Questions & Answers

  • When it comes to cloud services, is security your highest concern?

    In a recent Quocirca study for CA Technologies, it was found that IT security spending was higher among companies who said they were enthusiastic about cloud computing services. But 72% said they lacked the resources required to secure their cloud services. When it comes to cloud services, is...

    Michael Tidmarsh36,400 pointsBadges:
  • Add addresses to server to send emails

    Hello, in my server configuration, Router/SMTP, Restrictions and Controls, SMTP Outbound controls. There I have configured that domains can "program " my server to send mails. What I need to do is put the addresses that are allowed to use of the server for this. When I tried, it ceased to deliver...

    alzorzoli5 pointsBadges:
  • Proxy server hack

    My system seems to keep restoring functions I don't want on its own it uninstalled the antivirus over night and I'm getting Weird Proxy server messages and DNS probing errors on my browser's can't load this page message sudden dead signal periods or really slow periods Ping spiking like crazy and...

    Greco3335 pointsBadges:
  • Tell MongoDB to pretty print output

    Is there a way to tell MongoDB to pretty print output? Right now, everything is output to a single line and it's pretty difficult to read (especially with arrays and documents). I appreciate the help.

    ITKE355,690 pointsBadges:
  • AS/400 backup with 3 LPARs in IBM i 7.1

    We built a new system with 3 LPARs with IBM i 7.1 . We setup the BRMS & using image catalog ,we created the virtual volume and scheduled the backups. Backups are performing perfect in virtual volumes also we can make a dupe tape using the physical media. My question is we have data of just 50...

    naresh1984365 pointsBadges:
  • Create a command in AS/400

    I need to create a command similar to savobj, for example savobjcom. So that I can directly replace all the savobj commands used in CLPs. Its just that I need to add DTACPR(*MEDIUM) for all the CL commands, but the customization will tak e alot of time. Please help. Many thanks in advance.

    jamesalive195 pointsBadges:
  • Cognitive model in computer interaction

    What is the cognitive model in human computer interaction?

    leteking5 pointsBadges:
  • How to apply roaming profile for multiple users?

    I just know how to apply roaming profile for each person. Can you tell me step how to apply roaming for multiple users?

    ainonYUSMADI15 pointsBadges:
  • Lotus Notes calendar invitations

    Why are my calendar invitations going into my All Documents view?

    dcox25 pointsBadges:
  • Format for writing a Wikipedia

    Is there any format a person needs to know in order to write a Wikipedia?

    clare19465 pointsBadges:
  • Using a banner in a website?

    How to use a banner in a website?

    somanath5 pointsBadges:
  • Restrict users from streaming online in the office

    We run a small network in my office which consist of a switch, a modem and about 10 systems. I would like to restrict users from streaming online, from viewing inappropriate sites and also to deactivate the internet when 1gb of data has been used up.

    donlumy5 pointsBadges:
  • Cloud computing security as a service

    What is cloud computing security as a service?

    aljabri30 pointsBadges:
  • Can a printer print a barcode?

    Can a simple printer print barcode or not

    tayyab5 pointsBadges:
  • How to install Skype

    Is it easy to install Skype?

    kathy11111115 pointsBadges:
  • Lost password to Nokia Lumia 630

    I lost the password to my Nokia Lumia 630. What should I do?

    magee1235 pointsBadges:
  • Query MongoDB with LIKE

    I'm using MongoDB but I need a query like SQL's like. Something along the lines of this: select * from users where name like '%m%' Is there a way to do the same in MongoDB? I would appreciate any help.

    ITKE355,690 pointsBadges:
  • SANDISK data life span

    Is it possible to get data corruption on a sandisk compact flash if it has been stored without power for 4 or 5 years.

    A23857410 pointsBadges:
  • How to restore Exchange after being hacked?

    I’ve this concern going all over my mind since my Exchange 2010 files that is .edb has gone corrupted and that makes me unable to open those files of any kind. Being an Exchange user I don’t even know how it got affected?

    benywolfy5 pointsBadges:
  • Process large text file with ByteStrings and lazy texts

    I'm looking to process a large unicode text file that has over 6 GB. I need to count the frequency of each unique word. I'm currently using Data.Map to track the count of each word but it's taking way too much time and space. Here's the code: import Data.Text.Lazy (Text(..), cons, pack, append)...

    ITKE355,690 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following