delorie.com/archives/browse.cgi   search  
Mail Archives: geda-user/2012/12/14/13:04:36

X-Authentication-Warning: delorie.com: mail set sender to geda-user-bounces using -f
X-Recipient: geda-user AT delorie DOT com
Mime-Version: 1.0 (Apple Message framework v1085)
Subject: Re: [geda-user] Find rat lines
From: John Doty <jpd AT noqsi DOT com>
In-Reply-To: <50CB5D82.8060507@jump-ing.de>
Date: Fri, 14 Dec 2012 11:03:56 -0700
Message-Id: <E5DE4486-B23F-4945-943A-F46C6E308B90@noqsi.com>
References: <20121204183305 DOT 6b04c0dc AT jive DOT levalinux DOT org> <20121208112649 DOT 388a9d22 AT jive DOT levalinux DOT org> <1355011808 DOT 19390 DOT 8 DOT camel AT localhost> <alpine DOT DEB DOT 2 DOT 00 DOT 1212090407031 DOT 26605 AT igor2priv> <1355188647 DOT 12937 DOT 14 DOT camel AT localhost> <A7B4EDBD-3704-4837-9350-A16559C60A2A AT noqsi DOT com> <201212140010 DOT qBE0ABjV023762 AT envy DOT delorie DOT com> <172CCAAB-0423-43EF-8A04-5A9961F1D5B9 AT noqsi DOT com> <201212140122 DOT qBE1MoKM019255 AT envy DOT delorie DOT com> <5AA18F19-2EA9-4E7D-9378-F768D8E1E5DD AT jump-ing DOT de> <alpine DOT DEB DOT 2 DOT 00 DOT 1212140501300 DOT 26605 AT igor2priv> <50CB5D82 DOT 8060507 AT jump-ing DOT de>
To: geda-user AT delorie DOT com
X-Mailer: Apple Mail (2.1085)
X-MIME-Autoconverted: from quoted-printable to 8bit by delorie.com id qBEI46vQ022481
Reply-To: geda-user AT delorie DOT com
Errors-To: nobody AT delorie DOT com
X-Mailing-List: geda-user AT delorie DOT com
X-Unsubscribes-To: listserv AT delorie DOT com

On Dec 14, 2012, at 10:10 AM, Markus Hitter wrote:

> Clearly, requiring manual track tagging isn't helpful.

Consider that manual tagging is the simplest, least confusing, and most predictable option. It should therefore be the model for the primitive operation.

Now, of course, a tool that supports design automation should support "scripting" of shortcuts based on primitive objects and operations. Leaky heuristics may be acceptable as high-level operations if the user has solid primitives to fall back on. But attempting to use leaky heuristics as a foundation gives the user neither a conceptual foundation for understanding what the tool does, nor the capacity to override unwanted behavior. Especially when learning the tool, the user needs manual control over what's going on.

John Doty              Noqsi Aerospace, Ltd.
http://www.noqsi.com/
jpd AT noqsi DOT com



- Raw text -


  webmaster     delorie software   privacy  
  Copyright 2019   by DJ Delorie     Updated Jul 2019