Leo, Leo Vegoda wrote, On 17/04/2012 00:22:
Hi Denis,
On Apr 16, 2012, at 2:32 pm, Denis Walker wrote:
I am not aware of any formal big picture, but I follow the mailing list as closely as I am sure you and many others do. As you will know many of these issues invoke much discussion on the list.
I think we only get one opportunity to do this right. Doing it without a strategy that's been agreed by the whole community seems quite scary.
While I think that Frank has given a good outline, what is "this" to your mind? Is it abuse contact management, is it data verification? Part of the problem that we hit with the ACM-TF is that data verification is a very big thing and people have a lot of reactions to it. This lead to a decision to try to get the abuse-c nailed down and integrated, before, should the community or TF decide, looking at data verification, and indeed the scope of that. I'll be honest, I don't see the 2011-06 and any data verification proposal as being that tightly integrated, but I'll accept not everyone shares my view of the world, so if you could expand on your fears, or why you feel it is so vital, that would be great. Thanks, Brian.