Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Data Management, Database, DataCenter, Desktop Management, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
How do I reduce the speed of copy from a shared folder?
I need to create a program. This program will must copy files for the back up. I mean, before RSTLIB (for restore 10-15 files from savf into library) command all same objects in library must be copied to the special library for back up objects. Please help me.
I am currently researching the compatibility issues between Lotus Notes and Microsoft Outlook. My current company uses Lotus Notes relase 8.5.1 for mail, address, calendar and scheduling. The company is tightly tied to Lotus Notes because of other applications, so the possibility of retiring...
I want to delete record from one logical file and delete from another logical file based on RRN. Both logical files are from same physical file. How to achieve this?
When joining 2 files that have identical field names, what does the syntax need in order to handle this? I know the old IBM Query uses a file prefix. On AS/400 platform (DB2)
Even if I set the number of appointments to the max of 25 on the To-Do bar, Outlook is showing only 5 appointments. I close the Calendar Navigator and the Task List but only 5 appointments show. Is there a way to get it to show more?
If you don't have the vendor checked, why will a check generate?
Hey, I have built a PBX by using the Ozeki SDK and and want to connect it to my existing Cisco Unified Communications Manager PBX by using SIP trunking. By following the instructions of this Cisco setup guide, I have successfully connect the SDK to CUCM, but SIP trunking does not work, because of...
What are some of the biggest cloud security issues for this year?
I'm doing this assignment on Database Management System which is an investigative report and I'm suppose to come up with a Research Question which that will be the main purpose of my research and other three Key Questions from that Main Question. I made up my Main Question to be "How does modern...
How do I install a .exe commercial CD that is not plug-and-play; OS Windows XP?
I am working as Linux Admin and have 6 years of combined experience in system administration (Linux & Windows), network administration (routers, switches and firewall). I want to move on to security field. Which certification/course I should go for?
There are so many choices for VDI. In order to help narrow down, can anyone describe the major differences between these three technologies? VMware Rapid Desktop Appliance (like Nutanix) VSAN Ready Node EVO:RAIL
How do I create BDC session in SAP ABAP FOR LS01?
Hi, I have a Mapi process in my VB program that sends an email via MS Outlook. The problem is that it comes up with 4 stops being "The profile name is not valid. Enter a valid profile name", "Choose Profile" and two Allow Accesses. There is only one Profile Name being Outlook and saying OK on the...
When restoring a system database (master, model, MSDB) the database data will be replaced by the backup data. My question is will the system database path will change or not? Will the system database path point to the old path or backup file path?
Why is the quality of CC so poor?
How do I have an auto increment column in a physical file?
How can I use deadlocking handling? Is this a legitimate security method?
How do I find out who using my network with CMD?