<br><font size=2 face="sans-serif">Folks,</font>
<br>
<br><font size=2 face="sans-serif">I'd like any last comments people have
on the structure for the Best Practices document. As I outlined in
my note back on December 15th:</font>
<br>
<br><font size=2 face="sans-serif"> http://voipsa.org/pipermail/bestpractices_voipsa.org/2006-December/000013.html</font>
<br>
<br><font size=2 face="sans-serif">the general consensus I'm seeing is
that we structure the document around functional areas - #2 on my list
in the wiki. Based on a lack of interest, I'm going to kill off #1
(threat taxonomy) and #3 (tech components) which leaves just #2 (functional)
and the new #4 (interfaces, based on Eugene Nechamkin's contribution).
The comments I am getting, both on- and off-list, are pretty much
all in support of #2.</font>
<br>
<br><font size=2 face="sans-serif">In the interest of moving things along,
I'm going to say that 48 hours from now... Thursday morning here in the
US, I'd like to proceed with setting up the document according to a structure
- which right now looks like #2.</font>
<br>
<br><font size=2 face="sans-serif">IF YOU HAVE ANY FINAL COMMENTS and want
to weigh in for or against #2 or #4, please do so now so that we can bury
this issue and get going!</font>
<br>
<br><font size=2 face="sans-serif">Thank you,<br>
Dan</font>
<br>
<br><font size=2 face="sans-serif">-- <br>
Dan York, CISSP<br>
Dir of IP Technology, Office of the CTO<br>
Mitel Corp. http://www.mitel.com<br>
dan_york@mitel.com +1-613-592-2122<br>
PGP key (F7E3C3B4) available for <br>
secure communication<br>
<br>
</font>