Subject | Re: Paintshop and Corel |
From | Tony Cooper |
Date | 11/26/2013 16:18 (11/26/2013 10:18) |
Message-ID | <fud999l3tv64rpm1ieamc98aakb6hlc069@4ax.com> |
Client | |
Newsgroups | rec.photo.digital |
Follows | Sandman |
Followups | Savageduck (8m) Sandman (17m) > Tony Cooper Mayayana (32m) J. Clarke (4h & 36m) > Tony Cooper |
SandmanThink really hard and you might begin to understand that an automatic backup action follows the protocol set by the developer.
In article <lcj89959nqrbfjkcn7kb7pa52kkcesbtlh@4ax.com>, Tony Cooper wrote:SandmanIt is automatic *for the user* and not a protocol *for the user*,Tony Cooper
I have no idea what you're trying to say there. What does "for the user" mean?
I... don't know how to write it in any simpler form.Sandmanjust like erasing a hard drive isn't a protocol *for the user* since all they do is press a button,Tony Cooper
In this case, though you are describing it poorly, you are referring to an action that does not need a user-defined protocol because the user does not need a standard set of steps to accomplish the action.
Just like automatic backup, then. Heeey, sounds like what I've been saying all along, doesn't it?
And the user adds his own protocol requirements of frequency and destination to the backup protocol of the developer.Tony CooperSandman
The backup protocol is different because it can involve user-defined additions to the built-in protocol.
"Can"? Are you now saying that both file copying and backup are governed by protocols but you would only call backup a "protocol" since you "can" add things to this supposed protocol?
Here is the user implementing backup in an automatic system:The user is not adding anything to the protocol by clicking any of the boxes. That's a step in backup action routine.
http://tinyurl.com/pju45q7
Please define in clear terms how he or she is adding items to the protocol.
You have used the same link for both examples.Tony CooperSandman
The user determines a backup protocol that determines the frequency of backups and the location of where the backups are sent.
Again, he or she attaches an external drive, and this is shown:
http://tinyurl.com/pju45q7
No settings for frequency, and by hitting that button, the system already knows the location. Boom, all done. Automatic backup every hour around the clock.I am not an Apple user, so I don't know what is done in the way of user-defined additions to the backup protocol, but I assume the user has set the location at some point. That's a user-defined addition.
No backup functions are protocols. Try to get this into your head. A function is not a protocol. A protocol can call for a function, though.Tony CooperSandman
Some programs, but not all by any means, allow the user to add this information and have that protocol followed automatically in the future.
So some backup functions are protocols and some are not? How automatic does it need to become to not be a protocol?
You're so tangled up here, it's not even funny.Well, you certainly spilled out of the car in the main ring.
Nospam only said he hadn't heard the term being used, not that you were wrong to use it. He didn't argue with you, but you took the opportunity to create yet another Tony Circus where you can argue about anything for any amount of time.