Just curious, but section 3.3 Exceptions of this document has sections 3.3.1 and 3.3.2 which are pretty much exact duplicates of each other, exception being Lisa vs. Harry. Was this intentional?
Thanks,
Chris
Christopher Rizzo
Xerox Corporation
GDG/Discovery/Advance Technology
26600 SW Parkway Ave.
Wilsonville, OR 97070-9251
Phone: (585) 314-6936
Email: Christopher.Rizzo at xerox.com
"The realization came over me with full force that a good part of the remainder of my life was going to be spent in finding errors in my own programs."
-Maurice Wilkes, Memoirs of a Computer Pioneer
On 1/17/19, 4:00 PM, "ipp on behalf of Kennedy, Smith (Wireless & Standards Architect)" <ipp-bounces at pwg.org on behalf of smith.kennedy at hp.com> wrote:
Greetings,
This message begins the IPP workgroup Last Call of the IPP Authentication Methods best practice draft, available at:
https://ftp.pwg.org/pub/pwg/ipp/wd/wd-ippauth-20190117.odthttps://ftp.pwg.org/pub/pwg/ipp/wd/wd-ippauth-20190117.pdfhttps://ftp.pwg.org/pub/pwg/ipp/wd/wd-ippauth-20190117-rev.pdf
Please respond with any feedback or comments by doing a "reply all" to this message.
This last call will end on January 31, 2019 at 10pm PT.
Cheers,
Smith
/**
Smith Kennedy
HP Inc.
*/
_______________________________________________
ipp mailing list
ipp at pwg.orghttps://www.pwg.org/mailman/listinfo/ipp