This is the 33rd article in the award-winning “Real Words or Buzzwords?” series about how real words become empty words and stifle technology progress.
By Ray Bernard, PSP, CHS-III
Cloud-computing technology, with its many software-defined elements, is bringing self-scaling real-time performance capabilities to physical security system technology.
★ ★ ★ GET NOTIFIED! ★ ★ ★
SIGN UP to be notified by email the day a new Real Words or Buzzwords? article is posted!
Real Words or Buzzwords?
The Award-Winning Article Series
#1 Proof of the buzzword that killed tech advances in the security industry—but not other industries.
#2 Next Generation (NextGen): A sure way to tell hype from reality.
#3 Customer Centric: Why all security industry companies aren't customer centric.
#4 Best of Breed: What it should mean to companies and their customers.
#5 Open: An openness scale to rate platforms and systems
#6 Network-friendly: It's much more than network connectivity.
#7 Mobile first: Not what it sounds like.
#8 Enterprise Class (Part One): To qualify as Enterprise Class system today is world's beyond what it was yesterday.
#9 Enterprise Class (Part Two): Enterprise Class must be more than just a top-level label.
#10 Enterprise Class (Part Three): Enterprise Class must be 21st century technology.
#11 Intuitive: It’s about time that we had a real-world testable definition for “intuitive”.
#12 State of the Art: A perspective for right-setting our own thinking about technologies.
#13 True Cloud (Part One): Fully evaluating cloud product offerings.
#14 True Cloud (Part Two): Examining the characteristics of 'native-cloud' applications.
#15 True Cloud (Part Three): Due diligence in testing cloud systems.
#16 IP-based, IP-enabled, IP-capable, or IP-connectable?: A perspective for right-setting our own thinking about technologies.
#17 Five Nines: Many people equate high availability with good user experience, yet many more factors are critically important.
#18 Robust: Words like “robust” must be followed by design specifics to be meaningful.
#19 Serverless Computing – Part 1: Why "serverless computing" is critical for some cloud offerings.
#20 Serverless Computing – Part 2: Why full virtualization is the future of cloud computing.
#21 Situational Awareness – Part 1: What products provide situational awareness?
#22 Situational Awareness – Part 2: Why system designs are incomplete without situational awareness?
#23 Situational Awareness – Part 3: How mobile devices change the situational awareness landscape?
#24 Situational Awareness – Part 4: Why situational awareness is a must for security system maintenance and acceptable uptime.
#25 Situational Awareness – Part 5: We are now entering the era of smart buildings and facilities. We must design integrated security systems that are much smarter than those we have designed in the past.
#26 Situational Awareness – Part 6: Developing modern day situational awareness solutions requires moving beyond 20th century thinking.
#27 Situational Awareness – Part 7: Modern day incident response deserves the help that modern technology can provide but doesn’t yet. Filling this void is one of the great security industry opportunities of our time.
#28 Unicity: Security solutions providers can spur innovation by envisioning how the Unicity concept can extend and strengthen physical access into real-time presence management.
#29 The API Economy: Why The API Economy will have a significant impact on the physical security industry moving forward.
#31 The Built Environment: In the 21st century, “the built environment” means so much more than it did just two decades ago.
#32 Hyper-Converged Infrastructure: Hyper-Converged Infrastructure has been a hot phrase in IT for several years, but do its promises hold true for the physical security industry?
#33 Software-Defined: Cloud-computing technology, with its many software-defined elements, is bringing self-scaling real-time performance capabilities to physical security system technology.
#34 High-Performance: How the right use of "high-performance" can accelerate the adoption of truly high-performing emerging technologies.
#35 Erasure Coding: Why RAID drive arrays don’t work anymore for video storage, and why Erasure Coding does.
#36 Presence Control: Anyone responsible for access control management or smart building experience must understand and apply presence control.
#37 Internet+: The Internet has evolved into much more than the information superhighway it was originally conceived to be.
#38 Digital Twin: Though few in physical security are familiar with the concept, it holds enormous potential for the industry.
#39 Fog Computing: Though commonly misunderstood, the concept of fog computing has become critically important to physical security systems.
#40 Scale - Part 1: Although many security-industry thought leaders have advocated that we should be “learning from IT,” there is still insufficient emphasis on learning about IT practices, especially for large-scale deployments.
#41 Scale - Part 2: Why the industry has yet to fully grasp what the ‘Internet of Things’ means for scaling physical security devices and systems.
#42 Cyberspace - Part 1: Thought to be an outdated term by some, understanding ‘Cyberspace’ and how it differs from ‘Cyber’ is paramount for security practitioners.
#43 Cyber-Physical Systems - Part 1: We must understand what it means that electronic physical security systems are cyber-physical systems.
#44 Cyberspace - Part 2: Thought to be an outdated term by some, understanding ‘Cyberspace’ and how it differs from ‘Cyber’ is paramount for security practitioners.
#45 Artificial Intelligence, Machine Learning and Deep Learning: Examining the differences in these technologies and their respective benefits for the security industry.
#46 VDI – Virtual Desktop Infrastructure: At first glance, VDI doesn’t seem to have much application to a SOC deployment. But a closer look reveals why it is actually of critical importance.
#47 Hybrid Cloud: The definition of hybrid cloud has evolved, and it’s important to understand the implications for physical security system deployments.
#48 Legacy: How you define ‘legacy technology’ may determine whether you get to update or replace critical systems.
#49 H.264 - Part 1: Examining the terms involved in camera stream configuration settings and why they are important.
#50 H.264 - Part 2: A look at the different H.264 video frame types and how they relate to intended uses of video.
#51 H.264 - Part 3: Once seen as just a marketing term, ‘smart codecs’ have revolutionized video compression.
#52 Presence Technologies: The proliferation of IoT sensors and devices, plus the current impacts of the COVID-19 pandemic, have elevated the capabilities and the importance of presence technologies.
#53 Anonymization, Encryption and Governance: The exponential advance of information technologies requires an exponential advance in the application of data protection.
#54 Computer Vision: Why a good understanding of the computer vision concept is important for evaluating today’s security video analytics products.
#55 55 Exponential Technology Advancement: The next 10 years of security technology will bring more change than in the entire history of the industry to now.
More to come about every other week.
I first encountered the term “software-defined” in the phrase “software-defined networking” (SDN). Recnetly, when I typed software-defined into the Google address box, Google auto-completed it as software-defined-networking. I remembered reading being led to good SDN material via the SDNCentral Twitter feed, and lo and behold I discovered today that its new name is SDxCentral – standing for Software Defined Everything, which is now a company and website name having the @sdxcentral account on Twitter.
SDNCentral was originally founded in 2011, out of frustration about the lack of reliable and easily accessible information on SDN – a purpose close to the heart of this “Real Words or Buzzwords?” series. Because digital transformation continues to drive technology decisions up the corporate ladder, technologists and executives increasingly have to work together to make business-critical (and expensive) decisions. The vision of SDxCentral is to provide these two drastically different audiences with a unifying language and the resources needed to work together to achieve digital transformation.
In 2014 TechTarget.com reported, “Software defined is a term used to describe a wide variety of products, but it’s often used to catch your attention rather than describe a product’s function.” That is one of the reasons for this article, as the fuzzy use of the term still continues.
Brian Kirsch, an IT instructor who specializes in virtualization and cloud architecture at Milwaukee Area Technical College, said in the above-linked article, “Software defined is one of the biggest buzzwords since ‘cloud’, and yet ‘software-defined’ has existed for many years.” Kirsch also said, “This does not mean that we should stop using the term software-defined. Rather, we need to understand that this term has been around for a lot longer than we realize and that it is getting to be more important.”
Kirsch further explained (I added the bold emphasis), “When a collection of products becomes a commodity and software abstracts and defines its form and function, that is when you have a product that is truly software defined. Until then, it might simply be a collection of products with new software features.”
In the same article, Keith Townsend, an IT management consultant who is currently a Solutions Architect at VMware, further explains, “Software-defined is the ability to abstract the management and administrative capabilities of the technology. For example, with SDN, it’s the ability to control the provisioning of network devices, VLANs, firewall rules, etc.” This abstraction of the control functionality means that it doesn’t matter what the underlying technology is. The software takes care of the details that relate to the underlying technology, allowing humans and automation to specify how the underlying technology must perform.
The Abstraction of Control
Abstracting device control out of the hardware and into its own software control plane allows the management of the technology resource pools to be defined via rules and policies, allowing additional hardware resources to be added to the infrastructure and be automatically provisioned. Just think for a moment what this means for the scalability of networks and systems. The staff requirement for infrastructure management can grow incrementally, while the infrastructure scales up dramatically, thanks to policy-based automation control.
Software-defined networking was pioneered by Google and Facebook to abstract network architecture and make network devices programmable. Its goal is to make networks more dynamic, easily manageable, and easily scalable. Given the vast amounts of data that must flow in real time at Google and Facebook, and the extent of their data networks, it’s easy to see how they would benefit from such technology.
Rob McShinsky, a senior system engineer at Dartmouth Hitchcock Medical Center, said, “Here is my take on what software defined means:
- Abstraction of physical resources
- Automation of actions
- Predictive configuration or control of workloads, stretching the grip past administrator-defined rule sets for resources.”
So now we also have the following technologies, which are accurately defined by Rob in the TechTarget.com article: Software-defined storage, software-defined compute power, and software defined data centers – with more software-defined technologies recently arriving.
It is important to understand where information technology is moving, because it’s moving in directions (such as software-defined technology) that take security technologies and their deployments to capabilities never possible before. Speed of data flow as-needed across integrated systems made possible by just-in-time responses by automated resource pool configuration as well as predictive shifting of resources based upon anticipated needs. This kind of technology infrastructure is required to effectively apply video analytics and other security system functions to unfolding risk scenarios in real time.
This means an end to the over-sizing of electronic security system designs to handle the maximum possible usage scenarios, when those scenarios won’t be occurring most of the time. Cloud-computing technology, with its many software-defined elements, is bringing self-scaling real-time performance capabilities to physical security system technology.
Hyper-converged infrastructure, like the products from Pivot3, and smart video appliances like those from Eagle Eye Networks and its Cloud VMS, are already making high-performance video deployments more affordable than ever before. Security and IoT infrastructure management at large scale is provided by the cloud-based services of Viakoo, which provide proactive, preemptive and predictive service assurance for electronic physical security systems and their IoT devices, including automated firmware management for video camera deployments of any size. You probably know these names, but do you know where their solutions stand today? You are likely to be pleasantly surprised.
The Future of Security Technology Infrastructure
The history of information technology is echoed in the history of physical security technology advancement. In earlier articles I have referenced my diagram titled, Advancing Physical Security Technology, which I have updated now to include Software-Defined Everything. The top of the diagram is Evolvable Intelligent Infrastructure, and having read this article, you can get a better idea of what I’m referring to by that phrase.
This is the future of security technology deployment, and software-defined-everything is a key element for scalability of the growing electronic security system infrastructure of many medium and large size organizations.
Ray Bernard, PSP CHS-III, is the principal consultant for Ray Bernard Consulting Services (RBCS), a firm that provides security consulting services for public and private facilities (www.go-rbcs.com). In 2018 IFSEC Global listed Ray as #12 in the world’s top 30 Security Thought Leaders. He is the author of the Elsevier book Security Technology Convergence Insights available on Amazon. Mr. Bernard is a Subject Matter Expert Faculty of the Security Executive Council (SEC) and an active member of the ASIS International member councils for Physical Security and IT Security. Follow Ray on Twitter: @RayBernardRBCS.
© 2018 RBCS. All Rights Reserved.