Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Do I have to uninstall, then reinstall with a CD if it's the same model?
In Kali Linux, installed tor browser, but when I am trying to start tor service followings errors shows: when I type service tor status, it shows: tor.service loaded: not - found Active: Inactive But i have installed tor and run tor successfully with few tweaks. What would be the problem?! :(
How can I create / read an INDL file?
What is the purpose of SuperComputing under Red Hat? What is SuperComputing's system tools or utilities?
What is direct mail/direct marketing? And is it useful in the IT space?
I am nearly 50! But I want to change my career from social services to IT. I have a BS degree in social science. I live near a junior college that offers AS degrees in CIS with concentrations in CCNP or CCNA. Which is the better option? Is it possible to take these classes online? Or is hands-on...
How do you delete accounts and passwords in Windows 10?
I can't remember the right password of my computer. I need to access it now. What is the fastest way to recover or reset the password?Edit: It is a login password not BIOS password. Dell XPS 13.
I have a Master's Degree in IT. Is it ok to take a two year degree for a Diploma in IT Security? This is to further my knowledge about IT Security. Your thoughts?
What is the advantage and disadvantage of client/server?
I have downloaded as400 emulator TN5250 (free trial version). After installing the setup it took the IP address automatically. But if I say connect by giving a session name, it says "Sorry, unable to connect to the selected mainframe"
I did M.Sc. And i have taken training in linux system programming. I am confident in c language, linux programming(pipes,files,directories,fifo,IPC), linux socket programming and little bit of device drivers and kernel(2.4.and 2.6 versions).Give me an advice to do a certification course under linux...
Can CCIE or CCNP certifications replace the need for obtaining a degree to get a best job in the networking field.
What do you understand by loop in flowchart?
Can someone tell me what is a hacker?
How can I save a PHP array to a MySQL field? And, once that is done, would it be possible to get it in array form? Thanks for all the help.
I am interested in the key security risks associated with AWS Machine Learning. IT Domains specific to which I seek information are listed below: Access Control and User Authentication System / Product Security Application Development Network and Infrastructure Security Internet Facing Applications...
I persuade my b.tech from c.s.e department. I want to bright my future in the field of I.C development. Please help me to know: How can I program an IC? Which programming language is accepted by an I.C?
What exactly is the difference between primary and super key if both are considered to be unique? Why do we need super key when there is primary key?