The “System Libraries” of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable use of the work with that Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form. A “Major Component”, in this context, means a major essential component (kernel, window system, and so on) of the specific operating system (if any) on which the executable work runs, or a compiler used to produce the work, or an object code interpreter used to run it.

The “Corresponding Source” for a work in object code form means all the source code needed to generate, install, and (for an executable work) run the object code and to modify the work, including scripts to control those activities. However, it does not include the work's System Libraries, or general-purpose tools or generally available free programs which are used unmodified in performing those activities but which are not part of the work. For example, Corresponding Source includes interface definition files associated with source files for the work, and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require, such as by intimate data communication or control flow between those subprograms and other parts of the work.

The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source.

The Corresponding Source for a work in source code form is that same work.

2. Basic Permissions.

All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, given its content, constitutes a covered work. This License acknowledges your rights of fair use or other equivalent, as provided by copyright law.

You may make, run and propagate covered works that you do not convey, without conditions so long as your license otherwise remains in force. You may convey covered works to others for the sole purpose of having them make modifications exclusively for you, or provide you with facilities for running those works, provided that you comply with the terms of this License in conveying all material for which you do not control copyright. Those thus making or running the covered works for you must do so exclusively on your behalf, under your direction and control, on terms that prohibit them from making any copies of your copyrighted material outside their relationship with you.

Conveying under any other circumstances is permitted solely under the conditions stated below. Sublicensing is not allowed; section 10 makes it unnecessary.

3. Protecting Users' Legal Rights From Anti-Circumvention Law.

No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under article 11 of the WIPO copyright treaty adopted on 20 December 1996, or similar laws prohibiting or restricting circumvention of such measures.

When you convey a covered work, you waive any legal power to forbid circumvention of technological measures to the extent such circumvention is effected by exercising rights under this License with respect to the covered work, and you disclaim any intention to limit operation or modification of the work as a means of enforcing, against the work's users, your or third parties' legal rights to forbid circumvention of technological measures.

Page 84
Image 84
ZyXEL Communications IPC-3605N manual Basic Permissions

IPC-3605N specifications

ZyXEL Communications has established itself as a leader in the networking and communication technology industry, and one of its noteworthy products is the IPC-3605N. This network camera is designed for both home and business surveillance, offering a reliable and high-quality solution for security needs.

The IPC-3605N features a 2-megapixel image sensor capable of capturing crystal-clear video at 1080p resolution. This high-definition recording ensures that the finer details are not lost, which is crucial for identification in security scenarios. With a wide viewing angle provided by its fixed lens, the camera can cover larger areas with fewer units required, making it an efficient choice for comprehensive surveillance coverage.

One of the key features of the IPC-3605N is its night vision capabilities. Equipped with infrared LEDs, this camera can provide clear images in low-light conditions, allowing for 24/7 monitoring. The smart IR technology automatically adjusts the LED intensity based on the distance of objects, preventing overexposure and ensuring that video quality remains high even in total darkness.

Connectivity is another strong suit of the IPC-3605N. It supports multiple network protocols, including Ethernet and Wi-Fi, making installation flexible and straightforward. Users can choose either a wired connection for stability or a wireless setup for convenience without the hassle of cabling.

Moreover, the IPC-3605N comes with built-in motion detection technology. This feature sends real-time alerts to users whenever motion is detected within its field of view. This immediate notification system helps users to respond swiftly in case of any suspicious activities. The camera's ability to store footage locally or to a cloud service provides further flexibility for data management and retrieval.

In terms of construction, the IPC-3605N is designed to withstand various environmental conditions, making it suitable for both indoor and outdoor installations. Its robust housing ensures durability and protection against dust and water, rated IP66, ideal for outdoor surveillance applications.

Lastly, the IPC-3605N is user-friendly, with an intuitive mobile app that allows users to access real-time footage, manage settings, and review recorded clips easily. This ensures total control and visibility, making it a valuable asset for anyone looking to enhance their security measures.