Re: [Nethistory] Collecting the history of networking, a possible methodology

Dave Crocker <dhc@dcrocker.net> Sun, 26 May 2013 01:40 UTC

Return-Path: <dhc@dcrocker.net>
X-Original-To: nethistory@ietfa.amsl.com
Delivered-To: nethistory@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AD60A21F8C4C for <nethistory@ietfa.amsl.com>; Sat, 25 May 2013 18:40:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5WB92-E5Qs6r for <nethistory@ietfa.amsl.com>; Sat, 25 May 2013 18:40:52 -0700 (PDT)
Received: from sbh17.songbird.com (sbh17.songbird.com [72.52.113.17]) by ietfa.amsl.com (Postfix) with ESMTP id BF0A221F8C38 for <nethistory@ietf.org>; Sat, 25 May 2013 18:40:52 -0700 (PDT)
Received: from [192.168.10.240] ([91.113.251.136]) (authenticated bits=0) by sbh17.songbird.com (8.13.8/8.13.8) with ESMTP id r4Q1ejVj013903 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT) for <nethistory@ietf.org>; Sat, 25 May 2013 18:40:51 -0700
Message-ID: <51A1681B.5030206@dcrocker.net>
Date: Sun, 26 May 2013 03:40:43 +0200
From: Dave Crocker <dhc@dcrocker.net>
Organization: Brandenburg InternetWorking
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20130509 Thunderbird/17.0.6
MIME-Version: 1.0
To: nethistory@ietf.org
References: <2F1D9541-67A5-4EB7-BA3C-3C8DABC07606@earthlink.net> <519E00B4.5080600@internet2.edu> <C5D33F76-1014-4945-BAE7-C7E580C1B108@hopcount.ca> <519E7940.9090401@gmail.com> <51A02900.7010507@3kitty.org>
In-Reply-To: <51A02900.7010507@3kitty.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0 (sbh17.songbird.com [72.52.113.66]); Sat, 25 May 2013 18:40:52 -0700 (PDT)
Subject: Re: [Nethistory] Collecting the history of networking, a possible methodology
X-BeenThere: nethistory@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: dcrocker@bbiw.net
List-Id: Matching net historical materials with institutions that may preserve them <nethistory.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nethistory>, <mailto:nethistory-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/nethistory>
List-Post: <mailto:nethistory@ietf.org>
List-Help: <mailto:nethistory-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nethistory>, <mailto:nethistory-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 26 May 2013 01:40:57 -0000

On 5/25/2013 4:59 AM, Jack Haverty wrote:
> For example, I recently did some garage archaeology and unearthed my
> notebooks from the late 70s and early 80s with all my notes from various
> meetings of TCP, IP, ICCB/IAB, and other meetings of the early working
> groups.  If I scan them before the ink blurs beyond readability, where
> should I FTP the files...?


When considering an effort to specify a mechanism, I'm a fan of use 
cases, to guide everyone's thinking.  Use cases are typically simple, 
concrete, direct and realistic.

The above seems to me to be one of the more iconic examples for the 
current effort.  I'd think that if the effort develops a useful, 
scalable answer, it will have significantly improved the world's 
long-term archiving of Internet historical data.

What other questions should be on the list?

d/

-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net