Protected interpreters

To ensure the use of an interpreter in accordance with the issued license, perform the following steps:

  1. The interpreter must be designed using the protection interface.

  2. The interpreter has to be placed in the container.

  3. Together with the interpreter in the container should be placed file or files with the secret data.

Following the issuance of licenses for container and its activation, the user will be available for the use of an interpreter, see G-code based simulation.