XML standard for documenting and IDE interaction

roussell said:
I think you need to look at other platforms like the Beagle Bone Black and the Raspberry Pi. you keep trying to turn the CAI boards into something more substantial because they don't fit your use-case. It sounds like you just need a more advanced platform.
 
Yes and no. I learned that WC32 is using the same platform compared to my favourite ARM CORTEX M3, so its merely a matter of software what we get as functionality not a matter of hardware restrictions.
But you are right, there are plenty of new competitors out offering now Cortex M4 and M0 coprocessor bundles, WiFi  and other sophisticated features, but not enough sensor support for the time being on those solutions.
In medium term the focus is on system logic and IP not on hardware, which will no longer introduce limits,  offering performing CPUs and enough memory.... just wait and see
 
Efried said:
What-if you are wrong on that,
 
Connection: Keep-Alive..Authorization: Basic YWRtaW46cGFzc3dvcmQ=....
 
(ok, it's trivial to decode, but it's not CLEAR TEXT)
 
 
Efried said:
would you mind being more polite to me?
 
That is a two-way street.
 
you are right,  it is techically coded if using the right html input field, but this has the same quality as plain text.
rossw said:
Connection: Keep-Alive..Authorization: Basic YWRtaW46cGFzc3dvcmQ=....
 
(ok, it's trivial to decode, but it's not CLEAR TEXT)
 
 
 
 
That is a two-way street.
 
Efried said:
you are right,  it is techically coded if using the right html input field, but this has the same quality as plain text.
 
*sigh*. My last reply to you. You really need to learn to check stuff properly.
It's nothing to do with html or input fields, or using the "right" input field.
It's the http auth.
basic auth (the lowest 'security') uses the base64 coding. It has NOTHING WHATSOEVER TO DO WITH HTML.
Most other auth schemes (even digest) uses significantly more secure systems.
NONE OF THEM WHATSOEVER USE PLAN TEXT.
(I'm not talking about application layer, user-implemented password schemes which frequently ARE sent in plain text, but that isn't what you started moaning about and it isn't what I'm talking about here).
 
Ende. I will not be wasting my time explaining fundamental principles to someone who clearly can't be bothered to research them for themselves.
 
Back
Top