How to use firmware recovery function of Pharos CPE
How to use firmware recovery function of Pharos CPE
Suitable for: Pharos CPE, Pharos BS
Purpose of this article:
Firmware upgrade may not be successful sometimes, for instance unpredictable power failure during the process, and thus your Pharos device may fail to reboot. This article will guide you how to re-flash the firmware via TFTP.
1. Install the Tftpd32 /Tftpd64 on your computer based on the system type(32-bit/64-bit), here we take Tftpd32 as an example ;
Download link: http://tftpd32.jounin.net/tftpd32_download.html
2. Download the proper firmware of Pharos CPE products, here we take firmware pharos_un-up-ver1-0-0-P25-[20140709-rel51929].bin
of CPE510 as an example, then must
rename the firmware as recovery.bin
3. Configure IPv4 address of your computer as 192.168.0.100/255.255.255.0
, you can click Here
to configure static IP for the computer.
Firmware Recovery ProcedureStep1
Connect your computer to the LAN port of CPE510 with an Ethernet cable and run the Tftpd32.exe
, then navigate the Current Directory
to the folder where recovery.bin
Power Pharos device off first. Press the reset button on CPE510 and then power it on. Hold the reset button for about 6-8 seconds and focus on Tftpd32.exe interface at the same time. When you see the file transfer progress bar appears as below, then you can release the reset button.
CPE510 will reboot automatically after the file transmission completed, please wait for a while until all the lights on CPE510 are flashing and then perform normally.
After reboot you may follow this link to login the management page of CPE510 again.
1. Please only perform firmware recovery through wired connection.
2. Tftpd32 exe/Tftpd64 exe should be compatible with the Operating System, Tftpd32 exe should work with 32-bit System and Tftpd64.exe should work with 64-bit System.
Source: [Knowledge Base] How to use firmware recovery function of Pharos CPE
There are a number of properties used by the micro-kernel during the bootstrap.
This documentation is heavily plagiarized from org.jboss.system.server.ServerConfig. Continue reading JBossProperties | JBoss Developer
While recently answering a post on the MSDN forum, I realized that the Robert Gold(Vice President of Business Intelligence in Bostwick Laboratories, Inc) was facing the same problem that I was facing couple of years back when I was working as a Team Leader in one of the BPO’s. The MIS Department was reporting to me and one of the main jobs was to create “Trackers” for various departments. My team used to take hours to design a particular tracker only to realize after few days that the users were spoiling the format of the tracker by copying and pasting. Completely protecting it with a password was not the option. Nor did we find any option in Excel which forced selective pasting. It was then we devised this macro which allowed the user to paste but behind the scenes, converted that paste into paste special – values.
The only drawback of this method is that if the macros are disabled then this won’t work. But thanks to the IT Department, they ensured that the macros was enabled on each and every pc. After that we never faced a problem with users messing up the format of the sheet.
So how does this code work? What is the logic behind it? I would explain this in 3 sections.
- Planting the Code
Continue reading VBA Excel–Allow Paste Special Only
- theoretically requires more server-side resources than
- only loads at most batch-size records into client memory at once, resulting in a more predictable client memory footprint
- theoretically requires less server-side resources than
- will read the entire result set into client memory (unless the driver natively supports asynchronous result set retrieval) before the client application can iterate over it; this can reduce performance in two ways:
- reduced performance with large result sets if the client application is written in such a way as to stop processing after traversing only a fraction of the result set (with
directit has already paid the cost of retrieving data it will essentially throw away; with
cursorthe waste is limited to at most batch-size – 1 rows — the early termination condition should probably be recoded in SQL anyway e.g. as
SELECT TOP or window functions)
- reduced performance with large result sets because of potential garbage collection and/or out-of-memory issues associated with an increased memory footprint
- Can using
selectMethod=cursor lower application performance? — either method can lower performance, for different reasons. Past a certain resultset size,
cursor may still be preferable. See below for when to use one or the other
selectMethod= an application-transparent setting on a JDBC connection? — it is transparent, but it can still break their app if memory usage grows significantly enough to hog their client system (and, correspondingly, your server) or crash the client altogether
Source: JDBC connection to very busy SQL 2000: selectMethod=cursor vs selectMethod=direct? – Stack Overflow
When a sequence is incremented twice when running SELECT NEXT VALUE FOR MYSEQ; and you are using the Microsoft JDBC driver with the selectMethod=cursor, remove the selectMethod=cursor option from the JDBC URL. The sequences will then be incremented correctly.
Spring is a widely used framework today, bringing many powerfull features and extensions to the Java core stack. However most of people tend to use these features without understanding their underlying mechanism.
Since there is no “magic” in real life, we are going to dig into some Spring features related to Transaction and Database in this serie of articles.
This first article is dealing with the famous @Transactional annotation, saving the developers the burden of managing low level transaction code.
Continue reading Spring @Transactional explained | DuyHai’s Java Blog
By convention, type parameter names are single, uppercase letters. This stands in sharp contrast to the variable naming conventions that you already know about, and with good reason: Without this convention, it would be difficult to tell the difference between a type variable and an ordinary class or interface name.
The most commonly used type parameter names are:
- E – Element (used extensively by the Java Collections Framework)
- K – Key
- N – Number
- T – Type
- V – Value
- S,U,V etc. – 2nd, 3rd, 4th types
You’ll see these names used throughout the Java SE API and the rest of this lesson.
Source: Generic Types (The Java™ Tutorials > Learning the Java Language > Generics (Updated))