Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, Cisco, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Hi, I keep getting error :you attempted to open a database that is already opened exclusively by user "xxxx" on machine "xxx". When I look there is a duplicate database name with the .dlb extension. This lock seems to be on all day? at the end of the day my excel works perfectly(when the .dlb is...
I'm using Amazon EC2 and I'm trying to figure out that when I reboot an instance, would I get the initial image again or is the state of the hard disk (before the reboot) stay the same? Also, for billing purposes, would the hour start again or does it continue with the fraction of the hour that I...
Hi all, I am planning to install a second domain controller to our main corporate network. There are currently two DC's in place; one is the primary DC, which is a physical server, and the other is the secondary DC which is virtual. My question is about DNS. I understand that when I add a new DC to...
Hi, I have a windows 2003 server setup, when I create a shared directory on it, all users can access it no problem. But as soon as I try and apply restricitons to it, no one can access it anymore. When I looked into this a bit further I noticed that all the active sessions on the server were GUEST...
We have Windows 2003 Servers as our domain controller. We are facing some problem with CPU utilization. When I captured to traffic using sniffers, I figured out a protocol called SMB which is frequently used by clients to communicate with Domain Controllers. I am wondering what is this SMB protocol?
i wish to know details of different component of storage like lun(logical unit number).means clear my concept regarding storage system.is there any good tutorial or sites for that?thanks
I'm currently using Amazon EC2 but I'm fairly new to it. I keep seeing these different utilization instances but I don't know what they mean they it talks about light, medium and heavy utilization instances. Is it just referring to the price differences? Thank you.
What would the top 10 CMD commands if someone were to list them?
I'm thinking of running several CPU-intensive computations in the cloud. The only real requirement I need is that it needs to be able to run .NET applications with enough security permissions for a reflection-based IoC container. Has anyone used .NET applications in the cloud? Particularly Azure,...
My company has a website where users upload files (and many of them are pretty large). We have a few EC2 instances so we're looking to load balance them and they're currently stored on an EBS volume (because they're easy and fast to access). Is there a way to replicate these files so we can upload...
I'm currently running 100 different machines for my organization and by using virtualization, it allows us to pretend that we're running 1,000 machines. But we're looking to integrate cloud more into our system so I'm looking to find out what role cloud computing plays with virtualization. I know a...
I understand that in Amazon EC2, a small standard instance consists of "1.7 GB of memory, 1 EC2 Compute Unit (1 virtual core with 1 EC2 Compute Unit), 160 GB of local instance storage, 32-bit or 64-bit platform." But here's what my question comes in: Do I get access to the entire physical CPU core?...
How can I subscribe to TechTarget's e-newsletters?
I keep getting this error in Windows 7 64-bit: Error 32 the process cannot access the file because it is being used by another process But I don't know which process is creating this error. How do I check which process is creating this error?
I restarted my computer and after opening i got about 50 error messages saying that pretty much every program on my computer could not be found. I then attempted to open McAfee Security center to run a scan and after attempting to open it i got another error saying the program could not be located....
Actually I have a system and I use the Microsoft SQL Server 2005 for the Database. Can anybody help me. Thanks.
I'm pretty new to Windows Azure but I'm trying to figure out how it's different from other web hosts. Besides the billing / costs, what differences are there between Azure and traditional Windows web hosting? Is load balancing the biggest difference?
I need to bypass the original AS/400 sign-on screen validation, send the User profile and a digital generated variable password to a web service to be validated by Fortress software, then if valid enable sign on or send an error message. Anyone know how to do this?
How can I store information from other computers connected by LAN in Oracle 10g? For example: The datetime of a computer.
How I can exponentiation in SQL of IBM iSeries access? I need execute a financial formula and it's include exponentiation.