This user manual provides instructions for using the IMS200 Surveillance System software, which allows for multi-user, multi-window viewing and control of surveillance cameras. The manual covers installing the software, logging in, navigating the main interface and its various screens and menus, and describes the core system functions like live monitoring, playback, alarms, PTZ control, and system settings. Proper use of this surveillance software requires reviewing this manual before operation.
This document provides a user manual for a central monitoring software. It describes the software's menu structure and functions for monitoring, playback, system settings, user accounts and more. Key features include multi-level user management, support for adding and configuring surveillance devices, remote monitoring over networks, map-based monitoring, alarm management and video recording capabilities. The manual provides installation instructions and explains how to operate the various modules and configure system and device settings.
The document provides an overview of managing operating system images using SMS 2003 and its Operating System Deployment Feature Pack. It discusses capturing operating system images, creating image packages, deploying images to target computers, and comparing SMS 2003's Automated Deployment Services, Remote Installation Services, and Operating System Deployment features. Key points covered include imaging formats, deployment scenarios, client requirements, and log files for troubleshooting deployments.
The MS Excel XLSX Recovery software from SysInfoTools helps users fix corrupt spreadsheets of Microsoft Excel. The software is an ideal solution to repair highly corrupted Xlsx files and recover maximum possible data from them. It successfully restores all the file objects such as: cells, ranges, sheets, workbooks, tables, charts, formulas, hyperlinks, etc. from corrupt spreadsheet files. It supports batch recovery of corrupt Xlsx files which saves users' precious time. It generates a new Xlsx file and saves all the recovered data into it. The new Xlsx file can be saved at user-defined location.
OpenOffice Base Repair Software of SysInfoTools is an efficient data recovery tool to repair corrupt database files of OpenOffice and recover maximum recoverable data from them. The software helps users recover unreadable data from corrupt ODB files and save them to a new database file at user defined location. This is an easy-to-use application for both technical and non-technical users. No requirement for having any extra technical knowledge.
This document provides a user guide for computer setup. It describes how to start Computer Setup by pressing F10 during boot, and how to navigate and select options within Computer Setup using keyboard controls. It outlines the main menus in Computer Setup including File, Security, Diagnostics, and System Configuration. It provides information on restoring factory default settings and explains some of the key configuration options available under each menu.
The OpenOffice Impress Repair Software from SysInfoTools repairs corrupt ODP files and recovers maximum possible data from them. The software efficiently restores various file objects like images, tables, slides, formatting, master slides, Unicode characters, hyperlinks, image objects, embedded images, animations, etc. from corrupt ODP files. It resolves all the corruption errors from ODP files and make them operable. The software highly supports all versions of OpenOffice program and Windows operating systems.
Get the most out of Windows Intune.
This document is designed to help you evaluate the main features of Windows Intune and set up your new Windows Intune environment. To facilitate this process, this document uses an example configuration for a business called Adatum. Throughout this paper, you will see screenshots taken from this environment that illustrate how you can similarly configure your Windows Intune environment. Subsequently, you can implement the documented steps to create and customize your environment to meet your own business needs.
This document provides a user manual for a central monitoring software. It describes the software's menu structure and functions for monitoring, playback, system settings, user accounts and more. Key features include multi-level user management, support for adding and configuring surveillance devices, remote monitoring over networks, map-based monitoring, alarm management and video recording capabilities. The manual provides installation instructions and explains how to operate the various modules and configure system and device settings.
The document provides an overview of managing operating system images using SMS 2003 and its Operating System Deployment Feature Pack. It discusses capturing operating system images, creating image packages, deploying images to target computers, and comparing SMS 2003's Automated Deployment Services, Remote Installation Services, and Operating System Deployment features. Key points covered include imaging formats, deployment scenarios, client requirements, and log files for troubleshooting deployments.
The MS Excel XLSX Recovery software from SysInfoTools helps users fix corrupt spreadsheets of Microsoft Excel. The software is an ideal solution to repair highly corrupted Xlsx files and recover maximum possible data from them. It successfully restores all the file objects such as: cells, ranges, sheets, workbooks, tables, charts, formulas, hyperlinks, etc. from corrupt spreadsheet files. It supports batch recovery of corrupt Xlsx files which saves users' precious time. It generates a new Xlsx file and saves all the recovered data into it. The new Xlsx file can be saved at user-defined location.
OpenOffice Base Repair Software of SysInfoTools is an efficient data recovery tool to repair corrupt database files of OpenOffice and recover maximum recoverable data from them. The software helps users recover unreadable data from corrupt ODB files and save them to a new database file at user defined location. This is an easy-to-use application for both technical and non-technical users. No requirement for having any extra technical knowledge.
This document provides a user guide for computer setup. It describes how to start Computer Setup by pressing F10 during boot, and how to navigate and select options within Computer Setup using keyboard controls. It outlines the main menus in Computer Setup including File, Security, Diagnostics, and System Configuration. It provides information on restoring factory default settings and explains some of the key configuration options available under each menu.
The OpenOffice Impress Repair Software from SysInfoTools repairs corrupt ODP files and recovers maximum possible data from them. The software efficiently restores various file objects like images, tables, slides, formatting, master slides, Unicode characters, hyperlinks, image objects, embedded images, animations, etc. from corrupt ODP files. It resolves all the corruption errors from ODP files and make them operable. The software highly supports all versions of OpenOffice program and Windows operating systems.
Get the most out of Windows Intune.
This document is designed to help you evaluate the main features of Windows Intune and set up your new Windows Intune environment. To facilitate this process, this document uses an example configuration for a business called Adatum. Throughout this paper, you will see screenshots taken from this environment that illustrate how you can similarly configure your Windows Intune environment. Subsequently, you can implement the documented steps to create and customize your environment to meet your own business needs.
Introduction To computer (discovery of computer)Athar Mutahari
This document discusses operating systems and embedded operating systems. It provides details about various desktop operating systems like Windows, Mac OS X, UNIX/Linux. It also discusses network operating systems for servers and embedded operating systems used in devices like smartphones, PDAs and others. Key topics covered include functions of operating systems, booting process, memory management, scheduling jobs, Windows versions comparison, features of Windows Vista, Mac OS X and Linux operating systems. Embedded operating systems discussed include Windows Embedded CE, Palm OS, Blackberry OS, Embedded Linux and Symbian OS.
This document provides recommendations for configuring Windows and NComputing products to optimize performance and compatibility in a multi-user virtual desktop environment. It includes tweaks to Windows settings related to compatibility, performance, SMB traffic optimization, and scheduled reboots. It also includes recommendations for NComputing software installation, device registration, firmware updates, session limits, and console settings.
This document provides a user manual for the DUALEM Log software. It describes how to install the software, set up data acquisition from DUALEM sensors and GPS devices, view and log data in real-time, download data from DUALEM sensors to the computer, and understand the status lights. The software allows users to collect electromagnetic data from DUALEM sensors along with GPS data, view readings and positioning live, and transfer files for processing.
OpenOffice Calc Recovery Software from SysInfoTools fixes corrupt spreadsheets aka ODS files and recover maximum recoverable data from them. It effectively recovers unreadable cell data and other object from corrupt ODS files. The software supports batch recovery of corrupted ODS files simultaneously. It allows users to see the preview of recovered files before saving them into a new ODS file. The new ODS file can be saved at user defined location. The software is available with free demo version, which helps users examine its performance before buying its full version.
The document provides instructions for installing and using the Lenten Reborn Card, which allows multiple operating systems to be installed on a single computer and enables system restoration. It describes four installation methods: Express Installation to instantly restore Windows; Keep C Only to preserve the Windows C drive; Custom Installation for advanced users to partition the disk; and SNCOPY to clone partitions and deploy software across networks. The document provides step-by-step guides for each installation method and explains the card's features and settings.
1. The document discusses various methods for escalating privileges on Windows systems, including replacing executable files launched by Winlogon to gain NT Authority privileges before user privileges are limited.
2. Common programs launched by Winlogon that can be replaced include Sticky Keys, Magnify, and Ease of Access located in the Windows/System32 folder. Replacing these files allows launching cmd.exe with elevated privileges.
3. To perform privilege escalation, one must boot from a live system like Linux or Hiren's Boot CD to mount the target system's hard drive and replace executable files before rebooting.
This document provides an overview of the Standalone Solutions Configuration Tool (SSCT) software. It discusses the purpose and features of SSCT, including that it is designed to help IBM sales and partners configure server and rack solutions. It also covers how to install and use SSCT, such as navigating between the configuration wizard, shopping cart, and quote views. Key points covered include that SSCT allows configuring individual servers or complex rack solutions, supports exporting configurations, and regularly updates pricing information.
SysInfoTools OpenOffice Draw Recovery Software helps users repair their corrupt ODG files of OpenOffice Draw. It enables users to recover all types of graphics, images, logos and diagrams from corrupt ODG files. Users can see the preview of recovered data before saving them. The software is very easy-to-use since it contains a friendly and intuitive user interface. Any technical and non-technical users can use it.
MS Word DOTM Recovery software is an advanced solution from SysInfoTools for recovering data from corrupt .dotm files of MS Word 2007 and its later versions. The software is highly proficient to repair severely corrupted .dotm files and restore their data into new files. It fixes all the corruption errors without causing any damage or changes to the integrity of .dotm files. The software contains highly advanced features along with an interactive GUI for both technical and non-technical users.
Khung gầm chắc chắn, trọng lượng nhẹ
Hiệu năng ấn tượng so với đối thủ cùng phân khúc
Màn hình có độ sáng và sắc nét cao
Thời lượng pin cao (trên phiên bản FullHD)
Âm thanh tốt, loa và bass ấn tượng
Nguồn: https://laptops.vn/san-pham/hp-envy-13-2021/
The Q-Flash utility allows you to update the system BIOS without having to boot into Windows or other operating systems first. The utility is embedded directly into the BIOS. Updating the BIOS using Q-Flash involves downloading the latest BIOS file from the motherboard manufacturer's website, saving it to a USB drive or floppy disk, then selecting the Q-Flash option during POST to begin the BIOS update process from the saved file. The on-screen instructions guide the user through selecting the file and initiating the update.
This document provides instructions for installing and using the HP Storage Manager utility to configure and manage RAID configurations on HP SATA RAID controllers. It describes how to install HP Storage Manager on Windows, Linux and NetWare operating systems. It also explains how to log in to systems, create logical drives, and set up remote monitoring to receive notifications about events on managed systems.
The document is a user manual for the Reborn Plus Card. It describes the card's hardware requirements and provides instructions for four installation methods - Express Installation, Keep C Only, Custom Installation, and SNCOPY. Express Installation allows instant restoration of Windows systems while preserving all data. Keep C Only keeps data on the C drive partition only. Custom Installation supports multi-booting of many systems but erases all data. SNCOPY enables imaging, software deployment and remote management across a network.
This document provides step-by-step instructions for setting up a virtual client/server network, including installing and configuring Windows XP on two client machines, and Windows Server 2003 on a server machine. It outlines 27 steps to install Windows XP on each client, assigning them IP addresses, and 13 steps to install Windows Server 2003 on the server. The network will then be configured by setting up Active Directory on the server and DHCP for network addressing.
Chromium OS - User Accounts and ManagementPicker Weng
The Chromium OS device includes many configurations such as network, whitelist, bookmark, themes, and etc. We can simply distinguish these settings between system settings and user preference. In general, every user would like to have own configuration. This means user can define their theme, network configuration, and etc. But user’s data is always stored in the cloud server in the cloud-based device so that we have to sync these data down to device from web. For this reason, the Chromium OS device should know that which user is logging in to device, and then sync his data down to. Therefore, Google’s Chromium OS team develops some mechanism to manage user accounts and settings.
Mac OS X Snow Leopard & Informix IDS 11.5 + PHP5Antonio Musarra
The undersigned, as thousands of others who work in IT, Apple has made a vow to his consecration as inseparable companion work, I am referring especially to Mac OS X. My MacBook Pro and before that my PowerBook G4 and I will stop here, have been and are still with me, not only for writing documentation, read and send email, but above all when it comes to creating software.
This document provides instructions for rapidly deploying an Oracle Hyperion Enterprise Performance Management System planning domain for development environments. It outlines the deployment requirements, three step deployment process, and detailed instructions for each step. The steps include: 1) Downloading installation files from Oracle including the Oracle 11g database and Hyperion system files. 2) Installing and configuring the Oracle 11g database. 3) Installing and configuring the Hyperion EPM system including planning, financial reporting, and other modules. The entire process takes approximately three hours to complete.
This document provides release notes for Intel Turbo Memory version 1.5.0.1013. It describes supported operating systems and hardware, behavioral considerations, feature sets, issues fixed and known issues in this release. The document provides guidance on power policies, resume time measurement, ReadyBoost status, NVCACHE drive initialization, and upgrading or replacing Intel Turbo Memory.
Guide To Windows 7 - Installing Windows 7Gene Carboni
Chapter 2 illustrates how to install Windows 7. Viewers will learn about the deployment enhancements in Windows 7. In addition, Chapter 2 describes the use of Windows Easy Transfer. It explains how to use and manage Windows Imaging Format image files.
This document discusses rejecting tailgates with part number 39818078 due to paint problems at the DSV Gent location. It also mentions another part, 39818087, but provides no other context about it.
El documento presenta varias teorías históricas sobre el envejecimiento. Describe la teoría del desgaste de órganos y tejidos, la cual plantea que el desgaste es consecuencia del uso prolongado de los órganos y tejidos. También explica la teoría de la intoxicación por sustancias intrínsecas, la cual señala que el envejecimiento resulta de la acumulación de productos de desecho metabólico. Finalmente, resume la teoría del trastorno glandular, la cual considera a los órganos
Introduction To computer (discovery of computer)Athar Mutahari
This document discusses operating systems and embedded operating systems. It provides details about various desktop operating systems like Windows, Mac OS X, UNIX/Linux. It also discusses network operating systems for servers and embedded operating systems used in devices like smartphones, PDAs and others. Key topics covered include functions of operating systems, booting process, memory management, scheduling jobs, Windows versions comparison, features of Windows Vista, Mac OS X and Linux operating systems. Embedded operating systems discussed include Windows Embedded CE, Palm OS, Blackberry OS, Embedded Linux and Symbian OS.
This document provides recommendations for configuring Windows and NComputing products to optimize performance and compatibility in a multi-user virtual desktop environment. It includes tweaks to Windows settings related to compatibility, performance, SMB traffic optimization, and scheduled reboots. It also includes recommendations for NComputing software installation, device registration, firmware updates, session limits, and console settings.
This document provides a user manual for the DUALEM Log software. It describes how to install the software, set up data acquisition from DUALEM sensors and GPS devices, view and log data in real-time, download data from DUALEM sensors to the computer, and understand the status lights. The software allows users to collect electromagnetic data from DUALEM sensors along with GPS data, view readings and positioning live, and transfer files for processing.
OpenOffice Calc Recovery Software from SysInfoTools fixes corrupt spreadsheets aka ODS files and recover maximum recoverable data from them. It effectively recovers unreadable cell data and other object from corrupt ODS files. The software supports batch recovery of corrupted ODS files simultaneously. It allows users to see the preview of recovered files before saving them into a new ODS file. The new ODS file can be saved at user defined location. The software is available with free demo version, which helps users examine its performance before buying its full version.
The document provides instructions for installing and using the Lenten Reborn Card, which allows multiple operating systems to be installed on a single computer and enables system restoration. It describes four installation methods: Express Installation to instantly restore Windows; Keep C Only to preserve the Windows C drive; Custom Installation for advanced users to partition the disk; and SNCOPY to clone partitions and deploy software across networks. The document provides step-by-step guides for each installation method and explains the card's features and settings.
1. The document discusses various methods for escalating privileges on Windows systems, including replacing executable files launched by Winlogon to gain NT Authority privileges before user privileges are limited.
2. Common programs launched by Winlogon that can be replaced include Sticky Keys, Magnify, and Ease of Access located in the Windows/System32 folder. Replacing these files allows launching cmd.exe with elevated privileges.
3. To perform privilege escalation, one must boot from a live system like Linux or Hiren's Boot CD to mount the target system's hard drive and replace executable files before rebooting.
This document provides an overview of the Standalone Solutions Configuration Tool (SSCT) software. It discusses the purpose and features of SSCT, including that it is designed to help IBM sales and partners configure server and rack solutions. It also covers how to install and use SSCT, such as navigating between the configuration wizard, shopping cart, and quote views. Key points covered include that SSCT allows configuring individual servers or complex rack solutions, supports exporting configurations, and regularly updates pricing information.
SysInfoTools OpenOffice Draw Recovery Software helps users repair their corrupt ODG files of OpenOffice Draw. It enables users to recover all types of graphics, images, logos and diagrams from corrupt ODG files. Users can see the preview of recovered data before saving them. The software is very easy-to-use since it contains a friendly and intuitive user interface. Any technical and non-technical users can use it.
MS Word DOTM Recovery software is an advanced solution from SysInfoTools for recovering data from corrupt .dotm files of MS Word 2007 and its later versions. The software is highly proficient to repair severely corrupted .dotm files and restore their data into new files. It fixes all the corruption errors without causing any damage or changes to the integrity of .dotm files. The software contains highly advanced features along with an interactive GUI for both technical and non-technical users.
Khung gầm chắc chắn, trọng lượng nhẹ
Hiệu năng ấn tượng so với đối thủ cùng phân khúc
Màn hình có độ sáng và sắc nét cao
Thời lượng pin cao (trên phiên bản FullHD)
Âm thanh tốt, loa và bass ấn tượng
Nguồn: https://laptops.vn/san-pham/hp-envy-13-2021/
The Q-Flash utility allows you to update the system BIOS without having to boot into Windows or other operating systems first. The utility is embedded directly into the BIOS. Updating the BIOS using Q-Flash involves downloading the latest BIOS file from the motherboard manufacturer's website, saving it to a USB drive or floppy disk, then selecting the Q-Flash option during POST to begin the BIOS update process from the saved file. The on-screen instructions guide the user through selecting the file and initiating the update.
This document provides instructions for installing and using the HP Storage Manager utility to configure and manage RAID configurations on HP SATA RAID controllers. It describes how to install HP Storage Manager on Windows, Linux and NetWare operating systems. It also explains how to log in to systems, create logical drives, and set up remote monitoring to receive notifications about events on managed systems.
The document is a user manual for the Reborn Plus Card. It describes the card's hardware requirements and provides instructions for four installation methods - Express Installation, Keep C Only, Custom Installation, and SNCOPY. Express Installation allows instant restoration of Windows systems while preserving all data. Keep C Only keeps data on the C drive partition only. Custom Installation supports multi-booting of many systems but erases all data. SNCOPY enables imaging, software deployment and remote management across a network.
This document provides step-by-step instructions for setting up a virtual client/server network, including installing and configuring Windows XP on two client machines, and Windows Server 2003 on a server machine. It outlines 27 steps to install Windows XP on each client, assigning them IP addresses, and 13 steps to install Windows Server 2003 on the server. The network will then be configured by setting up Active Directory on the server and DHCP for network addressing.
Chromium OS - User Accounts and ManagementPicker Weng
The Chromium OS device includes many configurations such as network, whitelist, bookmark, themes, and etc. We can simply distinguish these settings between system settings and user preference. In general, every user would like to have own configuration. This means user can define their theme, network configuration, and etc. But user’s data is always stored in the cloud server in the cloud-based device so that we have to sync these data down to device from web. For this reason, the Chromium OS device should know that which user is logging in to device, and then sync his data down to. Therefore, Google’s Chromium OS team develops some mechanism to manage user accounts and settings.
Mac OS X Snow Leopard & Informix IDS 11.5 + PHP5Antonio Musarra
The undersigned, as thousands of others who work in IT, Apple has made a vow to his consecration as inseparable companion work, I am referring especially to Mac OS X. My MacBook Pro and before that my PowerBook G4 and I will stop here, have been and are still with me, not only for writing documentation, read and send email, but above all when it comes to creating software.
This document provides instructions for rapidly deploying an Oracle Hyperion Enterprise Performance Management System planning domain for development environments. It outlines the deployment requirements, three step deployment process, and detailed instructions for each step. The steps include: 1) Downloading installation files from Oracle including the Oracle 11g database and Hyperion system files. 2) Installing and configuring the Oracle 11g database. 3) Installing and configuring the Hyperion EPM system including planning, financial reporting, and other modules. The entire process takes approximately three hours to complete.
This document provides release notes for Intel Turbo Memory version 1.5.0.1013. It describes supported operating systems and hardware, behavioral considerations, feature sets, issues fixed and known issues in this release. The document provides guidance on power policies, resume time measurement, ReadyBoost status, NVCACHE drive initialization, and upgrading or replacing Intel Turbo Memory.
Guide To Windows 7 - Installing Windows 7Gene Carboni
Chapter 2 illustrates how to install Windows 7. Viewers will learn about the deployment enhancements in Windows 7. In addition, Chapter 2 describes the use of Windows Easy Transfer. It explains how to use and manage Windows Imaging Format image files.
This document discusses rejecting tailgates with part number 39818078 due to paint problems at the DSV Gent location. It also mentions another part, 39818087, but provides no other context about it.
El documento presenta varias teorías históricas sobre el envejecimiento. Describe la teoría del desgaste de órganos y tejidos, la cual plantea que el desgaste es consecuencia del uso prolongado de los órganos y tejidos. También explica la teoría de la intoxicación por sustancias intrínsecas, la cual señala que el envejecimiento resulta de la acumulación de productos de desecho metabólico. Finalmente, resume la teoría del trastorno glandular, la cual considera a los órganos
Solavei gives its members unlimited talk, text and data on a 4G nationwide network. They pay members for sharing mobile service with others. Free Video reveals how.
This is a ppt. on Indian Automobile Industry by Nithish Krishnan, who is an Automobile Expert/Advisor in cartoq.com... From this ppt., you will be able to know the history, current situation, entry of foreign brands, informations about the internationally acclaimed FIAT multijet engine which is being called as "The National Engine of India" & about SIAM (Society of Indian Auto Manufacturers). Also, it contains more info about Maruti Suzuki, Hyundai Motors & Tata Motors...
This document provides an overview of the history and types of books. It discusses that the first book was created in Egypt in 2400 BC using papyrus. Later, books made of paper emerged after the Chinese invented paper making from bamboo in the 200s BC. The types of books mentioned include novels, magazines, dictionaries, comics, encyclopedias, and sacred texts.
The Master of Agribusiness (MAB) program at Texas A&M University provides a professionally focused degree combining courses from the Department of Agricultural Economics and Mays Business School. The program emphasizes applying economic and quantitative analysis to strategic decision making in agribusiness. Potential career fields include financial analysis, supply chain management, and policy. The MAB program aims to build students' skills in business and economics as they relate to the food and agriculture system and enhance their ability to understand and lead in the dynamic global agribusiness industry. Graduates have high rates of placement within three months in companies such as H-E-B, John Deere, and Sysco.
This document outlines the standard operating procedure for processing returns at a distribution center. It involves verifying the delivery order details, checking for any damage or discrepancies, unloading and counting return items, documenting any issues, and resealing the truck. Key steps include comparing the delivery order to the outlet code, inspecting return seals and items for damage, taking photos as needed, signing summary documents, and completing any discrepancy reports within 24 hours. Referenced pages provide more details on specific parts of the return process.
The document provides an overview of the Master of Agribusiness program at Texas A&M University. The MAB is a 39 credit hour professional degree program offered jointly by the Department of Agricultural Economics and Mays Business School. The program emphasizes applying economic analysis and quantitative methods to strategic decision making in food and agribusiness. Graduates have a high placement rate in careers in areas such as supply chain management, risk management, and policy. The MAB program helps students build skills in business and economics analysis focused on agribusiness and enhances abilities to understand and adapt to changing global agribusiness trends.
indian dental association and dental council of india Submitted by – Dr.Risha...rishisarkar
The Indian Dental Association (IDA) was formed in 1949 to promote and advance dental science in India. It aims to improve public health and dental education. The IDA represents dentists, oversees their registration, and protects against unethical practitioners. It is managed by local, state, and central councils. The Dental Council of India (DCI) regulates dental education standards, registers dentists, and eliminates quacks. Both organizations work to uphold ethics, advance the profession, and ensure quality dental care for all Indians.
Sesion 01 analisis del video “sociedad del conocimiento”aviquese
Este documento presenta un análisis del video "Sociedad del Conocimiento" realizado por los alumnos Genaro Avila Quezada y Lester Vigo Rivera para la especialidad de Tecnología Informática Educativa en la Facultad de Ciencias Históricos Sociales y Educación de la Universidad Nacional Pedro Ruiz Gallo. El análisis incluye respuestas a preguntas sobre conceptos clave relacionados a la sociedad del conocimiento como el tiempo, el capital, el trabajo, los bits, y la importancia del conocimiento en la era digital.
The document provides information about WECON's remote access system for HMIs, including its Smart App and Cloud platform. The key points are:
1) The WECON remote access system allows users to remotely access HMIs through a network using just one cable, without complex network settings.
2) The Smart App allows users to register accounts, add devices, purchase remote access packages, and remotely view and manage devices.
3) The Cloud platform provides similar remote access and device management functions for both individual users and agencies managing multiple users.
The document provides instructions for setting up and using a VIVOTEK network camera test lab. It includes chapters on preparation, installation, using the Installation Wizard 2 software, camera configuration, and using the ST7501 client/server software. Some key points:
- Chapter 1 discusses necessary lab components and how to connect the camera.
- Chapter 2 covers installing the Installation Wizard 2 and ST7501 software, including selecting installation directories and options.
- Chapter 3 describes the Installation Wizard 2 user interface and how it analyzes the network environment.
- Chapter 4 provides steps for configuring camera cropping through the viewing window page to define the region of interest and output frame size.
1. The document provides step-by-step instructions for configuring a point-to-point unframed TDMoIP connection between a Gmux-2000 unit and an IPmux-14(1) unit.
2. Key steps include loading the hardware configuration on the Gmux, setting the host IP and management parameters, configuring the E1 port and associated bundle, and establishing the connection between the bundles on the two units.
3. Rate limiting is applied on the connecting switch port between the IPmux and Gmux to simulate a network impairment that must be considered in the bundle configuration.
This document provides a user manual for WatchPower management software. It allows monitoring of SP Efecto, SP Brilliant (Plus), and SP Initial devices via serial ports. The manual covers installing and uninstalling the software, using the tray application for configuration, upgrades, and SNMP management. It also describes the graphical user interface for configuration, device control, viewing data, user authentication, and help functions.
This document provides a user manual for the EN5030 TYPE locker lock. It begins with an overview of the lock's features such as anti-pry functionality, encrypted smart cards as keys, and battery power. It then covers installation instructions, software for management and records, and making various cards like setup cards, key cards, and data cards to operate the locks. Technical specifications of the lock and cards are also listed. The manual provides step-by-step guidance on initial lock setup, user management, and ongoing operations.
Outdoor LED Billboard IPC --- function introductionMax Dan
One:WiFi/ X86 computer architecture, wireless way for the Bluetooth /3G (similar to Internet cafes in the wired way to change the way)
Two: IPC LED hardware appearance and profile (detailed internal structure and operating instructions see IPC LED manual)
Contact:
Rettar Du
General Manager
Ocolour Technologies Co., Limited
Tel: +86-755-2691 5212
Fax: +86-755-6160 5212
Web: www.ocolour.com
Email/Skype: info@ocolour.com
Mob/Whatsapp: +86-186 6458 8467
Add: Huamei Rd., Songgang Ave.,
Songgang Town, Bao’an District, Shenzhen, China
The document is a user manual for an Access Control & Time Attendance Management System. It contains 10 chapters that describe:
1) The software installation process and requirements
2) An overview of the system's functional properties and main sub-systems
3) Instructions for user management, attendance management, device management, and system maintenance features.
4) Details on setting up departments, registering and managing users, connecting devices, and generating various reports.
The document provides step-by-step instructions for installing SQL Server 2008 and managing databases. It details downloading and installing SQL Server Management Studio, setting up a new instance called SQLEXPRESS, restoring a database backup, connecting to databases, and making a new database backup. The instructions are accompanied by screenshots to illustrate each step of the process.
01 Internet Gateway IGW500 Series Quick Configuration Guide 20221026.pdfJorge Gonzales
The document provides instructions for upgrading firmware on an IGW500 internet gateway and associated access points (APs). It describes two scenarios for upgrading the IGW500 firmware: 1) upgrading older versions which requires upgrading the system image, web image, and package, followed by a factory reset, and 2) upgrading newer versions which only requires upgrading the package file. It also provides steps for importing AP firmware images, and manually or automatically upgrading APs when they are online. The document aims to help users quickly set up and provision wireless services on the IGW500 gateway.
The document provides information about the ABC Solution, an integrated mainframe application that satisfies business processing requirements online and in real-time. It maintains complete client records, supports various billing methods, enables customization, uses current technology, and provides a secure system with help functions. Function keys, user-programmable hot keys, and various help features are described to assist users in navigating the system.
This document summarizes the analysis of Windows event log files. It discusses how to view event logs using the Event Viewer and export logs. It also describes using log parsing tools like Log Parser Lizard and Log Parser 2.2 to query error, warning and other event types from system logs. Specific event IDs are analyzed, like DCOM errors, service failures, DNS issues and hard disk errors. Methods to resolve issues causing these events are provided.
The document provides instructions for installing, registering, and updating software for an ADS-1 scanner. It describes downloading the software from the company's website or installing from a CD. The registration process requires connecting the scanner, entering a registration password, and configuring files. Software updates similarly require connecting devices, obtaining an update password, and clicking to initiate the update. Troubleshooting tips are provided for issues connecting devices.
IBM Data Studio Health Monitor and IBM Optim Performance Manager are graphical monitoring utilities for IBM DB2. Data Studio Health Monitor provides a simple browser-based monitoring solution that monitors database availability, connections, and free space. Optim Performance Manager provides more extensive end-to-end monitoring of database and application performance across an entire system, identifies potential problems using interactive dashboards, and integrates with other Optim and Tivoli tools. Both tools involve installing a web-based console, adding databases to monitor, and configuring alerts and users.
This document provides an overview and introduction to programming and using the S7-200 Micro PLC system. It describes installing the hardware, programming software, and entering sample programs. Key topics covered include comparing features of different CPU models, installing the CPU and I/O modules, setting up the STEP 7-Micro/WIN software, and programming basics such as ladder logic, data types, and instructions. The document also provides additional reference material on communications, the instruction set, and troubleshooting.
Siemens,
Catalog Thiết Bị Điện Siemens, Catalog Thiết Bị Điện,
Catalog Phụ Kiện Siemens, Catalog Phụ Kiện,
Catalog Siemens, Catalog,
http://dienhathe.com,
Chi tiết các sản phẩm khác của Siemens tại https://dienhathe.com
Xem thêm các Catalog khác của Siemens tại https://dienhathe.info
Để nhận báo giá sản phẩm Siemens vui lòng gọi: 0907.764.966
This document provides an introduction to using STEP 7 software to program SIMATIC S7 programmable logic controllers. It outlines the basic procedure for creating a program using STEP 7, which involves combining hardware configuration with software programming. Practical exercises in subsequent chapters will demonstrate programming in Ladder Logic, Statement List, and Function Block Diagram to address inputs and outputs using basic binary logic operations.
This document provides answers to frequently asked questions about WECON's PI series of industrial touch panel PCs. It covers topics such as available operating systems, included support, the PI Studio software for project development, communication ports, functions like data recording and alarms, differences from the LEVI series, and calibrating touch screens.
The document discusses SQL and common table expressions (CTE). It provides an example of using a CTE to query hierarchical data and print an organization structure tree by recursively joining the CTE to itself. Administrative commands can also be executed through SQL using the ADMIN_CMD stored procedure.
This document provides an overview of operating systems and utility programs. It discusses the types and functions of operating systems, including how they help start up computers, manage memory and programs, connect to networks, and more. It also describes various standalone operating systems like Windows, Mac OS X, Linux, and UNIX. Network operating systems and embedded operating systems are explored as well. Finally, common utility programs are summarized, such as file managers, antivirus software, and firewalls.
1. This document provides instructions for installing and using USB Lock RP Remote Protector v3.9 network security software. It allows administrators to remotely manage and protect USB access across multiple networked computers.
2. The software has two main components - a Control panel installed on one system and Client software installed on other systems to be managed. Detailed steps are provided to install and configure both.
3. The Control panel interface is explained, including options to view statuses, reboot/shutdown clients, uninstall clients, manage USB access permissions, view logs and reports. Administrators can remotely lock down and monitor USB usage across an entire network from a single control center.
Similar to Ims200 surveillance system user manual (20)
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
2. 1 PRECAUTIONS
The contents of this manual may change due to product upgrades or other reasons.
We have the right to make changes of the contents without notice.
This user manual is for reference only, subject to available products. This manual may contain inaccurate data
or printing error. We reserves the right to interpret the details of this manual.
2
3. 2 PERFACE
《 IMS200 Surveillance System User Manual 》 introduces the software features and configuration operation of
IMS200. Please go through this user manual before operating.
Agreements
1.
Symbols:
Index
Meaning
[]
“[]” refers interface, menu and data sheet, e.g. “[Add User] interface”
【】
“【】” refers button, e.g. “click【OK】”
Form 2-1
Introduction: make some complement explanation to the contents.
Warning:prompt the warning in order to avoid damage caused by improper operation.
Note: prompt operation notes in order to avoid data loss and device damage caused by improper operation.
3
4. TABLE OF CONTENTS
1 PRECAUTIONS........................................................................................................................................................2
2 PERFACE..................................................................................................................................................................3
TABLE OF CONTENTS.............................................................................................................................................4
3 INTRODUCTION ....................................................................................................................................................6
3.1 SUMMARY....................................................................................................................................................6
3.2 RUNTIME ENVIRONMENT........................................................................................................................6
4 INSTALLATION.......................................................................................................................................................8
4.1 Windows Operation system............................................................................................................................8
4.2 Mac OS Operation system............................................................................................................................10
5 LOGIN AND INTERFACES...................................................................................................................................12
5.1 LOGIN..........................................................................................................................................................12
5.2 INTERFACE.................................................................................................................................................13
5.3 QUICK GUIDE............................................................................................................................................17
6 FUNCTIONS...........................................................................................................................................................22
6.1 MONITOR....................................................................................................................................................22
6.2 QUERY.........................................................................................................................................................30
6.3 ALARM........................................................................................................................................................41
6.4 PTZ CONTROL...........................................................................................................................................54
6.5 MONITOR PROJECT..................................................................................................................................58
6.6 EMAP...........................................................................................................................................................63
6.7 DEVICE STATE...........................................................................................................................................65
6.8 USE-DEFINED TOOL.................................................................................................................................66
6.9 DEVICE RUNNING....................................................................................................................................66
6.10 UPPER RIGHT ICONS..............................................................................................................................67
6.11 CPU & NETWORK....................................................................................................................................69
6.12 DATE & ALARM & LOG.........................................................................................................................69
7 SYSTEM SETTING................................................................................................................................................70
4
6. 3 INTRODUCTION
3.1 SUMMARY
IMS200 is a professional surveillance system software which support muti-user, multi-window and multilingual
display, voice talk, EMap, alarm and etc. IMS200 is compatible with various access devices. This is a stable,
reliable and easy operation system.
3.2 RUNTIME ENVIRONMENT
Hardware minimum requirements
CPU P4/2.0GHz
Memory 512M
Resolution 1024*768 and ≥128M memory (support DirectX 8.0 and higher grade)
Hard Disk 300M free space
Network transmission 10/100Mbps Ethernet, consistent with TCP/IP or UDP/IP protocal
Software minimum requirements
Operation system: Windows XP SP2, Windows 2000, Windows 2003, Windows Vista, win7 ( run by
“Administrator” in Vista and win7),Mac OS
Graphics drive installed
Introduction: enable “DirectX”, set the “hardware speed up” to ‘high’
6
8. 4 INSTALLATION
4.1 Windows Operation system
1.
Double left click “IMS_200_Client_V1.00.exe” to install this program.
2.
Complete the installation following the guide, see “Diagram 4 -1” to “Diagram 4 -5”
Step1: click “Next (N)”, see “Diagram 4 -1 ”
Diagram 4-1
Step2: click “Next (N)”after select a install path, the default installation path is “C:Program
FilesIMS200”.see”Diagram 4 -2”
8
9. Diagram 4-2
Step3: click “Next (N)”
Diagram 4-3
Step4: install automatically
Diagram 4-4
Step5: click “Finish (F)” to complete the installation process
9
10. Diagram 4-5
3.
The shortcut
will be created on desktop after install the IMS200 system.
4.2 Mac OS Operation system
1.
First install the X window protocol (Mac OS system comes with the CD-ROM) in Mac OS systems.
2.
Following the wizard prompts to complete the installation, as shown in Figure 1-1 to Figure 1-4。
Step 1: Click and run the installer IMS200_MAC system client. Dmg, as shown in Figure 1-1:
10
11. Figure 1-1
Step 2: Drag and drop IMS200 to the application a substitute, and drag IMS200Body to the repository
substitute, as shown in Figure1-2:
Figure 1-2
Step 3: Wait for the copy completes, it will generate a shortcut icon in the application, as shown in Figure 13:
Figure 1-2
Step 4: After clicking the shortcut to display two icons, which IMS200 can run the program, the Close
IMS200 completely remove the configuration program to exit the program, as shown in Figure 1-4:
Figure 1-3
Step 5: Click IMS200 can run the program.
11
12. 5 LOGIN AND INTERFACES
5.1 LOGIN
Double left click
and click “OK”-
to pop up [LOGIN] interface, see “Diagram 5 -6”. Input correct user name, password
-to enter the system.
The default account is “super” which has device management authority (the name and password are “super”).
The default administration account is “system” which has authority to modify advanced functions like create new
users, rights management and add E-map(the name and password are “system”). Please refer “7.3” for detail.
Diagram 5-6
Note:
1. Modify your password in “Setting->Modify Password” in the first login.
2. Configurate the organization, users, device, EMap and etc. Please refer “7.3” for detail.
12
13. 5.2 INTERFACE
There are screens, menu, functional keys, output mode keys, toolbar, upper right icons, alarm and status show on
the main interface. (see “Diagram 5 -7”)
Diagram 5-7
1.
Screens
Display and control the real-time video. Select “voice talk”, “snapshot”, “record”, “output”,“save”, “go to” and
“TVwall” function in a specific window. (see “Diagram 5 -8”)
13
14. Diagram 5-8
Introduction: functions are valid under specific conditions
2.
Menu
Name
Camera Lis
Function & Operation
Shows organizations, devices and channels
Shows device IP, name and model by moving the mouse cursor on a device
Finish the TV wall output and video output in center
Status icorns in record and live view mode
Show the record device status
Take record for talk
Search information of device and channel
Add to “Favorite”
Record review
Position to playback
Timing
Reboot
Log in / Log out (manually)
Configurate control (for hk devices)
PTZ Ctrl
Control zoom Eight-direction control
3D positioning, simulated joystick, etc
Modify step, zoom, focus and Iris
14
15. Preset
Auto Tour
Configurate and execute presets
Configurate and execute auto tour
Light, Aux1, Aux2, etc
Aux
Monitor
Configuration and Execution
Plan the task
Project
Pause/On the task
Import/Export the documents
The information of the project and task
Setting
License
Local Set
Functions authorization(license password is necessary for login)
Set the record path
Set the download path
Set the snapshot path
Set the talk path
Set the single file lengh
Enable the talk saving
Enable the display toolbar
Show or hide the device name on EMap
Minimum or maximum EMap size
Set log number capacity
Select media transfer protocal
Select start screen numbers
Set organization levels
Multi-window configuration
Auto task running
Select system startup mode
Set time period before turn to the playback
Time verification interval
Time verification disparity
Display content when device running
Language(Chinese/English)
Screen display: OSD configuration
Keyboard serial port configuration
Admin config: config the organization,users,device,EMap and system
Upgrade: software upgrade
About: software version and copyright
Admin Config
Add/modify/delete the users or devices
Add/edit the EMap
System setting, I frame, log, authorization, password, DDNS setting.
Input
Input the setup file
Output
Output the setup file
Modify
Modify license password or current account password
15
16. Password
License
For different users access for setting
Custom Tool
Playback the last alarm related video
Status Display
IP, manufacturer and working status information display.
Form 5-2
3.
Functional keys
Name
Alarm
Description
Task config
Add, modify and delete tasks
Plan config
Add, modify and delete plan
Global config
Configurate the external, detect, loss and cover alarm
Relate config
Configurate the relate, alarm output to CDS/VMS/sound/SMS
Manually plan config Manually channel, device and node plan
Overall config
Execute
Execute or stop task or plan
Import/Export
Import/export alarm information files
Device info
Query
Alarm, relate sound, relate light, relate output
Device list, name and task status
Playback
Four-window record playback, support slice, full screen, record, snapshot,
syn play, forward and slow
Download
Download from headend device or centre records
Search
Search the files of voice talk, local record, snapshot and download
Alarm show
Shows alarms by time, type, user and status
EMap
EMap
Integrate the map and video information
Dev status
Device Status
Shows the channel stream and alarm task
TV wall
TV Wall
Set the screens output to TV wall
Form 5-3
4.
Output mode
Name
Description
Output Mode
1/4/6/8/9/13/16/25/36/Full Screen/Close All Windows
Form 5-4
5.
Display toolbar
Name
Description
Toolbar on screen
Icons for record, snapshot, color, voice talk, streaming and etc.
Form 5-5
6.
Upper right icons
16
17. Name
Description
Exit
Minimizing, maximizing window, license, lock, switch and exit current account
Form 5-6
7.
Alarm & Date
Name
Description
Shortcut zoom
Pop up system log and alarm interface by clicking the time and alarm icon
Form 5-7
8.
Status
Name
Description
Status
CPU and network running status
Form 5-8
5.3 QUICK GUIDE
Login by the “super” account and add devices. Click【Admin Config】to enter the interface as follow
Diagram 5-9
⑴ Add: select an organization node in ① zone and add devices under this node in ② zone. Input the device data
like type, manufacturer, name, IP and password in popup window; then click 【Access Channel】to get the device
channels and alarm channels sutomatically. At last click
to finish the process. ( the “Device Channel
Count” and “Alarm Channel Count” are automatically generate according to the device IP. The default port:
8000. ) See “Diagram 5 -10”
17
18. Diagram 5-10
⑵ Modify: select a device and click icon
to modify it’s information
⑶ Device Information: this window (See “Diagram
5 -11”) which contains [Device Information], [Video
Channel] and [Alarm Channel] will pop up when you select a device.
18
20. Diagram 5-12
Double left click a video channel to pop up the [Channel Information], see “Diagram 5 -13”.
You can modify channel name, pre-position and camera type. The camera type include camera, dome camera and
half dome camera. ( channel ID, channel type and channel number are default value.)
Diagram 5-13
20
21. “Diagram 5 -14” is the [Alarm Channel] interface
Diagram 5-14
Double left click a alarm channel to get a popup window, see “Diagram 5 -15”
Diagram 5-15
You can operate in main interface after complete the configuration.
Introduction: there are two criteria for apply the PTZ function: 1. ensure the connected device is a dome
21
22. camera; 2. select the right camera type.
6 FUNCTIONS
6.1 MONITOR
6.1.1 CAMERA LIST
[Camera List] shows the “Structure”, “IP Address”, “Device List”, “Favorite” and “History”. (See “Diagram 6
-16”)
22
23. Diagram 6-16
Operation:
Node:
Click
to open the sublist.
Click
to close the sublist .
Switch to live view:
Select a screen and double left click a camera to start the live view in this selected screen.
Or drag a camera/device/node to a screen to play.
Device information: move the mouse cursor to DVR
or IPC
to show the device information like IP,
name, manufacturer and model.
23
24. Start talk: select a camera and enable the voice talk in context menu, click again to stop talk.
Add to “Favorite”: select a node/camera/channel and add to favorite in context menu.
Playback interface position: Select a camera and position it to the playback interface by context menu.
Set “Playback before”: Setting—>Local Set—>Other
EMap position: select a camera and position it to the EMap by context menu
Search: input device name or IP to search
Context menu:
Right click a device to execute the operations “add to favorite”, “timing”, “reboot”, “log in” and “config”
Diagram 6-17
Right click a camera to execute the operations “talk”, “add to favorite”, “go to playback” and “go to EMap”.
Diagram 6-18
24
25. 6.1.2 LIVE VIEW
Play the live view in selected window or drag a node or a device to a window to play. (See “Diagram 6 -19”) .
Diagram 6-19
Introduction:
1. the device with green spot refers this camera is in live view mode.
2. Select a window, the corresponding camera will be marked automatically.
3. Drag to change the screen position; double left click to maximize the image(single screen), double left click to
go back.
Screen context menu: (See “Diagram 6 -20”).
25
26. Diagram 6-20
Functions Description.
Control
Explain
Window
Show the window number
Voice talk
Start the voice talk(depend on the DVR function)
Snapshot
Snapshot in live image
Record
Save the video audio in local files
Output
Set the output audio and color
Save
Save the current window and camera as one task group
Save the current video in “Favorite”
Go to
Position to playback or EMap
TV Wall
Send image to TV wall
Close
Close the selected window
Form 6-9
26
27. 6.1.3 RECORD
Click the Record】 context menu to start recording, click again to stop the operation. Set record path in [Setting]
【
in
—>[Local Set]—>[Record].
Introduction :
: in recording,
: device,
: channel
6.1.4 SNAPSHOT
Click【Snapshot】in context menu to save one single image of the video.
Path: Setting —> Local Set —> Record.
The default path: C:Program FilesIMS200PIC.
Save format: .bmp.
6.1.5 COLOR
You can modify brightness, contrast, saturation and hue in screen [context menu] —>[Output]—>[Color]. (see
“Diagram 6 -21”)
27
28. Diagram 6-21
Introduction: Resume: restore the last operation; Default: restore to the default status. This operation
modify the screen output but not the headend cameras.
6.1.6 VOICE TALK
select【Voice Talk】in the context menu to access the live sound, click it again to quit.
Introduction: multiple channels’ voice talk are unsupported. The voice collector in DVR is necessary for
apply this function.
6.1.7 GO TO
Playback: play the 10 minutes before record. (the default is 10 mins, you can modify it in “Setting”—>“Local
Set” “Others”—>“Playback Before”)
EMap: go to EMap which the camera belongs.
6.1.8 TV WALL
TV wall is supported, contact with the technical support staff for further information.
6.1.9 PARTITION
Partition options are first window, 1, 4, 6, 8, 9, 10, 13, 16, 20, 25, 36 windows, see “Diagram 6 -22”.
28
29. Diagram 6-22
Introduction: the default partition is 4 windows
6.1.10 FULL SCREEN
Full screen icon is
(see “Diagram 6 -23”)
Diagram 6-23
Introduction:
1. the right side toolbar pop up as cursor move into this zoom, hided as cursor move out.
2. the bottom toolbar pop up as cursor move into this zoom, hided as cursor move out.
3. click “Esc” to exit.
29
30. 6.1.11 CLOSE ALL WINDOW
Click
to close all screens.
6.2 QUERY
“Query” include “Playback”, “Download”, “Search” and “Alarm Show”.
6.2.1 PLAYBACK
Click【Query】to pop up the [Playback] interface (see “Diagram 6 -24”) .
Diagram 6-24
30
31. Select a camera in “Organization” - >select the “source” (all, device, platform)and “type”(all, external alarm,
motion detect, general record)->double left click the date to list all records of that day (the time band with color
refers the different record types in that period). You also can choose any time period by dragging, see “ Diagram 6
-25”.
Diagram 6-25
Green: General
Yellow: Motion Detect
Purple: External Alarm
Select the hour and minute separately and play that record.
Click
to synchronize four windows’ record time with the selected specific window
Introduction: the prompt as “Diagram 6 -26” will pop up as the search is failed.
Diagram 6-26
“Diagram 6 -27” shows the playback toolbar
31
32. Diagram 6-27
fast: 2, 3, 4, MAX times faster playback
slow: -2, -3, -4, MIN slow playback
All the searched record results list in
, see “Diagram 6 -28”.
Diagram 6-28
The record with blue color is the one in playing.
32
33. Double left click a record in list to play.
Double left click a window to switch to full screen mode (see “Diagram 6 -29”) and click again to exit.
Diagram 6-29
6.2.2 SLICE
Click to operate on the records which have been searched out in the following interface. See “Diagram 6 -30”
33
34. Diagram 6-30
1.
Toolbar
The operations include snapshot, pause, play, fast, slow, single frame and stop.
Define the slice duration and its previous or after time period. There are 1, 2, 5, 10, 15, 20, 30 mins time length for
selecting.
Note: the slice toolbar function and operation are similar with the records playback toolbar. Please consult that for
reference.
2.
Bottom slice image
Click
as you set the slice duration and previous or after time period. The system will automatically run
the slice process accourding the setting. See“Diagram 6 -31”
34
35. Diagram 6-31
The first eight slice image will be illustrated on the bottom. If the slice pictures are more than eight, there will be a
floating arrow for scroll display.
3.
Side slice image
Left single click image, the pic will be enlarged and display the previous and next slice image at the same time.
See “Diagram 6 -32”
35
36. Diagram 6-32
The selected image is displayed in the middle, the other two image are put as the time sequence.
4.
Playback
Double left click the slice image to playback the record video from the time point of this slice. See “Diagram 6
-33”
36
37. Diagram 6-33
5.
Menu
Exit the video slice and switch to playback, download, video search and alarm page.
6.2.3 DOWNLOAD
Click
to turn to the [Download] interface. (see “Diagram 6 -34”)
37
38. Return
Diagram 6-34
Select a camera in device list first, then define the record “source” (all, device, platform) and “type” (all, external
alarm, motion detect, general record), at last double left click the records date to get the search results list. Select
the record in the list directly or select by time that operate in the time slider. Right click or double left click to start
the download. (See “Diagram 6 -35”)
Diagram 6-35
Set the records path in [Local Set] interface, the record format is “.dad”.
“Diagram 6 -36” shows the record loading progress.
38
39. Diagram 6-36
Input the start and end time, click
to download all the records in this period. Click to stop download. (See
“Diagram 6 -37”)
Diagram 6-37
Introduction: you can not download and playback the same channel records at the same time. The system
will stop the playback automatically when you start downloading.
6.2.4 SEARCH
Click to turn to the interface like the “Diagram 6 -38” shows.
39
40. Diagram 6-38
Select a node or a camera in device list first, then define the “start time”, “end time”, “file type” (voice talk, local
record, snapshot file, download file) and “user”, at last click
【Search】 get the results in the right bottom list. You
to
can play a record by “Play” button or double right click it. (See “Diagram 6 -39”)
Diagram 6-39
You can recycle play the video records but not the snapshot file.
40
41. 6.2.5 ALARM SHOW
Click to turn to the interface like “Diagram 6 -40”.
Diagram 6-40
Select a node or a camera in device list first; then define the “date”, “start/end time”, “user”, “alarm type” (all,
video loss,external alarm, motion detect, camera masking, device disconnection, host alarm) and “status” (not
confirm, confirm); at last click
【Search】 get the result list. The number of the required records show in the blank
to
following the【Search】button.
6.3 ALARM
The system supports six type alarms (video loss, external alarm, motion detect, camera masking, device
disconnection and host alarm). As soon as the alarm occur, the related device will automatically position and make
41
42. reaction to the alarms. The alarm relate include sound, video, EMap, TV wall, output (SMS, voice message).
Click to pop up the interface like “Diagram 6 -41”.
Diagram 6-41
Top: toolbar (See “Diagram 6 -42”)
Diagram 6-42
Stop all relate: stop all alarm relates
Import: import alarm configuration
42
43. Export: export alarm configuration
Confirm: confirm the alarm and stop all relates
Click
to change the device information format. Double left click a device to illustrate all the sub channels.
You can rank the list by【View】on top-- . (See “Diagram 6 -43”)
Diagram 6-43
Left: device list and alarm detail information
Right: device information
Right click on the alarm icon (
or
) and preview the
relates.
43
44. Right click the blank to save the current status as an alarm task (
),
or choose a rank type.
Bottom right is the event list. Click
to deploy the event list, like “Diagram 6 -44”.
Diagram 6-44
Alarm configuration steps:
1.
Task
There are FOUR methods to set task. The task icon will be in green as you set the task.
①
manually right click on the camera/device/node to enable or stop the tasks.
②
Select the alarm type in device list, e.g. set the task for all the devices and alarm type of “134” group.
44
45. ③ right click on the alarm icons --
,
,
,
to enable or stop the tasks.
④ set a task first and tick the items. This is the most convenient way to set the task.
Plan the time periods for different tasks. Please refer 6.3.1 TASK CONFIG, 6.3.2 PLAN CONFIG
Introduction: stop task is the same method as enable it.
2.
Global config , please refer chapter 6.3.4 GLOBAL CONFIG
3.
Relate config, please refer chapter 6.3.3 RELATE CONFIG
After you set the task, global config and relate config, the alarm icons on screens will be in red as alarm occur.
The alarm relates are:
Sound: enable the function and select a audio file(format: .wav)
TV wall: enable the function, the alarm video will be send to TV wall as the alarm occur.
Alarm interface: enable the function, the alarm interface will pop up as the alarm occur. (See “Diagram 6 -45”)
45
46. Diagram 6-45
Relate the alarm video, support maximum 4 channels. (See “Diagram 6 -46”)
Red Flag
Diagram 6-46
On the popup screen, you can find a voice talk icon to apply this function. (See “Diagram 6 -47”)
Diagram 6-47
46
47. Introduction:
1. the on playing relate video corresponding with the flag alarm record.
2. double left click the alarm record to check the relate video when there are more than one alarms occur.
3. turn to the next or previous video by down and up icon.
4. click “Confirm” to end the video relate.
5. double left click to full screen this window.
The alarm icon will show on the screen as the alarm occur
Diagram 6-48
: Motion detect;
: video loss;
: camera masking;
: external alarm
If you set the alarm relates EMap, the map with alarm indicators will pop up when the alarm occur. (See “Diagram
6 -49”)
47
48. Diagram 6-49
SMS output and talk output are selectable. Alarm records will be sent to your phone by SMS or output by
sound device.
Introduction: you have to install DMSS and alarm output software for alarm SMS output.
6.3.1 ALARM TASK CONFIG
Click【Alarm】->
【Task Config】to pop up the interface as “Diagram 6 -50”.
48
49. Diagram 6-50
Click【New】to name a task; then select devices for alarm task by
button; at last save the configuration as a
new task.
Click to edit and enable the alarm type.
Click【Delete】to delete a task.
Introduction: the running tasks are still valid after you restart the system.
6.3.2 ALARM PLAN CONFIG
Set plans to apply the tasks in particular time periods.
Click【Alarm】->
【Plan Config】to pop up the interface as “Diagram 6 -51”.
49
50. Diagram 6-51
Plans will be automatically canceled when all the tasks are canceled.
6.3.3 RELATE CONFIG
Click【Alarm】->
【Relate Config】to pop up the interface as “Diagram 6 -52”.
50
51. Diagram 6-52
Select the device in list and add it to the relate. (See “Diagram 6 -53”)
Diagram 6-53
Tick the alarm type which include sound relate, TV wall relate, EMap relate and alarm interface relate.
Click the camera【Config】to pop up the window like “Diagram 6 -54”.
51
52. Diagram 6-54
Click the【Output】to configurate the SMS output and talk output. (See “Diagram 6 -55”)
Diagram 6-55
6.3.4 GLOBAL CONFIG
Click
【Alarm】
->
【Global Config】 pop up the following interface which include motion detect, cover, video
to
52
53. loss, external alarm, host alarm and disconnection alarm.
Diagram 6-56
Audio: enable or disable the function. You can select sound and set duration.The audio format is WAV.
Video: enable or disable the video relate. Set popup video duration.
Assist (e.g. light): enable or disable the assist devices and set the devices start time
Alarm interface: enable the popup alarm interface
Output: enable or disable the alarm output
Introduction: global config aim to the whole system. You have to enable the alarm relate and then set the
SMS and talk output.
53
54. 6.4 PTZ CONTROL
Open the PTZ interface of authority camera to set step, zoom, focus, iris, preset, auto tour, aux and etc. Click
【PTZ
Ctrl】to open the toolbar as “Diagram 6 -57”.
Diagram 6-57
Introduction: PTZ function is available for PTZ authority.
Description
Control
Direction key 8
Explain
Up,down,left,right,upper left,upper right,lower left,lower right
54
55. direction
SIT
Single click on screen and position this point to the centre
Support 1-36 zoom in/out function enlarge the selected screen by dragging bottom-up,vice
versa.(only controlled by mouse)
Simulate
joystick
Enable the function,control the step and camera movement by simulate joystick.Scroll wheel
control the camera zoom.
Step
There are 1-8 degrees
Zoom
Control the camera zoom
Focus
Modify the definition
Iris
Preset
Auto tour
Aux
Modify brightness
When Pan/Tilt moves to the target position, input the preset number and save it.
Auto tour lines
Light on,light off
Form 6-10
6.4.1 PRESET
Click【PTZ】-> [PRESET] ->【Setup 】 in menu to pop up the preset window like “Diagram 6 -58”. Input the
number, name and save this preset.
Diagram 6-58
55
56. Diagram 6-59
Introduction: preset number is 1-128, the name could be in number, letter or symbol, the minimum length
is 16 characters.
Select a preset and click【Delete】to cancel it.
Back to PTZ control, select preset form list like “Diagram 6 -60” then click
【Go To】 control the camera motion.
to
Diagram 6-60
6.4.2 AUTO TOUR
Click【PTZ】->[CRUISE]->【Setup】to pop up the auto tour window like “Diagram 6 -61”.
56
58. ① tour name, can be modified.
② select preset in list and add it into tour by . The maximum presets are 100 in one tour.
③ double left click stay time to modify, the limit is 3-6000 seconds. The default is 5 seconds.
④ select a preset in tour and click to cancel it from this tour.
⑤【Up】and【Down】is used for change the presets sequence and the tour line.
⑥ click【Save】to complete the setting
The operation of【Modify】is the same as add a new tour
【Delete】is used for delete a tour
Click【Exit】to quit
Introduction: you can add several presets into tour at once.
In PTZ control, select a tour (See “Diagram 6 -63”) and click “Go Preset” to execute the tour.
Diagram 6-63
Introduction:
1. PTZ is on working for dome or rotatable camera; it is useless for noormal camera
2. you need authorization to apply this function
6.5 MONITOR PROJECT
The operations in monitor project include task and plan config; pause and resume project; import and export; run
and stop tasks.
58
59. 6.5.1 TASK CONFIG
“Task” is the sub item of “Save” in screen contact menu. (See “Diagram 6 -64”)
Diagram 6-64
Add new task:
In the popup window, firstly input the task title and select the screen number (1,4,6,8,9,13,16,20,25,36), then
select the node or device and add it into the task sub item by , at last, click save to complete the operation.
59
60. Diagram 6-65
All the channel information is listed in the task subitem, like the device, channel, camera ID, stop duration (103600s), preset (1-128) and stream. On the contrary, clisk
to cancel the channel from tasks.
New: add a new task
Modify: modify the task configuration
Stay time: the default is 20 seconds. Double left click to modify the time between 10-3600 seconds.
Preset: double left click to add preset number
Save: save the configuration
Cancel: cancel the select item
Exit: quit this window
Introduction:
1. there are maximum 100 devices in one task
2. select a node to add all devices in this node into the task
3. modity one stay time and apply this time to all in context menu
60
61. 6.5.2 PLAN CONFIG
“Diagram 6 -66” is the [Plan Config] interface. Click “Add” and modify the plan parameter like title, task
start/end time. You can put the exist tasks into the plan.
Diagram 6-66
Add several tasks into one plan, set the start and end time to make a cycle execution.
Modify: modify the plan configuration
Delete: delete a plan
Exit: quit this window
Introduction: 1. there are maximum 100 tasks in one plan
In monitor project interface, tick the task to carry out.
61
62. Diagram 6-67
Pause: pause and resume the running project
Import: import tasks and plans list
Export: export tasks and plans list
Introduction: the monitor project configuration is keep in local. Copy the configurations between devices
by import and export data.
62
63. 6.6 EMAP
EMap is used for showing the alarm and device locations. “Diagram 6 -68” shows the EMap interface
Map organizational
Minimize/Full
structure
screen/Close
Camera search
Cameras in the
Video window
map location
Diagram 6-68
Upper left: organize structure
Left bottom: screen
Right: map
There are camera icons, alarm icons and the next level map icons on the map window.
Double left click the next level map icon to turn to that map.
Single click the camera in organize structure to get the camera location on map. Double left click the camera in
list or on map to play the live view in left buttom screen.
63
64. Diagram 6-69
Double left click the screen to turn to the full screen mode; double left click again or press “ESC” to quit.
【PTZ Control】: control the camera motion
【Talk】: talk with front–end device
【Send】: send the video to playback window
【Stop】: stop the video playing
: minimize the map
: full screen the map. The icon with green highlight in “Diagram 6 -70” is the full screen quit button
64
65. Diagram 6-70
: close the map
Introduction:
1. zoom in/out by scroll wheel
2.
: alarm occur
: camera unconnected
: device alarm occur
: device unconnected
6.7 DEVICE STATE
[Dev State] shows the current stream, motion detect, camera masking, video loss, external alarm states.
(See “Diagram 6 -71”)
65
66. Diagram 6-71
1-16 is the channel number; : motion detect
: camera masking
: video loss
: external alarm
Introduction: green icons refer the function on; red is the alarm indication.
6.8 USE-DEFINED TOOL
Click
in【Use-defined Tool】to check.
6.9 DEVICE RUNNING
① hard disk status(√: enable, Ⅹ: disable ) ② memory (red: full, blue: enough space ) ③ voice talk status ④
recording status ⑤ motion detect status
⑥ cover alarm status ⑦ loss alarm status ⑧ external alarm status
(See “Diagram 6 -72”)
66
68. 6.10.2 FULL SCREEN
Click
to switch to full screen mode.
6.10.3 SHUTDOWN
Click
to pop up the shutdown window. (Diagram 6 -73)
Diagram 6-73
Licen: get the licenced authority by inputting the password.
Lock: lock the system. You need the password to unlock it. (See “Diagram 6 -74”)
Diagram 6-74
Switch On: the system will reboot as you click the “Switch On” button, then input the new username and
password to login by the new account.
68
69. Exit: exit the system.
Introduction: Allocate ahthority by the “system” account and reboot the system. You have no authority
except live view monitoring in the first login. Set authority and password for further operation.
6.11CPU & NETWORK
CPU:wave range refers the CPU utilization
NET:
refers net block
6.12DATE & ALARM & LOG
Display the time, date, and alarms
Click alarm number to get the alarm configuration interface, see 6.3 ALARM.
Click date and time to pop up the system log interface.
69
70. 7 SYSTEM SETTING
There are local set, modify password, log, update, screen out, virtual keyboard, license and admin config options
in [Setting]. (See “Diagram 7 -75”)
Diagram 7-75
7.1 LOG
Log records the account event, operation and alarm information.
Search and download the records according its time, type, device and username in
【LOG】
interface. See “Diagram
7 -76”
70
71. Diagram 7-76
Introduction: click【ALL LOG】to get the all records of the selected device
7.2 LOCAL SET
“Diagram 7 -77” is the [Local Set] interface. You can set record, display, system and some other parameter.
71
72. Diagram 7-77
7.2.1 RECORDING SETTING
Record (Diagram 7 -77): modify record, download, snapshot and talk path, set the single file length and enable
the talk save.
7.2.2 DISPLAY SETTING
Display (Diagram 7 -78): enable the toolbar and EMap’s device name, set the map size, log number and media
transfer protocal.
72
73. Diagram 7-78
Introduction: suggest UDP protocal for internal network; TCP protocal for Ethernet
7.2.3 SYSTEM SETTING
System (Diagram 7 -79): set start screen mode (14689101316202536), organization level, multi-window
config (main interface, query, EMap and alarm), auto task running config, and system startup mode.
73
74. Diagram 7-79
Set the start screens as your requirement;
Set multi-level structure, like “country->province->city->street” 4 levels.
Enable the task auto running;
System startup mode: full screen and exclusive are alterable;
Multi-window config; take the four different operations meanwhile. See “Diagram 7 -80”
74
75. Diagram 7-80
7.2.4 OTHERS
Others (Diagram 7 -81): set playback forward time, interval, disparity, device running and language.
75
76. Diagram 7-81
Introduction: suggest UDP protocal for internal network; TCP protocal for Ethernet
7.2.5 SCREEN OUT
To set the OSD background color and text color.
Diagram 7 -82 shows the [Screen Out] interface
76
77. Diagram 7-82
Click “OSD BackColor” and “OSD TextColor” to set color
You can also set the “OSD Text Size”, “OSD Position” and “OSD Visible”
If OSD is visible, the information will show on the upper left, see “Diagram 7 -83”
Diagram 7-83
77
78. 7.2.6 VIRTUAL KEYBOARD
It is used with Net Keyboard, please consult technical support staff for detail.
Diagram 7-84
7.3 ADMIN CONFIG
Click【Admin Config】to enter the interface,see”Diagram 7 -85
Diagram 7-85
There are “Organization”, “EMap” and “System” in [Admin Config].
78
79. 7.3.1 USERS & DEVICE
Click【Organization】to enter the following interface
Diagram 7-86
① lists the organization structure. You can add, modify and delete nodes here and click a noke to open the
sublist(only the “system” account has the authority to operate.)
② contains the users and device parts. You can add, modify and delete users and device here.
1.
Users
⑴Add: select a node and click
to pop up the following interface
Diagram 7-87
⑵Modify: select a user and click
icon to modify user information
⑶License: the [Device List] (Diagram 7 -88) will pop up when you select one user Tick the device or channel to
79
80. in the list to authorize and click
to save the modify.
Diagram 7-88
⑷Delete: select a user or a device you want to delete and click
2.
Device
⑴Add: select an organization node and click
to add device in this node. Input the device data in popup
window and click to finish the process ( the “Device Channel Count” and “Alarm Channel Count” are auto
generate according to the device IP.). See”Diagram 7 -89”
80
81. Diagram 7-89
⑵Modify: select a device and click icon to modify the information
⑶Device Information: the interface which contains [Device Information], [Video Channel] and [Alarm Channel]
will pop up when you select a device. See “Diagram 7 -90”
81
82. Diagram 7-90
Diagram 7 -90 is the [Device Information] interface
Diagram 7 -91 is the [Video Channel] interface
Diagram 7-91
Double left click a channel to pop up [Channel Information], see “Diagram 7 -92”.
You can modify channel name and type in [Channel Information]. The camera type include camera, PTZ dome
camera and dome camera.
82
83. Diagram 7-92
“Diagram 7 -93” shows the [Alarm Channel] interface
Diagram 7-93
Double left click a alarm channel to get a popup window, see “Diagram 7 -94”
83
85. Diagram 7-95
Two parts:
1、① is the management zoom for adding, modifying and deleting nodes
2、② is the map management zoom. You can add cameras and alarm on map; drag or modify the map size.
⑴ Cancel
⑵ Save
⑶ Delete
: delete the unsaved node on map
: save the operations
: delete the records or camera on map
⑷ Show device
: pop up the device list and drag the camera or alarm to the map, click
to save the
operation. (see “Diagram 7 -96”)
85
87. Diagram 7-97
⑹ Tick the node which you want to place on map
⑺ Click on lower right to open the sub-map, you can position on the sub-map. (see “ Diagram 7 -98”)
87
89. Diagram 7-99
There are I frame, log, authorization, password and DDNS in system management module which is only showed
by “system” account login.
⑴ I frame: enable and insert a I frame when start live view or playback for improving image fluency.
⑵ Log: log will be deleted as it exceeds the storage period limitation.
⑶ Authorization: users are allowed to operate in authored module.
⑷ Password: modify password by “system”only
⑸ DDNS: support DDNS
7.4 INPUT/OUTPUT
Input and output the data of【SETTING】like local set, admin config and log.
89
90. 7.5 MODIFY PASSWORD
1. In [Modify Password] interface, type in old password and twice new pasword to modify. Modify the system
password in “Setting”—> “Admin Config”—> “System”—> “System Password”.
Diagram 7-100
2. Modify authorization password by input once old password and twice new one. Modify the authorization
password in Setting—>Admin Config—>System—>Authorization.
Diagram 7-101
7.6 LICENSE
Click【License】to enter the interface as following
90
91. Diagram 7-102
Allocate users’ authority include task config (task config, project config, import and export); query (playback,
download, search and alarm show); alarm (relate config, global config, task config, plan config, config import and
export), EMap, setting (local set, upgrade, log, admin config), account switch and authority allocate.
Introduction:
1. tick the authority items in “setting”→“onfig”→“system”. Restart the system to enable the configuration.
2. set authority in top right icons. The gray icon refers the authority is unavailable.
3. enable the authority at top right icons.
91
92. 8 APPENDIX A
8.1 FAQ
Q: The prompt “Video Open Fail” shows in live view or tour mode?
A: Probably reasonss:
1. the device breakdown.
2. can not get the streaming because of the network state.
Q: P/T/Z is incontrollable?
A: Probably reasonss::
1. ensure the camera has P/T/Z function
2.enable the P/T/Z function
3.configurate the compatible protocal and address code, check the 485 line “ +”“—”are correct.
92