Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Cisco, Database, DataCenter, Desktops, Development, Exchange 2003, Exchange 2007, Hardware, iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Windows, Mobile, Networking, Oracle, OS, Outlook, Outlook 2003, Outlook 2007, Routers, RPG, RPGLE, SAP, Security, Servers, SQL Server, SQL Server 2005, Storage, Tech support, Virtualization, Visual Basic, VoIP, VPN, Windows 7, Windows Server, Windows Server 2003, Windows Server 2008, Windows XP ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
What are the various solutions we can have by using a BPM software.
I have a Windows 2003 with exchange 2003 sp2 installed. I recently found out that it is not possible to reply or forward mails from the public folder using OWA. A bit of googling lead me to the following where it is mentioned:...
How this file is getting into to my phone? Are the files affecting my phone browser?
How can I convert a TIMESTAMP data field to a CHAR data field?
What is the difference in performance bet' cloud security solutions for ISP's clients and security program for PCs (like Norton security program for instance)?
I have 3 Gmail accounts and can't seem to sign in to any of them. one is a private account email@example.com, the other is firstname.lastname@example.org and the last is email@example.com. How can I get into these emails?
I am currently a student at UAT and we were directed to this forum with the instructions to post a question about Security Frameworks, so the best question I can have is, What Security Frameworks have any of you personally worked with and which do you feel is better?
Should I approach this through this through the preferences screen or code a dialog box into which users can input their details? Either way, how should I arrange security for the app?
How can you reformat a drive from FAT to NTFS without losing all the data?
I installed Oracle forms 6i database on Windows Server 2003. IIS is configured also. But when it runs, it says forms.java not found.
I've got a machine with Windows Server 2008 R2 and two internet connections from different ISP's. I would like to know how to setup my internet connections in such a way that if one goes downs the other connects automatically. Can NLB be used to clear this out or should I use some other kind of...
I have disaster recovery plan for my Exchange server in mind, but I like to know if you have any idea how to configure it appropriately. I have a production server running Exchange Server 2007, and I backup with Data Protection Manager 2007 every 15 minutes. I like to have a virtual machine on a...
How does a SQL Server store a composite primary key compared to a single primary key?
I’m using a Django app in conjunction with default Python Filestorage. In this configuration Django generates a lot of files and I want to find a way to cut back on this. Is there another way to do this beyond setting the django-fsfield? I’m looking for something open source.
What is the best way to program a Linux-based simulator for USB mass storage? I’m specifically looking for any links that provide a detailed step-by-step explanation.
Does anyone know a way of detecting network speed and bandwidth usage using C#? Are any open source components involved? Thank you for all your help!
Can you please provide me with the Excel file sample for big data analytics with real world examples.
How can I delete 100 logical files delete in a single operation?
I’m developing an app that will listen in on a TCP/IP port. How do I choose the default port upon which it will listen? I hope to limit port conflicts when it is installed across our network.
I'm looking to start a server that listens to a port. I can easily specify port explicitly and it's working. But I'm looking find a port in an automatic way. What port numbers should I search for? (I've used 12345, 12346 and 12347) How can I see if a port is actually being used by another software?