SecurityMan Cyber Eye User Manual
Page 22
CyberEyes User’s Manual Rev.1
20
the default hard drive location is set to C:\ drive, you can always allocate other hard drives, including
external hard drives and RAID systems, as the hard drive location for the recorded data. In the event
of a limited hard drive space, you could 1) configure to record only motion images, 2) adjust different
compression quality, and 3) specify external drive for RAID systems or bigger external hard drives.
Ÿ
Pure Digital Video
Ÿ
Prevent from the shortcomings of analog video recording and the need to constantly swap
videocassettes. All video images are completely digitalized, and, therefore, can be conveniently
saved to a hard disk. Retrieving data is much faster with the digitalized video than with traditional
recording means, not to mention higher data quality. Best of all, CyberEyes can be remotely
operated to play back previously recorded data or to view live video over a standard Internet browser
from any computer at anywhere, anytime.
Ÿ
Several Different Video Recording Modes
Ÿ
There are different recording settings available in CyberEyes, such as continuous recording,
recording based on preset schedules, manual recording, motion triggered recording, and time-lapse
recording. To save disk space on recording for longer time, you can configure CyberEyes to only
record motion frames or time lapse record.
Ÿ
Remote Monitoring
Ÿ
Now you will no longer need to be around the host computer (the computer with CyberEyes and DQP
installed) to monitor. All you need is to gain an access to the Internet and use a standard Internet
browser, and you will be able to see live view or retrieve previously recorded images at anywhere,
anytime, thus making the task of administration extremely flexible.
Ÿ
Various Warning Mechanisms
Ÿ
CyberEyes can be configured to emit different warning notifications, such as E-mail, call-out, and
alert in the event of an alarm-triggering motion. These warning notifications, in turn, can be
automatically sent to you, the system administrator, or even the police in the event of a detected
motion.
Ÿ
Several Different Security Mechanisms
Ÿ
CyberEyes provides you with three different user types: Administrator, User, and Guest. Different
user types have different levels of authorization and permission. The Administrator is allowed to do
everything. The User is allowed to do everything except configuring settings. The Guest is allowed
to only do live viewing. For security reasons, it is recommended that you provide a security password
before accessing CyberEyes or before browsing data remotely from an Internet browser.