6= ENERGY (ENERGY COST)

The Energy Cost Status menu allows you to view the current energy rate in use.

ENERGY COST: MID

The Energy Cost will display Lo, Mid, Hi or Crit (for critical) energy rates.

Event Log

The Event Log records the 250 most recent significant security system Events (happenings) and trouble conditions in the system. When a new event occurs, the oldest one is lost.

The following Events, along with the time and date of their occurrence are recorded in the Event Log when they occur:

All Security system Armings and disarmings (Off, Day, Night, Away, and Vacation), and user name.

All zones bypassed or restored by the user, and user name.

Any zone automatically bypassed by the system.

Any zone tripped while the security system is armed.

Any trouble condition (zone, battery, fuse, AC power, or phone).

The restoration of any trouble condition (the trouble condition ceased to occur).

Any Remote Telephone Access, Remote Access Denied, or Remote PC Access.

Show Events

To view your event log, from the top-level display or from the main menu, press the 7 key, then enter your code. The arrow keys may be used to scroll through the event log, starting with the most recent event.

Each event log entry displays the time and date on the top line and a description of the event on the bottom line:

7:15

PM

5/8

USER

NAME

AWAY

For trouble conditions, the event log will show the zone name or specific trouble condition and "TROUBLE":

10:59 AM 5/8

BATTERYTROUBLE

For trouble restorations, the event log will show the zone name or specific trouble condition and "TRBL RST":

11:57 AM

5/8

BATTERY

TRBL RST

The system records each remote access. A remote phone access is when someone calls into the system from an outside phone line. Remote phone access is also recorded if the system phones out in response to an alarm and the called party enters a code. The event log displays the code used to access the system and "REM ACCESS":

12:05 PM

5/8

USER NAME

REM ACCESS

An event is logged after three unsuccessful attempts are made to log into the system from a remote phone, the OmniPro II will lock out remote telephone access for 1 hour to discourage any further attempts to access the system - See Telephone Control.

Local access of the system using an in-house telephone is not recorded.

The event log will also record each time the PC Access software is used to access the system. The event log displays the code used to access the system and "PC ACCESS".

Page 31

Page 39
Image 39
Home Automation II owner manual Event Log, Show Events

II specifications

Home Automation II represents the next evolution in smart home technology, providing users with greater flexibility, convenience, and security through advanced features and integrated systems. This smart home revolution focuses on the seamless interaction of devices and the automation of daily tasks, ultimately enhancing the overall living experience.

One of the key features of Home Automation II is interoperability among a wide range of devices. This enables homeowners to control lights, thermostats, security cameras, and other appliances from a single platform. Whether through smartphones, tablets, or voice-activated assistants, users can easily manage their home environment, monitor energy consumption, and receive real-time notifications. This level of integration not only simplifies operation but also creates a more cohesive smart home ecosystem.

Another significant aspect of Home Automation II is the use of artificial intelligence and machine learning. These technologies learn a homeowner’s habits and preferences, allowing the system to adapt automatically. For example, the thermostat can adjust temperatures based on the time of day and occupancy patterns, while lighting systems can simulate human presence when residents are away. This not only enhances comfort but also contributes to energy efficiency, leading to potential cost savings in utility bills.

Home Automation II offers enhanced security features as well. Smart locks, surveillance cameras, and motion detectors can all be integrated into the home’s network. This allows homeowners to monitor their property remotely, receive security alerts, and even grant access to visitors through mobile apps. Biometric security options, such as facial recognition, are also becoming more common, adding an extra layer of protection.

Furthermore, energy management technologies are a hallmark of Home Automation II. Smart plugs and sensors monitor energy use, providing insights to homeowners about how to reduce consumption. Advanced systems can even automate energy distribution, shifting usage to off-peak hours to alleviate strain on local grids and maximize efficiency.

Finally, voice control has become a prominent feature in Home Automation II, allowing users to operate devices hands-free. Integration with voice-activated platforms like Amazon Alexa, Google Assistant, and Apple Siri adds another layer of convenience, making it easy to control multiple aspects of the home with simple voice commands.

In conclusion, Home Automation II represents a significant step forward in creating intelligent spaces that are responsive to the needs of their users. Through the integration of cutting-edge technologies, enhanced security measures, energy management, and intuitive control options, the concept of a smart home is evolving into a more accessible and efficient reality.