- From: Romascanu, Dan (Dan) <dromasca@avaya.com>
- Date: Tue, 24 Mar 2015 16:01:36 +0000
- To: Ari Keränen <ari.keranen@ericsson.com>, "public-wot-ig@w3.org" <public-wot-ig@w3.org>
If there are any questions - please let me know. I am a co-author of this document. Regards, Dan > -----Original Message----- > From: Ari Keränen [mailto:ari.keranen@ericsson.com] > Sent: Tuesday, March 24, 2015 5:34 PM > To: public-wot-ig@w3.org > Subject: [use cases] from IETF coman work > > Hi, > > Here's some relevant use cases from the "Management of Networks with > Constrained Devices: Use Cases" IETF draft: > https://urldefense.proofpoint.com/v2/url?u=https- > 3A__tools.ietf.org_html_draft-2Dietf-2Dopsawg-2Dcoman-2Duse-2Dcases- > 2D05-23section- > 2D4&d=AwICaQ&c=BFpWQw8bsuKpl1SgiZH64Q&r=I4dzGxR31OcNXCJfQzvlsi > LQfucBXRucPvdrphpBsFA&m=rTgomGXPVcNLRB2RNDHpaH_bWqVH3qD9lRt > aWLXCNDI&s=98L9bqhAZ-8j1bzNtWoOFd_smB4e0ONzdV2AJ8L8fIs&e= > > > Cheers, > Ari
Received on Tuesday, 24 March 2015 16:02:34 UTC