Keep in mind that the purpose of this document is to serve as a
starting point or a reference point to which we can refer to as we
propose changes to the underlying core data model. A "second" PoBoL
RFC is being organized for the purpose of critique and proposal for
changes. This 2 RFC approach allows us to say 1st how things are and
2nd how and why we should change it. Therefore you should propose how
to make PoBoL better, but say it is for the "second" PoBoL RFC.
Attached also is the pobol_0.4.zip which contains files referred to in
Appendix A of RFC 31.
Thanks and looking forward to your responses,
-Michal
Thank you again,
mike
On Mon, May 4, 2009 at 4:33 PM, Sean Sleight <sle...@u.washington.edu> wrote:
> OK, here's just some very minor comments to the RFC since some of the other
> points I thought of have already been brought up, but it looks great!
>
> 1. In the Acknowledgements section, should probably say, "This workshop was
> sponsored by the Microsoft..."
>
> 2. For consistency, in the next paragraph, Mac should be changed to
> Mackenzie.
>
> 3. In 10.1.4, you say "used in prokaryotic cell engineering", but probably
> should just be changed to "cell engineering" since yeast are commonly
> engineered cells.
>
> 4. In 11.1, I was curious why you used a different example F2620 when you
> could have used the previous example I0462 since that one has already been
> described.
>
> 5. In section 13 obviously the other authors contact info should be
> included.
>
> 6. Section 15 "Appendix A" is missing the second p.
>
> That's it!
> Sean
>
> Michal Galdzicki wrote:
>>
>> +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
>>
>> Warning text added to this message by
>> UW Technology
>> he...@u.washington.edu
>>
>> ATTACHMENTS RENAMED
>>
>> This message came to the UW with an attached file with a
>> name that ended in .zip or .exe. Because files of this
>> type can automatically infect computers with a virus, the
>> attachment has been renamed.
>>
>> o If the sender of the message is known to you, and you
>> were expecting the message, you need simply save the
>> attachment using the original name or save it as is and
>> rename it back to the original name on your computer.
>>
>> o If the sender is not known to you, it is possible that
>> the attachment contains a virus and you may simply
>> delete the message.
>>
>> o If this message claims to be official and
>> instructs you to open the attachment to get
>> important information, it is likely to be fake.
>> Virus writers are increasingly using sophisticated
>> social engineering techniques to mislead people.
>>
>> UW Technology never sends important information about your
>> account or password in an email attachment. Instead
>> you will be directed to a web page on a UW Technology site.
>>
>> Please contact he...@u.washington.edu or your local
>> computing support if you have further questions.
>>
>> Warning text added to this message by
>> UW Technology
>> he...@u.washington.edu
>> +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++