Home
 
Services
Our Technology
Company Information
Affiliations
Contact Information
Technology
Our expert staff can provide solutions for the following applications:
  • Warehouse Management Systems
  • Warehouse Control and Automation
  • Conveyor Controls
  • High Speed Sortation Systems
  • Material Handling
  • Label Application
  • Barcode Scanning
  • Wireless Picking Applications
  • Pick to Light
  • Carousels
  • Automatic Picking Devices
  • Programmable Logic Controllers (PLC)
  • Human Machine Interface - Native and Web based
Successful implementations include a variety of automation technologies, including:
  • Allen-Bradley Scanners
  • Data Highway Plus
  • Remote IO
  • Programmable Logic Controllers (PLC)
  • Interbus
  • Profibus
  • National Instruments FieldPoint
  • Symbol Technologies wireless terminals
  • Zebra Technologies printers
We are experts in the following technologies:
  • Object Oriented Design
  • .NET
  • C#
  • C++
  • Delphi
  • SQL - Oracle, Microsoft SQLServer, IBM DB2, Sybase
  • Java
  • Web Interface Design
  • Windows NT/2000/XP/Vista
  • Unix
We have developed class frameworks and tools upon which to build automation and real-time solutions. These include:
  • Hierarchical State Machine Framework - Hierarchical State Machines (HSM) are widely considered to be the best way to implement complex real-time multi-threaded applications. HSM is a way of organizing hierarchically, a set of Finite State Machines to process events, carry out action routines and perform state transitions. An simple example includes a label applicator used for affixing shipping labels on cases that it processes. At the top level, a FSM exists that handles state transitions governing the motion of product through the system. It is aware of downstream full status, and can prevent or allow additional containers from entering the system. Below this level exists a FSM that controls the printing and application of the label to the container. It is not concerned with anything associated with the top level. The top level accepts containers into the system, positions them for printing, and provides the second level with events enabling it to perform the printing and application. In support of these FSMs, a series of event processors exist to perform such functions as obtaining data to print on the label, reading input signals to determine the state of the surrounding conveyor, and responding to User Interface program requests for data.
  • XML Based Configuration Classes - XML is an open technology widely in use today for a variety of purposes. We have incorporated it into a centrally maintained and universally accessible structure for storing system configuration. Rather than performing INI file manipulation or registry editing on each machine supporting the infrastructure, a single XML file on a secure server enables configuration changes to be made from anywhere in the enterprise. Upon initialization or notification of a configuration change, system processes access the configuration datastore and obtain their specific configuration parameters.
  • SOAP Communication Classes - Simple Object Access Protocol (SOAP) is a lightweight, XML based protocol for exchanging messages between processes. It is an open protocol, and implementations exist on all hardware and software platforms today. Using SOAP for message exchange enables individual processes to be implemented on any platform, without concern for data representation.
  • Non-blocking Overlapped Socket Communication Classes - Our SOAP Communication Classes are derived from a class framework that implements TCP/IP socket communication in the most efficient and scalable methods available. Client and Server processes perform interprocess communication by writing to and reading from socket classes without blocking on the completion of the IO. This enables a finite set of worker threads to service all IO, minimizing system thrashing due to over-allocation of resources. These classes can optionally be implemented as Secure Socket Layer (SSL) interfaces should it be required to protect message traffic from unauthorized personnel.
Comments to
Copyright © 2003 "Copperline Consulting Services, Inc.". All Rights Reserved.
All brand names and products names are trademarks or registered trademarks of their respective companies.