In a recent article, Todd Biske weighed in on whether REST or SOAP is the better architecture for mobile applications. So what say you? REST or SOAP?
Answer Question | May 6, 2013 7:59 PM
Mobile applications, REST, SOAP
I have 2 servers at work that do not have the correct WSUS settings from the GPO. When I run the RSOP it does show that the GPO has applied correctly, but when I check the settings in the control panel the do not match. However it still doesn’t allow me to change it as [...]
Answer Question | April 25, 2013 6:22 PM
GPO Window 2008 Server, Group Policy, Server 2008R2, Windows Update, WSUS 3.0
What has been your experience with purchasing software performance testing as a service.
Answer Question | April 25, 2013 4:30 PM
Software, Software testing
What is the best practice in the retention or use period of backup tapes? Is it advisable that backup tapes are retained or use only until the expiration dates recommended by the manufacturer? Is the Symantec Backup Exec 2010 has the feature to identify tape that is not working (backup to tape has failed)? Please [...]
Answer Question | April 25, 2013 12:03 PM
Backup tapes, Symantec Backup Exec
Storage device or QNAP device if I remove the HD in a disaster will it work in a standard SATA PC straight away as a “drive partition” if it was in a raid configuration? I have a large media backup system and have been copying files between 3 USB external drives for ages via the”ActiveSYNC [...]
Answer Question | April 25, 2013 9:43 AM
QNAP, SATA, Storage
I want to know what are the challenges in converting Lotus Notes workflow application into Oracle ADF. What are the limitation in Oracle ADF which can’t be done comparing to Lotus Notes? Also, I want to know what are the benefits of Oracle ADF.
Answer Question | April 25, 2013 9:12 AM
Lotus Notes, Oracle ADF
I have Samsung Galaxy Young which has Android version jelly beans. The video player is running only audio and not video in any mp4 movies. Please help…why is it doing that?
Answer Question | April 25, 2013 8:52 AM
Android, Samsung Galaxy Young
I have a file which has an ID field and description. The same file is present in many library. I am trying to create an utility which will ask for the ID and it should display all the library which has the file with that ID in it. How can I achieve this? How to [...]
Answer Question | April 25, 2013 7:06 AM
AS/400, AS/400 Library
How to create a .CVS file using CPYIMPF? This is what I have tried. PGM DCL VAR(&FILENAME) TYPE(*CHAR) LEN(100) + VALUE(‘/qDLS/AJ73/AMIT’) DCLF FILE(AMITLIB/AMITPF) OPNID(OPNID1) CALL PGM(EMPPLY) CHGVAR VAR(&FILENAME) VALUE(&FILENAME *TCAT ‘.CSV’) CPYTOIMPF FROMFILE(AMITLIB/AMITPF) + TOSTMF(‘&FILENAME’) FLDDLM(‘,’) ENDPGM It gives a copy error.
Answer Question | April 25, 2013 6:19 AM
.CVS file, CPYIMPF
I have to do disclouser attack using Java…can I do it? If yes, then please help. How can I do it because I am studing about security and I know what is happening in disclouser attack but I have to practically know it.
Answer Question | April 25, 2013 3:28 AM
Hacking, Hacking tools and techniques, Security
Local clients (Windows 7 64-bit) have no issues clicking on the shared printer and installing the drivers, But when trying to add the printer from across our WAN, the client gets prompted “Do you trust this printer?”, but once you select “Install Driver”, they simply get “Windows cannot connect to the printer, operation failed with [...]
Answer Question | April 25, 2013 10:48 PM
Networking, WAN, Windows 7
I am a mechanical engineer and working as a cad engineer since 5.5 years. Which SAP module is suitable for me?
Answer Question | April 24, 2013 5:13 PM
SAP, SAP modules
What is the meaning of ‘DOY’ in Linux?
Answer Question | April 24, 2013 4:31 PM
Linux, Linux administration
Looking for insight and perspective on building a new collaboration platform (tools, process, and infrastructure)
Answer Question | April 24, 2013 2:48 PM
Collaboration, social media
According to the 2013 Verizon Data Breach Investigations Report, authentication-based attacks continue to plague enterprises as 80% of all attacks collected by Verizon (and other partners) were authentication-based. Who’s to blame for these attacks? Well. Tom Bowers, regional security architect at ePlus, says it’s users and their passwords. What can we do to better protect [...]
Answer Question | May 6, 2013 1:06 PM
Password, Security, Security management
I am using SFLSNGCHC(*AUTOSLT) to use subfile records as like choice. but I cannot do the auto advanced record like CHECK(ER). Is there any way can we use auto forward option in subfile selection?
Answer Question | April 24, 2013 11:27 AM
AS/400, AS/400 Subfiles
I was wondering if you could answer this question for me. I was given access to the HPI system (checks finance on vehicles) over 8 years ago through my employer. I thought this service was a free service as we are in the transport industry. I did 3 personal checks on this system (bearing in [...]
Answer Question | April 24, 2013 11:01 AM
HPI system, Security, Security management
Describe the difference between a User Status and System Status and what are they commonly used for in SAP.
Answer Question | April 24, 2013 7:18 AM
SAP, SAP Plant Maintenance
How to display a message (essentially error message) at the bottom in display file (DSPF) from a Message File (MSGF)? Also in order to display more than one message, how do I go about that? I have a MSGF, wherein all the messages are pre-defined, which we have to use. Would greatly appreciate your prompt [...]
Answer Question | April 24, 2013 6:27 AM
AS/400 - DDS, DSPF, MSGF
What is the iconic button for in Oracle Forms?
Answer Question | April 24, 2013 5:43 AM
Oracle Forms, Oracle Forms 10g