Chapter 5: Programming commands  125

n = 50 (ASCII n = 2) HEX 32

This command erases all sectors available for user data storage.

n = 51 (ASCII n = 3) HEX 33

This command erases all sectors available for permanent fonts.

Erases a page of flash memory and sends a carriage return when the operation is complete.

Related information

See command “Flash memory user sectors allocation” (1D 22 55 n1 n2).

See also command “Expanded flash memory allocation” (1D 22 80...) and “Select flash area” (1D 22 81 n).

Important: While erasing flash memory, the printer disables all interrupts, including communications. To provide feedback to the application, the printer responds to the application when the erase is complete. After sending the erase user flash sector (1D 40 n) command, an application should wait for the response from the printer before sending data. Otherwise, data will be lost. If an application is unable to receive data, it should wait a minimum of ten seconds after sending the erase

user flash sector (1D 40 n) command before sending data.

User storage status (ColorPOS®)

ASCII

GS 0x97 m n

Hexadecimal

1D 97 m n

Decimal

29 151 m n

Value of m:

m specifies the type of stored object to

 

be reported:

m = 0 return the kilobytes (1024) of free user RAM, n = 0 gets largest free block size

n = 1 gets the total size free

m = 3 return the CRC of a logo indexed by n

m = 5 return the CRC of a macro that has been stored, n = 0

m = 0 the value of n selects a return of either the largest free block or total free size, since contiguous allocation cannot be assumed as this area is completely under user control through address parameters.

n = 0 if only one instance of an object type is allowed (macro, user data, user defined characters).

nis the item index when more than one object of type m is possible

n <= FE, see the comments about logo and character set indexes n = FF : return a list describing all the existing items of type m

Note: When a specific item request is made, a returned CRC value of 0 0 indicates that no item is stored at that index. There is a practically negligible possibility that a valid object will have a 0 0 CRC; if this is of concern, applications should check the object downloaded byte sequence to verify that this is not the case (as well as store the CRC as an “ID” for the object if needed later for return value comparisons).

Downloaded character sets are identified by integer extending the existing code page selection as enumerated in the select international character set (= select character code table) command. The firmware standard list is incrementally extended each time a new single or double byte set is downloaded.

Single byte downloaded fonts are selected by m = 3 and 0x40 <= n < 0x80.

Since there are only three double-byte character sets supported, the value 0x80 / 0xA0 / 0xC0 selects the first, second, third downloaded double byte font respectively. In return, each downloaded double byte character band is reported individually as 0xC0, 0xC1, 0xC2 ….for as many bands as have been defined.

Continued . . .

A776-PG00001 C 12/09

A776 (B780) Programming Guide

Page 137
Image 137
Cognitive Solutions A776, B780 manual User storage status ColorPOS, Programming commands 125 = 50 Ascii n = 2 HEX

B780, A776 specifications

Cognitive Solutions A776 is an advanced technology platform designed to enhance decision-making processes through the application of artificial intelligence and cognitive computing. This state-of-the-art solution seamlessly integrates multiple technologies to optimize business operations and drive innovation across various sectors, including finance, healthcare, and manufacturing.

One of the main features of A776 is its robust data processing capabilities. Leveraging powerful machine learning algorithms, the platform can analyze vast amounts of data in real-time, identifying patterns and insights that would otherwise be overlooked. This enables organizations to make informed decisions based on actionable intelligence, significantly improving efficiency and productivity.

Another key characteristic of the A776 system is its natural language processing (NLP) capability. This feature allows the platform to understand and interpret human language, making it easier for users to interact with the system and obtain valuable insights. By integrating NLP, Cognitive Solutions A776 can provide intuitive user experiences, enabling workforce members to query data using everyday language rather than complex coding skills.

The A776 is also built on a flexible architecture that supports seamless integration with existing IT ecosystems. This interoperability allows organizations to harness their current data sources while taking advantage of the innovative features offered by A776. The platform’s API support enables smooth connections with third-party tools, enhancing collaboration and expanding its range of applications.

Security is a major focus of the Cognitive Solutions A776. The platform is equipped with advanced encryption protocols and compliance measures to ensure that sensitive data is protected against breaches and unauthorized access. This commitment to security helps businesses maintain customer trust and safeguard their competitive advantage.

Scalability is another defining feature of the A776. As businesses grow and evolve, the platform can be easily adapted to meet changing demands. Whether a small startup or a large enterprise, organizations can scale their cognitive solutions according to their operational needs.

Furthermore, the Cognitive Solutions A776 is designed with user accessibility in mind. The interface features customizable dashboards that provide a clear overview of insights and performance metrics, enabling users at all levels to harness the power of cognitive computing without requiring extensive training or technical expertise.

In conclusion, Cognitive Solutions A776 is a cutting-edge platform that offers a range of features, including advanced data processing, natural language processing, robust security measures, and user-friendly design. Its flexible architecture allows it to integrate seamlessly with existing systems, making it an indispensable tool for organizations looking to leverage artificial intelligence in their decision-making processes.