GSC3000, VRC2500 Manual

Total Page:16

File Type:pdf, Size:1020Kb

GSC3000, VRC2500 Manual GSC3000 VRC2500 Broadcast Facility Control Systems INSTALLATION & OPERATION MANUAL 5 SERIES Includes Instructions for Lynx Software GSC3000 & VRC2500 Installation & Operation Manual System Series 5 Lynx Software version 5.1 Revision B (November 2006) Copyright © 2006 Burk Technology, Inc. All rights reserved. No part of this manual may be reproduced in any form or by any means without written permission from Burk Technology. Information in this manual is subject to change without notice. Contents CHAPTER 1: INTRODUCTION .................................................................................................................1 Contacting Burk Technology.......................................................................................................................................................1 Unpacking........................................................................................................................................................................................2 VRC2500 ..............................................................................................................................................................2 GSC3000 I/O 8 & I/O 16 unit............................................................................................................................3 Voice Interface Unit................................................................................................................................................3 Command Relay Unit..............................................................................................................................................4 Wiring Interface Unit..............................................................................................................................................4 Computer Requirements ..............................................................................................................................................................4 System Overview............................................................................................................................................................................5 GSC3000 Hardware Components..........................................................................................................................5 VRC2500 Hardware Components...........................................................................................................................5 Lynx Software .........................................................................................................................................................5 New in Lynx 5 ........................................................................................................................................................6 Alarm Reporting .....................................................................................................................................................6 Automatic Functions ...............................................................................................................................................7 Data Collection & Automatic Logging .....................................................................................................................7 Command Relays & Wiring Interfaces .....................................................................................................................7 Power Supply & Surge Protection..............................................................................................................................................7 Battery Backup.......................................................................................................................................................7 Surge Protection .....................................................................................................................................................8 Important Safety Information .....................................................................................................................................................8 Controls & Connections..............................................................................................................................................................8 VRC2500 ..............................................................................................................................................................8 GSC3000 I/O Unit.............................................................................................................................................10 Voice Interface Unit ..............................................................................................................................................12 Wiring Interface Unit ............................................................................................................................................13 Command Relay Unit............................................................................................................................................13 CHAPTER 2: SOFTWARE & SITE SETUP.................................................................................................15 Upgrading From A Previous Software Version .......................................................................................................................15 Software Installation....................................................................................................................................................................15 Starting Lynx .................................................................................................................................................................................16 Setup Functions............................................................................................................................................................................16 CUSTOMER SUPPORT: 978-486-3711 • [email protected] • www.burk.com iii CONTENTS Site List ................................................................................................................................................................16 New Site...............................................................................................................................................................17 Edit Site ...............................................................................................................................................................17 Connect/Disconnect..............................................................................................................................................17 Unit Configuration................................................................................................................................................17 Creating A New Site In Lynx: The Site Wizard ......................................................................................................................17 Site Name ............................................................................................................................................................17 Time Zone.............................................................................................................................................................18 Primary Connection...............................................................................................................................................18 Backup Connection...............................................................................................................................................19 Site Sharing..........................................................................................................................................................19 Logging ................................................................................................................................................................20 Editing Site Settings....................................................................................................................................................................21 Connection Settings ...................................................................................................................................................................21 Setting I/O Unit Numbers .........................................................................................................................................................21 Creating The G-Bus Network ...................................................................................................................................................22 Connecting To Sites....................................................................................................................................................................23 After Site Setup............................................................................................................................................................................23 CHAPTER 3: LYNX SOFTWARE OVERVIEW ............................................................................................25 Menus & Icons.............................................................................................................................................................................25 The File Menu.......................................................................................................................................................25
Recommended publications
  • The Origins of the Underline As Visual Representation of the Hyperlink on the Web: a Case Study in Skeuomorphism
    The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Romano, John J. 2016. The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism. Master's thesis, Harvard Extension School. Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:33797379 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism John J Romano A Thesis in the Field of Visual Arts for the Degree of Master of Liberal Arts in Extension Studies Harvard University November 2016 Abstract This thesis investigates the process by which the underline came to be used as the default signifier of hyperlinks on the World Wide Web. Created in 1990 by Tim Berners- Lee, the web quickly became the most used hypertext system in the world, and most browsers default to indicating hyperlinks with an underline. To answer the question of why the underline was chosen over competing demarcation techniques, the thesis applies the methods of history of technology and sociology of technology. Before the invention of the web, the underline–also known as the vinculum–was used in many contexts in writing systems; collecting entities together to form a whole and ascribing additional meaning to the content.
    [Show full text]
  • T1, U-2 and L1 Transmitters™ Software V3.06 April 22, 2014
    ™ Air Integrated Dive Computer User Manual ™ Air Integrated Dive Computer Software v1.18 Ultrasonic software v1.11 And T1, U-2 and L1 Transmitters™ Software v3.06 April 22, 2014 Liquivision Products, Inc -1- Manual 1.6; Lynx 1.18; US 1.11; U-2 3.06 ™ Air Integrated Dive Computer User Manual CONTENTS IMPORTANT NOTICES ............................................................................................................................... 8 Definitions ..................................................................................................................................................... 9 User Agreement and Warranty ....................................................................................................................... 9 User Manual .................................................................................................................................................. 9 Liquivision Limitation of Liability ............................................................................................................... 10 Trademark Notice ........................................................................................................................................ 10 Patent Notice ............................................................................................................................................... 10 CE ............................................................................................................................................................... 10 LYNX
    [Show full text]
  • World-Wide Web Proxies
    World-Wide Web Proxies Ari Luotonen, CERN Kevin Altis, Intel April 1994 Abstract 1.0 Introduction A WWW proxy server, proxy for short, provides access to The primary use of proxies is to allow access to the Web the Web for people on closed subnets who can only access from within a firewall (Fig. 1). A proxy is a special HTTP the Internet through a firewall machine. The hypertext [HTTP] server that typically runs on a firewall machine. server developed at CERN, cern_httpd, is capable of run- The proxy waits for a request from inside the firewall, for- ning as a proxy, providing seamless external access to wards the request to the remote server outside the firewall, HTTP, Gopher, WAIS and FTP. reads the response and then sends it back to the client. cern_httpd has had gateway features for a long time, but In the usual case, the same proxy is used by all the clients only this spring they were extended to support all the within a given subnet. This makes it possible for the proxy methods in the HTTP protocol used by WWW clients. Cli- to do efficient caching of documents that are requested by ents don’t lose any functionality by going through a proxy, a number of clients. except special processing they may have done for non- native Web protocols such as Gopher and FTP. The ability to cache documents also makes proxies attrac- tive to those not inside a firewall. Setting up a proxy server A brand new feature is caching performed by the proxy, is easy, and the most popular Web client programs already resulting in shorter response times after the first document have proxy support built in.
    [Show full text]
  • Web Browsing and Communication Notes
    digital literacy movement e - learning building modern society ITdesk.info – project of computer e-education with open access human rights to e - inclusion education and information open access Web Browsing and Communication Notes Main title: ITdesk.info – project of computer e-education with open access Subtitle: Web Browsing and Communication, notes Expert reviwer: Supreet Kaur Translator: Gorana Celebic Proofreading: Ana Dzaja Cover: Silvija Bunic Publisher: Open Society for Idea Exchange (ODRAZI), Zagreb ISBN: 978-953-7908-18-8 Place and year of publication: Zagreb, 2011. Copyright: Feel free to copy, print, and further distribute this publication entirely or partly, including to the purpose of organized education, whether in public or private educational organizations, but exclusively for noncommercial purposes (i.e. free of charge to end users using this publication) and with attribution of the source (source: www.ITdesk.info - project of computer e-education with open access). Derivative works without prior approval of the copyright holder (NGO Open Society for Idea Exchange) are not permitted. Permission may be granted through the following email address: [email protected] ITdesk.info – project of computer e-education with open access Preface Today’s society is shaped by sudden growth and development of the information technology (IT) resulting with its great dependency on the knowledge and competence of individuals from the IT area. Although this dependency is growing day by day, the human right to education and information is not extended to the IT area. Problems that are affecting society as a whole are emerging, creating gaps and distancing people from the main reason and motivation for advancement-opportunity.
    [Show full text]
  • Giant List of Web Browsers
    Giant List of Web Browsers The majority of the world uses a default or big tech browsers but there are many alternatives out there which may be a better choice. Take a look through our list & see if there is something you like the look of. All links open in new windows. Caveat emptor old friend & happy surfing. 1. 32bit https://www.electrasoft.com/32bw.htm 2. 360 Security https://browser.360.cn/se/en.html 3. Avant http://www.avantbrowser.com 4. Avast/SafeZone https://www.avast.com/en-us/secure-browser 5. Basilisk https://www.basilisk-browser.org 6. Bento https://bentobrowser.com 7. Bitty http://www.bitty.com 8. Blisk https://blisk.io 9. Brave https://brave.com 10. BriskBard https://www.briskbard.com 11. Chrome https://www.google.com/chrome 12. Chromium https://www.chromium.org/Home 13. Citrio http://citrio.com 14. Cliqz https://cliqz.com 15. C?c C?c https://coccoc.com 16. Comodo IceDragon https://www.comodo.com/home/browsers-toolbars/icedragon-browser.php 17. Comodo Dragon https://www.comodo.com/home/browsers-toolbars/browser.php 18. Coowon http://coowon.com 19. Crusta https://sourceforge.net/projects/crustabrowser 20. Dillo https://www.dillo.org 21. Dolphin http://dolphin.com 22. Dooble https://textbrowser.github.io/dooble 23. Edge https://www.microsoft.com/en-us/windows/microsoft-edge 24. ELinks http://elinks.or.cz 25. Epic https://www.epicbrowser.com 26. Epiphany https://projects-old.gnome.org/epiphany 27. Falkon https://www.falkon.org 28. Firefox https://www.mozilla.org/en-US/firefox/new 29.
    [Show full text]
  • 685-LYNX-CLIENT-0 V10.0 Lynxclient Manual 11-24-14.Cdr
    Installation Guide for LynxClient Technical Support: 972-231-6874 Ext. 140 8am to 5pm CST Email: [email protected] PC Keyboard Duress Button USB Duress Button LynxKey & LynxKeyPro LynxUSB Notification Popup on PCs LynxMessenger Multi-Function Client Software Version 10.0 Micro Designed and Manufactured by Technology Services, Inc. Installation Guide Part Number 685-LYNX-CLIENT-0 Rev 016 Table of Contents LynxClient Overview 2 Upgrading LynxMessenger 6 Client Seats 2 Configuring LynxMessenger 6 Requirements 2 Configuring Profiles 7 Pre Deployment Considerations 3 Keyboard Alarm Settings 8 Types of Deployments 3 LynxMessenger Settings 8 Location Information 3 LynxUSB Settings 9 Dormant Profiles 4 LynxClient Testing 9-11 Selectable Keyboard Combinations 4 LynxClient Supervision 11 Keyboard Labels 4 LynxUSB Supervision 11 Compatible LynxUSB Devices 4 Large Deployment Supervision 11 Pre Deployment Pilot Test Group 4 LynxClient System Tray Icons 12 LynxClient Software Installation 5 Troubleshooting - LynxClient 13 Software Distribution using SCCM 5 Troubleshooting - LynxUSB Button 13 Upgrading Existing LynxKeyPro Clients 6 LynxClient Manual Installation 13 LynxClient Overview The LynxClient software allows a PC to send alarms to the LynxGuide server or receive popup notifications from the server. All Lynx client side functionality is contained in the LynxClient software, and functions are enabled or disabled from the server. The LynxClient software can be loaded on any Windows PC manually or deployed with software distribution tools. The LynxClient multi-function software can be configured to support LynxMessenger, LynxKey, LynxKeyPro and LynxUSB. LynxMessenger allows a PC to receive a popup notification when an alarm is activated. The popup will be displayed in your default web browser and take focus.
    [Show full text]
  • Web Browsers
    WEB BROWSERS Page 1 INTRODUCTION • A Web browser acts as an interface between the user and Web server • Software application that resides on a computer and is used to locate and display Web pages. • Web user access information from web servers, through a client program called browser. • A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web Page 2 FEATURES • All major web browsers allow the user to open multiple information resources at the same time, either in different browser windows or in different tabs of the same window • A refresh and stop buttons for refreshing and stopping the loading of current documents • Home button that gets you to your home page • Major browsers also include pop-up blockers to prevent unwanted windows from "popping up" without the user's consent Page 3 COMPONENTS OF WEB BROWSER 1. User Interface • this includes the address bar, back/forward button , bookmarking menu etc 1. Rendering Engine • Rendering, that is display of the requested contents on the browser screen. • By default the rendering engine can display HTML and XML documents and images Page 4 HISTROY • The history of the Web browser dates back in to the late 1980s, when a variety of technologies laid the foundation for the first Web browser, WorldWideWeb, by Tim Berners-Lee in 1991. • Microsoft responded with its browser Internet Explorer in 1995 initiating the industry's first browser war • Opera first appeared in 1996; although it have only 2% browser usage share as of April 2010, it has a substantial share of the fast-growing mobile phone Web browser market, being preinstalled on over 40 million phones.
    [Show full text]
  • Why Websites Can Change Without Warning
    Why Websites Can Change Without Warning WHY WOULD MY WEBSITE LOOK DIFFERENT WITHOUT NOTICE? HISTORY: Your website is a series of files & databases. Websites used to be “static” because ​ there were only a few ways to view them. Now we have a complex system, and telling your webmaster what device, operating system and browser is crucial, here’s why: TERMINOLOGY: You have a desktop or mobile “device”. Desktop computers and mobile ​ ​ ​ devices have “operating systems” which are software. To see your website, you’ll pull up a ​ ​ ​ ​ “browser” which is also software, to surf the Internet. Your website is a series of files that ​ ​ needs to be 100% compatible with all devices, operating systems and browsers. Your website is built on WordPress and gets a weekly check up (sometimes more often) to ​ ​ ​ see if any changes have occured. Your site could also be attacked with bad files, links, spam, comments and other annoying internet pests! Or other components will suddenly need updating which is nothing out of the ordinary. WHAT DOES IT LOOK LIKE IF SOMETHING HAS CHANGED? Any update to the following can make your website look differently: There are 85 operating ​ systems (OS) that can update (without warning). And any of the most popular roughly 7 ​ ​ ​ browsers also update regularly which can affect your site visually and other ways. (Lists below) ​ Now, with an OS or browser update, your site’s 18 website components likely will need ​ ​ updating too. Once website updates are implemented, there are currently about 21 mobile ​ devices, and 141 desktop devices that need to be viewed for compatibility.
    [Show full text]
  • 6.824 Lab 1: a Simple Web Proxy
    6.824 - Fall 2002 6.824 Lab 1: A simple web proxy Introduction Please read "Getting started with 6.824 labs" before starting this assignment. You will also need "Using TCP through sockets" at a later stage. In this lab assignment you will write a simple web proxy. A web proxy is a program that reads a request from a browser, forwards that request to a web server, reads the reply from the web server, and forwards the reply back to the browser. People typically use web proxies to cache pages for better performance, to modify web pages in transit (e.g. to remove annoying advertisements), or for weak anonymity. You'll be writing a web proxy to learn about how to structure servers. For this assignment you'll start simple; in particular your proxy need only handle a single connection at a time. It should accept a new connection from a browser, completely handle the request and response for that browser, and then start work on the next connection. (A real web proxy would be able to handle many connections concurrently.) In this handout, we use client to mean an application program that establishes connections for the purpose of sending requests[3], typically a web browser (e.g., lynx or Netscape). We use server to mean an application program that accepts connections in order to service requests by sending back responses (e.g., the Apache web server)[1]. Note that a proxy acts as both a client and server. Moreover, a proxy could communicate with other proxies (e.g., a cache hierarchy).
    [Show full text]
  • BROWSERS: a Brief Historyof Securityvulnerabilities
    BROWSERS: A brief history oF PROJECT BY GROUP 5 SNEHA BALIGA / JULIA CHLASTACZ / DANG TRUNG NGUYEN / MARIJA NIKOLIC / BOGDAN NOVAKOVIC / PREETI PURI / security vulnerabilities CHENYUN ZENG 2.8.9 Lynx Vulnerabilities refer to Thomas Netscape Navigator 8.1.3 the Common Vulnerabilities Dickey Netscape and Exposures (CVE) - a system 75.1 that provides a reference method for publicly known information - K-Meleon security vulnerabilities and exposures. Netscape Netscape created the Mozilla Organization in Vulnerabilities 1998 to co-ordinate the development of the 69 Mozilla Application Suite. Netscape acquired AOL Firefox Risk severity in 1999 and went on to create multiple browsers. AOL Phoenix Critical 1.5 High AOL Medium 2.49 Low Seamonkey Risk refers to the potential that 28.7 the threat will be realized for a particular vulnerability. Palemoon 12.18 Number of open Opera vulnerabilities Opera Software 1,200 11.0 1,000 800 Internet 600 Explorer 400 Microsoft 44.0 200 Microsoft created Edge in 2015 in an 0 attempt to phase out Internet Explorer. Edge Open vulnerabilities refer to 11.4 the number of vulnerabilities open Amaya and unresolved in that year. W3C, INRIA 3.34 Konqueror Usage share KDE 0.11 ELinks 0% Twibright 5.2 Relationship lines Labs Maxthon 1 50% Maxthon International 3.34 Company Name GNOME Web 100% Epiphany 1 1 Successor browser GNOME Project Usage share refers to the 12.1 percentage of user share in Forked from another browser the browser market. Safari Apple Only 7 browsers accomodate 19 usage share of more than 1%. Symbols
    [Show full text]
  • 01-Www-Intro.Pdf
    The WWW and HTML CMPT 281 Outline • Hypertext • The Internet • The World-Wide-Web • How the WWW works • Web pages • Markup • HTML Hypertext • Hypertext is text displayed on a computer that contains links (‘hyperlinks’) to other locations in that document or other documents History of Hypertext • Vannevar Bush and the Memex • Ted Nelson and Xanadu • Douglas Englebart and NLS Vannevar Bush The Memex • 1945! • An information-storage machine with many mechanisms for retrieving information • Trails of links connecting sequences of information • Storage based on microfilm • Never built The Memex Ted Nelson Ted Nelson Xanadu • 1967 • Invented the term ‘hypertext’ • Documents made of other pieces • Two-way links • Document version control Ted Nelson’s vision of hypertext • Ted Nelson, a professional visionary, wrote in 1965 of "Literary Machines," computers that would enable people to write and publish in a new, nonlinear format, which he called hypertext. Hypertext was "nonsequential" text, in which a reader was not constrained to read in any particular order, but could follow links and delve into the original document from a short quotation. Ted described a futuristic project, Xanadu, in which all the world's information could be published in hypertext. For example, if you were reading this book in hypertext, you would be able to follow a link from my reference to Xanadu to further details of that project. In Ted's vision, every quotation would have been a link back to its source, allowing original authors to be compensated by a very small amount each time the quotation was read. He had the dream of a utopian society in which all information could be shared among people who communicated as equals.
    [Show full text]
  • Lab Lingo for Website
    Glossary Application A program designed to perform a specific function directly for the user or, in some cases, for another application. AppleTalk A Macintosh-specific network protocol for sharing resources (files, printers, etc). Appletalk can use special hardware or run on Ethernet. Bandwidth Bandwidth is a measurement for the rate at which data can be transferred, or in non-digital systems, the range of frequencies available for transmission. Bit (Binary Digit) The smallest unit of information in a computer. Browser Program used for accessing web, gopher and other internet sites. The most well-known browsers are Lynx, Mosaic, and Netscape. Byte (Binary Term) A unit of storage capable of holding 8 bits. Cache A cache is a system for storing frequently accessed information for faster response. Cache memory on your motherboard is extra-fast RAM that keeps a copy of the most recently requested bits from regular RAM. A 'caching proxy web server' keeps the most recently requested web documents stored locally, reducing response time from (often very slow) remote web sites. Cookie A piece of data given to your browser by a web server, so that your browser will hand it back to the server with subsequent requests. First implemented by Netscape. Although there has been some furor over the privacy implications of cookies, they cannot be used to reveal anything about you to the server that you have not already explicitly revealed. Compress To make a file smaller by applying a compression algorithm, usually for the purpose of conserving space or speeding up file transfers. This can also refer to the Unix command to compress a file which appends '.Z' to the filename, '.gz' or to the free GNU enhanced version, zip.
    [Show full text]