Targeting multiple environments and machines – part 2/2