Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
My team has one large Microsoft Excel workbook and several other smaller workbooks. There really is a large amount of data on the one workbook so that's currently read-only (but I do need to edit it at times for filtering and other things). Here's what I want to do: I want to turn autorecover off...
Is it possible to lock down the folders (or directories) within Windows, so they can't be accidentally dragged and dropped into some unknown location? With multiple users using the same files, we are finding that the Windows folders are disappearing. I was wondering if there is a way of locking the...
Currently I'm working as VAS L2/L3 Application support Engineer. In which working on database, Linux and application deployment. I want to change my field and move on SAP so kindly tell me which is best for me. And how can I learn and move future on that field?
I'm setting up / installing Windows 10 on my new machine. There's one thing that I want to disable first: Narrator. Is that possible? Or should I just disable it when I installed everything? Thank you very much.
We have an application running on IBM i which used to send mails. We are using a third party email service. I wish to send email from IBM i but i received an error "550 Authentication is required for relay ". How can I give this authentication?
Hi there, I have many mobile devices sending data to my Static IP lease line - connected to our in house servers. However when my lease line is down - my portals are down with no incoming data. I do have a back up static IP line - but we have many assets in the field and its impossible to change...
I am trying to change the look and feel of the IBM BPM portal's login page. I read about it in this link. I have installed the Windows hotfix suggested in the link and I have also checked 'Default to basic authentication when certificate authentication for the HTTPS client fails' in Websphere...
Having transformed from an environment with an unreliable HA AIX environment, we move to use LPM within production. We have a second site which is the DR estate. Therefore, we have Oracle license in production and DR. Oracle have indicated that LPM is in breach of the license, I think they require...
I share an apartment with my roommate. The main modem is in the living room and the Wi-Fi isn't that good in my bedroom. So I thought of just doing an ethernet connection. But it's way too far. My thought was to make a relay network. Is that a good idea? Thank you very much
What is the difference between Windows Server 2003, Window Servers 2008 and Windows Server 2012?
I've been trying to run several .EXE files from my secondary drives (machine is running Windows 10) but I keep getting this error message: Windows cannot access the specified device, path or file. You, may not have the appropriate permissions for the item So then I tried to run it through CMD and...
Hi all, Just looking to see if anyone knows what 'Anexgate' means or what it is? Thank you
I have to do disclouser attack using Java...can I do it? If yes, then please help. How can I do it because I am studing about security and I know what is happening in disclouser attack but I have to practically know it.
I constantly have to insert Images from an extensive Photo Library, and in an ideal world, I'd like to know if it is possible to have the Caption insert the File Name of the image. Alternatively, any method of having the name of the File printed alongside or below the image would also suffice. Any...
Hi experts I am looking for a high level remote access security reference architecture and best practices. Following NIST document looks like a good start. Can anyone please give any further recommendations? Thanks in Advance.
In my department, my boss shares his Outlook calendar with me so I can see the calendars for several of our conference rooms. When I look at my calendars, it brings me to the calendar I viewed last. This is an issue because I create a meeting on the wrong calendar. Can I set a default so it just...
Hi, Please let me know the difference b/n File Level identifier, Record Format Level Identifier and Member level identifier with an example
Is there a way I can get the queries history in SQL Server?
I'm using Exchange 2013 - and I noticed that the 'calendar attendant' is accepting all of my meeting invites and updates them too. I don't want this setting. Can I remove it? Or at least disable it?
I am trying to open videos of my son, from when he was a baby...but the are alll mvi files with a .jpeg rather than the .avi that all the other videos are. I am not very tech savvy and really would appreciate help. We are on an old Mac desktop. Thank you.