Questions & Answers

  • What’s the performance of CPYFRMQRYF and OPNQRYF?

    I would want to know the performance of this 2 commands OPNQRYF and CPYFRMQRYF. I will join 2 files and have some selection criteria. File A has 3000000 record and 1500000 number of deleted record in DSPFD. After that it execute CPYFRMQRYF command. So now the problem is this program take longer...

    yeepiyaya160 pointsBadges:
  • QA Testing on multi-tenancy environment

    Can someone please offer suggestions on how to test on a multi-tenancy environment?

    jessicahope5 pointsBadges:
  • Connect Visual Basic into XAMMP database

    How could I connect Visual Basic into XAMMP database?

    shucayb5 pointsBadges:
  • How to tell a program to uninstall itself in Visual Studio

    I want to know how to use Visual Studios to write a program that runs itself and then silently uninstalls itself after a certain period of time.

    rsloop910 pointsBadges:
  • How can I prove if I’ve been hacked?

    Hi, I have a Huawei Wi-Fi type HG523E home gateway and I'm suspicious over my national telecom company technician being hacked. I see my MAC address from the label device is different from when I detect with other third party software. Then sometimes, a few days ago, when I type but the...

    Lither5 pointsBadges:
  • Samba AD and PDC doesn’t work after Ubuntu server update

    I am running Ubuntu Server 14.04.1. The server uses Samba 4.4.6 to implement an Active Directory and is the primary domain controller. Each time I update the server I can no longer log into the domain. To fix the issue I reinstall samba and set up the AD and PDC again. Each of the domain clients...

    IronmanMask5 pointsBadges:
  • Gmail on separate devices

    I have my Gmail on 2 separate devices and I was wondering if I delete my emails off 1 device if it will delete it off the other.

    Hanskeemily85 pointsBadges:
  • Which SAP training to go for?

    I am working in ITES Industry (KPO), currently working as a Senior client service executive, handling a variety of projects and tasks for clients, I have experience of working in CRMs like ZOHO, Pivotal, Evernote, other IT tools like pipedrive, Dropbox etc. Though I am having a role of a kind of...

    pallavikabarthakur5 pointsBadges:
  • Contingency plannning

    What is a the high-level plan for handling contingencies?

    Shomwele5 pointsBadges:
  • FXP files conversion (To PRG FoxPro program)

    I'm using FoxPro 2.6. Can somebody guide me as to how FXP files are converted back to RPG (without spending money)?

    TomLiotta125,585 pointsBadges:
  • Can I use VB 6 in Windows 8?

    Can I use Visual Basic 6 in Windows 8? I'm trying to develop a software to control hardware of robot arm so I want to know that can I use this in Windows 8 and upcoming version of Windows?

    roneyptl5 pointsBadges:
  • Migrating From Office 365 to an onsite Exchange Server 2010

    How would I migrate from Office 365 to an onsite Exchange Server 2010?

    Krellan25 pointsBadges:
  • Convert IBM SCRIPT to AFP format

    How do you convert IBM SCRIPT to AFP format for printing purposes?

    AV228645 pointsBadges:
  • Permissions

    How do I make a file write permission?

    eddword5 pointsBadges:
  • Tutorial for loading service contracts Using iDocs

    Hello, I am new to LSMW iDocs, came to this site looking for a solution to upload service contracts in CRM. Is there any tutorial I might use? Thanks a lot!

    AlejandroMI5 pointsBadges:
  • Add class networks to checkpoint IPSO

    I want to add same class networks like and and in our checkpoint IPSO. Is that possible? Is there any chance for getting overlap? We are facing VPN drops. I have doubt not sure it is because of overlap?

    laijushivas5 pointsBadges:
  • What is a hacker?

    Can someone tell me what is a hacker?

    Qinelinkosi5 pointsBadges:
  • Why do we to do black box testing?

    Why do we need to do black box testing. Programmers also can do testing. There is a cost involved in hiring black box testers then why do we not hire only programmer and divide the testing also among them only?

    sidgbpec5 pointsBadges:
  • Algorithm for removing the viruses

    Hi, I am looking for the name of algorithm that the antivirus software use it for "Removing" the viruses not for detecting. I just found a lot of algorithms for detecting the viruses, but I really want to know the process after detect a virus. Thanks in advance, Amjad

    AmjadAmer5 pointsBadges:
  • Multiple and multi-tasking operating systems

    What's the difference between multiple and multi-tasking operating systems?

    emmanueletim5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.