Feeds

Epson Perfection 1240U

Scanner

  • alert
  • submit to reddit

High performance access to file storage

Review Although Epson's latest scanner isn't the cheapest model on offer, the Perfection's consistently high performance and unsurpassed scan quality make it the obvious choice for the professional user. It isn't a small unit, but the Perfection's trio of one-touch buttons allow for quick operation. We were also impressed by the 1240U's resolution support – the higher the resolution, the more detail packed into each image.

Epson Perfection 1240UThe optical, or hardware, resolution – in this case 1200x2400dpi (dots per inch) – refers to the scanner's physical capabilities. Software driver tweaks can fool most scanners into producing resolutions far beyond their physical capabilities. These figures can be useful, but can also be erratic, so they should be taken with a pinch of salt. Epson scores highly on both the hardware and software resolution fronts. The optical resolution of 1200x2,00dpi gives it a comfortable advantage over the majority of scanners, while the software interpolated resolution of 9600x9600dpi is bettered by few.

The Epson can scan up to A4 size in 42-bit colour. When it comes to scan quality, the Epson is a winner, capturing the detail of every photo and picture across all resolutions. That it did this in double-quick time was an extra bonus – it reproduced an A4 page at 300dpi in under 30 seconds. For the budget-conscious home user or beginner, one of the Visioneer models might be a better choice, but for sheer scan quality and performance the Epson Perfection 1240U is a clear winner. ®

Info

Price: £144
Contact: 0800 220 546
Website: www.epson.co.uk

Specs

Software interpolated resolution: 9600x9600dpi
Interface: USB
Scanning area: A4 (216x297mm)
Colour depth: 42-bit
Weight: 2.8kg
Dimensions: 269x435x93

This review is taken from the July 2001 issue. All details correct at time of publication.

Copyright © 2001, IDG. All rights reserved.

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.