Hi to all.

We are going to explore the i18n capabilities of Isis. Is there any 
documentation, example online or any hints that can be useful?

Thanks in advance,

Oscar

Reply via email to