On 5/24/2012 2:50 AM, Steve Blackmore wrote: > On Wed, 23 May 2012 06:45:22 -0500, you wrote: > >> Good point, are there any two controls from different manufacturers that >> are completely portable between each other? > Unfortunately not in my experience. > >> I know from reading my CNC g code manuals from other machines that I >> have that even generation to generation of the same controller the g >> code is not portable. > Fanuc<G> > >> So the question is do you cobble up your software just to be portable >> when no one else seems to do this... >> >> Just open up the list of post processors on most cam software and you >> see hundreds of choices usually... > There's hundreds in my copy of FeatureCam. It's a PITA. I do some Gcode > optimisation for a few engineering companies that farm some of their > work out and getting the right post processor that works is problematic > and it's often the small things that catch you out. > > As Stuart says the integrator often changes things too, so you can't > even rely on a stock post processor :( > > However, both LinuxCNC and Mach used the same base for their code and > the radically different behaviour of not stipulating the H value on a > G43 can be disastrous as I know from bitter experience. > > LinuxCNC - not using the H value loads the offset for the current tool. > Mach3 - not using the H value sets the tool offset to zero ! > > The Fanuc style where the H value must be stipulated is much safer. > > Steve Blackmore > -- >
Pure speculation on my part, but I wonder if there are enough rules of thumb known to justify writing a code checker that could alert a user to potential gotchas with a particular G-code file with LinuxCNC. Obviously, the more cross-system knowledge like yours, Steve, the better. Students armed with knowledge-based expert-system tools used to eat this kind of problem for breakfast in the 1980s when every engineering school added an intro course in expert systems. In this case simple decision logic trees would suffice. Regards, Kent ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ Emc-users mailing list Emc-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/emc-users