Samsung SNC-B5399P user manual

Page 111

Once this change is made in a given copy, it isirreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy.

This option is useful when you wish to copy part of the code of the Library into a program that is not a library.

4.You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange.

If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfi es the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code.

5.A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a "work that uses the Library". Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License.

However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a "work that uses the library". The executable is therefore covered by this License.

Section 6 states terms for distribution of such executables.

When a "work that uses the Library" uses material from a header fi le that is part of the

Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially signifi cant if the work can be linked without the Library, or if the work is itself a library.

The threshold for this to be true is not precisely defi ned by law.

If such an object fi le uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or less in length), then the use of the object fi le is unrestricted, regardless of whether it is legally a derivative work. (Executables containing this object code plus portions of the Library will still fall under Section 6.) Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of Section.

Any executables containing that work also fall under Section 6, whether or not they are linked directly with the Library itself.

6.As an exception to the Sections above, you may also combine or link a "work that uses the Library" with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice,provided that the terms permit modifi cation of the work for the customer's own use and reverse engineering for debugging such modifi cations.

You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License. You must supply a copy of this License. If the work during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this License. Also, you must do one of these things :

a)Accompany the work with the complete corresponding machine-

Image 111
Contents Network Camera Overview English Overview FCC Statement Important Safety Instructions Contents Using the Live Screen Connecting to the cameraLogin Installing ActiveXCompatible PoE Switches Product FeaturesPrecautions Installation and USE Recommended PC SpecificationsART Paper WHAT’S IncludedAppearance AT a GlanceDescription InsideComponents Disassembling Installation & connectionINSERTING/REMOVING AN SD Memory Card Inserting an SD Memory CardRemoving an SD Memory Card Memory Card Use What is a memory card?Memory Card Information not Included Selecting a memory card that’s suitable for youPower Monitor Connecting with Other DevicePower Supply Connecting to the monitorLINE-IN Connecting to Audio Input/OutputMicrophone LINE-OUTNetwork Audio I/O Block DiagramAlarm I/O Wiring Diagram Connecting to the I/O port boxPole Mount ADAPTORSCX-300PM InstallationOptional Accessories for Installation Precautions before installationInstalling on the ceiling directly Camera from the case Flushed installation on the ceiling Connecting additional alarm cables Panning Tilting Lens rotation Adjusting the monitoring direction for the cameraYou can configure the camera settings using the Web Viewer HOW to USE the Menu KEYFactory Defaults Main MenuProfile Iris Camera SetupYou can configure the general settings of the camera module Camera IDSENS-UP MotionDNR ShutterDAY/NIGHT White BALAny excessively bright area in a night scene will be masked Reverse Digital ZoomDetail AGC Color SUPPrivacy Zone Zone SetupYou can set the font color of the user interface Factory DefaultOthers OSD ColorYou can check the system information  The camera type may different, depend on the video signalSystem Info LanguageNetwork connection and setup Network Connection and Setup Setting the IP Router Connecting to the camera from a local PC in the LAN Connecting the Camera Directly to Local Area NetworkingButtons used in IP Installer IP Address SetupDdns registration has failed Static IP SetupManual Network Setup URLNetwork connection and setup Auto Network Setup Dynamic IP Environment Setup Dynamic IP SetupManual Port Range Forwarding Port Range Forward Port Mapping SetupConnecting to the Camera from a Remote PC VIA the Internet Connecting to the Camera from a Shared Local PCNormally, you would Connecting to the CameraUsing URL Connecting via URL If the Http port is other thanTo check the Ddns address LoginSecurity warning popup appears, click Install Installing ActivexFor Windows XP Service Pack 2 users Click Install ActiveX ControlUsing the Live Screen To capture the snapshot BackupOn Activates the specified Alarm Out port Alarm output Off Deactivates the specified Alarm Out portRecorded space, recording will be forcibly ended Click OK To print out the screenshotTo record a video Click on the scene to recordEnglish SD Search Viewer Screen layout Using the SD Search Viewer ScreenBrightness from 1 to Contrast Adjust the contrast from Accessing the Setup ScreenDefault Setup To configure the video & audio settingsSetup screen To configure the IP settings To set the user account Click Basic User User setup window appearsEnglish To set the date/time System SetupWhen done, click Apply Selected language will be applied To set the display languageSelect System Log Log information list appears To check the log informationTo reset the system To update the softwareTo Set IP Filtering To set the HttpsOverlay Setup To set the textYou can display text on the screen Verified will be displayed Event SetupTo set the event transfer function To test the FTP transfer Click TestSetup screen To set an alarm image To setup the recordTo set the alarm input To Set Intelligent Video Analysis Setup screen To set the scheduled transfer Network Setup To set the video transfer modeTo set the Ddns ALC DAY ModeITS GamingTerminology CavlcBitrate Control CBRConstant Bitrate English Specifications 4CIF CS/CRAM DSPDdns SetupHTTPS, SSL, Dhcp ARP, DNS, DDNS, VsipNtsc Http APISDK Frame Rate Ntsc EstimationHPelGOP size15 MPEG4 4CIF FPS 30 FPS 15 FPSMPEG4 VGA 264 VGA MPEG4 CIF 264 CIF Frame Rate PAL 25 FPS 13 FPS MPEG4 VGA Kbps 17 FPS MPEG4 CIF 264 CIF Problem Solution TroubleshootingAnalysis setting Verify the settings in the following sequenceNTP must be properly configured Alarm Video Transmission must be enabledWe protect your rights with two steps GPL/LGPL Software LicenseGNU General Public License PreambleProgram, and can be reasonably Page Page No Warranty How to Apply These Terms to Your New ProgramsEND of Terms and Conditions Preamble Terms and Conditions Source Code Basic PermissionsProtecting Users Legal Rights From Anti-Circumvention Law Conveying Verbatim Copies Conveying Modified Source VersionsConveying Non-Source Forms Installed in ROM Additional Terms Acceptance Not Required for Having Copies Automatic Licensing of Downstream RecipientsPatents Valid No Surrender of Others FreedomUse with the GNU Affero General Public License END of Terms and Conditions GNU Lesser General Public License Preamble Page Page Page Page Page How to Apply These Terms to Your New Libraries No Event Shall the OpenSSL OpenSSL LicenseCopyright C1995-1998 Eric Young Original SSLeay License
Related manuals
Manual 117 pages 9.38 Kb Manual 117 pages 10.42 Kb Manual 115 pages 56.68 Kb Manual 115 pages 845 b