Software in the loop on the controls

Okay - the really poor thread title it is true that it is difficult to encapsulate the problem in these few words.

I have a big old complicated control front - bays of clusters that themselves include tables, etc. When the user clicks a control, I want to take a decision in the software how to answer and then update the control accordingly. I can do this with events but it is messy - controls blink before the software gets a chance to be updated, so for example, if the user clicks on an empty space of painting, the table will expand to a fraction of a second before I resize it to the old size.

Is there a way to get around this?

You can always keep track of the previous values in a shift register/feedback node to find out what the modified values.  Or you can use the mouse coordinates to determine what elements of array, the mouse is on.  There are some examples on how to do it on the site of NOR.  Here is one of them, but I think that somewhere there is a clean version.

Tags: NI Software

Similar Questions

  • I'm a software tester for an internal application to my company. version 10.0.2 is not cmopatible with a few controls within our software. I need the download v9.0.1 whatever works with the controls. Where can I get?

    I'm a software tester for an internal application to my company. version 10.0.2 is not cmopatible with a few controls within our software. I need the download v9.0.1 whatever works with the controls. Where can I get?

    Well, if you need older versions of firefox you can find them on this site:
    - http://www.oldapps.com/firefox.php

    Best regards, G-Cloud.

  • Options available to support the control of software

    As part of our PaaS - Self Service effort, there is a desire to give developers the opportunity to provide their own TCservers, WebLogic servers, MSSql and Oracle databases.  The first 3 are under control to a certain extent, but the part of the Oracle is one that could be a problem.  In Vmware, we have the possibility to limit the number of instances of software being filled in the operating system.  Try to be in accordance with on Oracle software licenses can be a bit more of a problem.  What are the options available to support the control software and what is industry to stay in compliance?

    The answer will vary a bit depending on your deployment model... How you deliver Oracle? Is pre-constructed and it's just an IaaS model that gets a VM cloned from? If so, you could it meter in the action plan... Otherwise, your best bet would be (probably) to look at adding a workflow approval when Oracle will have to determine who is responsible for these assets if it allows the Oracle VM to be supplied. Also, in the concept, if you use a property management system, you could engage any metering capabilities built via this API to determine if Oracle is under any terms of use.

  • I need power find/use Java and the control panel Java to use some software open source.

    There is no way to get to the Java Control Panel.  Where is it, and why you did so difficult to use computers?

    If you have not downloaded java, you will need to download, install it. It can only be downloaded, installed and run desktop t5he - not from the beginning.  Then you should find it in the control panel.  Hope this helps and if you need another post to help and we will be happy to help you.

    The above opinion is mine and mine nothing and does not necessarily reflect that of Microsoft, it is

    employees, or any other Member of this forum.

    "When we try to take anything by itself, we find it hitched to everything else in the universe." -John Muir

  • Satellite P100-160 BT icon appears in the Control Panel, but no BT

    Hello

    I have a Satellite P100-160. I am very confused as to whether I have BT or not.

    * Reasons I thought that I had BT: *.
    I thought originally I had, because in 'Control Panel', it has a Bluetooth icon, which when I press on it opens the "Bluetooth devices". I also use WiFi I thought a sign that BT has been installed and working. I also notice that in Services' there is that something called 'Toshiba Bluetooth Service' running.

    * Reasons I think that now I don't have BT: *.
    However, when I press Control Panel > Bluetooth devices > Bluetooth settings, nothing happens. It's as if the button is dead. And when I try to 'Add a BT device', he finds not all devices. In addition, there is no BT listed in Device Manager.

    .....

    Overall, I am very confused! I bought yesterday wireless speakers after seeing the BT icon in Control Panel (I had read that if this icon was there, I got BT), but having struggled for hours trying to get BT to work yesterday, I came to the conclusion that I don't have BT at all!

    Could someone explain what it means the Bluetooth icon in the control panel? Why is there if I don't have BT? Or, the icon means I have BT but am doing something wrong?

    Thanks in advance! Very frustrated!

    David.

    > Satellite P100-160. I am very confused as to whether I have BT or not

    Satellite P100-160 was NOT equipped with Bluetooth module.
    But maybe the battery BT software has been installed and is why the BT icon is visible in the control panel.

  • How to: open the control panel and check if Windows Update settings in Windows 8

    If you're running Windows 8 and you are not sure if you get the latest updates and patches Windows updates then the following video should help. It guides you through opening the control panel and how to check your Windows Update settings.

    Remember, make sure that Windows 8 is up-to-date on your computer, you must have the latest updates of Windows installed.

    You may also need to make sure that your computer is updated the software and drivers for your hardware or to trobleshooting purposes make sure it isn't updated drivers for your hardware. Here is a video that will show you how.

    I hope everyone finds these helpful videos. If you have any questions leave a message below. Remember, it is advisable to have the active Windows updates, however, there are certain circumstances (for example, troubleshooting) disable it temporarily is a good idea.

  • Is a necessary additional security, such as McAfee software on the new iMac and iPad?

    Is a necessary additional security, such as McAfee software on the new iMac and iPad?

    Mac users often ask if they should install "anti-virus" (AV) or software "anti-malware". The answer is 'no', but it can give the false impression that there is no threat of what is loosely called 'virus '. There is a threat.

    1. it is a comment on what you should - and should not-do to protect you from malicious software ("malware") that runs on the Internet and gets onto a computer as an unintended consequence of the user's actions.

    It does not apply to the software, such as keyloggers, which can be installed deliberately by an intruder who has convenient access to the computer, or who has been able to take control of it remotely. This threat is in a different category, and there is no easy way to defend against it. AV software is not intended to and does not, to defend against these attacks.

    The comment is long because the issue is complex. The essential points are in articles 5 and 11.

    OS X implements now three levels of integrated protection specifically against malware, not to mention the protections of runtime such as quarantine the file, execute disable, sandbox, protecting the integrity of system, System Library randomization and randomized address space layout , which can also prevent other kinds of exploits.

    2. all versions of Mac OS X 10.6.7 were able to detect the malware Mac known in downloaded files and block non-secure web plugins. This feature is transparent to the user. Apple calls internally it "XProtect."

    The malware used by XProtect recognition database is automatically updated. However, you should not count on it, because the attackers are still at least a day before the defenders.

    The following restrictions apply to XProtect:

    ☞ circumvented by some third-party network software, such as the BitTorrent clients and Java applets.

    ☞ It applies only to software downloaded on the network. Software installed from a CD or other media is not verified.

    As new versions of Mac OS X are available, it is not clear whether Apple will continue indefinitely maintain the older versions such as 10.6 XProtect database. Versions of obsolete systems security may eventually be affected. Updates to security for the code of obsolete systems will be stop being released at any given time, and which can leave them open to other types of attack in addition to malware.

    3. starting with the OS X 10.7.5, there was a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and installation packages downloaded from the network will be run only if they are digitally signed by a developer to a certificate issued by Apple. Certified software in this way has not been checked for safety by Apple, unless it comes to the App Store, but you can be reasonably sure that it has not been changed by someone other than the developer. His identity is known to Apple, so it could be held legally responsible if it distributes malicious software. Which may not mean much if the developer lives in a country with a weak legal system (see below).

    Access controller does not depend on a database of known malware. He has, however, the same limitations as XProtect and in addition the following:

    ☞ It can easily be turned off or overridden by the user.

    ☞ A malware attacker could find a way around it, or could take control of a certificate of signing of code under false pretenses or could simply ignore the consequences of the distribution of malware Tryggvason.

    ☞ Developer App store could find a way around the Apple control, or the control may fail due to human error.

    Apple took too long to revoke some known attackers codesigning certificates, thus diluting the value of the keeper and the program developer ID. These variances do not involve the App Store products, however.

    For the reasons given, App Store, and, to a lesser extent - other applications recognized by signed Gatekeeper, are safer than others, but they cannot be considered to be absolutely sure. "Sand" applications could make to access to private data, such as your contacts, or for access to the network. Think that before granting access. Security sandbox is based on user input. Never click through any application for leave without thinking.

    4. by starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background. He checks and removes, malware that corresponds to a database of recognition held by Apple. To ensure that MRT will be executed when the database is updated, the App Store tab in system preferences and check the box marked

    Install the system data files and security updates

    If it is not already done.

    As XProtect, MRT is effective against known threats, but not against strangers. It alerts you if it detects malware, but otherwise, it has no user interface.

    5. the built-in Mac OS x security features reduce the risk of malware attack, but they are not and will never be complete protection. Malware is a problem of human behavior, not a behavior machine, and none only of technological solution will solve. Software protect you from trust only will make you more vulnerable.

    The best defense is always going to be your own intelligence. Except perhaps feats of Java, all the known malware, circulating on the Internet wearing reached a completely setting installation to update to OS X 10.6 or later takes the form of so-called "Trojans", which may have no effect if the victim is deceived in their execution. The threat thus amounts to a battle of wits between you and cybercriminals. If you are better informed, they think you are, you win. In effect, it means that you always stay in the shelter of practical computing. How do you know when you leave the safe harbor? Here are a few signs warning of danger.

    Software from a reliable source

    ☞ Software with a brand, such as Adobe Flash Player, does not come directly from the Web site. Don't be fooled an alert of any website for updating Flash, or your browser, or other software. A real alert that Flash is outdated and blocked is shown on this support page. In this case, follow the instructions on the support page. Furthermore, assume that the alert is false and that someone is trying to rip you off to install malicious software. If you see these alerts on more than one Web site, ask for instructions.

    ☞ Software any is distributed via BitTorrent or Usenet, or on a Web site that distributes pirated music and movies.

    ☞ Rogue sites Web such as CNET Download MacUpdate, Soft32, Softonic and SourceForge distribute free applications that have been packaged in a superfluous "install".

    ☞ The software is advertised through spam or intrusive web ads. Any announcement, on any site, which includes a direct link to a download should be ignored.

    Software that is clearly illegal or doing something illegal

    Commercial software ☞ high-end such as Photoshop is "cracked" or "free."

    ☞ An application helps you violates copyright law, for example to circumvent the copy protection on a commercial software, or streamed media recording to be reused without permission. All the 'YouTube downloaders' are in this category, but not all are necessarily malicious.

    Conditional or unsolicited offer from strangers

    ☞ A phone calling or a web page you indicates that you have a "virus" and offers to remove. (Some reputable sites warned visitors who have been infected with the malware "DNSChanger" legitimately. The exception to this rule applies.)

    ☞ A web site offers a free content like music or video, but for use, you must install a "codec", 'plug-in', 'player' 'Downloader', 'extractor', or 'certificate' which comes from the same site, or a stranger.

    ☞ You win a prize in a competition that you are never entered.

    ☞ someone on a forum like this is eager to help you, but only if you download an application of your choice.

    ☞ a 'FREE WI - FI!' network presents itself in a public place like an airport, but is not provided by management.

    ☞ Online everything that you expect to pay is 'free '.

    Unexpected events

    ☞ a file is downloaded automatically when you visit a web page, without any further action on your part. delete any file without opening it.

    ☞ You open what you think, it is a document and you receive an alert that it is "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you must always remove any download that is not what you expected it to be.

    ☞ An application does something you don't expect, such as permission to access your contacts, your location or the Internet without obvious reason.

    ☞ Software is attached to the email you na not ask, even if it is (or seems to come) by a person of trust.

    I do not leave the safe harbour that once will necessarily lead to disasters, but make a habit of it will weaken your defenses against malicious software attacks. None of the above scenarios must, at the very least, make you uncomfortable.

    6. Java on the Web (not to be confused with JavaScript, to which it is not related, despite the similarity of names) is a weak point in the security of any system. Java is, among other things, a platform to run complex applications in a web page. That was always a bad idea, and Java developers have proved unable to apply it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been a type virus Windows affecting OS X. simply load a page with Java malicious content could be harmful.

    Fortunately, client-side Java on the Web is outdated and largely disappeared. Only a few outdated sites still use it. Try to accelerate the process of extinction by avoiding these sites, if you have a choice. Forget to play games or other uses not Java essentials.

    Java is not included in OS X 10.7 and later versions. Discrete Java installers are distributed by Apple and Oracle (the developer of Java). Do not use one unless you need it. Most of the people don't. If Java is installed, turn it off- not the JavaScript in your browser.

    Whatever the version, experience has shown that Java on the Web is not reliable. If you must use a Java applet for a job on a specific site, Enable Java only for the site in Safari. Never activate Java for a public Web site that carries the third-party advertising. Use only on websites that are well known, protected by login and secure without ads. In Safari 6 or later, you will see a padlock icon in the address bar when you visit a secure site.

    7. another perennial weak point is Adobe Flash Player. Like Java, Flash is declining well deserved, but content Flash is still much more widespread than the contents of Java on the Web. If you choose to install the Flash plugin, you can reduce your exposure to Flash by checking the box marked

    Stop the plug-ins to save energy

    in the Advanced tab of the preferences of Safari window, if not already done. Consider also installing an extension Safari as "ClickToFlash" or "ClickToPlugin." They will prevent the Flash content automatically load and are initially not Flash video is substituted for Flash on YouTube and perhaps a few other sites. I tested the extensions and found them safe, but you should always do your own research before you decide whether to trust any third party software.

    8. remain within the sphere of security, and you will be as safe from malware you can be practically. The rest of this comment is what you must do to protect you.

    Never install any AV or products 'Internet security' for Mac if you have a choice, because they are all worse than useless. If you are required by a (wrong) institutional policy to install some kind of AV, choose one of the free apps in the Mac App Store, nothing else.

    Why you should not use products AV?

    ☞ To recognize malware, software depends on a database of known threats, which is always at least one day to day. This technique is a proven failure, as a major supplier of AV software has admitted. Most of the attacks are "zero-day" - that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry comes to realize that the traditional AV software is worthless.

    ☞ design is based generally on the nonexistent threat that malware can be injected at any time, anywhere in the file system. Malware is downloaded from the network; He is not of the blue leaves. To meet this threat does not exist, a commercial AV software changes or low level functions of the operating system, which is a waste of resources and a frequent cause of instability, bugs, poor performance, and duplicates.

    ☞ changing the operating system, the software can also create weaknessesthat could be exploited by malicious attackers.

    ☞ especially, a false sense of security is dangerous. This fact relates to all AV software it will never be any changes elsewhere.

    9. a free AV product from the Mac App Store is safe as long as you don't let it delete or move files. Ignore all the warnings that it can give you on "heuristic" or "phishing." These warnings, if they are not simply false positives, see the text of e-mail messages or updates cached web pages, not malware.

    An AV application is not necessary and may not be invoked for protection against malware for OS X. It is useful, or even not at all, only to detect malware Windows and even for this use it is not really effective, because the new Windows malware makes its appearance much faster than OS X malware.

    Windows malware cannot hurt you directly (unless, of course, you use Windows). Just do not pass to someone else. A malicious link in the e-mail is usually easy to recognize by the name alone. A concrete example:

         London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe

    You don't need software to tell you it's a horse Trojan for Windows. Software may be able to tell what trojan is, but who cares? In practice, there is no reason to use a recognition software, unless an organizational strategy requires. Malware Windows is so widespread that you must assume that it is in each attachment until proof to the contrary. Nevertheless, a free AV product on the App Store can serve a purpose if it fulfills a misinformed network administrator that says you must have some sort of application AV. An App Store product will not change the operating system; in fact, it does nothing, unless you run it.

    If you are just curious to know if a file is considered malware by the AV engines, you can download it from the "VirusTotal" site, where it will be tested against most of them without charge. A negative result is evidence of what whether, for the reasons given above. I do not recommend doing this with a file that may contain private information.

    10. There seems to be a common belief that the firewall Application acts as a barrier to infection, or prevents operation of malware. He does not. It blocks incoming connections to some network services you are using, such as file sharing. It is disabled by default, and you should leave it like that if you're behind a router on a private home or office network. Activate only when you are on an untrusted network, for example a public Wi - Fi hotspot, where you do not want to provide services. Disable services that you don't use in the sharing preferences window. All are disabled by default.

    11. as a Mac user, you don't have to live in fear that your computer may be infected whenever you install the software, read emails, or visit a web page. But nor can you assume that you will always be free from exploitation, no matter what you do. Internet browsing, it's like walking the streets of a big city. It can be as safe or as dangerous that you choose to do so. The greatest harm done by software AV is precisely its selling point: it makes people feel safe. They can then feel sufficiently safe to take risks, which the software does not protect them. Nothing can reduce the need for safe computing practices.

  • Before the controls Panel reset each VI run.

    Hello

    I have a test unit, MISTLETOE is designed in Labview; Measures pressure and writing for a Word report are required. I currently have a problem regarding the behavior of VI when I run. It is explained below:

    All my settings front and controls which give before you run the vi reset empty Windows when I run the VI.

    Also, I first thought that, ok, same if control values disappear, as long as they written in the report, it is very good. But, it happens that easily. When I have the controls on the front panel before you run the VI of power and then run the VI, I must stop the VI and run it again for them to print the report.

    The model is like this:

    1. go the front panel control values.

    2. to run the VI ===> Panel control values before disappearing.

    3. perform the test, stop the VI and print the ===> no control value to print.

    4 restart the VI without going all control values.

    5. run the VI ==> controls front are empty (of course, because no values have been entered).

    6. perform the test, stop the VI and print the report ===> initially entered control values to print.

    So, essentially, before control values not only disappear when the VI is executed, but there are also two that works for the values to enter in the memory and to print the report.

    The goal is to punch in the values of control-> Run the VI-> > print the report and the report is complete with all the values in that control.

    Now a bit about the VI:

    Control values, that I don't speak are simple string as the name of the company controls, operator name and al.

    The block diagram composed of (LEFT to RIGHT):

    Consumer & producer loops--> Type in front of panel controls--> print the report.

    In other words, loops of producer/consumer of output data in the toolkit of generation report. But the Front panel to be fed contols lie between producer/consumer loops and report printing function. (No express used screws)

    So, how can I get rid of my front panel endangered control values. I want to display when the VI is running.

    Please advice.

    Thanks in advance,

    RP.


  • initialize the control table dimension

    I use LV 2009 SP1 and you want to create a table 1 d of size control fixed.  The elements of the array are a defined group of different controls (enum and boolean) data type.  Control table will reside on a front panel and will be initialized with the values via the software, but the user will have access to change the values of array element (for example, change the enum and boolean controls.  While the user has access to edit the elements of the array, I don't want the user to be able to add new items in the table.  The table must have a vertical scroll bar, given that the number of elements at initialization of the array can be great and also can vary.  I am familiar with the property of the table "Number of lines", but it only controls the number of visible rows in the table.

    Is there a way to set the number of items per program and still have a scroll for the user to index bar using the table, but not add new items?

    Also see the attached screenshot for reference.

    Thank you

    Dan

    I found an acceptable solution through the reading of other forum posts.

    For others, who may find this useful:

    By hiding the display of array index and all the scroll bars, the table can be fixed to the size.  A separate scrollbar is used for the index in the table by writing to the array of Index values property.  The min/max scroll bar may be limited by writing to the Min Doc, Doc Max properties.  I've attached a screenshot of the block diagram.  The value of constant labeled '# lines visible-1' is on the number of items pulled on the panle front less 1 and remains in control of the table of displayiong of the empty elements that allow the user to change.  Also, even if the Page Size property has a value of zero for the scorllbar, which should allow scrolling of the Min Doc to Doc Max, he does not accept it as a valid value and is instead converted to a value of 1.  I introduced a SR on it's a bug because the LV help suggests that the values zero or negative must be acceptable to the Size property of the Page.

    I think it's the solution to the question, although it would be preferable that the size of the table control could be fixed size affecting a property element.  I'll see about adding this title of suggestion.

    Dan

  • Use the control of timing DAQmx as input in case statement

    Hello

    I'm building a VI aquire sampled under tension of a sensor in continuous mode or finished.  I was going to do this, use a box with a cable of the sample mode of the VI DAQmx calendar entry to the terminal State, the idea being that I couldn't aeither a while looping the case for continuous or simple acquisition according to the setting of this command.

    However, instead of the sample mode provided for in the case of the case statement, I just get 1 and 0.

    It's a good way to achieve this, and if so how can I get my case structure working properly?

    Thank you

    Dave

    Hi Dave,.

    Apologies - I consider that the error is from the data acquisition function? I forgot that she was using the sample entry mode.

    Perhaps, then, it will be preferable to continue using the control of the ring - cases will be numbered and will correspond to the numeric value of the selection of the ring (i.e. finite samples = 0). I have attached a small example if we know not.

    Moreover, the structure of the case cannot automatically fill for each case, in which case you can right click on the structure of the case-> add the case after.

    Best regards

  • Programmatically disable the controls on the front panel

    Hi all

    I have a case in which I need to activate the control of front panel during scanning or taking data and when this case is false / when not not taking data. I try to make the Subvi usng vi reference, the node property, making the label controls and disbaling it. I want to disable the control listed in the table during the real deal and allow them to return to the case of fake. But right now, it of not working and hangs my main program. Please see the vi attached and help find where I am doing wrong.

    Thank you

    The best way would be to create an array of references to the controls you want to mess with beforehand.  I say that because I'm guessing that you have several groups of controls you will be turn on/off at the same time.  If you have a table of these controls already created, then just run the table in a loop FOR and use the Disable property.  I made a few minor cleanups in your current VI.  I got rid of the outermost case structure since the two cases are essentially the same thing.  A selection function allows to choose to enable or disable.

    NOTE: the forums are screwing again and not let me post a VI.  Change the extension back to vi to open it in LabVIEW.

  • Automation software has the key. Enjoy your entries

    Hi all.

    I worked on a few simple Labview applications for my company that is a hydraulic aerospace components company.

    While I was doing some research for a new project, someone asked me why I was using Labview to automate when there are ready made software that other companies can customize for all applications that we need.

    He said he raised this point at a meeting a few years ago, but it never went anywhere.  This would save time and money, he said. The only one I found is microComander.

    ANYONE KNOW WHAT ELSE IS OUT THERE THAT IS THE HIGHEST LEVEL THAT LABVIEW?

    I like Labview, even if I'm not you're typical labview programmer because I was a programmer of text from windows application database, but since my background includes Navy hydraulic plane it is quite simple to understand the projects in my company.  I also worked as a genius M.a.n here for a few years. I have not really mechanical or electrical engineering.

    I want to assure you that we are doing the right thing, even if it means that I won't be able to work with what I like (LabView). Don't want to spend more time I have on each project, because we have a certain.

    I have your opinion on this subject.

    Thank you

    A quick google of microCommand seems to come with a library of general use for the control of the instrument. Buttons and other elements of decoration, it resembles microCommander is written using LabVIEW.

    I agree that you should not reinvent the wheel, you have to look at what is available and ask if it will meet your needs. To off the shelf libraries do not always meet your need because they have implemented what they believed was necessary. They didn't you available to the requirements of the project.

    Using LabVIEW, you have access to a complete programming language. You can still use out of the librabies of the plateau in LabVIEW. So, you can have the best of both worlds.

  • Send the name and the value of the control to Subvi

    Hi all

    I am trying to send the names and values of the controls to a Subvi.

    I know that I can check out the name and the value of the control by using a property node, but I was looking for a way to make is easy for the programmer to use.

    I think some sort of bundle function, it records the name and the value of the control, but I would like the programmer to be able to connect a random number

    controls to the Subvi without having to specify the number of controls Anywhere.

    I know there is stuff in labview configuration file, but it seems a bit more complex, so what I want to do.

    Also, I know that I can use the OpenG toolkit, but I will not use additional LabVIEW modules, as this VI may run on several different computers.

    I hope I made my problem clear enough!

    Good day

    Concerning

    Tommy

    What, creating an array of references to the command.  On the hand, you will need to fill the table with control references that you want to send to the Subvi.  In the Subvi, use a loop For with indexing to get every reference, and then use the nodes property to get the name and value.

  • Outsourcing of the controls on the front panel for a panel floating Subvi

    Hello!

    I already found a few similar topics, but I still don't know which is the best way to solve my problem. I will try to describe my problem in detail first: I have a main VI that acquires data from a device and displays these data in a large waveform graph. I have also a few controls on the front panel to control my device. First, I placed all of these device controls (digital, sliders, etc.) as well as the chart inside the front of my main VI. However, due to limited screen space now I would like to make the largest possible graph and so decided to "outsource" some controls out of the main façade of VI to several panels front-end Subvi.

    I would then press a button in my main VI and it would open the Panel before the floating of the Sub - VI corresponding with outsourced controls when required. However, everything must be absolutely transparent. It is important that floating panels to run in parallel with my main VI, that is the main VI must continue to operate. That way I'll have my data constantly updated in the chart in my main VI while I can change some settings of the device through the controls placed in my SubVIs. These changes will be immediately applied (for example as soon as the main VI calls this slot - VI in its main loop).

    It is important to the visibility of the outsourced optional control panel, i.e. If the Subvi front panel opens with the user that it will pop up and the user will be able to change the paramers device using the. But then the user should be able to close the front panel (hide) the Subvi to see the entire chart again without the Panel floating in front of her (of course control values must be maintained when the Subvi front is not visible). Then the new button is pressed in the main VI that opens the dialog box not modal Subvi containing controls and it can redefine new values of device.

    Advice how to do this are welcome. I don't know if I need something complex like VI server or asynchronous screws or I can solve my problem by changing some settings simple Subvi? Thank you in advance for your help!

    Best regards

    Anguel

    AStankov wrote:

    How about using a global variable for the VI at VI communication instead of a queue?

    A global variable will, also.  Write you in one place and read the value frequently to somewhere else (in the election). So you can see easily to any value change.  However, mark will waste a lot of time processor.  This is why I have proposed to use a queue or a notification utility.

    AStankov wrote:

    Would be the last option that you mentioned, i.e. finish the Subvi at each change of value, I would keep the Subvi front open as needed until things from the user to hide? Or would there be inevitable flickering Panel or any other drawbacks?

    Yes, the Subvi can keep the façade open until the user closes. And there should be no flickering.  The biggest drawback I see right now is that when you expect an event in the Subvi, the mainVI cannot stop without talking to the Subvi to stop.  So you'll need another channel of communication (again a global, a queue, a declarant or an event) to tell the Subvi that she must stop.

  • I want to uninstall real player. I went to the control panel to uninstall, but it was not listed.

    Original title: real player not on the list of programs but still doesn't work

    I want to uninstall real player. I went to the control panel to uninstall, but it was listed.  I can always download with real player. What's new? Why is not listed if I can get rid of him.

    Hello

    What operating system are you using on your computer?

    Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems can occur if you modify the registry incorrectly. Therefore, make sure that you proceed with caution. For added protection, back up the registry before you edit it. Then you can restore the registry if a problem occurs.

    a. click Startand then click run.

    (b) in the Open box, type regedt32, and then click OK.

    c. in the registry editor, find the following registry key:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall

    d. in the left pane, click the Uninstall registry key, and then click export on the file menu.

    e. in the export registry file dialog box that appears, click desktop in the list record in , type Uninstall in the file name box, and then click Save.

    f. each key listed under Uninstall in the left pane of Registry Editor represents a program that is displayed in the list of currently installed programs in the add tool / remove programs. To determine which program that represents each key, click the key and discovers the following values in the details on the right pane:

    Full name: the Display Name key value data the name listed in Add / Remove programs.

    - and -

    UninstallString: The value of the UninstallString key data the program used to uninstall the program.

    g. After you identify the registry key that represents the program that you removed but which is still displayed in the currently installed programs list of add or remove programs, right-click the key in the left of the registry editor window pane and then click Remove.

    Click Yes in response to the message "are you sure you want to delete this key and all of its subkeys?

    h. on the file menu, click Exit to quit the registry editor.

    i. click Start, click Control Paneland then click on Add / Remove Programs.

    In the currently installed programs list, verify that the program whose registry key you deleted is no longer listed.

    j. do one of the following:

    o If the program list is not correct in Add / Remove Programs, double-click the file Uninstall.reg that you saved on your desktop in step 5 to restore the original list of programs in the registry.

    -or-

    o If the program list is correct in Add / Remove Programs, right-click the Uninstall.reg file on your desktop and then click Remove.

    For more information, you can check the link below:

    http://support.Microsoft.com/kb/314481

Maybe you are looking for