lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87h6pypono.fsf@meer.lwn.net>
Date:   Thu, 20 Jul 2023 09:51:07 -0600
From:   Jonathan Corbet <corbet@....net>
To:     Hu Haowen <src.res.211@...il.com>
Cc:     linux-doc-tw-discuss@...ts.sourceforge.net,
        linux-doc@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH RESEND 0/6] docs/zh_TW: update zh_TW's documentation
 from an ascensive aspect

Hu Haowen <src.res.211@...il.com> writes:

> On 2023/7/20 21:55, Jonathan Corbet wrote:
>> Hu Haowen <src.res.211@...il.com> writes:
>> 
>>> Update zh_TW's documentation concentrating on the following aspects:
>>>
>>>      * The file tree structure changes of the main documentation;
>>>      * Some changes and ideas from zh_CN translation;
>>>      * Removal for several obsoleted contents within the zh_TW translation
>>>        or those which are not exising anymore in the main documentation.
>>>      * Replacements for some incorrect words and phrases in traditional
>>>        Chinese or those which are odd within their context being hard for
>>>        readers to comprehend.
>> 
>> Is there a reason why you're resending a patch series from four days
>> ago?
>
> Considering for a long time but no reply, I just thought my patches were
> ignored among the flood of emails or regarded as spam information.
>
> Accordingly I resent my patches to ensure the reception of my patches as
> well as added the cover email to provide an outline of my patch series.

Four days is not long enough by far; I'll get to it.

Thanks,

jon

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ