Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Cisco, Database, DataCenter, Desktops, Development, Exchange 2003, Exchange 2007, Hardware, iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Windows, Mobile, Networking, Oracle, OS, Outlook, Outlook 2003, Outlook 2007, Routers, RPG, RPGLE, SAP, Security, Servers, SQL Server, SQL Server 2005, Storage, Tech support, Virtualization, Visual Basic, VoIP, VPN, Windows 7, Windows Server, Windows Server 2003, Windows Server 2008, Windows XP ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
This morning one of our computers lost its Menu Bar (the entire thing) in Microsoft Word. Any ideas how to restore it? Google search hasn't answered the question. Any help would be appreciated.
I have a test environment that I already have hosted from my computer. I've configured an external switch so other people can access it.Inside of Hyper-V Manager we can see that we have: "Hyper-V Manager" and under it we have connection to the local machine. We can also add a connection by...
How do I access or process multiple tabs from an XLS input file in an ABAP program?
How can we reduce the risk of customers installing onto a virtual machine and then cloning the virtual machine, bypassing our licensing?
When I'm at work, I use a Windows XP Pro machine for development and I use a MacBook Pro while I'm at home. I'm considering moving over my development environment to a virtual machine using VMware Fusion (through the Mac). Is it possible to open a VM image (which was created on my Mac) with my...
We’re trying to run a program on local machines, terminal servers and Citrix. The goal is to have it generate logs of user specific data. I think the proper protocol is to save the data in AppData (C:Users\AppDataRoaming) using the following path:...
I've talked to some people around my department and they have said you can back up VHD files on Hyper-V 2008 (non clustered) and back them up while the guest is live and running (with PowerShell scripts). Can anyone give me more information on this? What kind of back up? Is it an export? Thanks for...
If a single key like student id has multiple records like many subjects. While trying to update the subjects, how do I retrieve multiple values from a single key field?
I've been hearing a lot how VMWare Fusion can run virtual operating systems in "headless mode".While this seems to be a feature for many virtualized OS what does it actually mean? What is the system doing in this mode?
When I print a word document as a PDF, sometimes pound signs (##) appear that are not in the original document. Is there anything I can do to ensure this does not happen? Thank you!
I'm trying to connect two different Hyper-V VMs through a serial port. Since Hyper-V exposes the port as a "named pipe" to the host system / implements the sever end of the pipe, I need a named-pipe client to connect to both VMs.When I tried to write an application, all the data was lost. What...
It means clone one hard drive to another without disruption the running system, so you can worked as you cloned. Am I right?
I accidentally removed the DWG to PDF in my plotting drawings. How do I reinstall?
I have a snmpwalk output from a machine and I would like to generate a mib file from it. Is this possible? if yes, how? Thanks. Zakarias
Hi, everyone, My ISP (Enta) have started to do Bonded ADSL. The hardware they recommend is a Cisco 1921 - I'd also need a couple of ADSL Modules - this brings the price to over £1000 - bit too much for a broadband router. However, I'm told that I can connect multiple Netgear DG834's as they have a...
Hi All, It seems my company is affected by key loggers and root kits and malware. Would you people suggest if this can be cleaned and controlled at perimeter level with help of ASA firewalls, IPS things of that sort? Can we tight the security for these kind of issues with ASA firewall at perimeter...
I have a view with a column SWID. The source column is Varchar while in the view creation it has been cast to INT. The source table has a non-numeric value "CITY", while during the view creation, this record have been filtered out. When I select all records from the view, it's working well....
I have been working on assessing a few leading network equipment vendors in the likes of Cisco, HP, Juniper, etc., to procure Layer 2 switches. I am currently assessing the capabilities of Huawei and i have been hearing about a litigation raised by Nortel (Avaya) against Huawei on their Layer 2...
What's the nicest feature of the new Cisco 2960-X series?
This question was originally posted in July 2007 and I was wondering if anyone had a solution for it. email attachments sent from the AS/400 via SNDDST to a mobile device arrive with carats (<>) around the file name. (i.e. <test.txt> instead of test.txt). As a result the mobile device...