On Tue, Apr 02, 2013 at 05:51:42PM +0530, Dhiru Kholia wrote: > http://dl.dropbox.com/u/1522424/probable-violations-F19.xls That shows: <D0><CF>^Q<U+0871>^Z<E1>^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@>^@^C^@<FE><FF> ^@^F^@^@^@^@^@^@^@^@^@^@^@^F^@^@^@<E6>^B^@^@^@^@^@^@^@^P^@^@<FE><FF><FF><FF>^@^@^@^@<FE><FF><FF><FF>^@^@^@^@<E0>^B^@^@<E1>^B^@^@<E2>^B^@^@<E3>^B^@^@<E4>^B^@^@<E5>^B^@^@<FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF><FF> Can you use a non-proprietary format please. Rich. -- Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones virt-p2v converts physical machines to virtual machines. Boot with a live CD or over the network (PXE) and turn machines into KVM guests. http://libguestfs.org/virt-v2v -- devel mailing list devel@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/devel