Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
In reference to Ibmi ILE programming environment. I am in a screen program which is set to 132 length. There are multiple calls to other programs that are set to 80 length where there is not a problem getting the CPF4169 error. So now I have a new program to call and I am getting this error and I...
Would I be able to process the file correctly if I would have a CL program submitted 10 x simultaneously that contains OVRDBF. Behavior is similar to multi threading and this would really help process a very large file with less time. OVRDBF is necessary to point to the correct file member prior to...
How do I get started in Agile software development?
I have a recently created / updated Microsoft Excel file. This needs to be converted to a PDF file ASAP. What's the best approach to do this? Possibly a Java API? Thank you so much.
Anyone know how I could extract specific text from PDFs / Microsoft Word files in C#? I'm specifically looking to remove images / other rich text. Thank you.
I plug my iPhone into the USB port to charge during work. I own the phone, work owns the computer. Are they able to view and monitor my activity on my personal phone while charging on the laptop? (Email, Internet, text, etc)?
My laptop locked up because I couldn't remember my password so I can't access my laptop. How can I recover it.
What type of EDI format SAP use to send ASNs? It is EDIFACT?
Hi. I was wondering if HP - ALM can be used to test the Android based applications. Thanks.
Microsoft Outlook is not storing passwords for extra accounts. What should I do?
Hi All, what is the basic difference between layer 2 & layer 3 switch. how can configure layer 2 & layer3 managable switch
SQL Server 2016 uses AES-256 symmetric encryption algorithm for backups. However, it uses an asymmetric key in conjunction with AES-256. As we know, asymmetric keys are not designed for large data encryption. Does the system, under the hood, generates a sort of symmetric session key and encrypts...
What programs do I need to hack? Can I hack a Twitter using my phone?
I need help finding a solution that enable storage of pictures/ information of certain containers that are shipped from warehouses to customers. Readily accessing those pictures from warehouse facilities is vital. It also has to be able to centrally store these photos so that you do not have to go...
How I can change English numbers to Arabic numbers?
How do you open a file with a NLS extension?
How can I scan all network computers have IP static or dynamic? I've checked IPs from all the networks but I don't how can I check the DHCP settings. It's possible this without access to the a server?
Hi Experts, I need to develop a Java application that will call SAP BW Open Hub APIs to extract data from SAP BW tables. I see that SAP provides following APIs: RSPC_API_CHAIN_START RSB_API_OHS_3RDPARTY_NOTIFY RSB_API_OHS_DEST_READ_DATA RSB_API_OHS_REQUEST_SETSTATUS I would like to understand how I...
We have connected a Canon ImageRUNNER to our iSeries via the network. I have created a Workstation Customization Object to send reports to a specific mailbox and can't get the PJL code to work. I know the system is recognizing the Workstation Customization Object because I can get it to switch...
Are you able to restrict a Exchange/AD user from editing there own calendar? I set the permissions in exchange shell by running this command: Add-MailboxFolderPermission "EXAMPLE:\calendar" -User "EXAMPLE" -AccessRights Reviewer Still allowed him to edit. I also logged into his account and changed...