An interesting step by step toturial for getting a location with CellID. [here]
L | Ma | Me | J | V | S | D |
---|---|---|---|---|---|---|
« sept | ||||||
1 | ||||||
2 | 3 | 4 | 5 | 6 | 7 | 8 |
9 | 10 | 11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 | 21 | 22 |
23 | 24 | 25 | 26 | 27 | 28 | 29 |
30 |
An interesting step by step toturial for getting a location with CellID. [here]
Adeneo released its Windows CE 6.0 BSP (board support package) for an ARM9 SoC (system-on-chip) introduced earlier this year by NXP. The « LPC3250 BSP » supports not only the LPC3250, but also an associated processor module and carrier board from Phytec. more>>
see MSDN
C’est un problème qui vient de la MAJ de VS2005 SP1, il suffit d’ajouter « libcmt.lib » ou d’enlever /NODEFAULTLIB.
Click here
Speed issues:
The read/write speed is dictated by the microcontroller speed on the SD card itself. Here is a good explanation of SD Cards
Can’t be stated for sure. With cheaper card, FAT16; with some high-end ones,
FAT32. Read http://pocketpcmag.com/forum/topic.asp?TOPIC_ID=17921 , it
explains everything.
Esentially the fewer clusters of the card, the faster it will read and write.
Fat16 vs. Fat32 performance tests http://www.geocities.com/SiliconValley/Peaks/9892/fat16vs.htm
Beijing Peace East Technology Development Co., Ltd. is touting that they have the first “real” UMPC named H10 which runs WCE.
H10 Specifications
* CPU: Intel PXA270C520,OS: Windows CE 5.0,
* Outdoor 6.5″ high luminance & contrast touch-sensitive TFT screen.
It can display clearly even in strong sun-light
* Built-in High Sensitivity GPS system;
* Water-proof and dustproof outer design
* Super capacity battery makes it possible to work outdoor for 8 hours(4000mAh, 5-volt rechargeable lithium battery);
* Supports blue-tooth, SD socket, USB
* 8.1 x 4.7 x 0.75 inches (205 x 120 x 19mm), and weighs 17.6 ounces (500 grams).
* Hardware buttons include power and volume, along with a 5-direction navigation pad and five shortcut keys.
* support network interfaces — such as cellular data cards and WiFi — through built-in PCMCIA and SD card slots.
* onboard AC97 audio, with a built-in speaker and stereo I/O.
* 64MB of NOR flash, and 128MB of SDRAM.
* 20GB hard drive
[Source: PC Magazine]
Microsoft’s new handheld OS eschews big UI changes for many smaller feature improvements.
I’ve talked about this before but I want to really highlight it because I still see people wrestling with it.
In Windows CE 5.0 and earlier, « kernel mode » is an access level attached to a thread. If a thread is « in kernel mode » it can access kernel address space. You could call SetKMode to put your thread into or out of kernel mode, whenever you wanted (it required trust, of course). Most system APIs were not implemented by the kernel (nk.exe), so calling an API didn’t put your thread into kernel mode. Unless you called an API that was implemented by nk.exe, in which case your thread would temporarily enter kernel mode for the duration of the call.
In Windows CE 6.0 the implementation is actually the same, except that the SetKMode API is no longer supported. You can’t put threads into or out of kernel mode at a time of your choice. However, most system APIs are implemented by modules that are now loaded into the kernel process, so calling an API usually puts your thread into kernel mode.
While the implementation is the same, the result is effectively different meanings. In CE 5.0, « kernel mode » was a property a thread could acquire or release on demand. In CE 6.0, the rule is fairly simple: your thread is in kernel mode while executing code inside the kernel process, and not in kernel mode when executing code inside a user process. We use the term loosely, like talking about « kernel mode drivers, » « kernel mode code » and « kernel mode addresses. » Whenever people use these phrases they’re trying to talk about code and addresses that are only accessible to the kernel process, that are at addresses above 0×80000000. (Side note, you also have to be clear about whether you’re talking about everything inside the kernel process vs. only the kernel module, kernel.dll.)
The one remaining gotcha in the CE 6.0 rule is callbacks. If a user application passes a function pointer to kernel mode code, and the kernel mode code calls the function pointer directly, then the thread is STILL in kernel mode (remember it is still a property of the thread, just not so obviously) while executing user mode code. And that is very bad for security. Because the user mode code could do anything; it could access kernel addresses or call kernel-only APIs. If you write a driver that takes a function pointer from the caller and later calls it, make sure your driver only does so by using the new CEDDK function, CeDriverPerformCallback. That way your thread jumps back to the user process properly before calling the function, so that the function call can’t do anything that the user process itself couldn’t do already. Or even better — find a different way to implement what you’re doing. Ask yourself this: if an attacker passed me an evil function pointer, could they get me to do something bad on their behalf? If you don’t know the answer, don’t take function pointers from your callers.
You might wonder about function pointers and memory marshalling. « Marshalling » only applies to passing data buffers between processes — not to passing function pointers between processes. You can’t »marshal » a function so that you can safely call it from kernel code. The CeDriverPerformCallback function is the only way to shed the privileges that a kernel mode driver has, for the duration of the call. I suppose you could consider that a form of « marshalling » but I don’t.
UPDATE Jan 31, 2007: Andrew Tuck, one of our support engineers, pointed out another detail that can lead to confusion. (Thanks, Andrew!) Often (at least in Windows environments, if not all OS’), the most privileged processor mode is referred to as « kernel mode. » This usage of the term refers to when the CPU is operating with additional privileges, such as the ability to call special instructions that aren’t normally legal. For example interrupt handling often happens in this CPU « kernel mode. » This terminology is unrelated to the « kernel mode » concept I’ve been talking about in this article. When a Windows CE thread is in « kernel mode » it is not running in the most privileged processor mode. Only very restricted parts of the CE kernel and OAL run in that mode. The Windows CE « kernel mode » thread property controls whether the page tables for kernel address space are mapped, and some other things. (For example, in CE 5.0 it controlled whether the thread could make fast-path API calls, like I described in the API call post I wrote a while back.)