May 312015

A new generation of tools based on SDL combines graphical easy-to-learn management of software with automatic generation of documentation and modifications. The code is optimized for embedded applications and for testing by adding the real-time elements needed for embedded systems. Unlike some other formal languages, SDL has been designed for general, real-time, event-driven applications.

SDL is based on the idea of communication between extended finite-state machines running in parallel. An SDL system consists of four basic elements. Block diagrams show the functional and hierarchical structure of the system. Process diagrams show the dynamic behavior through flow charts. Signal definitions handle the message-passing communication. Data type definitions complete the basic elements.

Processes can be created and terminated dynamically. Each process contains a state machine with an

Apr 302015

Your hard drive never seems to fail at a good time. Usually, you’re up to your eyeballs in work and the last thing you need is a broken computer.

Alas, Murphy and his Law are always looking for opportunities like these. In the event that your hard drive fails, it’s important to get your head straight and go into problem solving mode.

To help you out, here are four tips to help you deal with a hard drive failure from this provider.


Mac's classic question mark is a good sign of hard drive failure.

Mac’s classic question mark is a good sign of hard drive failure.

OK, so your computer is obviously dead, right? But are you sure it’s the hard drive to blame? When diagnosing your machine, look for some of the common hard drive failure symptoms.

A big indicator of drive issues is that infamous clicking sound. If your hard drive is making a clicking noise, there’s something seriously wrong with it. Take it somewhere where the employees are all level 80 warlocks in an online game. You’re going to need their real-world expertise.

Another indicator of hard drive failure is if your machine turns on, but won’t get past a certain point. On a Mac you’ll likely see a folder with a question mark. PCs tend to tell you there’s no disk in the machine. Either way, if your computer is booting to some extent, it’s probably something to do with the drive. However, if your computer won’t even turn on, this is likely a very different (and often more severe) issue. Seek help to recover the data, particularly a data recovery service that is equipped to deal with emergency hard drive recovery like Hard Drive Recovery Group.

Do not, at the first sign of trouble, unplug your machine and run to the nearest computer repair store. Showing up with nothing but a broken machine and hopeful look on your face is only going to end in pain. Continue reading »

Mar 112015

While corporations are rapidly adopting CASE tools to build business applications, it has become increasingly difficult to differentiate among the offerings. Many CASE tools boast flashy graphical interfaces and claim support for the entire life cycle. Others tout code-generation capabilities, support for reverse-engineering and project-management facilities.

To match the tool to the needs of your organization, look for something that will give you the most bang for the buck. As summarized in the figure, this is achieved by tools that address the following criteria:

— a graphics-style user interface;

— support for the entire life-cycle process;

— the ability to generate 100 percent of application code;

— a single repository of design specifications;

— desktop code generation;

— multiple code generators for COBOL, C, Ada, …

Dec 022014

linusscr“We look for applications to be integrated into a solution, not the other way around,” says Deresinski, who has spent most of his 13 years in the printing industry working with computers and networking systems among web, sheetfed, and digital houses. “We can’t say, ‘I’ve got Linux–that’s what I want on my prepress network,’ unless we have programmers out there to write the programs for us.”

A key component to Lake County Press’s configuration is built-in redundancy, which eliminates the risk of downtime anywhere in the plant “Everything from our servers to our network switches is redundant; so if one part goes down, another picks up,” Deresinski says. “We have failover firewalls, mirrored disks, and backups upon backups of job data and operating systems on …

Jul 132014

(Awesome stuff!)

Is Java nothing more than the beanie baby of programming languages?


Java may indeed be man’s best response to the age-old problem of creating cross-platform networked applications, but much of its current momentum builds on a very dubious characteristic of human beings– the herd mentality, or the tendency to be taken in by fads.

That was one of the clearest conclusions to emerge from a report conducted by Zona Research at the behest of Softbank Forums, which is organizing Java Internet Business Expo, to be held in New York from Aug. 25 to Aug. 28.

For example, the study reported that among the 279 companies surveyed, IT managers said the predictions regarding industry trends were the single greatest external influence on their

Jun 052014

Some aspects of the Java language are very attractive to embedded designers, especially when compared with the other object-oriented alternative: C++. According to Carl Dichter, senior technical marketing manager at Intel Corp.’s Appliances and Computing Division (Chandler, Ariz.), under Java it is no longer necessary to think about the size of variables, the byte-order in which data is stored by the processor, and which functions are available and how they operate differently on different platforms. Nor is it necessary to concern oneself with the different ways to allocate memory or figure out where to free that memory based on different exit points. And there are no longer different ways to process user events, to write things on the screen, to read from the keyboard or

Nov 172013

As you are about to leave the office for a 10 o’clock business appointment with that important client, you do a quick checklist to ensure that you have everything. You open your briefcase and there it is — your notebook. Yes, you have everything.

For most business people, that one piece of equipment holds every needed bit of information required to perform their job outside of the office.

According to Ian Purton, an account executive with Markham, Ont.-based A.C. Nielsen Market Research, the portable computing market has changed drastically in the last five years. The changes have resulted in improved technology enhancements and price performance.

“You can look at the features of the product and one obvious (improvement) is the power of the portable,”

Sep 182013

So something has gone wrong with your hard drive and you do not know what to do. Here are some of the most common reasons for hard drive failure.

Head/media collisions are responsible for a great number of hard drive malfunctions. Because there is more than one hard disk platter very close to each other, rotating at a rate of 150 times per second, even the slightest disturbance could make the disk malfunction. When dust settles on the magnetic surfaces after entering the sealed drive unit, it gets stuck between the head and the disk causing problems. This Irvine data recovery service can help.

Circuit board failure occurs when there is an electrical failure. It is important to keep your system clean and cool

Aug 162013

A simple laptop enclosure adapter

Most laptop owners think that laptop hard drive recovery is a very costly thing to pay for. This is actually not a situation to panic, and really isn’t as expensive as many users assume at the outset. But this job is known as something that requires high technical skills. But, with the right tools and the knowledge about the tools it is an easy task. It is just a matter of having the knowledge of how to recover the data from a dead laptop hard drive. And in the case of software failure, this is the kind of recovery that can be accomplished within a few minutes or less.

Most laptop owners are not aware where their data files are …

Sep 062012

Microsoft won another marketing battle in the object wars last week by finally agreeing to submit its ActiveX technology to the Open Group for ratification as a de facto industry standard.

ActiveX in the house!

Although the software giant has criticized such organizations in the past for being too slow and unwieldy, it has ostensibly handed its object crown jewels to a body packed full of Unix rivals which will help develop, brand, test and license them

The Open Group will receive source code, specifications, reference implementations and validation tests. In return, Microsoft will get special treatment. After achieving a lifelong aim and earning a rumored $1m (667,000 [pounds]) in executive membership fees, the Open Group intends to set up a separate unit, the Active

Sep 032012

Will it be Intel inside or Java everywhere? his month, a recent story¬† highlights the most radical bid in years for a new computing platform: Sun Microsystems’ Java chip/Java language combination. This is not just an alternative to Intel/Microsoft computing, a la the PowerPC/Mac OS package. It’s a reinvention of the computer into a more universal, versatile, and interoperable device. The Java model could obliterate many of the distinctions between standard computers, embedded systems, and products still to come, such as intelligent cable boxes and cellular phones.

For years, we’ve lived with chips that will run almost anything and languages that will run on almost anything. Java chips will give us performance where we need it–running Java applications–while the Java environment will give us interoperability

Aug 242012

Get this. The President needs a portable printer only it can’t weigh anything. Zero pounds. I am pacing the floor in her office, trying to explain that they do not make such a printer but she doesn’t want to hear it. Instead she folds her arms and says, “I think you’re being unreasonable, honey.”

It’s OK for her to call me honey. We’re married.

“I’m being unreasonable?” I do the math again just in case she’s right. “You want a portable printer, but you don’t want to add weight to that laptop you lug around. Am I on the right track here?”

She throws her hands up in despair. “You’re not going to bring up the laptop thing again!”

The Classy Canon notejet!

I told

Aug 102012

What if you could go back to the days of Windows 1.0 and influence Bill Gates to build Windows just the way you wanted it? I can’t actually help you change the past, but I can give you the chance to influence the future. If you have the time to send me a short E-mail, you can join with me to help shape the direction of the Java platform.

This ombud’s for you. Here’s how it works. I’m going to act as your ombudsman. You tell me what Java needs to grow into a robust, dependable, cost-effective enterprise platform (my “starter set” is listed below). I will deliver your consensus opinions to Scott McNealy (Sun Microsystems’ CEO), Eric Schmidt (chief technology officer) and Alan Baratz

Aug 102012

Call it in-your-face EPS. The computer screen is strapped to a visor that hangs a postage stamp-sized monitor in front of one of your eyes. This visor, which resembles the goggles currently in vogue with virtual-reality pioneers, is connected to a computer attached to your belt. The computer is about half again as large as a Walkman-type portable radio and weighs about 3 pounds. The final element of the system is a microphone, also attached to the visor, that transmits verbal commands to the computer.

This bodyware is connected to a larger network of computers using a built- in wireless LAN (local area network) card. With this connection, the employee can access any information on the network while still moving freely about the factory floor. …

Jul 072012

Connected device applications are networked but operate in a more restricted environment, such as telecommunications equipment. The attractiveness of Java may relate to reuse, strength of language and processor independence as well as the ability to dynamically run new applications, but the applications themselves come from a closed universe. That is, the applications come only from the service provider or developer of the Java-based system and are qualified to run only on this device subject to certain constraints, such as size or perhaps even a language subset. In general, there is no requirement to run an arbitrary Java application; therefore, these applications can experience significant performance benefits by using compiled Java instead of a Java Virtual Machine. These devices start to resemble more traditional embedded

Jun 222012

This article provides an update on the Tcl scripting language and its associated toolkit, Tk. Scripting languages are designed to glue components together. They work with system programming languages such as C or Java, which are good languages for building components. Other popular scripting languages include Perl, Visual Basic, JavaScript, Python, and UNIX shells such as sh.

Scripting languages have existed for several decades, but their popularity has risen dramatically over the last 10 to 15 years. This is due in part to improvements in scripting technology but is mostly due to changes in the application mix. New application domains such as graphical user interfaces and enterprise applications have a strong gluing flavor that makes them ideally suited to scripting languages.

Tcl has two properties

Apr 012012

(If you’re a developer, you remember these classic articles about Java problems as well as I do. It’s worth looking back on this stuff, if only for nostalgia’s sake)

Oh so classic.

Java and Javascript continue to be thorns in the sides of Netscape Communications Corp. and Microsoft Corp., which are still plagued by potentially hazardous security loopholes in their respective Web clients.

While the overall impact of these bugs is minor, negative public perception is discouraging businesses and users from truly believing that the Internet is safe.

Last week, Netscape posted Communicator 4.03 to its Web site, fixing a JavaScript bug that would have enabled Web sites to snoop and snatch user information, such as passwords, during a visit.

Later this month, Microsoft