TeleEye NF 636 IP camera
Technical Specification
- Make: TeleEye
- Model code: NF 636
- Series: TeleEye III+ Series
- Chip Inch Size: 1/3 inch
- Colour Type: Colour
TeleEye III+ NF Network Camera connects directly to any TCP/IP network for video trans mission in a cost effective and flexible manner. By deploying the camera with TeleEye propriety software, organisations can build a companywide video surveillance system monitoring up to 16 cameras simultaneously, event handling, motion-detection and multiple-user connection. Building up a separate video network using coaxial cable is no longer required.
Read more| Make | TeleEye |
|---|---|
| Manufacturer | TeleEye Europe Ltd. |
| Category | CCTV>IP cameras |
| Model code | NF 636 |
| Chip Inch Size | 1/3 inch |
| Colour Type | Colour |
| Resolution | 625 resolution |
| Specialist Type | Network |
| Sensitivity Lux | 0.01 |
| Auto Iris | Yes |
| Direct Drive | Yes |
| Lens Mount | CS mount |
| Motion Activated | Yes |
| Picture Elements HxV | 640 x 480 |
| Network Properties |
Image Frame Rate: max 25 Interface: PCMCIA, 10/100 Base-T Ethernet |
| Additional info | TeleEye III+ NF Network Camera connects directly to any TCP/IP network for video trans mission in a cost effective and flexible manner. By deploying the camera with TeleEye propriety software, organisations can build a companywide video surveillance system monitoring up to 16 cameras simultaneously, event handling, motion-detection and multiple-user connection. Building up a separate video network using coaxial cable is no longer required. |
Compare TeleEye NF 636 with IP cameras from other manufacturers
You might be interested in these products
Related Whitepapers
2023 trends in video surveillance
The benefits of Edge AI + Cloud for security systems
Video technology: making cities safer & improving lives
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
