Excellent, thanks Wally! On Fri, Sep 14, 2012 at 9:23 PM, Wally Terhune <wterh...@rocketsoftware.com>wrote:
> https://u2tc.rocketsoftware.com/documentation/PDF/1177927.pdf > > Wally Terhune > Technical Support Engineer > Rocket Software > 4600 South Ulster Street, Suite 1100 **Denver, CO 80237 **USA > t: +1 720 475 8055 **e: wterh...@rocketsoftware.com **w: > rocketsoftware.com/u2 > > > -----Original Message----- > From: u2-users-boun...@listserver.u2ug.org [mailto: > u2-users-boun...@listserver.u2ug.org] On Behalf Of Kevin King > Sent: Friday, September 14, 2012 8:37 AM > To: U2 Users List > Subject: Re: [U2] [UD] LISTUSER output: phantom vs. iphantm > > Is there a definitive list of operations that makes something an iPhantom > vs. a phantom? I know about sockets, but presume there is more, right? > > _______________________________________________ > U2-Users mailing list > U2-Users@listserver.u2ug.org > http://listserver.u2ug.org/mailman/listinfo/u2-users > _______________________________________________ U2-Users mailing list U2-Users@listserver.u2ug.org http://listserver.u2ug.org/mailman/listinfo/u2-users