EYES protocol documentation

Posted on 2013-08-28
Medium Priority
Last Modified: 2013-08-29
Is there a published specification for the EYES protocol which is used for remote Pan,Tilt and Zoom control (PTZ) of CCTV cameras.
Question by:alcindor
LVL 85

Accepted Solution

David Johnson, CD, MVP earned 1600 total points
ID: 39447652
LVL 70

Assisted Solution

Merete earned 400 total points
ID: 39448419
You could start here,  this answers a lot of questions and that may just steer you in the right direction with your own questions it is very comprehensive so please do read what you will right to the bottom.
CCTV cameras may have priority documentation specific to that type and model / country..
Like in a Manual.
FAQs Tele Eye

Author Closing Comment

ID: 39448697
I had already seen the Pelco-D document but was not sure if the protocol was a superset of the EYES protocol or equivalent to it. The teleeye site contained a lot of useful information but not any detail regarding ptz control protocols.

Featured Post

The Lifecycle Approach to Managing Security Policy

Managing application connectivity and security policies can be achieved more effectively when following a framework that automates repeatable processes and ensures that the right activities are performed in the right order.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

The onset of year 2018 has been a usual business for IT teams still struggling to find their way out in terms of strengthening their cloud security.
You do not need to be a security expert to make the RIGHT security. You just need some 3D guidance, to help lay out an action plan to secure your business operations. It does not happen overnight. You just need to start now and do the first thin…
This video teaches viewers how to process images for a time-lapse video. Programs required: Adobe Lightroom, Adobe After Effects, Video Editing Program. In Adobe Lightroom: Import sequence image files into Adobe Lightroom: Develop settings of an I…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

597 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question