Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, Cisco, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, Routers, RPG, RPGLE, SAP, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
For a PDF file, can I use Adobe Acrobat to globally replace the font? If not Acrobat, is there another tool I can use?
How do I open a Yahoo webarchive document? If the document is a "webarchive" document, I can't open it. I have a MAC, but I have also tried to open the "webarchive" on a PC. I even started a yahoo mail account hoping that I could open yahoo webarchive documents. But that did not work either. The...
Hi Experts, I am working on the S/4HANA system and using the FIORI apps for creating the purchase requisition, I have configured the external Catalog in the webservice and assigned those catalog in PPOMA for the FIORI user. When I logged in FIORI, I am not able to see those catalog IDs while...
I forgot my password to get into my laptop. It's running Windows 10 and I don't have a reset disk. Can you help me?
How can I create diagrams by overlap for risk types in Microsoft Excel?
Hi All, Can anybody help me to declare a variable having the similar propery of 'STATIC DATA TYPE IN C'. Means declare a variable and initialize it inside the procedure and called the procedure recursively but each time it is initializing the variable. I want any mechanism in PL/SQL that will make...
Usually - I generate a PDF file dynamically. Would there be a way for me to check the number of pages in that file using a Shell Script? Thanks so much!
In reference to Ibmi ILE programming environment. I am in a screen program which is set to 132 length. There are multiple calls to other programs that are set to 80 length where there is not a problem getting the CPF4169 error. So now I have a new program to call and I am getting this error and I...
Would I be able to process the file correctly if I would have a CL program submitted 10 x simultaneously that contains OVRDBF. Behavior is similar to multi threading and this would really help process a very large file with less time. OVRDBF is necessary to point to the correct file member prior to...
How do I get started in Agile software development?
I have a recently created / updated Microsoft Excel file. This needs to be converted to a PDF file ASAP. What's the best approach to do this? Possibly a Java API? Thank you so much.
Anyone know how I could extract specific text from PDFs / Microsoft Word files in C#? I'm specifically looking to remove images / other rich text. Thank you.
I plug my iPhone into the USB port to charge during work. I own the phone, work owns the computer. Are they able to view and monitor my activity on my personal phone while charging on the laptop? (Email, Internet, text, etc)?
My laptop locked up because I couldn't remember my password so I can't access my laptop. How can I recover it.
What type of EDI format SAP use to send ASNs? It is EDIFACT?
Hi. I was wondering if HP - ALM can be used to test the Android based applications. Thanks.
Microsoft Outlook is not storing passwords for extra accounts. What should I do?
Hi All, what is the basic difference between layer 2 & layer 3 switch. how can configure layer 2 & layer3 managable switch
SQL Server 2016 uses AES-256 symmetric encryption algorithm for backups. However, it uses an asymmetric key in conjunction with AES-256. As we know, asymmetric keys are not designed for large data encryption. Does the system, under the hood, generates a sort of symmetric session key and encrypts...