W3C home > Mailing lists > Public > public-wot-ig@w3.org > March 2015

RE: [use cases] from IETF coman work

From: Romascanu, Dan (Dan) <dromasca@avaya.com>
Date: Tue, 24 Mar 2015 16:01:36 +0000
To: Ari Keränen <ari.keranen@ericsson.com>, "public-wot-ig@w3.org" <public-wot-ig@w3.org>
Message-ID: <9904FB1B0159DA42B0B887B7FA8119CA5C9D0BB5@AZ-FFEXMB04.global.avaya.com>
If there are any questions - please let me know. I am a co-author of this document. 

Regards,

Dan



> -----Original Message-----
> From: Ari Keränen [mailto:ari.keranen@ericsson.com]
> Sent: Tuesday, March 24, 2015 5:34 PM
> To: public-wot-ig@w3.org
> Subject: [use cases] from IETF coman work
> 
> Hi,
> 
> Here's some relevant use cases from the "Management of Networks with
> Constrained Devices: Use Cases" IETF draft:
> https://urldefense.proofpoint.com/v2/url?u=https-

> 3A__tools.ietf.org_html_draft-2Dietf-2Dopsawg-2Dcoman-2Duse-2Dcases-
> 2D05-23section-
> 2D4&d=AwICaQ&c=BFpWQw8bsuKpl1SgiZH64Q&r=I4dzGxR31OcNXCJfQzvlsi
> LQfucBXRucPvdrphpBsFA&m=rTgomGXPVcNLRB2RNDHpaH_bWqVH3qD9lRt
> aWLXCNDI&s=98L9bqhAZ-8j1bzNtWoOFd_smB4e0ONzdV2AJ8L8fIs&e=
> 
> 
> Cheers,
> Ari

Received on Tuesday, 24 March 2015 16:02:34 UTC

This archive was generated by hypermail 2.4.0 : Friday, 17 January 2020 19:26:26 UTC