Solved

Points For FishMonger

Posted on 2003-11-13
4
210 Views
Last Modified: 2011-09-20
FishMonger,
Thanks for all of your help with http://www.experts-exchange.com/Programming/Programming_Languages/Perl/Q_20794583.html.

I appreciate all of your advise.
0
Comment
Question by:uluttrell
  • 2
4 Comments
 
LVL 8

Expert Comment

by:inq123
ID: 9744544
Hi uluttrell,

You can't award more than 500 points for one question to one expert, unfortunately.  mods will usually watch these types of things.  You can award 100 points though, in this case.

Cheers!
0
 
LVL 28

Accepted Solution

by:
FishMonger earned 400 total points
ID: 9744772
uluttrell,

Thank You...That's very generous! :-)

I'm glad that I was able to help you but I was a little surprised that you accepted the answer.  To me, it was a work in progress and needed a little more work to do what you needed; I was just too tired and hungry to sit at the computer.  But, if you're happy with it, that's great.

------------

inq123,

Normally that's correct but if you read the last couple of posts in that question, you'll see that modulo (one of the mods) approved it.
0
 
LVL 8

Expert Comment

by:inq123
ID: 9747190
Oh, I see.  That's fine then.  I just know that mods usually pay attention to high point "points for" questions.
0
 

Author Comment

by:uluttrell
ID: 9747921
FishMonger, I am happy with it.  If I find I need modifications, I'll post a new question.  Thank you so very much.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I've just discovered very important differences between Windows an Unix formats in Perl,at least 5.xx.. MOST IMPORTANT: Use Unix file format while saving Your script. otherwise it will have ^M s or smth likely weird in the EOL, Then DO NOT use m…
I have been pestered over the years to produce and distribute regular data extracts, and often the request have explicitly requested the data be emailed as an Excel attachement; specifically Excel, as it appears: CSV files confuse (no Red or Green h…
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now