Evan,
>I was trying to help Biz for you! I figured you could throw out some teasers, maybe get a few folks in need of this sort of advice interested, lay out some parameters, but they got to pay the bread for the meat!<
Thanks for the thoughts, but I perceived such to be the case, and I considered the perceived backlash, i.e., the old criticism about consultants holding out the tease. So I refrained from coming across in a perceived solicitous manner in the thread.
By offering even the best solution to a single set of circumstances would actually, indeed, be a tease, because like I stated, it is a matter of what ails the patient, and no two patients' disorders are exactly alike. In fact, most are vastly different.
That's the beauty of the Internet Protocol. Once the older, restrictive platform is removed altogether, and the new IP provisions are put in place (and standards are adhered to), network elements lose their fickleness about who will talk to whom, and where. Provided, of course, that security and policy measures allow, and permissions are granted.
If you like, I will do a full-blown treatment using the parameters you cited in your earlier post, if you describe the actual set of givens in a particular networking situation. Now it's *your* turn to go and do some homework. No fair, if you get Charlie Slater to help you, though. He knows where all of the gremlins are. <g>
The rest of your post is real good stuff that we could work with. I would like to address those tomorrow, sometime, as it is bloody late here, and I'm going to get some shut eye.
Good Night to All from Narrows Manor in Bay Ridge, Brooklyn.
Frank C. |