On Tuesday 28 August 2012 02:55:11 Jon Elson did opine: > Frank P Bufton wrote: > > Hi > > > > 12-24 has become very common for communication network equipment > > racks. It has almost replaced 10-32. > > Wow, shows how far out of touch I am with new stuff! > > Jon
Throw in that in the typical BC facility, the 10-32 racks often have damaged threads because the crap we hang on a 10-32 is too much for the screw, and eventually that 10-32 rack will at some point in rebuilding the facility, see a 12-24 tap in a reversible drill applied to every hole in it just to remove the aggravation of stripped holes. Last time I checked, I could still buy quality, round head, #2 Phillips 12-24's 3/4" long in gross boxes at ACE HDWE. That make all screws alike factor is huge when a technology change is being done and its just one more time waster looking for enough screws to fit that old rack. I'll spend half an hour retapping the thing, and another half hour for the run to ACE for screws & fresh taps just to have uniform screws. > ------------------------------------------------------------------------ > ------ Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. > Discussions will include endpoint security, mobile security and the > latest in malware threats. > http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > Emc-developers mailing list > [email protected] > https://lists.sourceforge.net/lists/listinfo/emc-developers Cheers, Gene -- "There are four boxes to be used in defense of liberty: soap, ballot, jury, and ammo. Please use in that order." -Ed Howdershelt (Author) My web page: <http://coyoteden.dyndns-free.com:85/gene> is up! WinNT error 002: Out of memory - you have only 536,870,912 bytes of free RAM. ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ Emc-developers mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/emc-developers
