Solved

Points for zvonko

Posted on 2002-06-12
5
177 Views
Last Modified: 2013-12-18
Credit where credit is due.
Thanks for you help in this question : http://www.experts-exchange.com/jsp/qManageQuestion.jsp?qid=20310214
0
Comment
Question by:jempie
  • 2
  • 2
5 Comments
 
LVL 10

Accepted Solution

by:
zvonko earned 150 total points
ID: 7072580
Thank you :-)
0
 

Author Comment

by:jempie
ID: 7072735
You're welcome. Now for hemanth...
0
 
LVL 10

Expert Comment

by:zvonko
ID: 7072904
Oh! you increased the points! This is too generous :-)

But next time start with 50 points and wait for reactions. Be sure: I will tell you to increase the points :-)

Cheers,
zvonko

0
 
LVL 9

Expert Comment

by:Arunkumar
ID: 7073268
Yea Zvonko is definitely a begger !

LOL!

;-)
Arun.
0
 

Author Comment

by:jempie
ID: 7076756
Well, I was thinking about a 1/3 point split between jerrith, HemanthaKumar and zvonko.
I had allready accepted jerrith's answer (it worked for me), then I realized that actually zvonko gave me an even better solution to my problem with a lot simpler @Formula, so I felt I should award points for that too.
Jerrith still deserved credit for finding the problem in HemanthaKumar's original posting and adding the extra functionality (even with simplified formula's) :-)

Thanks again to all for your assistance.
I don't ask that many questions, so I can spare the question points when I need them.

Take care and until later,
Jempie
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

For beginners of Lotus Notes user this is important to know about the types of files and their location supported by IBM Notes. Mostly users are unaware about how many file types are created and what their usages are. This Article is fully dedicated…
IBM Notes offer Encryption feature using which the user can secure its NSF emails or entire database easily. In this section we will discuss about the process to Encrypt Incoming and Outgoing Mails in depth.
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now