delorie.com/archives/browse.cgi   search  
Mail Archives: geda-user/2012/12/13/22:36:02

X-Authentication-Warning: delorie.com: mail set sender to geda-user-bounces using -f
X-Recipient: geda-user AT delorie DOT com
X-Authority-Analysis: v=2.0 cv=Jaw+XD2V c=1 sm=0 a=6jktZp3dcHAl1vye2O6wCg==:17 a=jl9P3j1e7_0A:10 a=yvSPhu-8laEA:10 a=-bErWWmhtBcA:10 a=6WB07kdHjWAA:10 a=IkcTkHD0fZMA:10 a=wR-FlJDvAAAA:8 a=caKvSo6u0qMA:10 a=64TKAgz8Qhg4OrgcXloA:9 a=QEXdDO2ut3YA:10 a=6jktZp3dcHAl1vye2O6wCg==:117
X-Cloudmark-Score: 0
X-Authenticated-User:
X-Originating-IP: 70.113.67.117
Message-ID: <50CA9E47.7010701@ecosensory.com>
Date: Thu, 13 Dec 2012 21:34:31 -0600
From: John Griessen <john AT ecosensory DOT com>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:10.0.9) Gecko/20121015 Icedove/10.0.9
MIME-Version: 1.0
To: geda-user AT delorie DOT com
Subject: Re: [geda-user] Find rat lines
References: <20121204183305 DOT 6b04c0dc AT jive DOT levalinux DOT org> <20121208112649 DOT 388a9d22 AT jive DOT levalinux DOT org> <1355011808 DOT 19390 DOT 8 DOT camel AT localhost> <alpine DOT DEB DOT 2 DOT 00 DOT 1212090407031 DOT 26605 AT igor2priv> <1355188647 DOT 12937 DOT 14 DOT camel AT localhost> <alpine DOT DEB DOT 2 DOT 00 DOT 1212110530020 DOT 26605 AT igor2priv> <alpine DOT DEB DOT 2 DOT 00 DOT 1212111935190 DOT 26605 AT igor2priv> <CAC4O8c__Yhb8ZijkVeZzELtNMAO8-=V3aDiEdiCC=BPMPy67Xw AT mail DOT gmail DOT com> <1355265114 DOT 18878 DOT 24 DOT camel AT localhost> <50C8A51D DOT 6060009 AT ecosensory DOT com> <1355441844 DOT 2993 DOT 3 DOT camel AT localhost>
In-Reply-To: <1355441844.2993.3.camel@localhost>
Reply-To: geda-user AT delorie DOT com

On 12/13/2012 05:37 PM, Peter Clifton wrote:
> Or did you mean simulations
> relating to a PCB layout)?

Yes, what is usually called back annotation. Using as built data and simulating the traces
as physically modeled transmission lines.

- Raw text -


  webmaster     delorie software   privacy  
  Copyright 2019   by DJ Delorie     Updated Jul 2019