Questions & Answers

  • Cold Aisle Containment-what do you think its for?

    Is it for Hot spot cooling only? Or overheating in general? Or Energy saver?

    CoolDataCentre1825 pointsBadges:
  • Exchange 2007 error in mailbox server role

    Have Exchange 2007 with the mailbox server role installed getting the following error PKM executable encountered a problem and needed to close.

    ITKE351,965 pointsBadges:
  • How to monitor a file in windows for changes and run a program when it changes

    I have a single text file that contains a 5 digit number of the last barcode scanned when a user enters a facility. How in Windows do I make a batch file that watches for the file to change then execute command? for example, the file is c:\temp\lastbarcode.txt

    Probert5 pointsBadges:
  • Please explain RPG “Bind by Copy” and “Bind by Reference”?

    Can you explain the terms with example BIND BY COPY BIND BY REFERENCE

    rajeshece1,215 pointsBadges:
  • Backup & Restore in Exchange 2003

    Hi, How do I backup and restore single mailboxes and multiple mailboxes. I tried but was unsuccessful. Sadiq.Fazal

    A033328753745 pointsBadges:
  • How can I check out put for program defined printer file

    I have created one program defined printer file, that is compiled. When I call the program it is successfully called but spool file is not generating. 0002.00 FSTUPF UF A E K DISK 0003.00 FPRINT1 O F 132 PRINTER OFLIND(*IN90) 0003.01 C EXCEPT HEADER 0003.02 C *LOVAL SETLL STUPF 0004.00 C READ(N)...

    gsivakkp86225 pointsBadges:
  • How does way to scan within the PST files to find a particular text string?

    I've email printout with e-mail subject,sent out by the user who left our employ. His account was deleted and cannot be recovered. The user have left whole lot of PST files and we are hoping that he had saved this "sent" e-mail in one of them. The PST files are rather large and contain tons of...

    rickamverd20 pointsBadges:
  • We have stopped receiving certain emails from one particular domain/customer.

    Since 9/8 Monday afternoon, we are no longer receiving emails from homedepot.com.  We usually get 12-24 a day b/c we are one of their vendors.  No Exchange changes have been made from our end..  Our emails are being received by Home Depot, but we cannot receive their reply emails. I have...

    taldrich5 pointsBadges:
  • How to add CRLF to a CL Message

    I would like to add a CRLF so part of a message in a CL command will go to a new line.

    Tw65 pointsBadges:
  • SAP Data Service vs. SAP BOBJ multi-source universe

    Hi Experts, I would like to understand the differences between how the SAP BOBJ multi-source universe vs data service when it come to merging data from heterogeneous sources.

    Raju42345 pointsBadges:
  • Blocking Bing and Ask

    How do I stop Bing and Ask from replacing my browser preferences?

    bobmills5 pointsBadges:
  • Are intuitive decisions the wrong way to get big data success?

    During last week's MIT Sloan CIO Symposium, attendees were told that their organizations need to develop data-driven decision-making skills to capitalize on 'big data' technologies. Shawn Banerji, managing director at Russell Reynolds Associates put it this way: "Reliance on empirical data is in....

    Michael Tidmarsh33,310 pointsBadges:
  • Can you help me block sites in Windows XP?

    I'm working in a financial company as a network engineer. We have XP Professional computers in all branches, in a workgroup connected via Cisco routers to head office. I want to block particular site for eg. https:://thornfruit.com, https://kproxy.com etc How can i block these sites in WinXP using...

    Michael Tidmarsh33,310 pointsBadges:
  • How to find the video source in a code

    Hi good day Sir, I'm just working as anti-pirate assistant to our company, and I'm going stressed out in finding how and where to get the embedded video source of this kind of code: <div id='my-video'></div> <script type='text/javascript'> jwplayer('my-video').setup({ file:...

    kennethmanalo5 pointsBadges:
  • Security on iPhone

    What can be done to protect an iPhone user from someone with unlimited funds, who has been stalking them for years?

    JHudson81145 pointsBadges:
  • Attach external hard drive to my television

    Can I attach my external hard drive to my television and watch online movies on the television screen?

    MoniaOla5 pointsBadges:
  • IPv6 network block

    What is the NIC handle for 2001:43f8:0750?

    Thembi5 pointsBadges:
  • Getting started with AutoCAD

    How do I get started with AutoCAD?

    kaurneel155 pointsBadges:
  • Is there a standard risk taxonomy?

    Can anyone tell me if there's a standard risk taxonomy?

    bobitter5 pointsBadges:
  • Data structure implementation on the web

    Hi all, I am learning Data structures and Algorithms for sometime now. I work in a small web development company and we do all our data related operations directly in the database like searching, insertion, deletion etc. So when it comes to practically visualizing implementation of data structures...

    Meena725 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following