that you received. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.

Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright on the software, and (2) offer you this License giving you legal permission to copy, distribute and/or modify it.

For the developers' and authors' protection, the GPL clearly explains that there is no warranty for this free software. For both users' and authors' sake, the GPL requires that modifi ed versions be marked as changed, so that their problems will not be attributed erroneously to authors of previous versions.

Some devices are designed to deny users access to install or run modifi ed versions of the software inside them, although the manufacturer can do so. This is fundamentally incompatible with the aim of protecting users' freedom to change the software. The systematic pattern of such abuse occurs

in the area of products for individuals to use, which is precisely where it is most unacceptable. Therefore, we have designed this version of the GPL to prohibit the practice for those products. If such problems arise substantially in other domains, we stand ready to extend this provision to those domains

in future versions of the GPL, as needed to protect the freedom of users.

Finally, every program is threatened constantly by software patents. States should not allow patents to restrict development and use of software on general-purpose computers, but in those that do, we wish to avoid the special danger that patents applied to a free program could make it effectively proprietary. To prevent this, the GPL assures that patents cannot be used to render the program non- free.

The precise terms and conditions for copying, distribution and modifi cation follow.

TERMS AND CONDITIONS

0. Definitions.

“This License” refers to version 3 of the GNU General Public License.

“Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor masks.

“The Program” refers to any copyrightable work licensed under this License. Each licensee is addressed as “you”. “Licensees” and “recipients” may be individuals or organizations.

To “modify” a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other than the making of an exact copy. The resulting work is called a “modifi ed version” of the earlier work or a work “based on” the earlier work.

A “covered work” means either the unmodifi ed Program or a work based on the Program.

To “propagate” a work means to do anything with it that, without permission, would make you directly or secondarily liable for infringement under applicable copyright law, except executing it on a computer

or modifying a private copy. Propagation includes copying, distribution (with or without modifi cation), making available to the public, and in some countries other activities as well.

To “convey” a work means any kind of propagation that enables other parties to make or receive copies. Mere interaction with a user through a computer network, with no transfer of a copy, is not conveying.

An interactive user interface displays “Appropriate Legal Notices” to the extent that it includes a convenient and prominently visible feature that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty for the work (except

to the extent that warranties are provided), that licensees may convey the work under this License, and how to view a copy of this License.

If the interface presents a list of user commands or options, such as a menu, a prominent item in the list meets this criterion.

Page 100
Image 100
Samsung SNC-B5399P user manual Terms and Conditions

SNC-B5399, SNC-B5399P specifications

The Samsung SNC-B5399P is a high-performance network camera designed for various surveillance applications, providing exceptional video quality and advanced features that cater to both commercial and residential users. It is equipped with a progressive scan 1/3” CMOS sensor, offering a resolution of up to 2 Megapixels, which allows for clear and detailed images, making it ideal for monitoring critical areas where image clarity is paramount.

One of the standout features of the SNC-B5399P is its ability to deliver superior low-light performance. With the support of Wide Dynamic Range (WDR) technology, this camera can capture images in challenging lighting conditions, ensuring that both bright and dark areas are well-represented. This is particularly beneficial in environments such as entrances where direct sunlight and shadows can cause visibility issues.

The camera also supports H.264 and MJPEG video compression technologies, enabling efficient bandwidth and storage management. This flexibility allows users to choose the best format according to their specific needs, whether they prioritize image quality or storage space. Furthermore, the SNC-B5399P is capable of providing frame rates of up to 30 frames per second at full resolution, ensuring smooth video playback without noticeable delays.

In terms of connectivity, the SNC-B5399P features Ethernet support with Power over Ethernet (PoE) capabilities, simplifying installation by allowing power and data transmission through a single cable. This can be particularly advantageous in locations where power outlets are scarce or difficult to access.

The camera is equipped with advanced security features, including motion detection that can trigger alerts and recording, as well as support for secure streaming protocols to protect data integrity. Its sleek, compact design allows for discreet installation, making it suitable for a variety of surveillance settings without drawing unwanted attention.

Users can easily manage and configure the SNC-B5399P through a user-friendly interface, accessible via web browsers or dedicated software, providing flexibility in monitoring and maintaining surveillance systems. Overall, the Samsung SNC-B5399P is a robust solution for those seeking reliable, high-quality video surveillance with cutting-edge features tailored to meet diverse security needs.