Return-Path: Received: from post.thorcom.com (post.thorcom.com [195.171.43.25]) by mtain-me05.r1000.mx.aol.com (Internet Inbound) with ESMTP id 6D96C380000B9; Mon, 30 Apr 2012 09:53:01 -0400 (EDT) Received: from majordom by post.thorcom.com with local (Exim 4.14) id 1SOr1H-0002WK-My for rs_out_1@blacksheep.org; Mon, 30 Apr 2012 14:52:03 +0100 Received: from [195.171.43.32] (helo=relay1.thorcom.net) by post.thorcom.com with esmtp (Exim 4.14) id 1SOr1H-0002WB-3L for rsgb_lf_group@blacksheep.org; Mon, 30 Apr 2012 14:52:03 +0100 Received: from filter02.i-online.fr ([195.200.78.9]) by relay1.thorcom.net with esmtps (TLSv1:AES256-SHA:256) (Exim 4.77) (envelope-from ) id 1SOr1F-0004ah-1E for rsgb_lf_group@blacksheep.org; Mon, 30 Apr 2012 14:52:01 +0100 Received: from smtp.qtxt.dns-iol.com ([195.200.78.13]) by filter02.i-online.fr (IceWarp 10.2.2) with ESMTP (SSL) id ORD46259 for ; Mon, 30 Apr 2012 15:51:59 +0200 Received: (qmail 28131 invoked by uid 507); 30 Apr 2012 15:51:54 +0200 Received: from unknown (HELO ?192.168.1.101?) (john.rabson@numeo.fr@217.67.155.178) by smtp.qtxt.dns-iol.com with SMTP; 30 Apr 2012 15:51:54 +0200 From: John Rabson Mime-Version: 1.0 (Apple Message framework v1257) Date: Mon, 30 Apr 2012 15:51:58 +0200 In-Reply-To: <1335791883.93357.YahooMailNeo@web171601.mail.ir2.yahoo.com> To: rsgb_lf_group@blacksheep.org References: <4F9D18DA.3030707@talktalk.net> <1335738784.91970.YahooMailNeo@web171604.mail.ir2.yahoo.com> <008701cd265e$e1819680$4001a8c0@lark> <1335791883.93357.YahooMailNeo@web171601.mail.ir2.yahoo.com> Message-Id: <5083413D-7AD5-4A5A-B7A5-5215F1EC5483@numeo.fr> X-Mailer: Apple Mail (2.1257) X-Spam-Score: 0.0 (/) X-Spam-Report: Spam detection software, running on the system "relay1.thorcom.net", has identified this incoming email as possible spam. The original message has been attached to this so you can view it (if it isn't spam) or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Hi Pete, Software production is moving from being a craft skill to an engineering discipline, and it is at a particularly difficult stage I think. In Reusing routines and adapting them was something I was always encouraged to do, but it tended to require the original to be well documented. I once had to enhance 3000 lines of Perl, of which about 1% were commented and there was no design documentation. Unfortunately I was not in the position to tell the client to find somebody else. [...] Content analysis details: (0.0 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -0.0 SPF_PASS SPF: sender matches SPF record 0.0 HTML_MESSAGE BODY: HTML included in message X-Scan-Signature: 18c242620d7d7b91a1caf5740aa3e326 Content-Type: multipart/alternative; boundary="Apple-Mail=_9D9267A8-15FF-4CC6-9257-3C5DDBE99278" Subject: Re: LF: Re: PIC Projects with no HEX code X-Spam-Checker-Version: SpamAssassin 2.63 (2004-01-11) on post.thorcom.com X-Spam-Level: X-Spam-Status: No, hits=0.5 required=5.0 tests=HTML_20_30,HTML_MESSAGE autolearn=no version=2.63 X-SA-Exim-Scanned: Yes Sender: owner-rsgb_lf_group@blacksheep.org Precedence: bulk Reply-To: rsgb_lf_group@blacksheep.org X-Listname: rsgb_lf_group X-SA-Exim-Rcpt-To: rs_out_1@blacksheep.org X-SA-Exim-Scanned: No; SAEximRunCond expanded to false x-aol-global-disposition: G X-AOL-SCOLL-SCORE: 0:2:501051584:93952408 X-AOL-SCOLL-URL_COUNT: 0 x-aol-sid: 3039ac1d608d4f9e993c7838 X-AOL-IP: 195.171.43.25 X-AOL-SPF: domain : blacksheep.org SPF : none --Apple-Mail=_9D9267A8-15FF-4CC6-9257-3C5DDBE99278 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=iso-8859-1 Hi Pete, Software production is moving from being a craft skill to an engineering = discipline, and it is at a particularly difficult stage I think. In Reusing routines and adapting them was something I was always encouraged = to do, but it tended to require the original to be well documented. I = once had to enhance 3000 lines of Perl, of which about 1% were commented = and there was no design documentation. Unfortunately I was not in the = position to tell the client to find somebody else. Perseverance will pay off (been there, done that). I don't have detailed = knowledge of PICs but if I can supply generalities that will help I'm = happy to do so (plenty of them in stock). 73 John F5VLF On 30 Apr 2012, at 15:18CEST, M0FMT wrote: > Hi Alan > =20 > Thanks for coming back it was really a rhetorical outburst at yet = other project failure. But in a way its nice to know I am not entirely = alone. > It looks as though you have been there before me. I am relatively new = to PIC programming and I don't know what I am doing. Try to "Save" from = my programmer does not work it saves the text file OK but not = completely. So if loaded into a new or blank PIC it won't run. However = if say down loaded from an operational PIC held in the programmer S/W = and modified at HEX level then load into a blank PIC its OK!! I have a = lot to learn. > =20 > I have a "store" of stolen routines that will run so I am trying to = modify them to my applications. Several have worked OK but its too much = to ask to get a good one every time I suppose. Like changing call signs = and locator in ROM and altering the configuration of speed etc for a CW = beacon. Straight forward keyer no memory is another and Johan's SM6LKM = stuff is very good I have found. A lot of articles promise a lot but = don't deliver, it would be really nice if they always attached a text = file of HEX because otherwise whats the point? Its easy enough to use = character recognition to down load HEX from the printed page ... it = works for me. It just means you have to be very diligent checking each = line of text. A ruler and strong glasses it works every time. > =20 > I suppose I am at the stage where I just want to build projects as = advertised I don't have the knowledge to write from scratch but have = managed to modify some programs. > =20 > This may seem a bit off topic but now we seem to be into automated = Beaconing at each other on MF/LF ......"if you can't beat 'em .......... = " PIC is one way to go . Saves tying a up a PC. > =20 > Any way its stopped raining, garden to work to do and another lot of = Bees to hive. This is not how I saw retirement. > =20 > Thanks for the info and encouragement. > 73 es GL Pete M0FMT IO91UX --Apple-Mail=_9D9267A8-15FF-4CC6-9257-3C5DDBE99278 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=iso-8859-1 Hi = Pete,

Software production is moving from being a = craft skill to an engineering discipline, and it is at a particularly = difficult stage I think. In

Reusing routines = and adapting them was something I was always encouraged to do, but it = tended to require the original to be well documented. I once had to = enhance 3000 lines of Perl, of which about 1% were commented and there = was no design documentation. Unfortunately I was not in the position to = tell the client to find somebody = else.

Perseverance will pay off (been there, = done that). I don't have detailed knowledge of PICs but if I can supply = generalities that will help I'm happy to do so (plenty of them in = stock).

73
John = F5VLF

On 30 Apr 2012, at 15:18CEST, M0FMT = wrote:

 
Thanks for coming back = it was really a rhetorical = outburst at yet other project failure. But in a way its nice to know I = am not entirely alone.
It looks as though you have been there = before me. I am relatively new to PIC programming and I don't know what = I am doing. Try to "Save" from my programmer does not work it saves the = text file OK but not completely. So if loaded into a new  or = blank PIC it won't run. However if say down loaded from an = operational PIC held in the programmer S/W and modified at HEX level then load into a blank PIC its OK!! I = have a lot to learn.
 
I have a "store" of = stolen routines that will run so I am trying to modify them to my applications. Several have worked OK but its too much to ask = to get a good one every time I suppose. Like changing call signs = and locator in ROM and altering the configuration of speed etc for = a CW beacon. Straight forward keyer no memory is another and Johan's = SM6LKM stuff is very good I have found. A lot of articles promise a lot = but don't deliver, it would be really nice if they always attached a = text file of HEX because otherwise whats the point? Its easy enough to = use character recognition to = down load HEX from the printed page ... it works for me. It just means = you have to be very diligent = checking each line of text. A ruler and strong glasses it works every = time.
 
I = suppose I am at the stage where I just want to build projects as advertised I = don't have the knowledge to write from scratch but have = managed to modify some programs.
 
This = may seem a bit off topic but now we seem to be into automated Beaconing = at each other on MF/LF ......"if you can't beat 'em .......... " PIC is = one way to go . Saves tying a up a PC.
 
Any = way its stopped raining, garden to work  to do and another lot of = Bees to hive. This is not how I saw = retirement.
 
Thanks for the info and = encouragement.
73 es GL Pete M0FMT = IO91UX
=
=

= --Apple-Mail=_9D9267A8-15FF-4CC6-9257-3C5DDBE99278--