120 Chapter 5: Programming commands

In this example, without an exception table entry, the firmware would always pick the rightmost four-digit number as the check serial number following rule two above. The bank with the three digit check serial number and the four digit extension after the “on us” symbol would need to be exceptionally recognized:

txxxxxxxxxt ccc-xxxxxxxxxxoxxxx txxxxxxxxxt xxx-xxxxxxxxxxocccc

In this example, without an exception table entry, the firmware would not be able to pick out the check serial number because it is not separated from the rest of the account number:

txxxxxxxxxt ccccxxxxxxxxxxo

In this example, without an exception table entry, the firmware would not be able to pick out the check serial number correctly, because it is imbedded within the rest of the account number:

txxxxxxxxxt xxx-ccc-xxxxxxxxxxo

Loading the exception table

The exception table begins at word 20 in NVRAM. Each entry takes five words. There is room for eight exceptions. An application can load local exceptions into the printer using the write NVRAM command:

0x1B 0x73 n1 n2 k

which writes the two byte word n1:n2 to word k in NVRAM.

Exception table entry format

Each exception table entry consists of five words. The first two words contain the first eight characters of the transit number by packing the low order nibble of the numeric transit number characters. For Canadian checks, eliminate the dash and store the eight numerics.

The next three words are used as six individual bytes to tell the firmware how to interpret the MICR characters that fall to the right of the rightmost transit symbol. Each of the six bytes is positional and consists of two parts: character type and number.

The three high order bits of each byte mark the character type. The characters can be marked in three ways: check serial # character, account # character, or “skip this character or symbol.”

The five low order bits of each byte contain the number of characters of that type to extract. Most exceptions will not need to use all six bytes; in that case clear the unused bytes to zero.

Bits within byte

7

6

5

4

3

2

1

0

 

 

 

 

 

 

 

 

 

Check serial #

0

0

1

n

n

n

n

n

character string

 

 

 

 

 

 

 

 

Account #

0

1

0

n

n

n

n

n

character string

 

 

 

 

 

 

 

 

Character string

1

0

0

n

n

n

n

n

to ignore

 

 

 

 

 

 

 

 

Example 1

t123456780t12349876543210o

1234 is the check serial #

9876543210 is the account #

To load the second table entry, which starts at word 25, the transit number 123456780 would be stored in the first two words of its table entry using this string of commands:

0x1B 0x73 0x12 0x34 25 0x1B 0x73 0x56 0x78 26

Continued . . .

A776 (B780) Programming Guide

A776-PG00001 C 12/09

Page 132
Image 132
Cognitive Solutions B780, A776 manual Loading the exception table, Which writes the two byte word n1n2 to word k in Nvram

B780, A776 specifications

Cognitive Solutions A776 is an advanced technology platform designed to enhance decision-making processes through the application of artificial intelligence and cognitive computing. This state-of-the-art solution seamlessly integrates multiple technologies to optimize business operations and drive innovation across various sectors, including finance, healthcare, and manufacturing.

One of the main features of A776 is its robust data processing capabilities. Leveraging powerful machine learning algorithms, the platform can analyze vast amounts of data in real-time, identifying patterns and insights that would otherwise be overlooked. This enables organizations to make informed decisions based on actionable intelligence, significantly improving efficiency and productivity.

Another key characteristic of the A776 system is its natural language processing (NLP) capability. This feature allows the platform to understand and interpret human language, making it easier for users to interact with the system and obtain valuable insights. By integrating NLP, Cognitive Solutions A776 can provide intuitive user experiences, enabling workforce members to query data using everyday language rather than complex coding skills.

The A776 is also built on a flexible architecture that supports seamless integration with existing IT ecosystems. This interoperability allows organizations to harness their current data sources while taking advantage of the innovative features offered by A776. The platform’s API support enables smooth connections with third-party tools, enhancing collaboration and expanding its range of applications.

Security is a major focus of the Cognitive Solutions A776. The platform is equipped with advanced encryption protocols and compliance measures to ensure that sensitive data is protected against breaches and unauthorized access. This commitment to security helps businesses maintain customer trust and safeguard their competitive advantage.

Scalability is another defining feature of the A776. As businesses grow and evolve, the platform can be easily adapted to meet changing demands. Whether a small startup or a large enterprise, organizations can scale their cognitive solutions according to their operational needs.

Furthermore, the Cognitive Solutions A776 is designed with user accessibility in mind. The interface features customizable dashboards that provide a clear overview of insights and performance metrics, enabling users at all levels to harness the power of cognitive computing without requiring extensive training or technical expertise.

In conclusion, Cognitive Solutions A776 is a cutting-edge platform that offers a range of features, including advanced data processing, natural language processing, robust security measures, and user-friendly design. Its flexible architecture allows it to integrate seamlessly with existing systems, making it an indispensable tool for organizations looking to leverage artificial intelligence in their decision-making processes.