Thursday, December 23, 2010
College】 【weak extended network camera the whole new vision --- Power By 【China】 weak home network.
<br> of: <BR> Shawn Watters Summary: <BR> cameras can be connected with the network technology provides the possibility of multiple applications. .Although this technology is still relatively new, but the possibility of the application of this technology is limited only by your imagination on and the camera itself is functional limitations. .This is really a good idea, but these cameras are really good quality image capture it? .The new built-in networking capabilities of network camera technology than the traditional standard network cameras can provide users with a more diversified applications. .We can boldly say: The majority of Tom's Hardware Guide readers have a variety of network cameras. .If we use the camera on the network to vote, most readers should be as a video conferencing network cameras will be used, which is currently the main use of such equipment. .Indeed, video conferencing cameras to take full advantage of computer technology, but there are still many other uses. .Most of the traditional network camera through USB port or parallel port connected with the personal computer and uses such as NetMeeting or CuCme specific photo or video conferencing software will send the image to the other side of networking. .This innate need to connect to the computer is set up to use it the possibility of its application is limited. .If you want to use last year's birthday present (corner of the room is now fouling) Logitech (Logitech) USB webcam as a security surveillance camera how to use it? .First, you need security cameras in many applications, the network selected one. .If you look carefully in your birthday gift box goes on the disk may have such application. .Disadvantage of this approach is that the camera must be quite close to the computer in order to be able to connect the signal line. .And because the camera is mostly on the computer monitor above the camera captured the image of the thief should exist within a piece of the stolen hard drive. .Therefore, this is only the thief easily stolen images stored in the hard disk system is not effective safety systems. .To have an effective security system must be able to not connect the camera to the computer and run independently, such as that installed on the ceiling use. .If the camera and computer separately, then the camera must be able to provide web server functionality to streaming media format, the image output screen, the user can view images captured by the camera. .Another technical barrier is the connection scalability. .USB hub to connect users to a lot of products, but based on the above considerations theft, we hope that these things are not physically connected together. .HPNA is a good choice, but should be a better choice is to use Ethernet (Ethernet) or 802.11b networking wireless networking technology. .Another useful feature is a 1-2 team should be an external controller, and a set of external output. .The use of home users with a broadband network through the Internet to check for any function of a natural camera images is another plus. .While this technology has been launched for some time, but the built-in networking features of network cameras can say that to be truly realized. .As technology continues to progress in the field, and the production of increasingly lower component costs, such products have become popular consumer electronics market one of the products. .We will analyze and test the practicality of this technology to apply this technology, several new products. .Although the security application may actually be an important future application of this technology, one can still have other uses. .Such hidden home camera installation allows you to watch your nanny and the interaction between children, or (to use the outdoor protective cover) in place of such products outside the house so that you can pay attention to the safety of children playing in the backyard. .Just gently press the button, users can connect to a special Web site to see real-time images captured by the camera. .Part of the camera also offers zoom through the web interface, zoom, rotate, tilt control function of the camera, the angle of view in order to better shooting range. .Some cameras can be set by the user to send images by e-mail interval for users watch at work, or even web-enabled mobile phones support the watch. .Although the majority of security experts in the eyes of a very basic, but for us, the application of this technology is still infinite possibilities to be for us to develop. .Broadband network through the home with remote control from the ball all over the camera at home is really amazing technology. .However, because this area is still in its infancy, before the product fully mature, growing in the "troubles" always inevitable..
Labels:
[:]
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment