It's Mega Maid. She's gone from suck to blow. On Wed, Jul 15, 2009 at 7:48 AM, John Cook <[email protected]> wrote:
> Use the Schwartz Andy...... > John W. Cook > Systems Administrator > Partnership For Strong Families > Sent to you from my Blackberry in the Cloud > > ------------------------------ > *From*: Andy Shook > *To*: NT System Admin Issues > *Sent*: Wed Jul 15 07:30:30 2009 > *Subject*: RE: Help me STU!!! (was RE: Xen 5.5 diagram) > > Agreed, that was a major fail on my part, now cut the chatter Red Аж > > > > Shook > > > > *From:* Steven M. Caesare [mailto:[email protected]] > *Sent:* Tuesday, July 14, 2009 10:34 PM > *To:* NT System Admin Issues > *Subject:* RE: Help me STU!!! (was RE: Xen 5.5 diagram) > > > > Imagine my disappointment when the subject line started out Ь*Help me > Stu* А, but then omitted Ь*you Щre my only hope А* > > > > -sc > > > > *From:* Andy Shook [mailto:[email protected]] > *Sent:* Tuesday, July 14, 2009 6:11 PM > *To:* NT System Admin Issues > *Subject:* OT: Help me STU!!! (was RE: Xen 5.5 diagram) > > > > > > Stu, > > Please setup a block rule in your Lyris box to automatically delete any > message from Webster that contains Shooky Bab Ажhe is really starting to > creep me out. > > > > > > Shook > > > > *From:* Webster [mailto:[email protected]] > *Sent:* Tuesday, July 14, 2009 6:05 PM > *To:* NT System Admin Issues > *Subject:* RE: Xen 5.5 diagram > > > > *From:* Andy Shook [mailto:[email protected]] > *Subject:* Xen 5.5 diagram > > > > Looking for a logical architectural diagram of XenServer 5.5 that shows how > the different components are laid out within the various tiers of a virtual > infrastructure. Citri АЩs training stuff is way lame and I wanted to see > if anyone knew of such an animal. 5.5 documentation i т Ьa little lean А > to be polite. > > > > As usual, I took care of my Shooky Baby! J > > > > > > Webster > > > > > > > > > > > > > > > > > > > ------------------------------ > CONFIDENTIALITY STATEMENT: The information transmitted, or contained or > attached to or with this Notice is intended only for the person or entity to > which it is addressed and may contain Protected Health Information (PHI), > confidential and/or privileged material. Any review, transmission, > dissemination, or other use of, and taking any action in reliance upon this > information by persons or entities other than the intended recipient without > the express written consent of the sender are prohibited. This information > may be protected by the Health Insurance Portability and Accountability Act > of 1996 (HIPAA), and other Federal and Florida laws. Improper or > unauthorized use or disclosure of this information could result in civil > and/or criminal penalties. > Consider the environment. Please don't print this e-mail unless you really > need to. > > This email and any attached files are confidential and intended solely for > the intended recipient(s). If you are not the named recipient you should not > read, distribute, copy or alter this email. Any views or opinions expressed > in this email are those of the author and do not represent those of the > company. Warning: Although precautions have been taken to make sure no > viruses are present in this email, the company cannot accept responsibility > for any loss or damage that arise from the use of this email or attachments. > > > > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
