Byte fehler jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 byte fehler jobs found, pricing in NZD

    ...can do the ipad side of project by myself. My expectations: 1. Support Major Commands as in the E-ink Datasheet only (each command is wrapped via a single function API) 2. Communication Commands to support for TCM: #ResetDataPointer #Upload Image Data #DisplayUpdate #GetDeviceInfo #GetDeviceId #GetSystemInfo #GetSystemVersionCode #ReadSensorData And for the Bluetooth part, basic byte by byte transmission and receiving. #sentByte() #ReciveByte() At the end I want to scale this project so it can work with ipad (ios device) I will try to write an app that get a screenshot of ipad's screen and transmit it through the Bluetooth low energy (BLE 4) to the STM32 side. Therefore the code should be scalable to this main objective. Please tell me how lon...

    $699 (Avg Bid)
    $699 Avg Bid
    4 bids

    I want to install voipswitch, PRONTO Dialers, itel switch & byte saver on my server on my own server.

    $246 (Avg Bid)
    $246 Avg Bid
    1 bids

    Hello, I need some small adjustments to my zen cart website (Version 1.5.0) and I need the website to be faster (time to first byte is slow). Please see detailed information in the attachment. Basically, you would need to change the already existing template and php-files. Also, there would be minor modifications on the database. Thanks.

    $458 (Avg Bid)
    $458 Avg Bid
    11 bids

    Hi, I need async client class connects to proxy server and receives responses to my application. Just byte data will be transferred and received. So simple class i need immediatly. Regards,

    $182 (Avg Bid)
    $182 Avg Bid
    15 bids

    Find the AOB (Array of byte) of online game (This is not illegal) Download and setup game online client and I will tell you about that after you play in half hour I want to know array of byte about some thing in game play and change it to new value

    $331 (Avg Bid)
    $331 Avg Bid
    2 bids

    NOTE: I have already done the first problem! Just need number 2. 1. Write a function called linear. It is given three numbers (m, a, and k) and uses them in the formula (m * a + k) mod 256. Don’t forget to include the purpose and tests. 2. Finally, write a function called linearcipher that is given three values: a byte string to encrypt and the linear coefficients m and k. It returns the encrypted byte string. Use the linear function you wrote in the previous problem. Try it with values of m=11, k=83. Include the purpose and test cases.

    $16 - $49
    $16 - $49
    0 bids

    Improve the performance (loading speed) of my wordpress based online store: Requirements: using as monitoring tool, all indicators should be green, either for or justcoffee.ie. (first byte time, keep-alive enabled, compress transfer, compress images, progressive JPEGs, cache static content) Payment only, when requirements are reached!

    $278 (Avg Bid)
    $278 Avg Bid
    35 bids

    Meine Thesis lesen und Fehler korrigieren. Möglicherweise auch das Layout. Es wäre am besten, wenn Sie mich kontaktieren könnten und wir einen pauschalen Betrag abmachen könnten. Schreiben Sie bitte an e-bassan at - MfG

    $496 (Avg Bid)
    $496 Avg Bid
    1 bids

    ...seconds, UTC time "178.48" stand for direction "00000000" first byte: main power, “0” stand for external power supply. “1” stand for battery supply. Second byte s:ACC state, “0” stand for ACC off, “1” stand for ACC on. Third byte: inlucde 4 status, Hex from 0 to F, BIN from 0000 to 1111, first bit ---1 oil supply, , 0 oil cut off second bit--1 power supply, 0 power power cut off third bit -- 1 SOS alert , 0 no SOS alert Forth bit -- state of orignial car alarmer , 1 high level, 0 low level, forth byte :inlucde 4 status, Hex from 0 to F, BIN from 0000 to 1111, first bit --- customer cable state , 1 high level , 0 low level fifth byte: no ...

    $221 (Avg Bid)
    $221 Avg Bid
    5 bids

    Project is to make three functions - sending a SOAP message including username and password message to a URL, and return the ...Salt, Username, Password ) { // ajax call to PHP // receive and return the Reply } Function 3: //---------- PHP ajax ----------------- // Append the password salt to the password in clear text. // Use SHA-256 to obtain the hash from the string previously obtained. // Execute bitwise AND with 0xFF to each of the bytes from the hash, convert each byte to HEX and append it to the string in the previous step. Each byte smaller than 16, a leading zero i appended in the front. ( 6 become 06). // Send username and encrypted password to the URL // Received the XML // Extract the message // Return the message. ( There is a demo...

    PHP
    $49 (Avg Bid)
    $49 Avg Bid
    1 bids

    1. Are there WSN scenarios in which the RTS/CTS mechanisms are not needed? 2. If transmitter sends a 20-byte-long preamble on a 10kbps channel, how frequently does a receiver need to sample the medium to ensure that it can wake-up to receive the packet? 3. A sender wants to transmit a message to a receiver using WiseMAC . Therefore it emits a preamble prior to the estimated wake-up time of the receiver and then adds the message. Assume that a sender using WiseMAC knows when the receiver will wake up. What is the preamble good for in such WiseMAC 4. Consider a network of 5 nodes located at following coordinate points: A(0,0), B(0,1), C(1,0), D(1,1) and E(5,0). Assume the transmission power necessary to reach a node at distance d is a+b*d2(a and b are constants). What ...

    $82 (Avg Bid)
    $82 Avg Bid
    1 bids

    1. Are there WSN scenarios in which the RTS/CTS mechanisms are not needed? 2. If transmitter sends a 20-byte-long preamble on a 10kbps channel, how frequently does a receiver need to sample the medium to ensure that it can wake-up to receive the packet? 3. A sender wants to transmit a message to a receiver using WiseMAC . Therefore it emits a preamble prior to the estimated wake-up time of the receiver and then adds the message. Assume that a sender using WiseMAC knows when the receiver will wake up. What is the preamble good for in such WiseMAC 4. Consider a network of 5 nodes located at following coordinate points: A(0,0), B(0,1), C(1,0), D(1,1) and E(5,0). Assume the transmission power necessary to reach a node at distance d is a+b*d2(a and b are constants). What ...

    $49 - $409
    $49 - $409
    0 bids

    1. Are there WSN scenarios in which the RTS/CTS mechanisms are not needed? 2. If transmitter sends a 20-byte-long preamble on a 10kbps channel, how frequently does a receiver need to sample the medium to ensure that it can wake-up to receive the packet? 3. A sender wants to transmit a message to a receiver using WiseMAC . Therefore it emits a preamble prior to the estimated wake-up time of the receiver and then adds the message. Assume that a sender using WiseMAC knows when the receiver will wake up. What is the preamble good for in such WiseMAC 4. Consider a network of 5 nodes located at following coordinate points: A(0,0), B(0,1), C(1,0), D(1,1) and E(5,0). Assume the transmission power necessary to reach a node at distance d is a+b*d2(a and b are constants). What ...

    $49 - $409
    $49 - $409
    0 bids

    1. Are there WSN scenarios in which the RTS/CTS mechanisms are not needed? 2. If transmitter sends a 20-byte-long preamble on a 10kbps channel, how frequently does a receiver need to sample the medium to ensure that it can wake-up to receive the packet? 3. A sender wants to transmit a message to a receiver using WiseMAC . Therefore it emits a preamble prior to the estimated wake-up time of the receiver and then adds the message. Assume that a sender using WiseMAC knows when the receiver will wake up. What is the preamble good for in such WiseMAC 4. Consider a network of 5 nodes located at following coordinate points: A(0,0), B(0,1), C(1,0), D(1,1) and E(5,0). Assume the transmission power necessary to reach a node at distance d is a+b*d2(a and b are constants). What ...

    $49 - $409
    $49 - $409
    0 bids

    Need to answer the following Quesion ( time frame: 6 hours) 1. Are there WSN scenarios in which the RTS/CTS mechanisms are not needed? 2. If transmitter sends a 20-byte-long preamble on a 10kbps channel, how frequently does a receiver need to sample the medium to ensure that it can wake-up to receive the packet? 3. A sender wants to transmit a message to a receiver using WiseMAC . Therefore it emits a preamble prior to the estimated wake-up time of the receiver and then adds the message. Assume that a sender using WiseMAC knows when the receiver will wake up. What is the preamble good for in such WiseMAC? 4. Consider a network of 5 nodes located at following coordinate points: A(0,0), B(0,1), C(1,0), D(1,1) and E(5,0). Assume the transmission power necessary to reach a n...

    $16 - $49
    $16 - $49
    0 bids

    Need to answer the following Quesion ( time frame: 6 hours) 1. Are there WSN scenarios in which the RTS/CTS mechanisms are not needed? 2. If transmitter sends a 20-byte-long preamble on a 10kbps channel, how frequently does a receiver need to sample the medium to ensure that it can wake-up to receive the packet? 3. A sender wants to transmit a message to a receiver using WiseMAC . Therefore it emits a preamble prior to the estimated wake-up time of the receiver and then adds the message. Assume that a sender using WiseMAC knows when the receiver will wake up. What is the preamble good for in such WiseMAC? 4. Consider a network of 5 nodes located at following coordinate points: A(0,0), B(0,1), C(1,0), D(1,1) and E(5,0). Assume the transmission power necessary to reach a n...

    $16 - $49
    $16 - $49
    0 bids

    Need to answer the following Quesion ( time frame: 6 hours) 1. Are there WSN scenarios in which the RTS/CTS mechanisms are not needed? 2. If transmitter sends a 20-byte-long preamble on a 10kbps channel, how frequently does a receiver need to sample the medium to ensure that it can wake-up to receive the packet? 3. A sender wants to transmit a message to a receiver using WiseMAC . Therefore it emits a preamble prior to the estimated wake-up time of the receiver and then adds the message. Assume that a sender using WiseMAC knows when the receiver will wake up. What is the preamble good for in such WiseMAC? 4. Consider a network of 5 nodes located at following coordinate points: A(0,0), B(0,1), C(1,0), D(1,1) and E(5,0). Assume the transmission power necessary to reach a n...

    $16 - $49
    $16 - $49
    0 bids

    ...Aplicants must have strong knowledge of C++, C#, Delphi, Windows API, and of-course Cryptography. built in hwid authentication No Dependencies! The Crypter MUST have the following Features: 1. Multi-File Crypter 2. Multi-File Binder 3. Multi-File Compressor 4. Delay File Execution 5. Icon Changer 6. Process Persistence 7. Version Info Change 8. Custom Fake Messages 9. Custom Fake Byte Adder/File Pumper 10. Extension Spoofer: from .exe to .pdf, .jpg, word, etc. 11. File Start-up 12. File Melt 13. EOF Support 14. .Net Support 15. Every Stub is Unique 16. Every Output is Unique 17. Change Assembly Information 18. Custom Encryption 19. Works with all Operating System (32/64) 20. Built-in Antivirus Scanner 21. Bypass Proactives KIS/Scanner 22. Bypass Firew...

    $49 - $409
    $49 - $409
    0 bids

    ...Aplicants must have strong knowledge of C++, C#, Delphi, Windows API, and of-course Cryptography. built in hwid authentication No Dependencies! The Crypter MUST have the following Features: 1. Multi-File Crypter 2. Multi-File Binder 3. Multi-File Compressor 4. Delay File Execution 5. Icon Changer 6. Process Persistence 7. Version Info Change 8. Custom Fake Messages 9. Custom Fake Byte Adder/File Pumper 10. Extension Spoofer: from .exe to .pdf, .jpg, word, etc. 11. File Start-up 12. File Melt 13. EOF Support 14. .Net Support 15. Every Stub is Unique 16. Every Output is Unique 17. Change Assembly Information 18. Custom Encryption 19. Works with all Operating System (32/64) 20. Built-in Antivirus Scanner 21. Bypass Proactives KIS/Scanner 22. Bypass Firew...

    $1495 (Avg Bid)
    $1495 Avg Bid
    4 bids

    ...basis • Ability to view data in one of three ways: o Live scrolling (all messages appear sequentially) o Grouping by header (all messages with the same header appear in the same row), which shows only the latest value o Grouping by identical message (all messages which are identical in header and all data bytes are grouped together, so only count and timestamp are updated) • Byte-change highlighting (for a given header, color-code the difference between the current and previous values, e.g. a value of 00 to 05 is light blue, 00 to 77 is medium blue, 00 to FF is dark blue, and all gradations between • Ability to create live graphs of data visualization based on header and data bytes, e.g. from a stream coming form “header 1”, plot...

    $462 (Avg Bid)
    $462 Avg Bid
    3 bids

    Implement a Serdes a full duplex communication system between two microcontrollers, with 16 datablock buffering. The Serdes implemenation will also include auto sync lock. Data will be passed in 16 byte blocks, with interface to the microcontollers being 16 bit

    $52 / hr (Avg Bid)
    $52 / hr Avg Bid
    6 bids

    a program which will add digit strings. The input strings will be read Byte objects

    $49 - $409
    $49 - $409
    0 bids

    I am developing a VoIP product however I have a requirement for a fast codec converter which takes audio in byte[] and provides direct decoding / encoding of audio from the AudioPlayer and out from the AudioRecord into mulaw. The process can be completed using the MediaCodec from g711 mulaw->PCM using the decoder, however there is no method to carry this out in reverse. I would require full source and a simple class exposing 2 simple methods; byte[] frommUlaw(byte[] data) byte[] tomUlaw(byte[] data) which i can incorporate into my application. Further codecs will be required upon successful completion of this project.

    $1156 (Avg Bid)
    $1156 Avg Bid
    4 bids

    a program which will add digit strings. The input strings will be read Byte objects

    $97 (Avg Bid)
    $97 Avg Bid
    16 bids

    I want someone to do piping programs in C language for me. Basically I want to implement networking techniques of bit stuffing, byte stuffing and character count in C language on Linux platform. I want someone to do all these programs for me.

    $69 (Avg Bid)
    $69 Avg Bid
    5 bids

    Assignment for c++ Write a program which will add digit strings. The input strings will be read Byte objects. The program will evaluate the sum of each byte pair. The program will write each input pair as well as the results to an output file according to the format specified below. The results will include meaningful messages about erroneous string input or addition overflow when applicable. The program will continue to read and evaluate strings until the end of the input file is reached. You will need to define Byte as a class Note i am already have the assignment just want enhancement that mean's a little bit of work

    $43 (Avg Bid)
    $43 Avg Bid
    3 bids

    ...the ip address we got from the gsm provider 5. We can preset a tcp destination ip address or domain, port number, and working mode (either server or client). 6. We can preset a udp destination ip address or domain, port number, and working mode (either server or client). 7. We can set the application to buffer the data which are going to transmit through gprs network based on preconfigured byte size, command will be like, ‘please buffer the data, until it is 20bytes big, and modem may sent to the preconfigured destination’ 8. We can activate and deactivate a keep alive packet to monitor the modem and connection stability 9. We can set the modem to automatically connect tcp 10. We can set the modem to automatically connect udp 11. We can set the buffering data...

    $1272 (Avg Bid)
    Featured
    $1272 Avg Bid
    4 bids

    ...like () - User can make Categories for organize his photos - User profile page is socialize like (posts, followers and following) with notifications - Photo socialize like instagram (like, comment, share and report) - Sort postes by year, category or date (like facebook in right side by year) - Photo has a property "imagetype" (type byte in the database) and during saving the image send a default type 1 to database ex. (imageid, imageurl, imagetype, date) - Photo has a property "imagefixed" (type nvarchar(100) in the database) and during saving the image send a default '' to database ex. (imageid, imageurl, imagetype, date, imagefixed) in save image button you must make these parameters. - When user Share

    $1195 (Avg Bid)
    $1195 Avg Bid
    24 bids

    write a complete well documented assembly language program (starts at $C000) that counts the number of 1s in each byte in a list. The LIST_IN starts at $C100 and it has 12 bytes ( create your own random bytes for the list). The results (count of 1s) should be written into a LIST_OUT that starts at $C200. verify your program on the THRSim11 simulator.

    $115 (Avg Bid)
    $115 Avg Bid
    11 bids

    i need code which can load dll without writing the dll to the disk. so something like a exe which contains a dll byte array, the byte array must be directly injected into another process without writing the dll to the disk (manual mapping) so the end result must be something like injectdll(arrayofdll, processPID);

    $254 (Avg Bid)
    $254 Avg Bid
    4 bids

    i need code which can load dll without writing the dll to the disk. so something like a exe which contains a dll byte array, the byte array must be directly injected into another process without writing the dll to the disk (manual mapping) so the end result must be something like injectdll(arrayofdll, processPID);

    $6266 (Avg Bid)
    $6266 Avg Bid
    3 bids

    490105000000019059804100000000000000000000000000000000000000FE05 Above is a 32 byte data saved in a text file. This text file has to be read by Arduino UNO and saved to an array as shown below. int d[32]={0x49, 0x01, 0x05, 0x00, 0x00, 0x00, 0x01, 0x90, 0x59, 0x80, 0x41, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xFE, 0x05};

    $36 (Avg Bid)
    $36 Avg Bid
    4 bids

    Hi , I need to transmit at high speed serial data over duplex serdes data between two stm32f4's running at 168MHz. 16 bytes running in excess of 200Khz. Using a >15Mhz serdes SN65LV1023 and its co ic. Are you interested. The transmitted data and received data need to be held in ram within 256 registers, with a index pointer within the message packet determining which of the 16 blocks of 16 bytes it should be written too.

    $277 (Avg Bid)
    $277 Avg Bid
    1 bids

    I need a low level driver for read/write data to S29GL064N90BFI040 [Spansion - 64 Mbit flash] using CCS C compiler. The conroller is PIC18(L)F46K22. I should works in 8 bit mode, muxing the addr. and data lines. The routines needed: Erase all Erase from[addr] to [addr] Read from[addr] to [addr] (max 2k Bytes) Read 2k DATA byte from Usart / I2C and Write to addr. Read 2k DATA byte from array and Write to addr. Set memory in write protect mode.

    $745 (Avg Bid)
    $745 Avg Bid
    5 bids

    ...custom "GEN" encryption key AES-265-CBC for each crypt file Anti VM - Anti sandbox - Anti Threat sandbox - Anti Panda sandbox - Anti Debug - Anti DUMP - Anti Emulation - Dll Detections - Anti Cwssandbox AND others. Multi-File Crypter Multi-File Binder Multi-File Compressor Delay File Execution Icon Changer, Spoofer Process Persistence Version Info Change Custom Fake Messages Custom Fake Byte Adder/File Pumper Extension Spoofer: from .exe to .pdf, .jpg, word, etc. File Start-up File Melt EOF, TLS,Overlay Support Execution Delay Every Stub is Unique Every Output is Unique Change Assembly Information Custom Encryption Works with all Operating System (32/64) Bypass Proactives KIS/Scanner Bypass Firewall Bypass UAC Custom Process Name Registry Persis...

    $735 (Avg Bid)
    $735 Avg Bid
    2 bids

    The task: I'd like to take a single DJVU file and manually break it down into its components, for instructional purposes. Details: I have a small one-page DJVU file, consisting of a 16-byte DJVU header ("INFO"), and then a single Sjbz stream. However, I am confused about how to interpret the Sjbz stream. If I understand correctly, the Sjbz stream is encoded with a series of compressions (ZPCODEC, and BZZ, and JB), and that it is necessary to go through all those levels in order to get to the bi-tonal data itself. However, I tried taking the data that immediately comes after the Sjbz marker, saving it in a file, and passing it to "" for decoding, and it says that the stream is corrupt. So I must not be understanding the stream correctly. I'd like t...

    $49 (Avg Bid)
    $49 Avg Bid
    1 bids

    ...rency=USD. All possible rates were fetched, please click on "Save" to apply Here's the error from link: : There is not enough space on the disk. at (Int32 errorCode, String maybeFullPath) at (Byte[] buffer, Int32 offset, Int32 count) at (Boolean calledFromFinalizer) at (Boolean disposing) at () at (Boolean disposing) at () at (CompilerParameters options, String[] sources) at

    $13 / hr (Avg Bid)
    $13 / hr Avg Bid
    25 bids

    ...compatible code. I have provided a sample encrypted string that you can use to test your PHP code. Lowest bid will get the job, this is easy I just can't be bothered. decrypt this string "s9FJB7lQTGkk1Lz6KoKfw5qSsuubEqq5" using key "free1234" Private key() As Byte = {} Private IV() As Byte = {&H12, &H34, &H56, &H78, &H90, &HAB, &HCD, &HEF} Public Function Decrypt(ByVal stringToDecrypt As String, _ ByVal sEncryptionKey As String) As String Dim inputByteArray() As Byte Try key = (Left(sEncryptionKey, 8)) Dim des As New () inputByteArray = base64_decode(stringToDecrypt) Dim ms As New System

    $20 (Avg Bid)
    $20 Avg Bid
    2 bids

    Request for: KeyGen Software Name: Forex Tester 2 Version: 2.9.3 Website: Protection: HWID + Registration Key Registration method: Does not require internet conne...Protection: HWID + Registration Key Registration method: Does not require internet connection. Main issue: EXE file compressed via ASProtect PEiD-0.95-20081103 says... ASProtect 1.2x - 1.3x [Registered] -> Alexey Solodovnikov [Overlay] PROTECTiON iD v0.6.4.0 JULY says... Scanning -> C:ForexTester2 File Type : 32-Bit Exe (Subsystem : Win GUI / 2), Size : 4013924 (03D3F64h) Byte(s) -> File has 356 (0164h) bytes of appended data starting at offset 03D3E00h [File Heuristics] -> Flag : 00000000000001001100000000100110 (0x0004C026) [!] ASProtect SKE v2.3 - v2.5 detected !

    $49 - $409
    $49 - $409
    0 bids

    Request for: KeyGen Software Name: Forex Tester 2 Version: 2.9.3 Website: Protection: HWID + Registration Key Registration method: Does not require internet conne...Protection: HWID + Registration Key Registration method: Does not require internet connection. Main issue: EXE file compressed via ASProtect PEiD-0.95-20081103 says... ASProtect 1.2x - 1.3x [Registered] -> Alexey Solodovnikov [Overlay] PROTECTiON iD v0.6.4.0 JULY says... Scanning -> C:ForexTester2 File Type : 32-Bit Exe (Subsystem : Win GUI / 2), Size : 4013924 (03D3F64h) Byte(s) -> File has 356 (0164h) bytes of appended data starting at offset 03D3E00h [File Heuristics] -> Flag : 00000000000001001100000000100110 (0x0004C026) [!] ASProtect SKE v2.3 - v2.5 detected !

    $1036 (Avg Bid)
    $1036 Avg Bid
    2 bids

    This project is 2 small simple assembly programs. A common task is converting a binary integer to an ASCII binary string, allowing the latter to be displayed. This first program should do this. PART 1. 1. Write a simple procedure that converts a 4-byte packed decimal number to a string of ASCII decimal digits. 2. Pass the packed number to the procedure in EAX, and pass a pointer to a buffer that will hold the ASCII digits. 3. Write a short test program that demonstrates several conversions and displays the converted numbers on the screen. PART 2. The other program is to write a recursive implementation of Euclid's algorithm for finding the greatest common divisor (GCD) of two integers using only positive numbers. Both programs are done using MASM32 and th...

    $34 (Avg Bid)
    $34 Avg Bid
    2 bids

    Create a program to encrypt and decrypt binary files using S-DES (Simplified DES) in the Cipher Block Chaining mode. The program takes the input of an initial key and an initial vector, reads the plaintext or ciphertext from a file, conducts the encryption or decryption, and writes the resulting ciphertext or plaintext into a second file. You c...initial_vector: 8-bit initial vector plaintext_file: a binary (not text) file to store the plaintext ciphertext_file: a binary (not text) file to store the ciphertext Output Format: The program should print output in the following format. k1=subkey 1 k2=subkey 2 plaintext=all bytes of the plaintext separated by blanks, starting from the first byte ciphertext= all bytes of the ciphertext separated by blanks, starting from the ...

    $77 (Avg Bid)
    $77 Avg Bid
    8 bids

    ...(use ()) denoting the number of 1024-byte blocks in that file. For instance, if a file has 5000 bytes, it has 5 blocks (4 blocks of 1024 bytes and a final block of 904 bytes)  get filename block (for instance: get 4) -- The server sends back a 1024 byte long block of the file. The last block of the file may have less than 1024 bytes. RMI interface: For the RMI implementation, your server should support the following simple API: * String[] dir() -- returns an array of String containing the filenames of all available files * int blocks(String filename) -- returns the number of blocks that the given file has * byte[] getBlock(filename, blockNumber) -- returns a 1024-byte-long block of the file. The last block of the file may have less

    $123 (Avg Bid)
    $123 Avg Bid
    11 bids

    DS2430A is a 1-Wire 32 byte EEPROM Device. EEPROM content of this device changes with the Unique Serial Number for one of my application. The algorithm & the procedure for this calculation is needed. For more details go through the attached file. Contact me on Skype to discuss the terms.

    $282 (Avg Bid)
    $282 Avg Bid
    7 bids

    DS2430A is a 1-Wire 32 byte EEPROM Device. EEPROM content of this device changes with the Unique Serial Number for one of my application. The algorithm & the procedure for this calculation is needed. For more details go through the attached file. Contact me on Skype to discuss the terms.

    $165 (Avg Bid)
    $165 Avg Bid
    3 bids

    Our website has had some trouble with constant attacks and we need someone with these skills to fix the problem for us. Linux - Ubuntu 10.04.4 lts Lighttpd CMS - Concrete5 FastCgi (APC caching) MySQL database Tasks: ddos prevention ttfb(time to first byte) improvement database(mysql) - minimising requests/improving time to handle said requests(in relation to cms) Ideally move web server from lighttpd to nginx Pretty Url set-up - conversion of url parameters to folder-like view i.e would equal

    $1158 (Avg Bid)
    $1158 Avg Bid
    20 bids

    i will send one picture byte array or url to PHP and i need POST image and message in facebook. like: ://mage.png&message=hi this is the post and then post into mi facebook with mi aplication. its all.

    $49 (Avg Bid)
    $49 Avg Bid
    1 bids

    I am an electronics hardware design engineer with little experience of programming. The project has three sections. 1. Programming a Pic18F2550 with two AD7787 ADCs connected by 3wire serial port with chip select The Pic must boot up as USB HID and start Main app. Output from the AD7787s must be selectable and data transferred to main app. Three 8x8 byte blocks must be transferable from EEPROM to main app. I have a PicKit2 for programming. 2. Main app. Written in Visual Basic (I have 2008 express) with standard text window to display selected AD7787 data Download the 3 8x8 bytes of EEPROM data to arrays. 3. Write Macros for MS Excel to initialise (open) data channel with Pic or Main app. Send data to Pic or Main ...

    $817 (Avg Bid)
    $817 Avg Bid
    2 bids

    I need a WCF method which is able to receive a byte stream of an AAC sound file from iPhone device and save it on the WCF web service side as a regular AAC playable file. This can be done via an extension to the C# NAudio library or as a seperate library. This is the WCF signature of the main method: // Gets a stream of AAC and saves it as a file. Returns true if ok, false is failed. public bool UploadSound(Stream data, string filePath); On client side (ios) we currently send it using the method described here: The result should be a working Visual Studio project which knows via stream to receive a AAC byte stream and save it as a playable file. Good luck

    $385 (Avg Bid)
    Featured Urgent
    $385 Avg Bid
    9 bids