Jump to content

Jordan Kuehn

Members
  • Posts

    690
  • Joined

  • Last visited

  • Days Won

    21

Posts posted by Jordan Kuehn

  1. This is the specific error I keep repeatedly getting, but only when trying to read a channel of the NI 9237. Sometimes it stopps immediately, other times it chugs along nicely for a few readings first.

    Error -200284 occurred at Inputs_Read_All.vi

    Possible reason(s):

    Some or all of the samples requested have not yet been acquired.

    To wait for the samples to become available use a longer read timeout or read later in your program. To make the samples available sooner, increase the sample rate. If your task uses a start trigger, make sure that your start trigger is configured correctly. It is also possible that you configured the task for external timing, and no clock was supplied. If this is the case, supply an external clock.

    Property: RelativeTo

    Corresponding Value: Current Read Position

    Property: Offset

    Corresponding Value: 0

    Task Name: _unnamedTask<A89>

    I can get it to run quite a bit longer by daisy chaining two 5-meter USB 2.0 extender cables end-to-end (routed under the door) but then, after enough time, the cDAQ itself momentarily fails to be detected and I get a "device not there" error. So that's no fix either. Alas and alack.

    At risk of sounding insulting, are you certain the task is configured correctly? You mentioned that these are new modules to you so perhaps there is something that isn't configured correctly that is giving you your timing issues. It could even be a combination of both. What are the details for your task configuration?

    Also, here's NI's breakdown on that error: http://digital.ni.com/public.nsf/allkb/FEF778AD990D5BD886256DD700770103

    Of course, it's entirely possible everything is set up correctly, but it never hurts to double check the obvious stuff first.

  2. If you are using cDAQ is there a reason you haven't tried the ethernet chassis? I swear there was an 8 slot option, and I also thought they were the same price as USB. I've had good luck with replacing a USB solution with an ethernet one which would be more suited for long routes.

    Here you go http://sine.ni.com/n...g/en/nid/208990

    The ethernet ones take a little bit more set-up, but work great for longer distances.

  3. Yup. So how would a piece of software "dual licensed" under "Public Domain" and "Non-Commercial" work?

    From the wiki page: http://www.linuxinsi...tory/38172.html

    "MySQL states on its Web site, "Our software is 100 percent GPL, and if yours too is 100 percent GPL (or OSI compliant), then you never have to pay us for the licenses. In all other instances, you are better served by our commercial license." They give away the software, yet they make money selling it."

    I'm not seeing the problem?

    Edit//

    Your "work for hire" scenario means the entity hiring the developer owns the license and is free to do with it what they want. This is different than posting your own code to the fora.

  4. I disagree.

    Licensing can be about relinquishing your rights (like Public Domain-Germany being an exception). That is why you have terms in many licenses like "transfer of rights" and "non-exclusive rights". Once you have relinquished them, there is no going back and saying "actually I'm now going to make it share-like" - it won't hold in a court of law (nothing to stop you trying, though). Since a license is linked to a product. You can create a new product, but the onus is then on you to prove that the new product under the different licence is dissimilar enough to warrant being termed a "different product" if it is ever contested.

    It is quite possible (and there have been cases) that you can write some software, transfer your rights via licencing or indeed grant rights to others that supersede yours so you (as the author) are no longer able to distribute, modify or even talk about the software. A simple case of this is the pre-emptive "work for hire" clause in most software developers contracts. If a developer never relinquished any of their rights to the software regardless of any licencing or contract, businesses would never be able to own anything.

    http://en.wikipedia.org/wiki/Multi-licensing

  5. You could store these data paths on disk in a file. Quickest solution would be to have your data_viewer.exe monitor the file for changes and update itself as needed. Alternatively, without the add_file_to_data_viewer.exe you can use an event structure in your main program that monitors for a value changed event on a front panel boolean. When this event fires you can prompt the user for a file path dialog and update your path list as needed. If you want your list to persist between executions it is still good to save it to disk and load it during initialization.

  6. There is no performance impact from the depth or breadth of a dynamic dispatch hierarchy. The time needed to dispatch to the correct implementation is constant regardless of the number of classes in memory, the number of methods that a given class has or the number of overrides for a particular method.

    I see that you are not a fan of the serial comma.

    That aside, thank you for the clarification.

  7. I'm relying on HG. Have never really worked with Git since I'm happy with HG.

    Since you don't have the time to dive into the SCC system you want to use I would advice you to go with HG, it's just harder to mess up.

    I haven't had stability issues with HG (Workbench).

    What are you going to setup as a server? If you have the time (approx. half a day), setting up rhodecode on a linux server is a good idea. It gives you user management and a web-interface beyond the shipped webserver of HG.

    Ton

    +1 to Rhodecode

  8. What are you trying to protect, and from whom? If there's an attacker who can read arbitrary memory locations or get access through VI server, seems to me they'd just install a keylogger and get your passwords for everything, not just the LabVIEW application.

    While I do think you have a point, it does seem to me that this is at least an interesting topic to discuss, how to make a secure application. I have made some tools that have very simple authentication as it was more for simplifying displays and such rather than protecting anything important, but I could certainly see the need for a more robust authentication system. I wish I had answers, but I do like the questions.

  9. For some reason the VI snippet is showing up as an image.

    It finally worked, I had to right click and save target. Although I've been using Labview for a long time, I didn't really use snippets before. Thanks.

    I believe in LAVA the image in a forum post is a thumbnail and you can either 'save target' like you did, or click on the image and then 'save image'.

  10. I was very interested in this session and only managed to catch the last half of it. What I heard and saw with the Jenkins/SCC integration looked very good to me and I'd like to investigate this a bit more.

    Was the build server using the open G builder or the NI Application Builder?

    Are there existing solutions for building labview projects in Jenkins or is that custom built?

    What (if any) information/code/plugins/etc. does JKI have available? From what I gathered, their Jenkins server was running Linux and building in a Windows slave? Does anyone know if it is possible to run everything on a single Windows machine? I've seen installations for Jenkins that can be done in Windows.

    Sorry for the many questions that would have probably been answered if I hadn't shown up late.

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.