On Tuesday, May 22, 2012 04:36:53 PM Jon Elson did opine: > Rafael Skodlar wrote: > > Thank you very much for detailed advice to all of you that responded > > to my question. I received enough material to spend a few evenings > > doing my homework. It's much easier to start knowing what others have > > tried and what works in different circumstances. > > > > Using Cat-5 was a surprise to me as it's a bit stiff unless each wire > > is made of even smaller wires, not common in general use. > > There appear to be at least 3 kinds of Cat-5 cable. Solid wire is made > for stringing in > ceilings and walls, where it will never be moved. Some cables made for > use from wall jack to computer, etc. have 7 strands, some for more > frequent flexing > have something like 31 strands. But, I really don't recommend Cat-5 at > all for encoders.
Only for encoders with differential outputs, and true differential inputs to the computer. > For one thing, shielded Cat-5 cable is rare. In fact, I have never seen such a beast myself Jon. > > Jon > > ------------------------------------------------------------------------ > ------ Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. > Discussions will include endpoint security, mobile security and the > latest in malware threats. > http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > Emc-users mailing list > Emc-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/emc-users Cheers, Gene -- "There are four boxes to be used in defense of liberty: soap, ballot, jury, and ammo. Please use in that order." -Ed Howdershelt (Author) My web page: <http://coyoteden.dyndns-free.com:85/gene> Q: How was Thomas J. Watson buried? A: 9 edge down. ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ Emc-users mailing list Emc-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/emc-users