Can we change product name at install time?

Thanks,
Mukesh 



**** ANY TAX ADVICE IN THIS COMMUNICATION IS NOT INTENDED OR
WRITTEN BY KPMG TO BE USED, AND CANNOT BE USED, BY A CLIENT OR ANY
OTHER PERSON OR ENTITY FOR THE PURPOSE OF (I) AVOIDING PENALTIES
THAT MAY BE IMPOSED ON ANY TAXPAYER OR (ii) PROMOTING, MARKETING OR
RECOMMENDING TO ANOTHER PARTY ANY MATTERS ADDRESSED HEREIN. ***

Any advice in this communication is limited to the conclusions
specifically set forth herein and is based on the completeness and
accuracy of the stated facts, assumptions and/or representations
included.  In rendering our advice, we may consider tax authorities
that are subject to change, retroactively and/or prospectively, and
any such changes could affect the validity of our advice.  We will
not update our advice for subsequent changes or modifications to
the laws and regulations, or to the judicial and administrative
interpretations thereof.

The advice or other information in this document was prepared for
the sole benefit of KPMG's client and may not be relied upon by any
other person or organization.  KPMG accepts no responsibility or
liability in respect of this document to any person or organization
other than KPMG's client.

***********************************************************************
The information in this email is confidential and may be legally privileged. It 
is intended solely for the addressee. Access to this email by anyone else is 
unauthorized. If you are not the intended recipient, any disclosure, copying, 
distribution or any action taken or omitted to be taken in reliance on it, is 
prohibited and may be unlawful. When addressed to our clients any opinions or 
advice contained in this email are subject to the terms and conditions 
expressed in the governing KPMG client engagement letter.
***********************************************************************

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
WiX-users mailing list
WiX-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/wix-users

Reply via email to