Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, Cisco, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Anyone know how I could extract specific text from PDFs / Microsoft Word files in C#? I'm specifically looking to remove images / other rich text. Thank you.
I plug my iPhone into the USB port to charge during work. I own the phone, work owns the computer. Are they able to view and monitor my activity on my personal phone while charging on the laptop? (Email, Internet, text, etc)?
My laptop locked up because I couldn't remember my password so I can't access my laptop. How can I recover it.
What type of EDI format SAP use to send ASNs? It is EDIFACT?
Hi. I was wondering if HP - ALM can be used to test the Android based applications. Thanks.
Microsoft Outlook is not storing passwords for extra accounts. What should I do?
Hi All, what is the basic difference between layer 2 & layer 3 switch. how can configure layer 2 & layer3 managable switch
SQL Server 2016 uses AES-256 symmetric encryption algorithm for backups. However, it uses an asymmetric key in conjunction with AES-256. As we know, asymmetric keys are not designed for large data encryption. Does the system, under the hood, generates a sort of symmetric session key and encrypts...
What programs do I need to hack? Can I hack a Twitter using my phone?
I need help finding a solution that enable storage of pictures/ information of certain containers that are shipped from warehouses to customers. Readily accessing those pictures from warehouse facilities is vital. It also has to be able to centrally store these photos so that you do not have to go...
How I can change English numbers to Arabic numbers?
How do you open a file with a NLS extension?
How can I scan all network computers have IP static or dynamic? I've checked IPs from all the networks but I don't how can I check the DHCP settings. It's possible this without access to the a server?
Hi Experts, I need to develop a Java application that will call SAP BW Open Hub APIs to extract data from SAP BW tables. I see that SAP provides following APIs: RSPC_API_CHAIN_START RSB_API_OHS_3RDPARTY_NOTIFY RSB_API_OHS_DEST_READ_DATA RSB_API_OHS_REQUEST_SETSTATUS I would like to understand how I...
We have connected a Canon ImageRUNNER to our iSeries via the network. I have created a Workstation Customization Object to send reports to a specific mailbox and can't get the PJL code to work. I know the system is recognizing the Workstation Customization Object because I can get it to switch...
Are you able to restrict a Exchange/AD user from editing there own calendar? I set the permissions in exchange shell by running this command: Add-MailboxFolderPermission "EXAMPLE:\calendar" -User "EXAMPLE" -AccessRights Reviewer Still allowed him to edit. I also logged into his account and changed...
Left outer join is giving spaces between the values of 2 columns, how to get the output without any space in between, tried using '||' but getting error on CURRENT DATE field?
A particular app reveals app_secret but has server side verification, still there is little risk in revealing app_secret. Can anyone let me know the possible attacks that can be done using app_secret and proof of concept?
I'm looking to embed a PDF file into my website. I already tried using Google Docs Viewer but it's not working correctly in IE. Does anyone have a recommendation for what I should do?
I have formatted one PC, after re-installing all software system won't allow to open all excel,word files showing "file access denied...encrypted file or read only", though I logged through administrator with all rights. All files was encrypted by earlier user and created certificate, before...