Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
If I delete a member from group, does that stop their messages from being seen by others in group? Thanks.
I am new to programming and have been learning from tutorials and a couple books. what hasn't been covered is the simple things like how what to save folder and files as and my latest obstacle is how to open the preview window in Atom. Any help would be appreciated.
I want to transfer file through XFB on Linux box, but file has numeric name. According to XFB, file name should start with alphabet, we cannot change file name. Please suggest how to transfer such numeric named file through XFB.
What are the hardware requirements for a PC/laptop for SAP ABAP programming.
How do I go about changing a variable value in calling a RPGLE program?
In a particular time there was a sudden spike in CPU which halts an application for a while. Any help how could we find the root cause? Will performance monitor report help?
I'm pretty new to Java and I'm trying to understand if there's a way to avoid Java code in JSP files. Something like this: <%= x+1 %> <%= request.getParameter("name") %> <%! counter++; %> Is the best technique? Or is there another way to do it?
Hi, I had a archived copy of my email on the local system. Due to some problem my C: drive of the system got corrupted and I had already taken one copy of my archive folder. After reinstalling the OS and Lotus Notes now I have kept the archive copy in the same folder DATA\Archive\batabasename. Now...
Hi, I have set preferred and alternate DNS addresses for my router. I used OpenDNS addresses and Norton connect safe addresses. But those addresses changes frequently maximum 1 or 2 days I think. My question is how to fix alternate and preferred DNS permanently. Whenever these addresses changes i...
How do I measure packet loss?
How to find your email server on a Kindle Fire?
DECLARE LOC_ITEM_CODE VARCHAR2(30); LOC_ITEM_CLASS VARCHAR2(10); LOC_ITEM_TYPE VARCHAR2(10); LOC_ORDER_CODE VARCHAR2(10); LOC_ITEM_LENGTH NUMBER(10,2); LOC_ITEM_WIDTH NUMBER(10,2); LOC_ITEM_HIGHT1 NUMBER(10,2); LOC_REQUEST_YEAR NUMBER(4); LOC_REQUEST_NO VARCHAR2(25); LOC_BIG NUMBER(12,3); LOC_SMALL...
I am using Access as a front end to SQL Server 2014 backend database using DSN-less connections to tables and for pass-thru queries. All works fine. I have recently created a second database within the same instance of SQL Server, and believe I have set log in credentials the same for both, but am...
What will happened if I set 10 LUX instead of 400 LUX? For reference: I referred data sheet of the sensor. It indicates 10 LUX is for night and 400 for twilight operation. But I am not getting it. Please help me!
How would I get CRTCSVF?
Fly qik+ mobile consists a GSM and WCDMA SIM slots. Which SIM card can be used in WCDMA sim slot in it?
Why does the transmitted table arrive as a read only?
We have Cisco 2-tier drop-down campus network, that has 2 core switches, with ASA firewall and TMG is working for contents filtration. All clients are connected in VLAN 1 in the core switch to get internet connectivity. We created a VLAN 2 in core switch and tried to give all clients internet from...
Hello, I am currently doing a dissertation on ITSM and ITIL and I was wondering if you would know where I can find genuine stats on how many companies have adopted ITIL?
Will a proxy or firewall report show my snapchat log in/username, when accessing through employer Wi-Fi, or will it just show I accessed the app and for how long?