Appendix G

Software End User License Agreement

a)Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable “work that uses the Library”, as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions.)

b)Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that

(1)uses at run time a copy of the library already present on the user’s computer system, rather than copying library functions into the executable, and

(2)will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with.

c)Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution.

d)If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place.

e)Verify that the user has already received a copy of these materials or that you have already sent this user a copy.

For an executable, the required form of the “work that uses the Library” must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.

It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an executable that you distribute.

7.You may place library facilities that are a work based on the Library side-by-side in a single library together with other library facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two things:

a)Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections above.

b)Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work.

8.You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.

9.You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it.

10.Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions. You may not impose any further restrictions on the recipients’ exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties with this License.

Wireless-N Internet Home Monitoring Camera

62

Page 63
Image 63
Cisco Systems WVC80N manual Software End User License Agreement

WVC80N specifications

Cisco Systems WVC80N is a cutting-edge wireless security camera designed to meet the needs of both home and business users seeking reliable surveillance solutions. This IP-based camera offers a range of features that enhance security monitoring and ease of use, making it a popular choice for those looking to implement robust security measures.

One of the standout features of the WVC80N is its wireless connectivity. Utilizing advanced wireless technology, including 802.11n Wi-Fi, this camera allows for flexible installation without the need for extensive cabling. This enables users to position the camera in various locations throughout a property, ensuring optimal coverage of key areas.

The WVC80N is equipped with a high-resolution image sensor that provides clear and detailed video footage. Users can expect crisp video quality, even in low-light conditions, thanks to its night vision capabilities. The camera also includes smart motion detection that can alert users to activity within its field of view, allowing for proactive monitoring.

Another significant feature of the Cisco WVC80N is its remote viewing capability. Users can access the camera feed from anywhere using a web browser or compatible mobile devices, providing peace of mind when away from home or the office. The camera supports secure streaming options, with encryption technologies that protect sensitive video data from unauthorized access.

The WVC80N integrates seamlessly with Cisco's networking products, enhancing overall security architecture. Users can easily configure the camera settings, including resolution, frame rate, and motion detection parameters through an intuitive web interface.

In terms of design, the Cisco WVC80N has a sleek and modern appearance that can blend with a variety of environments. Its durable construction ensures longevity, while also making it suitable for both indoor and outdoor use.

Overall, the Cisco Systems WVC80N embodies a perfect combination of advanced features, user-friendly technology, and robust performance. For those looking to invest in a versatile and reliable surveillance camera, the WVC80N represents an excellent option that caters to a wide range of security needs, making it a compelling choice in the security camera market.