Re: Final Announcement of Qualified Volunteers

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 7/10/2013 8:52 AM, Bob Hinden wrote:
On Jul 9, 2013, at 5:23 PM, l.wood@xxxxxxxxxxxx wrote:
I do recall a case where both chairs of a WG belonged to a Major Organization.
...
I can think of one company who uses to IETF to have internal arguments.  But at the same time, I can think of another company who is very aligned in how they participate in the IETF.  Many others are somewhere in between.  There isn't a single model here.


Bob,

If one were doing a broad discussion about the role of the IETF within various organizations' operations, your point would be interesting.

For the current discussion, I suspect it's not all the relevant, since I understand this thread to be about the /potential/ for undue influence by an organization. Anecdotes about the potential being exercised (or not) provide some seasoning to the discussion but do not affect the essence of the concern.

It doesn't matter whether that potential is exercised. What matters is the exposure of the IETF to that potential and how the IETF can reduce it.

As with all security risks, the requirement is to anticipate them and protect against them, rather than wait to fix things afterwards...

d/


--
Dave Crocker
Brandenburg InternetWorking
bbiw.net




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]