+ All Categories
Home > Documents > Admin Guide

Admin Guide

Date post: 10-Feb-2016
Category:
Upload: chiquim66624
View: 224 times
Download: 0 times
Share this document with a friend
Description:
Documentação lexmark
Popular Tags:
28
Embedded Scan to Network Administrator's Guide December 2008 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or other countries. All other trademarks are the property of their respective owners. © 2008 Lexmark International, Inc. All rights reserved. 740 West New Circle Road Lexington, Kentucky 40550
Transcript
Page 1: Admin Guide

Embedded Scan to Network

Administrator's Guide

December 2008 www.lexmark.com

Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or other countries.All other trademarks are the property of their respective owners.

© 2008 Lexmark International, Inc.All rights reserved.740 West New Circle RoadLexington, Kentucky 40550

Page 2: Admin Guide

Edition noticeDecember 2008The following paragraph does not apply to any country where such provisions are inconsistent with local law: LEXMARK INTERNATIONAL,INC., PROVIDES THIS PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express orimplied warranties in certain transactions; therefore, this statement may not apply to you.This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; thesechanges will be incorporated in later editions. Improvements or changes in the products or the programs described may be made at any time.For Lexmark technical support, visit support.lexmark.com.For information on supplies and downloads, visit www.lexmark.com.If you don't have access to the Internet, you can contact Lexmark by mail:Lexmark International, Inc.Bldg 004-2/CSC740 New Circle Road NWLexington, KY 40550References in this publication to products, programs, or services do not imply that the manufacturer intends to make these available in all countriesin which it operates. Any reference to a product, program, or service is not intended to state or imply that only that product, program, or servicemay be used. Any functionally equivalent product, program, or service that does not infringe any existing intellectual property right may be usedinstead. Evaluation and verification of operation in conjunction with other products, programs, or services, except those expressly designated bythe manufacturer, are the user’s responsibility.© 2008 Lexmark International, Inc.All rights reserved.

UNITED STATES GOVERNMENT RIGHTSThis software and any accompanying documentation provided under this agreement are commercial computer software and documentationdeveloped exclusively at private expense.

TrademarksLexmark, Lexmark with diamond design, and MarkVision are trademarks of Lexmark International, Inc., registered in the United States and/or othercountries.All other trademarks are the property of their respective owners.This online FAQ file could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; thesechanges will be incorporated in later versions of the FAQ. Improvements or changes in the products or the programs described may be made atany time.Lexmark and MarkVision Professional are trademarks of Lexmark International, Inc., registered in the United States and/or other countries.All other trademarks are the property of their respective owners.© 2008 Lexmark International, Inc.All rights reserved.Lexmark International, Inc.740 West New Circle RoadLexington, Kentucky 40550U.S.A.

Page 3: Admin Guide

ContentsIntroduction........................................................................................5

Learning about Embedded Scan to Network..............................................................................................................5

Setting up Lexmark Embedded Scan to Network.......................6Configuring the solution using the Embedded Web Server..................................................................................6

Adding a destination........................................................................................................................................................................6Editing a destination.........................................................................................................................................................................7Deleting a destination......................................................................................................................................................................7Additional configuration options ................................................................................................................................................8

Configuring the solution using MarkVision Professional........................................................................................9Adding a destination........................................................................................................................................................................9Editing a destination...................................................................................................................................................................... 10Deleting a destination................................................................................................................................................................... 11Exporting and importing the solution ................................................................................................................................... 11

Using Lexmark Embedded Scan to Network..............................12Scanning documents at the printer..............................................................................................................................12

Troubleshooting...............................................................................13The Scan to Network Icon is missing............................................................................................................................13

An application error has occurred.................................................................................................................................13

A Network destination stopped working or is invalid............................................................................................13Make sure the printer authentication is configured .......................................................................................................... 13Make sure destination has a valid network address .......................................................................................................... 13Make sure the printer is connected to the network........................................................................................................... 14

The printer cannot scan to the selected destination..............................................................................................14

Notices................................................................................................15

Index...................................................................................................28

Contents

3

Page 4: Admin Guide

4

Page 5: Admin Guide

Introduction

Learning about Embedded Scan to NetworkThe Embedded Scan to Network solution is an embedded Java application that is installed as a flash file onmultifunction printers (MFPs) which support the Lexmark Embedded Solutions Framework (LeSF). It allows users atthe printer to scan their documents to network destinations specified by the network administrator. This documentis intended for use by Lexmark service providers and administrators responsible for the implementation andmanagement of this software in their network environment.

After the destinations (shared network folders) have been established on the network, the setup process for thesolution involves installing and configuring the application on the appropriate printer(s). There are two methods forsetting up the solution. The first method involves accessing the embedded Web page of the printers on which thesolution will be installed. The second method utilizes the MarkVisionTM Professional printer management utility(version 11.0 or later).

Introduction

5

Page 6: Admin Guide

Setting up Lexmark Embedded Scan toNetwork

Configuring the solution using the Embedded WebServer

Adding a destination1 From the Embedded Web Server, click Settings Embedded Solutions Lexmark Embedded Scan to

Network Configure.

2 Click Add.

3 Enter a name for the destination.

4 Select Network Folder or FTP Address, and then enter the destination address. If the destination resides withina different Windows domain than the printer, enter the Windows domain for the destination in the domain fieldso that the printer can correctly access the destination.

Note: If the printer has difficulty connecting with the destination, the Broadcast Address may also be enteredto help connect to the destination, but is not required.

5 Select whether to require user authentication for this destination. Authentication options include:

• Guest (Network Folder) / Anonymous (FTP)—Authentication will not be required. Users will not beprompted to enter authentication credentials to access the Embedded Web Server when this option isselected.

• Use MFP authentication credentials—By selecting this option, the user will be prompted to enter theauthentication credentials for the printer when they select the Scan to Network icon. As a result, theauthentication settings for the printer must be configured appropriately in order for this option to workcorrectly. For information on configuring the printer authentication settings, see the printer User's Guideavailable on the Software and Documentation CD that came with the printer.

• Prompt for username and password—If authentication credentials are required for the selected destination,this option should be used to prompt the user for the username and password required for the destinationafter it has been selected.

• Use static username and password—This option uses the authentication credentials for the destination asspecified in the username and password fields, without requiring the user to enter them at the touch screen.

6 Under Scan Settings, select the settings to be used as defaults. Selecting the check box next to each setting willallow users to change that setting when scanning a document. Clear the check box to prevent users from changingthe setting from the established default value when using the scanner.

7 Enter a default file name for files scanned to the destination, and select the appropriate file name settings.• Select the Allow user to enter file name check box to let users override this default file name.

• Select the Append time stamp check box if you want the printer to add a time signature to the file namewhen saving a file.

Setting up Lexmark Embedded Scan to Network

6

Page 7: Admin Guide

• Select the Overwrite existing file check box to automatically replace an existing file of the same name. Whenthe check box is not selected, the printer queries users for how to handle a duplicate file name if it encountersone.

Note: Append time stamp or Overwrite existing file must be selected. If neither of these settings is selected, anda file using the default file name already exists in the destination, there will be no method in place to differentiatea newly scanned file from an existing file. The printer will not be able to save the new scan to the destination,and an error may occur.

8 Make any selections under Other Options:

• Enable basic XML index file—The printer generates a basic XML index file in the destination folder. Theindex lists details about the scan job such as the user who scanned the job (if authentication is turned on)and the settings used to scan the job (except for custom jobs, which have no uniform scan settings). Theadministrator can use this file to write or use an external application to move or handle files.

• Allow user to navigate through folders—Users at the printer can browse through subfolders within thedestination folder and select where to save their scan job.

• Allow user to create folder—Users at the printer can create a subfolder within the destination folder andsave their scan job in it.

• Start in username folder (create if it doesn't exist)—The printer saves each user's scanned documents ina subfolder named for their username within the destination folder.

9 Adjust the settings for the scan confirmation page:

• Print Confirmation—Select Yes to print a confirmation page. Select No to not print a confirmation page.Select Allow User to Choose to prompt the user to choose whether to print a confirmation page after thejob is complete.

10 Click OK.

Editing a destination1 From the Embedded Web Server, click Settings Embedded Solutions Lexmark Embedded Scan to

Network Configure.

2 Select the destination you want to edit from the list of available Scan Destinations.

3 Click Edit to change the destination settings.

4 Change the settings.

5 Click OK to apply the changes.

Deleting a destination1 From the Embedded Web Server, click Settings Embedded Solutions Lexmark Embedded Scan to

Network Configure.

2 Select the destination you want to delete from the list of available Scan Destinations.

3 Click Delete to remove the destination.

4 Click OK to delete the destination.

Setting up Lexmark Embedded Scan to Network

7

Page 8: Admin Guide

Additional configuration options

Exporting a configurationThe solution lets you export all your current configuration settings into a text file that can then be imported and usedto apply the settings to one or more additional printers. The file contains snapshots of the settings for each destination,as well as your general solution settings.

1 From the Embedded Web Server, click Settings Embedded Solutions Lexmark Embedded Scan toNetwork Configure.

2 Click Export.

3 Follow the browser prompts to save the configuration file. You will have the option to enter a unique file nameor use the default name snf.xml.

Importing a configuration

1 From the Embedded Web Server, click Settings Embedded Solutions Lexmark Embedded Scan toNetwork Configure.

2 Click Import at the bottom of the page.

3 Browse to the saved configuration file, and then load or preview it.

Changing the display icons and labelsThe Configure tab provides the option to change the Embedded Scan to Network icons and associated text thatappear on the printer display. If you do not want to use the default icons, you can import new icons to be used forboth the pressed and unpressed button states.

Note: Replacement icons must be .GIF files under 11KB in size.

1 From the Embedded Web Server, click Settings Embedded Solutions Lexmark Embedded Scan toNetwork Configure.

2 Select the Custom option next to each field that you want to change.

3 Enter text, or browse to the appropriate image file.

4 Click either Apply to save the settings or Reset to return to the previous settings.

Setting up Lexmark Embedded Scan to Network

8

Page 9: Admin Guide

Configuring the solution using MarkVisionProfessional

Adding a destination1 From the MarkVision Professional Home screen, select Embedded Solutions - Solutions Management from the

All Tasks list.

2 Using the Quick Find or Folders tabs, select the device(s) the document accounting software will be configuredfor.

Use Ctrl + click and Shift + click to select multiple devices.

Note: Password-protected network devices are displayed in red. Enter the device password to gain access to thedevice.

3 Click Add.

4 Enter a name for the destination.

5 Select Network Folder or FTP Address, and then enter the destination's address. If the destination resides withina different Windows domain than the printer, enter the Windows domain for the destination in the domain fieldso that the printer can correctly access the destination.

Note: If the printer has difficulty connecting with the destination, Broadcast Address may also be entered tohelp connect to the destination, but is not required.

6 Choose whether to require user authentication for this destination. Authentication options include:

• Guest (Network Folder) / Anonymous (FTP)—Authentication will not be required. Users will not beprompted to enter authentication credentials to access the Embedded Web Server when this option isselected.

• Use MFP authentication credentials—The user will be prompted to enter the authentication credentialsfor the printer when they select the Scan to Network icon. As a result, the authentication settings for theprinter must be configured appropriately in order for this option to work correctly. For information onconfiguring the printer authentication settings, see the printer User's Guide available on the Software andDocumentation CD that came with the printer.

• Prompt for username and password—If authentication credentials are required for the selected destination,this option should be used to prompt the user for the username and password required for the destinationafter it has been selected.

• Use static username and password—This option uses the authentication credentials for the destination asspecified in the username and password fields, without requiring the user to enter them at the touch screen.

7 Under Scan Settings, select the settings to be used as defaults. Selecting the check box next to each setting willallow users to change that setting when scanning a document. Clear the check box to prevent users from changingthe setting from the established default value when using the scanner.

8 Enter a default file name for files scanned to the destination, and select the appropriate file name settings.

• Select the Allow user to enter file name check box to let users override this default file name.

• Select the Append time stamp check box if you want the printer to add a time signature to the file namewhen saving a file.

Setting up Lexmark Embedded Scan to Network

9

Page 10: Admin Guide

• Select the Overwrite existing file check box to automatically replace an existing file of the same name. Whenthe check box is not selected, the printer queries users for how to handle a duplicate file name if it encountersone.

Note: ”Append time stamp” or “Overwrite existing file” must be selected. If neither of these settings is selected,and a file using the default file name already exists in the destination, then there will be no method in place todifferentiate a newly scanned file from an existing file. The printer will not be able to save the new scan to thedestination, and an error may occur.

9 Make any selections under Other Options:

• Enable basic XML index file—The printer generates a basic XML index file in the destination folder. Theindex lists details about the scan job such as the user who scanned the job (if authentication is turned on)and the settings used to scan the job (except for custom jobs, which have no uniform scan settings). Theadministrator can use this file to write or use an external application to move or handle files.

• Allow user to navigate through folders—Users at the printer can browse through subfolders within thedestination folder and select where to save their scan job.

• Allow user to create folder—Users at the printer can create a subfolder within the destination folder andsave their scan job in it.

• Start in username folder (create if it doesn't exist)—The printer saves each user's scanned documents ina subfolder named for their username within the destination folder.

10 Adjust the settings for the scan confirmation page:

• Print Confirmation—Select Yes to print a confirmation page. Select No to not print a confirmation page.Select Allow User to Choose to prompt the user to choose whether to print a confirmation page after thejob is complete.

11 Click OK.

Editing a destination1 From the MarkVision Professional Home screen, select Embedded Solutions - Solutions Management from the

All Tasks list.

2 Using the Quick Find or Folders tabs, select the device(s) the document accounting software will be configuredfor.

Use Ctrl + click and Shift + click to select multiple devices.

Note: Password-protected network devices are displayed in red. Enter the device password to gain access to thedevice.

3 Select the destination you want to edit from the list of available Scan Destinations.

4 Click Edit to change the destination settings.

5 Change the settings.

6 Click OK to apply the changes.

Setting up Lexmark Embedded Scan to Network

10

Page 11: Admin Guide

Deleting a destination1 From the MarkVision Professional Home screen, select Embedded Solutions - Solutions Management from the

All Tasks list.

2 Using the Quick Find or Folders tabs, select the device(s) the document accounting software will be configuredfor.

Use Ctrl + click and Shift + click to select multiple devices.

Note: Password-protected network devices are displayed in red. Enter the device password to gain access to thedevice.

3 Select the destination you want to delete from the list of available Scan Destinations.

4 Click Delete to remove the destination.

5 Click OK to delete the destination.

Exporting and importing the solutionYou can use MarkVision Professional to apply an existing set of configuration settings to one or more printers on thenetwork.

1 In MarkVision Professional, click Settings Embedded Solutions Solutions Management task.

2 Select the printer with the configuration settings to be replicated.

3 Under the Embedded Scan to Network listing, click Export.

This exports the configuration settings from your printer to a configuration file.

4 Select the printer(s) to be configured with the exported settings.

5 Under the Embedded Scan to Network listing, click Import.

A File Open dialog appears.

6 Select the file you created.

This imports your configuration settings to the selected printers from the file.

Setting up Lexmark Embedded Scan to Network

11

Page 12: Admin Guide

Using Lexmark Embedded Scan toNetwork

Scanning documents at the printer1 Load the document into the scanner.

Note: Documents may be loaded into the scanner in multiple ways. For information on the different methodsfor loading documents into the scanner, see the User's Guide that came with the printer.

2 Touch the Scan to Network icon. If prompted, enter the username and password used to access the printer.Contact your network administrator for information on these authentication credentials.

3 Select the Scan to Network destination that you want to receive the scanned document. If prompted, enter theusername and password required to access the destination. Contact your network administrator for informationon these authentication credentials.

4 Some additional job options may be available depending on how the solution has been configured. TouchChange next to each option to update it. Contact your Network Administrator for more information on eachoption.

• Enter the name of a new or existing directory location (folder) within the selected destination.

• Enter a file name for the scanned document.

• Accept or change the scan settings, such as Paper Size and Paper Type, for your job.

• Select whether to print a confirmation page after the job is completed.

5 Touch Scan It.

Note: If each page of the document is being scanned individually, then you will be prompted to scan each pageconsecutively. After each page is scanned, load the next page into the scanner and touch the Scan the NextPage Button. Touch the Finish the Job button when all of the pages have been scanned. A confirmation screenappears to indicate whether the document was scanned successfully.

6 To scan additional documents, load the next document into the scanner and select one of the following from theconfirmation screen:

• Touch Yes, to same destination to scan the document to the previous destination, and repeat steps 4through 6.

• Touch Yes, to a different destination to scan a document to a different destination, and repeat steps 3through 6.

Touch No to finish the operation and return to the printer Home screen.

Using Lexmark Embedded Scan to Network

12

Page 13: Admin Guide

Troubleshooting

The Scan to Network Icon is missingFor the Scan to Network solution to work, at least one valid destination must be enabled. If no valid destinations areavailable, the Scan to Network Icon will disappear from the MFP touch screen.

An application error has occurredCheck the system log for relevant entries:

1 Type the printer IP address in the address field of your Web browser.

Note: The printer IP address is found in the top-left corner of the printer control panel display. If the IP addressis not readily apparent, see the printer documentation located on the Software and Documentation CD that camewith the printer for help locating the IP address.

2 Click Settings.

3 Under Other Settings, click Embedded Solutions.

4 Click the System tab.

5 From the System tab, click Log.

If you cannot isolate the problem, contact your Lexmark representative for additional help.

A Network destination stopped working or is invalidThere are several different reasons why a network destination may stop working or be invalid. Use the followingsolutions to help determine the problem with the destination. The printer system log may also be reviewed foradditional information.

MAKE SURE THE PRINTER AUTHENTICATION IS CONFIGURED

If the Scan to Network solution was configured to “Use MFP authentication credentials,” then the solution willutilize the existing printer authentication as the only form of authentication needed to access a destination. If theprinter authentication settings have not been configured, then the solution will not be able to access theauthentication information of the printer, and the destination will become unavailable because it cannotauthenticate the user.

MAKE SURE DESTINATION HAS A VALID NETWORK ADDRESS

If the destination has been moved, the network address may have changed. The destination network address canbe accessed from the embedded Web page. For information on accessing or editing a destination, see ConfiguringEmbedded Scan to Network.

Troubleshooting

13

Page 14: Admin Guide

MAKE SURE THE PRINTER IS CONNECTED TO THE NETWORK

Make sure that all appropriate network cables are securely connected and that the network settings of the printerare correctly configured. For information on Networking the printer, see the printer User's Guide and additionaldocumentation on the Software and Documentation CD that shipped with the printer.

The printer cannot scan to the selected destinationIf you encounter an error in which the printer cannot complete a scan to a selected destination, the destination mayeither be invalid or the printer cannot communicate with it.

• The destination is not valid.

Verify that the destination is valid on the Scan to Network configuration page.

If the destination has been moved, the network address may have changed. The destination network addresscan be accessed from the embedded Web page. For information on accessing or editing a destination, seeConfiguring Embedded Scan to Network.

• The destination exists within a different Windows domain than the printer.

If the destination exists within a different Windows domain than the printer, you can edit the destination fromthe Scan to Network configuration page and enter the appropriate Windows domain information in the domainfield as part of the Network Folder Address.

• The destination resides on a different subnet than the printer.

If the destination resides on a computer that uses a newer version of the Windows operating system (WindowsXP or newer), and the Windows Firewall is enabled, the printer may have difficulty sending information to thedestination if the destination and the printer reside on different subnets. The Windows Firewall must either beconfigured to allow communication with the subnet the printer resides on, or the destination should be set upon the same subnet as the printer.

• The printer will not overwrite an existing file (the name already exists within the destination), and the user cannotrename the file.

If the three configuration settings for the File Name section of the solution's configuration page are not selected(allow user to enter file name; append time stamp; overwrite existing file), and a file using the default file namealready exists within the destination, there will be no method in place to distinguish the newly scanned file fromthe file present in the destination. The printer will not be able to overwrite the old file, the new file will not receivea time stamp to differentiate it from the old file, and the user will not be able to give the new file a different name.In this case, the old file must either be removed from the destination, or one of the previously mentioned settingsmust be turned on.

• The network is down, or the printer cannot communicate over the network at present.

Verify all network connections and that the network settings of the printer are configured appropriately. Forinformation on networking the printer, see the User's Guide and additional documentation on the Software andDocumentation CD that shipped with the printer.

Troubleshooting

14

Page 15: Admin Guide

NoticesThis product includes software developed by the Apache Software Foundation (http://www.apache.org).

Apache License Version 2.0, January 2004http://www.apache.org/licenses/

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

1 Definitions.

"License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1through 9 of this document.

"Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License.

"Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or areunder common control with that entity. For the purposes of this definition, "control" means (i) the power, director indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii)ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity.

"You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License.

"Source" form shall mean the preferred form for making modifications, including but not limited to softwaresource code, documentation source, and configuration files.

"Object" form shall mean any form resulting from mechanical transformation or translation of a Source form,including but not limited to compiled object code, generated documentation, and conversions to other mediatypes.

"Work" shall mean the work of authorship, whether in Source or Object form, made available under the License,as indicated by a copyright notice that is included in or attached to the work (an example is provided in theAppendix below).

"Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) theWork and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole,an original work of authorship. For the purposes of this License, Derivative Works shall not include works thatremain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Worksthereof.

"Contribution" shall mean any work of authorship, including the original version of the Work and anymodifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensorfor inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalfof the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, orwritten communication sent to the Licensor or its representatives, including but not limited to communicationon electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or onbehalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication thatis conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution."

"Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has beenreceived by Licensor and subsequently incorporated within the Work.

2 Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grantsto You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce,prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and suchDerivative Works in Source or Object form.

Notices

15

Page 16: Admin Guide

3 Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants toYou a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section)patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where suchlicense applies only to those patent claims licensable by such Contributor that are necessarily infringed by theirContribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) wassubmitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit)alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patentinfringement, then any patent licenses granted to You under this License for that Work shall terminate as of thedate such litigation is filed.

4 Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium,with or without modifications, and in Source or Object form, provided that You meet the following conditions:

a (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and

b (b) You must cause any modified files to carry prominent notices stating that You changed the files; and

c (c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent,trademark, and attribution notices from the Source form of the Work, excluding those notices that do notpertain to any part of the Derivative Works; and

d (d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that Youdistribute must include a readable copy of the attribution notices contained within such NOTICE file, excludingthose notices that do not pertain to any part of the Derivative Works, in at least one of the following places:within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation,if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if andwherever such third-party notices normally appear. The contents of the NOTICE file are for informationalpurposes only and do not modify the License. You may add Your own attribution notices within DerivativeWorks that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided thatsuch additional attribution notices cannot be construed as modifying the License.

You may add Your own copyright statement to Your modifications and may provide additional or different licenseterms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Worksas a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditionsstated in this License.

5 Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted forinclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without anyadditional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the termsof any separate license agreement you may have executed with Licensor regarding such Contributions.

6 Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or productnames of the Licensor, except as required for reasonable and customary use in describing the origin of the Workand reproducing the content of the NOTICE file.

7 Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work(and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONSOF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible fordetermining the appropriateness of using or redistributing the Work and assume any risks associated with Yourexercise of permissions under this License.

Notices

16

Page 17: Admin Guide

8 Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, orotherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing,shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, orconsequential damages of any character arising as a result of this License or out of the use or inability to use theWork (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction,or any and all other commercial damages or losses), even if such Contributor has been advised of the possibilityof such damages.

9 Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You maychoose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligationsand/or rights consistent with this License. However, in accepting such obligations, You may act only on Your ownbehalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify,defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, suchContributor by reason of your accepting any such warranty or additional liability.

END OF TERMS AND CONDITIONS

APPENDIX: How to apply the Apache License to your work.

To apply the Apache License to your work, attach the following boilerplate notice, with the fields enclosed by brackets"[]" replaced with your own identifying information. (Don't include the brackets!) The text should be enclosed in theappropriate comment syntax for the file format. We also recommend that a file or class name and description ofpurpose be included on the same "printed page" as the copyright notice for easier identification within third-partyarchives.

Copyright [yyyy] [name of copyright owner]

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance withthe License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed onan "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the Licensefor the specific language governing permissions and limitations under the License.

GNU LESSER GENERAL PUBLIC LICENSEVersion 2.1, February 1999

Copyright (C) 1991, 1999 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA

Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.

[This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License,version 2, hence the version number 2.1.]

Preamble

The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNUGeneral Public Licenses are intended to guarantee your freedom to share and change free software--to make surethe software is free for all its users.

This license, the Lesser General Public License, applies to some specially designated software packages--typicallylibraries--of the Free Software Foundation and other authors who decide to use it. You can use it too, but we suggestyou first think carefully about whether this license or the ordinary General Public License is the better strategy to usein any particular case, based on the explanations below.

Notices

17

Page 18: Admin Guide

When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are designedto make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish);that you receive source code or can get it if you want it; that you can change the software and use pieces of it in newfree programs; and that you are informed that you can do these things.

To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to ask you tosurrender these rights. These restrictions translate to certain responsibilities for you if you distribute copies of thelibrary or if you modify it.

For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all therights that we gave you. You must make sure that they, too, receive or can get the source code. If you link other codewith the library, you must provide complete object files to the recipients, so that they can relink them with the libraryafter making changes to the library and recompiling it. And you must show them these terms so they know theirrights.

We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, whichgives you legal permission to copy, distribute and/or modify the library.

To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if thelibrary is modified by someone else and passed on, the recipients should know that what they have is not the originalversion, so that the original author's reputation will not be affected by problems that might be introduced by others.

Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that acompany cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder.Therefore, we insist that any patent license obtained for a version of the library must be consistent with the fullfreedom of use specified in this license.

Most GNU software, including some libraries, is covered by the ordinary GNU General Public License. This license,the GNU Lesser General Public License, applies to certain designated libraries, and is quite different from the ordinaryGeneral Public License. We use this license for certain libraries in order to permit linking those libraries into non-freeprograms.

When a program is linked with a library, whether statically or using a shared library, the combination of the two islegally speaking a combined work, a derivative of the original library. The ordinary General Public License thereforepermits such linking only if the entire combination fits its criteria of freedom. The Lesser General Public Licensepermits more lax criteria for linking other code with the library.

We call this license the "Lesser" General Public License because it does Less to protect the user's freedom than theordinary General Public License. It also provides other free software developers Less of an advantage over competingnon-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries.However, the Lesser license provides advantages in certain special circumstances.

For example, on rare occasions, there may be a special need to encourage the widest possible use of a certain library,so that it becomes a de-facto standard. To achieve this, nonfree programs must be allowed to use the library. A morefrequent case is that a free library does the same job as widely used non-free libraries. In this case, there is little togain by limiting the free library to free software only, so we use the Lesser General Public License.

In other cases, permission to use a particular library in non-free programs enables a greater number of people to usea large body of free software. For example, permission to use the GNU C Library in non-free programs enables manymore people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating system.

Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the user of aprogram that is linked with the Library has the freedom and the wherewithal to run that program using a modifiedversion of the Library.

The precise terms and conditions for copying, distribution and modification follow. Pay close attention to thedifference between a "work based on the library" and a "work that uses the library". The former contains code derivedfrom the library, whereas the latter must be combined with the library in order to run.

Notices

18

Page 19: Admin Guide

GNU LESSER GENERAL PUBLIC LICENSE

TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION

0. This License Agreement applies to any software library or other program which contains a notice placed by thecopyright holder or other authorized party saying it may be distributed under the terms of this Lesser General PublicLicense (also called "this License"). Each licensee is addressed as "you".

A "library" means a collection of software functions and/or data prepared so as to be conveniently linked withapplication programs (which use some of those functions and data) to form executables.

The "Library", below, refers to any such software library or work which has been distributed under these terms. A"work based on the Library" means either the Library or any derivative work under copyright law: that is to say, awork containing the Library or a portion of it, either verbatim or with modifications and/or translatedstraightforwardly into another language. (Hereinafter, translation is included without limitation in the term"modification".)

"Source code" for a work means the preferred form of the work for making modifications to it. For a library, completesource code means all the source code for all modules it contains, plus any associated interface definition files, plusthe scripts used to control compilation and installation of the library.

Activities other than copying, distribution and modification are not covered by this License; they are outside its scope.The act of running a program using the Library is not restricted, and output from such a program is covered only ifits contents constitute a work based on the Library (independent of the use of the Library in a tool for writing it).Whether that is true depends on what the Library does and what the program that uses the Library does.

1 You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium,provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice anddisclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; anddistribute a copy of this License along with the Library.

You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protectionin exchange for a fee.

2 You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library,and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meetall of these conditions:

a The modified work must itself be a software library.

b You must cause the files modified to carry prominent notices stating that you changed the files and the date ofany change.

c You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License.

d If a facility in the modified Library refers to a function or a table of data to be supplied by an application programthat uses the facility, other than as an argument passed when the facility is invoked, then you must make a goodfaith effort to ensure that, in the event an application does not supply such function or table, the facility still operates,and performs whatever part of its purpose remains meaningful.

(For example, a function in a library to compute square roots has a purpose that is entirely well-defined independentof the application. Therefore, Subsection 2d requires that any application-supplied function or table used by thisfunction must be optional: if the application does not supply it, the square root function must still compute squareroots.)

Notices

19

Page 20: Admin Guide

These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived fromthe Library, and can be reasonably considered independent and separate works in themselves, then this License, andits terms, do not apply to those sections when you distribute them as separate works. But when you distribute thesame sections as part of a whole which is a work based on the Library, the distribution of the whole must be on theterms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and everypart regardless of who wrote it.

Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather,the intent is to exercise the right to control the distribution of derivative or collective works based on the Library.

In addition, mere aggregation of another work not based on the Library with the Library (or with a work based onthe Library) on a volume of a storage or distribution medium does not bring the other work under the scope of thisLicense.

3 You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copyof the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinaryGNU General Public License, version 2, instead of to this License. (If a newer version than version 2 of the ordinaryGNU General Public License has appeared, then you can specify that version instead if you wish.) Do not make anyother change in these notices.

Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public Licenseapplies to all subsequent copies and derivative works made from that copy.

This option is useful when you wish to copy part of the code of the Library into a program that is not a library.

4 You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executableform under the terms of Sections 1 and 2 above provided that you accompany it with the complete correspondingmachine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a mediumcustomarily used for software interchange.

If distribution of object code is made by offering access to copy from a designated place, then offering equivalentaccess to copy the source code from the same place satisfies the requirement to distribute the source code, eventhough third parties are not compelled to copy the source along with the object code.

5 A program that contains no derivative of any portion of the Library, but is designed to work with the Library bybeing compiled or linked with it, is called a "work that uses the Library". Such a work, in isolation, is not a derivativework of the Library, and therefore falls outside the scope of this License.

However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the Library(because it contains portions of the Library), rather than a "work that uses the library". The executable is thereforecovered by this License. Section 6 states terms for distribution of such executables.

When a "work that uses the Library" uses material from a header file that is part of the Library, the object code for thework may be a derivative work of the Library even though the source code is not. Whether this is true is especiallysignificant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to betrue is not precisely defined by law.

If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros andsmall inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whetherit is legally a derivative work. (Executables containing this object code plus portions of the Library will still fall underSection 6.)

Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the termsof Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked directlywith the Library itself.

Notices

20

Page 21: Admin Guide

6 As an exception to the Sections above, you may also combine or link a "work that uses the Library" with the Libraryto produce a work containing portions of the Library, and distribute that work under terms of your choice, providedthat the terms permit modification of the work for the customer's own use and reverse engineering for debuggingsuch modifications.

You must give prominent notice with each copy of the work that the Library is used in it and that the Library and itsuse are covered by this License. You must supply a copy of this License. If the work during execution displays copyrightnotices, you must include the copyright notice for the Library among them, as well as a reference directing the userto the copy of this License. Also, you must do one of these things:

a Accompany the work with the complete corresponding machine-readable source code for the Library includingwhatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the workis an executable linked with the Library, with the complete machine-readable "work that uses the Library", as objectcode and/or source code, so that the user can modify the Library and then relink to produce a modified executablecontaining the modified Library. (It is understood that the user who changes the contents of definitions files in theLibrary will not necessarily be able to recompile the application to use the modified definitions.)

b Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses atrun time a copy of the library already present on the user's computer system, rather than copying library functionsinto the executable, and (2) will operate properly with a modified version of the library, if the user installs one, aslong as the modified version is interface-compatible with the version that the work was made with.

c Accompany the work with a written offer, valid for at least three years, to give the same user the materials specifiedin Subsection 6a, above, for a charge no more than the cost of performing this distribution.

d If distribution of the work is made by offering access to copy from a designated place, offer equivalent access tocopy the above specified materials from the same place.

e Verify that the user has already received a copy of these materials or that you have already sent this user a copy.

For an executable, the required form of the "work that uses the Library" must include any data and utility programsneeded for reproducing the executable from it. However, as a special exception, the materials to be distributed neednot include anything that is normally distributed (in either source or binary form) with the major components(compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itselfaccompanies the executable.

It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do notnormally accompany the operating system. Such a contradiction means you cannot use both them and the Librarytogether in an executable that you distribute.

7 You may place library facilities that are a work based on the Library side-by-side in a single library together withother library facilities not covered by this License, and distribute such a combined library, provided that the separatedistribution of the work based on the Library and of the other library facilities is otherwise permitted, and providedthat you do these two things:

a Accompany the combined library with a copy of the same work based on the Library, uncombined with any otherlibrary facilities. This must be distributed under the terms of the Sections above.

b Give prominent notice with the combined library of the fact that part of it is a work based on the Library, andexplaining where to find the accompanying uncombined form of the same work.

8 You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under thisLicense. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and willautomatically terminate your rights under this License. However, parties who have received copies, or rights, fromyou under this License will not have their licenses terminated so long as such parties remain in full compliance.

Notices

21

Page 22: Admin Guide

9 You are not required to accept this License, since you have not signed it. However, nothing else grants youpermission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you donot accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), youindicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifyingthe Library or works based on it.

10 Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives alicense from the original licensor to copy, distribute, link with or modify the Library subject to these terms andconditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. Youare not responsible for enforcing compliance by third parties with this License.

11 If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limitedto patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradictthe conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute soas to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as aconsequence you may not distribute the Library at all. For example, if a patent license would not permit royalty-freeredistribution of the Library by all those who receive copies directly or indirectly through you, then the only way youcould satisfy both it and this License would be to refrain entirely from distribution of the Library.

If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of thesection is intended to apply, and the section as a whole is intended to apply in other circumstances.

It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contestvalidity of any such claims; this section has the sole purpose of protecting the integrity of the free software distributionsystem which is implemented by public license practices. Many people have made generous contributions to thewide range of software distributed through that system in reliance on consistent application of that system; it is upto the author/donor to decide if he or she is willing to distribute software through any other system and a licenseecannot impose that choice.

This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.

12 If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrightedinterfaces, the original copyright holder who places the Library under this License may add an explicit geographicaldistribution limitation excluding those countries, so that distribution is permitted only in or among countries notthus excluded. In such case, this License incorporates the limitation as if written in the body of this License.

13 The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License fromtime to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address newproblems or concerns.

Each version is given a distinguishing version number. If the Library specifies a version number of this License whichapplies to it and "any later version", you have the option of following the terms and conditions either of that versionor of any later version published by the Free Software Foundation. If the Library does not specify a license versionnumber, you may choose any version ever published by the Free Software Foundation.

14 If you wish to incorporate parts of the Library into other free programs whose distribution conditions areincompatible with these, write to the author to ask for permission. For software which is copyrighted by the FreeSoftware Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decisionwill be guided by the two goals of preserving the free status of all derivatives of our free software and of promotingthe sharing and reuse of software generally.

NO WARRANTY

Notices

22

Page 23: Admin Guide

15 BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENTPERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OROTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR APARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU.SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR ORCORRECTION.

16 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER,OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TOYOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUTOF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEINGRENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TOOPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THEPOSSIBILITY OF SUCH DAMAGES.

END OF TERMS AND CONDITIONS

How to Apply These Terms to Your New Libraries

If you develop a new library, and you want it to be of the greatest possible use to the public, we recommend makingit free software that everyone can redistribute and change. You can do so by permitting redistribution under theseterms (or, alternatively, under the terms of the ordinary General Public License).

To apply these terms, attach the following notices to the library. It is safest to attach them to the start of each sourcefile to most effectively convey the exclusion of warranty; and each file should have at least the "copyright" line anda pointer to where the full notice is found.

<one line to give the library's name and a brief idea of what it does.>

Copyright (C) <year> <name of author>

This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General PublicLicense as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any laterversion.

This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the impliedwarranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public Licensefor more details.

You should have received a copy of the GNU Lesser General Public License along with this library; if not, write to theFree Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA

Also add information on how to contact you by electronic and paper mail.

You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer"for the library, if necessary. Here is a sample; alter the names:

Yoyodyne, Inc., hereby disclaims all copyright interest in the library `Frob' (a library for tweaking knobs) written byJames Random Hacker.

<signature of Ty Coon>, 1 April 1990

Ty Coon, President of Vice

That's all there is to it!

Notices

23

Page 24: Admin Guide

The MIT LicenseCopyright (c) 2008 John Resig, http://jquery.com/

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associateddocumentation files (the "Software"), to deal in the Software without restriction, including without limitation therights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permitpersons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of theSoftware.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOTLIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE ANDNONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUTOF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Notices

24

Page 25: Admin Guide

LEXMARK SOFTWARE LIMITED WARRANTY AND LICENSE AGREEMENTBY USING AND/OR INSTALLING THIS SOFTWARE, YOU AGREE TO BE BOUND BY ALL THE TERMS AND CONDITIONSOF THIS SOFTWARE LICENSE AGREEMENT. IF YOU DO NOT SO AGREE, DO NOT INSTALL, COPY, DOWNLOAD, OROTHERWISE USE THE SOFTWARE PROGRAM. IF YOU ARE INSTALLING THIS SOFTWARE PROGRAM FOR USE BY OTHERPARTIES, YOU AGREE TO INFORM THE USERS THAT USE OF THE SOFTWARE PROGRAM INDICATES ACCEPTANCE OFTHESE TERMS.

1 DISCLAIMER AND LIMITATION OF WARRANTIES. EXCEPT AS PROVIDED IN THIS SOFTWARE LICENSEAGREEMENT AND TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, LEXMARK AND ITS SUPPLIERSPROVIDE THE SOFTWARE PROGRAM "AS IS" AND HEREBY DISCLAIM ALL OTHER WARRANTIES AND CONDITIONS,EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, TITLE, NON-INFRINGEMENT, MERCHANTABILITYAND FITNESS FOR A PARTICULAR PURPOSE, AND ABSENCE OF VIRUSES, ALL WITH REGARD TO THE SOFTWAREPROGRAM. TO THE EXTENT LEXMARK CANNOT BY LAW DISCLAIM ANY COMPONENT OF THE IMPLIED WARRATIESOF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, LEXMARK LIMITS THE DURATION OF SUCHWARRANTIES TO THE 90-DAY TERM OF THE EXPRESS SOFTWARE LIMITED WARRANTY.

This Agreement is to be read in conjunction with certain statutory provisions, as that may be in force from timeto time, that imply warranties or conditions or impose obligations on Lexmark that cannot be excluded ormodified. If any such provisions apply, then to the extent Lexmark is able, Lexmark hereby limits its liability forbreach of those provisions to one of the following: providing you a replacement copy of the Software Programor reimbursement of the price paid for the Software Program.

The Software Program may include internet links to other software applications and/or internet web pages hostedand operated by third parties unaffiliated with Lexmark. You acknowledge and agree that Lexmark is notresponsible in any way for the hosting, performance, operation, maintenance, or content of, such softwareapplications and/or internet web pages.

2 LIMITATION OF REMEDY. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, ANY AND ALL LIABILITYOF LEXMARK UNDER THIS SOFTWARE LICENSE AGREEMENT IS EXPRESSLY LIMITED TO THE GREATER OF THE PRICEPAID FOR THE SOFTWARE PROGRAM AND FIVE U.S. DOLLARS (OR THE EQUIVALENT IN LOCAL CURRENCY). YOURSOLE REMEDY AGAINST LEXMARK IN ANY DISPUTE UNDER THIS SOFTWARE LICENSE AGREEMENT SHALL BE TOSEEK TO RECOVER ONE OF THESE AMOUNTS, UPON PAYMENT OF WHICH LEXMARK SHALL BE RELEASED ANDDISCHARGED OF ALL FURTHER OBLIGATIONS AND LIABILITY TO YOU.

IN NO EVENT WILL LEXMARK, ITS SUPPLIERS, SUBSIDIARIES, OR RESELLERS BE LIABLE FOR ANY SPECIAL,INCIDENTAL, INDIRECT, EXEMPLARY, PUNITIVE, OR CONSEQUENTIAL DAMAGES (INCLUDING BUT NOT LIMITEDTO LOST PROFITS OR REVENUES, LOST SAVINGS, INTERRUPTION OF USE OR ANY LOSS OF, INACCURACY IN, ORDAMAGE TO, DATA OR RECORDS, FOR CLAIMS OF THIRD PARTIES, OR DAMAGE TO REAL OR TANGIBLE PROPERTY,FOR LOSS OF PRIVACY ARISING OUT OR IN ANY WAY RELATED TO THE USE OF OR INABILITY TO USE THE SOFTWAREPROGRAM, OR OTHERWISE IN CONNECTION WITH ANY PROVISION OF THIS SOFTWARE LICENCE AGREEMENT),REGARDLESS OF THE NATURE OF THE CLAIM, INCLUDING BUT NOT LIMITED TO BREACH OF WARRANTY ORCONTRACT, TORT (INCLUDING NEGLIGENCE OR STRICT LIABILITY), AND EVEN IF LEXMARK, OR ITS SUPPLIERS,AFFILIATES, OR REMARKETERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, OR FOR ANY CLAIMBY YOU BASED ON A THIRD-PARTY CLAIM, EXCEPT TO THE EXTENT THIS EXCLUSION OF DAMAGES IS DETERMINEDLEGALLY INVALID. THE FOREGOING LIMITATIONS APPLY EVEN IF THE ABOVE-STATED REMEDIES FAIL OF THEIRESSENTIAL PURPOSE.

3 U.S.A. STATE LAWS. This Software Limited Warranty gives you specific legal rights. You may also have otherrights that vary from state to state. Some states do not allow limitations on how long an implied warranty lastsor the exclusion of limitation of incidental or consequential damages, so the above limitations may not apply toyou.

Notices

25

Page 26: Admin Guide

4 LICENSE GRANT. Lexmark grants you the following rights provided you comply with all terms and conditions ofthis Software License Agreement:

a Use. You may Use one (1) copy of the Software Program. The term “Use” means storing, loading, installing,executing, or displaying the Software Program. If Lexmark has licensed the Software Program to you forconcurrent use, you must limit the number of authorized users to the number specified in your agreementwith Lexmark. You may not separate the components of the Software Program for use on more than onecomputer. You agree that you will not Use the Software Program, in whole or in part, in any manner that hasthe effect of overriding, modifying, eliminating, obscuring, altering or de-emphasizing the visual appearanceof any trademark, trade name, trade dress or intellectual property notice that appears on any computer displayscreens normally generated by, or as a result of, the Software Program.

b Copying. You may make one (1) copy of the Software Program solely for purposes of backup, archiving, orinstallation, provided the copy contains all of the original Software Program’s proprietary notices. You maynot copy the Software Program to any public or distributed network.

c Reservation of Rights. The Software Program, including all fonts, is copyrighted and owned by LexmarkInternational, Inc. and/or its suppliers. Lexmark reserves all rights not expressly granted to you in this SoftwareLicense Agreement.

d Freeware. Notwithstanding the terms and conditions of this Software License Agreement, all or any portionof the Software Program that constitutes software provided under public license by third parties (“Freeware”)is licensed to you subject to the terms and conditions of the software license agreement accompanying suchFreeware, whether in the form of a discrete agreement, shrink-wrap license, or electronic license terms at thetime of download or installation. Use of the Freeware by you shall be governed entirely by the terms andconditions of such license.

5 TRANSFER. You may transfer the Software Program to another end-user. Any transfer must include all softwarecomponents, media, printed materials, and this Software License Agreement and you may not retain copies ofthe Software Program or components thereof. The transfer may not be an indirect transfer, such as a consignment.Prior to the transfer, the end-user receiving the transferred Software Program must agree to all these SoftwareLicense Agreement terms. Upon transfer of the Software Program, your license is automatically terminated. Youmay not rent, sublicense, or assign the Software Program except to the extent provided in this Software LicenseAgreement.

6 UPGRADES. To Use a Software Program identified as an upgrade, you must first be licensed to the originalSoftware Program identified by Lexmark as eligible for the upgrade. After upgrading, you may no longer use theoriginal Software Program that formed the basis for your upgrade eligibility.

7 LIMITATION ON REVERSE ENGINEERING. You may not alter, decrypt, reverse engineer, reverse assemble,reverse compile or otherwise translate the Software Program or assist or otherwise facilitate others to do so,except as and to the extent expressly permitted to do so by applicable law for the purposes of inter-operability,error correction, and security testing. If you have such statutory rights, you will notify Lexmark in writing of anyintended reverse engineering, reverse assembly, or reverse compilation. You may not decrypt the SoftwareProgram unless necessary for the legitimate Use of the Software Program.

8 ADDITIONAL SOFTWARE. This Software License Agreement applies to updates or supplements to the originalSoftware Program provided by Lexmark unless Lexmark provides other terms along with the update orsupplement.

9 TERM. This Software License Agreement is effective unless terminated or rejected. You may reject or terminatethis license at any time by destroying all copies of the Software Program, together with all modifications,documentation, and merged portions in any form, or as otherwise described herein. Lexmark may terminate yourlicense upon notice if you fail to comply with any of the terms of this Software License Agreement. Upon suchtermination, you agree to destroy all copies of the Software Program together with all modifications,documentation, and merged portions in any form.

Notices

26

Page 27: Admin Guide

10 TAXES. You agree that you are responsible for payment of any taxes including, without limitation, any goods andservices and personal property taxes, resulting from this Software License Agreement or your Use of the SoftwareProgram.

11 LIMITATION ON ACTIONS. No action, regardless of form, arising out of this Software License Agreement maybe brought by either party more than two years after the cause of action has arisen, except as provided underapplicable law.

12 APPLICABLE LAW. This Software License Agreement is governed by the laws of the Commonwealth of Kentucky,United States of America. No choice of law rules in any jurisdiction shall apply. The UN Convention on Contractsfor the International Sale of Goods shall not apply.

13 UNITED STATES GOVERNMENT RESTRICTED RIGHTS. The Software Program has been developed entirely atprivate expense. Rights of the United States Government to use the Software Program are as set forth in thisSoftware License Agreement and as restricted in DFARS 252.227-7014 and in similar FAR provisions (or anyequivalent agency regulation or contract clause).

14 CONSENT TO USE OF DATA. You agree that Lexmark, its affiliates, and agents may collect and use informationyou provide in relation to support services performed with respect to the Software Program and requested byyou. Lexmark agrees not to use this information in a form that personally identifies you except to the extentnecessary to provide such services.

15 EXPORT RESTRICTIONS. You may not (a) acquire, ship, transfer, or reexport, directly or indirectly, the SoftwareProgram or any direct product therefrom, in violation of any applicable export laws or (b) permit the SoftwareProgram to be used for any purpose prohibited by such export laws, including, without limitation, nuclear,chemical, or biological weapons proliferation.

16 CAPACITY AND AUTHORITY TO CONTRACT. You represent that you are of the legal age of majority in the placeyou sign this Software License Agreement and, if applicable, you are duly authorized by your employer or principalto enter into this contract.

17 ENTIRE AGREEMENT. This Software License Agreement (including any addendum or amendment to thisSoftware License Agreement that is included with the Software Program) is the entire agreement between youand Lexmark relating to the Software Program. Except as otherwise provided for herein, these terms andconditions supersede all prior or contemporaneous oral or written communications, proposals, andrepresentations with respect to the Software Program or any other subject matter covered by this SoftwareLicense Agreement (except to the extent such extraneous terms do not conflict with the terms of this SoftwareLicense Agreement, any other written agreement signed by you and Lexmark relating to your Use of the SoftwareProgram). To the extent any Lexmark policies or programs for support services conflict with the terms of thisSoftware License Agreement, the terms of this Software License Agreement shall control.

Notices

27

Page 28: Admin Guide

IndexAadding a destination

using MarkVision Professional 9using the Embedded Web

Server 6

Cconfiguring the solution

adding a destination usingMarkVision Professional 9

adding a destination using theEmbedded Web Server 6

changing the display icons andlabels 8

deleting a destination usingMarkVision Professional 11

deleting a destination using theEmbedded Web Server 7

editing a destination usingMarkVision Professional 10

editing a destination using theEmbedded Web Server 7

exporting a configuration 8importing a configuration 8using MarkVision Professional 11

Ddeleting a destination

using MarkVision Professional 11using the Embedded Web

Server 7

Eediting a destination

using MarkVision Professional 10using the Embedded Web

Server 7Embedded Scan to Network 5exporting a configuration 8exporting the solution

using MarkVision Professional 11

Iimporting a configuration 8importing the solution

using MarkVision Professional 11

Nnotices 2

Sscanning documents at theprinter 12

TTroubleshooting

A Network destination stoppedworking or is invalid 13

troubleshooting an application error has

occurred 13cannot scan to the selected

destination 14Scan to Network icon is

missing 13

Index

28


Recommended