Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, Cisco, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Hi, In our shop, we need to get a user access to take printout from AS400 to a printer that is outside our office network. We proposed to create a virtual printer session and download the print output which can be printed in any printer to which the machine is connected. However, during this...
My cousin gave me a PC to use for college. It's running Windows 10 but his user profile is still on it. I can't delete it. Is there a way to? What can I do?
Hello, I have a very specific need of importing an OST file into Exchange Server (OST files belong to some other server). Can anyone help? Regards, Raj Malhotra
I have a brand new Dell Inspiron laptop running Windows 10. I first did a Safe Boot when starting up the laptop. But since I did that, I can't get past the password screen. It's not accepting my password. I already went into setup to go back to the defaults but still not working.
Today, I accidentially marked an email from my boss as spam and it was moved into the spam folder. I moved it back into my inbox but when Outlook syncs, it goes into the spam folder again. Any idea on how I can fix this?
Would I be able to send an email and hide by IP address? I want to hide all things related to sending the email.
What are virtual lans or vlans? What are they used for and will they allow me to increase my networks overall speed and throughput ratio?
Hi, I have already the savf in my pc and i need to transfer it to as400. what will i need to do? anyone that can help me. Thank you in advance.
I use QLZAGENK API to generate license of an existing product. When I pass license term as V9R0, I get the key generated properly. However, when I pass license term as V1R0M0, I get CPF9E41 error. I understand that this API verifies the presence of product definition somewhere in the system for...
This is for all of those storage experts out there. We have a NAS (Synology) that has a script running in the scheduler. We need to cancel that but we don't see an option. What's the process here? Thanks!
How do you setup for secured FTP? Can the process be automated like normal FTP?
Hello experts, I just created a HTML page from one of our company's templates. Now, I need to send this in Microsoft Outlook 2016. But after looking around, Outlook doesn't allow 'insert as text' in an email. How can I send this HTML email in Outlook? Thank you!
Hi, I need a list of SAP users and their corresponding T-code access. I can do it via SUIM user by user but this is too slow. Are their any other T-codes that can do it? Cheers
Hello everyone, I know this is more of a discussion than a question but I wanted to get everyone's thoughts on the latest security issue: WannaCry ransomware. Are you surprised how fast it spread? What can we do to prevent these attacks in the future? Share your thoughts!
What are the factors I should consider when designing an integrated supply chain information system?
My phone will not let me make and receive calls. It tells me that the messengers are not connecting.
How can I protect my mobile phone from being hacked? Have an internet security and free of malware on my device? I found my bill very high and my internet package runs out very fast. Is it a sign of hackers?
How can I stop a person from hacking my phone?
My phone was somehow accessed by a woman I met asking me to buy my used generator. She then used info from there to hack into my laptop, which uses a Wi-Fi router to get on line. She then began using my bank card to pay her bills, etc. Last year I finally changed my phone # (she was able to turn...
We have a certificate verification system where certificates are verified via Encrypted QR codes and NFC Tags. Can we host this data in Blockchain (Open Source/decentralized databases) without compromising Student data confidentiality but enjoying the extra security of cryptographic encryption of...