Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, Cisco, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
I have 2.5 years of experience in Java support team. Now I have placed my paper due to location change. I am willing to change my domain to testing. I have done course for manual and automation testing. Do I need to search for jobs as a fresher now?
I am using MS Outlook 10. All new mail enters my mailbox tagged as read. Why is that?
Is it possible for me to change the categories of a bunch of contacts using an excell spread sheet of the contacts I wish to change. I have a large number of contact emails in an excell sheet and rather than doing it one by one I would like to just make outlook recognize the email addresses and...
Cannot deleted mail from Unread Mail Folder
We are using Outlook 2007 with Exchange 2003. I have a recurring appointment set up on a shared calendar. Permission is granted to everyone to edit, delete, create new, etc. When that appointment is edited by someone else, it turns into what looks like an email. In other words, when I open...
We have a Exchange 2007 server that has been running since the end of 2008. We recently replaced all of the XP Pro workstations with Win 7 Pro stations. Outlook 2007 or 2010 are installed. everything works perfectly except none of the users now receive delivery or non-delivery receipts. I checked...
Autonomy archive email messages open with wordpad and are unreadable and unforwardable.
I would like to push out a registry key to check the box for download offline address book. Can someone tell me the location of the regkey for this checkbox? Thanks, Glen
Would it be possible for me to get the field names of my Microsoft Access database table? Is there a SQL query I can use? Thank you.
Hi experts! Would there be an Oracle command I could run so I could get all of the sequences in my Oracle database? This is for Oracle 11g / Oracle Toad. Should I use the command line?
For some reason (this only happens once in a while) but my Oracle database on Windows disappears. Because of this - I'm thinking of doing a manual uninstall. How can I do that?
I noticed that whenever I try to add an existing to an existing column in Oracle, it's always down at the end of the table. Is there an Oracle command where I can tell it to put it in the table? Thank you.
I'm currently using Visual Studio 2013, but for some reason, I can't find MySQL database in the choose data source dialog window. I have MySQL connector and installer installed. Do I need something else?
How can I find the relations between all of my MySQL tables? My database has roughly 100 - 200 tables and I need to find out their relation. Is this actually possible? Thanks!
Is it possible to create additional top level folders, i.e. at the same level as Mailbox-INameI and Archive folders for additional accounts? If so, what are the steps?
How do I unlock a GWS file that holds geopack information?
We have to change EHR due to our current one will be "sunset". I would like a comparison chart of best EHRs for a small rural practice.
Would anyone happen to know where I can get a sample question of AS/400, RPG, CL, SQL and DB2.
There are many encryption protocols in use in today's networks. Both symmetric and asymmetric encryption protocols are used for various purposes (IPsec, SSL/TLS, SSH, S/MIME, OpenPGP/GnuPG/PGP, Kerberos, etc.) and then there are protocols like RPC that use some sort of encryption to protect email...
Every where I saw asterisk with a single server instance can support 300+- concurrent calls. What specification could handle that much traffic?