The compact MAC335 universal code reader from Pepperl+Fuchs can read all common 1D and 2D code symbologies within an extremely large range without requiring mechanical modifications. A host of powerful features such as JavaScript functions, a high resolution, IP65 protection and the intuitive Vision Configurator operating software make this reader ideal for many industrial applications.
With the this unit they are launching an innovative stationary universal code reader that is able to read all common 1D and 2D codes (25 different code symbologies). This is an economical compact reader with small mounting dimensions and is designed for stationary reading. The MAC335 can read codes within an extremely large range from 20mm to 300mm. This means codes can be read reliably without having to mechanically adjust the lenses or use different lenses or other code reader versions. Its high resolution of 1.3 megapixels enables it to read both very small and large codes without having to change settings. The JavaScript functionality, which is unique in this sector of the market, enables the reader to be linked into all common programs and permits evaluations to be carried out on the reader itself. It is also possible to perform assignments directly on the reader, for example that this engine belongs to the vehicle group manufactured on this conveyor, and similar tasks. This feature often means that there is no need for a PC to be installed downstream for evaluation purposes.
To get around the problem of familiarization with operating different code readers, Pepperl+Fuchs has developed a standard operator interface, the Vision-Configurator. Using this, all parameters can be set intuitively and, among other features, images from the reader can be displayed. This code reader can additionally be parameterized easily without the use of operating software via the use of Data Matrix control codes.
With its robust enclosure and IP65 degree of protection, the MAC335 is also highly suitable for heavy industrial use.
Short Takes – 12-21-24
-
*ICS Threat Analysis: New, Experimental Malware Can Kill Engineering
Processes*. Forescout.com blog post. Pull quote: “The artifact clusters we
identifie...
No comments:
Post a Comment