Re: [77attendees] Ad hoc meetings (Was: Re: Bar BoF: ip traceback)

Geoff Thompson <thompson@ieee.org> Wed, 31 March 2010 03:21 UTC

Return-Path: <thompson@ieee.org>
X-Original-To: 77attendees@core3.amsl.com
Delivered-To: 77attendees@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C02253A69F4 for <77attendees@core3.amsl.com>; Tue, 30 Mar 2010 20:21:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.468
X-Spam-Level:
X-Spam-Status: No, score=-101.468 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13, UNPARSEABLE_RELAY=0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H8qqPTq1-1zc for <77attendees@core3.amsl.com>; Tue, 30 Mar 2010 20:21:32 -0700 (PDT)
Received: from smtp105.prem.mail.ac4.yahoo.com (smtp105.prem.mail.ac4.yahoo.com [76.13.13.44]) by core3.amsl.com (Postfix) with SMTP id 3E8533A6977 for <77attendees@ietf.org>; Tue, 30 Mar 2010 20:21:32 -0700 (PDT)
Received: (qmail 23398 invoked from network); 31 Mar 2010 03:21:59 -0000
Received: from user-64-9-238-93.googlewifi.com (thompson@64.9.238.93 with plain) by smtp105.prem.mail.ac4.yahoo.com with SMTP; 30 Mar 2010 20:21:59 -0700 PDT
X-Yahoo-SMTP: QyU90.qswBBpdAOL14e1mfwUogr5DY5wzs_aWTD7HWypLbttNQmnq7k-
X-YMail-OSG: RI_nCyoVM1kbQdMoD1SPPN37MTHf8GgJc9OPXZBffAWOk0bty2pnKtl465lquNBIdR9xFRZfMF6rqLsBnL0HGCgAXqK3to9mkJBoWuldhOn7LxrAL6IbsE9S85bL.ED9C7CEoPX6R6ce3R5cekVtyTL56AceB_2t8wqgdeUz68fjhHWqmP1wD2BX0uvX3uU09oBHR7q4sYX5HacIX56FZMjgDfLCk628kSTa0lSEeq8BdCcbGht4v52pPlg3KUCZWUO7
X-Yahoo-Newman-Property: ymail-3
Message-ID: <4BB2BFD0.6050403@ieee.org>
Date: Tue, 30 Mar 2010 20:21:52 -0700
From: Geoff Thompson <thompson@ieee.org>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090408 Eudora/3.0b2
MIME-Version: 1.0
To: Melinda Shore <shore@arsc.edu>
References: <4BA8BCE3.5020309@is.naist.jp> <4BA95B6A.5040707@is.naist.jp> <4BAB0464.2010307@is.naist.jp> <4BAB7A4D.7070904@piuha.net> <8133D17D-D9B6-40A6-AE9B-80BF90A5223D@checkpoint.com> <050005AF2D0F493AB38639A33748E8D6@china.huawei.com> <8B0A9FCBB9832F43971E38010638454F03E24ED320@SISPE7MB1.commscope.com> <4BABD0B2.9050003@piuha.net> <4BABDB19.8060403@gmail.com> <027f01cacc69$4847ae10$d8d70a30$@org> <23E6E51A-5D3B-4F94-B32F-7F3545003E03@cisco.com> <53720E57-D96D-458A-8178-5CC3DB496FAD@nokia.com> <4BAC239C.4060004@gmail.com> <A6562703-7EF4-4B9E-9E78-AB30F804DD45@tzi.org> <4BB0B975.7040100@joelhalpern.com> <DADD7EAD88AB484D8CCC328D40214CCD0167972D37@EXPO10.exchange.mit.edu> <m2k4stbq9g.wl%randy@psg.com> <4BB24841.2080109@cisco.com> <4BB25142.20904@gmail.com> <4BB26010.9090405@gmail.com> <CDF5BB9C-F2D1-4146-B2E1-F7FD5CC39829@americafree.tv> <B0456F98-4E7D-4547-9BB7-E826275B243D@arsc.edu>
In-Reply-To: <B0456F98-4E7D-4547-9BB7-E826275B243D@arsc.edu>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: 77attendees@ietf.org
Subject: Re: [77attendees] Ad hoc meetings (Was: Re: Bar BoF: ip traceback)
X-BeenThere: 77attendees@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: thompson@ieee.org
List-Id: <77attendees.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/77attendees>, <mailto:77attendees-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/77attendees>
List-Post: <mailto:77attendees@ietf.org>
List-Help: <mailto:77attendees-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/77attendees>, <mailto:77attendees-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 31 Mar 2010 03:21:34 -0000

On 3/30/10 4:39 PM, Melinda Shore wrote:
> On Mar 30, 2010, at 3:16 PM, Marshall Eubanks wrote:
>> They are subject to the Note Well. That is certainly a rule
>
> Why?
In an attempt to keep the IETF in control of things that could be 
construed to have the appearance of anti-trust activities.
Also, to establish that the IETF has been diligent in keeping the folks 
at the IETF within the straight and narrow of legally permitted 
activities for competitors.

Meetings where competitors make agreements to cooperate are legally suspect.
Standards organizations have to exercise care to protect themselves and 
their participants.

Geoff
>
> Melinda
>
> _______________________________________________
> 77attendees mailing list
> 77attendees@ietf.org
> https://www.ietf.org/mailman/listinfo/77attendees
>