• compatibility matrix

    Does the Avaya wireless phones can support Cisco Call Manager?

    sijo19835 pointsBadges:
  • how to transform pst files to wab

    I have my adressbook in Outlook , that is pst files...and would like to have the same in a windows adressbook which is using wab...what to do ?

    Seawind17095 pointsBadges:
  • BI Publisher Parameter

    I want to pass parameter from obi publisher to RPD. So that i can fetch record from opaque view on the basis of that parameter. As it is done in answer with the help of session variable and request variable.

    44063860 pointsBadges:
  • Storing and retrieving data

    I have something very specific I want my spreadsheet to do for a schedule I am making. I want to be able to add data as text (IE shower or eat out) as a list 1-40. Ths list would give each text a value 1-5. If the text is already in the database, then it would only add the value to the balance...

    shyfellow19555 pointsBadges:
  • sending to groups

    I am trying to send e-mail to groups that I have in my address book with outlook (hotmail). My groups are 33-37 addresses. On my first attempt the message only went to 20 of 33 in the group. Is there a limit to how many can be in a group?

    jimmiejim5 pointsBadges:
  • Would versioning a file make it less secure?

    I'm using KeePassX as a password manager, and I've stored a KDB file in a Sparkleshare folder to back it up / sync with other devices.But just as a question (with the file being encrypted) if someone stole the file, they would several different versions of the file with minor variations. Would that...

    ITKE62,175 pointsBadges:
  • DB2 Logical Files – Select/Omit statement

    Is it possible to use field-to-field comparisons in a select/omit statement or must the comparison be a literal?

    DoctorT15 pointsBadges:
  • DUPSPLF

    I need to use DUPSPLF. How can I install TAA to be able to use DUPSPLF?

    adambenahmed5 pointsBadges:
  • ask.fm

    someone made a fake ask.fm account. how do i find out who it is?

    sarah197815 pointsBadges:
  • opening webarchives webgalleries

    I can't open webarchives or webgalleries on my mac..that i created in bridge ..either through the link or downloaded to the desktop on this mac book pro

    jamesdaddio5 pointsBadges:
  • Exchange 2013 where to troubleshoot mailflow issues.

    I ran into an interesting issue the other day we were having mail flow issues, end users reported mail not working, I remember in exchange server 2010 I would normally check make sure its not a connectivity issue they were still connected to exchange server, next I would check toolbox next.  with...

    Arcolino20 pointsBadges:
  • What differentiates certain zero clients from others?

    I have been looking into the different zero clients offered by companies like Dell, HP, Samsung, etc. From what I've seen so far, there are major price differences between some. However, with there being very little in them, how can differentiate some from others. Also, do all zero clients use...

    mathew355 pointsBadges:
  • What types of content shouldn’t be sent by email?

    I'm been doing some research on email security and I've realized that while emails are one of the main ways of business communication, sometimes it's not entirely secure.Does it make sense to use emails for these examples:E-TicketsSoftware license filesSo from a practical point of view, how...

    ITKE62,175 pointsBadges:
  • Detecting / Reacting to DNS tunnels

    Lately, I've been seeing a lot of talk discussing TCP/IP over DNS requests (usually because port 53 UDP is open and unfiltered). What techniques are out there to detect and block such tunnels? Have you seen such tunneling on a network before?

    ITKE62,175 pointsBadges:
  • Is NAR an image file?

    When I capture an image by my Nokia Lumai 520 and add it to my desktop, it shows so many nar files. Why?

    rattupandit5 pointsBadges:
  • Our team is looking to a tool to scan a PDF file for malware

    Our development team is looking for a tool that can scan a PDF file to determine if it might contain malware or a virus. Alternatively, the tool assigns a risk level to PDF.A web-based solution could work if it's scriptable. Does anyone have any suggestions?

    ITKE62,175 pointsBadges:
  • Testing tool for performance of VB 6.0 code

    Can you please let me know the freeware or licensed testing tool to find out performance of VB 6.0 code including load balance testing?

    infotech815 pointsBadges:
  • Two line smartphone

    How do I add a second phone number to a smart phone and do I have to pay for it?

    Jean1810 pointsBadges:
  • Asus Webcam

    How do I turn on the webcam on my Asus laptop?

    kmaxwellsmith5 pointsBadges:
  • How do I remove SDN that has been implemented on my home computer?

    (SDN may be good for businesses and the people implementing them, but if you are the user, its hard to regain control.) Seems like SDN has been implemented on my own home network. We have Cisco E2000, an ISP Provider set up. Now it seems, Either intruders or practicing IT family members have taken...

    Jean1810 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following