Skip to main content

Teledyne Dalsa launches vision system for multi-camera applications

Teledyne Dalsa has launched a vision system which it says offers cost savings for multi-camera vision applications such as final inspection of large assemblies. The Geva 400 system features four Power over Ethernet compliant Gigabit camera ports are compatible with a range of cameras, including Teledyne’s Genie Nano GigE. Users can add cameras with commercially available network technologies to allow for large configurations at lower systems costs. Geva 400 comes with Intel quad-core Atom architecture a
February 4, 2019 Read time: 1 min

593 Teledyne Dalsa has launched a vision system which it says offers cost savings for multi-camera vision applications such as final inspection of large assemblies.

The Geva 400 system features four Power over Ethernet compliant Gigabit camera ports are compatible with a range of cameras, including Teledyne’s %$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 link-external Genie Nano GigE false http://icm-tracking.meltwater.com/link.php?DynEngagement=true&amp;H=qJ9juQrYQnz1cqUgIm8psgUQ75z%2Bv%2FUt%2BmzLgDhho6nnEEJMrQdYl7sVNASvnWmCKmGEpeovJPZqkuySGyabwNaxMVUhGzlFqzRX24pQgAK75pGMIYI5kg%3D%3D&amp;G=0&amp;R=https%3A%2F%2Fwww.teledynedalsa.com%2Fen%2Fproducts%2Fimaging%2Fcameras%2Fgenie-nano-gige%2F&amp;I=20190131130120.00000010e0ed%40mail6-42-usnbn1&amp;X=MHwxMDQ2NzU4OjVjNTBjOGM3MzRiZjU1NTA3Y2I4ZTQ1Mjs%3D&amp;S=b3MzqYovHlw1lYcU1BiXkdRKbsF6MnnFhGUEelXqGm4 false false%>. Users can add cameras with commercially available network technologies to allow for large configurations at lower systems costs.

Geva 400 comes with Intel quad-core Atom architecture and is expected to offer low power consumption for a range of machine vision applications. The system can be expanded with an optional PL-USB companion module that offers I/O expansion and integration for up to four GigE cameras.

Additionally, the product comes with ethernet and serial ports for communicating with third-party devices and four USB ports for setup and run-time control and a factory enterprise, dedicated display. 

For more information on companies in this article

Related Content

  • Annual Meeting Spotlight
    May 1, 2012
    Investor Roundtable: The Importance of Private Investment to Advancing Transportation Investment in the transportation technology sector is at a high. Join a group of private investors from Guggenheim Securities, Raymond James & Associates, Intel Capital and Fontinalis Partners, who are actively engaged in the transportation technology space.
  • LED lighting strobes within ITS
    April 29, 2013
    Specialist in the design and manufacture of LED illumination and control solutions for machine vision and intelligent traffic applications, Gardasoft, has published a White Paper that deals specifically with the integration and advantages relating to the use of LED lighting within ITS systems.
  • Reflecting on the EU ITS action plan
    January 7, 2013
    How do national policy positions reflect key facets of the European Commission (EC) ITS Action Plan? How useful are memoranda of understanding (MoU) as association tools? How can associations attract more young people to work in ITS? Finding answers to these questions emerged as key challenges for 2013 at the Network of National ITS Association’s November 2012 meeting in Dublin. Commenting on its commitment to work with Ertico-ITS Europe in surveying national action plan stances, Network chair Jennie Mart
  • Companies depend on automation, AI and machine learning for cyber security
    February 23, 2018
    To defend against cyber attacks, 39% of organisations are reliant on automation, 34% on machine learning and 32% on artificial intelligence (AI), according to the Cisco 2018 annual report conducted on 3,600 chief information security officers. It found that over half of all attacks resulted in financial damages of more than $500,000 (£697,000), including, but not limited to, lost revenue, clients, opportunities, and out-of-pocket costs. The study revealed that adversaries are using Malware sophistication