Solved

Points for WiZaRd

Posted on 2002-06-21
2
187 Views
Last Modified: 2010-04-26
http://www.experts-exchange.com/hardgen/Q_20144768.html
Points shared.
Moondancer - EE Moderator
0
Comment
Question by:Moondancer
2 Comments
 
LVL 7

Accepted Solution

by:
WiZaRd earned 20 total points
ID: 7104010
thanks Moondancer. love your work!
0
 
LVL 1

Author Comment

by:Moondancer
ID: 7104027
Sweet, thanks.
:) Moondancer - EE Moderator
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question