|
When starting my career I learned to use Veroboards[^] and Perfboards[^] (those boards with single dots rather than strips). I and most of my colleagues preferred the Perfboards because Breadboards often require cutting the stripes which makes later changings more complicated than with Perfboards.
I still use Perfboards using a Wiring Pencil[^]. Because these where quite expensive 30 years ago, I made one myself for private projects at home using a drop action pencil housing with an attached spool from mother's sewing machine.
At work I'm also using Breadboards[^] for simple layouts and when testing different schematics. But final prototypes will be always wired on a Perfboards because the contacts of Breadboards wear out with time resulting in bad electrical connections.
|
|
|
|
|
Jochen, thanks for the info, as I've always used Vero boards (the ones with line strips), but Perfboards seem more adaptable to work with since you don't have to drill holes in the vero strips to cut off Electrons from running the full length of that strip. This was rather helpful, thank you.
Regards,
CodingK
|
|
|
|
|
I noticed this post is little stale / old , but here is my reply anyway.
I just switched to Arduino Due processor which has "native " USB port.
There are "canned" plug and play "application" for it - mouse , keyboard and two MSC "mass storage controller" - flash drive or any USB storage devices.
The main "problem" - the Due being ARM processor has minimal software written for it by "Arduino gurus" - so you are pretty much on your own.
One of the MSC is somewhat unfinished - it is missing the "access to real disk" part.
There is nothing, just lots of "talk" on Arduino web site, about USB "serial" application if you are looking for just communicating to another device using USB.
Vaclav
|
|
|
|
|
Thanks for the reply Vaclav_Sal; better late than never.
Regards,
CodingK
|
|
|
|
|
Hello. I don't know how to choose between these laptops. What makes a laptop faster over the other two from this list.
1 - Intel Core i3 2.5 GHz
2 - Intel Core i5 2.4 GHz
3 - Intel Core i7 2.2 GHz
Again, from the list, if core i7 is faster than core i3 then how? Thanks for any input.
This world is going to explode due to international politics, SOON.
|
|
|
|
|
core i7 is faster in some applications which uses all processor/core.
i3 currently supports dual processor both with dual core. This means running 4 2.5GHz clock at the same time. While i7 supports quad processor all with dual core. Means running 8 2.2Ghz clock at the same time.
Again it varies with the application that would be using the processor.
If the application is only using a single thread then the i3 is faster. If it uses multiple threads then i7 is faster.
|
|
|
|
|
As Michael Reyes already said it depends on the use.
This is what helps me to decide what would be a good upgrade: http://www.cpubenchmark.net/high_end_cpus.html[^]
Just be sure to know that passmark is a synthetic benchmark which means the actual performance in applications can be slightly different.
However it is still a viable way to help you to decide what CPU to buy.
|
|
|
|
|
Hi
I have worked on basic linux device driver.Now I want to write an audio driver on linux platform.So can anybody help me to start, because i don't know anything about audio.
thanks
|
|
|
|
|
|
Hi,
I have seen asset management systems using motorolla other brands barcode readers. If I am going to develop own system, do you think I can use regular smartphone devices as it all has sensor for barcode reader or it's more professional to have a dedicated barcode readers?
what's your advise?
Thanks,
Jassim
Technology News @ www.JassimRahma.com
|
|
|
|
|
You should research the devices available on the market in your locality, to see which one would meet your requirements.
|
|
|
|
|
It is more professional to be able to say "we support X because.."; either choice could be defended, or better, deferred.
A dedicated barcode scanner is usually a simple device where one does not have to muck with settings to get it to work. You turn it on and start scanning.
A phone OTOH might require a specific setup, but may also prove to be more flexible.
The ideal way would be to create a generic interface, and build a library for both. That way the user/person buying your software could decide for themselves which of both options would work best for their environment.
There might also be companies that already have the hardware, and are merely looking to replace their software.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
how to automatic get information about connected input/output devices?
|
|
|
|
|
It depends on the operating system and what features are provided.
|
|
|
|
|
So I was browsing a page and something seemed to go wrong !
after some time I saw there were two APKs files downloaded -from that page-.
their names are Xzone-1409140423366-.apk and Xzone-1409227281662-.apk
whether or not they are malicious is obvious :if they weren't why were they downloaded 'secretly'.
I found a report here[^] and it says something about key logging.well that's scary...and there are not keyscramblers available for android !
after opening the APK with winrar I found -except of the bunch of HTMLs and a few XMLs- some pictures like playbuttons etc- that were not noticed by me while using the phone.
no other strange activity was noticed either !
so in my view the file was not 'executed'.
but I wan't to know for sure !
Is it possible for someone to run an APK file ,bypassing the phone's security measures ?
also,if this thing enabled a stealth program how can I find it ? (I mean something hidden from taskmanager etc )
any advanced tips ?
oh...I scanned the phone with AVG free and it found no threat !
thanks a lot !!!
|
|
|
|
|
I believe Android (just like most newer Linux distros) only works in "user" mode, which wouldn't be allowed to install anything without prompting the user for permission. That's generally one of the things that makes Linux more secure than Windows (Windows sort of implemented/copied this behavior in Vista).
You should be safe if you never gave permission to install these packages. If for whatever reason you did give permission though, you'd have to see a list of all running processes to make sure it's not running. In standard linux that would be a quick ps aux call but you would likely need a terminal program in Android since it doesn't have one by default (does have one, just not accessible).
|
|
|
|
|
Environment: Windows 7, 64 bit and 32 bit, Visual Studio 2008/2012, C++, multi-threading
My searches to find a definition or description as to what memory operations are atomic have turned up nothing. When I include the search term +atomic most of the pages do not even have the word atomic in them. That is a bit irritating.
Question: What level of memory write is atomic: 8 bit, 16 bit, 32 bit, or maybe even 64 bit? Are there any special conditions? How do you know and how can that be verified?
Bonus point: Google flunks on this task. What search engines are good for this endeavor?
Thanks for your time
Thank you for your time
If you work with telemetry, please check this bulletin board: www.irigbb.com
|
|
|
|
|
OK, this is just a guess, but I can't restrain myself: I think the level of memory write that is atomic is the word size of the CPU.
I have nothing to back this up, but I just wanted to throw this out there.
The difficult we do right away...
...the impossible takes slightly longer.
|
|
|
|
|
|
Hello,
RE: Not according to https://www.google.com/search?q=memory+write+atomic+hardware[^].
When I entered "+atomic" and received multiple pages that did not contain the phrase atomic, I see that as an error by the search engine. If I am incorrect then please tell me how to put a requirement for that specific phrase into the search request.
I entered that phrase into a Google search and followed up the links to the first 30 (three pages worth) and did not find any thing that described what instructions are atomic.
I gladly fess up to not having the best of skills, but this is a difficult topic to research. That I why I requested suggestions for a search engine more attuned to this kind of a question.
Thank you for your time
If you work with telemetry, please check this bulletin board: www.irigbb.com
|
|
|
|
|
Depends on the CPU, obviously. Read the manual.
For example, see Intel System Programming Guide, section 8.1.1 "Guaranteed Atomic Operations":
The Intel486 processor (and newer processors since) guarantees that the following basic memory operations will
always be carried out atomically:
• Reading or writing a byte
• Reading or writing a word aligned on a 16-bit boundary
• Reading or writing a doubleword aligned on a 32-bit boundary
The Pentium processor (and newer processors since) guarantees that the following additional memory operations
will always be carried out atomically:
• Reading or writing a quadword aligned on a 64-bit boundary
• 16-bit accesses to uncached memory locations that fit within a 32-bit data bus
The P6 family processors (and newer processors since) guarantee that the following additional memory operation
will always be carried out atomically:
• Unaligned 16-, 32-, and 64-bit accesses to cached memory that fit within a cache line
The most relevant part is the last line, which says that almost load/store that that doesn't cross a cache line boundary is atomic (except anything wider than 8 bytes).
|
|
|
|
|
Hello,
I found the document and saved a copy. That is what I was looking for.
Thank you.
Thank you for your time
If you work with telemetry, please check this bulletin board: www.irigbb.com
|
|
|
|
|
Its not Google that flunks this task. Its your Google-Fu that does.
The information you seek is processor dependant, but in most cases it's the word size of the CPU.
|
|
|
|
|
It is an operation that is not interruptible. So, a single machine code read or write.
Why is it important? SO that if you are reading a chunk of memory bigger that this you make sure you don't get interrupted.
In the Linux kernel, the term 'atomic' (for which there is a func, in_atomic()) means 'is the code running at a privileged level' which is either at soft or hard interrupt level.
Thus timer expiry is soft interrupt. A card triggering an interrupt is hard.
So in the windows kernel DPC or DIRQL are the 'atomic' modes. Passive, is non atomic.
Harolds answer is spot on, just wanted to add a bit more colour.
One other feature of running 'in atomic', ie, at soft or hard interrupt, is you cant access paged out memory or functions. Else you get a page fault exception.
|
|
|
|
|
I am trying to access rtsp url using QuickTime player. Now if there is some authentication set, then it asks for it otherwise it just plays the stream. It is good till here. But if I add username and password in the url, then it shows message: Server Not Found. I am passing the url in the following manner.
rtsp://username:password@IP-Address:Port
How could I pass rtsp url in QuickTime player with the credentials?. Thanks for any input
This world is going to explode due to international politics, SOON.
|
|
|
|