The series continues.
by Glennan Carnie
From the article:
In the last article we explored the design of a class to encapsulate a physical hardware device. In that article I deliberately ignored how the class would actually interact with the hardware.
In this article we explore the options available to us for accessing hardware and the consequences of those choices...