Case Study

Real-Time Video Surveillance Across one of the largest cities in the World

Application Management, Information Management, Infrastructure Management, Security Management



Shanghai Ideal upgrades its regional Global Eye digital video monitoring system for real-time analytics and storage, using Intel® Distribution for Apache Hadoop* Software Video surveillance and monitoring systems have become a standard practice within urban settings to help coordinate emergency responses, route traffic, and deliver enhanced security for citizens. To deliver these services in a coordinated fashion, Shanghai Ideal created the Global Eye digital monitoring system. The system links image information from previously independent image collection points through to a broadband networked video monitoring platform. Using this centralized architecture and a tiered distributed storage system, Shanghai Ideal was able to roll out video services across previously separated regions.

Publications from

BI Can See Clearly Now…

Building foundations for DCIM and BMS infrastructure

The Rise of the Chief Data Officer

CWF 2014: Interviews – Eric Van Miltenberg

Leave a Positive ‘Mark’ On Your Database Performance

CWF 2014: Interviews – Dr. Will Venters

CWF 2014: Interviews – Andy Johnson

CWF 2014: Interviews – Joe Baguley

Expanding on BPM Scale: Physical, Organisational and Customer

Panasas ActiveStor – a parallel approach to data storage

Regaining control with Next-Generation NAC

Continuous Monitoring – Protecting your cyber assets 24/7

Prefabricated modular data centre: is it the future of data centres?

Broadening horizons with visual data discovery

Enabling agility: Application-centric Cloud

Building Smarter Cities through the Internet of Things

Cloud Expo interviews – Excel, London

Overcoming the perils of email overload

A world of cloud and collaboration

The view from Mt. Rainier: QLogic’s FabricCache 10000

The power of predictive analytics

Improving Self-Service Business Intelligence Tools for Company-Wide Engagement

Making data a small matter with ECM

Delivering on the full promise of Business Analytics

The Devil’s in the Detail: Investigative Analytics

Securing Big Data without a big ordeal

Taking next-generation analytics to the next level

Reaping the benefits of collaboration with Video Conferencing

Preparing for a Cloudy Tomorrow

Enabling collaboration to achieve faster results

Enrich and personalise your customer’s experience

Bringing next-generation BPM to your enterprise today

Managed Cloud Hosting: More than just blue-sky thinking

Preserve and protect your data: Authentication

Cloud security 101 – protecting your data in the cloud

Finding value in the three V’s of Big Data

Enhancing productivity with BYOD

Today’s enterprise analytics conditions

How to evaluate and implement DCIM software

Bookmark today’s important IT tools: in-page analytics

Managed Services in the Cloud — Part 1

Managed Services in the Cloud — Part 2

Managed Services in the Cloud — Part 3

Optical Circuit Switching in the Software-Defined Data Centre Network

Into recovery mode with DR and backup functions

The big deal about Big Data and analytics

Making enterprise mobility move in your direction

Harnessing the benefits of application management and big data

GRC — an unsung hero in IT strategy

Covering all bases of the cloud

Improving storage capabilities all in a Flash: Part 1

Improving storage capabilities all in a Flash: Part 2

Mobile security in the age of networking

The velocity of today’s big data

Sit back and let SIP and VoIP do the talking

The move towards Software-Defined Networking

Scale out architectures to meet today’s Big Data needs

Encapsulating the Trends In Encryption and Key Management

Connecting the Digital World – Next Generation Data Centres Supporting the Cloud

UC in the cloud panel: Part Three

UC in the cloud panel: Part Two

UC in the cloud panel: Part One

Staying one step ahead of the hacker

Taking data backup and protection to a wider scale

Making your move to the cloud — best practices

An analysis into analytics

New attack vectors: Cryptographic key and digital certificate threats

Is Big Data too ‘Big’ for our boots?

A ray of light: managing your cloud platform effectively

Integrating Hadoop within a Big Data analytics framework

IT infrastructure concept: converged storage

Professional Profile special with 451 Research’s John Abbott

The changing shapes of today’s data centre architectures

Citrix in the cloud

Possessing tomorrow’s Big Data analytics today

Efficiency excellence: Sustainable data centre operations

Adapting to different industries with Master Data Management

Go on a journey of consumer experience

Having the correct contingencies in place – Data management

Breaking down complexities with data analytics

Controlling your cloud management platform

How to combat Advanced Persistent Threat attacks

Extracting pure performance through real-time data in the Healthcare Industry

The boom of outsourced operations in China

Protect and conquer: The importance of data protection

Access Granted: Privileged Account Management

Professional Profile special with Zurich’s Ricardo Mariano Gonzalez

Make room for Flash storage

The developing trends in IT in 2013

How to successfully merge your IT and Business strategies

Customising your data centre infrastructure

Achieving performance and business success with Application Performance Monitoring

Powell Electronics – SAP Upgrade to ECC 6.0

Delivering applications to virtualised servers

Augmenting analytics into your enterprise

Are employees putting your company’s data at risk? – Person-to-Person File Transfer

Modular momentum — the future of our data centers

Take command and control of BYOD with IAM and authentication

Access Granted: The key to good access management practices

Avoid security chaos under a DDoS attack

The modular appeal of datacenter design

Mastering master data management

Is today’s desktop truly dead? Or is it simply morphing?

Big Data: A Big Problem or Big Opportunity?

BYOD and The Consumerisation of IT

Room to spare: enterprise storage

Improving cloud with an integrated infrastructure

Delivering connectivity and security with a mobile IT architecture

Improving BYOD integration and data security with Desktop-as-a-Service

The benefits of cloud infrastructure management

Blowing the clouds wide open — OpenStack

Assuring Service Quality and User Experience for Unified Communications Deployments

APM is not enough – Service Delivery Management is better

Why is Modular better than Traditional?

Secure information communication through Managed File Transfer

The appeal of optimized and efficient DCIM tools

Sharpening your tools ready for the evolving data center

Improving enterprise mobility with BYOD

Establish operational excellence through DCIM

The explosion of Virtual Desktop Infrastructure

Integrate your DCIM strategies with converged infrastructure

Using Big Data to enhance customer experience across multiple channels

Real-Time DCIM — exploring focus capabilities in the wide field of Data Center Infrastructure Management

A cloud that’s fit for the enterprise

Cloud — Going beyond the hype

Maximizing your Data Integration strategies to full effect

Establish insight and knowledge with Big Data and business analytics

Command and control the complexities of today’s data center

The components of a high-performance data center

Turning Big Data into an opportunity — not a concern

Maintaining high value and performance in running your data center

Producing Effective Data Governance Across the Enterprise

The Paradigm Shift in Finance and Accounting Outsourcing Capabilities

Building bridges with real-time Optimized Data Center Infrastructure Management

Bringing employee empowerment through Mobile Business Intelligence

Move to the Next Generation of BPM

‘Lock and key’ — Bringing secure encryption and key management processes to the enterprise

Tap the Power of Process Innovation in the Mobile and Social Age

If business is from Venus and IT is from Mars, BI Agility is a Pipedream

Finding meaning in the information deluge

Securing access in a mobile world

Use the MDM approach that’s right for your business

Taking WAAS [Wide Area Applications Services] over to the enterprise

Teaming up – The overall effect of IT strategic partnerships

A New Game-Changer in Data Replication

Ensuring security through Identity and Access Management

MDM: Success through integration, quality, and governance

Utilizing and leveraging your Unified Communications system effectively

The growing influence of IT consumerization on enterprise collaboration

How to extract data center performance and efficiency

Avoiding organizational headache with outsourcing

Are you ‘Future Ready’? Reengineering processes today for tomorrow’s business challenges

Taking it step-by-step — Business Process Management

An ‘Appy’ time for the enterprise? The challenges the applications market pose

‘Caught on computer’ – Identity and Access Management

Executing your Social Software strategies

A social revolution in doing business

The modern era of Enterprise Search

Enterprise search function and data capabilities

Enhancing SharePoint as an ECM platform

The speedy development of Wireless LAN

Taking brand communications to the next level – Brand Asset Management

Simplifying cloud confusion

Applying effective capacity management solutions

Strengthening your data structure using ETL 2.0

A Unified Content strategy

Avoiding organizational immobility with Mobile Device Management

Building your environment around Unified Communications

Controlling content chaos

Don’t let your backup slip through the cracks – protect and access remote data

A marriage between IT & marketing: Mobile Content Management

Maximizing Communication

Mitigating Risk and Securing Devices for the Mobile Employee

Delivering applications to the enterprise

The ever-changing environment of Enterprise Content Management

Cooling today’s data centers

Mastering a business process service

Managing cloud services

Minimizing Costs of Managing Microsoft Endpoints

Business Process Outsourcing – payroll solutions

Dealing with Advanced Persistent Threat attacks

The boom of e-discovery

Building the foundations: Infrastructure management

Integrated IP Address Management Solutions

Storage in the virtualized world

Practical insight from a cloud expert on cloud security, options and trends

Dr Cloud’s prescription description

Improving software communications – the cloud

The private cloud migration

Essential email management intelligence

The green room

Go with the flow

The IT evolution

Improving testing effectiveness

Increasing staff efficiency with professional communication and smart integration

Spear Phishing and the Modern Cyber Attack

Avoid being a target – secure applications

Exponential data volume and the IT cost explosion

Letting the right people in

Security check

The real-time link

More bang for your virtualization dollar

Crucial cloud connections

Realize the true potential of a multi-tenant cloud

Manage centrally, work anywhere

Ride the cloud with next generation mobile apps

Standing out in the crowd

The fundamental failings of end-point security

Making the Cloud Work

Exceptional work experiences in a social business

Head in the clouds

Doing more with less

Getting on the right path

Reaching end-to-end visibility

Signed, sealed and delivered – securely.

Racing against time

Staying in control with customer requirements in an increasingly agile world

Reinvent with cloud; Don’t be left behind

Top of the food chain

The Sky’s the limit for Enterprise Mobile Users

Be on your guard with Vulnerability Intelligence

Preservation and privacy

The source

The Capacity Quadrant

Follow the flight path

What’s on your network?

Lean, mean and perfect performance

20-year journey in process automation

Capturing control

The best of both worlds

The last automation frontier

Problem solved

Global networking

From inception to testing

Insight into SIEM

Outsourcing around the world

Your business blueprint

Look before you leap

Are you social media-proof?

Full support

Leaps and bounds: Aligning customer engagement from contact center to enterprise

The end of BI as we know it: A fresh look at business analytics

Want client virtualization? Time then to get your back-end infrastructure act together

The future is video

Harvard Medical School Use of Cloud Computing Provides Harbinger for New IT Business Value, Open Gro

Process automation elevates virtualization use while transforming IT’s function to app and cloud ser

How the hybris Multichannel Suite gets you Cross-channel Nirvana

Cloud Computing’s Ultimate Value Depends Open PaaS Models to Avoid Applications and Data Lock-In

Analysts Define Business Value and Imperatives for Cloud-Based B2B Ecommerce

Business process-driven ALM: Create your own app factory

Modern Data Centers Require Efficiency-Oriented Changes in Networking

Business and IT—side by side

Pure logic

SIEM satisfaction

Actionable intelligence

Archiving on demand

An innovative approach to business marketing and communication

One at a time

A question of semantics

The new procurement challenge for travel management

A marriage of sorts

Moving with the times

Smooth transition

Back on track

Purchasing software and procurement solutions

GRC—Step by step

Join the conversation

The back office means business

Immediate results

A new breed of players

Secure and social

No time? No staff? Problem solved!

Bridging the gap

Search—What’s in it for you?

Getting in gear

Under the Microscope

Working in Tandem

Doing IT like a pro

Communications-enabled business processes

Defining CEBP

Finding the way

We built this city

Pervasive BI

Expansion and contraction of BI with Netezza, SAS, Accenture and the Aberdeen Group

Software podcast discussion

The best ways to approach service level and IT management

Managed Application Delivery – is thin client the best answer?

Making BI responsive to business needs

Virtualization podcast with Dr. Mark Russinovich

Software as a service and its contribution to high performance

Trends in combining software

Enterprise business intelligence strategies and opportunities

The best way to incorporate social software into the enterprise

Move it or lose it

The challenges and benefits of IAM integration

Lawson – head to head

Made-to-measure

Simplify the information discovery process

The key issues in financial BI

Staying ahead of the hack

Secure Sensitive Data and Streamline Compliance

The Virtualization Explosion

No breaches – guaranteed

PCI DSS – How to walk the line

Best Practice Enterprise Risk Management

Finding the right balance

Deep dive into SIEM 2.0

It’s called business intelligence for a reason

Enabling business continuity by eradicating security threats

A parallel universe

Security at its best

Proactive information management

Future focus—ITSM and the service desk

Working hand in hand

Data intelligence

Spend less…and improve access control

Searching for agility

Shared purpose

The season for change

The unwired enterprise

SIEM—Spiralling out

Safety first

Omniture and Forbes.com – A success story

Simplifying IAM

Is your business performance at its best?

IT IQ

Stop looking in the rear-view mirror

Fighting back on cybercrime

BPM—Changing how you do business

Analytics—Fuel for growth

Fog clears on precautions for putting more enterprise data safety in clouds

Improving business-critical decisions