- Digital Lifestyles Reference Guide
- Home Audio
- Audio Standards
- Dolby Surround Sound
- DTS Surround Sound
- THX
- MP3
- Windows Media Audio (WMA)
- Advanced Audio Coding (AAC)
- Digital Rights Management (DRM)
- Informit Articles and Sample Chapters
- Books and e-Books
- Online Resources
- Audio Analog/Digital Components
- Receivers
- DVD-Audio Players
- CD/SACD Players
- Making Your Decision
- Books and e-Books
- Online Resources
- Audio Component Integration
- Standalone Components
- Internet Radio Receivers
- Connecting a PC to Your Home Stereo
- Making Your Decision
- Informit Articles and Sample Chapters
- Books and e-Books
- Online Resources
- Home Video
- Video Standards
- DVD versus VCD
- MPEG-1 and MPEG-2
- DTV
- HDTV
- HDTV Buying Tips
- Video Out: Composite, Component, and S-Video
- CSS Explained
- Making Your Decision
- Informit Articles and Sample Chapters
- Books and e-Books
- Online Resources
- Video Components
- Playback Components
- DVD Players
- Personal Video Recorders (PVRs)
- VHS
- Laser Discs
- Media Center PCs
- What's New in Media Center 2005
- Video-on-Demand (VoD)
- Screens
- Making Your Decision
- Informit Articles and Sample Chapters
- Books and e-Books
- Online Resources
- A/V Integration
- Home Theater
- Component Integration
- Universal Remotes
- Combining Home Theater with Home Computing
- Making Your Decision
- Books and e-Books
- Online Resources
- Home Theater PCs
- Uses for an HTPC
- Components of an HTPC
- Windows Media Center PCs
- Build Your Own HTPC
- Informit Articles and Sample Chapters
- Books and e-Books
- Online Resources
- Rear Projection Televisions
- CRT Projectors
- DLP Projectors
- LCD Projectors
- LCoS Projectors
- Choosing the Right RPTV Technology
- Informit Articles and Sample Chapters
- Books and e-Books
- Online Resources
- Multimedia Networks
- Connecting Your PC Network to Your Home Theater System
- Investing in Media Center Software
- What if Your PC and Home Theater are in Different Rooms?
- Media Center Extenders
- Multimedia Appliances
- Making the Connection
- Informit Articles and Sample Chapters
- Books and e-Books
- Online Resources
- PVRs, Consoles, and Media Extenders
- Finding the Right PVR
- Types of PVR Solutions
- Set Top Box PVR
- Portable PVRs
- DVD-Recorders
- Making Your Decision
- Getting the Most from Your TiVo
- Networking Your TiVo
- Transfer Video from TiVo to PC at Home
- Transfer Video from Your PC to TiVo
- Transferring Video from TiVo to a PC Anywhere
- Burning DVDs of TiVo Recording
- Watch TiVo Shows on a iPod Video Or Sony PSP
- Software PVR Solutions
- Required Features
- Optional Features with Advantages
- Software PVR Options
- Conclusion
- 10 Things You Didn't Know About the Xbox 360
- Xbox 360 Networking Tips
- Mobile Computing
- Notebook Computer Audio
- USB Audio
- FireWire Audio
- PCMCIA Audio
- Making Your Decision
- Books and e-Books
- Online Resources
- Broadband
- High-Speed Internet Options
- Cable
- DSL
- Cellular Data Services
- Satellite
- Wireless ISPs
- Making Your Decision
- Informit Articles and Sample Chapters
- Books and e-Books
- Online Video Subscription Services
- Today's Options
- Making Your Decision
- Informit Articles and Sample Chapters
- Books and e-Books
- Voice over IP
- Softphone VoIP
- InformIT Articles and Sample Chapters
- Books and e-Books
- Home Automation
- Home Automation Applications
- Types of Home Automation Systems
- Automation Features
- Making Your Decision
- Informit Articles and Sample Chapters
- Home Automation Security
- Making Your decision
- Informit Articles and Sample Chapters
- Books and e-Books
- Online Resources
- Books and e-Books
- Online Resources
- Digital Photography
- Digital Cameras
- Megapixels
- Camera Bodies
- Batteries
- Zoom Lenses
- Auto Focus vs. Manual Focus
- LCD Screens
- Exposure Settings
- White Balance
- Storage Formats
- Wi-Fi-enabled Digital Cameras
- Purchasing the Right Digital Camera
- Informit Articles and Sample Chapters
- Books and e-Books
- Online Resources
- Digital Photo Editing Tools
- Photo Organizers
- Photo Editing Suites
- Deciding Which App to Use
- Informit Articles and Sample Chapters
- Books and e-Books
- Online Resources
- Digital Photography Tips
- Informit Articles and Sample Chapters
- Books and e-Books
- Editing Digital Photographs
- Informit Articles and Sample Chapters
- Books and e-Books
- Online Prints From Digital Images
- Making Your Decision
- Digital Video
- Camcorders
- Camcorder Features You Shouldn't Be Without
- Recording Formats
- DV Camera Tools
- Books and e-Books
- Online Resources
- Digital Video Editing Tools
- Features to Look For
- Popular Video Editing Software
- Books and e-Books
- Online Resources
- Using Video Vault to Port Content to Portable Media Players
- 10 Tips to Improve Digital Video
- Weblogs and Podcasting
- Overview of Weblogs
- Blogs as Text
- Blogs as Pictorials
- Blogs as Audio
- Blogs as Video
- Getting Started
- Informit Articles and Sample Chapters
- Books and e-Books
- Online Resources
- Blogging Tools
- Hosted Services
- Desktop Tools
- Hosting Your Own Blog
- Making Your Decision
- Informit Articles and Sample Chapters
- Books and e-Books
- Photo Blogging
- Photo Blogging Services
- Hosted Services with Photo Support
- Making Your Decision
- Informit Articles and Sample Chapters
- Books and e-Books
- Audio Blogging
- Blog By Phone
- Recording Your Own Audio Blog Posts
- Audio Hosting Services
- Podcasting
- Making Your Decision
- Informit Articles and Sample Chapters
- Books and e-Books
- Recording and Distributing Podcasts
- Recording Software
- Before Recording
- Recording Your Podcast
- Publishing Your Podcast
- Podcasting Features in Apple's iTunes
- Informit Articles and Sample Chapters
- Books and e-Books
- Online Resources
- Video Blogging
- Video Blogging By Webcam
- Creating a Video Blog From Scratch
- Video Hosting Services
- Distributing Video Blogs
- Making Your Decision
- Informit Articles and Sample Chapters
- Books and e-Books
- Online Resources
- Attracting Traffic to Your Blog
- Informit Articles and Sample Chapters
- Books and e-Books
- Blogging Rules for Revolutionaries
- How Blogging will Change the World
- Create a Link to This Site Campaign
- Meta Tag Your Revolution
- New Comment Posted
- Coordinate Your Efforts
- Repeat, Repeat, Repeat
- Portable and Handheld Devices
- Motorola ROKR: iTunes on Your Phone
- ROKR iTunes Features
- Cell Phone Standards
- Making Your Decision
- Manufacturer Resources
- Sony PSP
- PSP Navigation
- PSP as a Gaming Platform
- PSP for Movies
- PSP for Music
- Wireless Networking
- Bottom Line
- Informit Articles and Sample Chapters
- Online Resources
- Portable Digital Audio Players
- Types of Players
- File Formats
- Popular Models
- Informit Articles and Sample Chapters
- Books and e-Books
- Online Resources
- Integrating an iPod with a Car Audio System
- Auxiliary Line In Connections
- CD Changer Connection Integration
- Custom Integration
- Making Your Choice
- Informit Articles and Sample Chapters
- Online Resources
- Portable Entertainment Centers
- Screen Sizes
- Hard Disk Space
- File Formats
- Video Recording
- Battery Life
- Connection Options
- Additional Accessories
- Making Your Choice
- Informit Articles and Sample Chapters
- Online Resources
- PDAs
- Fancy Features
- Palm OS or Pocket PC?
- Palm OS Models
- Pocket PC Models
- Informit Articles and Sample Chapters
- Books and e-Books
- Online Resources
- Smartphones
- Different Types of Smartphones
- PDA/Phones
- Phone-Based Smartphones
- Cool Ways to Improve Your Windows Mobile Smartphone
- Informit Articles and Sample Chapters
- Books and e-Books
- Online Resources
- Cellular Network Technologies
- FDMA
- CDMA
- TDMA
- GSM
- iDEN
- PCS
- Dual Band and Dual Mode Phones
- Informit Articles and Sample Chapters
- Books and e-Books
- Online Resources
- Hi-Speed Wireless Data Plans
- Cingular Plans
- Verizon Wireless Plans
- Making Your Decision
- Low-Tech Alternatives to Cell Phone Feature Overload
- High Tech Watches
- Smart Watch Technology
- MSN Direct
- Popular Smart Watches
- Other Types of High-Tech Watches
- Books and e-Books
- Online Resources
- Portable Audio Recording
- Features
- Editing Features
- Effects
- Devices
- Making a Decision
- Informit Articles and Sample Chapters
- Books and e-Books
- Handheld GPS Receivers
- GPS Features
- ABCs of GPS
- Making A Choice
- Books and e-Books
- Online Resources
- Portable Gadgets for Holiday Giving
- PDA Accessories
- Portable Music Players
- iPod Accessories
- Headphones and Earbuds
- Other Cool Portable Gadgets
- Informit Articles and Sample Chapters
- Books and e-Books
- Online Resources
- Automobiles
- Satellite Radio
- How Satellite Radio Works
- XM Radio Programming
- SIRIUS Satellite Radio Programming
- XM Radio Receivers
- SIRIUS Receivers
- Informit Articles and Sample Chapters
- Books and e-Books
- Online Resources
- Satellite Navigation Systems
- How GPS Works
- Doing the Math
- Using the GPS Data
- Popular Automobile GPS Systems
- Books and e-Books
- Online Resources
- In-Car Computers
- Software
- Cases
- Power Interface
- LCD Screen
- Human Interface Options
- Storage Media
- Networking
- Audio
- Video
- Bluetooth
- Making Your Decision
- Online Resources
- E-Commerce
- Find Free Music — Legally
- Record Label Sites
- Blogs
- Podcasts
- Informit Articles and Sample Chapters
- Books and e-Books
- Subscription Audio Services
- Making Your Decision
- Informit Articles and Sample Chapters
- Books and e-Books
- Digital Wallets
- The History of Digital Wallets
- What is a Digital Wallet—and How Does It Work?
- Who Offers Digital Wallets
- Books and Online Resources
- Identity Theft
- How Your Identity Can Be Stolen
- What an Identity Thief Does With Your Personal Information
- Preventing Identity Theft
- What to Do If Your Identity Has Been Stolen
- Informit Articles and Sample Chapters
- Books and e-Books
- Online Resources
- Online Shopping Fraud
- Why Online Shopping Is (Generally) Safe
- Reporting Online Shopping Fraud
- Top Ten Tips for Safer Online Shopping
- Informit Articles and Sample Chapters
- Books and e-Books
- Online Resources
- Online and Desktop Mapping
- Web-Based Maps
- Desktop Maps
- Making Your Decision
- eBook Formats and Readers
- Formats
- eBook Hardware
- Sources of eBooks
- Making Your Decision
- 10 Google Maps Hacks
- Robotics
- Robots You Can Buy (or Build) Today
- Toy Robots
- Home Automation Robots
- Do-It-Yourself Robots
- Industrial Robots
- Informit Articles and Sample Chapters
- Books and e-Books
- Online Resources
- Additional Resources
- Predictions for 2006
- Jake's Digital Lifestyles Reading List
- Jake's Top Ten Digital Lifestyles Web Resources
- 10 Things on the Digital Lifestyle Holiday Wish List
- 2006 Consumer Electronics Show Preview
Security is one of the key areas where home automation technologies are focusing innovation. Providing a sense of security is an easy sell for companies looking to install automation products in homes because it reaches an emotional trigger in the buyer. Many of the home security products also offer convenience in other areas of daily life, but at their core are designed with protection in mind.
Access Control
Access control is one of the most obvious ways to deliver automation to the home. Adding a layer of entry control beyond a key lock on doors creates a system for both altering when an intruder attempts to breach security, as well as defining rules determining who gains access to what based on permission based roles. For greater sense of security a combination of access control systems may be used.
Password Protection Systems
The most basic access control is password protection. In most cases, this is a pin number typed into a key pad. For simple systems, the pin number disarms or arms a home alarm system. In more complex pin access scenarios, entering the proper pass code presents access to specific portions of the home (maybe the garage is off limits without a pass code to keep small children from entering unsupervised). In more sophisticated systems the password may be a spoken phrase with voice matching, which overlaps into the realm of biometric access control.
Biometric Entry Systems
Biometric systems come in a variety of formats. The most affordable form of biometric security is the fingerprint. This is also the least secure method because fingerprints are proven to be easily faked, which is why they generally accompany a second form of access control like a pin or physical token.
More complex forms of biometric entry protection include hand geometry, which requires the entrant to place their hand on a sensor with a computer authentication system detecting patterns in the hand for access. At the high end of biometric protection, retinal scanning technologies authenticate based on a person's eye.
Physical Token
Physical token systems require a physical object for access. This type of access is most similar to what we are used to in gaining access with a key. The token may be a smart card with a chip inside. It might be an object with a barcode imprinted on it or it may be a type of key with a sensor that the authentication system determine to be friendly.
Monitoring Systems
Monitoring the home for security breaches both when residents are inside the home and when they are away is a primary role for security systems. Detecting unusual movement to trigger an alarm, capturing images based on motion detection or over elapsed time or simply recognizing that a physical entryway is open or closed are all mechanisms of security monitoring. Some combination of monitoring technologies delivers a snapshot of home security at any moment in time.
Entryway Open/Close Detection
Knowing whether entryways are open or closed, whether they are locked or unlocked, is one way to verify a secure perimeter. At a simplistic level, this may be contact points on doors and windows, with half the contact on the entry way and the other half on the physical obstruction of the entryway (the door or window). When these two halves are in close proximity, the door or window is viewed to be closed by the security system. When the two halves are separated, the entryway is viewed to be open. Depending on configuration settings in the security control center, a open portal may trigger an alarm, log an open/close event or do nothing.
Motion Sensors
Motion sensors are designed to detect movement in a room. These are typically used as a determinant to indicate someone actively in motion within a space. Motion sensors are used to send alarm signals back to the security center to inform the system that someone or something is moving in a room where no movement is expected.
Camera Technologies
Camera technologies provide the most accurate picture of what's taking place wherever the camera is aimed. Cameras are used to recognize someone at an entryway. Cameras are used as a motion detection device to grab an image of who or whatever may be in motion. Cameras are also used to capture everything in view of the lens over a period of time. In the event of a security breach, a camera provides a clear picture of who was in the breached environment.
Warning Systems
Warning systems are used primarily to act on data provided by authentication tools and monitoring systems. Various types of alerts and alarms may be triggered depending on what a particular information gathering tool transmits.
Audible Alarms
Audible alarms are often used to inform an intruder that they are discovered. Audible alarms may also function to alert people sleeping in a home to the appearance of an intruder within the previously secure perimeter. This type of alarm presents the benefit of potentially scaring an intruder into leaving while offering an immediate feedback system to alert residents they should be seeking safety.
Silent Alarms
Silent alarm systems are primarily used to send a message to an offsite security company about a breach. Silent signaling is used to keep an intruder from realizing they've been detected, which may be useful for a rapid response team trying to catch the intruder in the act of intruding.
Email Alerts and Paging
Some security systems offer alternative methods of delivering security system feedback. Email of photos taken when a motion sensing camera is triggered provide immediate feedback for someone away from home with computer access to know a motion event occurred. If logging the opening and closing of doors is important, an email or SMS message provides a running text log of when events take place.
Control Interfaces
At the heart of every security system is the interface for establishing system event rules, setting up passwords and identification procedures and storing data collected in the monitoring process. Depending on the level of sophistication available in a security system, it may contain some or all of these things.
Keypads
Keypads are a common mechanism for security control. They offer simply numerical options for configuring home security, like press '1' to activate the alarm. Keypads may be used on the outside of a home or garage to require a pin or alphanumeric sequence to gain access.
Web Access
Web access is becoming more common in security systems as Windows and Linux computer systems are increasingly used as the control center for security and other automation functions. Web access may be available via local computers, with a Web page essentially providing the visual interface or it may be an outward facing gateway with password authentication available from anywhere on the Web. The number of home automation applications integrated into any one computer ultimately determines the complexity.
Television Control Screens
Television-based control systems are currently available in several varieties. In some instances, they are an extension of Web-based PC access, providing access to common functions by way of a media center computer connected to the television. In other cases, they are integrated into a more traditional keypad system with a more user-friendly interface tied into the television remote control. As media center applications play a larger role in home theater setups, this is likely to become a popular way for people to interact with home automation.