[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Looking for the device connected to the usb port.

Posted on 2011-10-16
3
Medium Priority
?
356 Views
Last Modified: 2012-05-12
I have a project with 6 laser particles counters (LPC).
These 6 LCP are connected to a USB/RS485 converter.
This converter this connected to the USB port of my computer.
How should the class in C# that SCAN the PORTS and let me know which port the device is connected?

Thank you.
ocaccy
0
Comment
Question by:ocaccy
  • 2
3 Comments
 
LVL 9

Accepted Solution

by:
lisfolks earned 2000 total points
ID: 36983187
0
 

Author Comment

by:ocaccy
ID: 36990034
Thanks for the link.

I am using C # and I'll make a class that scans the ports and automatically place the information about the all devices RS485 and USB devices connected to the PC in a window of Information.

How can we do this?

I do not want the cake, I want and I'll learn to do.

Best Regards,
ocaccy
0
 

Author Closing Comment

by:ocaccy
ID: 37124062
I'm on the link and back if have more questions. Let's close this session temporarily.
Thanks for the link.
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Stuck in voice control mode on your Amazon Firestick?  Here is how to turn it off!!!
High user turnover can cause old/redundant user data to consume valuable space. UserResourceCleanup was developed to address this by automatically deleting user folders when the user account is deleted.
this video summaries big data hadoop online training demo (http://onlineitguru.com/big-data-hadoop-online-training-placement.html) , and covers basics in big data hadoop .
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question