Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

For jeurk re: 11485078

Posted on 2002-03-17
3
Medium Priority
?
208 Views
Last Modified: 2010-05-18
For your assistance in http://www.experts-exchange.com/delphi/Q.11485078

Thanks!

Netminder
CS Moderator
0
Comment
Question by:Netminder
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 

Expert Comment

by:SpideyMod
ID: 8384985
Just a placekeeping note.

SpideyMod
Community Support Moderator @Experts Exchange
0
 
LVL 5

Author Comment

by:Netminder
ID: 8585407
Email sent.

Netminder
EE Admin
0
 
LVL 4

Accepted Solution

by:
jeurk earned 400 total points
ID: 8585594
hi,
nice to get some points for a two years old question ;)
thanks.
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction Raise your hands if you were as upset with FireMonkey as I was when I discovered that there was no TListview.  I use TListView in almost all of my applications I've written, and I was not going to compromise by resorting to TStringGrid…
In my programming career I have only very rarely run into situations where operator overloading would be of any use in my work.  Normally those situations involved math with either overly large numbers (hundreds of thousands of digits or accuracy re…
This course is ideal for IT System Administrators working with VMware vSphere and its associated products in their company infrastructure. This course teaches you how to install and maintain this virtualization technology to store data, prevent vuln…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question