EKS Fiber Optic product drawings
EKS Fiber Optic product drawings in DWG, DXF and STEP format.
WiFi Connect before break
The purpose of this document is to help you configure your ACKSYS product with dual radio in client mode, with the CONNECT BEFORE BREAK functionality. Please note that this functionality is described in the WaveOS User's guide DTUS070, section V.2.6.7 .
AirBox page
Viltrus, MX-3 Configuration and setup software
MX-3 configuration and setup software including USB driver software. ZIP file.
VILTRUS, MX-1 Configuration and setup software
MX-1 configuration and setup software inclusive USB driver software. ZIP file includes manual.
STV-Automation, M-Bus setup software
Configuration software for STV-Automation M-Bus modules.
Datexel, Configuration software DAT3000 and DAT10000
Configuration software for DAT3000 and DAT10000 series with Modbus protocol.
Installation of a POF cable
How to prepare and connect the POF cable into the Optolock connector.
Viltrus, MX-9 configuration and setup software
MX-9 configuration and setup software including USB driver software. ZIP file also includes the manual.
EKS, CAN modules in combination with Woodward controllers
Extra information about the EKS fiber optics CAN Interface modules in combination with Woodward controllers.
El-Microwave, Data acquisition modules
Extra information about the El-Microwave Data Acquisition modules of the D1 series.
Viltrus, RAY-3 configuration and setup software
Ray-3 configuration and setup software including USB driver software. ZIP file also includes the manual.
Geneko, GWG-30 and GWG-40 software update
We want to inform you about our latest firmware 1.3.5 release and its new features.
During 2018 an amount of cyber-attack has been raised. Customers that were not properly protected their network devices suffered loss of data, internet connectivity congestion and device failure. This is the reason to take care of your network devices and to think three steps ahead before any similar scenario happened. Routers, Computers and other system information and telecommunication devices have to be protected with access credentials at least. Beside credential authentication you have to be advised that last updates of firmware and kernel of OS and all other security services updated is also very important to be performed and all together these protocols will keep you and your information’s safe as much as possible.