I'd help organize. How do these usually work? Some worthy package
  is selected for hacking? People hack whatever they like?

--
Jason Dusek
_______________________________________________
Haskell-Cafe mailing list
[email protected]
http://www.haskell.org/mailman/listinfo/haskell-cafe

Reply via email to