beautypg.com

SecurityMan Cyber Eye User Manual

Page 22

background image

CyberEyes User’s Manual Rev.1

20

the default hard drive location is set to C:\ drive, you can always allocate other hard drives, including

external hard drives and RAID systems, as the hard drive location for the recorded data. In the event

of a limited hard drive space, you could 1) configure to record only motion images, 2) adjust different

compression quality, and 3) specify external drive for RAID systems or bigger external hard drives.

Ÿ

Pure Digital Video

Ÿ

Prevent from the shortcomings of analog video recording and the need to constantly swap

videocassettes. All video images are completely digitalized, and, therefore, can be conveniently

saved to a hard disk. Retrieving data is much faster with the digitalized video than with traditional

recording means, not to mention higher data quality. Best of all, CyberEyes can be remotely

operated to play back previously recorded data or to view live video over a standard Internet browser

from any computer at anywhere, anytime.

Ÿ

Several Different Video Recording Modes

Ÿ

There are different recording settings available in CyberEyes, such as continuous recording,

recording based on preset schedules, manual recording, motion triggered recording, and time-lapse

recording. To save disk space on recording for longer time, you can configure CyberEyes to only

record motion frames or time lapse record.

Ÿ

Remote Monitoring

Ÿ

Now you will no longer need to be around the host computer (the computer with CyberEyes and DQP

installed) to monitor. All you need is to gain an access to the Internet and use a standard Internet

browser, and you will be able to see live view or retrieve previously recorded images at anywhere,

anytime, thus making the task of administration extremely flexible.

Ÿ

Various Warning Mechanisms

Ÿ

CyberEyes can be configured to emit different warning notifications, such as E-mail, call-out, and

alert in the event of an alarm-triggering motion. These warning notifications, in turn, can be

automatically sent to you, the system administrator, or even the police in the event of a detected

motion.

Ÿ

Several Different Security Mechanisms

Ÿ

CyberEyes provides you with three different user types: Administrator, User, and Guest. Different

user types have different levels of authorization and permission. The Administrator is allowed to do

everything. The User is allowed to do everything except configuring settings. The Guest is allowed

to only do live viewing. For security reasons, it is recommended that you provide a security password

before accessing CyberEyes or before browsing data remotely from an Internet browser.