Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
A PF has 10 LF’s. Normally, when the PF is updated, the data in the LF is immediately reflected. However, there is a scenario wherein when the PF is updated, I (the user) do not want to see the updated data reflected in any of the LF. How do you achieve this objective?
I am unable to resolve the names across a VPN tunnel connecting two private networks. I have a small private network (A) that is connected to a larger private network (B) over a vpn. To allow access to several database applications provided by network B. The vpn connection is made through a Netgear...
Is there a dependable device that one can purchase that will add notes to a PowerPoint presentation electronically, and then store the notes on the file? My boss currently prints out the presentation so he can make hand written notes on it....we need a way for him to take his notes on the PC and...
Does anybody know that how can I restore my PST password?
I have several SharePoint lists with several fields in common. How do I create a list view for each that filters on the same field equal to a specific value?
Dansguardian is sending e-mail to the wrong server, what relays the e-mail from the outside word to the inside? And how do I change it to point to the correct server?
How do I deploy Internet Explorer 7 over WSUS?
On a Windows XP Pro, and iSeries Client V5R3 with service pack SI28055. Navigator comes up with cwbunnav.exe error. Have installed this same version on several other Win XP Pro desktops/laptops with no problem.
Can anyone provide details about auditing in all areas of iSeries with commands to generate reports? Thanks in advance!
I have spool files with overlays and now need to be able to email or fax these from the AS/400. I am able to email using SNDSPLF however the overlay is lost when I do this. Is there a way to accomplish this with out additional software (I have AFPU).
We can not provide any type of hardwarde spam filter because of our current setup, my question is what is the best software for Exchange antivirus/spam protection?
I am getting ready to start N+ certification next week, any advice on what/how to study for it, is it difficult, any suggestions are welcomed and appreciated.
We are phasing out our operator and was curious if anyone has a proven full system backup that is run from the job scheduler.
We are at v5 r3. It's becoming important that we encrypt and decrypt customer credit card numbers as we process them on our home grown system. I'm told that there are api's available to encrypt/decrypt data, but I'm having a hard time finding them. Any help would be appreciated. Thanks in advance
What is the voltage, wattage and ampers for the IBM 6400?
Please tell me how can I declare date variable in my CL program?
Can I connect two Windows 7 machines together via Wi-Fi without using a router? I need to copy files both ways and the only connections in common on both machines are Wi-Fi 802.11 N.
Can exchange 2010 remotely wipe email data from mobile devices?
When I try to add an event/appointment to the Outlook 2003 calendar, I get an error message regarding the inability to open the form. What can I do?
Is there security testing equipment that will check my wireless and wired network for flaws or defects that would allow it to be taken over or infiltrated?