Re: Possible BofF question -- I18n (was: Re: Possible OBF question -- I18n)

John C Klensin <john-ietf@jck.com> Fri, 01 June 2018 19:17 UTC

Return-Path: <john-ietf@jck.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 68259126CB6 for <ietf@ietfa.amsl.com>; Fri, 1 Jun 2018 12:17:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YMWlqyyTwAfu for <ietf@ietfa.amsl.com>; Fri, 1 Jun 2018 12:17:29 -0700 (PDT)
Received: from bsa2.jck.com (ns.jck.com [70.88.254.51]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9DDBC124234 for <ietf@ietf.org>; Fri, 1 Jun 2018 12:17:29 -0700 (PDT)
Received: from [198.252.137.10] (helo=PSB) by bsa2.jck.com with esmtp (Exim 4.82 (FreeBSD)) (envelope-from <john-ietf@jck.com>) id 1fOpYE-000JdG-VG; Fri, 01 Jun 2018 15:17:26 -0400
Date: Fri, 01 Jun 2018 15:17:21 -0400
From: John C Klensin <john-ietf@jck.com>
To: Nico Williams <nico@cryptonector.com>, Peter Saint-Andre <stpeter@mozilla.com>
cc: John R Levine <johnl@taugh.com>, IETF general list <ietf@ietf.org>
Subject: Re: Possible BofF question -- I18n (was: Re: Possible OBF question -- I18n)
Message-ID: <3294968B18AF30572BD64040@PSB>
In-Reply-To: <CAK3OfOigxL6A1eX0ZDAezpKqcS=FAMAzZ3ULkz297qT8pCdzsQ@mail.gmail.com>
References: <20180530231127.17198276FEE3@ary.qy> <071E6235FE7B088A2B56A238@PSB> <0093E2CD-670E-47B6-A286-4FDEB140FAD9@frobbit.se> <20180531172228.GF14446@localhost> <383c2404-7beb-63e9-b2b2-e75fd1b174f1@mozilla.com> <20180601041949.GH14446@localhost> <A13FFF23-49BD-459D-8B5B-D3448154EEBC@frobbit.se> <20180601151053.GI14446@localhost> <2584adb9-1622-8b49-7236-ecc7dd374974@mozilla.com> <alpine.OSX.2.21.1806011219340.7621@ary.qy> <712a0de5-dd4e-9fa7-4cfd-fc7a80144805@mozilla.com> <CAK3OfOigxL6A1eX0ZDAezpKqcS=FAMAzZ3ULkz297qT8pCdzsQ@mail.gmail.com>
X-Mailer: Mulberry/4.0.8 (Win32)
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
X-SA-Exim-Connect-IP: 198.252.137.10
X-SA-Exim-Mail-From: john-ietf@jck.com
X-SA-Exim-Scanned: No (on bsa2.jck.com); SAEximRunCond expanded to false
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/HU9XKzesPbg3WWXRjfr7pzYgbmc>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Jun 2018 19:17:32 -0000

One last comment and then I have to move on to other things
today....

--On Friday, June 1, 2018 13:32 -0500 Nico Williams
<nico@cryptonector.com> wrote:

>> To pursue the analogy, AFAIK (correct me if I'm wrong) we
>> don't have that many pure cryptography experts at the IETF.
>> We do have folks who know enough about crypto to make
>> intelligent, well-informed recommendations with regard to the
>> use of cryptography in Internet protocols. Perhaps that's
>> mostly what we need for i18n, too. Whether we call this
>> "expertise" or "competence" doesn't especially matter. (FWIW,
>> although like Nico I've learned plenty about i18n and I've
>> even authored some RFCs on the topic, I do *not* consider
>> myself an expert.)
> 
> This is my point exactly.  We can make do with the
> participants that we have.  And since they are all we have,
> making do is what wet must do.  Of course, we may attract new
> participants, and we should educate the ones we already have.
> So let's do that.

Let me pursue the crypto analogy a bit.   I contend that the
main problem with i18n expertise (or competence) in the IETF is
not what people know and have learned but that we've had a lot
of people participating in the debates who don't know what they
don't know.  As least when I was hanging around with security
experts, that was rarely a problem and people who had it were
rapidly educated or disabused about the level of knowledge.
That is not "negativity", it is trying to both educate and to
get the S/N ratio to a level at which serious discussions are
possible.  

Some of you know that I spend several years primarily working on
food composition data.  We used to have a saying that the number
of people in the world with strong opinions about food, food
nomenclature, and what was an was not good to eat (from either a
health or enjoyment standpoint) was roughly equal to the number
of people in the world who had the privilege of eating
regularly.  Those opinions and beliefs were sufficiently tied to
strong cultural norms that most of those people, when confronted
with science, facts, or counterexamples simply became more
insistent, and often belligerent, about their positions.  

The IETF I18n situation feels a lot like that, with the
condition of someone expressing strong opinions or behaving as
if they believe they are experts being that they speak and/or
read language.  I'm not aware of anyone who has contributed
significantly to I18n work in the IETF who is unwilling to
explain and educate as long as there is some evidence of
willingness to listen and learn.  The thing that drive people
off and contributes to a sense of hopeless frustration is the
noise from people who don't know what they don't know and who,
from their behavior patterns, aren't interested in finding out.  

I'd like to think that problem does not occur in
security-related work, at least to the same extent.  Maybe it is
because everything has to be learned and no one things they were
born with security knowledge.   Maybe because there are clearer
knowledge categories and boundaries.  Since the crypto expert
example was used, probably most of those who aren't don't think
they are and are swiftly (and I hope gentle) corrected.   I've
also observed that, when real crypto experts are needed, the
Security Area is able to find them, talk with them, and
understand and make use of the explanations.   The analogy of
that may not be the case for I18n and the N/S ratio doesn't help.

    john