Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Uncategorized, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
I intend to do a project in cloud forensics. So as to analyze the packet captures from the cloud, I have to purposely inject corrupted packets in the network and thus into the cloud so that on a later stage I can analyze the packet capture for forensic analysis.
Hi, I am setting a process of creating a table and inserting data into it from another table. I created a table "example". When I run the SQL command insert into mylib/example select (some specific columns) from example2 where User = 'sqakxb'. It is throwing exception error. When I run the command...
Sir/mam, I have a Table of different product of mutual fund its valuation(nifty level change) is to be calculated. Each product has a different formula which takes input of some variable parameter and some static. How do I calculate row by row formula? (including Average function for eg,...
I recently installed Windows 8 on my MacBook Air. But I noticed that the command key is located differently from a normal keyboard. I always click Winkey and Enter but it brings me to the narrator. How can I disable it?
Is the native AS/400 SSL certificate SHA2 for AS/400 v6.X?
I have Fragment A which contains a child fragment B and another framelayout C. Child fragment B has a GO button, clicking on which results in returning dynamic amount of child fragments that I want to add in a tabbed layout in place of framelayout C. I have read so much about Tabhost and android...
Hi, I have single instance database without ASM. Now I want to convert this database to Oracle RAC database using ASM. Please mention the steps to convert this database to RAC. I have version 11gR2 (220.127.116.11). Regards Nadir Pervez Gill
Was wondering if anyone has used an effective video conference equipment that works well with Skype and Gotomeeting.
I like to route all data that is coming in at one IP address of my server to another IP address somewhere else on the internet. For example: My server has 2 IP addresses: 18.104.22.168 and 22.214.171.124 All the data that is coming in at IP address 126.96.36.199 should be forwarded to address 188.8.131.52 (this address it...
This job gives errors on things in use during backup, and bad data coming through. Is there any way to program these occurrences so the job can continue without intervention?
I'm trying to use a Windows VPN but only for one specific network. It can't take over my whole network connection. Would it be possible to make this automated so when I connect, it always does this? I appreciate the help.
Should the lights in the back off Citrix Mouse turn on when the Battery is installed, without actually connecting it to the Citrix receiver on the iPad?
In one of our AS/400 systems, we have heavy loaded data and backup takes so much time more than 11 hours. We like to run backups through flashcopy. On the another system we have clusters and geomirror, just need to confirm if we can set up flashcopy on the same system where geomirroring running so...
In Ubuntu, can I have an upstart job change its userID and then run a script as an unprivileged user? I know I can use sudo but is there any other way?
If I have a GPS, do I need Google Maps?
I am developing a test application to protect Active Directory object's attribute modification without modifying its Security Descriptor. Can anyone please help me out with some code snippet or useful link.
Our department has a number of accounts for Outlook 2007. Each account has a folder and there's a rule that moves a message into the appropriate folder. It also shows a desktop notification. But, for the past few weeks, it's stopped working. Can I turn this back on?
Hello Everyone. I am using MS Access 2000 I have a form (frm_cboclient)that has a combobox on it that I populate by querying a client table for clientID and client name. What I would like to do then is have a subform that will display all my order infomration from my order table, where the clientID...
Hello, I have many files in a folder: Example "SecRp201508_XXXXXXX". This have to be changed to a new month value like "SecRp201509_XXXXXXX". Over a batch program, I can manage to change only the last file in the folder: Attempt 1:set nm=1509_ for /r %%i in ("*xls") do set Base=%%~ni set...
how to open oracle 10g using web brouser?? nd what is the maximum memory for oracle ?? wht should be it's IP ADDRESS??