CCTV Lens Finder App Tested

Author: John Honovich, Published on Nov 11, 2012

Figuring out the right lens needed for a specific camera location can be difficult, especially if you want to monitor something that is not close to the camera. Do you need a 10mm lens, a 30mm lens or perhaps even a longer one? In this note, we review a 99 cent CCTV Lens Finder iOS application that lets you find the exact lens length with your iPhone or iPad's built in camera. We conclude with a test video examining the entire workflow.

[UPDATE: This app is no longer available and we cannot find any replacements or alternatives.]

******

*** *** **** *** **** * ***** ** *** **** you **** ** *******. **** ** **** **** *** ***** should ** ***** **** *** **** ***** *** ****** **** be *******. ****, *** *** ********* *** / **** *** zoom *** ***** ** ******** *** ******* *** *** **** shot.

*** *********** *******:

  • ******* *** ***** ** **.* *******, *** ****** *** **** surveillance ***** (***** *** ***** ** - ** *******). *******, for **** *****, **** ** *** ** ****** *** ********* as **** ******* **** **** ********* ****** **** ***** **** range. [****: **** *********** ** * ******** ** *** ***** in ******.]
  • *** *** **** *** ******* *** */*", */*" *** */*" imagers. **** **** ****** ****** ****** ** **** ****** *** the ************ ****** */*.*" *** */*.*" **** ** ****** ********* today.
  • ** ******* *******.

**** *****, ***'* **** ** * ********* *******. ******* *** want ** ***** * ****** ** * ******** **** **** so:

mounting location

**** ****** **** ******* **** *** ******* ****** ******** **** the ******* ***.

area of interest

*** **** ** ****** *** **** *** ***** **** ****** to ***** **** **** **. *** **** * ******* *** load ** **** *** *********** **** **:

full finder

**** *** *** ******** ** **** *** ***** ** *** area ** ********:

 zoomed

*** ****** ** **** *** *** ***** *** ** ******* that * ****+ **** ** ******. **** ***** ** **** to ********* **** *** **** **** ** * - **** lens.

***** ** * ***** **** **** *** ** **** ********:

*** ** *****, **** ** * **** ***** *********** **** can *** *************** ****** *** ******* **** ****** *** **** ***** *******.

[******: **** *** ** ** ****** ********* *** ** ****** find *** ************ ** ************.]

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Tools

Installing Box Cameras Indoors Tutorial on May 22, 2018
This tutorial starts our physical installation for video surveillance series, starting with Box Cameras, one of the oldest and most basic types....
Measuring For Security Installation Guide on May 15, 2018
Accurate measurement is a fundamental skill, yet many installers do not know how to do it. Using these tools are a key skill needed for security...
30+ Emerging Tech Companies Examined on Mar 28, 2018
ISC West has a new segment for 2018: the 'Emerging Technology Zone', which they boast: Featuring 50 of the latest and greatest startup...
Dynamic vs. Static IP Addresses Tutorial on Mar 01, 2018
While many cameras default to DHCP out of the box, that does not mean you should use it. This may seem basic for some, but those new to the...
Visio For Video Surveillance Design on Feb 20, 2018
Many integrators have standardized on AutoCAD for camera layouts but new users may be overwhelmed by its learning curve. Microsoft's Visio...
Project Plans for Security Integrators on Jan 26, 2018
How do security integrators typically plan projects? A detailed playbook with step by step execution? Just go out and do it? Somewhere in...
Access Control Job Walk Guide on Sep 26, 2017
Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting...
Favorite Integrator Tablets 2017 on Sep 11, 2017
What percentage of integrators use tablets? Which tablets do they prefer? Apple? Android? Windows? Tablets have become popular integrator tools...
Favorite Network Termination Tools on Sep 06, 2017
Thomas Carlyle said "Man is a tool-using animal. Without tools he is nothing, with tools he is all." For security integrators, their tools are...
Vulnerability Directory For Access Control Cards on Aug 14, 2017
Knowing which access credentials are insecure can be unclear, especially because most look and feel the same. Even the most insecure 125 kHz types...

Most Recent Industry Reports

Software Only VMS vs NVR Appliances on May 23, 2018
Should you buy your own PC/server and load VMS software on it or get a turnkey appliance (both hardware and software, e.g., NVR, Hybrid DVR) from a...
Buy Arecont: Top Bid $10 Million Cash on May 22, 2018
Last year, Arecont had a deal for a purchase price of $170 million (see Failed Arecont China Acquisition). This year, Arecont has a deal for a...
Installing Box Cameras Indoors Tutorial on May 22, 2018
This tutorial starts our physical installation for video surveillance series, starting with Box Cameras, one of the oldest and most basic types....
The Hikvision Smart Classroom Behavior Management System on May 22, 2018
Hikvision's rapidly growing offering of analytics, which we most recently examined with Hikvision's ethnic minority analytics, is now going into...
Dahua Intrusion Analytics And VMD Tested on May 21, 2018
Dahua ships basic analytics on practically all their cameras, ranging from low cost to high end. To see how these analytics work in real world...
Exacq Improving Technical Support, Responding To Integrator Complaints on May 21, 2018
Exacq had been a long-term favorite of integrators, but since their 2014 Tyco acquisition, Exacq has fallen in IPVM integrator studies (though...
Best Manufacturer Technical Support 2018 on May 21, 2018
While 5 manufacturers made the worst technical support 2018 list, only 3 stood out as providing the best technical support to 190+ integrators in...
Stealth / UCIT - Remote Video Monitoring Provider Profile on May 18, 2018
Can 2 remote video monitoring companies, Stealth Monitoring from the US and UCIT from Canada combine to impact the market and compete in a changing...
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact