Editing 2583: Chorded Keyboard

Jump to: navigation, search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 26: Line 26:
 
A big thing among Xennial hackers like Randall and his original audience was customising keyboard uses. The linux operating system was originally designed and used for personal customisation, and people move their configurations from system to system, often customising how things respond to such a degree that other users struggle to make use of their system at all. The first two major text editors, vim and emacs, were composed of different camps of how to efficiently type. The emacs camp believed it was more effective to hit many keys at once to accomplish a large task, but both editors were designed to be highly customisable. It's {{w|QWERTY#Properties|erroneously believed}} that the traditional qwerty keyboard was specifically designed to make typing inefficient so as to reduce engineering burden in making old typewriters responsive and reliable. Given the prevalence of them, it has been common among hackers to remap a keyboard to something they may personally consider more efficient, such as to use a {{w|dvorak keyboard layout|dvorak layout}} layout rather than a qwerty layout. Chorded configurations are an order of magnitude more efficient than the dvorak layout, but are more complex to configure because the result is not at all a one-to-one mapping. The {{w|Stenotype|traditional court reporting device}} is a chorded keyboard, to keep up with human speech.
 
A big thing among Xennial hackers like Randall and his original audience was customising keyboard uses. The linux operating system was originally designed and used for personal customisation, and people move their configurations from system to system, often customising how things respond to such a degree that other users struggle to make use of their system at all. The first two major text editors, vim and emacs, were composed of different camps of how to efficiently type. The emacs camp believed it was more effective to hit many keys at once to accomplish a large task, but both editors were designed to be highly customisable. It's {{w|QWERTY#Properties|erroneously believed}} that the traditional qwerty keyboard was specifically designed to make typing inefficient so as to reduce engineering burden in making old typewriters responsive and reliable. Given the prevalence of them, it has been common among hackers to remap a keyboard to something they may personally consider more efficient, such as to use a {{w|dvorak keyboard layout|dvorak layout}} layout rather than a qwerty layout. Chorded configurations are an order of magnitude more efficient than the dvorak layout, but are more complex to configure because the result is not at all a one-to-one mapping. The {{w|Stenotype|traditional court reporting device}} is a chorded keyboard, to keep up with human speech.
  
Using a combination of normally single-use keys (the 'H' and a cursor) with others, including modifiers ('shift' and 'control'), i.e. 'chording' ''with'' his keyboard, is a kind of key combination found traditionally in emacs and operating system commands (such as pressing ctrl+alt+c, to copy a selection to clipboard). The ballad then comes across as an ode to system customisation and the practice of user-interface hacking, wherein a computer user knows how to rebuild their interface in almost any way they desire.
+
Using a combination of normally single-use keys (the 'H' and a cursor) with others, including modifiers ('shift' and 'control'), i.e. 'chording' ''with'' his keyboard, is a kind of key combination found traditionally in emacs & operating system commands (such as pressing ctrl+alt+c, to copy a selection to clipboard). The ballad then comes across as an ode to system customisation and the practice of user-interface hacking, wherein a computer user knows how to rebuild their interface in almost any way they desire.
  
The chording example goes beyond mainstream use (shift and an alphabetic character changes the character case, whilst ctrl and a character may initiate an editing command) or mainstream multi-modifier combinations (ctrl, alt and the 'e' may result in the 'é', where the keyboard does not otherwise support it) and even goes beyond [[378: Real Programmers|emacs-like command ''sequences'']] which are generally software-specific. It seems likely that a setup such as that depicted in this comic is handled within the computer, either defined within the OS (all mainstream desktop operating systems support alternative keyboard mapping and customisable key-combinations, often for accessibility and international keyboard support), or (as is often the case with specialist configurable gaming keyboards) via the driver installed to mediate such esoteric keyboard combinations as the user has predefined for themselves.
+
The chording example goes beyond mainstream use (shift and an alphabetic character changes the character case, whilst ctrl and a character may initiate an editing command) or mainstream multi-modifier combinations (ctrl, alt and the 'e' may result in the 'é', where the keyboard does not otherwise support it) and even goes beyond [[378: Real Programmers|emacs-like command ''sequences'']] which are generally software-specific. It seems likely that a setup such as that depicted in this comic is handled within the computer, either defined within the OS (all mainstream desktop operating systems support alternative keyboard mapping & customisable key-combinations, often for accessibility & international keyboard support), or (as is often the case with specialist configurable gaming keyboards) via the driver installed to mediate such esoteric keyboard combinations as the user has predefined for themselves.
  
 
Cueball's combination-keypress may in fact be better termed a 'macro', in some contexts. The single event, somehow triggered by this particular simultaneous multi-key input, invokes the injection of a pre-specified sequence of standard characters into the appropriate text-buffer/-stream, in lieu of manual per-character input.
 
Cueball's combination-keypress may in fact be better termed a 'macro', in some contexts. The single event, somehow triggered by this particular simultaneous multi-key input, invokes the injection of a pre-specified sequence of standard characters into the appropriate text-buffer/-stream, in lieu of manual per-character input.

Please note that all contributions to explain xkcd may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see explain xkcd:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel | Editing help (opens in new window)