Ron Ogle said: >X.500 vs. LDAP >X.400 vs. SMTP >OSI vs. TCP/IP >SGML vs. HTML >CMIP vs. SNMP <snip> >You can spend your time and this list's time creating grandiose frameworks, >but history is against you for actually getting it used. Learn from history >this time. Of course, you know that many of these were killed by political fiat, not lack of presence/effectiveness, right? And there's no definitive proof that the choices made were the right ones ( ever heard of complexity theory and Brian Arthur? ) Look up GOSIP V3 ( U.S. ) - that took the rug right out from under OSI because instead of having Govts mandate using the complete OSI protocols and take the pain ( the protocols having been already fscked over by the "industry" players that stuffed the committees, but it ran, was functional and generic ) the Users could now run TCP/IP instead, which gave them a cheaper alternative. The fact that there is no Technical reason backing your argument should give you some insight into how these decisions have previously been derived. On a personal level, BEEP and syslog-ng show me where the "international bureaucrats" who ran the OSI committees went after it folded - they're now writing RFCs. How successful/effective will those be, d'you think? But I bet someone is expecting to make loadsa cash from selling compliant products when ( as you say in a later post ) 80% will do...... As a purely personal observation, your imperative to do this top-down is just wrong. This is a case where us doing it bottom up outside the "process" is right and just. It's the old fashioned "Internet way" Regards, tom. __________________________________________________ Security Consultant/Analyst CSC Ph: +61 8 9429 6478 Email: tcleary2at_private ---------------------------------------------------------------------------------------- This email, including any attachments, is intended only for use by the addressee(s) and may contain confidential and/or personal information and may also be the subject of legal privilege. Any personal information contained in this email is not to be used or disclosed for any purpose other than the purpose for which you have received it. If you are not the intended recipient, you must not disclose or use the information contained in it. In this case, please let me know by return email, delete the message permanently from your system and destroy any copies. ---------------------------------------------------------------------------------------- _______________________________________________ LogAnalysis mailing list LogAnalysisat_private http://lists.shmoo.com/mailman/listinfo/loganalysis
This archive was generated by hypermail 2b30 : Tue Jan 14 2003 - 19:20:37 PST