No one has asked you to change your mind!
-Original Message-
From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of ext
Huub van Helvoort
Sent: Friday, March 23, 2012 11:12 PM
To: ietf@ietf.org
Subject: Re: Last Call: draft-ietf-mpls-tp-oam-analysis-08.txt
We certainly have running code, widely deployed (although my request on the
MPLS list as to which manufacturers' boxes were involved never did get
answered:-(
Hope these help:
http://tools.ietf.org/html/draft-fang-mpls-tp-oam-considerations
IETF Meeting Registration System
Attendance List
IETF 83
Paris, France
March 25-30, 2012
Last updated Sunday, March 25, 2012 at 06:24:32 PDT
1460 registrations:
https://www.ietf.org/registration/ietf83/attendance.py
Is the ISOC annual buget now $34,000,000 ?
What is the ICANN annual budget ?
Hi Jim,
I don't think your questions are relevant to this IETF list.
You can try in ISOC or ICANN exploders.
Regards,
Jordi Palet
(speaking as IETF Seargeant-at-arms)
-Mensaje original-
De: Jim Fleming ietf.fact.ch...@gmail.com
Responder a: ietf.fact.ch...@gmail.com
Fecha: Sun,
IETF Meeting Registration System
Attendance List
IETF 83
Paris, France
March 25-30, 2012
https://www.ietf.org/registration/ietf83/attendance.py
What (current) Internet Engineering protocols, software, etc. are the
following people working on ?
What are the RFCs they are authoring ?
St Amour
congrats on the database and select/group queries, please to move to a
list that cares.
On Sun, Mar 25, 2012 at 11:20 AM, Jim Fleming ietf.fact.ch...@gmail.com wrote:
IETF Meeting Registration System
Attendance List
IETF 83
Paris, France
March 25-30, 2012
Randy (oops, Jim), what is the meaning of the YES/NO?
BTW most NICs (AFNIC for instance) are also not-profit public benefit.
And you can add the few persons who pay themselves the registration,
Remi Despres, etc.
Regards
francis.dup...@fdupont.fr (also fdup...@isc.org)
This is a repeat last call, just to include the downref (omitted by a careless
AD:-)
The IESG has received a request from the Kerberos WG (krb-wg) to consider
the following document:
- 'Deprecate DES, RC4-HMAC-EXP, and other weak cryptographic algorithms
in Kerberos'