i Cam has been featured on the Today Show, CNN, and Good Morning America in addition to the "Dog Lover" i Phone TV Ad - uses include baby monitor, pet cam, nanny cam, spy cam, and security camera.
Record and playback Motion Events and Receive Push Notifications on your i Phone, i Pod touch, or i Pad when Motion is Detected by your i Cam Source(s) - Visit video demonstrations.
Enter an i Cam Login and Password of your choosing (no need to register or create an account, but make sure they are not easily guessed) and click the Start button. Tap a video thumbnail to Zoom In, and Double-Tap (i OS) or press Back (Android) to Zoom Out. :)i Cam and i Cam Source use the same firewall- and router-piercing technologies and algorithms developed for to perform zero-config peer-to-peer connections.
Repeat Steps 2 & 3 for any additional computers and Steps 4 & 5 for any additional i OS or Android devices, being sure to use the same Login and Password for all of them. In most situations, things should "just work" unless your network is particularly complex or restricted.
Event backups can then be easily viewed from i Cam or the web if the i Cam Source ever goes offline or the computer is stolen.The cloud based backup is just an unnecessary way to get more $$$out of you. Some of us know what we are doing, and it looks dangerously like you are trying to gain some extra revenue from those that do not. I have 2 wireless Amcrest cameras that work flawlessly anywhere in the world with their app and makes this look like amateur hour in contrast. Being a computer tech that knows how to setup his own network I do not like being asked to pay for a proxy server when it worked just fine. In addition, your i Cam Login and Password are never sent to our servers, so your video feeds are able to be kept completely private.The Auto-Lock Override simply prevents your device from automatically dimming its screen and going to "sleep" after a short period of inactivity whenever i Cam is running.