Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
What's the best way to scan a server?
I've noticed that my Windows 8 won't let me connect to a wireless network that uses WEP with shared-key authentication. I ran Windows 8's network diagnostics wizard and it shows that one exists. The wireless network that you are trying to connect to requires shared-key authentication, a low...
Would it be possible to log out a user from our website if he/she is using basic authentication? I already know that killing a session isn't enough because once a user is authenticated, the request contains login information so the user is automatically logged in when they access the site again....
How do I create an agent that sends e-mail notification to update a document based on last certification date?
Hi I am Deepti. I have done MCA. I have 1 year of experience in .NET. Now I want to do SAP courses. Which is the best as per my background?
At my organization, I need to change my password every 90 days (and I've been as the company for several years). Is there a specific attack that this is guarding against? Or is it just because "it's the way that it's always been done?" I feel like the only time I should change my password is when...
Should corporate boards be required to have representation from the information security domain? Is it a governance issue that security and IT risk management has become critical, yet director's ability to manage this domain has perhaps lagged?
We are merging with another accounting firm (totaling 20 users altogether) and will be utilizing Comcast Small Business internet/phone. We have a new server w/2012 R2 and want to keep wireless from accessing the wired network. The plan is is to connect the wireless APs directly to the Comcast...
Does anyone know if a MP3 download be saved on a CD?
how do you reset the password
We're trying to figure out how to add / configure an Exchange account programmatically. We've figured out how to do it manually: Settings -> Account -> Add Account -> Corporate and then fill in the fields and add the account. Does anyone know how to do this? Can we use Account Manager?...
I have a list of part numbers. I need to find all of the work orders on which they appear in SAP. Is there a transaction code or a report that will allow met to get this information?
I currently work for HOPE International School as IT Assistant, the school has 4 campus and need to access resources from each campus in the whole computer Lab or staff computer room.
Hi all, My laptop came with recovery drive of Windows 7 64-bit. I once re-installed windows from that recovery drive. Some time ago I installed some software after that "Windows not genuine" message start appearing. Then I tried to re-install Windows from Recovery Drive. But I come to know that my...
I have set up a POP3 email on Microsoft Outlook 2007. I have tested the details and they are correct. I can receive internal/ external emails and send internal emails but I cant send external emails. They are showing in my sent items as sent but are not delivered to numerous external email...
How to read/update/delete subfile records in cobal/400? I'm unable to read 2nd record. Please advise? Read subfile dsp-file record into sflrec-i format is 'sflrec' perform until file_status='10' move ... rewrite db-rec format is 'pfrec' read subfile dsp-file next modified record into sflrec-i...
In my PC game, it's not playing. It keeps asking for .exe file. What do I do?
Does anyone know of a sample governance chart?
I have process definition stored. Eg. given two activities A and B with their attributes, I wish to check that constraints defined in relation to one another will hold when there are multiple instances created. Is this possible to do in XPath?
If I enter a character value of '12345' then I need to get a output of 123.45 . I did like %dec(var:5:2) but its getting a run time error.