Questions & Answers

  • Application benefits by bypassing write cache

    Which type of application benefits the most by bypassing write cache?

    meghalahari5 pointsBadges:
  • Two mail copy in Lotus Notes 8.5.2

    I created rules on Lotus Notes 8.5.2 but when I'm sending mail that is received, I'm getting 2 mail copy.

    PAELTD5 pointsBadges:
  • Outlook PST data disappeared, as if never existed, tried all sorts, any ideas???

    turned on Outlook and out of the blue it said .pst file couldnt be found. it then created a new one in a new location i tried to find the original but it wasnt there. i have tried the SCANPST function and nothing came of it as working from the new fiile and old file wasnt overwritten. i tried using...

    Antonfang25 pointsBadges:
  • Random Data not transferred through Connect:Direct

    What does pacing logjam, trying to..." mean?

    josephlee5 pointsBadges:
  • M4A file creation date

    I have an M4A file that was sent to me. I've downloaded to my hard drive. I'm trying to find the original creation date for the file. When I right-click-properties, it only shows me the timestamp of when I saved it to my hard drive.

    dlolli5 pointsBadges:
  • Can I transition into a QA position?

    Can I transition into a QA position? I am a career Executive Assistant (didn't plan on it, and hate it, I used to be a pretty smart gal, was going to get a PHD in IO Psychology but tragedy struck after I got my BA many moons ago, anyway...) and I have an interview Monday morning for a QA position...

    Mazarbul5 pointsBadges:
  • AS/400: Route web service request to application job

    How can I route Web Service request to different application Jobs? I have application batch jobs (listeners) running in different subsystems with one sub system for each country on single iSeries instance. Each country has it's own Data Base library but all of them have single program library as...

    sim400310 pointsBadges:
  • SRTP implementation for VoIP calls

    The product I work on utilizes a hardware security processor for encryption and decryption. Now I need implement the work done by hardware security processor in software part. For that purpose am using openSSL code. My code can encrypt and decrypt the RTP packets but the problem is hardware...

    venkateswar5 pointsBadges:
  • What is the difference between BCC and To?

    For my studies, I'm trying to learn the difference between BCC and To in an email. Can someone help me out?

    gerardpower5 pointsBadges:
  • Which CMS is best for e-commerce development?

    Can anyone tell me which CMS is best for e-commerce development?

    Naveenseo25 pointsBadges:
  • How to create a vpn like Hide my ass,zenmate etc

    I want to be able to create a professional vpn software

    reggieking905 pointsBadges:
  • Can I hack Wi-Fi password without aircrack device?

    Can I get into a Wi-Fi password with Wi-Fi slax or Kali Linux in my laptop? a|And without aircrack device for example (alpha device)?

    Mjrem9315 pointsBadges:
  • Peoples\’R\’Power.

    Jaguar1205 pointsBadges:
  • Can I run a dual monitor setup?

    I'm thinking about buying second screen but I'm not sure my PC can support it. My graphics card is GTX 970 and motherboard is Gigabyte H81M-S2H. Can I run dual monitor setup?

    Thorden5 pointsBadges:
  • Small network patching

    I am looking for a Patching tool for small home based, and small business based networks with no servers. I used Retina, BigFix, SCCM and others in my last job, but I am doing some consulting for a small startup, and need a small scale solution. Would be optimal if I could access remotely, so as to...

    SgtGus135 pointsBadges:
  • how to use php

    Hi!! how to learn php language in a simple way?it's syntax ,etc..thank you in advance!

    iamrechelyn5 pointsBadges:
  • Convert Oracle Database to SQL Server with Cascade Updates.

    I am trying to convert Oracle database to SQL Server. Ten years ago I converted this same database from Access to Oracle. The database had a lot of cascade updates in it and some are not always downward flow. Sometimes they go up. I used after update triggers with deferred foreign key constraints....

    dpmcateer5 pointsBadges:
  • reade opcode

    how to read numeric duplicate key values in rpg program..

    2273645 pointsBadges:
  • can the window button on task bar be turned on and off for each user?

    One of three users on this win10 laptop can't access the windows key on keyboard or the window button on the left end of the taskbar. How do I turn it back on for that user?

    mdcarey535 pointsBadges:
  • requirements for web traffic analysis

    i want to know the functional and non functional requirements for web traffic analysis

    Prathamesh055 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.