Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, Cisco, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
I have an iPhone SE and I want to change the sound notifications for when I get messages how do I do that?
How can I DHCP assign an IP address?
We want to establish a new SDN lab at our campus. In this regard, please let me know the components required and their cost to establish a bare minimum lab setup to demonstrate SDN concepts to students.
What is the difference between WRKMLMBRM and WRKMEDBRM commands in AS/400?
This issue has been bothering me forever! I recently bought a computer that runs Windows 10. I usually keep it near my bedroom. But now when I put it to sleep, it wakes up after a minute or so. It's giving me a headache. I disabled the wake timers but it's still happening. Can anyone help?
I am a SAP FICO student. How how can I get a trial version of SAP to practice on?
How can I delete the last n records from a table in Oracle?
We used FMTDTA command to copy data from one PF to another PF. However, in the target file, one of the fields (length 8 packed decimal), got junk values like (+++++++++++). The file from which the data was copied had all correct values. Also we ensured that both the files (source and target files)...
What are the requirements for choosing an ALM tool?
Hi all, My Google Drive is running into an odd issue. The app on my Mac says I have used 5.9 GB. But the folder says I have used over 13 GB. Why is there such a big difference? Am I missing something? What should I look at? Thanks.
Is it possible to have two dates in a purchase order? Chinese supplier is FOB so need a date for supplier to have ready for shipping and then a date for receipt into warehouse, approx. five weeks later?
How can I call someone that I added to my reject list?
Where can I find ODF files in Windows 10?
I need to add server to domain, create admin group and place AD security groups into the newly created admin group. Is there a consolidated or simplified way to do so?
Hey everyone, For my job, I use Google Chrome all the time. But I did notice one issue - my spell checking seems to be very off. It's not giving me that many suggestions. Is there a way to improve that? A setting change? Thank you!
How can I track down or view/search the audit log to see who made changes to a User Profile
I have a couple of ad blocking programs on my laptop (Adblock Plus is one of them). But recently, I've noticed so many more ads coming in on the sites I'm visiting. Should I just try a different ad blocker to see if that works? I primarily use Firefox too.
I'm on a HP laptop with Windows 10 already installed on it. It says the current RAM is 4 GB but I would like to increase that. Is there any way?
I'm building an Access DB and would like to have people interact with it through forms and command buttons. Adding command buttons should be very straight forward with the wizard, and it is until I test the button - the buttons I create don't work and give me this error message: A problem...
In cloud security we generally see that there is traditional security like authentication, verification, etc. Is there is any security rather then traditional security?