►
From YouTube: IETF-CORE-20220302-1500
Description
CORE meeting session at IETF
2022/03/02 1500
https://datatracker.ietf.org/meeting//proceedings/
C
And
and
see
this
hymen
so
on
the
other
two
corcoran
documents
in
the
queue
to
take
at
some
point:
it's
it's!
You.
B
Yeah,
so
I
I
was
actually
talking
about
it
because
that's
where
the
action
is
at
the
moment-
and
we
will
do
some-
some
weird
turns
there
but
yeah.
Let's
talk
about
that
in
five
minutes.
Sure.
C
C
C
Okay,
it's
two
minutes
past.
So,
let's
start
the
meeting.
Welcome
everyone
to
this
interim
meeting
of
the
co-working
group.
I
am
mark
tiloka.
My
co-chairs
are
I'm
humanity
and
carsten
berman
welcome
back,
and
since
this
is
an
official
ikea
meeting,
the
not
well
applies.
Please
be
familiar
with
that
become
familiar
with
that,
if
you're
not
already
it's
not
about
ipr,
only
it's
also
about
our
conduct,
especially
so
very
nice
and
professional
with
one
another.
C
The
agenda
for
today
is
pretty
slim,
so
I
believe
we're
going
to
have
relatively
short
meeting,
but
we
start
with
the
usual
round
of
updates
on
the
cork
of
documents
and
href
and
coral,
and
then
we
have
a
presentation
from
giuseppe
about
an
update
submitted
for
the
core
performance
measurement
option
they
are
proposing.
B
Yeah,
so
this
is
going
to
be
very
short
part
because
actually
there
was
zero
time
between
the
last.
I
remember
and
at
the
time
now
so
my
report
from
from
the
the
last
time
still
stand,
and
so
the
the
objective
is
to
actually
get
the
the
new
ideas
from
the
discussion
we
had
on
last
thursday
into
the
sid
document.
I
haven't
actually
managed
to
do
that
yet,
but
that's
very
high
on
my
list
now
and
maybe
to
get
yang
zebo
liberated.
B
So
we
can
push
this
through
while
we
are
still
discussing
some
of
the
details
of
sid
going
through
a
second
itf
last
call
getting
another
telechat
date
and
so
on,
but
rob
wilton
still
has
to
agree
to
to
this
procedure.
So
I
don't
know
if
we
will
be
able
to
go
forward
with
that.
B
A
B
Yeah,
I
think
we
we
might
need
a
little
nudge
to
actually
liberate
yang
sibo
of
that
normative
reference,
so
that
might
be
a
place
where,
where
we
actually
could
use
help-
and
I'm
not
sure
sure
how
informed
rob
is
about
the
the
various
places
where
we
really
could
use
an
rfc
now
for
gang
sibo,
so
that
that
might
be
a
little
nudge
that
he
might
be
able
to
use.
A
Yes-
and
I
saw
this
email
yeah
that
that
that
is
linked
from
the
from
the
minutes-
I
I
will
go
and
look
at
what
the
last
exchanges
are
and
see
if
I
need
to
ping
him,
but
otherwise,
when,
when
we
have
a
an
update
on
the
document,
that
might
be
the
best
yeah.
C
B
Yeah
on
hf,
I
can
report
that
we
almost
have
agreement
on
the
test.
Vectors
apparently,
are
stumbling
over
some
some
good
problem
at
the
moment,
but
I
hope
we
we
can
have
that
done
very
very
soon,
so
there
will
be
stable
test
vectors
available
for
other
people
to
play
with
within
a
matter
of
days,.
C
Okay
thanks,
I
guess
no
particular
update
or
things
to
mention
on
coral
christian.
Instead
right.
D
I've
I'm
I'm
already
in
a
back
and
forth
with
in
emails
with
peter
o'kil,
about
the
topic
of
how
do
we
declare
the
directions
in
tibor,
but
I
think
that's
a
relatively
minor
thing
that
no
updates,
but
if
anyone
is
interested
in
all
the
fun
details
that
internationalization
has,
I
have
lots
of
links.
I
could
send
you
if
you're
interested.
C
Thank
you,
okay.
Then
we
get
into
an
actual
presentation.
Now
it
was
a
resubmission
for
this
document
a
few
weeks
ago
and
fit
nicely
in
this
meeting.
So
hi
giuseppe
as
you
wish,
you
can
share
the
slides
yourself
using
the
share,
preloaded,
slides
tool
of
me.
Taco.
E
Okay
yeah,
thank
you,
marco,
for
the
opportunity
to
present
today.
So
this
is
an
update
about
this
graph
that
we
present
as
a
zero
zero
version
during
the
the
latest
iitf
meeting
in
november,
so
yeah
in
this
okay.
Just
to
recap
about
the
motivation
for
whom
you
do
not
read
this
document,
so
this
is
to
find
the
mechanism
to
measure
the
performance
in
code.
E
So
we
need
a
straightforward
methodology:
the
change
the
from
the
zero
zero
version
to
zero
one.
Let
me
thank
the
for
the
comments
christian
and
thomas
that
we
had
some
emails
exchanged
after
the
last
atf,
and
this
also
helped
to
improve
the
document.
We
had
new
consideration
to
introduction
and
to
the
description
of
the
option,
but
most
important.
We
had
a
new
site,
we
added
a
new
section
on
application
scenarios
to
explain
how
to
do
end-to-end
or
segmented
measurement,
and
then
we
also
try
to
work
on
the
security
section.
B
E
Just
a
few
words
about
what
is
the
technology
background
behind
this
proposal,
so
in
ippm
working
group,
we
are
working
on
an
explicit
flow
measurement
techniques
that
the
main
scope
is
to
employ.
A
few
marking
leads
inside
the
adder
of
each
packet
for
loss
and
delay
measurement
in
a
client
server
protocol.
So
a
typical
example
is
quick
or
tcp,
not
mainly
in
quit.
E
The
draft
has
been
adopted
in
ippm,
and
the
first
application,
of
course,
is
pin
beat
that
the
spin
bit
idea
is
to
create
a
square
wave
signal
using
a
bit,
and
the
length
of
this
signal
is
equal
to
rtt,
so
each
on
pat
observant
can
easily
measurement
measure
the
round
trip
time
without
taking
time
stamp
just
to
measure
the
length
of
the
square
period.
E
E
It
is
different
because
it
times
to
create
square
waves
of
well-known
length,
for
example,
square
waves
of
64
packets.
E
In
this
way,
if
you
are
an
op
up,
top
server
can
easily
measure
the
packet
loss,
because
if
you
don't
see
64
packets
for
each
for
each
period,
you
can
easily
measure
the
losses.
E
E
E
In
this
option
we
can.
We
can
define
two
patterns,
for
example,
if
we
want
to
use
one
bit
or
two
bits.
So,
for
example,
I
this
is
just
a
proposal
for
discussion
right,
so
I
said
to
the
first
bit
to
identify
which
kind
of
pattern
for
the
option.
The
first
part
that
can
be
with
this
just
a
single
bit
for
performance.
Otherwise,
you
can
use
two
beats,
that
is,
the
square
beat
and
spin
beat
since
we
have
defined
one
byte.
I
also
added
other
event
beats.
For
example,
you
can.
E
You
can
imagine
another
kind
of
scenario
when
the
event
beats
can
be
divided
into
two
parts,
loss
event
and
delay
event
and,
for
example,
an
endpoint
that
can
be
the
server,
for
example,
can
define
different
levels
of
thresholds
for
loss
and
delay,
and
in
this
way
an
onpart
observer
can
read
these
event
bits
and
may
know
the
network
condition
by
by
looking
at
this
threshold
information.
This
is
just
to
use
these
additional
bits,
but
it's
just
an
example.
E
Now,
in
this
slide,
I
try
to
explain
the
different
scenarios.
E
E
What
are
the
intermediary
of
pattern
server,
so
they
can
be
network
functions,
probes
or
they
can
be
gateway
proxy
and
that
are
tasks
to
perform
requests
for
call.
So
if
the
on
bottom
servers
are
network
functions
or
probes,
of
course,
the
co-op
option
can
be
applied
end-to-end.
So
we
we
can
imagine
a
scenario
where
we
have
an
end-to-end
connection
between
our
client
and
the
server
and
in
the
middle.
We
have
those
on
pattern
servers
in
this
way.
E
E
In
this
case
the
we
cannot
talk
about
an
end-to-end
connection
and
the
option
can
be
applied
for
the
separate
connections
between
client
and
server.
So
in
this
case
we
can
do.
The
measure
will
be
segmented
between
the
proxies
between
proxy
and
the
client
or
between
a
proxy
and
the
server,
because
we
have
separate
connections
in
this
case.
E
We
maybe
we
have
to
add
more
details
in
the
next
version,
because
you
can
always
think
to
bundle
different
clients
if
they
are
mixed
or
you
can
think
to
use
the
option
for
a
single
client
at
once,
and
also
the
communication
may
happen
with
different
servers.
So
in
this
case
you
have
to
to
check
other
additional
fields
to
understand
the
server
and
to
make
the
measurement
according
to
the
specific
server
that
you
you
are
considering.
E
Okay,
yeah
just
the
in
addition
of
the
light
about
what
are
the
key
points
and
benefits
so,
first
of
all,
no
id
sequence
number
for
packet
clause
and
also
there
is
a
flexible
fence
time
handling
this.
This
is
to
meet
the
requirement
of
constrained
nodes.
E
Then
there
is
also
a
proposal
to
improve
the
square
bit
mechanism
with
the
same
synergy
with
spin
leak,
but
this
is
just
an
additional
feature
and
we
can
also
think
to
possible
advanced
usage
of
this
option,
because
if
the
umptop
server
that
can
be
the
proxy
or
gateway
can
interconnect
different
networks
through
these
additional
bids
can
use
this
information
also
to
adjust
protocol
parameters,
for
example,
or
it
could
also
be
possible
to
decide
based
on
the
network,
condition
to
if
it's
the
case,
to
use
reliable
or
unreliable
transmission.
So
this
is
just
for
brainstorming.
E
E
B
I
have
two
questions.
One
is
twipe,
of
course,
is
often
used
over
dtls
and
then
at
least
random
probes.
In
the
network,
you
will
not
be
able
to
see
what's
going
on.
Of
course,
the
endpoints
will
be,
but
you
cannot
make
information
available
to
to
transparent
systems
on
on
the
ways.
Is
there
any
attempt
to
get
something
like
this
added
to
dtls.
E
B
B
We
can
put
it
into
the
outer
header,
but
if
we
are
using
dtls,
we
don't
really
have
control
over
what's
in
in
those
headers.
So
maybe
that's
worth
having
a
look
at
the
the
other
question.
Maybe
it's
not
so
much
about
this
draft,
but
but
more
about
the
the
ecosystem
that
will
spring
up
to
make
use
of
this.
B
E
E
This
is
a
static
configuration
on
the
node
yeah,
but
in
the
in
the
future
we
have
to
think
about
the
control
protocol,
for
example
for
ipv6.
We
already
have
for
the
alternate
marking
methodology
that
is
quite
related
to
this
method.
We
are
working
on
control
protocol,
but
this
is
in
a
second
stage.
Let
me
now
let
me
because
for
for
now
we
want.
The
first
thing
is
to
to
define
the
methodologies
to
to
find
an
agreement
about
what
are
the
parameters.
B
Yeah,
probably
the
control
part
needs
to
be
extremely
extensible,
because
there
will
be
very
many
ways
to
to
use
this.
So
it's
probably
a
good
idea
not
to
tie
the
the
actual
bits
on
the
wire
to
the
way
the
the
configuration
is
exchanged.
On
the
other
hand,
to
to
start
experimenting
with
things
I
mean.
Even
if
you
do
static
configuration,
you
probably
want
to
interchange
configurations
between
the
experimenters.
So
you
are.
E
E
E
B
Yeah,
of
course,
that
also
depends
on
whether
you
actually
think
about
the
configuration
part
as
a
control
part.
So
you,
you
command
the
other
side
to
do
this
or
that
or
something
that
that
where
essentially
the
two
sides
exchange,
what
what
they
are
willing
to
do
and
and
then
agree
on
something.
So
it's
not
that
you
don't
really
have
to
have
them
in
the
same
domain,
so
both
sides
are
are
kind
of
free
to
do
what
they
want.
B
E
E
There
is
telecom
italia,
orange
other
some
operators,
but
also
akamai
that
already
have
early
deployments
of
these
demonstrations
for
the
application
on
quick
in
particular.
So
that's
why
in
ippm
we.
E
Proposed
just
an
informational
document
that
they
find
the
methodology
in
a
let's
say,
transport
agnostic
way,
so
it
can
be
applicable
to
quick
to
tcp
to
co-op
without
any
any
problems
right.
So
you,
you
know
you
can
apply
in
a
client
server
environment
in
a
class
for
a
client
server
protocol.
E
So
in
quick,
it
was
already
discussed.
Spin
bit
has
been
accepted
as
an
optional
usage,
but
for
the
other
lost
bit
that
I
also
had
idea,
it
is
still
under
discussion
because
in
quick
you
know
that
it
is
driven
by
over
the
top.
So
it
is
quite
difficult
to
to
propose
things
to
propose
new
things
right.
So
that's
why
we
also
had
the
idea
to
introduce
this
to
co-op,
because
it
is
also
a
similar
environment
and
the
the
fact
that
on
constrained
nodes
you
have
those
limitations
also
can
easily.
E
E
E
Yeah,
let's
say
the
experiment
is
the
is
the
activity
that
is
mainly
done
in
ippm,
because.
E
D
I
have
two
kinds
of
questions.
The
one
is
whose
constraint
are
you
considering
here?
You
mentioned
that
message,
ids
and
stuff
might
be
troublesome
for
constrained
devices,
but
at
least
the
client
and
the
servers
already
deal
in
those.
D
So
I'm
wondering
whether
you're
also
having
constrained
pro
or
whether
you're
having
core
style
constraints
on
the
probes
and
the
proxies
that
that
you're,
employing.
E
Yeah,
let's
say
the
since
yeah
the
the
principle.
The
idea
is
that,
since
we
are
in
a
constrained
environment,
so
you
also,
if
you
have
to
take
time,
stamps,
for
example,
for
each
packet
is
resource
consuming.
So
also
in
this.
E
I
have
in
mind
also
this
operation,
while
in
this
way
it
is
much
more
easy
because
you
all,
you
only
have
to
measure
the
length
of
of
the
square.
This
quest
period.
B
E
Just
the
same
motivation,
why
also
quick
found
this
proposal
quite
straightforward
and
in
the
end
they
accepted
to
to
define
as
a
optional.
So,
of
course,
there
are
some
advantages
to
use
this.
E
D
Okay,
then
I'll
continue
with
another
question
that
is:
could
you
outline
the
kind
of
questions
that
you
expect
to
answer
in
the
in
the
end
points
with
this,
because
I
think
I'm
slowly
getting
a
grasp
on
on
what
the
what
the
intermediaries
might
do,
but
you're
also
mentioning
that
this
is
useful
for
the
end
points
and
there
I'm.
D
E
E
E
Yeah,
you
you
the
of
course,
if,
if
the
methodology
allow
only
end-to-end
measurement,
it's
not
so
so
let
me
pass
the
term
revolutionary
right
because
you
are
just
you
are
defining
something
that
is
already
possible,
but
yeah.
The
the
the
added
value
is
that
you
are
enabling
on
bottoms
on
path
measurement
as
well.
So
you
are
not
only
simplifying
the
endpoint
measurement,
but
you
are
also
enabling
compat
observer.
B
E
E
Yeah
the
the
improvement,
the
improvement
is
not
so
it
may
be.
Maybe
we
should
make
some,
let's
say
test
to
to
demonstrate
a
real
improvement,
maybe
is
not
so
high.
I
would
say
I
would
say
that
a
little
improvement
there
will
be
because
you
are
now
making
not
measurement
for
each
package,
but
you
can
do
measurement
by
by
using
block
of
pockets.
So
if
you
are
taking,
I
assume
that
if
you
are
using
block
of
pockets
instead
of
taking
time
stamp,
for
example,
for
each
packet,
you.
E
D
See
seeing
concrete
improvements,
there
would
definitely
help
sell
the
the
point
for
the
for
the
for
the
end
points.
But
let's
look
briefly
at
the
at
the
on
path
case,
so
I
understood
from
your
comments
on
on
clients
being
mixed
and
multiple
servers
being
there
that
you
envision
that
scenarios
would
be
possible
where,
where
there
is
a
passive
probe,
listening
in
on
a
connection
between
two
proxies
and
and
still
get
useful
information
out
of
that,
did
I
understand
that
correctly.
D
Yeah
so
yeah
kind
of
generally,
you
can,
if,
if
you
don't
contr,
the
your
assumption
is
or
the
as
long
as
the
assumption
is
that
the
clients
are
not
under
your
control.
The
best
you
can
hope
is
that
the
clients
and
servers
of
the
endpoints
are
not
under
your
control.
The
best
you
can
hope
is
that
the
end
points
implement
this
in
the
first
place,
which
will
probably
be
because
you're
under
contract
with
them
that
they
need
to
do
that,
because
why
would
they
otherwise.
D
D
E
E
D
E
E
For
example,
you
have
you
have
to
check
the
address
of
the.
If
you
are
talking
about
a
an
on
path,
ob
server
that
can
you
can
check
other
additional
fields
to
understand,
for
example,
the
the
flow
id
to
to
identify
in
some
way
the.
D
Okay,
so
you're
expecting
that
the
proxies
cooperate
by
setting
a
flow
id
consistently
across
the
kind
of
by
by
taking
the
clock.
E
No,
I'm
not
I'm
not
saying
that
I'm
not
I'm
just
think
about
to.
If
you
we
can
identify
the
address
of
the
server
or
the
others
of
the
client
or
another
proposal
that
I
also
mentioned
is
about
to
measure,
for
example,
on
the
proxy
on
two
proxy
can
in
some
way
cooperate
to
to
use
the
bit
for
one
client
at
once
or
for
one
one
server
at
once.
E
In
this
way,
these
simplify
a
lot
the
work
for
the
server,
so
you
can
in
some
way,
for
example,
move
from
one
client
to
another,
activate
one
client
for
measure,
so
so.
D
Okay,
so
so,
if,
if
the
proxies
cooperate
in
this,
is
there
much
difference
remaining
in
doing
the
measurements
on
the
proxy
kind
of?
If,
if
the
on
network
pro
relies,
and
I
think
it
will
have
to
rely
on
the
I
don't
see
so
the
thing
is
because
I
was
asking
what
fields
do
you
look
into?
D
You
might
be
tempted
to
look
into
the
into
the
uri
host
option,
but
depending
on
how
that
proxy
works
that
may
or
may
not
give
you
accurate
information
about
the
upstream
server
information
might
be
in
the
uri
scheme
and
answer
in
the
your
in
the
proxy
uri
option,
or
it
might
even
be
somewhere
in
the
path,
because
that's
really
up
to
the
up
to
the
proxy
and
on
the
other
direction
you
there
is
no
field
that
has
it
now,
if
you
are
relying
on
the
proxy
to
cooperate,
for
example,
by
picking
out
a
distinctive
client
and
ratting
it
out
to
the
server
telling
that
this
is
a
particular
client,
then
yes,
this
all
becomes
feasible
again,
but
then
I
don't
quite
see.
E
Yeah,
of
course,
the
proxies
need
to
in
any
in
any
kind
of
measurement
you
you
need
at
the
end
point
in
some
way
you
need
to
cooperate,
so
I
assume
that
the
proxy
will
at
least
support
the
options
and
the
the
the
setting
of
the
of
those
beats
and
so
on.
So
that
is
the
that
is
the
assumption,
and
the
the
value
again
is
is
related
to,
of
course,
to
the
to
the
more
easy
way
to
do
measurement.
E
E
D
I
trust
that
the
methodology
in
general
works,
but
I'm
just
very
doubtful
as
to
whether
it
makes
any
sense
to
do
it
across
proxies
at
all.
I
can
whether
that
can
be
made
to
work
without
doing
so
much
work
at
the
proxy
that
you
could
just
as
well.
Do
the
can
place
the
whole
probe
at
the
proxy,
because.
E
No,
I
I
don't
think
we
you
can,
you
can
put
the
probe
at
the
proxy.
Maybe
you
have
your
probe
in
the
middle
or
it
is
not.
This
is
just
a
specific
example
that
you
are
doing,
because
you
can.
You
can
have
your
probe
in
indian
in
the
network,
so
you
don't
need
to
put
the
probe
together
with
proxy
yeah.
E
D
But
it
thinks
it's
not
mandatory
to
put
together
with
proxies,
but
if
it
is
supposed
to
work
across
prop
kind
of
it
should
be
described
in
which
way
it
is
supposed
to
work
across
proxies.
If
the
statement
is
that
it
works
only
in
absence
of
proxies,
that
might
that
that
would
be
a
statement.
If
the
statement
is
it
works
with
proxies,
provided
they
collaborate
in
this.
In
that
way,
that's
another
statement,
and
if
the
statement
is
it's,
it
works
with
proxies
that
are
just
proxies,
but
do
not
otherwise
collaborate.
D
Third,
then,
I
think
that
it
would
be
tricky
to
show
that
it
really
has
these
properties.
E
Yeah
yeah,
I
see,
I
see
your
pa,
maybe
we
have
to
in
the
next
version.
We
have
to
specify
better
the.
What
is
the
kind
of
measurement
you
have.
You
can
do
based
on
situation.
So,
for
example,
if
you
don't
have
proxies,
you
have
right
to
end
connection
and
the
bottom
server
can
measure
round
with
time
loss.
D
As
much
as
I'm
a
big
fan
of
ensuring
that
everything
around
co-op
works
through
proxies,
it
might
also
be
a
good
time
at
this,
then
to
evaluate
whether
you
really
need
it,
because
getting
this
to
work
across
proxies
is
something
where
that
I
expect
is,
will
be
relatively
tricky,
doable
but
tricky.
D
If
you
have
use
cases
for
it
all,
please
go
for
it
and
I'm
happy
to
review
it.
If
you
do
not,
you
might
just
stick
with
these
options
as
hop
by
hop
and
kind
of
limit
it
to
that.
If
you
don't
have
the
use
cases
for
it,
just
so
that
yeah
you
don't.
E
D
B
E
E
C
C
So
I
just
had
a
quick
look
at
the
draft
honestly
in
the
section
when
you
discussed
different
setups,
basically
section
five
you're,
considering
a
lot
of
possible
different
setups
that
you
kind
of
mentioned
in
the
previous
discussion,
so
with
or
without
proxy,
with
or
without
probe,
using
or
not
using
all
score,
and
it
can
be
pretty
difficult
to
follow
and
understand
for
each
possible
setup
and
combination
what
that
means
in
terms
of
limitation,
to
a
certain
party
interested
in
doing
that
performance
measurement.
C
So
what
that
part
is
still
going
to
be
able
to
learn
and
what
not
so
maybe
helps
if
you
categorize,
somehow
in
a
relatively
straight
way,
the
different
setups
that
you
can
come
up
with,
combining
the
different
variations
and
discuss
the
limitations
that
the
different
setups
result
in,
I
suppose
also
depending
on
using
one
bit
or
the
other
or
both
combined
as
another
dimension.
C
It
may
help
to
to
support
this
also
with
examples
through
scr
diagrams.
I
know
it's
going
to
be
tricky,
but
you
may
start
with
the
most
important
ones
you
you
believe
to
be
the
most
important
ones.
As
a
start,
this
should
be
partly
related
with
what
you
discussed
at
christian.
Also.
E
Yeah
sure
is
is
yeah
is
what
what
I
remind
and
what
I
I
also
understood
from
the
discussion
with
chris
and
yes,
we
have
to
define
the
application
scenarios,
maybe
with
subsection,
with
different
setup,
precise.
C
E
E
B
E
C
Okay,
another
comment
is
more
specific
on
the
option
you
propose.
Actually,
I
was
wondering
if
you
can
elaborate
more
on
on
the
fact
that
it
is
defined
as
part
of
the
cache
key
could.
Could
you
elaborate
on
that
choice?
C
I
wasn't
expecting
that.
I
thought
it
was
going
to
be
not
part
of
the
cash
key.
E
E
C
Yeah,
you
may
all-
and
you
may
also
want
to
clarify
better
about
how
the
option
is
processed
bioscore,
because
now
back
to
something
carlton
raised
at
some
point
before
when
I
was
reading
the
definition
of
the
option
and
imagining
what
was
going
to
come,
I
suspected
okay.
This
option
is
supposed
to
be
used
in
an
alter,
but
but
then
there's
no
such
explicit
discussion
later
on,
and
that's
probably
what
you
want
actually
to
be
able
to
make
this
work
when
you
use
all
score
just
something
to
think
about.
E
C
Okay,
any
more
comments,
questions.
What
is
that
I
am
you
mentioned
before.
You
may
provide
references
to
resources
and
possible
implementation,
hackathon
activities.
If
so,
please
feel
free
to
share
those
references
to
the
main
list.
It'll
be
very
helpful.
E
C
So
of
course
we're
going
to
resume
a
new
series
of
interim
meetings.
I
was
thinking
about
end
of
april
and,
of
course,
keeping
the
same
cadence
to
not
interfere
with
the
same
cadence
intended
for
for
sieber.
C
C
No
then
I'll
book,
the
next
series
I'll
be
in
vienna
in
presence,
so
I'm
looking
forward
to
meeting
those
of
you
there
otherwise
see
you
online.