Stefano Mazzocchi dijo: > There are two possible methodologies I see: > > 1) big to small -> give users all possible freedom and restrict that > freedom once we understand potentially problematic usages. > > 2) small to big -> give users the least possible freedom based on some > required functionality and grow as the users express their needs. > > The actual FOM design reflects methodology #1. > > The FOM design that was proposed by myself and Ricardo follows > methodology #2. > > Now, the vote I ask is: > > which methodology would you like to be applied?
>From a security point of view the answer is clear: 2 >From a developer point of view I think: 1 Really, to answer this question is dificult. :) Antonio Gallardo