|
Hi,
I have seen asset management systems using motorolla other brands barcode readers. If I am going to develop own system, do you think I can use regular smartphone devices as it all has sensor for barcode reader or it's more professional to have a dedicated barcode readers?
what's your advise?
Thanks,
Jassim
Technology News @ www.JassimRahma.com
|
|
|
|
|
You should research the devices available on the market in your locality, to see which one would meet your requirements.
|
|
|
|
|
It is more professional to be able to say "we support X because.."; either choice could be defended, or better, deferred.
A dedicated barcode scanner is usually a simple device where one does not have to muck with settings to get it to work. You turn it on and start scanning.
A phone OTOH might require a specific setup, but may also prove to be more flexible.
The ideal way would be to create a generic interface, and build a library for both. That way the user/person buying your software could decide for themselves which of both options would work best for their environment.
There might also be companies that already have the hardware, and are merely looking to replace their software.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
how to automatic get information about connected input/output devices?
|
|
|
|
|
It depends on the operating system and what features are provided.
|
|
|
|
|
So I was browsing a page and something seemed to go wrong !
after some time I saw there were two APKs files downloaded -from that page-.
their names are Xzone-1409140423366-.apk and Xzone-1409227281662-.apk
whether or not they are malicious is obvious :if they weren't why were they downloaded 'secretly'.
I found a report here[^] and it says something about key logging.well that's scary...and there are not keyscramblers available for android !
after opening the APK with winrar I found -except of the bunch of HTMLs and a few XMLs- some pictures like playbuttons etc- that were not noticed by me while using the phone.
no other strange activity was noticed either !
so in my view the file was not 'executed'.
but I wan't to know for sure !
Is it possible for someone to run an APK file ,bypassing the phone's security measures ?
also,if this thing enabled a stealth program how can I find it ? (I mean something hidden from taskmanager etc )
any advanced tips ?
oh...I scanned the phone with AVG free and it found no threat !
thanks a lot !!!
|
|
|
|
|
I believe Android (just like most newer Linux distros) only works in "user" mode, which wouldn't be allowed to install anything without prompting the user for permission. That's generally one of the things that makes Linux more secure than Windows (Windows sort of implemented/copied this behavior in Vista).
You should be safe if you never gave permission to install these packages. If for whatever reason you did give permission though, you'd have to see a list of all running processes to make sure it's not running. In standard linux that would be a quick ps aux call but you would likely need a terminal program in Android since it doesn't have one by default (does have one, just not accessible).
|
|
|
|
|
Environment: Windows 7, 64 bit and 32 bit, Visual Studio 2008/2012, C++, multi-threading
My searches to find a definition or description as to what memory operations are atomic have turned up nothing. When I include the search term +atomic most of the pages do not even have the word atomic in them. That is a bit irritating.
Question: What level of memory write is atomic: 8 bit, 16 bit, 32 bit, or maybe even 64 bit? Are there any special conditions? How do you know and how can that be verified?
Bonus point: Google flunks on this task. What search engines are good for this endeavor?
Thanks for your time
Thank you for your time
If you work with telemetry, please check this bulletin board: www.irigbb.com
|
|
|
|
|
OK, this is just a guess, but I can't restrain myself: I think the level of memory write that is atomic is the word size of the CPU.
I have nothing to back this up, but I just wanted to throw this out there.
The difficult we do right away...
...the impossible takes slightly longer.
|
|
|
|
|
|
Hello,
RE: Not according to https://www.google.com/search?q=memory+write+atomic+hardware[^].
When I entered "+atomic" and received multiple pages that did not contain the phrase atomic, I see that as an error by the search engine. If I am incorrect then please tell me how to put a requirement for that specific phrase into the search request.
I entered that phrase into a Google search and followed up the links to the first 30 (three pages worth) and did not find any thing that described what instructions are atomic.
I gladly fess up to not having the best of skills, but this is a difficult topic to research. That I why I requested suggestions for a search engine more attuned to this kind of a question.
Thank you for your time
If you work with telemetry, please check this bulletin board: www.irigbb.com
|
|
|
|
|
Depends on the CPU, obviously. Read the manual.
For example, see Intel System Programming Guide, section 8.1.1 "Guaranteed Atomic Operations":
The Intel486 processor (and newer processors since) guarantees that the following basic memory operations will
always be carried out atomically:
• Reading or writing a byte
• Reading or writing a word aligned on a 16-bit boundary
• Reading or writing a doubleword aligned on a 32-bit boundary
The Pentium processor (and newer processors since) guarantees that the following additional memory operations
will always be carried out atomically:
• Reading or writing a quadword aligned on a 64-bit boundary
• 16-bit accesses to uncached memory locations that fit within a 32-bit data bus
The P6 family processors (and newer processors since) guarantee that the following additional memory operation
will always be carried out atomically:
• Unaligned 16-, 32-, and 64-bit accesses to cached memory that fit within a cache line
The most relevant part is the last line, which says that almost load/store that that doesn't cross a cache line boundary is atomic (except anything wider than 8 bytes).
|
|
|
|
|
Hello,
I found the document and saved a copy. That is what I was looking for.
Thank you.
Thank you for your time
If you work with telemetry, please check this bulletin board: www.irigbb.com
|
|
|
|
|
Its not Google that flunks this task. Its your Google-Fu that does.
The information you seek is processor dependant, but in most cases it's the word size of the CPU.
|
|
|
|
|
It is an operation that is not interruptible. So, a single machine code read or write.
Why is it important? SO that if you are reading a chunk of memory bigger that this you make sure you don't get interrupted.
In the Linux kernel, the term 'atomic' (for which there is a func, in_atomic()) means 'is the code running at a privileged level' which is either at soft or hard interrupt level.
Thus timer expiry is soft interrupt. A card triggering an interrupt is hard.
So in the windows kernel DPC or DIRQL are the 'atomic' modes. Passive, is non atomic.
Harolds answer is spot on, just wanted to add a bit more colour.
One other feature of running 'in atomic', ie, at soft or hard interrupt, is you cant access paged out memory or functions. Else you get a page fault exception.
|
|
|
|
|
I am trying to access rtsp url using QuickTime player. Now if there is some authentication set, then it asks for it otherwise it just plays the stream. It is good till here. But if I add username and password in the url, then it shows message: Server Not Found. I am passing the url in the following manner.
rtsp://username:password@IP-Address:Port
How could I pass rtsp url in QuickTime player with the credentials?. Thanks for any input
This world is going to explode due to international politics, SOON.
|
|
|
|
|
|
Sharath C V wrote: Mobile Broadband
Is that the same as 'wireless WAN' ?
|
|
|
|
|
|
I cant see any mention up updates to it on that link.
I actually worked with Microsoft on the development of this API starting off on Vista. It didn't make the cut for that OS but came in on Win7.
Its complex. All that home network, roaming network, signal strength, PIN entry etc. I hope they haven't made it worse!
|
|
|
|
|
Thanks very much for your reply Matt.
And great to know that you worked on WWAN APIs!
No, the APIs are nice. It is pretty nice as to how they have pulled it off. Finding it really helpful. Since Microsoft did that homework, our live is better and we can spend quality time on other work items.
-Sharath
|
|
|
|
|
Hi all:
I am new one in wdf. I got a problem.
I write a usb hid touch driver in xp(send one touch as mouse).
My problem is, when the usb touch device is reset(the reset command are not
sent by host), How can I send the reset command from usb touch device to host
and notify Os get descriptor again and re addressing?
My English is not good, please forgive me.
best regard, Victor
|
|
|
|
|
My friend recently formatted his pc (only C drive) and re-installed XP. Now he faces a weird problem. The usb ports are working fine but it's not reading any pen drives other than his own. At first I found it hard to beleive but that's what is happening. His pen drive works fine but none of the others do. Any help?
|
|
|
|
|
Open the device manager, go to Disk Management and lok for the drives (see also http://support.microsoft.com/kb/309000[^]). They might just lack a drive letter.
Otherwise, look in device manager for "unknown devices".
|
|
|
|
|
Only XP Service Pack 2 has built-in support for USB drives. Tell your friend to install Service Pack 2, and the drives will work.
The difficult we do right away...
...the impossible takes slightly longer.
|
|
|
|