Solved

pts 4 AlbertaBeef, buckeyes33 & radomirthegreat

Posted on 2003-11-25
6
357 Views
Last Modified: 2010-04-27
http://experts-exchange.com/Hardware/Q_20806506.html

for your great help!

you all have to reply so I'll split the points (I think*).
--- just halfway to finalyzing my goal.

hehe - this would be a great feture for experts-exchange.com :: let the user pass points to experts while in the process of figuring out a process/or answering a question :)

cheers all.
0
Comment
Question by:euroRisc
  • 3
  • 2
6 Comments
 
LVL 13

Accepted Solution

by:
AlbertaBeef earned 152 total points
ID: 9822984
OK, replying...
0
 
LVL 9

Assisted Solution

by:buckeyes33
buckeyes33 earned 120 total points
ID: 9825231
same here
0
 
LVL 5

Assisted Solution

by:radomirthegreat
radomirthegreat earned 70 total points
ID: 9827394
Hi.
0
Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

 
LVL 13

Expert Comment

by:AlbertaBeef
ID: 9827415
you're probably wondering why we've called you all here today . . .   one of us . . .  in this room . . . IS A MURDERER!

<dum da dum dum>  (that's dragnet music being played)

<dum da dum dum DUM!>

Ooh, feel the drama.

You can probably tell i'm in a goofy mood and haven't had enough sleep lately, can't you?
0
 
LVL 5

Expert Comment

by:radomirthegreat
ID: 9827435
Yes.
0
 
LVL 5

Expert Comment

by:radomirthegreat
ID: 9829134
Are you in a room full of people, and one of the people is a murderer?  This isn't a chat room; this is a thread.  Therefore, the only room available is the web space.  That cannot have something within itself.  However, it can have something on it...

What did the fish cry out to the other fish when it hit cement?








Scroll.











Scroll.


"Dam!"

Thank you,
Radomir Jordanovic
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
ESX 5.0 Shows power supply failure 3 32
Power and BTU ratings calculation 13 74
allotting specs for college tablet.. 3 50
Guidelines for building a gaming PC 17 45
The Rasberry PI is a low cost piece of hardware that you can have a lot of fun with through experimenting and building/working on projects like media players, running a low cost computer, build data loggers etc. - see: https://www.raspberrypi.org
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
In a recent question (https://www.experts-exchange.com/questions/28997919/Pagination-in-Adobe-Acrobat.html) here at Experts Exchange, a member asked how to add page numbers to a PDF file using Adobe Acrobat XI Pro. This short video Micro Tutorial sh…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question