
Using
Operating Environment
To use the smartphone application “Everio sync.”, it is necessary to meet the following requirements.
Android Smartphone
AOS: Android2.1 or higher
(This unit is not guaranteed to operate with all models.)
BSupports GPS function (for GPS recording)
CAble to connect to the internet or “Android Market™” (required for software installation)
iPhone/iPad/iPod touch
AOS: iOS4.3.5 or higher
(This unit is not guaranteed to operate with all models.)
BAble to connect to the internet or “App Store™” (required for software installation)
Computer
To check the image on the camera from a computer browser and to transfer videos/still images, it is necessary to meet the following requirements.
AOS: Windows 7
BSupports wireless LAN or wired LAN
(For direct connections between the camera and computer, support for wireless LAN is required.)
CInstallation of Windows Media Player 12 or later
0Confirmed operating environment: Internet Explorer 9 or later
Caution :
0There is no guarantee that the operations will work with all computer environments. For example, the video download feature of mobile safari browser, etc. is not supported.
Memo :
0
Precautions on Using Wi-Fi
Cautions on
0Operation is not guaranteed on all devices.
0This function is not designed for disaster or crime prevention.
0To prevent the situation of forgetting to turn off the power, this unit will turn off automatically after 10 days of continuous usage.
0Communication may not be carried out properly near radio equipment or broadcasting stations. In this case, change the location accordingly.
0Radio wave interference by Bluetooth devices
Bluetooth devices make use of the same frequency bandwidth (2.4 GHz) as that of
0Security of Wireless LAN
An advantage of wireless LAN is that instead of using a LAN cable, it transmits information using radio waves, thus enabling LAN connection to be established within the area covered by the radio waves. However, as radio waves penetrate through objects (such as walls) within the range that they cover, security issues, such as interception of transmission or illegal access, may arise if security settings are not configured.
Before you connect to the network in a wireless LAN environment, read through the instruction manual for the wireless LAN device in use, and configure the security settings accordingly. Failure to do so may increase the risk of personal information being intercepted, such as user names, passwords, and the content of your mails, or illegal access to the network.
0Due to the design of wireless LAN, note that security may be breached by unusual or unforeseeable means.
0For more details on wireless LAN and network security, please consult the manufacturer of your wireless LAN device.
0JVC shall not be liable for any security issues, troubles, damages or losses arising from the use of this feature.
Radio Waves Used by this Product
This product makes use of radio waves in the ISM band (2.4 GHz). Although a radio station license is not required for using this product, please take note of the following.
oDo not use this product near the following places.
0Industrial, scientific, or medical equipment, such as microwave ovens and pacemakers
0Specified
0Bluetooth devices
Equipment such as the above mentioned devices makes use of the same frequency bandwidth as that of
Using this product near the above equipment may cause radio wave interference, and result in communication failure or a drop in communication speed.
oAvoid using this product near a TV or radio set.
TV or radio sets make use of a radio wave frequency bandwidth that is different from that of
However, when a TV/radio set is placed close to a
oRadio signals are unable to penetrate through reinforced steel, metal, or concrete.
The radio waves used by this product are unable to penetrate through reinforced steel, metal, or concrete materials.
It may difficult for communication to be established if two rooms or floors are separated by these materials.
*Communication may also get weaker when there are human subjects or parts of the body in between the
oDo not connect to wireless networks that you do not have authorization for.
Once connected, it may be considered as unauthorized access and legal actions can be taken against you.
13