Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows 10, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
I'm the administrator for several computers in our department. Basically, I'm able to access those computers through our LAN. Here's my question: Would my coworker find out if I connected to their PC? Can they see it in Event Viewer? All of these computers are on Windows 10.
Is there a free server out there for gaming (poker) needs. It must be free.
Why are the first level caches usually split (instructions and data are in different caches) while the L2 is usually unified (instructions and data are both in the same cache)?
Ever since I updated to Windows 10 Insider Preview, I have been having issues. I want to go back to the latest public version. Is there a way to do that? Or do I have to wait until the next version comes out?
Hi, In our shop, we need to get a user access to take printout from AS400 to a printer that is outside our office network. We proposed to create a virtual printer session and download the print output which can be printed in any printer to which the machine is connected. However, during this...
My cousin gave me a PC to use for college. It's running Windows 10 but his user profile is still on it. I can't delete it. Is there a way to? What can I do?
I have a brand new Dell Inspiron laptop running Windows 10. I first did a Safe Boot when starting up the laptop. But since I did that, I can't get past the password screen. It's not accepting my password. I already went into setup to go back to the defaults but still not working.
Today, I accidentially marked an email from my boss as spam and it was moved into the spam folder. I moved it back into my inbox but when Outlook syncs, it goes into the spam folder again. Any idea on how I can fix this?
Would I be able to send an email and hide by IP address? I want to hide all things related to sending the email.
Hi, I have already the savf in my pc and i need to transfer it to as400. what will i need to do? anyone that can help me. Thank you in advance.
I use QLZAGENK API to generate license of an existing product. When I pass license term as V9R0, I get the key generated properly. However, when I pass license term as V1R0M0, I get CPF9E41 error. I understand that this API verifies the presence of product definition somewhere in the system for...
This is for all of those storage experts out there. We have a NAS (Synology) that has a script running in the scheduler. We need to cancel that but we don't see an option. What's the process here? Thanks!
How do you setup for secured FTP? Can the process be automated like normal FTP?
Hello experts, I just created a HTML page from one of our company's templates. Now, I need to send this in Microsoft Outlook 2016. But after looking around, Outlook doesn't allow 'insert as text' in an email. How can I send this HTML email in Outlook? Thank you!
Hi, I need a list of SAP users and their corresponding T-code access. I can do it via SUIM user by user but this is too slow. Are their any other T-codes that can do it? Cheers
Hello everyone, I know this is more of a discussion than a question but I wanted to get everyone's thoughts on the latest security issue: WannaCry ransomware. Are you surprised how fast it spread? What can we do to prevent these attacks in the future? Share your thoughts!
What are the factors I should consider when designing an integrated supply chain information system?
My phone will not let me make and receive calls. It tells me that the messengers are not connecting.
How can I protect my mobile phone from being hacked? Have an internet security and free of malware on my device? I found my bill very high and my internet package runs out very fast. Is it a sign of hackers?
We have a certificate verification system where certificates are verified via Encrypted QR codes and NFC Tags. Can we host this data in Blockchain (Open Source/decentralized databases) without compromising Student data confidentiality but enjoying the extra security of cryptographic encryption of...