The "Library", below, refers to any such software library or work which has been distributed under these terms. A "work based on the Library" means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term "modification".)

"Source code" for a work means the preferred form of the work for making modifications to it. For a library, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the library.

Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running a program using the Library is not restricted, and output from such a program is covered only if its contents constitute a work based on the Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does.

1.You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this License along with the Library.

You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.

2.You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:

*a) The modified work must itself be a software library.

*b) You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change.

*c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License.

*d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful.

(For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.)

These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.

Page 76
Image 76
ZyXEL Communications IPC-3605N manual

IPC-3605N specifications

ZyXEL Communications has established itself as a leader in the networking and communication technology industry, and one of its noteworthy products is the IPC-3605N. This network camera is designed for both home and business surveillance, offering a reliable and high-quality solution for security needs.

The IPC-3605N features a 2-megapixel image sensor capable of capturing crystal-clear video at 1080p resolution. This high-definition recording ensures that the finer details are not lost, which is crucial for identification in security scenarios. With a wide viewing angle provided by its fixed lens, the camera can cover larger areas with fewer units required, making it an efficient choice for comprehensive surveillance coverage.

One of the key features of the IPC-3605N is its night vision capabilities. Equipped with infrared LEDs, this camera can provide clear images in low-light conditions, allowing for 24/7 monitoring. The smart IR technology automatically adjusts the LED intensity based on the distance of objects, preventing overexposure and ensuring that video quality remains high even in total darkness.

Connectivity is another strong suit of the IPC-3605N. It supports multiple network protocols, including Ethernet and Wi-Fi, making installation flexible and straightforward. Users can choose either a wired connection for stability or a wireless setup for convenience without the hassle of cabling.

Moreover, the IPC-3605N comes with built-in motion detection technology. This feature sends real-time alerts to users whenever motion is detected within its field of view. This immediate notification system helps users to respond swiftly in case of any suspicious activities. The camera's ability to store footage locally or to a cloud service provides further flexibility for data management and retrieval.

In terms of construction, the IPC-3605N is designed to withstand various environmental conditions, making it suitable for both indoor and outdoor installations. Its robust housing ensures durability and protection against dust and water, rated IP66, ideal for outdoor surveillance applications.

Lastly, the IPC-3605N is user-friendly, with an intuitive mobile app that allows users to access real-time footage, manage settings, and review recorded clips easily. This ensures total control and visibility, making it a valuable asset for anyone looking to enhance their security measures.