UX2 Instruction Manual (D) - English
UX2 Instruction Manual (D) - English
Model UX2
Instruction Manual
● Before using the printer, thoroughly read this instruction manual for
optimum printer use.
● After reading the manual, properly keep it for future reference.
To export the product, check the export control-related regulations,
such as the Foreign Exchange and Foreign Trade Law and the
Export Administration Regulations, and follow the necessary
procedures.
If you have any questions, contact your Hitachi sales
representative.
All Right Reserved, Copyright © 2021, Hitachi Industrial Equipment Systems Co.,Ltd.
Important Notes
■ Restrictions on Export
● User hereby agrees not to export or re-export this product to any end-user who the user has reason
to suspect may utilize the product for the design, development or reproduction of nuclear, chemical or
biochemical weapons.
● The product or system including the product cannot be used in countries or areas other than those
which have concluded a sales contract.
■ Disclaimer
● Do not perform operation not in accordance with this instruction manual, such as using replacement
parts other than ones supplied by Hitachi or modifying parts. Doing so may cause machine failure or
personal injury. Hitachi will not bear any responsibility for damage resulting from these actions.
For the details on the product warranty and agreement terms, see the separate written agreement.
● The warranty does not cover any production loss due to downtime or physical loss (damage to a
printed object and related equipment) due to a failure or malfunction of the delivered product. Should
any failure occur, Hitachi will send a technician as soon as possible to try to minimize the downtime.
- It is recommended that you check the printing state periodically in a process even during
production.
- When starting the IJ printer, check if the printing state and print description are correct.
I
Important Notes (Continued)
■ Related laws
● Never drain the ink or makeup waste solution into a public sewer system. Waste disposal must
comply with all appropriate regulations. Consult the appropriate regulatory agency for further
information.
● The printer must be managed in compliance with all appropriate regulations. Read and understand
the appropriate Safety Data Sheet (SDS) before using any ink or makeup.
■ Security precautions
● More control systems are getting connected with information and telecommunications systems
recently, which results in an increased number of security risks such as cyberattacks.
A system using this product requires both physical security measures mainly in the installation
location and security measures against network usage.
[Examples of security risks via network]
- Abnormal operation, performance degradation, information leakage, and data tampering by
attacks from outside
- Malfunction, harm, and damage due to program and/or data tampering from outside
- Used as a step for attacking other systems
However, the security level required in control systems varies depending on the system. In addition,
potential security risks are not consistent but change on a daily basis. Not only in Hitachi products but
also in system components, the security protection support functions are just one means to ensure
the security level required for the system but do not completely prevent increased security risks.
The security level required in each control system must be constructed by the system and customer.
The maintenance of the security level requires continuous improvement measures. Please take
appropriate measures, such as updating the password periodically.
Hitachi will not bear any responsibility for trouble, accident, or damage caused by unauthorized
external access in a system using this product.
● Please use USB memory only on this product.
Perform periodic virus check on a computer where USB memory is inserted using the latest anti-virus
software.
II
Important Notes (Continued)
■ Intellectual property
Hitachi owns the rights of intellectual property for all the contents of this instruction manual. No part of
the manual shall be disclosed to third parties without prior written consent of Hitachi.
■ Contact
If you have any questions about this manual or need consultation or after-sales services, contact your
dealer or nearest local distributor
.
III
Safety Precautions
● You should observe the precautions set forth below in order to use the product properly and avoid
endangering you or other persons or damaging property. For the purpose of clarifying the severity of
injury or damage and likelihood of occurrence, the precautions are classified into three categories,
WARNING, CAUTION, and NOTE, all of which describe hazardous situations that may arise if you
ignore the precautions and perform an incorrect handling or operating procedure. These precautions are
all important and must therefore be observed without fail.
Pictograph examples
Installation environment
WARNING
● Ensure that no flame- or arc-generating devices are installed around the product.
- Fire: (Examples) Matches, lighters, cigarettes, heaters, stoves, gas burners, welders,
grinders, static electricity, etc.
- Flammable: (Examples) Ink, makeup
- Arc-generating device: (Examples) Open-type relays, open-type switches, brush motors, etc.
Before handling ink and makeup, remove static electricity from your body, peripheral
equipment, and so on.
In the interest of safety, place a dry-chemical fire extinguisher near the product.
S-1
Safety Precautions (Continued)
Installation environment (continued)
WARNING
● Install the product in an adequately ventilated location.
● Do not install the product in an enclosed space.
● Connect the product to exhaust equipment to prevent it from being filled with organic solvent
vapor.
● Secure adequate space for the ink/makeup handling area and product installation site. At least
200 m3 must be provided per print head. Ensure that adequate ventilation is provided.
* If ink or makeup contains any organic solvents or specified chemical substances, it must be
managed under the Industrial Safety and Health Act.
NOTE
● If extraneous noise enters the product, it may malfunction or break down.
For maximum noise immunity, observe the following installation and wiring precautions.
- Ensure that 100 or 200 VAC power cables are not bundled with other power supply cables.
- Insulate the product main body and print head so that they do not come into direct contact
with the conveyor or other devices.
- If the employed print target detector is housed in a metal case, use a plastic mounting brace
to insulate the detector from the conveyor and other devices.
- Ensure that the print target detector wiring is not bundled together with other power supply
cables.
S-2
Safety Precautions (Continued)
Grounding
WARNING
● Ensure that all electrical wiring, connections, and grounding comply with applicable cords.
Properly connect the product to its dedicated ground.
Complete the above procedure to avoid electrical shock hazards.
● When welding, keep enough space between the product and the welding work area to prevent
the arc from starting a fire. Also, insulate the print head and product frame to keep the welding
current from flowing to the control section of the product, and make a separate ground
connection for the product.
● If you need to receive ink particles in a beaker, a printing test for example, use an electrically
conductive beaker and connect the beaker securely to the ground.
Do not let the tip of the printing head enter the beaker.
Ink particles used for printing are electrically charged. An ungrounded beaker has a gradually
rising charge, possibly catching on or causing a fire.
WARNING
● Use an AC power cable within the following range:
- When using an inlet: 100 to 240 VAC
- When using a power-receiving terminal block: 100 to 120 VAC/200 to 240 VAC
- Frequency: 50 or 60 Hz
If the above requirements are not met, the electric parts may overheat and burn, causing a fire
or electric shock.
● When the power cable outlet is not used, ensure that it is connected to the input port inside the
product.
- If it is connected to an incorrect input port, the electric parts may break down, overheat, or
burn, causing a fire or electric shock.
S-3
Safety Precautions (Continued)
Ink and makeup handling
WARNING
● If you need to clean the casing of the product with wiping paper soaked with makeup, be sure
to do so when the power is off.
Attempting to clean it with the power on will cause makeup or vapors of makeup to enter the
product, possibly catching on or causing a fire.
When the cleaning is finished, open the maintenance cover and make sure that no makeup has
entered and no vapors remain inside.
CAUTION
● When cleaning the product or replenishing ink or makeup, wear protective gloves and safety
goggles to avoid direct skin contact. If the ink or makeup comes into contact with skin, wash
thoroughly with soap and warm or cold water.
● When transferring the ink or makeup to or from a bottle, exercise caution to prevent it from
coming into contact with the product or surrounding articles. If there is any spillage,
immediately wipe it to clean using a cloth moistened with makeup.
S-4
Safety Precautions (Continued)
Main body handling
WARNING
● Do not insert tweezers, a screwdriver, or any other metal article into the ink ejection hole at the
end of the print head.
When the product is ready to print, a high voltage (approximately 6 kV) is applied to the
deflection electrode section in the print head.
Exercise caution to avoid electric shock, injury, and fire.
● Do not remove covers and/or screws not specified in this manual.
A high voltage is applied to some sections of the product.
Exercise caution to avoid electric shock and injury.
● While the product is operating, do not look into the ink ejection hole at the end of the print head.
Ink or makeup may enter your eyes or mouth or soil your hands or clothing. If any ink or
makeup enters your eyes or mouth, immediately flush with warm or cold water and consult a
physician.
● Before servicing the product, be sure to stop the ink ejection.
This is because ink or makeup may splash into your eyes or mouth or onto your hands or
clothing.
If any ink or makeup enters your eyes or mouth, immediately flush with warm or cold water and
consult a physician.
● If an earthquake, fire, or other emergency occurs while the printer is engaged in printing or just
turned on, press the main power switch to turn off the power.
Do not perform this operation in any other situation than emergency.
NOTE
● Only people who have completed an operator training course for Hitachi can operate and
service the product.
- If the printer is operated or serviced incorrectly, it may malfunction or break down.
● Do not attempt to repair the product for any other purpose than operation or maintenance.
Otherwise, it may cause a malfunction, so if a repair is needed, contact your nearest local
distributor.
S-5
Safety Precautions (Continued)
Related Regulations
WARNING
● Never drain the ink or makeup waste solution into a public sewer system. Waste disposal must
comply with all appropriate regulations. Consult the appropriate regulatory agency for further
information.
● The printer must be managed in compliance with all appropriate regulations. Read and
understand the appropriate Safety Data Sheet (SDS) before using any ink or makeup.
FCC Notice
● This device complies with part 15 of the FCC Rules. Operation is subject to the following two
conditions. (1) This device may not cause harmful interference, and (2) this device must accept
any interference received, including interference that may cause undesired operation.
● This equipment has been tested and found to comply with the limits for a Class A digital device,
pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference when the equipment is operated in a commercial
environment.
● This equipment generates, uses, and can radiate radio frequency energy and, if not installed
and used in accordance with the Instruction Manual, may cause harmful interference to radio
communications. Operation of this equipment in a residential area is likely to cause harmful
interference in which case the user will be required to correct the interference at his own
expense.
S-6
Safety Precautions (Continued)
Related Regulations (continued)
WARNING
< Keep all fire away.>
⚫ Ink and Makeup are flammable.
⚫ All fire must be kept away from the machine.
⚫ Spilled Ink and Makeup must be wiped off and dried up immediately.
AVERTISSEMENT
< Tenir hors de portée du feu. >
⚫ L’encre et la composition sont inflammables.
⚫ Tenir la machine hors de portée du feu.
⚫ Nettoyez et séchez immédiatement les projections d’encre et de composition.
S-7
Preface
Hitachi Inkjet IJ Printer (hereinafter referred to as the "unit") employs a non-contact, ink-jet method to print
onto a print target.
This instruction manual describes the basic operating procedures, maintenance procedures, and other
detailed handling procedures of the unit.
If the unit is improperly handled or maintained, it may not operate smoothly and may become defective or
cause an accident. It is therefore essential that you read this manual thoroughly to gain a complete
understanding of the printer and use it correctly.
After reading the instruction manual, properly keep it for future reference.
i
Preface (Continued)
<Related manual>
Manuals related to the unit are "Basic Operation Manual", "Instruction Manual", "Technical Manual" (this manual),
"Communication Manual", and the handling guidance of each ink.
Read these manuals as needed.
Technical Manual
The technical manual mainly describes precautions and check items for installation, connection of electric signals of
the print target detector and encoder, and operation and adjustment methods of the circulation system.
It is suitable for those who perform maintenance and contains the information that can be used to determine the cause
of a unit fault.
Communication Manual
The communication manual describes how to control the unit through communication.
It contains a communication connection method, a list of communication codes, and countermeasures for warnings
and faults in communication.
It is recommended to use this manual in combination with the instruction manual and the basic operation manual.
<Trademark>
- Ethernet is a registered trademark of Xerox Corporation in the United States.
- Microsoft is a registered trademark or trademark of Microsoft Corporation in the United States and/or other
countries.
- Microsoft Excel is a product name of Microsoft Corporation in the United States.
- Windows XP is a registered trademark or trademark of Microsoft Corporation in the United States and/or other
countries.
- Windows 7 is a registered trademark or trademark of Microsoft Corporation in the United States and/or other
countries.
- Windows 10 is a registered trademark or trademark of Microsoft Corporation in the United States and/or other
countries.
- EtherNet/IP is a registered trademark of ODVA (Open DeviceNet Vendor Association).
ii
<Contents of the instruction manual>
This instruction manual consists of the following chapters.
Chapter 1. Overview
This chapter describes the purposes and functions of the Hitachi IJ Printer and the usage
precautions.
Chapter 2. Specifications
This chapter describes the specifications of the Hitachi IJ Printer.
iii
Chapter 11. Safe Clean Station (Optional parts)
This chapter describes the basic operations of the safe clean station.
iv
Contents
Safety Precautions............................................................................... 1
Preface ................................................................................................. i
1. Overview....................................................................................... 1-1
1.1. Purpose and Function Description ..................................................................................... 1-2
1.2. Usage Precautions ............................................................................................................. 1-2
1.2.1. Ink and Makeup.................................................................................................................. 1-2
1.2.2. IJ Printer Long-term Shutdown .......................................................................................... 1-4
1.2.3. Print Head Cleaning ........................................................................................................... 1-5
1.2.4. Shutdown (No-cleaning Stop) ............................................................................................ 1-6
1.2.5. Cautions on Operating Time When Unit Is in Service ....................................................... 1-8
1.2.6. Heating of Ink ..................................................................................................................... 1-9
1.2.7. Ink Concentration Control ................................................................................................ 1-10
1.2.8. Gutter Cleaning ................................................................................................................ 1-11
1.2.9. Protection Sheet............................................................................................................... 1-12
v
4.2.1. Procedure for Starting Operation ..................................................................................... 4-11
4.2.2. When Error Occurs at Start of Operation ......................................................................... 4-17
4.2.3. Ready and Standby State Switching Operation ............................................................... 4-20
4.2.4. Specifying Login User ...................................................................................................... 4-22
4.3. Shutdown Operation......................................................................................................... 4-24
4.3.1. Automatically Stopping by Pressing STOP Switch Button .............................................. 4-24
4.3.2. Stopping Ink Ejection by Pressing Screen Button ........................................................... 4-25
4.3.3. Turning Off Main Power Switch ....................................................................................... 4-26
4.3.4. Careful Cleaning Stop Function ....................................................................................... 4-27
vi
6.2.3. Printing by Substituting Different Characters for Date (Substitution Rules) .................... 6-13
6.3. Printing Shift Code ........................................................................................................... 6-16
6.4. Updating Print Description at Fixed Interval (Time Count) .............................................. 6-19
6.5. Using Count Function ....................................................................................................... 6-22
6.5.1. Printing Count Characters ................................................................................................ 6-22
6.5.2. Using Count Multiplication Printing .................................................................................. 6-30
6.5.3. Skipping Specified Characters and Printing (Count Skip) ............................................... 6-34
vii
9.1. Setting User Environment .................................................................................................. 9-3
9.2. Setting Date and Time ...................................................................................................... 9-11
9.3. Setting Touch Screen ....................................................................................................... 9-13
9.4. Changing Login User........................................................................................................ 9-15
9.5. Setting Password for Each User ...................................................................................... 9-17
9.6. Setting Communication Environment............................................................................... 9-19
viii
Chapter 1.
Chapter 1.
1. Overview
Chapter 2..
1.1. Purpose and Function Description
1.2. Usage Precautions
Chapter 3.
Chapter 4.
Chapter 5.
1-1
Chapter 1. Overview
This chapter describes the purposes and functions of this unit and the usage precautions.
* Makeup serves as the replenisher that compensates for an element loss due to ink evaporation during ink
ejection.
It is also used as a cleaning solution.
1-2
Chapter 1. Overview
Chapter 1.
At this time, do not remove the over cap.
Over cap
Cap
Makeup
cartridge bottle
Cleaning
bottle
[Note]
● If no cleaning solution is available, transfer the makeup in the makeup cartridge bottle to the
cleaning bottle before setting the makeup cartridge bottle.
● Tighten the cap of the makeup cartridge bottle after use. Turn it upside down to check if there is
no leakage of makeup.
● If the makeup in the makeup cartridge bottle is used as a cleaning solution, the volume of
makeup in the makeup cartridge bottle decreases. When it is set in the unit, please use a makeup
cartridge bottle that contains makeup more than half of the bottle.
● If makeup is accidentally spilled, promptly wipe it up with wiping paper.
1-3
Chapter 1. Overview
When this unit is shut down for a long time due to production or other circumstances, the ink may accrete inside
the unit after shutdown and cause such problems as inability to be ejected or to be recovered. If this occurs, one
of the following actions (1) and (2) must be taken.
(1) During the shutdown period, be sure to prevent accretion by operating the unit
periodically.
Operate (eject ink) the unit for one hour or longer at least once during the "Recommended shutdown period"
shown in the table below.
*1: This is the maximum period during which the unit can be continuously shut
down without being operated.
- The values in the table are for MEK-based ink.
- Ink other than the above requires special handling in accordance with the
handling guidance of each ink.
- To prevent adhesion, store the unit at as low temperature as possible.
- Please note the ink may harden within a week when it is stored at 45°C or
higher.
1-4
Chapter 1. Overview
Chapter 1.
Take the following precautions when cleaning ink from around the nozzle.
(1) Face the end of the print head downward and pour makeup onto the dirty part and clean while catching the
makeup in a beaker.
Charge electrode
Nozzle
See the “1.2.1 Ink and
Makeup” (3), When using Cleaning Deflection electrode
the cartridge bottle makeup range
as a cleaning solution Gutter
(2) After cleaning, thoroughly wipe the print head with wiping paper and dry it with the blower.
● Thoroughly dry the nozzle orifice, charge electrode, deflection electrode, and mounting base and fringe
of the gutter. Make sure that the parts are sufficiently dry before starting the next operation. If operated
while wet, the printer will not start normally.
● While the print head is wet, do not face its end upward.
(4) When printing is frequently performed or the distance between the print material and the print head is short,
ink splashes may stain the end of the print head and the print head cover. If this condition is left unresolved,
the staining will be worse, resulting in a print error or emergency stop. If a print error or emergency stop
frequently occurs due to staining caused by ink splashes, stop the operation in progress and clean the end of
the print head (around the nozzle, charge electrode, deflection electrode, mounting base and gutter) and the
print head cover. Perform this operation in addition to the cleaning at the end of each day's work.
Air purging of the print head is effective against staining due to ink splashing.
See the Technical Manual "3.1 Print head air purge".
1-5
Chapter 1. Overview
When you press Shutdown OK at the bottom right of the [HOME] screen, the unit stops after completing
its automatic nozzle cleaning sequence. If you repeatedly press Shutdown to stop the operation, excessive
makeup will enter the unit, resulting in thinner ink or an exceeded solution level of the ink main tank. If it is
necessary to repeatedly stop the unit operation, use the following procedure. (For details on the [HOME] screen,
see "5.1. HOME Screen (Initial Screen)".)
The no-cleaning stop procedure is valid even while the startup sequence is being executed.
( Shutdown is inactive during the startup sequence.)
[Note]
・ You can use Shutdown to stop operation up to twice in a row.
・ When operation is stopped using No-cleaning stop, if it is left in that state, the ink will become stuck in
the nozzle and cause ink stream bending, nozzle clogging, or printing disturbance. Apply makeup to the
nozzle orifice and wash it within 30 minutes after the stop. Then, eject the ink again.
1-6
Chapter 1. Overview
Chapter 1.
Press No-cleaning stop.
1-7
Chapter 1. Overview
(1) Cautions when the unit is repeatedly stopped immediately after the start of
operation
If you repeatedly stop the unit immediately after the start of operation, automatic nozzle cleaning at
shutdown will cause the ink in the unit to gradually become thinner. For stable operation of the unit, operate
it for a given amount of time or more once it is started (= in the ink ejection state). During the operation, the
ink viscosity is adjusted automatically and returns to the initial value. The required operation time varies
depending on the ambient temperature or ink types used. See the handling guidance of each ink for details.
1-8
Chapter 1. Overview
Chapter 1.
(1) If the ambient temperature is 20 °C or lower, the ink is heated by a heating unit in the print head.
The startup processing time is longer than when the unit is not operating.
When not operating: Approximately 1.5 minutes
When operating: Up to approximately 10 minutes (The startup processing time changes
depending on the ambient temperature.)
(c) If you need to operate the unit temporally while it is set not to heat the ink, resetting the excitation
voltage may allow you to do it.
Reset the excitation voltage according to the Technical Manual "5.10 Updating Excitation V-ref.".
1-9
Chapter 1. Overview
(1) In this unit, the ink is automatically controlled to maintain optimum concentration
for printing.
(2) If an error occurs in the viscometer used to control ink concentration, note the
following.
(a) There are the following three types of viscometer errors:
- [Inside Temperature Sensor Fault]
- [Viscosity Reading Instable]
- [Viscosity Reading Out of Range]
(b) When [Inside Temperature Sensor Fault] occurs, the unit will enter the fault stop state.
You can restart the unit by pressing Close. However, the setting will be changed not to control ink
concentration based on the measurement result using the viscometer thereafter.
Once the setting of automatic concentration control is canceled, the following message will always
appear at power-on. Press Close to cancel the message and contact your nearest local distributor.
(c) When [Viscosity Reading Instable] or [Viscosity Reading Out of Range] occurs, the unit will not
enter the fault stop state. Printing can continue, but contact your nearest local distributor for
inspection.
1-10
Chapter 1. Overview
Chapter 1.
This unit collects ink from the gutter. At the same time, it sucks in atmospheric gas, dust, and other matter from
the air. If these substances are mixed with the ink in the gutter, undissolved components in the ink or makeup
may stick to the gutter. If the unit runs for a long time without the gutter being cleaned, these components will
gradually accumulate in the gutter. This, together with the ink coming into contact with it, may cause an error
stemming from a dirty head.
If this fault occurs, perform the following actions (1) and (2):
(1) Clean the gutter and its perimeters with makeup periodically.
(2) See the procedures described in the Technical Manual "5.6 Cleaning the Gutter" to clean the gutter and the
ink recovery route.
If the above actions (1) and (2) do not solve the issue, contact your nearest distributor.
1-11
Chapter 1. Overview
Protection sheet
Parts No.: 451902 (3 pcs/pack)
1-12
Chapter 1. Chapter 2. Chapter 3. Chapter 4. Chapter 5.
2-1
Chapter 2.
2. Specifications
Chapter 2. Specifications
Unit specifications
Item UX2-D160W
4x5 1 to 6 lines
5x5 1 to 6 lines
18x24 1 line
24x32 1 line
30x40 1 line
36x48 1 line
Character height
(Depending on print distance, print speed, Approx. 2 to 10mm
operating temperature)
Display & input device 10.1" color TFT LCD touch panel (WSVGA)
Maximum print rate
(4x5, inter-character space 1 dot, 1 line, 3,076 characters/sec
76.9 kHz)
(Continue to next page)
2-2
Chapter 2. Specifications
User pattern Fixed size: 200 patterns (each font) / Free size: 50 patterns
Print characters code39, ITF, NW-7, JAN-13, JAN-8, code128 (EAN128), UPC-A,
UPC-E, DM code (Alphabetical characters only: 49, Numbers only:
Barcode
98), QR code (Alphabetical characters only: 20, Numbers only: 34),
2D code
Micro-QR code ((Alphabetical characters only: 11, Numbers only: 18),
GS-1 Databar
Print contents, Character height, Character width, Character
orientation, Repeat intervals, Repeat count, Column/Line structure,
Inter-character space, Bold, Line spacing, Numbering
Chapter 2.
Year/Month/Day/Hour/Minute/Second, Week number/Day of the week
Calendar/Count
printing, substitution rule: Up to 48 (Upgrade option: Up to 99)
Print functions Message storage
300 messages (Upgrade option: 2000 messages)
capacity
Shift code Upgrade option
2-3
Chapter 2. Specifications
2-4
This page is blank.
Chapter 3.
Chapter 1.
3. Component Names and
Chapter 2.
Functions
Chapter 3.
3.2. Unit Internal Parts Arrangement
3.3. Print Head
3.4. Safe-Clean Station (Optional parts)
3.5. Screen Display
Chapter 4.
Chapter 5.
3-1
Chapter 3. Component Names and Functions
This chapter describes the names and functions of components of this unit.
RFID reader
Reads ID of ink and Main power switch
makeup for certification. Turns the unit ON and
OFF.
USB cover
Opened/closed when
copying print data to
USB memory.
Print head
Performs printing.
Maintenance cover
knob
Maintenance cover
ON/STOP switch
Opened/closed for ink and
Turning ON or stops the unit with the
makeup replacement and
main power on.
other maintenance purposes.
3-2
Chapter 3. Component Names and Functions
Cleaning Station
Chapter 3.
3-3
Chapter 3. Component Names and Functions
Filter cover
3-4
Chapter 3. Component Names and Functions
Cable of
Cleaning Station
Chapter 3.
3-5
Chapter 3. Component Names and Functions
Inner cover
Makeup cartridge
bottle (*1)
Ink reservoir
*1: The ink cartridge bottle and the makeup cartridge bottle are optional parts.
Unit internal structure
Ink filter
Recovery filter
3-6
Chapter 3. Component Names and Functions
The internal structure of the print head (inside the dotted box in the figure above) is as follows.
Charge electrode
Chapter 3.
Plus deflection
electrode
Nozzle orifice
Gutter
Minus deflection electrode
3-7
Chapter 3. Component Names and Functions
3-8
Chapter 3. Component Names and Functions
NOTE
A touch screen is employed for data entry to operation screen. To manipulate the touch screen,
use only fingers. If the touch panel is operated with a metal or sharp object such as a ballpoint
pen, it may malfunction or break down.
Menu
Chapter 3.
● For the menu operation, see "4.1.3. Operation of Screen Transition".
3-9
Chapter 3. Component Names and Functions
(2) Message
For details on messages, see "Chapter 12. When Warning or Fault Occurs".
Detail, cause,
and solution
Button
Close
3-10
This page is blank.
Chapter 4.
Chapter 1.
4. Basic Operation
Chapter 2.
4.1. Basic Operation Flow
4.2. Start Operation
4.3. Shutdown Operation
Chapter 3.
Chapter 4.
Chapter 5.
4-1
Chapter 4. Basic Operation
This chapter describes the basic operation flow of the unit and procedures to start and stop operation.
Power Power
ON OFF
HOME
Edit
(print description)
– “Eject ink” and “Ink stop” can be operated on the [HOME] screen.
4-2
Chapter 4. Basic Operation
4.1.2. Status
Status types
(1) The current status and the online/offline state are always displayed at the top of the screen.
[Ready] state
Online
ON
Chapter 4.
[Stop] state
Offline
4-3
Chapter 4. Basic Operation
(2) If there is an alarm that has not been reset, the display color of Warn. is changed.
When you press Warn., the warning list appears.
Press Warn..
4-4
Chapter 4. Basic Operation
(1) Overview
● Pressing menu buttons shown in the table below will take you to their corresponding screens.
2 Chapter 4.
4-5
Chapter 4. Basic Operation
2 Press Edit.
The print description edit screen is now displayed.
4-6
Chapter 4. Basic Operation
This section describes how to change the setting values of the unit.
(1) Overview
● There are two types of setting items as shown in the table below.
No. Classification How to check setting values How to change setting values
Open the numeric key window by
Values are displayed on the
1 Inputting values pressing the value and input a
screen.
new value.
Open the selection window by
Setting values are displayed
2 Selecting values pressing the setting value and
on the screen.
select one of the choices.
(2) Operation (The detailed setting screen that is displayed by selecting [Edit] is
used as an example.)
(a) Inputting
values
(b) Selecting
values
Chapter 4.
Setting item selection screen
4-7
Chapter 4. Basic Operation
(a) Inputting values for the setting item (e.g. Character height)
Open the numeric key window by pressing the value and input a new value.
(b) Selecting a value for setting item (e.g. Target sensor filter]
Selecting a value
for setting item
4-8
Chapter 4. Basic Operation
(1) Overview
● There are two types of setting screens as shown in the table below.
● When OK is pressed, an edited message to be printed or new settings configured on the [User
environment] setup screen are applied for printing.
● When HOME is pressed, new settings are confirmed, and the display returns to the [HOME] screen.
OK Back HOME
Chapter 4.
4-9
Chapter 4. Basic Operation
Back HOME
Save
4-10
Chapter 4. Basic Operation
CAUTION
● Ink and makeup may contain organic solvents.
When handling ink or makeup, wear protective gloves and goggles so that it does not come in
direct contact with your skin.
● An LCD touch panel is used for the screen.
Do not press the buttons with unreasonable force.
● If the system shuts down, turn off the main power switch. To turn on the power again and reuse
the system, see "Chapter 14. Emergency Procedures".
1 Remove the print head cover and check whether or not the print head cover and nozzle periphery are
soiled by ink.
Around nozzle
Chapter 4.
Pull out
Since this unit prints by ejecting ink against the print material, the outside and inside of the print head
cover are soiled by splashing of the ink from the print material. To prevent printing problems due to
soiling, check the soiling state and clean the unit where necessary.
See "1.2.3. Print Head Cleaning" for the cleaning method.
4-11
Chapter 4. Basic Operation
Operating
status indicator
ON/STOP switch
Starts or stops the unit with the main power on.
(If the [Select login user] screen appears, see the next page.)
If the power is not turned on, it may have been shut down with the STOP switch last time. Press the ON
switch for about two seconds to turn on the power.
* To turn on the power again, ensure that the operating status indicator lamps are off.
4-12
Chapter 4. Basic Operation
If the [Select login user] screen appears when the power is turned on
A Turn on the power.
The [Select login user] screen appears. Select any user.
Input the
Chapter 4.
password for the
user name "user".
C Input the password for the user name "user" and press Enter.
The [HOME] screen appears.
4-13
Chapter 4. Basic Operation
3 Place a piece of wiping paper, etc., against the ink ejection port at the end of the print head to be ready
for ink ejection.
(* Immediately after ink ejection, a little amount of ink may spurt out and soil the surroundings.)
Print head
Press Startup.
Press Ready.
● You cannot eject ink when the print head is inserted into the Cleaning station.
4-14
Chapter 4. Basic Operation
Note: If ink continuously splashes and soils the wiping paper even when not printing, there may be some
fault in the print head, such as the ink stream not entering the gutter or the ink not being recovered from
the gutter. In this case, stop the operation using the following no-cleaning stop procedure.
Press Shutdown.
Chapter 4.
This no-cleaning stop procedure is possible even while the startup sequence is being executed.
If you stop the unit with this procedure, restart the operation according to "4.2.2. When Error Occurs at
Start of Operation".
4-15
Chapter 4. Basic Operation
If there is a difference of 0.010 MPa or more between the displayed value and the standard value, adjust
the pressure by turning the pressure adjusting screw with a flat screwdriver so that the difference falls
within ±0.002 MPa of the standard value.
Pressure adjusting
screw
5 Input the print target detection signal and check whether or not the printing state and print description are
correct.
● If the print target detection signal is input when the status is [Ready], the set print description is
printed.
4-16
Chapter 4. Basic Operation
When an error occurs at the start of operation, use the following procedure.
2 Loosen the head cover lock screw and remove the print head cover.
Pull out
Charge electrode
Gutter
Chapter 4.
Nozzle orifice
* Wipe the makeup on the surface of each part (including the mounting base) thoroughly with wiping
paper and dry the part.
4-17
Chapter 4. Basic Operation
4 Remove the print head cover and put the end of the print head in the beaker to be ready for ink ejection.
Press Startup.
●Cannot eject ink when the print head is inserted into the Print head inlet of the Cleaning station.
(Optional parts)
4-18
Chapter 4. Basic Operation
5 Make sure that the ink stream is at the center of the gutter.
WARNING
● Wear protective gear (goggles and mask) when checking the position of the ink stream.
● If any ink or makeup enters your eyes or mouth, immediately flush with warm or cold water and
consult a physician.
● Before ejecting the ink, make sure that there is no one in the ejection direction.
(Perform this operation with the end of the print head inserted in a beaker, etc.)
● Check the position of the ink stream from the sides and top of the print head as shown in the figure to
make sure that it is at the center of the gutter.
Ink stream
Gutter entrance
diameter
Gutter
Side direction
● If the ink stream is not at the center of the gutter, perform [No-cleaning stop] to stop the ink ejection.
Chapter 4.
Also, take action in accordance with the Technical Manual "5.4 How to correct ink stream bending
and nozzle clogging".
6 Install the print head cover and put the unit in the [Ready] state.
● If the screen status does not change from [Cover open] to [Standby], the print head cover may not be
appropriately installed. Install the print head cover again.
● See 3.1.3(2) Switching from [Standby] state to [Ready] state and put the unit in the [Ready] state.
● If the [Cover open] error is displayed, press Close.
7 Input the print target detection signal and check whether or not the printing state and print description are
correct.
● If the print target detection signal is input when the status is [Ready], the set print description is
printed.
4-19
Chapter 4. Basic Operation
This section describes operation of switching between ready state and standby state.
1 Press Ready at the top of the screen, and the [Print Abort Confirmation] message appears. Then, press
OK.
Press Ready.
Press OK.
4-20
Chapter 4. Basic Operation
1 Press Standby at the top of the screen, and the [Print Confirmation] message appears. Then, press OK.
Press Standby.
Press OK.
Chapter 4.
4-21
Chapter 4. Basic Operation
(1) Functions
● Specify the user to be logged in at power-on.
● Select the user and input the password when logging in.
● The administrator defines the user name, password, and password protection setting in advance.
Different password protection can be set for each user. A user name can contain up to 12 characters.
● Set whether or not to select a user to be logged in at power-on. See the Technical Manual "3.3 Selecting
login user when power is turned on".
(2) Operation
The administrator sets beforehand to ask the user to log in at power-on.
4-22
Chapter 4. Basic Operation
Input the
password for
the user name
"user".
3 Input the password for the user name [user] and press Enter.
The initial screen appears.
Chapter 4.
4-23
Chapter 4. Basic Operation
Press and hold the STOP switch for about two seconds.
All operations up to the unit power OFF are performed automatically.
ON/STOP switch
Starts or stops the unit with
the main power on.
● The power is turned OFF by the STOP switch when ink is being ejected or stopped.
(The main power switch does not have to be turned off. Power consumption does not
change even if the main power switch remains ON.)
4-24
Chapter 4. Basic Operation
Press Shutdown.
Chapter 4.
Turns OFF the power automatically after ink jet is stopped, like the STOP switch.
Stops ink ejection without cleaning the circulation route. (Not recommended)
Stops ink ejection with cleaning the circulation route. This button does not turn off the power.
4-25
Chapter 4. Basic Operation
When turning OFF the main power switch Turn ON the main power switch to turn on the
without using the STOP switch power.
● The "nozzle rubber seal" prevents the nozzle orifice from being dried and dust from
attaching to the plate. When the unit will not be used for several days over a holiday, etc., it
is recommended that the nozzle rubber seal be installed between the nozzle orifice and
charge electrode at shutdown.
Nozzle orifice
Nozzle rubber seal
Charge electrode
Usage precautions
- Store the nozzle rubber seal in a plastic bag, etc., to protect it from dirt and dust.
- Install the nozzle rubber seal after cleaning it with makeup.
- Do not deform the charge electrode when installing the nozzle rubber seal.
4-26
Chapter 4. Basic Operation
(1) Overview
● This is a function to clean the printer carefully when the unit is frequently used in a high-temperature
environment, or before the weekend, such as a 2-3 day shutdown period. This careful cleaning uses a
larger amount of makeup than normal cleaning.
● Please note that this function uses makeup approximately double the normal cleaning, resulting in lower
ink concentration.
Chapter 4.
4-27
Chapter 5.
Chapter 1.
5. Creation and Setting of
Print Messages
Chapter 2.
5.1. [HOME] Screen (Initial Screen)
5.2. Editing Messages to be Printed (Message Edit
Screen)
Chapter 3.
5.3. Calling and Printing Saved Messages
5.4. Saving Created Messages
5.5. Setting Print Format (Fixed Layout)
5.6 Set the print format (Free layout)
5.7. Setting Print Specifications
Chapter 4.
Chapter 5.
5-1
Chapter 5. Creation and Setting of Print Messages
(1) Overview
● The display is shifted to the message edit screens and the menu screens by pressing the corresponding
buttons.
● The print image can be checked in the "print layout" area.
Displays the
Press a menu icon to execute the
message name.
corresponding function.
5-2
Chapter 5. Creation and Setting of Print Messages
Message types
Type Feature
● The message currently being printed is called a "current message".
● When the power is turned on, the unit holds the last current message.
Current message ● The print layout of the current message is displayed on the [HOME] screen.
● You can change the contents of the current message by calling one from the
saved messages.
Saved message ● Multiple messages can be saved with message names.
Chapter 5.
5-3
Chapter 5. Creation and Setting of Print Messages
(1) Overview
● Edit the current message (message currently being printed).
● [Style] displayed in the detail view mode of the message name list display on the [Select message] screen
shows the type of print format.
INDIV. Individual setup of the fixed layout Multiple dot matrix patterns can be
selected.
An arbitrary position can be set for
Free layout Setup of free layout
each print item.
● Individual setting
ABCD EFG
Print items are 2022. 01. 01
XY
stacked from the
bottom.
● Free layout
5-4
Chapter 5. Creation and Setting of Print Messages
(2) Operation
The [HOME] screen appears.
5-5
Chapter 5. Creation and Setting of Print Messages
(1) Overview
● Calls and prints saved messages.
● The message currently being printed is called a "current message".
● When a message is called during printing, the called message is displayed as the print contents, but the
unit continues to print the previous contents. The contents to be printed change on the next printing.
● You can efficiently find your desired message by changing the display contents of the message name list.
● The print image of a saved message can be checked.
Item Description
● Press the group No. button.
● Only the messages belonging to the selected group are
Group No. displayed.
● When [0: All message names] is selected, the message
names in all groups are displayed.
Prev., Next ● Switches the message name list display screen.
Page move ● Specifies the message name list page.
● Switches the sort order by pressing the header part of the
Sort
message name list.
● Input the first several characters of a message name to
display only the message names starting with those
Search condition characters.
● If the search conditions are blank, all the message names in
that group are displayed.
Free number ● Toggles show or hide of the free number.
Display
● Switches the display to List view, Detail view or Preview.
switching
Display
● Displays all message names with Group No. as "00" and
Display All message name search conditions as blank. All saved
numbers are displayed.
● [Style] displayed in the [Detail view] mode shows the type of print format.
Type Meaning
5-6
Chapter 5. Creation and Setting of Print Messages
(2) Operation
Group No.
2
2 Press display and Display switching and then displays the following screen.
Sort
Chapter 5.
5-7
Chapter 5. Creation and Setting of Print Messages
3 Change the display contents using [Group], sort, [Prev.], [Next], or [Display All] so that the desired
message name is displayed.
5-8
Chapter 5. Creation and Setting of Print Messages
(1) Overview
● Saves created messages.
● A saved number is automatically assigned.
● The same message name cannot be assigned.
● Messages can be saved to a selected group.
● In [Ready] state, you cannot save created messages.
● If the number of input characters is small, the capacity required to save messages decreases. Many
messages can be saved if each size is small. If there are many large messages, the number of messages that
can be saved is smaller.
Chapter 5.
5-9
Chapter 5. Creation and Setting of Print Messages
(2) Operation
5-10
Chapter 5. Creation and Setting of Print Messages
Input the
message
name.
5-11
Chapter 5. Creation and Setting of Print Messages
Change the
target print
The colored print item.
item is the editing
target.
5-12
Chapter 5. Creation and Setting of Print Messages
● Functions
– Sets the number of lines of the selected column.
– The number of lines that can be set is "1 to 6".
The colored
column is the
editing target.
Chapter 5.
5-13
Chapter 5. Creation and Setting of Print Messages
● Functions
– Deletes, inserts, and adds print items for each column.
The colored
column is the
editing target.
Add col.
5-14
Chapter 5. Creation and Setting of Print Messages
Modifying columns
Chapter 5.
5-15
Chapter 5. Creation and Setting of Print Messages
● Functions
– Sets the line spacing, dot matrix, inter-character space, bold font, and barcode.
(1) [Bold]
● Sets the character to bold.
● The available bold levels are "1 to 9".
5-16
Chapter 5. Creation and Setting of Print Messages
● The character types that can be input are defined for each dot matrix. A space is entered when there is
no character corresponding to the changed dot matrix.
5-17
Chapter 5. Creation and Setting of Print Messages
Dot matrix patterns of eight or fewer vertical dots are calculated as eight dots.
5-18
Chapter 5. Creation and Setting of Print Messages
Alphabet A Alphabet B
Vertical
8 dots
[Dot matrix]: 5 x 8
Horizontal 5 dots Inter-character space
[Inter-char. space]: 2 dots
Vertical
8 dots
[Dot matrix]: 5 x 8
Horizontal 5 dots Inter-character space
[Inter-char. space]: 5 dots
5-19
Chapter 5. Creation and Setting of Print Messages
* If high-speed print mode is “D1” or “D3”, it is better to select same Inter-character space setting for
keeping better print quality. (For details, see the Technical Manual "8.3 High-speed print mode”.)
5-20
Chapter 5. Creation and Setting of Print Messages
OK
Start
End
● When the inter-character space on the [Print format] screen is changed, the value set in units of
characters is changed to the same value.
● The display value of the inter-character space on the [Print format] screen indicates the inter-character
space of the first character.
Chapter 5.
5-21
Chapter 5. Creation and Setting of Print Messages
Barcode types
Barcode[displayed on screen] Character types that can be input Remarks
0 to 9,A to Z,Space
Code 39[C39] +,−(minus),/,.(period) ,: Maximum 128 digits
(colon) ,$
Maximum 128 digits
ITF[ITF] 00 to 99
Enter in 2-digit units
0 to 9
NW-7[NW-7] +,−(minus),/,.(period),:(colon), Maximum 128 digits
$
EAN-13[EAN-13] 0 to 9
EAN-13 Add-On 5
0 to 9
[EAN-13 Add-On 5]
EAN-8[EAN-8] 0 to 9
UPC-A[UPC-A] 0 to 9
UPC-E[UPC-E] 0 to 9
Code 128 0 to 9,A to Z,a to z,Space
Maximum 128 digits
[Code128(Code Set B)] FNC1,Code B,Code C,Symbol
Code 128 Maximum 128 digits
0 to 9,FNC1,Code B,Code C
[Code128(Code Set C)] Enter in 2-digit units
Data matrix [DM]
0 to 9,A to Z,a to z,Space
QR code, Micro QR Only QR(33×3) is available
FNC1,RS,EOT,Symbols
DotCode[DotCode]
Limited, Omnidirectional
GS1DataBar 0 to 9 and
Stacked
5-22
Chapter 5. Creation and Setting of Print Messages
●When a barcode of the same kind was set at adjacent print items, only the continuous series barcode is
assumed. However, fixed length barcodes such as EAN-13, EAN-8, UPC-A, UPC-E, EAN-13 Add-
On 5 and GS1 DataBar become independent barcodes.
●For multiple settings, provide a print item for which a barcode is not set between the print items with a
barcode set.
●Up to a maximum of 4 DM (Data Matrix), code 128, QR code, Micro QR and GS1 DataBar can be set
respectively.
● DotCode can be set up to 2.
●QR code and Micro QR can be collectively set up to 4.
●Since the number of horizontal dots is uniquely determined for barcodes, an inter-character space
cannot be set.
●A barcode can be set even for print items with a calendar and count set. However, when calendar
substitution, zero suppression, or an invalid character is set, for the barcode setting, the relevant
character is deleted.
●Neither the calendar nor the count set can be set to the country code.
●When code set C of code 128 was set when the English alphabet is set for the count upper limit, the
relevant character is deleted.
●Since start and stop codes are automatically generated, input as print description is unnecessary.
● When DM(16×16) or QR(21×21) is selected and when Bold is set to 2, IJ printer can print Cell size
(width and height) of 2 dots.
(When Format setup is Free layout on the Change message screen, only DM16×16 can set the Bold to 2.)
●A barcode with the identification numbers can be set in 1 line or 2 lines setting. When in 2 lines setting,
the barcode with the identification numbers can only be set to either upper or lower line.
●For GS1 DataBar, neither the calendar nor the count can be set to 1st, 2nd and 3rd digit.
●For ITF, the wide bar and space width can be set to horizontal 2 dots or 3 dots.
●In the case of NW-7, the space between each character is called the "character-to-character gap" and is
printed in the same size as the thin bar width (1 dot in width). However, the gap between characters of
NW-7 displayed on the screen is not limited to this, so the number of horizontal dots differs from the
actual printing.
●The barcode displayed on the screen is a guideline, so please check it by actual printing.
● Only UPC-A can be set at character size 30 × 40 and 36 × 48 print items. (Nozzle diameter 65μm)
Chapter 5.
5-23
Chapter 5. Creation and Setting of Print Messages
Barcode
Set a barcode
type.
5-24
Chapter 5. Creation and Setting of Print Messages
EAN Prefix
Set value
Character input Print format
Handling of country Country code is input at the head Set by print format without including
code of the data. country code in the data.
Print format screen Country code is not displayed. Set the country code.
For EAN-13, input 12 digits and for For EAN-13, input 10 digits and for
EAN-8, input 7 digits, all including EAN-8, input 5 digits, without
Edit message screen
the country code. However, check including the country code. However,
digit is excluded. check digit is excluded.
5-25
Chapter 5. Creation and Setting of Print Messages
●The white areas (quiet zone) are necessary at both ends of barcode for the barcode to be
recognized. Input one or two characters with all dots marked out (provided on numeric keyboard screen)
to the previous column and next column items.
●For DM codes, QR codes and DotCode printing will be performed in normal mode even if Reverse is
selected.
●The barcode dot data and Human Readable code will be reversed when adding Human Readable code.
However, “GS1 DataBar Stacked” barcode dot data is printed as is, even if set "Reverse".
(5) Examples
●Example: QR 21 x 21
5-26
Chapter 5. Creation and Setting of Print Messages
Directly touch the screen to change target The usage range of horizontal and vertical
item to edit. coordinate is displayed respectively.
Next Item
The colored item is
the editing target. Next Item
5-27
Chapter 5. Creation and Setting of Print Messages
Model type Total vertical dots Horizontal (X) Vertical (Y) coordinate
coordinate
UX2-D 32 dots 0 to 31999 0 to 31
⚫ Press to display Print item setting screen (Print format screen) in pop-up window.
5-28
Chapter 5. Creation and Setting of Print Messages
Methods of setting the horizontal (X) coordinate and vertical (Y) coordinate
Type Features
Directly touching the screen The print item to be edited can be moved by directly touching the screen
within the limit of vertical dots.
Set the value of the coordinate The print item to be edited can be moved by setting the value of the
"horizontal (X) coordinate" and "vertical (Y) coordinate" on the screen.
Set the position by cursor button The print item to be edited can be moved dot by dot one by means of ↑ ↓
← → buttons.
5-29
Chapter 5. Creation and Setting of Print Messages
Cursor button
5-30
Chapter 5. Creation and Setting of Print Messages
● Press Insert item and touch the print layout screen, then the print item (character size is 5×7 or 5×8)
will be created. When the print item is created, if the horizontal (X) coordinate or vertical (Y)
coordinate is over the limit of range of the coordinate, the horizontal (X) coordinate or vertical (Y)
coordinate will be adjusted automatically.
● When there is only one print item, if Delete item is pressed and the print item is deleted, a print item
(character size is 5×7 or 5×8) will be created at the horizontal (X) coordinate = 0, vertical (Y)
coordinate =0.
Directly touch an
arbitrary position
on the screen.
5-31
Chapter 5. Creation and Setting of Print Messages
5-32
Chapter 5. Creation and Setting of Print Messages
● When changing the bar code, the top-right coordinate of the print item can go over the limit of coordinate.
Should the top-right of the print item go beyond the limit of horizontal (X) coordinate, it will be
automatically adjusted to horizontal (X) coordinate=31999.
Chapter 5.
5-33
Chapter 5. Creation and Setting of Print Messages
5-34
Chapter 5. Creation and Setting of Print Messages
Set the character height, character width, character orientation, and print start delay.
5-35
Chapter 5. Creation and Setting of Print Messages
b b
1: ABC a
b ABC123
ABC
2: a
Example of the setting
b
ABC123
[0: ABC->] and line
ABC ABC123 direction: [a].
3: a
b
See the Technical Manual "4. ELECTRIC SIGNAL CONNECTION" for details.
5-36
Chapter 5. Creation and Setting of Print Messages
b b
Print target Print target
Ink ejection port Ink ejection port
5-37
Chapter 5. Creation and Setting of Print Messages
● When [Ink drop use] is 1/1 or 1/2, high-speed printing is possible. When [Ink drop use] is 1/16,
printing is performed at a low speed but with higher quality.
● When Format setup is Free layout on the Change message screen, setting range of ink drop use
percentage is 1/2 to 1/16.
● When a character size 30 x 40 or 36 x 48 print item is set, the settable ink drop use percentage
becomes 1/5 to 1/16.
(b) When [Product speed matching] is set to [Encoder]: (Rotary encoder is connected)
● Set the character width according to [Ink drop use] as shown in the table below.
5-38
Chapter 5. Creation and Setting of Print Messages
5-39
Chapter 5. Creation and Setting of Print Messages
[Calendar offset]
5-40
Chapter 5. Creation and Setting of Print Messages
Chapter 5.
5-41
Chapter 5. Creation and Setting of Print Messages
● Overview
– Set the repeat print when printing the same content successively.
– Set [Repeat intervals] and [Repeat count] when printing successively.
– When [Product speed matching] is set to [Auto], [Repeat print] cannot be set.
(ii) By character
Number of digits x (dimension of print target / print width of whole digits)
(Example)
Dimension of print target: 64 mm, Print width of whole digits: 25 mm,
Number of digits: 6, Dot matrix: 5 x 7 dots, Inter-character space: 2 dots
– By scanning
{(5+2) x 1 x 6 - (2 x 1 + 1)} x (64 / 25) = 99.84→100
– By character
6 x (64 / 25) = 15.36→15
Repeat intervals
5-42
Chapter 5. Creation and Setting of Print Messages
Setting value
Mode
2 to 9998 9999
Printing is performed specified
Printing is performed repeatedly
number of times in selected
Signal ON in selected interval while the
interval while the print target is
print target is detected.
detected.
After the print target is detected After the print target is detected
once, printing is performed once, printing is performed
OFF-ON transition
specified number of times in repeatedly in selected interval
selected interval. until the printing is stopped.
Chapter 5.
5-43
Chapter 6.
Chapter 6.
5.
6. Character Print
Chapter 7.
6.1. Printing Characters
6.2. Using Calendar Function
6.3. Printing Shift Code
6.4. Updating Print Description at Fixed Interval (Time
Chapter 8.
Count)
6.5. Using Count Function
Chapter 9.
Chapter 10.
6-1
Chapter 6. Character Print
This chapter describes the method of printing characters in the actual process.
● There are no limits on the number of digits which can be input at one print item.
(1) Functions
● Inputs characters to be printed.
● The character types that can be input are defined for each dot matrix. Note that there is an inter-
character space appropriate to the character type. (See "5.6.4. Setting Dot Matrix, Inter-character Space,
and Other Parameters".)
● The two input modes are available: [Insert] and [Overwrite].
Insert changes the mode.
● You can specify the start and end of a character string and "copy" and "paste" it to any position.
6-2
Chapter 6. Character Print
(2) Operation
Chapter 6.
Press Edit on the [HOME] screen.
The print description edit screen appears.
3 Touch the input start position in the print description edit area and move the cursor.
Alternatively, you can press the cursor button or scroll button to move the cursor.
The cursor is displayed in the specified position.
Flashes the
Changes to the Insert mode
cursor position in
[Overwrite] mode
Input mode
Number,
symbol Scrolls the cursor
position right
Shift Scrolls the cursor
position left
Pressing the Insert button enters the [Insert] mode and displays the following screen.
6-3
Chapter 6. Character Print
Copy Delete
Paste
Input mode
Number, symbol
Space
Input mode
buttons
6-4
Chapter 6. Character Print
Chapter 6.
6.2.1. Printing Calendar Characters
6-5
Chapter 6. Character Print
6-6
Chapter 6. Character Print
Chapter 6.
● A week starts on Monday and ends on Sunday.
● A week including January 4 of the year is considered the first week. To put it another way, a week
including the first Thursday of the year is the first week.
● The first few days of the year not included in the first week are included in the last week of the previous
year.
Example of counting week number for end of old year and start of new year
Week
Monday Tuesday Wednesday Thursday Friday Saturday Sunday
number
21 22 23 24 25 26 27 52
December
28 29 30 31 53
1 2 3 53
January 4 5 6 7 8 9 10 1
11 12 13 14 15 16 17 2
6-7
Chapter 6. Character Print
(6) Operation
The print description edit screen is displayed.
1 Press .
The keyboard is changed to the calendar keyboard.
Calendar
keyboard
6-8
Chapter 6. Character Print
Chapter 6.
Print item
to be input
The target
calendar block
is enclosed in a
green box.
6-9
Chapter 6. Character Print
● When using a month or year offset, you can select [Offset from yesterday] or [From today] for the day.
The table below shows examples of month and year offsets.
(See "5.8.1. Setting Character Height, Character Width, and Character Orientation" for switching the
setting between [Offset from yesterday] and [From today].)
6-10
Chapter 6. Character Print
Chapter 6.
Calendar time Offset value Offset value
1 year 4 years 1 year 4 years
2024.02.29 2025.02.28 2028.02.28 2025.02.28 2028.02.29
(2) Operation
Set an offset of one month to the "YY.MM.DD" calendar block.
The print description edit screen is displayed.
6-11
Chapter 6. Character Print
2 Press or in the print description edit area to change the target calendar block.
The target
calendar block Change the
is enclosed in target
a green box. calendar
Offset setting block.
Offset
1 month
6-12
Chapter 6. Character Print
Chapter 6.
(1) Substitution rule function
● Prints the date and time by replacing it with the specified characters.
● Select one substitution rule No. for one calendar block.
● A substitution rule No. can be shared between multiple calendar blocks.
● Kana, alphanumeric characters, and user patterns can be set as substitution characters.
● Substitution characters for the year are applied for 25 years from the year of the calendar date.
[Note] Substitution characters for the year are deleted for the previous year as a year passes. At this time,
the substitution characters after 25 years become spaces.
If the current date and time [Year] is set to the past, the substitution characters for the present year
also become spaces.
6-13
Chapter 6. Character Print
(3) Operation
In this example, set the substitution rule for the calendar character [Hour].
2 Press or in the print description edit area to change the target calendar block.
6-14
Chapter 6. Character Print
Chapter 6.
[Edit substitution rule] screen
6-15
Chapter 6. Character Print
(1) Overview
● Divides one day into multiple work shifts and prints a different code for each work shift.
(See "(2) Operation" for the shift code setup procedure for this example.)
● Only one shift code can be set in one message. Each code can contain up to ten digits.
● Shift code rules are set on the [Shift code] setup screen.
● For a work shift, set the start time in units of hour/minute. Up to 48 shifts can be specified.
● One shift code rule is held for each message. To input the same shift code rule to another message, use the
"copy" and "paste" functions. Input the shift code rule, press Copy to copy, and press Paste on the [Shift
code] setup screen of another message.
● A shift code cannot be input to the calendar block of another calendar.
6-16
Chapter 6. Character Print
(2) Operation
The print description edit screen is displayed.
Chapter 6.
1
1 Press .
The keyboard is changed to the calendar keyboard.
Print
description
edit area
6-17
Chapter 6. Character Print
4 Input the start time and print description for each shift.
When the start time is input, the end time one line above changes.
To add a shift, press Add line to end or Insert line
OK
Back
Start time
5
Insert line
Add line to end
If a work shift has more than 10 classifications, you can switch between them with .
You can input or delete a start time and print description for each line.
5 Press Back .
The display returns to the [Calendar conditions] screen.
6-18
Chapter 6. Character Print
Chapter 6.
(1) Time count function
● Updates the print description at predetermined update intervals (minutes).
● Define the base time once a day so that the print description is changed to the predetermined value when
the time comes.
● Only one time count value can be set in one message. Each value can contain up to three digits.
● Set time count conditions on the [Time count conditions] screen.
● Range, reset, reset time, and renewal period are available as conditions.
● The print description is always updated with an increment of 1.
● One time count condition is held for each message. To input the same time count condition to another
message, use the "copy" and "paste" functions. Input the time count condition, press Copy to copy, and
press Paste on the [Time count conditions] screen of another message.
● A time count value cannot be input to the count block of another count.
(Example) Range: AA to GG, renewal period: 30 minutes, reset time: 05:00, reset value: [AA]
Time Value Time Value Time Value Time Value Time Value Time Value
00:00 FD 04:00 GE 08:00 AG 12:00 CA 16:00 DB 20:00 EC
00:30 FE 04:30 GF 08:30 BA 12:30 CB 16:30 DC 20:30 ED
01:00 FF 05:00 AA 09:00 BB 13:00 CC 17:00 DD 21:00 EE
01:30 FG 05:30 AB 09:30 BC 13:30 CD 17:30 DE 21:30 EF
02:00 GA 06:00 AC 10:00 BD 14:00 CE 18:00 DF 22:00 EG
02:30 GB 06:30 AD 10:30 BE 14:30 CF 18:30 DG 22:30 FA
03:00 GC 07:00 AE 11:00 BF 15:00 CG 19:00 EA 23:00 FB
03:30 GD 07:30 AF 11:30 BG 15:30 DA 19:30 EB 23:30 FC
(See "(2) Operation" for the time count condition setup procedure for this example.)
6-19
Chapter 6. Character Print
(2) Operation
The print description edit screen is displayed.
1 Press .
The keyboard is changed to the calendar keyboard.
Print
description
edit area
6-20
Chapter 6. Character Print
Chapter 6.
OK
Back
5 Press Back .
The display returns to the [Calendar conditions] screen.
6-21
Chapter 6. Character Print
6-22
Chapter 6. Character Print
Chapter 6.
updated independently for them. There is no carry from another count block.
Count block
The target
count block
is enclosed
in a green
box.
● The range buttons are masked and cannot be set on the [Count conditions] screen that corresponds to a
print item with a barcode set.
● When you set a jump digit, if a jump occurs, the digits to the left of the jump digit are counted.
6-23
Chapter 6. Character Print
Count result
Count result
001 002 003 .... 008 009
021
6-24
Chapter 6. Character Print
Chapter 6.
Example of [Count conditions] setup screen (2)
Count result
:
:
:
:
:
:
[Note] If an increment of more than 1 is input, some numbers will be missed, so be sure
to set values that can be used as count values for the jump setup.
6-25
Chapter 6. Character Print
[Example] Define user patterns as circled numbers as shown in the table below.
If printing is performed five times each in the forward and reverse directions in reverse printing, the
same column is printed with the same number ((1) to (5)).
The count result is as shown below.
● There are 48 user pattern codes that can be used as counts from 00 to 47. Be sure to start with the first
count 00.
● Numbers and user patterns can be mixed.
[Example] Count range [0000 ]
[990909 ]
6-26
Chapter 6. Character Print
Chapter 6.
Set the reset value "001" beforehand.
Pressing Count reset resets the count value to the predetermined value "001".
6-27
Chapter 6. Character Print
(3) Operation
The print description edit screen is displayed.
1 Press .
The keyboard is changed to the count keyboard.
Count
keyboard
2 Input Count.
The print description edit area displays "C", which indicates a count character.
6-28
Chapter 6. Character Print
Chapter 6.
Print description
edit area Count block No.
Change the
The target count target count
block is enclosed block.
in a green box.
[Count conditions]
screen switching
OK
Back
[Count conditions]
screen switching
5 Press Back .
6-29
Chapter 6. Character Print
(1) Functions
● Prints by incrementing a specified amount at every printing.
● Multiplies the count value by the predetermined value and prints the result.
● Prints left-aligned.
● Rounds off the decimal portions of a multiplication result to the number of count digits.
● Enables the zero-suppression setting for the rightmost 0 in decimals.
(Example: 1.230 => 1.23)
● If the number of digits of the integer portions of a multiplication result exceeds the number of digits of
input count characters, the fault [Count Overflow] occurs.
● When an integer value is set in [Multiplier], the zero-suppression setting is not reflected.
6-30
Chapter 6. Character Print
(2) Operation
The following shows how to set 0.3048 in [Multiplier] for printing with feet to meter conversion
Chapter 6.
(1 foot = 0.3048 m).
[Note]
● To return to the normal count, input an invalid character in [Multiplier] to make the multiplier invalid.
● When a barcode is set in a count print item, the input area of [Multiplier] is masked, preventing you
from inputting any value.
● An integer value can be input in [Multiplier].
● No alphabet characters, symbols, or user patterns can be input in [Multiplier].
1 Input Count.
Count conditions
3 Press or in the print description edit area to change the target count block.
6-31
Chapter 6. Character Print
MissingPrint
description
edit area
Back
[Count conditions]
screen switching
Multiplier
6 Multiply the count value by the input multiplier and print the result.
The following tables show printing examples.
(One shows an example when zero-suppression is enabled while the other shows when it is disabled.)
6-32
Chapter 6. Character Print
Chapter 6.
Multiplier 0. 3048
Zero-suppression Enable
Value Multiplication result Printing result Remarks
000001 0. 3048 0. 3048 -
000002 0. 6096 0. 6096 -
... ... ... -
Zero-suppresses the rightmost
000010 3. 0480 3. 048△
decimal digit.
000011 3. 3528 3. 3528 -
... ... ... -
328082 99999. 3936 99999△ Rounds off a non-printable digit.
328083 99999. 6984 100000 Rounds off a non-printable digit.
... ... ... ...
999998 304799. 3904 304799 Rounds off a non-printable digit.
999999 304799. 6952 304800 Rounds off a non-printable digit.
6-33
Chapter 6. Character Print
(1) Functions
● Skips the specified characters and prints the next print value.
● Count skip characters must be one of three types: Uppercase alphabet characters, lowercase alphabet
characters, and user patterns.
● Up to five count skip characters can be input.
● A different range can be set for each digit of input count characters. However, make sure that count skip
characters are within the range of each digit.
Count result
000 001 002 .... 00H 00J
6-34
Chapter 6. Character Print
(3) Operation
The following shows how to set I and Q in [Count skip] for printing with alphabet letters I and Q skipped.
Chapter 6.
[Note]
● When a count character is added, overwritten, or deleted, the [Changed Skip condition] confirmation
message appears on the screen, making count skip characters invalid.
● Input one of the following three types in [Range] (max.): Uppercase alphabet characters, lowercase
alphabet characters, or user patterns. If [Range] (max.) is not all the same, all count skip characters must
be included in the smallest range.
● Characters used in [Value], [Range], [Jump], and [Reset] cannot be input in [Count skip].
● When [Count skip] is set, an incremental value is always 1.
1 Input Count.
Count conditions
3 Press or in the print description edit area to change the target count block.
6-35
Chapter 6. Character Print
4 Set the range using numbers, uppercase alphabet characters, lowercase alphabet characters, and user
patterns.
When [Count skip] is used, no numbers can be set in [Range] (max.).
Display the first screen of the [Count conditions] screen and input [Value] and [Range].
Back
[Count conditions]
screen switching
Range
(max.)
6-36
Chapter 6. Character Print
Chapter 6.
Back
[Count conditions]
screen switching
Count
skip
6 Count values are printed with the characters set in [Count skip] skipped.
The following shows a printing example.
6-37
This page is blank.
Chapter 7.
Chapter 6.
7. Auxiliary Functions
Chapter 7.
7.1. Managing Messages
7.2. Managing Groups
7.3. Creating User Pattern
7.4. Back Up Data to USB Memory
Chapter 8.
7.5. Editing Pattern of Standard Character
7.6. Editing Substitution Rules
7.7. Switching Display Language
7.8. Changing Layout of [HOME] Screen
Chapter 9.
Chapter 10.
7-1
Chapter 7. Auxiliary Functions
(1) Functions
(2) Operation
7-2
Chapter 7. Auxiliary Functions
(1) Functions
There are five types of functions related to managing saved messages as shown in the table below.
Chapter 7.
Change message number ● Changes the save number of a stored message. 7.1.3.
Change group ● Changes the group of a saved message. 7.1.4.
Preview ● Checks the print image of a saved message. 7.1.5.
There are also three types of methods for selecting saved messages as shown in the table below.
Item Description
Normal ● One message can be selected.
Multiple ● Multiple messages can be selected.
● Two points in the message name list can be specified to select the messages between
Area
the points.
● For [Multiple] and [Area], the [Change message name], [Change message number], and [Preview] functions
cannot be started.
The following sections describe the procedure for managing messages and the various functions.
7-3
Chapter 7. Auxiliary Functions
(2) Operation
Select the
message.
3 After selecting the target message name, press Menu. Then, press Change message name,
Delete Stored message, Change message number, Change group, or Preview.
The corresponding function screen appears.
Menu
7-4
Chapter 7. Auxiliary Functions
(a) [Normal]
For a screen example, see the previous section.
(b) [Multiple]
Multiple
Chapter 7.
The functions
[Delete Stored
message] and
[Change group]
can be started.
Messages in specific
positions can be selected.
(c) [Area]
Area
The functions
[Delete Stored
message] and
[Change group]
can be started.
7-5
Chapter 7. Auxiliary Functions
(1) Functions
● Changes the message name of a saved message.
(2) Operation
1 Enter the [Normal] mode and select the message, and then press Menu.
Normal
Select the
message. 1
2
Input a new
message
name. 3
7-6
Chapter 7. Auxiliary Functions
(1) Functions
● Deletes a saved message.
(2) Operation
1 Enter the [Normal] mode and select the message. Then, press Menu.
direction
Normal
Chapter 7.
Select the
message. 1
3
[Delete Stored Message Confirmation] screen
3 Press OK.
The message is deleted.
7-7
Chapter 7. Auxiliary Functions
(1) Functions
● Changes the save number of a stored message.
● Specifies two messages and swaps the message numbers.
● A group number accompanies its message name.
(2) Operation
1 Enter the [Normal] mode and select the first message, and then press Menu.
Normal
Select the 1
first message.
First message
7-8
Chapter 7. Auxiliary Functions
4
First
message
Select the
second
Chapter 7.
message.
4 Press OK.
The save number of the message is changed.
7-9
Chapter 7. Auxiliary Functions
(1) Functions
● Changes the group of a saved message.
(2) Operation
1 Enter the [Normal] mode and select the message, and then press Menu.
Normal
Select the
message. 1
Group before
change
Group after
change
3 Press the group after change (when the group is pressed, the change is applied).
The group of the selected message is changed.
7-10
Chapter 7. Auxiliary Functions
(1) Functions
● The print image of a saved message can be checked.
● The contents currently being printed are not affected.
(2) Operation
1 Enter the [Normal] mode and select the message, and then press Menu.
Normal
Chapter 7.
1
Select the
message.
2 Press Preview.
The print image of the selected message is displayed.
7-11
Chapter 7. Auxiliary Functions
(1) Functions
There are three types of functions related to managing groups of saved messages as shown in the table
below.
There are also three types of methods for selecting groups as shown in the table below.
Item Description
Normal ● One group can be selected.
Multiple ● Multiple groups can be selected.
● Two points in the group list can be specified to select the groups between the
Area
points.
● For [Multiple] and [Area], the [Change/create group name] and [Change group number] functions cannot be
started.
7-12
Chapter 7. Auxiliary Functions
(2) Operation
Chapter 7.
[Manage messages] screen (message/ Manage group)
Select a
group. [Manage group]
functions
4 After selecting the target group, press Menu. Then, press Change/create group name, Delete group, or
Change group number.
The corresponding function screen appears.
7-13
Chapter 7. Auxiliary Functions
(1) Functions
● Changes a group name.
● Inputs a new group name.
(2) Operation
1 Enter the [Normal] mode and select the group, and then press Menu.
Normal
Select a
1
group.
2
Input a new
group name.
3
7-14
Chapter 7. Auxiliary Functions
(1) Functions
● Deletes a group and the messages belonging to that group.
(2) Operation
1 Enter the [Normal] mode and select the group, and then press Menu.
Chapter 7.
Select a
group. 1
3
[Delete Stored Group Confirmation] screen
3 Press OK.
The group and the messages belonging to that group are deleted.
7-15
Chapter 7. Auxiliary Functions
(1) Functions
● Changes the group number.
● Specifies two groups and swaps the group numbers.
● For messages belonging to that group, the group number is changed, but the group name is not changed.
(2) Operation
1 Enter the [Normal] mode and select the first group. Then, press Menu.
Normal
Select the 1
first group.
First group
7-16
Chapter 7. Auxiliary Functions
First group
4
Select the
second group.
Chapter 7.
[Manage group] screen (selecting group number to change) (2)
4 Press OK.
The save number of the group is changed.
7-17
Chapter 7. Auxiliary Functions
(1) Functions
● Creates user patterns (saved characters).
● In the [Fixed] size, horizontal and vertical dots are determined according to the dot matrix and inter-
character space.
● In the [Free] size, a pattern of any size can be created within the range of horizontal 320 dots x vertical
32 dots.
● Indicates the number of characters that can be created.
(2) Operation
Dot matrix
Dot pattern
creation area
Inter-character space
7-18
Chapter 7. Auxiliary Functions
Create/Edit
Chapter 7.
[Create user pattern] screen (Dot matrix, Inter-character space)
3 Press Create/Edit.
The [Create/Edit] screen appears.
7-19
Chapter 7. Auxiliary Functions
4 Set [Zoom] to change the display magnification of the dot pattern creation area.
The display magnification of the dot pattern creation changes.
5 Create a pattern in the dot pattern creation area. Touch the screen directly to invert the dots.
A dot in the
touched position
is inverted.
Save
7-20
Chapter 7. Auxiliary Functions
6 Press Save.
The [Save] screen appears.
Chapter 7.
Press to display OK
next view.
7 Press OK.
The pattern is saved.
7-21
Chapter 7. Auxiliary Functions
(1) Functions
● Calls the saved user patterns to the [Create user pattern] screen.
(2) Operation
The [Create user pattern] or [Create/Edit] screen is displayed.
Select
1 Press Select.
The [Select] screen appears.
Select character
type.
Select characters
to call.
OK
2 Select characters from the user pattern, alphabet/numeric characters or symbols, and then press OK.
The pattern is called.
7-22
Chapter 7. Auxiliary Functions
(1) Functions
Name Function
Copy, paste ● Copies the pattern in the specified range.
Move ● Moves the pattern in the specified range.
Clear area ● Clears (erases) the pattern in the specified range.
Chapter 7.
Invert ● Inverts the pattern in the specified range.
Rectangle ● Renders a rectangle in the selected position.
Rectangle fill ● Renders a rectangle in the selected position and fills it.
Pattern paste ● Pastes user patterns of arbitrary size, alphabet/numeric
(when editing [Free] size) characters, or symbol patterns to the arbitrary position.
(2) Operation
The [Create/Edit] screen is displayed.
Rendering a rectangle is described below as an example.
1 Press Rectangle.
The screen to specify a start point appears.
Guidance
Rectangle
7-23
Chapter 7. Auxiliary Functions
Start
position
End
position
7-24
Chapter 7. Auxiliary Functions
Apply
Chapter 7.
[Create user pattern] screen (Apply)
5 Press Apply.
A rectangular pattern is displayed.
7-25
Chapter 7. Auxiliary Functions
(1) Functions
● Creates user patterns of arbitrary size.
● The maximum size is horizontal 320 dots x vertical 32 dots.
(2) Operation
The [Create user pattern] screen is displayed.
Free
Vertical size
Horizontal size
Create/Edit
3 Press Create/Edit.
The [Create/Edit] screen appears.
7-26
Chapter 7. Auxiliary Functions
4 Create a pattern in the dot pattern creation area. Touch the screen directly to invert the dots.
A dot in the
position touched
is inverted.
Save
Chapter 7.
You can change display magnification.
Edit patterns (see 7.3.3)
[Create user pattern] screen ([Free] size, dot pattern creation area)
5 Press Save.
The [Save] screen appears.
6 Press OK.
The pattern is saved.
7-27
Chapter 7. Auxiliary Functions
(1) Functions
● Calls bitmap files saved in the USB memory as a user pattern.
● The files can be called in the screen for calling user patterns and the screen for pasting the pattern
during editing [Free] size.
● Create bitmap files according to the following conditions.
Item Condition
Size 1 to 320 pixels in width x 1 to 48 pixels in height
Color Black and white only (monochrome bitmap data)
********.bmp (********. should be filled with eight
File name
single-byte alphanumeric characters or less.)
● One pixel of the bitmap data corresponds to one dot of a user pattern.
(2) Operation
1 Create a BITMAP folder directly under the USB memory, and copy the created bitmap file into it.
7-28
Chapter 7. Auxiliary Functions
5 Select a required file name from the bitmap file list, and press OK. (Up to 30 file names are listed)
The display returns to the [Create user pattern] (Select bitmap data) screen.
Chapter 7.
OK
OK
7-29
Chapter 7. Auxiliary Functions
[NOTE] The backup data is due for 14 days. If it exceeds that, it cannot be used.
(1) Functions
● Backs up messages and user patterns to USB memory.
● Backed up data can be copied to the IJ printer.
● You can select the following data types when copying data to the IJ printer.
● When copying backed up data from USB memory to an IJ printer, select the copy destination folder.
● One USB memory can store data of up to 100 IJ printers. However, it must not exceed the USB memory
capacity.
● Use the [Setting] menu to remove and insert USB memory.
● Do not repeatedly remove and insert USB memory.
● When copying standard pattern data, start the [Copy data] function while the unit is stopped.
● Use USB memory with interface 3.0/2.0/1.1 and FAT16 or FAT32 file system.
● When performing [Copy IJP→USB] or [Copy data USB→IJP], if [USB Memory Error]
occurs or the USB memory cannot be recognized, verify the USB format (FAT16 or FAT32)
on a PC.
● Please periodically back up messages and user patterns.
7-30
Chapter 7. Auxiliary Functions
Chapter 7.
3
[Copy data (IJP USB)] screen
3 Press Backup.
The backup in progress screen appears.
Indicates the
backup progress.
7-31
Chapter 7. Auxiliary Functions
5
[Copy data (USB IJP)] screen
7-32
Chapter 7. Auxiliary Functions
Chapter 7.
Indicates the
copy progress.
7-33
Chapter 7. Auxiliary Functions
Create a new folder with the name of the printer's model name (UX/RX) under the
2
"UX2DAT" folder created in 1. above. In case of RX2, create a new folder "RX".
Copy the backup serial number folder which is created on UX under the "UX"
folder created in 2.
■ USB memory
UX
■ UX2DAT
■ UX
■ 00000000
3
Copy the backup serial number folder which is created on RX or RX2 under the
"RX" folder created in 2.
● Refer to "(3) Data copy operation" to copy data after data is stored in USB.
● The button is displayed in different colors by models when folder to be copied is selected.
7-34
Chapter 7. Auxiliary Functions
(5) Copy data from the Upper model to the Lower model
● When the model combinations satisfy those tabulated below in Table 1, "Copy data" to the lower model is
available even if the Print data/User pattern is created on the upper model.
● Refer to "(3) Data copy operation" to copy data after data is stored in USB.
● When the Print data was created on the upper model and "Copy data" was executed to the lower model,
Print data is then classified into 3 different classifications as described in Table 2
Chapter 7.
Table 2. Classifications of Print data
Display color of Message name on
No. Classifications
"Select message" screen
Print data created on the upper model can be used as is on
1 Black
the lower model.
Print data created on the upper model can be used on the
2 Brown
lower model by correcting a part of Print data setting.
3 Print data CANNOT be used on the lower model Red
7-35
Chapter 7. Auxiliary Functions
Table 3. Conditions with which display color of Message name changes to Brown on "Select message"
screen
No. Item Conditions and corrections
There are some Ink drop use rates which are NOT available on
1 Ink drop use (High-speed print) the lower model. "Ink drop use" of Print data shall be set to the
configurable value. Set to [HM] for "High-speed print".
[NOTE]
● After executing Select message, correct and confirm the Print data. And then please overwrite and use it
for printing. (Display color of Message name on "Select message" screen changes from Brown to Black.)
Table 4. Conditions with which display color of Message name changes to Red on "Select message" screen
No. Item Conditions
Max Printing columns of the lower model < Printing columns of Print
1 Printing columns
data
2 Calendar items Max Calendar items of the lower model < Calendar items of Print data
Max Replacement items of the lower model < Number of Substitution
3 Replacement items
rules of Print data
4 Count items Max Count items of the lower model < Count items of Print data
Bar code is set, which CANNOT be set on the lower model. 2D code
5 Bar code/ 2D code print
print is set, which CANNOT be set on the lower model.
Shift code is set, which CANNOT be set on the lower model. Time
6 Shift code Time count
count is set, which CANNOT be set on the lower model.
7-36
Chapter 7. Auxiliary Functions
(1) Functions
● Print data and User pattern which are backed-up in USB memory can be copied separately.
● When copying data, a separate copying operation is required for Print data and User pattern respectively.
● There are two (2) copy methods: "Add column to end" and "Overwrite". "Add column to end" is to copy
data next to the number of already-registered. "Overwrite" is to copy data onto already-registered
number(s).
● There are three (3) Copy source selections: "Normal", "Multiple" and "Area". "Normal" selects one data.
When "Overwrite" is selected as Copy method, Copy data can be made onto any number. "Multiplev can
select the print data which are NOT in consecutive numbers. "Area" can select a plural print data which
are in consecutive numbers. In case "Multiple" or "Area" is selected, Copy data to any number is NOT
Chapter 7.
available.
● When the plural print data are added to the end and the number of data goes beyond the maximum: The
empty data space is searched from the first number and the data will be copied there. If there is NO space
available, the data will NOT be copied.
● When the print data with the message name which is the same as that of already-existing message is
copied to the end, the message name will be renamed based on that of the source, replacing the last four
(4) digits with the registration number.
● Upon copying data, when Substitution rules is NOT registered, Substitution rules will be assigned at the
same number.
● Upon copying data, if Substitution rules is already registered, Substitution rules will be assigned/saved at
the empty number. The new number will be also assigned for Substitution rules of the print data.
● Upon copying data, if there is NO space available for Substitution rules, "Substitution Rules
Confirmation" will be displayed and Substitution rules for the print data will NOT be available.
7-37
Chapter 7. Auxiliary Functions
Individual
copy
Select Copy
method. Select how you
select Print data.
Print data in
USB
memory
Start copy
7-38
Chapter 7. Auxiliary Functions
5 Select Copy method and press how you select Print data.
6 Select Print data to be copied from USB memory.
7 Press Start copy .
The message "Copying in progress" will be displayed.
Chapter 7.
The copy will be executed.
8 Press HOME and return to Print description screen, then remove USB memory.
7-39
Chapter 7. Auxiliary Functions
Individual
copy
User
pattern
7-40
Chapter 7. Auxiliary Functions
User pattern in
USB memory
Select Copy
method.
Select how
Chapter 7.
you select
User pattern.
Start copy
6 Select Copy method and press how you select User pattern.
7 Select User pattern to be copied from USB memory.
8 Press Start copy .
The copy will be executed.
9 Press HOME and return to Print description screen, then remove USB memory.
7-41
Chapter 7. Auxiliary Functions
(1) Functions
● Edits the character pattern in dots.
● Edits single-byte symbols as different patterns from the double-byte symbols.
● Chinese character patterns are not edited.
● The operation of editing patterns is the same as the function for creating user patterns.
● The characters whose patterns have been changed are displayed in blue on the keyboard.
● Use the [Edit standard pattern] function after creating the pattern printing with the [Create user pattern]
function and establishing the pattern design.
● The original pattern before the change can be restored.
(2) Operation
Dot matrix
Dot pattern
creation area
Select
2 Press Select.
The [Select message] screen appears.
7-42
Chapter 7. Auxiliary Functions
Select characters
to call.
Chapter 7.
[Edit Standard pattern] screen (Select)
4 Press OK.
The pattern is called.
Edit
6 Press Save.
The [Save] screen appears.
7-43
Chapter 7. Auxiliary Functions
(1) Functions
● Selects [Year], [Month], [Day], [Hour], [Minute], [Week number], or [Day of week] and inputs or edits
the substitution rule.
● Inputs or changes the name of the selected substitution rule.
See "6.2.3 Printing by Substituting Different Characters for Date (Substitution Rules)".
(2) Operation
Sort
7-44
Chapter 7. Auxiliary Functions
4
Copy the
previous item.
Chapter 7.
Substitution rule type selection screen
3 Select the substitution rule type [Year], [Month], [Day], [Hour], [Minute], [Week number], or [Day of
week] and input or edit it.
4 Press OK.
The display returns to the [Edit substitution rule] screen.
7-45
Chapter 7. Auxiliary Functions
(1) Functions
● Switches the display language.
● The input mode is fixed to "Default".
(2) Operation
7-46
Chapter 7. Auxiliary Functions
(1) Functions
● The display position of the item displayed on the [HOME] screen can be changed.
● The item to display on the [HOME] screen can be changed.
(2) Operation
Chapter 7.
Resumes the
initial settings.
Empties the
selected cell.
Home area
Size
Home area
[HOME] screen
7-47
Chapter 7. Auxiliary Functions
3 When selecting the cell to which you want to place the function, the home area will be edited.
7-48
This page is blank.
Chapter 8.
Chapter 6.
8. Ink and Makeup
Replenishment
Chapter 7.
8.1. Replenishing Ink
8.2. Replenishing Makeup
Chapter 8
Chapter 9.
Chapter 10.
8-1
Chapter 8. Ink and Makeup Replenishment
WARNING
● Exercise caution to avoid inadvertently disconnecting, forcibly pulling, or bending piping tubes.
Since the ink and solvent in some portions of piping tubes are pressurized, they may splash
into your eyes or mouth or onto your hands or clothing.
If any ink or makeup enters your eyes or mouth, immediately flush with warm or cold water and
consult a physician.
● When handling ink or makeup, such as replenishment or replacement, take enough care not to
spill ink or makeup.
If you spill any ink or makeup by mistake, wipe it off neatly and promptly with wiping paper or
something similar. Do not close the maintenance cover until you make sure that the portion you
have just wiped is completely dry.
You must pay particular attention when you have spilled ink or makeup inside the printer and it
is not completely dry. This is because vapors of ink or makeup will stay inside the product and
may catch on or cause a fire.
If you find it hard to wipe the printer with the power on, stop it with the maintenance cover open.
Power it down and then wipe it off again.
● Should you find a leak of ink or makeup inside the product while the product is running or being
maintained, wipe it off promptly with wiping paper or something similar. Then, with the
maintenance cover open, stop the product, power it down, and repair the leak.
Continuing operation with a leak of ink or makeup will cause an anomaly, resulting in abnormal
printing. Ink and makeup are flammable. They may therefore catch on or cause a fire.
● Ink and makeup, their waste solution, used wiping paper and empty containers are flammable.
Make sure that these waste disposals are kept away from a flame or arc.
8-2
Chapter 8. Ink and Makeup Replenishment
CAUTION
● Pay careful attention to the following items regarding handling of the ink and makeup:
- Wear protective gloves and goggles so that it does not come in direct contact with your skin.
If the ink or makeup comes into contact with skin, wash with soap and warm or cold water.
- When removing the bottle from the unit, exercise caution to prevent ink from coming into
contact with the product or surrounding articles. If there is any spillage, immediately wipe it to
clean using a cloth moistened with makeup.
- Since the vapor pressure of makeup is generally high, if the ambient temperature is high like
in the summer, the internal pressure may rise, causing makeup to spurt out when the outside
cover is removed. - When opening the bottle, note the following:
- Do not hold the bottle near your face.
- Place the bottle on a level surface.
- Open the bottle while covering the cap with a waste cloth.
NOTE
Chapter 8.
● Do not dump waste ink or makeup into the drain.
Waste ink and makeup must be disposed of as specially controlled industrial waste, and wiping
paper used to wipe ink and empty bottles or containers must be disposed of as industrial
waste. Contact an industrial waste treatment company for disposal.
8-3
Chapter 8. Ink and Makeup Replenishment
(1) Overview
● Ink can be refilled when the remaining ink icon screen is positioned in a range where the cartridge bottle
can be replaced.
● Replenish the ink in the ink reservoir within 60 minutes (*1) after the warning [Ink Low Warning] occurs.
If the ink is not refilled, the unit will stop.
(*1) The specification differs depending on the ink type. See "4. Precautions" in the handling guidance
of each ink for details.
● When the ink is replenished, the warning is automatically reset.
● Ink can be refilled only while the power is ON.
* If the icon color is blue, the ink cartridge bottle cannot be replaced.
● If the ink level in the ink cartridge bottle is low, the level of the remaining makeup icon may suddenly
drop to the replaceable range. However, you can continue the operation as this is not a problem.
8-4
Chapter 8. Ink and Makeup Replenishment
(2) Operation
NOTE
● Do not lift the ink cartridge bottle by holding the over cap.
Otherwise, the ink cartridge bottle may fall.
● Since the ink cartridge bottle contains an IC chip, avoid strong shock/electromagnetic waves or
liquid leakage.
1 Remove the over cap of the ink cartridge bottle by turning it counterclockwise.
NOTE
● After loosening the ink cap, be sure to tighten it before setting the cartridge bottle.
Otherwise, the ink may spill when the ink cartridge bottle is set.
● After removing the over cap, do not allow your finger, foreign matter, or dirt to get into the hole
of the ink cap. Doing so could cause ink leakage and equipment failure.
● Do not swap the cap between the ink cartridge bottle and the makeup cartridge bottle.
Chapter 8.
Otherwise, ink or makeup may spill.
Over cap
Ink cartridge
bottle
Ink cap
8-5
Chapter 8. Ink and Makeup Replenishment
2 Hold the IC tag mark of the label on the ink cartridge bottle over the RFID reader of the printer to read
the ink ID.
NOTE
● If there is ink remaining in the ink cartridge bottle even when the bottle is replaceable, do not
replace it but contact your nearest local distributor because some parts may be broken.
* If there is no reaction when you hold the cartridge bottle over the reader of the printer, the IC tag
mark of the cartridge may be damaged.
In this case, you can manually input the ink ID from the IJP screen.
(Steps 2 -1 and 2 -2)
● If the ink ID is read by the IJ printer, steps 2 -1 and 2 -2 are not necessary.
IC tag mark
30 mm or less
8-6
Chapter 8. Ink and Makeup Replenishment
2 -1 If you manually input the ink ID, touch the ink icon on the [HOME] screen of the unit to open the
[Ink ID entry] screen and input the ink ID.
● The ink ID is printed on the label of the cartridge bottle.
Ink ID
Chapter 8.
Ink icon
8-7
Chapter 8. Ink and Makeup Replenishment
* If the ink ID is too stained by ink to be read, contact your nearest local distributor.
3 When the ink ID is recognized, the lever handle on the ink side is unlocked.
4 (1) Tilt the lever handle toward yourself, (2) lift it, and (3) remove the empty ink cartridge bottle.
NOTE
● If the lever handle cannot be lifted, do not pull it with excessive force but push the lever handle
all the way in.
Lever handle
Push in
8-8
Chapter 8. Ink and Makeup Replenishment
NOTE
● After removing the ink cartridge bottle from the unit, face the cap upward immediately. Also, do
not expose the removed ink cartridge bottle to any impact.
Doing so may cause ink to splatter.
● Do not turn the ink cartridge bottle with the ink cartridge bottle set in the unit.
The ink cap may become loose, causing ink to overflow.
● Do not put waste solution in a used ink cartridge bottle.
Otherwise, waste solution may spill. Note that a used ink cartridge bottle is not completely
sealed even when the over cap is mounted.
● If a used ink cartridge bottle is filled with ink or makeup and reused, ink or makeup may spill.
(3)
Chapter 8.
(1)
(2)
8-9
Chapter 8. Ink and Makeup Replenishment
Ink side
Boss guide
Align the boss with the guide.
Boss Pipe
* If ink has accumulated on the pipe surface, wipe it off using wiping paper dampened with makeup.
[Note]
If a foreign object such as a screw is found or gets in the ink supply port, remove it.
8-10
Chapter 8. Ink and Makeup Replenishment
6 When a new ink cartridge bottle is set, push the lever handle down and then push it all the way into the
unit.
CAUTION
● Be careful not to get your hand or fingers pinched when pushing down the lever handle. (See
the figure below.)
Chapter 8.
Lever handle
Lever handle
Push in
8-11
Chapter 8. Ink and Makeup Replenishment
Complete
8-12
Chapter 8. Ink and Makeup Replenishment
(1) Overview
● Makeup can be refilled when the remaining makeup icon screen is positioned in a range where the makeup
cartridge bottle can be replaced.
● Replenish the makeup in the makeup reservoir within 60 minutes after the warning [Makeup Low
Warning] occurs.
If the makeup is not refilled, the unit will stop.
● When the makeup is replenished, the warning is automatically reset.
● Makeup can be refilled only while the power is ON.
Chapter 8.
Warning (warning)
* If the icon color is green, the makeup cartridge bottle cannot be replaced.
● Use an unopened makeup cartridge bottle. If opened, use one that contains makeup more than half of the
bottle. If the makeup level in a makeup cartridge bottle is low, place the bottle horizontally and make sure
that it contains makeup more than half of the bottle before use.
Liquid level
Liquid level
● If the level of makeup in the makeup cartridge bottle is low, the level of the remaining makeup icon may
suddenly drop to the replaceable range. However, you can continue the operation as this is not a problem.
8-13
Chapter 8. Ink and Makeup Replenishment
(2) Operation
NOTE
● Do not lift the makeup cartridge bottle by holding the over cap.
Otherwise, the makeup cartridge bottle may fall.
● Since the makeup cartridge bottle contains an IC chip, avoid strong shock/electromagnetic
waves or liquid leakage.
1 Remove the over cap of the makeup cartridge bottle by turning it counterclockwise.
NOTE
● After loosening the makeup cap, be sure to tighten it before setting the cartridge bottle.
Otherwise, the makeup may spill when the makeup cartridge bottle is set.
● After removing the over cap, do not allow your finger, foreign matter, or dirt to get into the hole
of the makeup cap. Doing so could cause makeup leakage and equipment failure.
● Do not swap the cap between the ink cartridge bottle and the makeup cartridge bottle.
Otherwise, ink or makeup may spill.
Over cap
Makeup cap
Makeup
cartridge bottle
8-14
Chapter 8. Ink and Makeup Replenishment
2 Hold the IC tag mark of the label on the cartridge bottle over the RFID reader of the printer to read the
makeup ID.
NOTE
● If there is makeup remaining in the makeup cartridge bottle even when the bottle is
replaceable, do not replace it but contact your nearest local distributor.
* If a makeup cartridge bottle containing makeup less than half of the bottle is used, [Cartridge
replacement error] may appear on the screen. In that case, select the volume of the new makeup
cartridge bottle according to the guidance displayed on the screen.
* If there is no reaction when you hold the makeup cartridge bottle over the reader of the printer, the IC
tag mark of the makeup cartridge bottle may be damaged.
In this case, you can manually input the makeup ID from the IJP screen.
(Steps 2 -1 and 2 -2)
● If the makeup ID is read by the IJ printer, steps 2 -1 and 2 -2 are not necessary.
IC tag mark
Chapter 8.
RFID reader area
30 mm or less
8-15
Chapter 8. Ink and Makeup Replenishment
2 -1 If you manually input the makeup ID, touch the makeup icon on the [HOME] screen of the unit to
open the [Makeup ID entry] screen and input the makeup ID.
● The makeup ID is printed on the label of the cartridge bottle.
Makeup ID
Makeup icon
8-16
Chapter 8. Ink and Makeup Replenishment
* If the makeup ID is too stained by ink to be read, contact your nearest local distributor.
3 When the makeup ID is recognized, the lever handle on the makeup side is unlocked.
Chapter 8.
8-17
Chapter 8. Ink and Makeup Replenishment
4 (1) Tilt the lever handle toward yourself, (2) lift it, and (3) remove the empty makeup cartridge bottle.
NOTE
● If the lever handle cannot be lifted, do not pull it with excessive force but push the lever handle
all the way in.
Push in
Lever handle
NOTE
● After removing the makeup cartridge bottle from the unit, face the cap upward immediately.
Also, do not expose the removed makeup cartridge bottle to any impact.
Doing so may cause makeup to splatter.
● Do not put waste solution in a used makeup cartridge bottle.
Otherwise, waste solution may spill. Note that a used makeup cartridge bottle is not completely
sealed even when the over cap is mounted.
● If a used makeup cartridge bottle is filled with ink or makeup and reused, ink or makeup may
spill.
Lever handle Lift the lever handle and remove the empty
makeup cartridge bottle.
(3)
(1)
(2)
8-18
Chapter 8. Ink and Makeup Replenishment
Makeup side
Makeup
supply port
Boss guide
Chapter 8.
Boss
[Note]
If a foreign object such as a screw is found or gets in the makeup supply port, remove it.
8-19
Chapter 8. Ink and Makeup Replenishment
6 When a new makeup cartridge bottle is set, push the lever handle down.
CAUTION
● Be careful not to get your hand or fingers pinched when pushing down the lever handle. (See
the figure below.)
Lever handle
Push in
Lever handle
8-20
Chapter 8. Ink and Makeup Replenishment
Complete
* In the unit where the fault [Makeup Level Sensor Broken 1] occurred, the makeup cartridge cannot be
Chapter 8.
replaced until the warning [Makeup Low Warning] appears.
8-21
This page is blank.
Chapter 9.
Chapter 6.
9. Environment Setup
Chapter 7.
9.1. Setting User Environment
9.2. Setting Date and Time
9.3. Setting Touch Screen
Chapter 8.
9.4. Changing Login User
9.5. Setting Password for Each User
9.6. Setting Communication Environment
Chapter 9.
Chapter 10.
9-1
Chapter 9. Environment Setup
(1) Functions
(2) Operation
9-2
Chapter 9. Environment Setup
(1) Functions
● Sets the user environment values.
Aligns the print position to the right margin when the number of printing lines is
right-justified two or more.
(The print position is different from when [Character orientation] is set to 0 or 2.)
Aligns the print position to the left margin when the number of printing lines is
left-justified two or more.
(The print position is the same as when [Character orientation] is set to 0 or 2.)
1234567890
right-justified
ABC
left-justified
1234567890 Chapter 9.
ABC
● Columns having items with [Bold] set to 5 to 9 are always printed right-aligned.
● This setting works the same as when printing in the reverse direction in reverse printing.
9-3
Chapter 9. Environment Setup
Character orientation by
"Change Character Orientation" and "Change mode" combination
Character orientation
Change Character
Change mode Reciprocative printing Reciprocative printing
Orientation
signal: OFF signal: ON
0:ABC(→) 1:ABC(←)
OFF = forward
Reverse direction 3: (→) 2: (←)
printing 1:ABC(←) 0:ABC(→)
OFF = reverse
2: (←) 3: (→)
0:ABC(→) 2: (←)
OFF = normal
Normal or 3: (→) 1:ABC(←)
inverted 2: (←) 0:ABC(→)
OFF = inverted
1:ABC(←) 3: (→)
For more detail, see "(3) change character orientation (change mode) supplement".
print. complete Outputs for a fixed period of time after printing is complete.
print.-in-progress Outputs during printing.
9-4
Chapter 9. Environment Setup
Character
QR code printing Printing example Remarks
orientation
Rotated by 180
180-degree degrees and printed.
rotation
Chapter 9.
0 or 1
Printed in normal
direction.
Normal
Printed in normal
180-degree direction.
rotation
2 or 3
Rotated by 180
degrees and printed.
Normal
9-5
Chapter 9. Environment Setup
● When in Ready status, user pattern cannot be saved to existing pattern number.
● When in Ready status, the edit standard pattern function cannot be run.
9-6
Chapter 9. Environment Setup
(2) Operation
(Second screen)
Chapter 9.
9-7
Chapter 9. Environment Setup
0:ABC(→)
0:ABC(→)
0:ABC(→)
0:ABC(→)
9-8
Chapter 9. Environment Setup
0:ABC(→)
0:ABC(→)
● Operation examples
(Example) Examples of printing "ABC" onto trapezoidal print material
Reciprocative ABC
ABC
printing signal: OFF
order of printing order of printing
Chapter 9.
Direction of transport
Direction of transport
Reciprocative ABC
ABC
printing signal: OFF
order of printing order of printing
・・・
・・・
9-9
Chapter 9. Environment Setup
Reciprocative ABC
ABC
printing signal: OFF
order of printing order of printing
Direction of transport
Direction of transport
Reciprocative ABC
ABC
printing signal: ON
order of printing order of printing
Reciprocative ABC
ABC
printing signal: OFF
order of printing order of printing
・・・
・・・
③Change Character Orientation : "Character orientation 0 or 3"
Change mode : "OFF = normal and forward"
Direction of transport
Direction of transport
9-10
Chapter 9. Environment Setup
(1) Functions
● Sets the date and time values.
[Note] When the substitution rule is set to the "year", do not select [clock stop] and set a year earlier
than the current year. Otherwise, the "year" is replaced by a space.
9-11
Chapter 9. Environment Setup
(2) Operation
9-12
Chapter 9. Environment Setup
(1) Functions
● Sets the touch screen environment values.
9-13
Chapter 9. Environment Setup
(2) Operation
9-14
Chapter 9. Environment Setup
(1) Functions
● Logs in again as a different user from the currently logged in user.
● When logging in, select the user and input the password.
● The administrator defines the user name, password, and password protection setting in advance.
Different password protection can be set for each user. For details, see the Technical Manual "3.2 Setting
Functions Which Can Be Used for Each Login User".
● If the administrator sets to ask the user to log in at power-on, the login user must be selected at power-on.
● The [Login history] screen displays up to 30 login histories.
(2) Operation
The saved
user names
are displayed.
Chapter 9.
[Select login user] screen
9-15
Chapter 9. Environment Setup
Enter
Input the
password for the Closes the
user name "user". window.
Backspace
Shift
Cursor
3 Input the password for the user name [user] and press Enter .
Log in again with the user name "user" and return to the print description screen.
9-16
Chapter 9. Environment Setup
(1) Functions
● Each user needs to set their own password.
● However, if the administrator restricts users from setting a password, the [Password setup] screen does not
appear.
● A password must be entered at login.
● A password can contain up to 12 characters.
(2) Operation
Chapter 9.
[Login management menu] screen
9-17
Chapter 9. Environment Setup
3
Input the old
4 password.
This is not
displayed when
the password has
not been set.
Input a new
password.
4 Press OK.
9-18
Chapter 9. Environment Setup
(1) Functions
● Sets the communication environment setup values.
● Detail about communication setting, refer to Communication Manual.
(2) Operation
Chapter 9.
[Communication environment setup] screen
9-19
This page is blank.
Chapter 10.
Chapter 6.
10. Maintenance
Chapter 7.
10.1. Checking Unit Information
10.2. Checking Operational Status
10.3. Printing with No Sensor Signal (Start Printing)
10.4. Checking Registered Software
Chapter 8.
10.5. Checking Accessible Functions
Chapter 9.
Chapter 10.
10-1
Chapter 10. Environment Setup
(1) Functions
(2) Operation
10-2
Chapter 10. Maintenance
(1) Functions
● Displays the unit's model name, serial number, and ink name (type).
Item Description
TYPE-FORM Displays the model name (TYPE-FORM) of the unit.
Serial number Displays the serial number of the unit.
Ink type Displays the type of ink used.
(2) Operation
UX2-D160W
10-3
Chapter 10. Environment Setup
(1) Functions
● Displays the operational status of the IJ printer.
● Saves the ink operating time and print count once an hour (on the first minute of every hour).
When there is a power failure, the last saved state is restored.
● The ink operating time, print count, and ink pressure are also displayed on the [HOME] (initial) screen.
Item Description
● Displays the operating time that has elapsed since the last ink replacement.
Ink operating time ● It is reset to "0" at ink replacement. Up to 9,999 hours can be displayed.
(editable) ● When the operating time exceeds [Ink alarm time], the ink replacement
warning message appears.
● Displays the recommended ink replacement time.
Ink alarm time
● The standard value is always displayed.
● Displays the cumulative operating time. This value cannot be changed.
Cumulative op. time
● Up to 999,999 hours can be displayed.
● Displays the number of prints.
Print count (editable)
● The value range is from 0 to 999,999,999.
Ink type ● Displays the type of ink used.
Makeup type ● Displays the type of makeup used.
● Displays the ink viscosity.
Ink viscosity
● The standard value is 100.
● Displays the ink pressure.
Ink pressure
● The standard value is always displayed.
Ambient temperature ● Displays the ambient temperature and the allowable ambient temperature.
Deflection voltage ● Displays the deflection voltage in the [Ready] state.
Excitation V-ref. ● Displays the set excitation V-ref. value.
10-4
Chapter 10. Maintenance
(2) Operation
Chapter 10.
10-5
Chapter 10. Environment Setup
(1) Functions
● Allows you to print using buttons without inputting the print start signal.
● In [Ready] state, also allows you to print pressing START PRINTING in the [HOME] screen.
(2) Operation
START PRINTING
[HOME] screen
[Note] If the [Repeat print sensor mode] is [OFF-ON transition] and [Repeat print] is set, printing is
performed repeatedly.
To stop the operation during [Repeat print], switch to [stand by] state.
10-6
Chapter 10. Maintenance
(1) Functions
● Displays the name and version of each registered software.
(2) Operation
Chapter 10.
10-7
Chapter 10. Environment Setup
(1) Functions
● Check to see if each function is accessible or restricted.
● To restrict a function, the administrator should do so by setting the login function accordingly.
● If the function is restricted, the operation button is hidden or the corresponding screen becomes
inaccessible.
10-8
Chapter 10. Maintenance
(2) Operation
Chapter 10.
10-9
This page is blank.
Chapter 11.
Chapter 11.
11. Safe Clean Station
Chapter 12.
(Optional parts)
Chapter 13.
11.3. Starting Operation Using Cleaning station
Chapter 14.
Chapter 15.
11-1
Chapter 11. Safe Clean Station
This chapter describes the function and operation instructions of the Safe Clean Station (cleaning station).
When operating the station, note the following.
WARNING
● Solvent steam is produced during head cleaning. If you have no choice but to touch the print
head or cleaning station during head cleaning, be sure to remove static electricity from your
body in advance.
● See "Safety Precautions" in this basic operation instruction manual for detailed precautions.
CAUTION
● Before aborting the head cleaning to pull out the print head, wear protective gloves and
goggles and prepare wiping paper. The print head may not be dried enough.
NOTE
● Do not insert any other item than the print head of the target unit. Doing so may cause an
unexpected failure or malfunction.
● Do not dump waste ink or makeup into the drain.
Waste ink and makeup must be disposed of as specially controlled industrial waste, and wiping
paper used to wipe ink and empty bottles or containers must be disposed of as industrial
waste. Contact an industrial waste treatment company for disposal.
● If you spill any ink or makeup by mistake, wipe it off neatly and promptly with wiping paper or
something similar.
● When the unit is operated for the first time or the head cleaning is not performed for several
days (four or more days), the volume of makeup used for head cleaning may change to fill the
piping.
● Do not pull out the print head until cleaning operation is completed. Otherwise, the makeup
may splash or high-concentration solvent steam may remain inside.
● When the head cleaning function has been inactive for a while, a small amount of solvent
(about 1ml) is automatically ejected out during the ink ejecting process or ink stop process to
clean the inside of the head cleaning unit (about once every 40 hours). At that time, it sounds
the air pump operating from the main unit (about 7 seconds).
11-2
Chapter 11. Safe Clean Station
Chapter 11.
This setting is applied for only [Head cleaning].
(It is not applied for [Gutter cleaning (S)] or [Nozzle backwash (S)].)
3 Press Safe clean station environment setup on the [Safe clean station function] screen.
11-3
Chapter 11. Safe Clean Station
4 Set each setting on the [Safe clean station environment setup] screen.
11-4
Chapter 11. Safe Clean Station
Chapter 11.
● Operation procedure
2 Make sure that the Cleaning Solvent Container of the cleaning station is correctly installed.
● Make sure that the "" mark on the main unit side of the cleaning station is aligned with the ""
mark on the cleaning solvent container.
● If the marks are misaligned or the cleaning solvent container is detached, this function cannot be
executed.
Cleaning Station
Cleaning Solvent
Container
11-5
Chapter 11. Safe Clean Station
3 Loosen the head cover lock screw and remove the print head cover.
Pull out
Print head cover
4 Make sure that the print head cover is not lost after it is removed, such as by hanging it on the head
cover rest for the cleaning station.
11-6
Chapter 11. Safe Clean Station
5 Insert the print head into the print head slot of the cleaning station in the direction indicated in the figure
below.
Chapter 11.
Print head
Insert
NOTE
● Do not insert the print head into the cleaning station forcibly.
Otherwise, some parts may deform, fall off, or be damaged.
11-7
Chapter 11. Safe Clean Station
6 Hang the head cable on the cable hook attached to the cleaning station so as not to apply the load due to
the head cable's own weight to the base of the print head.
Head cable
Cable hook
● There is no need to use the cable hook if the head cable is fixed in any other way so that no load is
applied to the base of the print head.
7 Press the [Manual Control Menu] button on the [HOME] screen to display the [Manual Control Menu]
screen.
11-8
Chapter 11. Safe Clean Station
8 Press the Head cleaning button on the [Manual Control Menu] screen.
Chapter 11.
Press Head cleaning.
11-9
Chapter 11. Safe Clean Station
(*)
11-10
Chapter 11. Safe Clean Station
Chapter 11.
(1) The following confirmation message appears. Make sure that the print head is inserted into the
cleaning station, and press [OK].
Press OK.
(2) If message appears, print head is not mounted correctly to head cleaning station. Please mount the
print head correctly. After that press start / continue.
Press Start/Continue.
11-11
Chapter 11. Safe Clean Station
10 Remove the print head from the cleaning station and make sure that the area around the nozzle including
the end of the print head is cleaned and the makeup is dried up.
Nozzle periphery
NOTE
● The ink stain may remain or the head is not dried enough depending on the ink stain level or
operating environment.
● After cleaning, wipe off the print head with wiping paper if it is wet.
● If the print head is stained after cleaning, perform head cleaning again or clean the print head
using a cleaning bottle.
● If the ink does not come off easily, wipe it off with wiping paper soaked in makeup.
● Do not apply excessive force to the electrode when wiping. Otherwise, it may deform, causing
an unexpected malfunction.
11-12
Chapter 11. Safe Clean Station
11 Remove the cleaning solvent container from the cleaning station and drain the makeup in the container.
Chapter 11.
<<How to remove the cleaning solvent container>>
Hold and turn the cleaning solvent container until its "" mark is aligned with the "" mark on the
cleaning station. Then, slide the cleaning solvent container down to remove it from the cleaning station.
Slide down
NOTE
● Waste solution must be treated according to the local regulations.
● If any vibration or impact is applied to the cleaning station after the cleaning solvent container is
removed, the solution may leak from the inside.
12 Install the cleaning solvent container in the reverse order of the removal operation.
11-13
Chapter 11. Safe Clean Station
● Operation procedure
Status:
Shows the state of the unit.
2 Remove the print head cover and check whether or not the print head cover and nozzle periphery are
soiled by ink.
Nozzle periphery
Pull out
11-14
Chapter 11. Safe Clean Station
3 Insert the print head into the print head slot of the cleaning station.
Perform operation steps 2 to 6 described in "11.2. Head Cleaning Using Cleaning Station".
Chapter 11.
4 Press the [Manual Control Menu] button on the [HOME] screen to display the [Manual Control Menu]
screen.
5 Press the Eject ink (S) button on the [Manual Control Menu] screen.
11-15
Chapter 11. Safe Clean Station
Press Start/Continue.
[Eject ink (S)] confirmation screen
Starting screen
11-16
Chapter 11. Safe Clean Station
Chapter 11.
Press Start/Continue.
Startup process completion screen
NOTE
● If an abnormality in ink drop charge is detected during ink ejection, the ink ejection process is
performed again after the automatic head cleaning process. If the abnormality is still detected
after the ink ejection is performed again, the process will be aborted. Take appropriate action
according to the fault message that appears.
● If any vibration or impact is applied when removing the print head from the cleaning station, the
print head may be stained with ink.
11-17
This page is blank.
Chapter 12.
Chapter 11.
12. When Fault or Warning
Occurs
Chapter 12.
12.1. Display When Fault or Warning Occurs
12.2. On-screen Message Descriptions
12.3. Checking Fault and Warning Occurrence Status
Chapter 13.
12.4. Action to be Taken in Event of Printing Failure
Chapter 14.
Chapter 15.
12-1
Chapter 12. When Warning or Fault Occurs
This chapter describes what is displayed when a fault or warning occurs in this unit and how to check the
occurrence status and handle the warning or fault.
● When a fault or warning occurs in this unit, the fault or warning lamp lights up.
Operating status
indicator lamps
● When a fault condition, which interferes with printing while the LCD screen backlight is off, or a warning
condition, which does not interfere with printing but requires maintenance occurs, the fault or warning
message appears in a window.
● When an operation error is made or processing judgment is prompted, a confirmation message appears.
● When Reset is pressed after the cause is removed, the fault state is cleared, and the message is closed.
● When Close is pressed, the fault window is closed, but the fault state is not cleared. At this time, when
Fault is pressed in the status display area, the fault window appears again.
● However, when the unit is no longer in the fault state, you can clear the state by pressing Close.
12-2
Chapter 12. When Warning or Fault Occurs
Chapter 12.
[Ink Low Warning] screen
● When Close is pressed, the warning window is closed, but the warning state is not cleared. The warning
name is displayed in the warning display area (see the figure above).
● If the warning state is cleared, the warning display is automatically closed.
● The details on the confirmation message are described on each operation page.
12-3
Chapter 12. When Warning or Fault Occurs
● According to the animation displayed, when Reset is pressed after the cause is removed, the fault state is
cleared, and the message is closed.
● When Close is pressed, the fault window is closed, but the fault state is not cleared. At this time, when
Fault is pressed in the status display area, the fault window appears again.
● However, when the unit is no longer in the fault state, you can clear the state by pressing Close.
12-4
Chapter 12. When Warning or Fault Occurs
Chapter 12.
No.
Printing cannot continue because the ink
reservoir is almost empty.
E-001 Ink Low Fault (If the ink is not refilled within 60 ● Replace the ink cartridge. ( *1
8.1.)
minutes after the warning, the warning
changes to the fault, stopping the unit.)
● Drain some ink from the main ink
tank.
( Technical Manual 5.12)
Main Ink Tank Too The ink level of the main ink tank is too
E-002 If an ink concentration warning is
Full high.
displayed, replace the ink to adjust the
ink concentration to a normal level.
( Technical Manual 5.3)
Deflection Voltage ● Contact your nearest local
E-003 The deflection voltage is abnormal.
Fault distributor.
Ink Replenishment ● Contact your nearest local
E-004 Automatic ink refilling takes long.
Time-out distributor.
● Clean the gutter, deflection
electrode, and its surroundings.
● Check the ink pressure.
Ink Drop Charge The detection level of ink drop charge is
E-005 ( Technical Manual 5.9)
Too Low too low.
● Adjust the excitation V-ref. value so
that ink drops are produced better.
( Technical Manual 5.10)
SYSTEM ● Turn the power OFF and then back ON
E-006 OPERATION ERROR Unexpected error occurred.
C after 10 seconds.
12-5
Chapter 12. When Warning or Fault Occurs
Fault message list (faults that stop the ink jet) (Continued)
Message
Message Message description Solution
No.
Makeup
● Contact your nearest local
E-010 Replenishment Automatic makeup refilling takes long.
distributor.
Time-out
Printing cannot continue because the
makeup reservoir is almost empty.
● Replace the makeup cartridge.
E-011 Makeup Low Fault (If the makeup is not refilled within 60
( 8.2.)
minutes after the warning, the warning
changes to the fault, stopping the unit.)
Ink Heating Unit
● Contact your nearest local
E-012 Temperature Too The ink heating unit is too hot.
distributor.
High
The cooling fan of the multi DC power
Multi DC Power supply is abnormal. ● Contact your nearest local
E-013
Supply Fan Fault After stopping the ink ejection, the unit distributor.
will be automatically shut down.
The charging voltage supplied from the
Charge Voltage Too ● Contact your nearest local
E-014 high-voltage power supply unit to the
Low distributor.
nozzle drive board EZJ142 is too low.
● Check if there is any electrical short
Charge Voltage The charge voltage cannot be output
E-015 circuit between the charge electrode
Fault properly.
and other parts.
● Make sure that the ink stream is
nearly at the center of the gutter.
● Clean the gutter, deflection
electrode, and its surroundings.
● Check the ink pressure.
E-016 No Ink Drop Charge The ink drop charge cannot be detected. ( Technical Manual 5.9)
● Adjust the excitation V-ref. value so
that ink drops are produced better.
( Technical Manual 5.10)
● Make sure that the ink stream has
been correctly recovered.
Ink Heating Unit
The detection temperature of the ink ● Contact your nearest local
E-017 Temperature Sensor
heating unit is abnormal. distributor.
Fault
● Contact your nearest local
E-020 Memory Fault M The memory data has a fault.
distributor.
(Continue to next page)
12-6
Chapter 12. When Warning or Fault Occurs
Fault message list (faults that stop the ink jet) (Continued)
Message
Message Message description Solution
No.
Ink Heating Unit ● Contact your nearest local
E-024 The ink heating unit shorted out.
Over Current distributor.
Ambient
The detection temperature of the ambient ● Contact your nearest local
E-025 Temperature Sensor
temperature measurement is abnormal. distributor.
Fault
Print Controller The cooling fan of the print controller ● Contact your nearest local
E-026
Cooling Fan Fault area is abnormal. distributor.
● Contact your nearest local
E-031 Pump Motor Fault The pump motor is abnormal.
distributor.
Chapter 12.
Inside Temperature The detection temperature of the inside ● Contact your nearest local
E-032
Sensor Fault temperature measurement is abnormal. distributor.
The ink heating unit temperature does not
Ink Heating Unit ● Contact your nearest local
E-034 rise above the correct operating
Temperature Low distributor.
temperature.
● Contact your nearest local
E-035 Model-key Fault The model-key cannot be recognized.
distributor.
Circulation Route ● Contact your nearest local
E-251 The circulation route pressure is high.
Pressure Is High distributor.
12-7
Chapter 12. When Warning or Fault Occurs
12-8
Chapter 12. When Warning or Fault Occurs
Fault message list (faults that do not stop the ink jet) (Continued)
Message
Message Message description Solution
No.
The number of format types (the order of
Excessive Format
E-057 [Line], [Line spacing], and [Dot matrix]) ● Set eight or fewer format types.
Count
of each column exceeds eight.
Internal
An internal data processing error ● Turn the power OFF and then back
E-062 Communication
occurred. ON after ten seconds.
Error C
Internal
An internal data processing error ● Turn the power OFF and then back
E-063 Communication
occurred. ON after ten seconds.
Error M
Chapter 12.
● Drain the liquid in the cleaning
Cleaning solvent
The cleaning solvent container sensor solvent container.
E-232 container sensor
detected the OFF status. ● Set the cleaning solvent container in
non-detection error
the cleaning station.
● Do not remove the print head from
Printhead removal No print head was found in the cleaning
E-233 the cleaning station during head
error head.
cleaning.
Air pump motor ● Contact your nearest local
E-234 The air pump is abnormal.
error distributor.
Makeup Route ● Contact your nearest local
E-240
Pressure Is High
Makeup route pressure is high.
distributor.
Ink Level The level sensor in the ink reservoir does ● Contact your nearest local
E-245
Sensor Broken 1 not work properly. distributor.
The level sensor in the makeup reservoir
does not work properly.
Makeup Level The mode is switched temporarily so that ● Contact your nearest local
E-246
Sensor Broken 1 the makeup cannot be replaced until the distributor.
warning [Makeup Low Warning]
appears.
Ink Level The level sensor in the ink reservoir does ● Contact your nearest local
E-254
Sensor Broken 3 not work properly. distributor.
Makeup Level The level sensor in the makeup reservoir ● Contact your nearest local
E-255
Sensor Broken 3 does not work properly. distributor.
12-9
Chapter 12. When Warning or Fault Occurs
12-10
Chapter 12. When Warning or Fault Occurs
Chapter 12.
● Use the pressure-reducing valve to
W-087 Ink Pressure High The ink pressure is above the valid range. adjust the pressure.
( Technical Manual 5.9)
● To print using the calendar, set the
correct calendar time in [Date/time
The internal battery level of the controller setup] as a temporary action.
W-088 Battery Low C
is low. ( 6.2.)
● Contact your nearest local
distributor.
● Use the pressure-reducing valve to
W-093 Ink Pressure Low The ink pressure is below the valid range. adjust the pressure.
( Technical Manual 5.9)
● Slow the print target speed.
Product Speed The encoder pulse rate exceeds the
W-095 ● Decrease N in the ink drop use
Matching Error available printing speed.
percentage (1/N).
● Contact your nearest local
W-129 Model-key Failure The model-key cannot be recognized.
distributor.
Circulation System The cooling fan of the circulation system ● Contact your nearest local
W-135
Cooling Fan Fault area is abnormal. distributor.
● Check the ink recovery status.
● Replace the air filter or secure some
Inside Temperature The temperature inside the unit is rising,
W-136 space around the unit.
Too High so the ink may not be recovered.
● Contact your nearest local
distributor.
● Contact your nearest local
W-151 RFID Reader Failure The RFID reader cannot be recognized.
distributor.
Makeup Ejection ● Contact your nearest local
W-152 The makeup ejection pressure is low.
Pressure Low distributor.
12-11
Chapter 12. When Warning or Fault Occurs
Message
Message Message description Solution
No.
Ink reservoir change ● Contact your nearest local distributor
The ink reservoir will need to be replaced
87 announcement in and replace the ink reservoir within a
in a month.
advance month.
Ink reservoir replace ● Contact your nearest local distributor
88 The ink reservoir needs to be replaced.
announcement and replace the ink reservoir.
12-12
Chapter 12. When Warning or Fault Occurs
(1) Functions
● Allows you to view the occurrence time and description of a fault or warning message.
● Up to 480 messages are displayed.
● When there are 481 or more messages, they are cleared from the oldest first.
(2) Operation
Assume that the administrator is logged in to the system.
Press View alarm history on [Setting].
The [Fault/warning log] screen appears.
Chapter 12.
12-13
Chapter 12. When Warning or Fault Occurs
● If a printing failure occurs, take action appropriate to the symptom according to the solution table below.
● If the action does not solve the problem, the board or circulation system may be faulty.
Contact your nearest local distributor.
12-14
Chapter 12. When Warning or Fault Occurs
Chapter 12.
The nozzle is a little clogged. ● Backwash the nozzle. 5.4.1. (*1)
The ink pressure has changed. ● Adjust the ink pressure to 5.9. (*1)
the standard value.
The ink has deteriorated. ● Replace the ink. 5.3. (*1)
Water or oil is attached to the ● Make sure that nothing is -
surface of the print target. attached to the print target
before printing.
The ink pressure has changed. ● Adjust the ink pressure to 5.9. (*1)
the standard value.
The characters are out of Ink or foreign matter is attached ● Clean the charge or 5.6. . (*1)
4 to the charge or deflection deflection electrode.
order.
electrode.
The nozzle is a little clogged. ● Backwash the nozzle. 5.4.1. (*1)
The ink has deteriorated. ● Replace the ink. 5.3. (*1)
The excitation V-ref. value is ● Adjust the excitation V-ref. 5.10. (*1)
inappropriate. value.
12-15
Chapter 11. Chapter 12. Chapter 13. Chapter 14. Chapter 15.
13-1
Chapter 13.
13. Troubleshooting Guide
Chapter 13. Troubleshooting Guide
If the unit does not start up normally, check the following before concluding that it is malfunctioning.
Troubleshooting Guide
Symptom Check item Solution
● Check if the main power switch is
● Turn ON the main power switch.
ON.
● Check if the power plug is
properly connected to a power ● Turn OFF the main power switch. Make
outlet. sure that power is supplied to the power
● Check if electrical power is outlet, and then connect the power plug to
The power does not turn supplied to the employed power the power outlet.
ON by pressing the ON outlet.
switch.
● Make sure that the status indicator lamp is
● Check if the status indicator lamp OFF before pressing the ON switch.
was not ON when the ON switch ● Turn OFF the main power switch and ON
was pressed. it back ON after ten seconds. Then, press
● Check if the ON switch was the ON switch.
pressed for about two seconds. ● Press the ON switch for about two
seconds.
● Check if [clock stop] is selected ● Set the current date and time as the
The printed calendar
in [Date/time setup]. (See "9.2. calendar time.
time is incorrect.
Setting Date and Time".) (See "9.2. Setting Date and Time".)
● Check if there is ink stream
● Stop the ink ejection by pressing Stop.
The unit does not ejection from the nozzle.
● See the Technical Manual "5.5. Stream
become ready for ● Check if the ejected ink stream
alignment" and correct the problem.
printing even when enters the gutter hole.
STARTUP is pressed. ● See "1.2.3. Print Head Cleaning" and
● Check if the print head is dirty.
clean the print head.
● Check if the confirmation window
The remote operation ● Close the window and display the
is displayed.
does not work even [HOME] screen. Then, input the signal
● Check if any other screen than
when the signal is input. again.
[HOME] is displayed.
(Continue to next page)
13-2
Chapter 13. Troubleshooting Guide
[Note]
If the above action does not solve the problem, stop using the unit. Then, disconnect the power plug from the
power outlet and contact your Hitachi distributor.
Chapter 13.
■ Necessary information
* The model number and serial number are written on the nameplate attached to the right-hand side of the unit.
13-3
This page is blank.
Chapter 11. Chapter 12. Chapter 13. Chapter 14. Chapter 15.
14-1
Chapter 14.
14. Emergency Procedures
Chapter 14. Emergency Procedures
This chapter describes the operations to be performed if an emergency such as an earthquake or fire occurs while
the unit is running.
WARNING
● If an earthquake, fire, or other emergency occurs while the printer is engaged in printing or just
turned on, press the main power switch to turn off the power.
Do not perform this operation in any other situation than emergency.
Main power
switch
● Immediately after the emergency is over, make sure that there are no abnormalities in the unit appearance,
wiring, and inside of the head. Then, press the main power switch to turn the power back ON and press
STARTUP to start ink ejection.
[Note]
In the event of a power failure, make sure that the print description and other settings are correct before
restoring the operation by turning the power ON again. If they are incorrect, reconfigure them.
14-2
Chapter 11. Chapter 12. Chapter 13. Chapter 14. Chapter 15.
15-1
Chapter 15.
15. Appendix
Chapter 15. Appendix
15-2
Chapter 15. Appendix
https://www.gnu.org/licenses/gpl-2.0.html
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
Chapter 15.
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU
General Public License is intended to guarantee your freedom to share and change free software--to make sure the
software is free for all its users. This General Public License applies to most of the Free Software Foundation's software
and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered
by the GNU Lesser General Public License instead.) You can apply it to your programs, too.
15-3
Chapter 15. Appendix
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to
make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that
you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free
programs; and that you know you can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender
the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you
modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the
rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them
these terms so they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal
permission to copy, distribute and/or modify the software.
Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty
for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what
they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of
a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have
made it clear that any patent must be licensed for everyone's free use or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow.
0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it
may be distributed under the terms of this General Public License. The "Program", below, refers to any such program
or work, and a "work based on the Program" means either the Program or any derivative work under copyright law:
that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated
into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each
licensee is addressed as "you".
Activities other than copying, distribution and modification are not covered by this License; they are outside its scope.
The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute
a work based on the Program (independent of having been made by running the Program). Whether that is true depends
on what the Program does.
1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided
that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of
warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other
recipients of the Program a copy of this License along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in
exchange for a fee.
2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program,
and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet
all of these conditions:
a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any
change. b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from
the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this
License. c) If the modified program normally reads commands interactively when run, you must cause it, when started
running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate
15-4
Chapter 15. Appendix
copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may
redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception:
if the Program itself is interactive but does not normally print such an announcement, your work based on the Program
is not required to print an announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from
the Program, and can be reasonably considered independent and separate works in themselves, then this License, and
its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same
sections as part of a whole which is a work based on the Program, the distribution of the whole must be on
the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every
part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the
intent is to exercise the right to control the distribution of derivative or collective works based on the Program.
In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the
Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.
3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form
under the terms of Sections 1 and 2 above provided that you also do one of the following:
a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the
terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a
written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically
performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed
under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany
it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed
only for noncommercial distribution and only if you received the program in object code or executable form with such
an offer, in accord with Subsection b above.)
The source code for a work means the preferred form of the work for making modifications to it. For an executable work,
complete source code means all the source code for all modules it contains, plus any associated interface definition files,
plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source
code distributed need not include anything that is normally distributed (in either source or binary form) with the major
components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component
itself accompanies the executable.
If distribution of executable or object code is made by offering access to copy from a designated place, then offering
equivalent access to copy the source code from the same place counts as distribution of the source code, even though third
parties are not compelled to copy the source along with the object code.
4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any
attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your
rights under this License. However, parties who have received copies, or rights, from you under this License will not
have their licenses terminated so long as such parties remain in full compliance.
5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission
to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept
this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate
your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the
Program or works based on it.
Chapter 15.
6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a
license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You
may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible
for enforcing compliance by third parties to this License.
7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to
patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the
15-5
Chapter 15. Appendix
conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as
to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a
consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free
redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way
you could satisfy both it and this License would be to refrain entirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section
is intended to apply and the section as a whole is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity
of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution
system, which is implemented by public license practices. Many people have made generous contributions to the wide
range of software distributed through that system in reliance on consistent application of that system; it is up to the
author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose
that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.
8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted
interfaces, the original copyright holder who places the Program under this License may add an explicit geographical
distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus
excluded. In such case, this License incorporates the limitation as if written in the body of this License.
9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to
time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems
or concerns.
Each version is given a distinguishing version number. If the Program specifies a version number of this License which
applies to it and "any later version", you have the option of following the terms and conditions either of that version or of
any later version published by the Free Software Foundation. If the Program does not specify a version number of this
License, you may choose any version ever published by the Free Software Foundation.
10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different,
write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write
to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two
goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of
software generally.
NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE
PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED
IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS"
WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH
YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY
SERVICING, REPAIR OR CORRECTION.
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY
COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE
PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL,
SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO
USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED
INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM
TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN
15-6
Chapter 15. Appendix
If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve
this is to make it free software which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most
effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to where
the full notice is found.
one line to give the program's name and an idea of what it does.
Copyright (C) yyyy name of author
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License
as published by the Free Software Foundation; either version 2
of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied
warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program; if not, write to the Free
Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
Also add information on how to contact you by electronic and paper mail.
If the program is interactive, make it output a short notice like this when it starts in an interactive mode:
Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO
WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under certain
conditions; type `show c' for details.
The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of
course, the commands you use may be called something other than `show w' and `show c'; they could even be mouse-
clicks or menu items--whatever suits your program.
You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer"
for the program, if necessary. Here is a sample; alter the names:
Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision'
(which makes passes at compilers) written by James Hacker.
This General Public License does not permit incorporating your program into proprietary programs. If your program is a
subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is
what you want to do, use the GNU Lesser General Public License instead of this License.
Chapter 15.
15-7
Chapter 15. Appendix
https://www.gnu.org/licenses/gpl-3.0.html
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
Preamble
The GNU General Public License is a free, copyleft license for software and other kinds of works.
The licenses for most software and other practical works are designed to take away your freedom to share and change the
works. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change all
versions of a program--to make sure it remains free software for all its users. We, the Free Software Foundation, use the
GNU General Public License for most of our software; it applies also to any other work released this way by its authors.
You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to
make sure that you have the freedom to distribute copies of free software (and charge for them if you wish), that you
receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs,
and that you know you can do these things.
To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights.
Therefore, you have certain responsibilities if you distribute copies of the software, or if you modify it: responsibilities to
respect the freedom of others.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the
same freedoms that you received. You must make sure that they, too, receive or can get the source code. And you must
show them these terms so they know their rights.
Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright on the software, and (2) offer
you this License giving you legal permission to copy, distribute and/or modify it.
For the developers' and authors' protection, the GPL clearly explains that there is no warranty for this free software. For
both users' and authors' sake, the GPL requires that modified versions be marked as changed, so that their problems will
not be attributed erroneously to authors of previous versions.
15-8
Chapter 15. Appendix
Some devices are designed to deny users access to install or run modified versions of the software inside them, although
the manufacturer can do so. This is fundamentally incompatible with the aim of protecting users' freedom to change the
software. The systematic pattern of such abuse occurs in the area of products for individuals to use, which is precisely
where it is most unacceptable. Therefore, we have designed this version of the GPL to prohibit the practice for those
products. If such problems arise substantially in other domains, we stand ready to extend this provision to those domains
in future versions of the GPL, as needed to protect the freedom of users.
Finally, every program is threatened constantly by software patents. States should not allow patents to restrict
development and use of software on general-purpose computers, but in those that do, we wish to avoid the special danger
that patents applied to a free program could make it effectively proprietary. To prevent this, the GPL assures that patents
cannot be used to render the program non-free.
The precise terms and conditions for copying, distribution and modification follow.
0. Definitions.
“Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor masks.
“The Program” refers to any copyrightable work licensed under this License. Each licensee is addressed as “you”.
“Licensees” and “recipients” may be individuals or organizations.
To “modify” a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other
than the making of an exact copy. The resulting work is called a “modified version” of the earlier work or a work “based
on” the earlier work.
A “covered work” means either the unmodified Program or a work based on the Program.
To “propagate” a work means to do anything with it that, without permission, would make you directly or secondarily
liable for infringement under applicable copyright law, except executing it on a computer or modifying a private copy.
Propagation includes copying, distribution (with or without modification), making available to the public, and in some
countries other activities as well.
To “convey” a work means any kind of propagation that enables other parties to make or receive copies. Mere interaction
with a user through a computer network, with no transfer of a copy, is not conveying.
An interactive user interface displays “Appropriate Legal Notices” to the extent that it includes a convenient and
prominently visible feature that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty
for the work (except to the extent that warranties are provided), that licensees may convey the work under this License,
and how to view a copy of this License. If the interface presents a list of user commands or options, such as a menu, a
prominent item in the list meets this criterion.
1. Source Code.
The “source code” for a work means the preferred form of the work for making modifications to it. “Object code” means
any non-source form of a work.
Chapter 15.
A “Standard Interface” means an interface that either is an official standard defined by a recognized standards body, or, in
the case of interfaces specified for a particular programming language, one that is widely used among developers working
in that language.
The “System Libraries” of an executable work include anything, other than the work as a whole, that (a) is included in the
normal form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to
enable use of the work with that Major Component, or to implement a Standard Interface for which an implementation is
15-9
Chapter 15. Appendix
available to the public in source code form. A “Major Component”, in this context, means a major essential component
(kernel, window system, and so on) of the specific operating system (if any) on which the executable work runs, or a
compiler used to produce the work, or an object code interpreter used to run it.
The “Corresponding Source” for a work in object code form means all the source code needed to generate, install, and
(for an executable work) run the object code and to modify the work, including scripts to control those activities. However,
it does not include the work's System Libraries, or general-purpose tools or generally available free programs which are
used unmodified in performing those activities but which are not part of the work. For example, Corresponding Source
includes interface definition files associated with source files for the work, and the source code for shared libraries and
dynamically linked subprograms that the work is specifically designed to require, such as by intimate data communication
or control flow between those subprograms and other parts of the work.
The Corresponding Source need not include anything that users can regenerate automatically from other parts of the
Corresponding Source.
The Corresponding Source for a work in source code form is that same work.
2. Basic Permissions.
All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided
the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program.
The output from running a covered work is covered by this License only if the output, given its content, constitutes a
covered work. This License acknowledges your rights of fair use or other equivalent, as provided by copyright law.
You may make, run and propagate covered works that you do not convey, without conditions so long as your license
otherwise remains in force. You may convey covered works to others for the sole purpose of having them make
modifications exclusively for you, or provide you with facilities for running those works, provided that you comply with
the terms of this License in conveying all material for which you do not control copyright. Those thus making or running
the covered works for you must do so exclusively on your behalf, under your direction and control, on terms that prohibit
them from making any copies of your copyrighted material outside their relationship with you.
Conveying under any other circumstances is permitted solely under the conditions stated below. Sublicensing is not
allowed; section 10 makes it unnecessary.
No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling
obligations under article 11 of the WIPO copyright treaty adopted on 20 December 1996, or similar laws prohibiting or
restricting circumvention of such measures.
When you convey a covered work, you waive any legal power to forbid circumvention of technological measures to the
extent such circumvention is effected by exercising rights under this License with respect to the covered work, and you
disclaim any intention to limit operation or modification of the work as a means of enforcing, against the work's users,
your or third parties' legal rights to forbid circumvention of technological measures.
You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you
conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that
this License and any non-permissive terms added in accord with section 7 apply to the code; keep intact all notices of the
absence of any warranty; and give all recipients a copy of this License along with the Program.
You may charge any price or no price for each copy that you convey, and you may offer support or warranty protection
for a fee.
15-10
Chapter 15. Appendix
You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source
code under the terms of section 4, provided that you also meet all of these conditions:
a) The work must carry prominent notices stating that you modified it, and giving a relevant date.
b) The work must carry prominent notices stating that it is released under this License and any conditions added under
section 7. This requirement modifies the requirement in section 4 to “keep intact all notices”.
c) You must license the entire work, as a whole, under this License to anyone who comes into possession of a copy. This
License will therefore apply, along with any applicable section 7 additional terms, to the whole of the work, and all
its parts, regardless of how they are packaged. This License gives no permission to license the work in any other way,
but it does not invalidate such permission if you have separately received it.
d) If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the Program has
interactive interfaces that do not display Appropriate Legal Notices, your work need not make them do so.
A compilation of a covered work with other separate and independent works, which are not by their nature extensions of
the covered work, and which are not combined with it such as to form a larger program, in or on a volume of a storage or
distribution medium, is called an “aggregate” if the compilation and its resulting copyright are not used to limit the access
or legal rights of the compilation's users beyond what the individual works permit. Inclusion of a covered work in an
aggregate does not cause this License to apply to the other parts of the aggregate.
You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey
the machine-readable Corresponding Source under the terms of this License, in one of these ways:
a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium),
accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software
interchange.
b) Convey the object code in, or embodied in, a physical product (including a physical distribution medium),
accompanied by a written offer, valid for at least three years and valid for as long as you offer spare parts or customer
support for that product model, to give anyone who possesses the object code either (1) a copy of the Corresponding
Source for all the software in the product that is covered by this License, on a durable physical medium customarily
used for software interchange, for a price no more than your reasonable cost of physically performing this conveying
of source, or (2) access to copy the Corresponding Source from a network server at no charge.
c) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source.
This alternative is allowed only occasionally and noncommercially, and only if you received the object code with such
an offer, in accord with subsection 6b.
d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent access
to the Corresponding Source in the same way through the same place at no further charge. You need not require
recipients to copy the Corresponding Source along with the object code. If the place to copy the object code is a
network server, the Corresponding Source may be on a different server (operated by you or a third party) that supports
equivalent copying facilities, provided you maintain clear directions next to the object code saying where to find the
Corresponding Source. Regardless of what server hosts the Corresponding Source, you remain obligated to ensure
that it is available for as long as needed to satisfy these requirements.
e) Convey the object code using peer-to-peer transmission, provided you inform other peers where the object code and
Corresponding Source of the work are being offered to the general public at no charge under subsection 6d.
A separable portion of the object code, whose source code is excluded from the Corresponding Source as a System Library,
need not be included in conveying the object code work.
Chapter 15.
A “User Product” is either (1) a “consumer product”, which means any tangible personal property which is normally used
for personal, family, or household purposes, or (2) anything designed or sold for incorporation into a dwelling. In
determining whether a product is a consumer product, doubtful cases shall be resolved in favor of coverage. For a
particular product received by a particular user, “normally used” refers to a typical or common use of that class of product,
regardless of the status of the particular user or of the way in which the particular user actually uses, or expects or is
expected to use, the product. A product is a consumer product regardless of whether the product has substantial
commercial, industrial or non-consumer uses, unless such uses represent the only significant mode of use of the product.
15-11
Chapter 15. Appendix
“Installation Information” for a User Product means any methods, procedures, authorization keys, or other information
required to install and execute modified versions of a covered work in that User Product from a modified version of its
Corresponding Source. The information must suffice to ensure that the continued functioning of the modified object code
is in no case prevented or interfered with solely because modification has been made.
If you convey an object code work under this section in, or with, or specifically for use in, a User Product, and the
conveying occurs as part of a transaction in which the right of possession and use of the User Product is transferred to the
recipient in perpetuity or for a fixed term (regardless of how the transaction is characterized), the Corresponding
Source conveyed under this section must be accompanied by the Installation Information. But this requirement does not
apply if neither you nor any third party retains the ability to install modified object code on the User Product (for example,
the work has been installed in ROM).
The requirement to provide Installation Information does not include a requirement to continue to provide support service,
warranty, or updates for a work that has been modified or installed by the recipient, or for the User Product in which it
has been modified or installed. Access to a network may be denied when the modification itself materially and adversely
affects the operation of the network or violates the rules and protocols for communication across the network.
Corresponding Source conveyed, and Installation Information provided, in accord with this section must be in a format
that is publicly documented (and with an implementation available to the public in source code form), and must require
no special password or key for unpacking, reading or copying.
7. Additional Terms.
“Additional permissions” are terms that supplement the terms of this License by making exceptions from one or more of
its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were
included in this License, to the extent that they are valid under applicable law. If additional permissions apply only to part
of the Program, that part may be used separately under those permissions, but the entire Program remains governed by
this License without regard to the additional permissions.
When you convey a copy of a covered work, you may at your option remove any additional permissions from that copy,
or from any part of it. (Additional permissions may be written to require their own removal in certain cases when you
modify the work.) You may place additional permissions on material, added by you to a covered work, for which you
have or can give appropriate copyright permission.
Notwithstanding any other provision of this License, for material you add to a covered work, you may (if authorized by
the copyright holders of that material) supplement the terms of this License with terms:
a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License; or
b) Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate
Legal Notices displayed by works containing it; or
c) Prohibiting misrepresentation of the origin of that material, or requiring that modified versions of such material be
marked in reasonable ways as different from the original version; or
d) Limiting the use for publicity purposes of names of licensors or authors of the material; or
e) Declining to grant rights under trademark law for use of some trade names, trademarks, or service marks; or
f) Requiring indemnification of licensors and authors of that material by anyone who conveys the material (or modified
versions of it) with contractual assumptions of liability to the recipient, for any liability that these contractual
assumptions directly impose on those licensors and authors.
All other non-permissive additional terms are considered “further restrictions” within the meaning of section 10. If the
Program as you received it, or any part of it, contains a notice stating that it is governed by this License along with a term
that is a further restriction, you may remove that term. If a license document contains a further restriction but permits
relicensing or conveying under this License, you may add to a covered work material governed by the terms of that license
document, provided that the further restriction does not survive such relicensing or conveying.
If you add terms to a covered work in accord with this section, you must place, in the relevant source files, a statement of
the additional terms that apply to those files, or a notice indicating where to find the applicable terms.
15-12
Chapter 15. Appendix
Additional terms, permissive or non-permissive, may be stated in the form of a separately written license, or stated as
exceptions; the above requirements apply either way.
8. Termination.
You may not propagate or modify a covered work except as expressly provided under this License. Any attempt otherwise
to propagate or modify it is void, and will automatically terminate your rights under this License (including any patent
licenses granted under the third paragraph of section 11).
However, if you cease all violation of this License, then your license from a particular copyright holder is reinstated (a)
provisionally, unless and until the copyright holder explicitly and finally terminates your license, and (b) permanently, if
the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation.
Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you
of the violation by some reasonable means, this is the first time you have received notice of violation of this License (for
any work) from that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice.
Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights
from you under this License. If your rights have been terminated and not permanently reinstated, you do not qualify to
receive new licenses for the same material under section 10.
You are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a
covered work occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not
require acceptance. However, nothing other than this License grants you permission to propagate or modify any covered
work. These actions infringe copyright if you do not accept this License. Therefore, by modifying or propagating a covered
work, you indicate your acceptance of this License to do so.
Each time you convey a covered work, the recipient automatically receives a license from the original licensors, to run,
modify and propagate that work, subject to this License. You are not responsible for enforcing compliance by third parties
with this License.
An “entity transaction” is a transaction transferring control of an organization, or substantially all assets of one, or
subdividing an organization, or merging organizations. If propagation of a covered work results from an entity transaction,
each party to that transaction who receives a copy of the work also receives whatever licenses to the work the party's
predecessor in interest had or could give under the previous paragraph, plus a right to possession of the Corresponding
Source of the work from the predecessor in interest, if the predecessor has it or can get it with reasonable efforts.
You may not impose any further restrictions on the exercise of the rights granted or affirmed under this License. For
example, you may not impose a license fee, royalty, or other charge for exercise of rights granted under this License, and
you may not initiate litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is
infringed by making, using, selling, offering for sale, or importing the Program or any portion of it.
11. Patents.
A “contributor” is a copyright holder who authorizes use under this License of the Program or a work on which the Program
Chapter 15.
is based. The work thus licensed is called the contributor's “contributor version”.
A contributor's “essential patent claims” are all patent claims owned or controlled by the contributor, whether already
acquired or hereafter acquired, that would be infringed by some manner, permitted by this License, of making, using, or
selling its contributor version, but do not include claims that would be infringed only as a consequence of further
modification of the contributor version. For purposes of this definition, “control” includes the right to grant patent
sublicenses in a manner consistent with the requirements of this License.
15-13
Chapter 15. Appendix
Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's essential patent
claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor
version.
In the following three paragraphs, a “patent license” is any express agreement or commitment, however denominated, not
to enforce a patent (such as an express permission to practice a patent or covenant not to sue for patent infringement). To
“grant” such a patent license to a party means to make such an agreement or commitment not to enforce a patent against
the party.
If you convey a covered work, knowingly relying on a patent license, and the Corresponding Source of the work is not
available for anyone to copy, free of charge and under the terms of this License, through a publicly available network
server or other readily accessible means, then you must either (1) cause the Corresponding Source to be so available, or
(2) arrange to deprive yourself of the benefit of the patent license for this particular work, or (3) arrange, in a manner
consistent with the requirements of this License, to extend the patent license to downstream recipients. “Knowingly
relying” means you have actual knowledge that, but for the patent license, your conveying the covered work in a
country, or your recipient's use of the covered work in a country, would infringe one or more identifiable patents in that
country that you have reason to believe are valid.If, pursuant to or in connection with a single transaction or arrangement,
you convey, or propagate by procuring conveyance of, a covered work, and grant a patent license to some of the parties
receiving the covered work authorizing them to use, propagate, modify or convey a specific copy of the covered work,
then the patent license you grant is automatically extended to all recipients of the covered work and works based on it.
A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the exercise of, or is
conditioned on the non-exercise of one or more of the rights that are specifically granted under this License. You may not
convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing
software, under which you make payment to the third party based on the extent of your activity of conveying the work,
and under which the third party grants, to any of the parties who would receive the covered work from you, a
discriminatory patent license (a) in connection with copies of the covered work conveyed by you (or copies made from
those copies), or (b) primarily for and in connection with specific products or compilations that contain the covered work,
unless you entered into that arrangement, or that patent license was granted, prior to 28 March 2007.
Nothing in this License shall be construed as excluding or limiting any implied license or other defenses to infringement
that may otherwise be available to you under applicable patent law.
If conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this
License, they do not excuse you from the conditions of this License. If you cannot convey a covered work so as to satisfy
simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may
not convey it at all. For example, if you agree to terms that obligate you to collect a royalty for further conveying from
those to whom you convey the Program, the only way you could satisfy both those terms and this License would be to
refrain entirely from conveying the Program.
Notwithstanding any other provision of this License, you have permission to link or combine any covered work with a
work licensed under version 3 of the GNU Affero General Public License into a single combined work, and to convey the
resulting work. The terms of this License will continue to apply to the part which is the covered work, but the special
requirements of the GNU Affero General Public License, section 13, concerning interaction through a network will apply
to the combination as such.
The Free Software Foundation may publish revised and/or new versions of the GNU General Public License from time
to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems
or concerns.
15-14
Chapter 15. Appendix
Each version is given a distinguishing version number. If the Program specifies that a certain numbered version of the
GNU General Public License “or any later version” applies to it, you have the option of following the terms and conditions
either of that numbered version or of any later version published by the Free Software Foundation. If the Program does
not specify a version number of the GNU General Public License, you may choose any version ever published by the
Free Software Foundation.
If the Program specifies that a proxy can decide which future versions of the GNU General Public License can be used,
that proxy's public statement of acceptance of a version permanently authorizes you to choose that version for the Program.
Later license versions may give you additional or different permissions. However, no additional obligations are imposed
on any author or copyright holder as a result of your choosing to follow a later version.
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.
EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR
IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF
THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to
their terms, reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability
in connection with the Program, unless a warranty or assumption of liability accompanies a copy of the Program in return
for a fee.
If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve
this is to make it free software which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most
effectively state the exclusion of warranty; and each file should have at least the “copyright” line and a pointer to where
Chapter 15.
15-15
Chapter 15. Appendix
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
Also add information on how to contact you by electronic and paper mail.
If the program does terminal interaction, make it output a short notice like this when it starts in an interactive mode:
<program> Copyright (C) <year> <name of author>
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
This is free software, and you are welcome to redistribute it
under certain conditions; type `show c' for details.
The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of
course, your program's commands might be different; for a GUI interface, you would use an “about box”.
You should also get your employer (if you work as a programmer) or school, if any, to sign a “copyright disclaimer” for
the program, if necessary. For more information on this, and how to apply and follow the GNU GPL, see
<http://www.gnu.org/licenses/>.
The GNU General Public License does not permit incorporating your program into proprietary programs. If your program
is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this
is what you want to do, use the GNU Lesser General Public License instead of this License. But first, please read
<http://www.gnu.org/philosophy/why-not-lgpl.html>.
15-16
Chapter 15. Appendix
We use the following open source software covered by the GNU LESSER General Public License Version 2.1,
February 1999 or later (“LGPL”) for this product in accordance with the terms of the LGPL.
We disclose the source code of the open source software included in this product that is covered by the LGPL
based on the LGPL. Those who wish to copy, modify, or distribute the open source software will be provided
with media. However, please note the following points.
- We cannot answer any questions regarding the contents of the source code.
- We do not guarantee any programs created by the provided source code.
- Actual costs may be charged separately when providing media.
-The source code will be provided for the longer of the period specified in the license or the production period.
https://www.gnu.org/licenses/lgpl-2.1.html
[This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License,
version 2, hence the version number 2.1.]
Chapter 15.
15-17
Chapter 15. Appendix
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU
General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the
software is free for all its users.
This license, the Lesser General Public License, applies to some specially designated software packages--typically
libraries--of the Free Software Foundation and other authors who decide to use it. You can use it too, but we suggest you
first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any
particular case, based on the explanations below.
When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are designed
to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish); that
you receive source code or can get it if you want it; that you can change the software and use pieces of it in new free
programs; and that you are informed that you can do these things.
To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to ask you to
surrender these rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library
or if you modify it.
For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights
that we gave you. You must make sure that they, too, receive or can get the source code. If you link other code with the
library, you must provide complete object files to the recipients, so that they can relink them with the library after making
changes to the library and recompiling it. And you must show them these terms so they know their rights.
We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives
you legal permission to copy, distribute and/or modify the library.
To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the library
is modified by someone else and passed on, the recipients should know that what they have is not the original version, so
that the original author's reputation will not be affected by problems that might be introduced by others.
Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a company
cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder. Therefore,
we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use
specified in this license.
Most GNU software, including some libraries, is covered by the ordinary GNU General Public License. This license, the
GNU Lesser General Public License, applies to certain designated libraries, and is quite different from the ordinary
General Public License. We use this license for certain libraries in order to permit linking those libraries into non-free
programs.
When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally
speaking a combined work, a derivative of the original library. The ordinary General Public License therefore permits
such linking only if the entire combination fits its criteria of freedom. The Lesser General Public License permits more
lax criteria for linking other code with the library.
We call this license the "Lesser" General Public License because it does Less to protect the user's freedom than the
ordinary General Public License. It also provides other free software developers Less of an advantage over competing
non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries.
However, the Lesser license provides advantages in certain special circumstances.
For example, on rare occasions, there may be a special need to encourage the widest possible use of a certain library, so
that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to use the library. A more frequent
case is that a free library does the same job as widely used non-free libraries. In this case, there is little to gain by limiting
the free library to free software only, so we use the Lesser General Public License.
15-18
Chapter 15. Appendix
In other cases, permission to use a particular library in non-free programs enables a greater number of people to use a
large body of free software. For example, permission to use the GNU C Library in non-free programs enables many more
people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating system.
Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the user of a
program that is linked with the Library has the freedom and the wherewithal to run that program using a modified version
of the Library.
The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference
between a "work based on the library" and a "work that uses the library". The former contains code derived from the
library, whereas the latter must be combined with the library in order to run.
0. This License Agreement applies to any software library or other program which contains a notice placed by the
copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public
License (also called "this License"). Each licensee is addressed as "you".
A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application
programs (which use some of those functions and data) to form executables.
The "Library", below, refers to any such software library or work which has been distributed under these terms. A "work
based on the Library" means either the Library or any derivative work under copyright law: that is to say, a work
containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into
another language. (Hereinafter, translation is included without limitation in the term "modification".)
"Source code" for a work means the preferred form of the work for making modifications to it. For a library, complete
source code means all the source code for all modules it contains, plus any associated interface definition files, plus the
scripts used to control compilation and installation of the library.
Activities other than copying, distribution and modification are not covered by this License; they are outside its scope.
The act of running a program using the Library is not restricted, and output from such a program is covered only if its
contents constitute a work based on the Library (independent of the use of the Library in a tool for writing it). Whether
that is true depends on what the Library does and what the program that uses the Library does.
1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium,
provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer
of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and distribute a
copy of this License along with the Library.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in
exchange for a fee.
2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and
copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of
these conditions:
a) The modified work must itself be a software library.
b) You must cause the files modified to carry prominent notices stating that you changed the files and the date of any
change.
c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License.
Chapter 15.
d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application program
that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith
effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and
performs whatever part of its purpose remains meaningful.
(For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent
of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this
function must be optional: if the application does not supply it, the square root function must still compute square
roots.)
15-19
Chapter 15. Appendix
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the
Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms,
do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as
part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this License,
whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote
it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the
intent is to exercise the right to control the distribution of derivative or collective works based on the Library.
In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the
Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.
3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of
the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU
General Public License, version 2, instead of to this License. (If a newer version than version 2 of the ordinary GNU
General Public License has appeared, then you can specify that version instead if you wish.) Do not make any other
change in these notices.
Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License
applies to all subsequent copies and derivative works made from that copy.
This option is useful when you wish to copy part of the code of the Library into a program that is not a library.
4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable
form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding
machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium
customarily used for software interchange.
If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access
to copy the source code from the same place satisfies the requirement to distribute the source code, even though third
parties are not compelled to copy the source along with the object code.
5. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being
compiled or linked with it, is called a "work that uses the Library". Such a work, in isolation, is not a derivative work
of the Library, and therefore falls outside the scope of this License.
However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the Library
(because it contains portions of the Library), rather than a "work that uses the library". The executable is therefore covered
by this License. Section 6 states terms for distribution of such executables.
When a "work that uses the Library" uses material from a header file that is part of the Library, the object code for the
work may be a derivative work of the Library even though the source code is not. Whether this is true is especially
significant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true
is not precisely defined by law.
If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small
inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally
a derivative work. (Executables containing this object code plus portions of the Library will still fall under Section 6.)
Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of
Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the
Library itself.
15-20
Chapter 15. Appendix
6. As an exception to the Sections above, you may also combine or link a "work that uses the Library" with the Library
to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided
that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such
modifications.
You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use
are covered by this License. You must supply a copy of this License. If the work during execution displays copyright
notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the
copy of this License. Also, you must do one of these things:
a) Accompany the work with the complete corresponding machine-readable source code for the Library including
whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work
is an executable linked with the Library, with the complete machine-readable "work that uses the Library", as object
code and/or source code, so that the user can modify the Library and then relink to produce a modified executable
containing the modified Library. (It is understood that the user who changes the contents of definitions files in the
Library will not necessarily be able to recompile the application to use the modified definitions.)
b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run
time a copy of the library already present on the user's computer system, rather than copying library functions into the
executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the
modified version is interface-compatible with the version that the work was made with.
c) Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified
in Subsection 6a, above, for a charge no more than the cost of performing this distribution.
d) If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy
the above specified materials from the same place.
e) Verify that the user has already received a copy of these materials or that you have already sent this user a copy.
For an executable, the required form of the "work that uses the Library" must include any data and utility programs needed
for reproducing the executable from it. However, as a special exception, the materials to be distributed need not include
anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and
so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally
accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an
executable that you distribute.
7. You may place library facilities that are a work based on the Library side-by-side in a single library together with other
library facilities not covered by this License, and distribute such a combined library, provided that the separate
distribution of the work based on the Library and of the other library facilities is otherwise permitted, and provided that
you do these two things:
a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other
library facilities. This must be distributed under the terms of the Sections above.
b) Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and
explaining where to find the accompanying uncombined form of the same work.
8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this
License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will
automatically terminate your rights under this License. However, parties who have received copies, or rights, from you
under this License will not have their licenses terminated so long as such parties remain in full compliance.
Chapter 15.
9. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission
to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this
License. Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your
acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library
or works based on it.
10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a
license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and
15-21
Chapter 15. Appendix
conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are
not responsible for enforcing compliance by third parties with this License.
11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to
patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the
conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to
satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence
you may not distribute the Library at all. For example, if a patent license would not permit royalty-free redistribution
of the Library by all those who receive copies directly or indirectly through you, then the only way you could satisfy
both it and this License would be to refrain entirely from distribution of the Library.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section
is intended to apply, and the section as a whole is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity
of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system
which is implemented by public license practices. Many people have made generous contributions to the wide range of
software distributed through that system in reliance on consistent application of that system; it is up to the author/donor
to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.
12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted
interfaces, the original copyright holder who places the Library under this License may add an explicit geographical
distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus
excluded. In such case, this License incorporates the limitation as if written in the body of this License.
13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from
time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new
problems or concerns.
Each version is given a distinguishing version number. If the Library specifies a version number of this License which
applies to it and "any later version", you have the option of following the terms and conditions either of that version or of
any later version published by the Free Software Foundation. If the Library does not specify a license version number,
you may choose any version ever published by the Free Software Foundation.
14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible
with these, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation,
write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two
goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of
software generally.
NO WARRANTY
15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY,
TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING
THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT
WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE
ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE
LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR
CORRECTION.
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY
COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE
LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL,
SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO
15-22
Chapter 15. Appendix
USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED
INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY
TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
If you develop a new library, and you want it to be of the greatest possible use to the public, we recommend making it
free software that everyone can redistribute and change. You can do so by permitting redistribution under these terms (or,
alternatively, under the terms of the ordinary General Public License).
To apply these terms, attach the following notices to the library. It is safest to attach them to the start of each source file
to most effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer
to where the full notice is found.
one line to give the library's name and an idea of what it does.
Copyright (C) year name of author
This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public
License as published by the Free Software Foundation; either
version 2.1 of the License, or (at your option) any later version.
This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied
warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public License along with this library; if not, write to the
Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
Also add information on how to contact you by electronic and paper mail.
You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer"
for the library, if necessary. Here is a sample; alter the names:
Yoyodyne, Inc., hereby disclaims all copyright interest in
the library `Frob' (a library for tweaking knobs) written
by James Random Hacker.
15-23
Chapter 15. Appendix
https://www.gnu.org/licenses/lgpl-3.0.html
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
This version of the GNU Lesser General Public License incorporates the terms and conditions of version 3 of the GNU
General Public License, supplemented by the additional permissions listed below.
0. Additional Definitions.
As used herein, “this License” refers to version 3 of the GNU Lesser General Public License, and the “GNU GPL” refers
to version 3 of the GNU General Public License.
“The Library” refers to a covered work governed by this License, other than an Application or a Combined Work as defined
below.
An “Application” is any work that makes use of an interface provided by the Library, but which is not otherwise based on
the Library. Defining a subclass of a class defined by the Library is deemed a mode of using an interface provided by the
Library.
A “Combined Work” is a work produced by combining or linking an Application with the Library. The particular version
of the Library with which the Combined Work was made is also called the “Linked Version”.
The “Minimal Corresponding Source” for a Combined Work means the Corresponding Source for the Combined Work,
excluding any source code for portions of the Combined Work that, considered in isolation, are based on the Application,
and not on the Linked Version.
The “Corresponding Application Code” for a Combined Work means the object code and/or source code for the
Application, including any data and utility programs needed for reproducing the Combined Work from the Application,
but excluding the System Libraries of the Combined Work.
You may convey a covered work under sections 3 and 4 of this License without being bound by section 3 of the GNU
GPL.
If you modify a copy of the Library, and, in your modifications, a facility refers to a function or data to be supplied by an
15-24
Chapter 15. Appendix
Application that uses the facility (other than as an argument passed when the facility is invoked), then you may convey a
copy of the modified version:
a) under this License, provided that you make a good faith effort to ensure that, in the event an Application does not
supply the function or data, the facility still operates, and performs whatever part of its purpose remains meaningful, or
b) under the GNU GPL, with none of the additional permissions of this License applicable to that copy.
The object code form of an Application may incorporate material from a header file that is part of the Library. You may
convey such object code under terms of your choice, provided that, if the incorporated material is not limited to numerical
parameters, data structure layouts and accessors, or small macros, inline functions and templates (ten or fewer lines in
length), you do both of the following:
a) Give prominent notice with each copy of the object code that the Library is used in it and that the Library and its use
are covered by this License.
b) Accompany the object code with a copy of the GNU GPL and this license document.
4. Combined Works.
You may convey a Combined Work under terms of your choice that, taken together, effectively do not restrict modification
of the portions of the Library contained in the Combined Work and reverse engineering for debugging such modifications,
if you also do each of the following:
a) Give prominent notice with each copy of the Combined Work that the Library is used in it and that the Library and its
use are covered by this License.
b) Accompany the Combined Work with a copy of the GNU GPL and this license document.
c) For a Combined Work that displays copyright notices during execution, include the copyright notice for the Library
among these notices, as well as a reference directing the user to the copies of the GNU GPL and this license document.
d) Do one of the following: ◦0) Convey the Minimal Corresponding Source under the terms of this License, and the
Corresponding Application Code in a form suitable for, and under terms that permit, the user to recombine or relink
the Application with a modified version of the Linked Version to produce a modified Combined Work, in the manner
specified by section 6 of the GNU GPL for conveying Corresponding Source.
◦1) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (a) uses at
run time a copy of the Library already present on the user's computer system, and (b) will operate properly with a
modified version of the Library that is interface-compatible with the Linked Version.
e) Provide Installation Information, but only if you would otherwise be required to provide such information under
section 6 of the GNU GPL, and only to the extent that such information is necessary to install and execute a modified
version of the Combined Work produced by recombining or relinking the Application with a modified version of the
Linked Version. (If you use option 4d0, the Installation Information must accompany the Minimal Corresponding
Source and Corresponding Application Code. If you use option 4d1, you must provide the Installation Information in
the manner specified by section 6 of the GNU GPL for conveying Corresponding Source.)
5. Combined Libraries.
You may place library facilities that are a work based on the Library side by side in a single library together with other
library facilities that are not Applications and are not covered by this License, and convey such a combined library under
terms of your choice, if you do both of the following:
a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other
library facilities, conveyed under the terms of this License.
b) Give prominent notice with the combined library that part of it is a work based on the Library, and explaining where
Chapter 15.
The Free Software Foundation may publish revised and/or new versions of the GNU Lesser General Public License from
time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new
problems or concerns.
Each version is given a distinguishing version number. If the Library as you received it specifies that a certain numbered
15-25
Chapter 15. Appendix
version of the GNU Lesser General Public License “or any later version” applies to it, you have the option of following
the terms and conditions either of that published version or of any later version published by the Free Software Foundation.
If the Library as you received it does not specify a version number of the GNU Lesser General Public License, you may
choose any version of the GNU Lesser General Public License ever published by the Free Software Foundation.
If the Library as you received it specifies that a proxy can decide whether future versions of the GNU Lesser General
Public License shall apply, that proxy's public statement of acceptance of any version is permanent authorization for you
to choose that version for the Library.
15-26
Chapter 15. Appendix
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following
conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions
and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse
or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
Chapter 15.
15-27
Chapter 15. Appendix
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated
documentation files (the "Software"), to deal in the Software without restriction, including without limitation the
rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit
persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the
Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
15-28
Chapter 15. Appendix
perl
Preamble
The intent of this document is to state the conditions under which a Package may be copied, such that the Copyright
Holder maintains some semblance of artistic control over the development of the package, while giving the users of
the package the right to use and distribute the Package in a more-or-less customary fashion, plus the right to make
reasonable modifications.
Definitions:
"Package" refers to the collection of files distributed by the Copyright Holder, and derivatives of that collection of
files created through textual modification.
"Standard Version" refers to such a Package if it has not been modified, or has been modified in accordance with
the wishes of the Copyright Holder as specified below.
"Copyright Holder" is whoever is named in the copyright or copyrights for the package.
"Reasonable copying fee" is whatever you can justify on the basis of media cost, duplication charges, time of people
involved, and so on. (You will not be required to justify it to the Copyright Holder, but only to the computing
community at large as a market that must bear the fee.)
"Freely Available" means that no fee is charged for the item itself, though there may be fees involved in handling
the item. It also means that recipients of the item may redistribute it under the same conditions they received it.
1. You may make and give away verbatim copies of the source form of the standard Version of this Package without
restriction, provided that you duplicate all of the original copyright notices and associated disclaimers.
2. You may apply bug fixes, portability fixes and other modifications derived from the Public Domain or from the
Copyright Holder. A Package modified in such a way shall still be considered the Standard Version.
3. You may otherwise modify your copy of this Package in any way, provided that you insert a prominent notice in
each changed file stating how and when you changed that file, and provided that you do at least ONE of the
following:
Chapter 15.
a) place your modifications in the Public Domain or otherwise make them freely Available, such as by posting
said modifications to Usenet or an equivalent medium, or placing the modifications on a major archive site
such as uunet.uu.net, or by allowing the Copyright Holder to include your modifications in the Standard
Version of the Package.
15-29
Chapter 15. Appendix
c) rename any non-standard executables so the names do not conflict with standard executables, which must also
be provided, and provide a separate manual page for each non-standard executable that clearly documents
how it differs from the Standard Version.
4. You may distribute the programs of this Package in object code or executable form, provided that you do at least
ONE of the following:
a) distribute a Standard Version of the executables and library files, together with instructions (in the manual page
or equivalent) on where to get the Standard Version.
b) accompany the distribution with the machine-readable source of the Package with your modifications.
c) give non-standard executables non-standard names, and clearly document the differences in manual pages (or
equivalent), together with instructions on where to get the Standard Version.
5. You may charge a reasonable copying fee for any distribution of this package. You may charge any fee you choose
for support of this package. You may not charge a fee for this Package itself. However, you may distribute this
Package in aggregate with other (possibly commercial) programs as part of a larger (possibly commercial)
software distribution provided that you do not advertise this Package as a product of your own. You may embed
this Package's interpreter within an executable of yours (by linking); this shall be construed as a mere form of
aggregation, provided that the complete Standard Version of the interpreter is so embedded.
6. The scripts and library files supplied as input to or produced as output from the programs of this Package do not
automatically fall under the copyright of this Package, but belong to whoever generated them, and may be sold
commercially, and may be aggregated with this Package. If such scripts or library files are aggregated with this
Package via the so-called "undump" or "unexec" methods of producing a binary executable image, then
distribution of such an image shall neither be construed as a distribution of this Package nor shall it fall under the
restrictions of Paragraphs 3 and 4, provided that you do not represent such an executable image as a Standard
Version of this Package.
7. C subroutines (or comparably compiled subroutines in other languages) supplied by you and linked into this
Package in order to emulate subroutines and variables of the language defined by this Package shall not be
considered part of this Package, but are the equivalent of input as in Paragraph 6, provided these subroutines do
not change the language in any way that would cause it to fail the regression tests for the language.
8. Aggregation of this Package with a commercial distribution is always permitted provided that the use of this
Package is embedded; that is, when no overt attempt is made to make this Package's interfaces visible to the end
user of the commercial distribution. Such use shall not be construed as a distribution of this Package.
9. The name of the Copyright Holder may not be used to endorse or promote products derived from this software
without specific prior written permission.
10. THIS PACKAGE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND
FITNESS FOR A PARTICULAR PURPOSE.
The End
15-30
Chapter 15. Appendix
[glibc]
We use the open source software "glibc" for this product in accordance with the conditions presented by the
copyright holder of the open source software.
In addition to GNU GPL / GNU LGPL, glibc is subject to the following conditions.
This file contains the copying permission notices for various files in theGNU C Library distribution that have copyright
owners other than the FreeSoftware Foundation. These notices all require that a copy of the noticebe included in the
accompanying documentation and be distributed with binary distributions of the code, so be sure to include this file along
with any binary distributions derived from the GNU C Library.
All code incorporated from 4.4 BSD is distributed under the followinglicense:
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following
conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions
and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. [This condition was removed.]
4. Neither the name of the University nor the names of its contributors may be used to endorse
or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
The DNS resolver code, taken from BIND 4.9.5, is copyrighted by UC Berkeley, by Digital Equipment Corporation and
by Internet Software Consortium. The DEC portions are under the following license:
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted,
provided that the above copyright notice and this permission notice appear in all copies, and
that the name of Digital Equipment Corporation not be used in advertising or publicity pertaining to distribution of the
document or software without specific, written prior permission.
THE SOFTWARE IS PROVIDED ``AS IS'' AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL WARRANTIES
Chapter 15.
15-31
Chapter 15. Appendix
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted,
provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS ALL
WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE CONSORTIUM BE
LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF
CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH
THE USE OR PERFORMANCE OF THIS SOFTWARE.
The Sun RPC support (from rpcsrc-4.0) is covered by the following license:
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following
conditions are met:
* Redistributions of source code must retain the above copyright notice, this list of
conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials
provided with the distribution.
* Neither the name of the "Oracle America, Inc." nor the names of its contributors may be
used to endorse or promote products derived from this software without specific prior
written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The following CMU license covers some of the support code for Mach, derived from Mach 3.0:
Permission to use, copy, modify and distribute this software and its documentation is hereby granted, provided that both
the copyright notice and this permission notice appear in all copies of the software, derivative works or modified versions,
and any portions thereof, and that both notices appear in supporting documentation.
CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS ``AS IS'' CONDITION. CARNEGIE
MELLON DISCLAIMS ANY LIABILITY OF ANY KIND FOR ANY DAMAGES WHATSOEVER RESULTING
FROM THE USE OF THIS SOFTWARE.
15-32
Chapter 15. Appendix
or [email protected] any improvements or extensions that they make and grant Carnegie Mellon the
rights to redistribute these changes.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY CARNEGIE MELLON UNIVERSITY AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE UNIVERSITY OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
The following license covers the files from Intel's "Highly Optimized Mathematical Functions for Itanium" collection:
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following
conditions are met:
* Redistributions of source code must retain the above copyright notice, this list of conditions
and the following disclaimer.
* Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials provided
Chapter 15.
* The name of Intel Corporation may not be used to endorse or promote products derived from this
software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
15-33
Chapter 15. Appendix
SHALL INTEL OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The files inet/getnameinfo.c and sysdeps/posix/getaddrinfo.c are copyright (C) by Craig Metz and are distributed under
the following license:
The author(s) grant permission for redistribution and use in source and binary forms, with or without modification, of the
software and documentation provided that the following conditions are met:
0. If you receive a version of the software that is specifically labelled as not being for redistribution
(check the version message and/or README), you are not permitted to redistribute that version of the software in
any way or form.
1. All terms of the all other applicable copyrights and licenses must be followed.
2. Redistributions of source code must retain the authors' copyright notice(s), this list of
conditions, and the following disclaimer.
3. Redistributions in binary form must reproduce the authors' copyright notice(s), this list
of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution.
4. [The copyright holder has authorized the removal of this clause.]
5. Neither the name(s) of the author(s) nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY ITS AUTHORS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
If these license terms cause you a real problem, contact the author. */
GNU Libidn is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public
15-34
Chapter 15. Appendix
GNU Libidn is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied
warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public
License along with GNU Libidn; if not, see <http://www.gnu.org/licenses/>.
This file contains functions from GLIB, including gutf8.c and gunidecomp.c, all licensed under LGPL and copyright hold
by:
Disclaimer and license: Regarding this entire document or any portion of it (including the pseudocode and C code), the
author makes no guarantees and is not responsible for any damage resultingfrom its use. The author grants irrevocable
permission to anyone to use, modify, and distribute it in any way that does not diminish the rights of anyone else to use,
modify, and distribute it, provided that redistributed derivative works do not contain misleading author or version
information. Derivative works need not be licensed under similar terms.
This document and translations of it may be copied and furnished to others, and derivative works that comment on or
otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part,
without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies
and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright
notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing
Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed,
or as required to translate it into languages other than English.
The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or
assigns.
This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY
AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL
NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following
conditions are met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
15-35
Chapter 15. Appendix
THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is
hereby granted, provided that the above copyright notice appear in all copies and that
both that copyright notice and this permission notice appear in supporting documentation, and that the name of the
copyright holder not be used in advertising or publicity pertaining to distribution of the
software without specific, written prior permission.
Tom Lord DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL TOM LORD BE LIABLE FOR
ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THIS SOFTWARE.
Copyright 1992, 1993, 1994, 1997 Henry Spencer. All rights reserved.
This software is not subject to any license of the American Telephone and Telegraph Company or of the Regents of the
University of California.
Permission is granted to anyone to use this software for any purpose on any computer system, and to alter it and
redistribute it, subject to the following restrictions:
1. The author is not responsible for the consequences of use of this software, no matter how awful, even if they arise from
flaws in it.
2. The origin of this software must not be misrepresented, either by explicit claim or by omission. Since few users ever
read sources, credits must appear in the documentation.
3. Altered versions must be plainly marked as such, and must not be misrepresented as being the original software. Since
few users ever read sources, credits must appear in the documentation.
15-36
Chapter 15. Appendix
Permission is granted to anyone to use this software for any purpose on any computer system, and to redistribute it freely,
subject to the following restrictions:
1. This software is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
2. The origin of this software must not be misrepresented, either by explicit claim or by omission.
In practice, this means that if you use PCRE in software that you distribute to others, commercially or otherwise,
you must put a sentence like this
Regular expression support is provided by the PCRE library package, which is open source
software, written by Philip Hazel, and copyright by the University of Cambridge, England.
somewhere reasonably visible in your documentation and in any relevant files or online help
data or similar. A reference to the ftp site for the source, that is, to
ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/
should also be given in the documentation. However, this condition is not intended to apply
to whole chains of software. If package A includes PCRE, it must acknowledge it, but if package B is software that
includes package A, the condition is not imposed on package B (unless it uses PCRE independently).
3. Altered versions must be plainly marked as such, and must not be misrepresented as being the
original software.
4. If PCRE is embedded in any software that is released under the GNU General Purpose Licence
(GPL), or Lesser General Purpose Licence (LGPL), then the terms of that licence shall supersede any condition above
with which it is incompatible.
This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public
License as published by the Free Software Foundation; either
version 2.1 of the License, or (at your option) any later version.
15-37
Chapter 15. Appendix
This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied
warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public License along with this library; if not, see
<http://www.gnu.org/licenses/>. */
15-38
Chapter 15. Appendix
[openssl]
We use the open source software "openssl" for this product in accordance with the conditions presented by
the copyright holder of the open source software.
LICENSE ISSUES
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay
license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source
licenses. In case of any license issues related to OpenSSL please contact [email protected].
OpenSSL License
Copyright (c) 1998-2016 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following
conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment:
"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit.
(http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived
from this software without prior written permission. For written permission, please contact [email protected].
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names
without prior writtenpermission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software
developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY EXPRESSED OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL
PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young ([email protected]). This product includes software
written by Tim Hudson ([email protected]).
Original SSLeay License
Copyright (C) 1995-1998 Eric Young ([email protected])
All rights reserved.
This package is an SSL implementation written by Eric Young ([email protected]).
The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The
following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the
SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the
holder is Tim Hudson ([email protected]).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is
used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the
Chapter 15.
form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following
conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
15-39
Chapter 15. Appendix
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
"This product includes cryptographic software written by Eric Young ([email protected])" The word 'cryptographic'
can be left out if the rouines from the library being used are not cryptographic related :-).
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you
must include an acknowledgement: "This product includes software written by Tim Hudson ([email protected])"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e.
this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.]
15-40
Chapter 15. Appendix
[libgcc/gcc-runtime]
We use the open source software "libgcc" and "gcc-runtime" for this product in accordance with the
conditions presented by the copyright holder of the open source software.
libgcc
gcc-runtime
In addition to GNU GPL, libgcc and gcc-runtime are subject to the following conditions.
General information:
http://www.gnu.org/licenses/gcc-exception.html
Copyright (C) 2009 Free Software Foundation, Inc. <http://fsf.org/>
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
This GCC Runtime Library Exception ("Exception") is an additional permission under section 7 of the GNU General
Public License, version 3 ("GPLv3"). It applies to a given file (the "Runtime Library") that bears a notice placed by the
copyright holder of the file stating that the file is governed by GPLv3 along with this Exception.
When you use GCC to compile a program, GCC may combine portions of certain GCC header files and runtime libraries
with the compiled program. The purpose of this Exception is to allow compilation of non-GPL (including proprietary)
programs to use, in this way, the header files and runtime libraries covered by this Exception.
0. Definitions.
A file is an "Independent Module" if it either requires the Runtime Library for execution after a Compilation Process,
or makes use of an interface provided by the Runtime Library, but is not otherwise based on the Runtime Library.
"GCC" means a version of the GNU Compiler Collection, with or without modifications, governed by version 3 (or a
specified later version) of the GNU General Public License (GPL) with the option of using any subsequent versions
published by the FSF.
"GPL-compatible Software" is software whose conditions of propagation, modification and use would permit
combination with GCC in accord with the license of GCC.
"Target Code" refers to output from any compiler for a real or virtual target processor architecture, in executable form
or suitable for input to an assembler, loader, linker and/or execution phase. Notwithstanding that, Target Code does not
include data in any format that is used as a compiler intermediate representation, or used for producing a compiler
intermediate representation.
The "Compilation Process" transforms code entirely represented in non-intermediate languages designed for human-
written code, and/or in Java Virtual Machine byte code, into Target Code. Thus, for example, use of source code
generators and preprocessors need not be considered part of the Compilation Process, since the Compilation Process
can be understood as starting with the output of the generators or preprocessors.
A Compilation Process is "Eligible" if it is done using GCC, alone or with other GPL-compatible software, or if it is
done without using any work based on GCC. For example, using non-GPL-compatible Software to optimize any GCC
intermediate representations would not qualify as an Eligible Compilation Process.
You have permission to propagate a work of Target Code formed by combining the Runtime Library with Independent
Modules, even if such propagation would otherwise violate the terms of GPLv3, provided that all Target Code was
generated by Eligible Compilation Processes. You may then convey such a combination under terms of your choice,
consistent with the licensing of the Independent Modules.
15-41
Chapter 15. Appendix
[tcl]
We use the open source software "tcl" for this product in accordance with the conditions presented by the
copyright holder of the open source software.
This software is copyrighted by the Regents of the University of California, Sun Microsystems, Inc., Scriptics Corporation,
ActiveState Corporation and other parties. The following terms apply to all files associated with the software unless
explicitly disclaimed in individual files.
The authors hereby grant permission to use, copy, modify, distribute, and license this software and its documentation for
any purpose, provided that existing copyright notices are retained in all copies and that this notice is included verbatim in
any distributions. No written agreement,
license, or royalty fee is required for any of the authorized uses. Modifications to this software may be copyrighted by
their authors and need not follow the licensing terms described here, provided that the new terms are clearly indicated on
the first page of each file where they apply.
IN NO EVENT SHALL THE AUTHORS OR DISTRIBUTORS BE LIABLE TO ANY PARTY FOR DIRECT,
INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OF THIS
SOFTWARE, ITS DOCUMENTATION, OR ANY DERIVATIVES THEREOF, EVEN IF THE AUTHORS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
THE AUTHORS AND DISTRIBUTORS SPECIFICALLY DISCLAIM ANY WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE,
AND NON-INFRINGEMENT. THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, AND THE AUTHORS
AND DISTRIBUTORS HAVE NO OBLIGATION TO PROVIDE MAINTENANCE, SUPPORT, UPDATES,
ENHANCEMENTS, OR MODIFICATIONS.
GOVERNMENT USE: If you are acquiring this software on behalf of the U.S. government, the Government shall have
only "Restricted Rights" in the software and related documentation as defined in the Federal Acquisition Regulations
(FARs) in Clause 52.227.19 (c) (2). If you are acquiring the software on behalf of the Department of Defense, the software
shall be classified as "Commercial Computer Software" and the Government shall have only "Restricted Rights" as
defined in Clause
252.227-7014 (b) (3) of DFARs. Notwithstanding the foregoing, the authors grant the U.S. Government and others acting
in its behalf permission to use and distribute the software in accordance with the terms specified in this license.
15-42
Chapter 15. Appendix
[zlib]
We use the open source software "zlib" for this product in accordance with the conditions presented by the
copyright holder of the open source software. The "zlib" license is as follows.
zlib
zlib License
This software is provided `as-is`, without any express or implied warranty. In no event will the authors be held liable for
any damages arising from the use of this software.
Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it
and redistribute it freely, subject to the following restrictions:
1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If
you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not
required.
2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.
3. This notice may not be removed or altered from any source distribution.
Chapter 15.
15-43
Chapter 15. Appendix
[ TI License]
We use the open source software "TI-TSPA" for this product in accordance with the conditions presented by
the copyright holder of the open source software.
amx3-cm3
ti-sgx-ddk-um
Texas Instruments Incorporated Technology and Software Publicly Available Software License Agreement
IMPORTANT – PLEASE READ THE FOLLOWING LICENSE AGREEMENT CAREFULLY. THIS IS A LEGALLY
BINDING AGREEMENT. DO NOT DOWNLOAD THE LICENSED MATERIALS UNLESS: (1) YOU ARE
AUTHORIZED TO ACCEPT AND AGREE TO THE TERMS OF THIS LICENSE AGREEMENT AND (2) YOU
INTEND TO ENTER INTO AND TO BE BOUND BY THE TERMS OF THIS AGREEMENT.
This Software License Agreement (“Agreement”) is a legal agreement between you (either an individual or entity) and
Texas Instruments Incorporated (“TI”), 12500 TI Boulevard, Dallas, Texas 75243. The “Licensed Materials” subject to
this Agreement include, in whole or in part, the software programs that accompany this Agreement and any “on-line” or
electronic documentation associated with these programs. By installing, copying or otherwise using the Licensed
Materials you agree to abide by the terms of this Agreement. If you choose not to accept or agree with these terms, do
not download or install the Licensed Materials.
NOTE: The Licensed Materials may be bundled with open source software. By accepting this Agreement, you may gain
access to software identified as being licensed under open source licenses, which software and corresponding open
source licenses will be listed in the applicable software manifest (in whole or in part, the “Open Source Materials”).
Your use of the Open Source Materials is subject to the separate licensing terms applicable to such Open Source
Materials as specified in the applicable software manifest. For clarification, this Agreement does not limit your rights
under, or grant you rights that supersede, the license terms of any applicable Open Source Materials license agreement.
If any of the Open Source Materials have been provided to you in object code, the source code versions of such Open
Source Materials may be provided to you by notifying TI at Texas Instruments Incorporated, 12500 TI Boulevard, Mail
Station 8638, Dallas, Texas 75243, Attention: Contracts Manager. You may terminate this Agreement in the event you
choose not to accept or agree with the terms in any applicable Open Source Materials license agreement, provided that
such termination occurs within five (5) days of acceptance of this Agreement and you abide by all applicable license
terms in this Agreement until such termination.
1. License.
a. Source Code License. For the Licensed Materials provided in source code format, TI hereby grants to you a limited,
non-exclusive license to reproduce, use, and create modified or derivative works of the Licensed Materials provided to
you in source code format and to distribute an unlimited number of copies of such source code Licensed Materials, or
any derivatives thereof, in any format.
b. Object Code License. For the Licensed Materials provided in object code format, TI hereby grants to you a limited,
non-exclusive license to reproduce and use the Licensed Materials provided to you in object code format and to
distribute an unlimited number of object or executable copies of such object code Licensed Materials.
2. Termination. This license is effective until terminated. Without prejudice to any other rights, TI may terminate your
right to use the Licensed Materials under this Agreement if you fail to comply with the terms of this Agreement. In such
event, you shall destroy all copies of the Licensed Materials, including all portions and derivatives thereof.
15-44
Chapter 15. Appendix
binary or object code only, you may not unlock, decompile, reverse engineer, disassemble or otherwise translate such
binary or object code to human-perceivable form. The source code of such reverse engineered code may contain TI
trade secret and other proprietary information. TI reserves all rights not specifically granted under this Agreement.
b. Certain Licensed Materials may (i) require patent licenses from third parties claiming patent rights covering
implementation of the Licensed Materials or (ii) be based on industry recognized standards or software programs
published by industry recognized standards bodies and certain third parties may claim to own patents or copyrights that
cover implementation of those standards. You acknowledge and agree that this Agreement does not convey a license to
any such third party patents and copyrights.
c. YOU ACKNOWLEDGE AND AGREE THAT TI SHALL NOT BE LIABLE FOR AND SHALL NOT DEFEND OR
INDEMNIFY YOU AGAINST ANY THIRD PARTY INFRINGEMENT CLAIM THAT RELATES TO OR IS BASED
ON YOUR MANUFACTURE, USE, OR DISTRIBUTION OF THE LICENSED MATERIALS OR YOUR
MANUFACTURE, USE, OFFER FOR SALE, SALE, IMPORTATION OR DISTRIBUTION OF YOUR PRODUCTS
THAT INCLUDE OR INCORPORATE THE LICENSED MATERIALS.
d. You acknowledge and agree that you are responsible for any fees or royalties that may be payable to any third party
based on such third party’s interests in the Licensed Materials described in Section 3(b) above (the “Third Party
Payment Obligations”). You agree to indemnify TI against any Third Party Payment Obligations and will defend any
claim, suit or proceeding brought against TI insofar as such claim, suit or proceeding is based on your failure to pay any
Third Party Payment Obligations.
4. Warranties and Limitations. THE LICENSED MATERIALS ARE PROVIDED “AS IS”. TI AND ITS LICENSORS
MAKE NO WARRANTY OR REPRESENTATION, EXPRESS, IMPLIED OR STATUTORY, INCLUDING ANY
IMPLIED WARRANTIES OF MERCHANTIBILITY, FITNESS FOR A PARTICULAR PURPOSE, LACK OF
VIRUSES, ACCURACY OR COMPLETENESS OF RESPONSES, RESULTS AND LACK OF NEGLIGENCE.
TI DISCLAIMS ANY WARRANTY OF TITLE, QUIET ENJOYMENT, QUIET POSESSION, AND NON-
INFRINGEMENT OF ANY THIRD PARTY INTELLECTUAL PROPERTY RIGHTS WITH REGARD TO THE
LICENSED MATERIALS OR USE OF THOSE MATERIALS.
YOU ACKNOWLEDGE AND AGREE THAT THE LICENSED MATERIALS MAY NOT BE INTENDED FOR
PRODUCTION APPLICATIONS AND MAY CONTAIN IRREGULARITIES AND DEFECTS NOT FOUND IN
PRODUCTION SOFTWARE. FURTHERMORE, YOU ACKNOWLEDGE AND AGREE THAT THE
LICENSED MATERIALS HAVE NOT BEEN TESTED OR CERTIFIED BY ANY GOVERNMENT AGENCY
OR INDUSTRY REGULATORY ORGANIZATION OR ANY OTHER THIRD PARTY ORGANIZATION. YOU
AGREE THAT PRIOR TO USING, INCORPORATING OR DISTRIBUTING THE LICENSED MATERIALS
IN OR WITH ANY COMMERCIAL PRODUCT THAT YOU WILL THOROUGHLY TEST THE PRODUCT
AND THE FUNCTIONALITY OF THE LICENSED MATERIALS IN OR WITH THAT PRODUCT AND BE
SOLELY RESPONSIBLE FOR ANY PROBLEMS OR FAILURES.
Because some jurisdictions do not allow the exclusion or limitation of incidental or consequential damages or
limitation on how long an implied warranty lasts, the above limitations or exclusions may not apply to you.
5. Export Control. The software programs and any “on-line” documentation as well as any updates or upgrades to
such software programs or documentation may be subject to the export or import regulations of certain countries.
You agree to comply with all such regulations and acknowledge that you have the responsibility to obtain any
15-45
Chapter 15. Appendix
licenses or other authorizations that may be required to export, re-export or import the Licensed Materials.
6. Governing Law, Jurisdiction and Severability. This Agreement will be governed by and interpreted in
accordance with the laws of the State of Texas, without reference to that state’s conflict of laws principles. This
Agreement shall not be governed by the United Nations Convention on Contracts for the International Sale of
Goods, nor shall it be governed by the Uniform Computer Information Transactions Act (UCITA). Any dispute
arising out of or related to this Agreement will be brought in, and each party consents to the exclusive jurisdiction
and venue in the state and federal courts sitting in Dallas Country, Texas. Each party waives all defenses of lack of
personal jurisdiction and forum non-conveniens and agrees that process may be served on either party in a manner
authorized by applicable law or court rule. If for any reason a court of competent jurisdiction finds any provision
of the Agreement to be unenforceable, that provision will be enforced to the maximum extent possible to
effectuate the intent of the parties and the remainder of the Agreement shall continue in full force and effect.
7. PRC Provisions. If you are located in the People’s Republic of China (“PRC”) or if the Licensed Materials will
be sent to the PRC, the following provisions shall apply and shall supersede any other provisions in this
Agreement concerning the same subject matter as the following provisions:
a. Registration Requirements. You shall be solely responsible for performing all acts and obtaining all approvals
that may be required in connection with this Agreement by the government of the PRC, including but not limited
to registering pursuant to, and otherwise complying with, the PRC Measures on the Administration of Software
Products, Management Regulations on Technology Import-Export, and Technology Import and Export Contract
Registration Management Rules. Upon receipt of such approvals from the government authorities, you shall
forward evidence of all such approvals to TI for its records. In the event that you fail to obtain any such approval
or registration, you shall be solely responsible for any and all losses, damages or costs resulting therefrom, and
shall indemnify TI for all such losses, damages or costs.
b. Governing Language. This Agreement is written and executed in the English language. If a translation of this
Agreement is required for any purpose, including but not limited to registration of the Agreement pursuant to any
governmental laws, regulations or rules, you shall be solely responsible for creating such translation. Any
translation of this Agreement into a language other than English is intended solely in order to comply with such
laws or for reference purposes, and the English language version shall be authoritative and controlling.
8. Entire Agreement. This is the entire Agreement between you and TI and supersedes any prior agreement
between the parties related to the subject matter of this Agreement. No amendment or modification of this
Agreement will be effective unless in writing and signed by a duly authorized representative of TI. You hereby
warrant and represent that you have obtained all authorizations and other applicable consents required
empowering you to enter into this Agreement.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and
the following disclaimer in the documentation and/or other materials provided with the distribution. Neither the
name of the nor the names of its contributors may be used to endorse or promote products derived from this
software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
15-46
Chapter 15. Appendix
[libpng]
We use the open source software "libpng" for this product in accordance with the conditions presented by the
copyright holder of the open source software.
libpng
The software is supplied "as is", without warranty of any kind, express or implied, including, without limitation, the
warranties of merchantability, fitness for a particular purpose, title, and non-infringement. In no event shall the
Copyright owners, or anyone distributing the software, be liable for any damages or other liability, whether in contract,
tort or otherwise, arising from, out of, or in connection with the software, or the use or other dealings in the software,
even if advised of the possibility of such damage.
Permission is hereby granted to use, copy, modify, and distribute this software, or portions hereof, for any purpose,
without fee, subject to the following restrictions:
1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If
you use this software in a product, an acknowledgment in the product documentation would be appreciated, but is not
required.
2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original
software.
3. This Copyright notice may not be removed or altered from any source or altered source distribution.
PNG Reference Library License version 1 (for libpng 0.5 through 1.6.35)
-----------------------------------------------------------------------
Chapter 15.
libpng versions 1.0.7, July 1, 2000, through 1.6.35, July 15, 2018 are
Copyright (c) 2000-2002, 2004, 2006-2018 Glenn Randers-Pehrson, are derived from libpng-1.0.6, and are distributed
according to the same disclaimer and license as libpng-1.0.6 with the following individuals added to the list of
Contributing Authors:
Simon-Pierre Cadieux
Eric S. Raymond
Mans Rullgard
Cosmin Truta
15-47
Chapter 15. Appendix
Gilles Vollant
James Yu
Mandar Sahastrabuddhe
Google Inc.
Vadim Barkov
There is no warranty against interference with your enjoyment of the library or against infringement. There is no
warranty that our efforts or the library will fulfill any of your particular purposes or needs. This library is provided
with all faults, and the entire risk of satisfactory quality, performance, accuracy, and effort is with the user.
Some files in the "contrib" directory and some configure-generated files that are distributed with libpng have other
copyright owners, and are released under other open source licenses.
libpng versions 0.97, January 1998, through 1.0.6, March 20, 2000, are
Copyright (c) 1998-2000 Glenn Randers-Pehrson, are derived from libpng-0.96, and are distributed according to the
same disclaimer and license as libpng-0.96, with the following individuals added to the list of Contributing Authors:
Tom Lane
Glenn Randers-Pehrson
Willem van Schaik
libpng versions 0.89, June 1996, through 0.96, May 1997, are
Copyright (c) 1996-1997 Andreas Dilger, are derived from libpng-0.88, and are distributed according to the same
disclaimer and license as libpng-0.88, with the following individuals added to the list of Contributing Authors:
John Bowler
Kevin Bracey
Sam Bushell
Magnus Holmgren
Greg Roelofs
Tom Tanner
Some files in the "scripts" directory have other copyright owners, but are released under this license.
libpng versions 0.5, May 1995, through 0.88, January 1996, are
Copyright (c) 1995-1996 Guy Eric Schalnat, Group 42, Inc.
For the purposes of this copyright and license, "Contributing Authors" is defined as the following set of individuals:
Andreas Dilger
Dave Martindale
Guy Eric Schalnat
Paul Schmidt
Tim Wegner
The PNG Reference Library is supplied "AS IS". The Contributing Authors and Group 42, Inc. disclaim all
warranties, expressed or implied, including, without limitation, the warranties of merchantability and of fitness for any
purpose. The Contributing Authors and Group 42, Inc. assume no liability for direct, indirect, incidental, special,
exemplary, or consequential damages, which may result from the use of the PNG Reference Library, even if advised of
the possibility of such damage.
Permission is hereby granted to use, copy, modify, and distribute this source code, or portions hereof, for any purpose,
without fee, subject to the following restrictions:
15-48
Chapter 15. Appendix
2. Altered versions must be plainly marked as such and must not be misrepresented as being the original source.
3. This Copyright notice may not be removed or altered from any source or altered source distribution.
The Contributing Authors and Group 42, Inc. specifically permit, without fee, and encourage the use of this source
code as a component to supporting the PNG file format in commercial products. If you use this source code in a
product, acknowledgment is not required but would be appreciated.
Chapter 15.
15-49
Chapter 15. Appendix
[Apache License]
We use the open source software " Apache" for this product in accordance with the conditions presented by
the copyright holder of the open source software.
Roboto
1. Definitions.
"License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document.
"Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License.
"Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control
with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the direction or management
of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii)
beneficial ownership of such entity.
"You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License.
"Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation
source, and configuration files.
"Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to
compiled object code, generated documentation, and conversions to other media types.
"Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a
copyright notice that is included in or attached to the work (an example is provided in the Appendix below).
"Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which
the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the
purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the
interfaces of, the Work and Derivative Works thereof.
"Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or additions to that
Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an
individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means
any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to
communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of,
the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or
otherwise designated in writing by the copyright owner as "Not a Contribution."
"Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor
and subsequently incorporated within the Work.
2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual,
worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display,
publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form.
15-50
Chapter 15. Appendix
3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual,
worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to
sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that
are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such
Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit)
alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent
licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed.
4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without
modifications, and in Source or Object form, provided that You meet the following conditions:
a.You must give any other recipients of the Work or Derivative Works a copy of this License; and
b.You must cause any modified files to carry prominent notices stating that You changed the files; and
c.You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution
notices from the Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; and
d.If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute must include a
readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of
the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the Derivative Works;
within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative
Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only
and do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as
an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying
the License.
You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions
for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use,
reproduction, and distribution of the Work otherwise complies with the conditions stated in this License.
5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by
You to the Licensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding the
above, nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding
such Contributions.
6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor,
except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file.
7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor
provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied,
including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume
any risks associated with Your exercise of permissions under this License.
8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless
required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for
damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out
of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or
malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such
damages.
Chapter 15.
9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and
charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License. However,
in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor,
and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such
Contributor by reason of your accepting any such warranty or additional liability.
15-51
Chapter 15. Appendix
We use the open source software " SIL" for this product in accordance with the conditions presented by the
copyright holder of the open source software.
NotoSansMonoCJKjp
NotoSansMonoCJKsc
NotoSansMonoCJKtc
NotoSansMonoCJKkr
Markazi Text
Sarabun
Noto Sans Myanmar
This Font Software is licensed under the SIL Open Font License, Version 1.1.
This license is copied below, and is also available with a FAQ at:
http://scripts.sil.org/OFL
-----------------------------------------------------------
SIL OPEN FONT LICENSE Version 1.1 - 26 February 2007
-----------------------------------------------------------
PREAMBLE
The goals of the Open Font License (OFL) are to stimulate worldwidedevelopment of collaborative font projects,
to support the font creation efforts of academic and linguistic communities, and to provide a free and open
framework in which fonts may be shared and improved in partnership with others.
The OFL allows the licensed fonts to be used, studied, modified and redistributed freely as long as they are not sold
by themselves. The fonts, including any derivative works, can be bundled, embedded,
redistributed and/or sold with any software provided that any reserved names are not used by derivative works.
The fonts and derivatives, however, cannot be released under any other type of license. Therequirement for fonts to
remain under this license does not apply to any document created using the fonts or their derivatives.
DEFINITIONS
"Font Software" refers to the set of files released by the Copyright Holder(s) under this license and clearly marked
as such. This may include source files, build scripts and documentation. "Reserved Font Name" refers to any names
specified as such after the copyright statement(s).
"Original Version" refers to the collection of Font Software components as distributed by the Copyright Holder(s).
"Modified Version" refers to any derivative made by adding to, deleting, or substituting -- in part or in whole
-- any of the components of the Original Version, by changing formats or by porting the Font Software to a
new environment.
"Author" refers to any designer, engineer, programmer, technical writer or other person who contributed to the Font
Software.
15-52
Chapter 15. Appendix
1) Neither the Font Software nor any of its individual components, in Original or Modified Versions, may be sold
by itself.
2) Original or Modified Versions of the Font Software may be bundled, redistributed and/or sold with any software,
provided that each copy contains the above copyright notice and this license. These can be included either as
stand-alone text files, human-readable headers or in the appropriate machine-readable metadata fields within text
or binary files as long as those fields can be easily viewed by the user.
3) No Modified Version of the Font Software may use the Reserved Font Name(s) unless explicit written permission
is granted by the corresponding Copyright Holder. This restriction only applies to the primary font name as
presented to the users.
4) The name(s) of the Copyright Holder(s) or the Author(s) of the Font Software shall not be used to promote,
endorse or advertise any Modified Version, except to acknowledge the contribution(s) of the
Copyright Holder(s) and the Author(s) or with their explicit written permission.
5) The Font Software, modified or unmodified, in part or in whole, must be distributed entirely under this license,
and must not be distributed under any other license. The requirement for fonts to remain under this license does
not apply to any document created using the Font Software.
TERMINATION
This license becomes null and void if any of the above conditions are not met.
DISCLAIMER
THE FONT SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT
OF COPYRIGHT, PATENT, TRADEMARK, OR OTHER RIGHT. IN NO EVENT SHALL THE
COPYRIGHT HOLDER BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
INCLUDING ANY GENERAL, SPECIAL, INDIRECT, INCIDENTAL, OR CONSEQUENTIAL
DAMAGES, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
FROM, OUT OF THE USE OR INABILITY TO USE THE FONT SOFTWARE OR FROM
OTHER DEALINGS IN THE FONT SOFTWARE.
Chapter 15.
15-53
Chapter 15. Appendix
Source code will be provided as a medium upon request. However, please note the following points.
・We cannot answer any questions regarding the contents of the source code.
・We do not guarantee any programs created by the provided source code.
・When providing media, actual costs may be charged separately.
・The source code will be provided for the longer of the period specified in the license or the production period.
15-54
2S23M9027-2D