It's Mega Maid.  She's gone from suck to blow.

On Wed, Jul 15, 2009 at 7:48 AM, John Cook <[email protected]> wrote:

>  Use the Schwartz Andy......
> John W. Cook
> Systems Administrator
> Partnership For Strong Families
> Sent to you from my Blackberry in the Cloud
>
> ------------------------------
> *From*: Andy Shook
> *To*: NT System Admin Issues
> *Sent*: Wed Jul 15 07:30:30 2009
> *Subject*: RE: Help me STU!!! (was RE: Xen 5.5 diagram)
>
>  Agreed, that was a major fail on my part, now cut the chatter Red   Аж
>
>
>
> Shook
>
>
>
> *From:* Steven M. Caesare [mailto:[email protected]]
> *Sent:* Tuesday, July 14, 2009 10:34 PM
> *To:* NT System Admin Issues
> *Subject:* RE: Help me STU!!! (was RE: Xen 5.5 diagram)
>
>
>
> Imagine my disappointment when the subject line started out   Ь*Help me
> Stu* А, but then omitted   Ь*you  Щre my only hope  А*
>
>
>
> -sc
>
>
>
> *From:* Andy Shook [mailto:[email protected]]
> *Sent:* Tuesday, July 14, 2009 6:11 PM
> *To:* NT System Admin Issues
> *Subject:* OT: Help me STU!!! (was RE: Xen 5.5 diagram)
>
>
>
>
>
> Stu,
>
> Please setup a block rule in your Lyris box to automatically delete any
> message from Webster that contains Shooky Bab  Ажhe is really starting to
> creep me out.
>
>
>
>
>
> Shook
>
>
>
> *From:* Webster [mailto:[email protected]]
> *Sent:* Tuesday, July 14, 2009 6:05 PM
> *To:* NT System Admin Issues
> *Subject:* RE: Xen 5.5 diagram
>
>
>
> *From:* Andy Shook [mailto:[email protected]]
> *Subject:* Xen 5.5 diagram
>
>
>
> Looking for a logical architectural diagram of XenServer 5.5 that shows how
> the different components are laid out within the various tiers of a virtual
> infrastructure.  Citri  АЩs training stuff is way lame and I wanted to see
> if anyone knew of such an animal.  5.5 documentation i  т Ьa little lean А
> to be polite.
>
>
>
> As usual, I took care of my Shooky Baby! J
>
>
>
>
>
> Webster
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> ------------------------------
> CONFIDENTIALITY STATEMENT: The information transmitted, or contained or
> attached to or with this Notice is intended only for the person or entity to
> which it is addressed and may contain Protected Health Information (PHI),
> confidential and/or privileged material. Any review, transmission,
> dissemination, or other use of, and taking any action in reliance upon this
> information by persons or entities other than the intended recipient without
> the express written consent of the sender are prohibited. This information
> may be protected by the Health Insurance Portability and Accountability Act
> of 1996 (HIPAA), and other Federal and Florida laws. Improper or
> unauthorized use or disclosure of this information could result in civil
> and/or criminal penalties.
> Consider the environment. Please don't print this e-mail unless you really
> need to.
>
> This email and any attached files are confidential and intended solely for
> the intended recipient(s). If you are not the named recipient you should not
> read, distribute, copy or alter this email. Any views or opinions expressed
> in this email are those of the author and do not represent those of the
> company. Warning: Although precautions have been taken to make sure no
> viruses are present in this email, the company cannot accept responsibility
> for any loss or damage that arise from the use of this email or attachments.
>
>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to