User Manual
Table Of Contents
- GV-Control Center User's Manual V3.1.0.0
- Copyright
- Content
- Chapter 1 Introduction
- Chapter 2 Getting Started
- Chapter 3 Live Video
- Chapter 4 Audio Communication
- Chapter 5 Playback
- Chapter 6 Remote DVR Applications
- Chapter 7 I/O Central Panel
- 7.1 Running the I/O Central Panel
- 7.2 The I/O Central Panel
- 7.3 Creating a Group for Cascade Triggers
- 7.4 Monitoring Hosts from the I/O CentralPanel
- 7.5 Configuring the I/O Central Panel
- 7.6 Viewing Connection Log
- 7.7 Setting Up Mode Schedule
- 7.8 Quick Link
- 7.9 Forcing Output
- 7.10 Editing Background Image
- 7.11 Managing a Group of I/O Devices
- 7.12 Controlling I/O Devices
- 7.13 Popping Up Live Video upon InputTrigger
- Chapter 8 Multi Monitors Applications
- 8.1 Application Position
- 8.2 Matrix View
- 8.3 Video Wall
- 8.3.1 Setting Up a Video Wall Server
- 8.3.2 The Layout List
- 8.3.3 Adding a Server and Configuring the Layout
- 8.3.4 Activating the Channel and Layout
- 8.3.5 Setting Up a Zoom Window
- 8.3.6 Setting Up a Scan Window
- 8.3.7 Displaying Remote Monitor, Web Page and PlayingBack Videos
- 8.3.8 Displaying Live View from Remote E-Map
- 8.3.9 Remotely Accessing the Video Wall Server
- 8.3.10 Updating the Video Wall Server Version
- 8.4 Fisheye View
- Chapter 9 Other Applications
- Chapter 10 System Configuration
- Appendix
Chapter 6 Remote DVR Applications
6.1 Remote DVR
The Remote DVR service allows the Control Center to access client GV-Systems and
configure their settings remotely. This feature reduces the trips to each client DVR
individually.
6.1.1 Running the Remote DVR
1. The client DVR must activate Control Center Service (No. 2, Figure 2-2) first.
2. At the Control Center, highlight a host in the DVR List.
Then click the Remote Control button
on the Host List and select Remote DVR.
If the connection is established, the main screen of the client DVR will display on the Control
Center desktop. At the same time, the client DVR will display the following message,
advising the GV-System is in use and has been locked.
Figure 6-1