a few questions....

What kind of issues is this really? Hijack, emplode, etc...
What kind of person (expertise wise) does it take... should I bend Mark's ear? If not then who?
How programming intense is it? I assume the clock data can be accessed easily enough, but it that a good assumption?
_________________________
Michael West