ZyXEL Communications IPC-3605N manual Conveying Verbatim Copies

Models: IPC-3605N

1 91
Download 91 pages 30.7 Kb
Page 85
Image 85

4. Conveying Verbatim Copies.

You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any non-permissive terms added in accord with section 7 apply to the code; keep intact all notices of the absence of any warranty; and give all recipients a copy of this License along with the Program.

You may charge any price or no price for each copy that you convey, and you may offer support or warranty protection for a fee.

5. Conveying Modified Source Versions.

You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions:

a) The work must carry prominent notices stating that you modified it, and giving a relevant date.

b) The work must carry prominent notices stating that it is released under this License and any conditions added under section 7. This requirement modifies the requirement in section 4 to “keep intact all notices”.

c) You must license the entire work, as a whole, under this License to anyone who comes into possession of a copy. This License will therefore apply, along with any applicable section 7 additional terms, to the whole of the work, and all its parts, regardless of how they are packaged. This License gives no permission to license the work in any other way, but it does not invalidate such permission if you have separately received it.

d) If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the Program has interactive interfaces that do not display Appropriate Legal Notices, your work need not make them do so.

A compilation of a covered work with other separate and independent works, which are not by their nature extensions of the covered work, and which are not combined with it such as to form a larger program, in or on a volume of a storage or distribution medium, is called an “aggregate” if the compilation and its resulting copyright are not used to limit the access or legal rights of the compilation's users beyond what the individual works permit. Inclusion of a covered work in an aggregate does not cause this License to apply to the other parts of the aggregate.

6. Conveying Non-Source Forms.

You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways:

a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange.

b) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by a written offer, valid for at least three years and valid for as long as you offer spare parts or customer support for that product model, to give anyone who possesses the object code either (1) a copy of the Corresponding Source for all the software in the product that is covered by this License, on a durable physical medium customarily used for software interchange, for a price no more than your reasonable cost of physically performing this conveying of source, or (2) access to copy the Corresponding Source from a network server at no charge.

Page 85
Image 85
ZyXEL Communications IPC-3605N manual Conveying Verbatim Copies

IPC-3605N specifications

ZyXEL Communications has established itself as a leader in the networking and communication technology industry, and one of its noteworthy products is the IPC-3605N. This network camera is designed for both home and business surveillance, offering a reliable and high-quality solution for security needs.

The IPC-3605N features a 2-megapixel image sensor capable of capturing crystal-clear video at 1080p resolution. This high-definition recording ensures that the finer details are not lost, which is crucial for identification in security scenarios. With a wide viewing angle provided by its fixed lens, the camera can cover larger areas with fewer units required, making it an efficient choice for comprehensive surveillance coverage.

One of the key features of the IPC-3605N is its night vision capabilities. Equipped with infrared LEDs, this camera can provide clear images in low-light conditions, allowing for 24/7 monitoring. The smart IR technology automatically adjusts the LED intensity based on the distance of objects, preventing overexposure and ensuring that video quality remains high even in total darkness.

Connectivity is another strong suit of the IPC-3605N. It supports multiple network protocols, including Ethernet and Wi-Fi, making installation flexible and straightforward. Users can choose either a wired connection for stability or a wireless setup for convenience without the hassle of cabling.

Moreover, the IPC-3605N comes with built-in motion detection technology. This feature sends real-time alerts to users whenever motion is detected within its field of view. This immediate notification system helps users to respond swiftly in case of any suspicious activities. The camera's ability to store footage locally or to a cloud service provides further flexibility for data management and retrieval.

In terms of construction, the IPC-3605N is designed to withstand various environmental conditions, making it suitable for both indoor and outdoor installations. Its robust housing ensures durability and protection against dust and water, rated IP66, ideal for outdoor surveillance applications.

Lastly, the IPC-3605N is user-friendly, with an intuitive mobile app that allows users to access real-time footage, manage settings, and review recorded clips easily. This ensures total control and visibility, making it a valuable asset for anyone looking to enhance their security measures.