delorie.com/archives/browse.cgi | search |
X-Authentication-Warning: | delorie.com: mail set sender to geda-user-bounces using -f |
X-Recipient: | geda-user AT delorie DOT com |
X-Authority-Analysis: | v=2.0 cv=NJxXCjGg c=1 sm=0 a=6jktZp3dcHAl1vye2O6wCg==:17 a=F7YQP-1FNzsA:10 a=qwaEpgMPffwA:10 a=6WB07kdHjWAA:10 a=8nJEP1OIZ-IA:10 a=DBD04xgeLIwKpUxnlW8A:9 a=wPNLvfGTeEIA:10 a=6jktZp3dcHAl1vye2O6wCg==:117 |
X-Cloudmark-Score: | 0 |
X-Originating-IP: | 70.113.67.117 |
Message-ID: | <4ECA9BF9.9000601@ecosensory.com> |
Date: | Mon, 21 Nov 2011 12:44:09 -0600 |
From: | John Griessen <john AT ecosensory DOT com> |
User-Agent: | Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.23) Gecko/20111010 Icedove/3.1.15 |
MIME-Version: | 1.0 |
To: | geda-user AT delorie DOT com |
Subject: | Re: [geda-user] Modern GAL/PAL design with gEDA? |
References: | <20111117204524 DOT 10e586f5 AT rainbird> <4EC5CBEE DOT 5060904 AT optonline DOT net> <CAN0Jx-84K3n+g+ZH29wjzkuusBa=Bk_F=SaY+Z=fdm-JTf=HKQ AT mail DOT gmail DOT com> <20111120162218 DOT 555bc069 AT rainbird> |
In-Reply-To: | <20111120162218.555bc069@rainbird> |
Reply-To: | geda-user AT delorie DOT com |
On 11/20/2011 03:22 PM, Vanessa Ezekowitz wrote: > Doesn't seem as cryptic as I expected, though I can't help but wish this whole process were simpler. Think of the convenience of verilog being about assignments that happen in parallel, and you'll be way ahead. It is the exception to be procedural, executing a line at a time in verilog, not the rule. John
webmaster | delorie software privacy |
Copyright © 2019 by DJ Delorie | Updated Jul 2019 |