Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Data Management, Database, DataCenter, Desktop Management, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
10. Choosing a block size when creating VMFS datastores Eric Siebert has written a guide on how to choose the right size for VMFS datastores. 9. How to use command line arguments in VBScript via the Wscript.Arguments Object Jerry Lees explains a helpful VBScript trick. 8. Using VRDP to view...
How is holiday overtime used in Kronos?
What are the current norms for ASA? Who are the best Industry benchmarks? I've reviewed average time to abandon but fully realize that we modify caller behavior based on the reason for the call, tolerance, call back options, etc.
What are your thoughts on the implementation of a DMZ to limit remote access?
I recently transferred to a new laptop using Windows 8. I have moved everything and sorted out the new screens with one exception. I cannot get Gbridge installed and since that is the heart of my client support system, I cannot fully transfer to the new computer without it. The issue appears to be...
Be able to extract the Logs from Windows (App & Sys), IIS, Individual App Logs ( Ex Sharepoint Logs, AD Logs, biztalk logs) etc into a Central Logging Server repository A friendly GUI to check the status of the transfer etc. Simple email alerting of the transfer would be good. Able to generate...
For the past two years, I've been hacked on my cell phone, laptop and desktop. Can someone help me with more inept security as the person doing this is very intelligent, a tech and my ex.
I decided to go ahead this morning and set up Outlook 2013 this morning. When I clicked on it, it came up with this message: "Cannot start Microsoft Outlook. Cannot open the Outlook window. The set of folders cannot be opened. The file C:\Users\XXX\AppData\local\Microsoft\Outlook\XXX_m sn.ost...
Is it possible to use greedy algorithm to be used for cloud storage and file accessing
I had to reboot my computer and lost the print shop program. I reinstalled print shop but am unable to recover the PDG files that were saved. How can I move the PDG files back into Print Shop 22?
AutoCAD 2015 block editor appears to be opening in paper space. How do I change to model space?
I am researching whether my county can create its own ILEC (Independent Local Exchange Carrier). I am clear on the state laws that apply, but am curious as to what federal regulations apply to ILEC and what steps would need to be taken on the federal level. I know the FCC regulates ILECs, but that...
If someone gets your mobile pin number, what all can they do with that information? How far reaching is that?
How can I find the source the used my email in spoofing?
I would like to receive acknowledgements from vendor once they received our email. Can the PO be updated in SAP automatically from the email confirmation?
I have a small network of 5 clients, a server and 2 printers running on win7homegroup network with DHCP running. I have 2 clients sharing a wired port via a switch. all connects to another switch and then to a router for internet access. When one of the clients attached to the switch (with 2 comps...
If a PCI compliant service provider hosts his technology to third party clients with the third party having only web access to a portal (with viewing cardholder data/debit/credit card permissions), does the client require to be PCI compliant since all storing/coding/encryption is performed by the...
In a typical 3-tier server architecture what kind of wire protocol (such as HTTP) is used? Is it common to see a L7 SLB between Web Tier and APP Tier? Also, in a typical server servicing HTTP request is it common to encounter a large number of static objects - I.E object not generated dynamically...
At what point(s) (e.g., metrics, KPI) should a small B2B software provider look to automate their customer service functions?
How to add a new tab in ATG Service Center using ATG COntrol Center