For example, John's modification where a login name is used in place of the
email address could be codified into a KnowledgeBase article as a "supported
hack" that, if we know it's in the problematic app, we can handle without a
problem.

We could have many such "supported hacks" that would be no problem.

Sorry, I should have mentioned this. :)

Respectfully,

Adam Phillip Churvis
Member of Team Macromedia
http://www.ProductivityEnhancement.com

Download Plum and other cool development tools,
and get advanced intensive Master-level training:

* C# & ASP.NET for ColdFusion Developers
* ColdFusion MX Master Class
* Advanced Development with CFMX and SQL Server 2000


**********************************************************************
You can subscribe to and unsubscribe from lists, and you can change
your subscriptions between normal and digest modes here:

http://www.productivityenhancement.com/support/DiscussionListsForm.cfm
**********************************************************************

Reply via email to