Excellent, thanks Wally!

On Fri, Sep 14, 2012 at 9:23 PM, Wally Terhune
<wterh...@rocketsoftware.com>wrote:

> https://u2tc.rocketsoftware.com/documentation/PDF/1177927.pdf
>
> Wally Terhune
> Technical Support Engineer
> Rocket Software
> 4600 South Ulster Street, Suite 1100 **Denver, CO 80237 **USA
> t: +1 720 475 8055 **e: wterh...@rocketsoftware.com **w:
> rocketsoftware.com/u2
>
>
> -----Original Message-----
> From: u2-users-boun...@listserver.u2ug.org [mailto:
> u2-users-boun...@listserver.u2ug.org] On Behalf Of Kevin King
> Sent: Friday, September 14, 2012 8:37 AM
> To: U2 Users List
> Subject: Re: [U2] [UD] LISTUSER output: phantom vs. iphantm
>
> Is there a definitive list of operations that makes something an iPhantom
> vs. a phantom?  I know about sockets, but presume there is more, right?
>
> _______________________________________________
> U2-Users mailing list
> U2-Users@listserver.u2ug.org
> http://listserver.u2ug.org/mailman/listinfo/u2-users
>
_______________________________________________
U2-Users mailing list
U2-Users@listserver.u2ug.org
http://listserver.u2ug.org/mailman/listinfo/u2-users

Reply via email to