Solved

points for IT

Posted on 2002-07-28
3
165 Views
Last Modified: 2010-04-13
here are the extra points

Thanks
0
Comment
Question by:CharlesBLee
  • 2
3 Comments
 
LVL 3

Accepted Solution

by:
ITsheresomewhere earned 100 total points
ID: 7194944
Ooops  almost overlooked this.

How is the pursuit of the unusual situation going?  Or were you successful in convincing the client to just put in a simple small peer to peer network?

ITsy
0
 

Author Comment

by:CharlesBLee
ID: 7195031
The product from Applica was $300 - The client figured they'd be adding more computers, so I sold them a real network. It didn't sound like applica was doing much business.
0
 
LVL 3

Expert Comment

by:ITsheresomewhere
ID: 7195037
Yes I would imagine as such.  It is really a very specilized situation thing that can make logical sense but possibly not pratical economical sense when all things are considered.  Well glad you got things worked out in any case.

ITsy
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Migrate DFS role 3 861
kerberos errors 7 554
Domain Controller all of a sudden stop replicating 3 462
Server 2012R2 Foundation and Server 2000 3 136
NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
The Windows functions GetTickCount and timeGetTime retrieve the number of milliseconds since the system was started. However, the value is stored in a DWORD, which means that it wraps around to zero every 49.7 days. This article shows how to solve t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an antispam), the admini…

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question