Solved

Congratulation to kretzschmar

Posted on 2001-08-16
4
195 Views
Last Modified: 2010-04-06
Good job meikl, you move up one step :o)
I havn't seen Epsylon from a while???

Regards
Mohammed
0
Comment
Question by:Mohammed Nasman
  • 2
4 Comments
 
LVL 27

Accepted Solution

by:
kretzschmar earned 0 total points
ID: 6392782
haha,
eps when want runs me away,
but anyway thanks :-)

well, i also haven't seen eps for a while,
but i'm sure he will catch me again sometimes

meikl ;-)
0
 
LVL 44

Expert Comment

by:CrazyOne
ID: 6393364
I saw Eps about a week ago in a thread that he and I were the only ones working it. :>)


Congrats meikl!!!


Spencer
The Crazy One
0
 
LVL 1

Expert Comment

by:BlackDeath
ID: 6397017
gluckwunsch ;-)

BlackDeath.
0
 
LVL 27

Expert Comment

by:kretzschmar
ID: 6413174
it was a short story :-))
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article explains how to create forms/units independent of other forms/units object names in a delphi project. Have you ever created a form for user input in a Delphi project and then had the need to have that same form in a other Delphi proj…
In my programming career I have only very rarely run into situations where operator overloading would be of any use in my work.  Normally those situations involved math with either overly large numbers (hundreds of thousands of digits or accuracy re…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now