Professional Documents
Culture Documents
Simio Installation Notes
Simio Installation Notes
Hardware Requirements
If you are using an existing system, then the above guidelines should provide acceptable
performance. If the system falls short in memory or graphics, note that most systems with
inadequate memory can be easily and inexpensively upgraded. Likewise often graphics cards
can also be easily upgraded.
If you are buying a new system, we recommend getting one with dual or quad core processors
because Simio takes full advantage of multiple processors(2). Most new systems come with
adequate graphics cards, but we would recommend a higher than standard screen resolution,
perhaps 1920x1200 and perhaps even a second monitor again Simio takes full advantage of
higher resolution and multiple monitors(3). Additional memory will allow larger models to run.
(1) Additional prerequisite software packages other than this product may require installation and these other packages may
require additional available hard drive space for installation purposes.
(2) Multiple scenarios and replications run in the Experiment Window take full advantage of each available processor (e.g. a
quad-core processor will execute 4 replications or scenarios simultaneously).
(3) Not only can you use a second or even a third monitor for displaying help and documentation, but most Simio windows can
be undocked and moved to a second screen. For example, you can display the Trace or Dashboard window on the second
screen. Or you can simply have the animation span two screens. In many configurations you can load multiple copies of Simio,
for example to display a SimBit on one screen while you are working on your model on another.
Software Requirements
Step 4 If you have not already installed Simio, you can now install the Simio software itself
by starting setup.exe from the downloaded Simio zip file.
Simio will set the "errorlevel" value to 0 if the authentication is successful, or 1 if not. Note that
in order to authenticate, Simio must be able to connect to the internet to access our
authentication web service.
The authentication is based on the machine name, so this post-deployment step would have to
run after each computer has been given its final unique name. This implies that if a particular
machine needs to be re-deployed, it would need to be given the same machine name as before,
otherwise the re-authentication process would consume another valid authentication from the
key.