can be displayed.
Trigger
Triggers or user-defined events are events that are configured to perform predefined actions, for example, starting or stopping video recordings when you receive an alarm.
Unit
A unit can be either a Cu-Handler unit, a Vu-Handler unit or a PLC unit.
Vi Editor
The Vi Editor (Visual Editor) is a screen editor for Linux, Unix and other Unix-like operating systems. It exclusively uses the keyboard and provides a very efficient interface for editing programs and scripts. [SOURCE: Techopedia (2018): "What is vi in Unix?". <https://www.techopedia.com/definition/10347/vi> (State: 2018 Access: 2018.10.16)]
Video Stream
For more information refer to: Live Stream.
Virtual Machine
A virtual machine is a software construct that acts as container for installing and running conventional operating systems on a server hardware managed by a hypervisor. It is an isolation boundary between the operating systems running on the shared hardware. [SOURCE: ABHILASH, G B / FITZHUGH, Rebecca (2016): Learning Vmware vSphere. Lay the foundations for data center virtualization using VMware vSphere 6 and strengthen your understanding of its power. Birmingham : Packt Publishing Ltd., 14.]
VMware ESXi
VMware ESXi (Elastic Sky X Integrated) is an operating system-independent hypervisor based on the VMkernel operating system that interfaces with agents that run on top of it. ESXi is a type 1 hypervisor, meaning it runs directly on system hardware without the need for an operating system. [SOURCE: TechTarget Network (2018): "VMware ESXi". <https://searchvmware.techtarget.com/definition/VMware-ESXi> (State: 2018 Access: 2018.10.16)]
VMware Tools
VMware Tools is an optional, free set of drivers and utilities that enhances both the performance of a virtual machine’s guest operating system and interaction between the guest and the host. [SOURCE: TechTarget Network (2018): "Vmware Tools". <https://searchservervirtualization.techtarget.com/definition/VMware-Tools> (State: 2012 Access: 2018.10.19)]
VMware vSphere
VMware vSphere is a suite of core infrastructure solutions that help manage and monitor a virtual data center. VMware vSphere includes the VMware ESX/ESXi hypervisor, a type 1 hypervisor that functions as the virtualization server, the VMware vCenter Server, which manages vSphere environments, the VMware vSphere Client, which is used to install and manage virtual machines through the hypervisor, and VMware VMFS, the file system component from VMware. [SOURCE: ABHILASH, G B / FITZHUGH, Rebecca (2016): Learning Vmware vSphere. Lay the foundations for data center virtualization using VMware vSphere 6 and strengthen your understanding of its power. Birmingham : Packt Publishing Ltd., 22.]
Vu-Handler Unit
Vu-Handler unit ensures communication between OIS and Siveillance Control. There can be more than one Vu-Handler unit (for example engineering and runtime).
Wildcard
Wildcard is the information to identify a collection of objects or properties of objects. [SOURCE: IEC 62264-5:2016-07. Enterprise-control system integration – Part 5: Business to manufacturing transactions]
WildFly
WildFly is the new name for JBoss Application Server (JBoss AS) [...]. WildFly provides high startup speed, low memory overhead, a high-performance, scalable web server, customizable runtime based on pluggable subsystems, and support for Java EE 7 and the latest web development standards. [SOURCE: VOHRA, Deepak (2015): Advanced Java® EE Development with WildFly®. Birmingham : Packt Publishing Ltd., v.]
WinSCP
WinSCP (Windows Secure Copy) is an open source free SFTP client, FTP client, WebDAV client, S3 client and SCP client for Windows. Its main function is file transfer between a local and a remote computer. Beyond this, WinSCP offers scripting and basic file manager functionality. [SOURCE: WinSCP (2018): "Introducing WinSCP". <https://winscp.net/eng/docs/introduction> (State 2018 Access: 2018.10.16)]
Xfce
Xfce is a lightweight desktop environment for UNIX-like operating systems. It aims to be fast and low on system resources, while still being visually appealing and user friendly. [SOURCE: Xface (2018): "About. <https://www.xfce.org/?lang=en> (State 2018 Access: 2018.10.19)]