Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
What is the advantage and disadvantage of client/server?
I have downloaded as400 emulator TN5250 (free trial version). After installing the setup it took the IP address automatically. But if I say connect by giving a session name, it says "Sorry, unable to connect to the selected mainframe"
I did M.Sc. And i have taken training in linux system programming. I am confident in c language, linux programming(pipes,files,directories,fifo,IPC), linux socket programming and little bit of device drivers and kernel(2.4.and 2.6 versions).Give me an advice to do a certification course under linux...
Can CCIE or CCNP certifications replace the need for obtaining a degree to get a best job in the networking field.
What do you understand by loop in flowchart?
Can someone tell me what is a hacker?
How can I save a PHP array to a MySQL field? And, once that is done, would it be possible to get it in array form? Thanks for all the help.
I am interested in the key security risks associated with AWS Machine Learning. IT Domains specific to which I seek information are listed below: Access Control and User Authentication System / Product Security Application Development Network and Infrastructure Security Internet Facing Applications...
I persuade my b.tech from c.s.e department. I want to bright my future in the field of I.C development. Please help me to know: How can I program an IC? Which programming language is accepted by an I.C?
What exactly is the difference between primary and super key if both are considered to be unique? Why do we need super key when there is primary key?
I understand that LED lamps are put into Risk Groups as regards human health, with RG0 and RG1 lamps the safest. Does anyone know which LED replacement light bulbs (for incandescent bulbs) are RG0 or RG1?
I have a need to have the screen do an Automatic Refresh. I have created a working sample using CLP and setting the Display file to waitrcd(5). CRTDSPF WAITRCD(5). So I know it can work. I have found several examples using RPG. I need to do it using COBOL. Can any one help? I have taken everything...
Any one explain the implementation project in sap ps
Does any one please give idea about IKM test?
Active Directory user accounts are getting locked without any invalid attempt. Users are logged into the PC but account is locked out.
Does anyone have some examples of advancement in secondary storage for the future?
I would like to create a Hotspot Button that when clicked on by the recipient it generates a return email sent to me with the following reply: "Yes, I am attending this event." and then closes my email that was sent to them and marks it as read.
Is there any IT magazine in Urdu language? If so, what is name and URL?
How do I convert an Open Office doc. to an rtf format doc.?
How can I store my personal videos and data for long time except HDD and PDFs in office?