Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Hi sir, I'm trying to convert a pen drive. It's showing free space but I can't add it.
In one query I build four temp tables then I want to write the data from each temp table to its own filename. Is this possible?
I am having broad LAN connection which i connect directly to Laptop. now i want to use internet using WiFI router (netgear N150 WNR612). i am not able to configure router.
I keep getting this message when trying to get my Gmail: Connection is untrusted. What does that mean?
On my Android device, is there a way to test applications in development through Wi-Fi? I would like to untether my smartphone and develop it through the Wi-Fi. Would this be possible?
As I would like to get an HP laptop that has no Bluetooth installed. Will my items that use Bluetooth be able to be accessed via wireless
When I go onto bbm it won't stop saying starting bbm, I've set everything up and tried to make it work but it won't, what do I do???
We've recently begun setting up several different things for our organization and on the mobile side, we have access to Windows Phone 8 SDK. But, we were told that we need some type of special hardware for the emulator. What would be the system requirements for the emulator?
I'm working on a project that revolves around cloud computing and I'm becoming very confused over the difference between public and private cloud. From what I understand, public cloud relates to multiple users working on the same physical machine (which makes it unsafe for data). While for the...
I've recently begun an iPhone / mobile project over the past few weeks and it all started with me coming up with a "silly" development code name. But now, I need to change it since I'm almost done with the project. I'm actually not sure on how to do this with Xcode. I know I can just make a new...
I'm looking to find out how to actually parse XML data on a BlackBerry. I've heard JSON is the best option but are there other ways to do it (like a third-party tool)?
I need to save an image from a program I created (from the camera hopefully) to the system photo library on my iPhone. Can I do that? If so, what do I need to do? I've heard I can pass the image through an array but I'm not sure how to do that.
I'm relatively new to the whole "cloud computing" game but I recently came across this: Install Ubuntu in the cloud. What's meant by this? How is this different from normal web hosting? Any info would help. Thanks!
Would anybody know of the best way to detect whether a user is actually using mobile device in jQuery? Is there something like the CSS media attribute? I know there's the jQuery "$.browser" function but I'm looking for a different way. Thanks!
I know already that Google App Engine limits me to 2,000 emails per day for free. But my question is if I can use a third-party system so I can send more (about another 2,000). I'm looking for something that I can use easily with my SMTP server. Would anyone know of anything?
How do I decrypt an encrypted partition disk?
Is there a good way to have Apache and IIS both listen to Port 80 on Windows Server 2003? I need to do this cleanly as possible. Ideally, I would use packet headers to decide which server should handle the requests. But if anyone knows an easier way, please let me know!
What's the command that needs to be entered to open a local backdoor (server mode) which listens on Port 2380 for incoming connections
Which Intrusion Detection Systems are currently used in cloud environment to mitigate DOS and DDOS attacks?
Can someone please suggest some biometric techniques for preventing fraud voting?