Solved

EXPERTS PLEASE COLLECT YOUR POINTS

Posted on 2002-06-15
1
197 Views
Last Modified: 2013-12-16
Please comment in your specific POINTS FOR questions to collect your points for the cleanup and point splits we've processed.  If experts don't add comments or Propose an Answer, the points will never flow.

If you are involved in questions and see a Moderator posting follow up requests for Expert closing recommendations, please expert feedback so we can expedite this topic area's cleanup effort.  

HINT:  Use your Browser's Edit/Find with your MemberID to expedite your search process within the questions below.  Although this doesn't begin to include all Points for Experts questions awaiting comments, they are central questions with recent items processed by some Moderators.
http://www.experts-exchange.com/jsp/qShow.jsp?qid=20277028 Part 1
http://www.experts-exchange.com/jsp/qShow.jsp?ta=commspt&qid=20295853 Part 2
http://www.experts-exchange.com/jsp/qShow.jsp?ta=commspt&qid=20311017 -> Current question with the newest additions - Part 3


In the event you have no response in 7 days, please post a zero point question in Community Support with the link, since it may have been generated by someone no longer active here.  

***** PLEASE Watch for others in your respective TA generated by Askers and prior/other Moderators which may not be on the list.  If you don't comment or Propose an Answer, you can't get these well-earned points.

Thanks a lot.

Moondancer - EE Moderator
0
Comment
Question by:Moondancer
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
ID: 7136652
I think we can close this

Computer101
E-E Moderator
0

Featured Post

[Webinar] Learn How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Network Interface Card (NIC) bonding, also known as link aggregation, NIC teaming and trunking, is an important concept to understand and implement in any environment where high availability is of concern. Using this feature, a server administrator …
Linux users are sometimes dumbfounded by the severe lack of documentation on a topic. Sometimes, the documentation is copious, but other times, you end up with some obscure "it varies depending on your distribution" over and over when searching for …
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

695 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question