X-Authentication-Warning: delorie.com: mail set sender to geda-user-bounces using -f X-Recipient: geda-user AT delorie DOT com X-Original-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:content-type; bh=zXU+wMQtfJqV2elfxI8gv8F4U1AKwpiiiR7Z53kR5po=; b=bRWiJKL/F+l0qWzl/ob3fzng29YgGwRA0Hy1jDGQgo71Mglo2S8amdoNrdmovz4QFe bcUZip/Nr/a4gLcXJS+PQOLrRkmFPXZxhr3slB2kyxNeGJyEiptjHgdSCWBQxkpfaQLt Bt7HvVfRsGXcrr+aLVkQvTikfhD6OTmsnaFH5uJvxRZAyP3rzV7up3Vv+70BUTvQwSvr 9iofjgF9xLRZmvYeGklzwowkBxvFFXMGXwJJj4bs1mPYvyph+ZX3fFSRkJV67IQo9X9v vdRZy1KTEaNqm0kXas+SngJF/xN286ysVkc6mSnNmN0PJSO5qw+ydDPlWaYh5qsQuO31 +Q1Q== MIME-Version: 1.0 X-Received: by 10.202.211.82 with SMTP id k79mr1575015oig.32.1444830844054; Wed, 14 Oct 2015 06:54:04 -0700 (PDT) Sender: svenn DOT bjerkem AT gmail DOT com In-Reply-To: <9E26BFD4-A144-44E4-BEDC-98C4E1822DA7@noqsi.com> References: <1042003D-82E2-40F0-AB60-8186580C46AD AT noqsi DOT com> <201510121905 DOT t9CJ5T9W026297 AT envy DOT delorie DOT com> <88EA58F5-2B23-498A-9E5B-84054976DBED AT noqsi DOT com> <4D3CD563-D8EE-4B2A-975A-AC2B573960FF AT noqsi DOT com> <34B17816-9EA5-45FD-BFB4-9D623A8D3D87 AT noqsi DOT com> <20151014084734 DOT 47c681e21a7a6f2ab1a6b86f AT gmail DOT com> <9E26BFD4-A144-44E4-BEDC-98C4E1822DA7 AT noqsi DOT com> Date: Wed, 14 Oct 2015 15:54:03 +0200 X-Google-Sender-Auth: lq9DXe5WVAZEpxojjq-6HyyCatQ Message-ID: Subject: Re: [geda-user] A lesson from gnet-makefile From: "Svenn Are Bjerkem (svenn DOT bjerkem AT googlemail DOT com) [via geda-user AT delorie DOT com]" To: geda-user Content-Type: multipart/alternative; boundary=001a113b1a0c3874ab052210e519 Reply-To: geda-user AT delorie DOT com Errors-To: nobody AT delorie DOT com X-Mailing-List: geda-user AT delorie DOT com X-Unsubscribes-To: listserv AT delorie DOT com Precedence: bulk --001a113b1a0c3874ab052210e519 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On 14 October 2015 at 15:41, John Doty wrote: > If we use the power of the architecture, we can make those changes withou= t > the hazard. We have a transparent file format and a powerful scripting > facility. One source of this controversy is that many developers won=E2= =80=99t use > Scheme. Fine, but then you can=E2=80=99t responsibly work on improving gs= chem or > gnetlist because everything not in Scheme takes away from the flexibility= . I am wondering what this would mean to truly hierarchical schematics and netlist creation containing true buses/bundles of nets and pins with geda. --=20 Svenn --001a113b1a0c3874ab052210e519 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable

= On 14 October 2015 at 15:41, John Doty <jpd AT noqsi DOT com> wrote:
If we use the power of the architecture, we= can make those changes without the hazard. We have a transparent file form= at and a powerful scripting facility. One source of this controversy is tha= t many developers won=E2=80=99t use Scheme. Fine, but then you can=E2=80=99= t responsibly work on improving gschem or gnetlist because everything not i= n Scheme takes away from the flexibility.

I am wondering what this would mean to truly hierarch= ical schematics and netlist creation containing true buses/bundles of nets = and pins with geda.


--
Svenn
--001a113b1a0c3874ab052210e519--