After reading through that fairly lengthy thread, I'm afraid that I can
no longer tell exactly what is being proposed.  Who has read access?
Who has write access?  Bugs are handled where, and by whom?  Are we
considering a fairly tightly controlled system, or a wild free-for-all?
 Exactly which problem are we proposing to solve here?

If someone could succinctly summarize the current schools of thought,
I'd be quite indebted.

Thanks,
g2boojum

Attachment: pgp7AyKI0mdf3.pgp
Description: PGP signature

Reply via email to