Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Uncategorized, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
What are some of the security requirements related to developing APIs and other IT Services?
When surrogate key is generated automatically, then why is a primary key required?
I have created new directory in AS/400 named MMVRADIR with subfolder MMVRAFLR. I have a CL program using CPYFRMIMPF command to restore the content of a txt file inside "MMVRADIR/MMVRAFLR/APDM082716.TXT" to AS/400 physical file SMREB33F. The CPYFRMIMPF was able to copy the contents but when I runqry...
Hi All I had made the changes in the program and debug the same but while debugging it gives me the following message at open query file line as: Unmonitored message CPF9899 occurred at statement. OPNQRYF FILE((F60SLB05)) QRYSLT('YTAN8 *EQ ' *CAT + &EMP *CAT ' *AND YTATIM *GT &STARTDATE +...
While typing an email in Gmail on my smartphone (LG android) a young woman only a few feet away was reading what I was typing on her smartphone (it was as if the screen on my smartphone was available on her smartphone). For the sake of brevity, the details aren't important. I just want to know how...
CICS remote region is experiencing storage violation, will the EXEC CICS LINK request from client region still work, reply a response to client OR will get lost and have timeout at client?
What steps and tools are needed to assess effort to migrate our ECC ABAP to S/4 HANA ABAP?
My GHz is 0.75 - 0.78 only! How can I improve my CPU speed?
We have created a combo box while running the application. If we click on the item in the list of combo box, it has to display the contents from the database?
Sir, how do you configure a limited number of users where the objective is that the session of these users will not automatically sign-off. Because the way i understand it, this is done using WRKSYSVAL SYSVAL(QINACTITV) but this approach will affect all users and this is not what i intend to do. i...
So, I rooted my phone and then I erased the Google Chrome and Hangouts APK on the system folder of my Android (I mean, the folder with all the apps that come with the cellphone, like the camera, for example). And I was wondering if I can safely factory reset my phone with these conditions.
I have an email that was delivered with this as a recipient http://email@example.com. What does it mean?
Why is my voice channel being selected from 0-4000 hz in PSTN i.e telephone wire line? How can I calculate the voice channel bandwidth (i.e 0-4000hz)?
What am I studying if I study data management?
Should / can I trust the yeabber website?
After a day, my old Outlook messages disappear. How do I view them?
Why is my program created using any word processing software in non-document mode?
Can my MTS 3G SIM work properly in WCDMA mobile?
Can I use my smart TV just to watch my dish network without internet connectivity?
Commonly where that file system is used and where not. I have a memory card which contains .fdb. Unfortunately, the system for which this file is to be used doesn't read this type of file. The message is ILLEGAL FORMAT.