delorie.com/archives/browse.cgi   search  
Mail Archives: geda-user/2015/08/30/16:46:09

X-Authentication-Warning: delorie.com: mail set sender to geda-user-bounces using -f
X-Recipient: geda-user AT delorie DOT com
X-Original-DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=mail.ud03.udmedia.de; h=
message-id:date:from:mime-version:to:subject:content-type
:content-transfer-encoding; s=beta; bh=0syER0SPnACch86PhvEFWL6GA
+j8ETsQKjSQUwGADc4=; b=JQMoOQhK3whl2PyjaThSSarp5b7Y7k8fTeqfdof18
x7ov9XK028YpevlaANoslZCHsD67Psrp5srFPp4zjPjYQhzTYdK+V4EFW7bzpi+y
+czBoxOMxpjOGRg+oIXGFduxdHFVPZyXh7vWaYBKfq47K+GHetqLDC7lzcP9wlPQ
Fo=
Message-ID: <55E36B76.1030103@jump-ing.de>
Date: Sun, 30 Aug 2015 22:45:42 +0200
From: "Markus Hitter (mah AT jump-ing DOT de) [via geda-user AT delorie DOT com]" <geda-user AT delorie DOT com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.8.0
MIME-Version: 1.0
To: geda-user AT delorie DOT com
Subject: [geda-user] So quiet here?
Reply-To: geda-user AT delorie DOT com

The last few days we had more traffic on the -commit list than on -user. Unusual?

OK, I admit it's more fun to fix bugs than to discuss theories which never end up in code anyways. Perhaps it's sort of an adventure game for intellectuals. 'grep -rn' is the most used command and one searches up and down what's going on, how pieces fit together. Adds printf()s everywhere to prove assumptions, creates simple layouts just for testing.

At the end there are only a few changed lines, perhaps a few removed (always good!) or added (can't avoid it) ones, so outside observers don't see much of this game. Anyways, I like it at times. Also totally different from the bare metal embedded code I do usually.

The nice thing is, those writing code set the future of the application. :-)


Cheers,
Markus

-- 
- - - - - - - - - - - - - - - - - - -
Dipl. Ing. (FH) Markus Hitter
http://www.jump-ing.de/

- Raw text -


  webmaster     delorie software   privacy  
  Copyright © 2019   by DJ Delorie     Updated Jul 2019