Stefano Mazzocchi dijo:
> There are two possible methodologies I see:
>
>  1) big to small -> give users all possible freedom and restrict that
> freedom once we understand potentially problematic usages.
>
>  2) small to big -> give users the least possible freedom based on some
> required functionality and grow as the users express their needs.
>
> The actual FOM design reflects methodology #1.
>
> The FOM design that was proposed by myself and Ricardo follows
> methodology #2.
>
> Now, the vote I ask is:
>
>  which methodology would you like to be applied?

>From a security point of view the answer is clear: 2
>From a developer point of view I think: 1

Really, to answer this question is dificult. :)

Antonio Gallardo



Reply via email to