WHAT IS WHOLE HOUSE AUDIO/VIDEO? Part 2

Audio/Video

Elements from the 3 methods described previously can be combined to customize the system for your requirements (eg. use a high power surround sound receiver for your home theater zone 1, add the NUVO 6-Source/6-Zone System system for the other listening areas).

The key to a successful whole-house Audio/Video system is making it possible to control the centralized equipment from each remote listening location. Without this, you will have to run back to the equipment closet everytime you want to adjust the volume or change source. With the systems below, you can use remotes in each listening location to transmit commands back to the Audio/Video equipment, just as if you were standing in front of the Audio/Video equipment. There are several ways that this can be done:

WIRELESS RF – FOR SINGLE ZONE SYSTEMS

audio/videoThe easiest and lowest cost solution is to use wireless RF control systems. This can be done using the 8210 Powermid or 8220A IR Remote Extender. These devices convert IR signals to RF that transmit through walls back to your equipment. These devices can typically only be used for single zone systems.

 

COAX VIDEO SIGNAL TRANSMISSION

If the coax video transmission system to your TVs is laid out in the same pattern as your Audio/Video zoning, you can use this same cable to transmit IR commands back to your system. You must have a coax cable system that is home run back to the Audio/Video equipment location to do this. See 8195 IR Signal Coax Splitter/Injector8197 Xtralink 2, and 7717 Multiroom Video Distribution System. This method provides zoning capability and has better signal reliability than the RF method.

 

HARDWIRED SIGNAL TRANSMISSION

This is the preferred method for new construction and retrofitting if it is possible to easily run Cable from each zone back to your equipment. Hardwired IR signal transmission provides the greatest system design flexibility and the greatest signal transmission reliability.

 

X10 AND HOME AUTOMATION CONTROL

ComputersX10 TabletopWallmount andWireless RF transmitters can also be used to control Audio/Video equipment. For a more sophisticated control that can include macros, use an intelligent home automation controller. See 1132CUP PowerLinc Controller1350 HomeVision, or 1240 JDS TimeCommander/Stargate + 1232 IR Xpander for some of the home automation controllers and software that support IR Audio/Video control.

The use of an intelligent home automation controller opens up many amazing possibilities. One touch can turn on a complex array of Audio/Video equipment. You can simplify control of your equipment so that every member of your family can easily choose the music or video source they want without juggling a handful of remotes. Or, how about having music follow you around your home (as in Bill Gates home). Motion detectors can be used to automatically turn on music in different zones.

Check Out Part 1 of What is whole house audio/video?

Article Provided By: Smarthome

If you would like liquidvideotechnologies.com to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at deveren@liquidvideotechnologies.com

WHAT IS WHOLE HOUSE AUDIO/VIDEO?

Audio/Video

Imagine having hi-fi music in every room of your home with nothing more than an elegant Wall-Mounted Keypad and virtually invisible in-wall or in-ceiling Speakers showing. This is the dream system of interior decorators and is typically only found in multi-million dollar homes. We can show you how this can be done in your home with your existing equipment and at a reasonable cost.

audio/videoWhole house audio/video refers to a centralized audio/video system that pipes music and video/cable signals throughout the home. Because the system is centralized, the only components present in each room are speakers and TV screens. Control of the system is made through a handheld remote or wall mounted control panels. The centralized components can either be hidden away in a closet or if you prefer, mounted in an impressive Rack System array in your living room. (Some systems may have additional VCRs and CD players located locally in various rooms for convenience. If correctly configured, these VCRs and CD players can be viewed or listened to in the room they are located as well as any other room.)

There are many ways of configuring a whole-house Audio/Video system. We will describe the basic methods below. Choose the method that best suits your requirements and budget.

SINGLE AMPLIFIER/RECEIVER DRIVING SPEAKERS IN MULTIPLE ROOMS

This is the simplest and lowest cost method. The output from a single amplifier or receiver is split amongst several rooms. All rooms will receive the same music. Volume Controls can be located in each room to adjust listening levels (or a centralized volume controller can be used if preferred). Whenever the output from a single amp/receiver is split between 2 or more speakers, an impedance matching system must be used. To control the master volume and source (CD, tuner, tape, etc.) from each room an Infrared (IR) Distribution system can be added.

MULTIPLE AMPLIFIERS/RECEIVERS SHARING SOURCES

If different rooms need to listen to different sources at the same time, multiple amps/receivers are required. Use one amp/receiver for each listening (a zone refers to one or more rooms that listen to the same source simultaneously). The amp – receivers can be stacked together and the source inputs can be shared (ie. 1 CD, 1 tape, 1 DSS shared amongst 2 or more amp/receivers). To control the volume and source from each zone a zoned Infrared (IR) Distribution system can be added.

PURPOSE MADE MULTIPLE ZONE AMPLIFIER SYSTEMS

Many higher end amp/receivers now come with a built-in second discrete amplifier for a second zone. If your needs do not require more than 2 zones, this may be a cost effective solution. For a larger number of zones consider the NUVO 6-Source/6-Zone System which has six discrete amplifiers and a volume/source distribution system built-in.

Check Out Part 2 of this article.

Article Provided By: Smarthome

If you would like liquidvideotechnologies.com to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at deveren@liquidvideotechnologies.com

 

The Cyber Risk of Mixing Business with Pleasure

Cyber Risk – Technical and Process Controls for the Enterprise Must Extend to Employees and How They Engage in Personal Services

Cyber RiskThe ubiquitous use of social media has blurred the lines between business and personal lives. A lot has been written about the importance of keeping the two separate, with an emphasis on the potential risk to an individual’s reputation. A photo or casual comment meant for a friend can have a detrimental effect when viewed by a business associate or employer. But there’s another important reason why separating business from pleasure should be a concern – the potential for increased cyber risk to your business stemming from credential compromise to social media accounts.

Barely a week goes by without reports of a leaked database. At the same time, dumps of stolen credentials are regularly sold, traded and shared online across paste sites, file-sharing sites and online marketplaces. Credential compromise is not new, but how these credentials become available is often directly related to the lack of separation between business and pleasure.
The LinkedIn and MySpace databases were recently exposed by threat actors using the names “Peace of Mind” and “Tessa88”. Breaches of dating services like Ashley Madison and Adult Friend Finder also were the source for credentials. And although proportionally low, even gaming services have been responsible for leaked credentials. It may be surprising but many of the credentials used for these sites were corporate accounts. That’s right. Many employees reuse their corporate emails for other services and, when these services are breached, it also reveals their credentials.

Cyber Risk

Employees who have reused corporate emails and passwords for personal use can put their employers at risk of account takeovers, credential stuffing and extortion attempts.
Account takeovers
On May 23, 2016, OurMine Team reportedly compromised a number of social media profiles for various business personnel and celebrities. The accounts that were affected included Twitter, Tumblr and LinkedIn profiles. The group initially claimed the use of zero-day exploits to compromise accounts, but later confirmed access was secured through the use of information from the recently exposed dataset from LinkedIn. More recently, it was reported that the alleged Dropbox leak also occurred from password reuse of the LinkedIn breach. The likelihood is that people have neglected to change their passwords since 2012, and proceeded to recycle the same password for multiple services.
Credential stuffing
Threat actors can automatically inject breached username and password pairs in order to fraudulently gain access to user accounts. This technique, known as credential stuffing, is a type of brute force attack whereby large sets of credentials are automatically inputted into websites until a match with an existing account is found. An attacker can then hijack that account for a variety of purposes, such as draining stolen accounts of funds, the theft of personally identifiable information, or to send spam. According to the Open Web Application Security Project (OWASP), credential stuffing is one of the most common techniques used to take-over user accounts.

Extortion attempts
Hundreds of thousands of corporate email addresses were leaked as part of the Ashley Madison breach. Following the breach of online dating site Ashley Madison in July 2015, extortion attempts were directed against specific individuals identified within the compromised dataset. Users received extortion emails threatening to share the exposed information with the victim’s partner, unless one Bitcoin was paid into a specified Bitcoin wallet. A number of automated post-breach extortion services also emerged including one site that reportedly spammed users with unsolicited bulk emails that suggested their spouses or employers may find out their details were exposed.
By better understanding that corporate credentials are being reused for personal services and how threat actors may exploit credentials, security teams can better prepare for and mitigate instances of credential compromise. Here are a few tips.
Set policies

• Establish a policy for which external services are allowed to be associated to corporate email accounts.
• Understand and monitor approved external services for password policies and formats to understand the risks and lowest common denominators.
Monitor activity

• Proactively monitor for credential dumps relevant to your organization’s accounts and evaluate these dumps to determine if the dumps are new or have been previously leaked, in which case you may have already addressed the matter.
 • If you have any user behavior analytics capabilities, import compromised identity information and look for any suspicious activity (e.g., accessing resources that have not been accessed in the past.)
Educate employees

• Update security awareness training to include the risks associated with password reuse.
• Encourage staff to use consumer password management tools like 1Password or LastPass to also manage personal account credentials.
The number of compromised credentials that are available online is staggering, providing a goldmine for attackers. In fact, Verizon’s 2016 Data Breach Investigations Report found that breached credentials were responsible for 63 percent of data breaches. As the lines between personal and professional become blurred, so too must the approach that organizations take to deal with cyber risk. Technical and process controls for the enterprise must extend to employees and how they engage in personal services.
Article Provided By: SecurityWeek

If you would like liquidvideotechnologies.com to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at deveren@liquidvideotechnologies.com