[Date Prev][Date Next] [Chronological] [Thread] [Top]

Re: Tw bobs worth on TOP, LDAP standards process and subschemasub entry attribute usage in rootDSE



Mark,

Your long message was very informative and comprehensive (so I 
have not reproduced it below). But unfortunately you have indicated 
that nothing can really be done about a manufacturer (if one 
happened to exist) that:

i) says in all its marketing blurb that it supports LDAP, because it 
knows that everyone wants this

ii) purposefully ensures that its LDAP implementation will not 
interwork with all the other ones that are around

iii) manages to get the largest market share because it bundles its 
LDAP software with other software that already has a large market 
share

iv) consequently forces everyone else to follow it in its non 
conformant implementation, as simple minded customers dont really 
care who is following the standard or not, they just want Minion A to 
interwork with Giant B.

In the end the IETF re-write the standard to agree with Giant B, as 
everyone now does it this way anyway, so Giant B then changes its 
implementation to be non-conformant again, as Giant B does not 
really like standards other than its own.

I'm glad we dont have any giants like B around here :-)

David


***************************************************

David Chadwick
IT Institute, University of Salford, Salford M5 4WT
Tel +44 161 295 5351  Fax +44 161 745 8169
*NEW* Mobile +44 790 167 0359 *NEW*
Email D.W.Chadwick@iti.salford.ac.uk
Home Page  http://www.salford.ac.uk/its024/chadwick.htm
Understanding X.500  http://www.salford.ac.uk/its024/X500.htm
X.500/LDAP Seminars http://www.salford.ac.uk/its024/seminars.htm
Entrust key validation string MLJ9-DU5T-HV8J

***************************************************