On Sun, Apr 8, 2012 at 12:28 AM, Guntupalli Karunakar
<karuna...@indlinux.org> wrote:

> Going back in time, when we did not yet have Indic standardized or
> it was not working yet, there were steps to use it with some hacks,
> some which in long run either died out, or evolved into a standard
> solution. So while above aspect may hold, but it should not prevent
> in making an attempt to solve the problem  in question.

Here's the thing. I respect and appreciate the fact that you are
trying to help Swarup out. And, if this was ~8 years back, I'd have
probably not made as much a noise as now about not using PUA. The
situation was far more muddled and, hacks were aplenty. Currently, a
lot of the cruft is being straightened out and, you are aware of it.
And, as an entity, IndLinux at one point used to adhere to "upstream
and standards first" way of doing things.

So, this is what bothers me now - what has changed that you completely
ignore the input of someone who is working with the i18n folks to make
the experience of using Bengali on Linux desktops seamless, standards
compliant and, by your own admission, try out a hack ? From what I
read, there is a bit of disrespect here. And, that bothers me a lot.

Do you not believe that Runa and Praveen have provided ample reasoning
that this does not need a hack ? Or, is it that a temporary hack is
more important than utilizing the documentary evidence Swarup has to
assess whether this character really needs a code point than a PUA
position ?

> At times few backward steps are needed to take a bigger leap.
> So an attempt to solve the problem technically might bring closer to
> the path to take, than not attempting it at all for concern of
> future maintainability.

Step back momentarily and think about this - Swarup gets his work
attained by the PUA hack. No other Bengali font handles this (because
there was not documented reason for them to have it). What happens to
the fonts across distributions when they end up being used to meet
this niche demand ? Do we go around filing bugs against all of them ?
You know what happens when hacks come home to roost and hit the user
experience ? This -
<http://arrbee.wordpress.com/2010/09/30/shame-on-you-bbc/>


-- 
sankarshan mukhopadhyay
<http://sankarshan.randomink.org/blog>

------------------------------------------------------------------------------
For Developers, A Lot Can Happen In A Second.
Boundary is the first to Know...and Tell You.
Monitor Your Applications in Ultra-Fine Resolution. Try it FREE!
http://p.sf.net/sfu/Boundary-d2dvs2
_______________________________________________
IndLinux-group mailing list
IndLinux-group@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/indlinux-group

Reply via email to