On Sun, Apr 8, 2012 at 12:28 AM, Guntupalli Karunakar <karuna...@indlinux.org> wrote:
> Going back in time, when we did not yet have Indic standardized or > it was not working yet, there were steps to use it with some hacks, > some which in long run either died out, or evolved into a standard > solution. So while above aspect may hold, but it should not prevent > in making an attempt to solve the problem in question. Here's the thing. I respect and appreciate the fact that you are trying to help Swarup out. And, if this was ~8 years back, I'd have probably not made as much a noise as now about not using PUA. The situation was far more muddled and, hacks were aplenty. Currently, a lot of the cruft is being straightened out and, you are aware of it. And, as an entity, IndLinux at one point used to adhere to "upstream and standards first" way of doing things. So, this is what bothers me now - what has changed that you completely ignore the input of someone who is working with the i18n folks to make the experience of using Bengali on Linux desktops seamless, standards compliant and, by your own admission, try out a hack ? From what I read, there is a bit of disrespect here. And, that bothers me a lot. Do you not believe that Runa and Praveen have provided ample reasoning that this does not need a hack ? Or, is it that a temporary hack is more important than utilizing the documentary evidence Swarup has to assess whether this character really needs a code point than a PUA position ? > At times few backward steps are needed to take a bigger leap. > So an attempt to solve the problem technically might bring closer to > the path to take, than not attempting it at all for concern of > future maintainability. Step back momentarily and think about this - Swarup gets his work attained by the PUA hack. No other Bengali font handles this (because there was not documented reason for them to have it). What happens to the fonts across distributions when they end up being used to meet this niche demand ? Do we go around filing bugs against all of them ? You know what happens when hacks come home to roost and hit the user experience ? This - <http://arrbee.wordpress.com/2010/09/30/shame-on-you-bbc/> -- sankarshan mukhopadhyay <http://sankarshan.randomink.org/blog> ------------------------------------------------------------------------------ For Developers, A Lot Can Happen In A Second. Boundary is the first to Know...and Tell You. Monitor Your Applications in Ultra-Fine Resolution. Try it FREE! http://p.sf.net/sfu/Boundary-d2dvs2 _______________________________________________ IndLinux-group mailing list IndLinux-group@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/indlinux-group