--- Begin Message ---
- To: bugs@debian.org
- Cc: tillea@gmail.com
- Subject: ITP: vdmfec -- Block ECC using a Forward Error Correction
- From: "Andreas Tille" <tillea@gmail.com>
- Date: Sat, 30 Sep 2006 11:42:04 +0200
- Message-id: <26e392c20609300242s8b6f6dft93c018dd99e4f400@mail.gmail.com>
Subject: ITP: vdmfec -- Block ECC using a Forward Error Correction
Package: wnpp
Owner: Andreas Tille <tille@debian.org>
Severity: wishlist
* Package name : vdmfec
Version : 1.0
Upstream Author : Tom Holroyd <tomh@po.crl.go.jp>
* URL : http://members.tripod.com/professor_tom/archives/index.html
* License : GPL
Programming Lang: C
Description : Block ECC using a Forward Error Correction
VDMFEC implements Block ECC using a Forward Error Correction
(FEC) code based on Vandermonde (VDM) matrices in GF(2^8) due
to Luigi Rizzo. Given the FEC parameters K and N, with N
greater than K, N blocks are written for every K input blocks
in such a way that any K blocks are sufficient to reconstruct
the data. That is, up to N - K blocks out of every group of N
blocks may be lost without loss of data. Its primary
application is intended to be in recovering data from
unreliable media such as diskettes.
-- System Information:
Debian Release: testing/unstable
APT prefers testing
APT policy: (501, 'testing'), (50, 'unstable')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15
Locale: LANG=de_DE@euro, LC_CTYPE=de_DE@euro (charmap=ISO-8859-15)
(ignored: LC_ALL set to de_DE@euro)
--- End Message ---
--- Begin Message ---
Hello,
This is an automatic mail sent to close the ITP you have reported or
are involved with.
Your ITP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 365 days.
- It hasn't had any activity recently.
As this is an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not
intended by owners and submitters (like you) to be closed, for
example if the ITP is still of your interest, or there has been
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).
To re-open it, you simply have to mail control@bugs.debian.org
with a body text like this:
reopen 390292
stop
Further comments on the work done in the bug sent to
390292@bugs.debian.org would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: <damog@debian.org>.
A similar process is being applied to other kind of wnpp bugs.
Thanks for your cooperation,
-- David Moreno Garza <damog@debian.org>.
--- End Message ---