Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, Cisco, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Inside of DB2, I'm trying to rename one of my tables. But I keep getting this error message: the name "mytable" has the wrong number of qualifiers.. SQLCODE=-108,SQLSTATE=42601 What should I do? How can I fix it.
Hello everyone, I'm trying to figure out if a certain table exists in DB2. And if that table does, how can I drop it? Thank you.
Recently, I came across an article naming "Nanotechnology and its role in agriculture". I am working on a same project for last 1.5 years and still did not succeed in creating a sustainable Intensification in Agriculture. I was wondering if my idea would bring a large improvement in agriculture...
How do you see blockchain applied by telcos and ICT providers for businesses?
Let's say I want to do: SELECT * FROM tableName But some columns' values have linebreaks, so in my MySQL console it breaks the formatting of the table. I know I can circumvent this by explicitly REPLACE()ing CLRF chars, but this requires me naming each column and is not very quick to type out, eg.:...
Which script to use and how to write the script to automatically match the question from our script and click the correct answer (which would be included in the script) and move on to next question. This should continue until the number of questions to be answered becomes "zero". Please share the...
I would like to find out if it's possible to install Douwin Software? A hotel door lock software on a server and have other systems access and use the same software. I really appreciate your anticipated help.
I need to open my Pagemaker 5 files. How can I do that?
How does the router know about the port number in NAT and in extended ACLs and suppose the Router just know at Layer 3 network layer?
What is the benefit of the OSPF process-ID?
When we add the command "spanneng-tree vlan 1 root primary " on non root switch, how do I put their priority?
Are the scale out NAS solutions around these, tested/confirmed for HDFS: Dell Fluid File System, Isilon, Hitachi NAS Platform, HP StoreAll, Huawei OceanStor, IBM Elastic Storage, NetApp Clustered Data Ontap 8.x, Quantum StorNext, Red Hat Storage? Can you please point me to links on their...
I just want to know, can I install Filezilla on cpanel or a PHP based web host?
Do they loop run even when you are not running WhatsApp?
My wife has secrets on Facebook. Can I get into her Facebook account?
On Skype, I don't know how to reset my password.
A quick question, what about vendor security? How can you make sure their product is safe? How do you validate that? What things should you look in a Multi-factor authentication vendor that guarantees their product is safe/secure?
What are the key key features differentiating network monitoring tools and firewalls/UTMS? If an organization runs cyberoam, for example, do they require a network monitoring tool for bandwidth and other security/network management aspects
I want to know what it can potentially do. I have two PCs of my own and we have just brought a laptop and a wireless printer in which required our internet connection password. I need to know can that printer access my files through the internet and print as it pleases? If it can which I don't...
Please I need urgent help. So there is this person who could be hacking my phone. One thing I'm worried about is them seeing my deleted photos and videos from the past. But is it possible for them to do so without possessing my phone?