Improve company productivity with a Business Account.Sign Up

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 204
  • Last Modified:

Points for WiZaRd

http://www.experts-exchange.com/hardgen/Q_20144768.html
Points shared.
Moondancer - EE Moderator
0
Moondancer
Asked:
Moondancer
1 Solution
 
WiZaRdCommented:
thanks Moondancer. love your work!
0
 
MoondancerAuthor Commented:
Sweet, thanks.
:) Moondancer - EE Moderator
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Building an Effective Phishing Protection Program

Join Director of Product Management Todd OBoyle on April 26th as he covers the key elements of a phishing protection program. Whether you’re an old hat at phishing education or considering starting a program -- we'll discuss critical components that should be in any program.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now