Reccomend the best relay for my application

I have a NI USB
9219, 4 Ch-Ch Isolated, 24-bit, ±60V, Universal Analog Input module
which I intend to use for RTD measurement (2 wires) with three pt1000
sensors. However, it is not intended for continuous measurement. I need
to keep the lines+sensor grounded when I don't measure and therefore I
need a TTL (5V-DC) triggered switch/relay to connect them to the NI USB
9219 only when measuring is allowed.
Which switch would you reccomend?
Thank you!

How many wires do your RTDs have (2,3 or 4)?  How many wires do you need to disconnect on your RTDs?  If you just need to stop the current flow, we only need to disconnect one wire, regardless of the number of wires on your particular RTDs.  This will require 4 SPST relays.
9481:
4 mechanical SPST relays, 50mOhm max.
9485:
8 solid state SPST relays, 200mOhm max.
If you're trying to isolate the RTDs for some particular test, we'll
need to disconnect all wires, which would require 8, 12, or 16 SPST
relays (for 2, 3, or 4 wire RTDs).  This would require up to 4 9481 modules, which might be cost and space prohibitive.
Note that both of these options simply disconnect the RTD and leave it floating... if we need to ground 1 or more wires, we'll need additional SPST relays (in other words, create an SPDT using two SPSTs). 
If PXI is an option, the 31 SPST PXI-2568 is a great option.
If PXI isn't an option, you might consider purchasing the 9476 DO module, which has 32 digital outputs that we could use to drive external relays.  Said external relays could be SPDT, so we'd only need 16 channels max... now you can add more RTDs .
If I missed any details on your application, let us know and we'll look at other options.
-John Sullivan
Analog Engineer

Similar Messages

  • What are the best practices for exception handling in n-tier applications?

    What are the best practices for exception handling in n-tier applications?
    The application is a fat client based on MVVM pattern with .NET framework.

    What are the best practices for exception handling in n-tier applications?
    The application is a fat client based on MVVM pattern with
    .NET framework.
    That would be to catch all exceptions at a single point in the n-tier solution, log it and create user friendly messages displayed to the user. 

  • Suggestions about the best tool for quality check for an ADF application

    Hi All,
    I need a few suggestions about the best tool for quality check in our ADF applicaiton.
    ours is a small size WebCenter Portal application which neither uses any task flows nor consumes any portlets.
    It has many jspx pages that use ADF components like table etc, consume web services using web service clients, and has some java classes.
    We have come across below option to implement the code quality tools.
    1. Jdeveloper inbuilt Staus option in View tab
    2. PMD extension for Jdeveloper
    3. Red Samurai
    Few more suggestions or best practices would be really helpful.
    Thanks,
    Usha

    Some general ADF / Webcenter coding standards -
    http://umeshagarwal24.blogspot.com/2012/06/adf-coding-standards-check-points.html
    You can use JAudit as well as mentioned in the blog.

  • What's the best approach for handeling about 1300 connections in Oracle.

    What's the best approach for handling about 1300 connections in Oracle 9i/10g through a Java application?
    1.Using separate schema s for various type users(We can store only relevant data with a particular schema.     Then No. of records per table can be reduced by replicating tables but we have to maintain all data with a another schema     Then we need update two schema s for a given session.Because we maintain separate scheama for a one user and another schema for all data and then there may be Updating problems)
    OR
    2. Using single schema for all users.
    Note: All users may access the same tables and there may be lot of records than previous case.
    What is the Best case.
    Please give Your valuable ideas

    It is a true but i want a solution from you all.I want you to tell me how to fix my friends car.

  • What is the best method for backing up photos in IPhoto?

    I have over 10,000 photos in IPhoto and am looking for the best method for doing a backup (or an archive?).  I'm now using ICloud and it appears it's just photo streaming and does not have storage capability. External hard drive, copying to a DVD, other suggestions?

    Most Simple Back Up
    Drag the iPhoto Library from your Pictures Folder to another Disk. This will make a copy on that disk.
    Slightly more complex:
    Use an app that will do incremental back ups. This is a very good way to work. The first time you run the back up the app will make a complete copy of the Library. Thereafter it will update the back up with the changes you have made. That makes subsequent back ups much faster. Many of these apps also have scheduling capabilities: So set it up and it will do the back up automatically. Examples of such apps: Chronosync or DejaVu . But are many others. Search on MacUpdate
    My Routine
    My Library lives on my iMac. It’s Backed up to  two external hard disks every day. These disks are permanently attached to the iMac. These back ups run automatically. One is done by Time Machine, one is a bootable back up done by SuperDuper
    It’s also backed up to a portable hard disk when ever new photos are added. This hard disk lives in my car. For security, this disk is password protected.
    I have a second off-site back up at a relative’s house across town. That’s updated every 3 or 4 months.
    My Photos are backed up online. There are many options: Flickr, Picasa, SmugMug etc. However, check the terms of your account carefully. While most sites have free uploading, you will often find that these uploads are limited in terms of the file size or the bandwidth you can use per month. For access that allows you to upload full size pics with no restrictions you may need to pay.
    Every couple of months I test the back ups to make sure they are working correctly. It’s very easy to mis-configure a back up application, and the only way to protect against that is to do a trial restore.

  • What is the best antivirus for MacBook Pro?

    What is the best antivirus for MacBook Pro?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • What is the best DB for mobile?how to deploy it in mobile?

    Hi,
    i a new for BerkeleyDB,i want to know what is the best DB for mobile and how to deploy it in mobile?
    help me ..
    please...
    regard's
    mani
    Edited by: user9032602 on Jan 23, 2010 4:32 AM

    Hi,
    In order to be able to suggest you a database product, we need to know more details on what your application's needs are and on what operating system you use.
    Bogdan Coman

  • Is pages the best app for creating wedding programs? or would you recommend something else?, is pages the best app for creating wedding programs? or would you recommend something else?

    Is pages the best app for creating wedding programs, or would you reccomend something free or cheaper?

    As the question is asked three times, I guess that you wish to marry three times.
    From my point of view, the best app to do this or that is the one with which we are comfortable.
    Every Word processor may be used to achieve your goal.
    Yvan KOENIG (VALLAURIS, France) vendredi 20 janvier 2012
    iMac 21”5, i7, 2.8 GHz, 12 Gbytes, 1 Tbytes, mac OS X 10.6.8 and 10.7.2
    My Box account  is : http://www.box.com/s/00qnssoyeq2xvc22ra4k
    My iDisk is : http://public.me.com/koenigyvan

  • The Best Releas Of Oracle Application Server 10g (BI Forms&Reports)

    hi all
    i am asking u to loock with me to the best solution for my environment
    becuse we want to upgrade our Environment work :
    Current Work Environment:
    - Oracle Database Server R 8i as (database)
    - Oracle Developer 2000 as (Forms & Reports)
    our comunity is welling to upgrade our work to 10g
    and we are asking for the best release that we can use to a complish the best senario for our environment .
    i have the current seggestion :
    - Upgrade the database to R 10gR2 (Export&Import).
    - Install & Migrate the developer side as Infrastruction Appliction Server 10gR(10.1.2.0 ) .
    - Install the Middle Tire as BI Forms&Reports & Migrate our whole system to the new Release using developer Suite 10g .
    i am asking you'r seggestions & Best Bractice in my case .
    also what is the most Stable relase we can use .
    thanks .

    Hi Ibrahim,
    You can do an easier installation by only using base release of 10.1.2.0.2. What I stated would be good practice:
    By * DB 10.2.0.3 ---- > u mean (Database Version) => Yes, use Database version 10.2.0.3
    By * Identity Management 10.1.4.0.1 (OID/SSO) -----> u mean (Application Server infrastructure) => Yes, use Identity Management 10.1.4.0.1 instead of the infrastructure on Application Server 10.1.2.0.2
    By * Application Server 10.1.2.0.2 -----> u mean (Middle Tire Forms&Report Services) => Yes, use Application Server 10.1.2.0.2 as middle-tier. When installed, upgrade it to 10.1.2.2 (with the latest patchset)
    By * Patch Application Server DB client to 10.1.0.5 ----> u mean what? => Before you upgrade AS to 10.1.2.2 it's mandatory to upgrade the Database client software in the Application Server 10.1.2.0.2 home to 10.1.0.5. Default is 10.1.4. You'll see database client version by for instance starting SQL*Plus.
    For your Developer (Forms) upgrade: Forms 4.0/4.5 - 6i -> 10g. See: http://www.oracle.com/technology/products/forms/htdocs/upgrade/index.html. If you have tons of Forms, then I recommend using a tool like the great PITTS.CON (http://www.pitss.com/en/pcon/index.htm).
    Regards,
    Martin

  • What is the best practice for AppleScript deployment on several machines?

    Hi,
    I am developing some AppleScripts for my colleagues at work and I don't want to visit each of them to deploy my AppleScript on their Macs.
    So, what is the best practice for AppleScript deployment on several machines?
    Is there an installer created by the Automator available?
    I would like to have something like an App to run which puts all my AppleScript relevant files into the right place onto a destination Mac.
    Thanks in advance.
    Regards,

    There's really no 'right place' to put applescripts.  folder action scripts nees to go in ~/Library/Scripts/Folder Action Scripts (or /Library/Scripts/Folder Action Scripts), anything you want to appear in the script menu needs to go in ~/Library/Scripts (or /Library/Scripts), script applications should probably go in the Applications folder, but otherwise scripts can be placed anywhere.  conventional places to put them are in ~/Library/Scripts or in a subfolder of ~/Library/Application Support if they are run by an application.  The more important issue is to make sure you generalize the scripts: use the path to command to get local paths rather than hard-coding them in, make sure you test to make sure applications or unic executables you call are present ont he machine, use script bundles rather tna scripts if you scripts have private resources.
    You can write a quick installer script if you want to make sure scripts go where you want them.  Skeleton verion looks like this:
    set scriptsFolder to path to scripts folder from user domain
    set scriptsToExport to path to resource "xxx.scpt" in directory "yyy"
    tell application "Finder"
      duplicate scriptsToExport to scriptsFolder with replacing
    end tell
    say "Scripts are installed"
    save this as a script application, then open the application pacckage and create a folder called "yyy" in the resources folder and copy your script "xxx.scpt" into it.  other people can run the app to install the script.

  • Whats the best option for passing parameters between tf?

    Dear All,
    I have three Task Flows:
    1. TF1
         -  Main Taskflow that calls a web service to gather its data
    2. TF2
         -  Secondary taskflow which receives a parameter and depending on the value of the parameter received will display its data accordingly.  Generally any data
         is feed from TF1
    3. TF3
         -  Same as TF2Use Case:
    All three TF will be dropped to the page as Regions in a Webcenter Portal Application. Changes in TF1 should propagate into TaskFlow 2.
    Question:
    1. How do I configure that changes in TF1 would be propagated back into task flow 2 and 3 and whats the best option for this?
    2. At runtime, user can choose to edit the page and TF2 and TF3 can be deleted but TF 1 should remain as the source of information.
    Given the scenario above:
    - shall I wire the taskflows via page parameters?
    - contextual events?
    What are the considerations that needs to be thought of. I havent done such requirements before.
    Please help.
    Webcenter 11.1.1.6

    Contextual events seem to be the best case.
    This way you can trigger whenever you want. Web services can be slow so you can trigger the event when the gathering of the data has been finished and then pass some value on the event.
    An event also has a payload so it's an ideal scenario to add the data from the service on it so you can use it in the other TF's.
    In order to manage the deletion of the TF1, you can use the UI events on the composer: http://docs.oracle.com/cd/E23943_01/webcenter.1111/e10148/jpsdg_page_editor_adv.htm#CHDHHFDJ

  • WHat is the best platform for SAP EP ?

    Experts
    Can any one help to share some information about what is the best platform for portal ?
    Windows or UNIX
    I have personally seen most of the customers are using windows as thier OS for Portal. When it comes to R3 BW SRM CRM and other application,its UNIX.
    Interms of Performance , Windows is not right choice . I am not sure about life cycle management for the Windows.
    A big advantage of using Windows hosting is that.NET technologies: ASP. NET, VB.NET easily works on these Hosts. If, the website is built using these technologies then opting a Windows server is most suitable
    Microsoft Sharepoint is yet another application, which needs exclusive, Windows hosting. The only option available for users using this application is Windows server
    Appreciate your inputs
    Regards
    Karthi

    Do not double post!
    Markus

  • What is the best practice for Enumeration for ADF?

    Dear All,
    What is the best practice for Enumeration for ADF?
    I need to add enumeration to my application. ex: Gender, Marital Status.
    How to provide? Custom Declarative Components or are there any other way?
    Thank you.
    Erdenebayar

    Hi ?
    How to create Static VO and assign static values for the fields?
    if you can, then decide the matter.
    thank you
    Edited by: Luuya on Mar 23, 2011 1:34 AM

  • What’s the best practice for this scenario?

    Hi,
    My users want the ability to change the WHERE and/or ORDER BY clause at runtime. They may define user preferences on each screen ( which is bind to a view object). They want to see the same records based on WHERE/ORDER BY defined on the last visit. That is why I keep the users preferences and load the screen based on that, using :
    View.setWhereClause(...);
    View.setOrderByClause(...);
    View.executeQuery();
    This works good when only one user working with the application but faced low performance when more than one user working with the application.
    What are the points to increase the performance and what is the best practice for this scenario?
    Thanks for your help in advance.

    Sung,
    I am talking only about 2 users in my testing. I am sure i missed something but could not recognize that.
    This page is my custom query page including a tag to instantiate app module in stateful mode at the top <jbo:ApplicationModule..> and a tag to instantiate data source <jbo:Datasource...> and release tag at the bottom <jbo:ReleasePageResources..> and some java code in the middle(body). The java code constructed the query statement and then fires the query to set the view object based on the query statement using the above methods.
    So, I am facing very slow performance(speed) when two clients load this page at the same time. Looks like the entire application locks for others when one client load this page and fire the query. i realized the battle neck is where executeQuery() is executing.
    what do you think.
    Thanks in advance for your comments.

  • Is Business Manager the best tool for our company?

    I have a number of quesitons to answer to figure out if Busienss Manager is the best tool for our company. The ONLY reason we are pursuing changing from individual accounts is that Share Screen has been removed from some of our accounts with the latest Skype update.
    Can we port existing Skype account names to Business Manager?
    Will Skype contacts be kept?
    Is 'Share Screen' part of Business Man.?
    Is it east to add and delete user accounts in Business Manager?
    What are the admin issues?
    Can more than one person be the administrator? Is it easily transfered?
    The Business Manager literature refers to credit allocation, tracking and reporting as a benefit of Business manager. Credit is not a concern for our company as we seldom use Skype to call phones. What are the other benefits of Skype business Manager?
    Thank you for your time and help.

    Up until a few weeks ago I would certainly reccomend Skype, but my advice is for youy to look for another company.
    Skype doesn't care about it's business customers, I and others have been trying to buy credits for week but the system is broken with no fix in sight, I was told it would be fixed by the end of the week, it hasn't been!!
    Read for yourself then go look for another phone provider, Skype is not responsive to business customers!
    http://community.skype.com/t5/Skype-for-business/As-a-manager-I-am-unable-to-purchase-skype-credit/t...

Maybe you are looking for