2 Using Triggers to Buffer and Transfer ImagesThe camera can be configured to buffer its images, i.e., save camera images temporarily in its memory. Youcan view these images later when accessing the camera. The camera can also be configured to transfercamera images by E-mail, FTP, or HTTP.Before you can configure the camera to buffer images, you need to decide what method the camera will useto buffer or transfer images. Buffering methods are called “triggers”; up to 5 triggers can be configured. Cameraimages can be buffered or transferred based on the following triggers:– TimerCamera images can be buffered or transferred at specific times on specific days.– Built-in sensor (pyroelectric infrared sensor)Camera images can be buffered or transferred when the camera’s built-in sensor is triggered. The activetime of the camera’s sensor can also be specified.– Alarm (i.e., external sensors)Camera images can be buffered or transferred when the camera’s external sensors are triggered. Theactive time of the camera’s sensors can also be specified.– Motion DetectionCamera images can be buffered or transferred when the camera detects motion in the camera image. Theactive time of the camera’s motion detection feature can also be specified.– Sound DetectionCamera images can be buffered or transferred when the camera detects sound in the camera image. Theactive time of the camera’s sound detection feature can also be specified.Note• The built-in sensor cannot make detections for about 30 seconds after the camera is turned on.• When privacy mode is turned on (see Page 170), camera images are not buffered or transferred.• H.264 images cannot be buffered or transferred.• Timer: MPEG-4 images cannot be transferred; they can only be buffered.Sensor, Alarm, or Detection: Only JPEG images can be buffered or transferred.• The image buffering and transferring features, the built-in sensor, and the detection features are notdesigned to be used for security or surveillance. No responsibility will be taken by our company withrespect to consequences resulting from the use of these features.• The camera does not use encryption when sending user names and passwords to FTP, E-mail, orHTTP servers. Use caution as necessary to prevent disclosure of this information.• For added security, we recommend periodically changing the user names and passwords that arerequired to access your FTP, E-mail, and HTTP servers.• Refer to Page 207 for the camera’s memory capacity for buffering images.• If the camera is triggered and begins buffering or transferring images, it cannot be triggered again untilthe camera stops buffering or transferring images, as shown in the figure below.The camera can be triggered.The camera is buffering or transferring images and cannot be triggered during this time.A BA The camera is triggered. Buffering or transferring begins.B Buffering or transferring ends.Follow the procedures in this section to configure the camera to buffer or transfer images.50 Operating Instructions