I'd help organize. How do these usually work? Some worthy package is selected for hacking? People hack whatever they like?
-- Jason Dusek _______________________________________________ Haskell-Cafe mailing list [email protected] http://www.haskell.org/mailman/listinfo/haskell-cafe
