Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Database, DataCenter, Desktops, Development, Exchange 2003, Exchange 2007, Hardware, iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Windows, Mobile, Networking, Oracle, OS, Outlook, Outlook 2003, Outlook 2007, Routers, RPG, RPGLE, SAP, Servers, SQL, SQL Server, SQL Server 2005, Storage, Tech support, Virtualization, Visual Basic, VoIP, VPN, Windows 7, Windows Server, Windows Server 2003, Windows Server 2008, Windows XP ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
After a power outage at work, we lost connection to the Iseries. One of the AP files that holds multiple members lost one member of data. 2 days later this member shows up again without anybody doing anything. The CFO wants to know how this happened. Can anyone answer this?
How can you set up a cell to activate the current time when another cell has data entered into it? Just want to track what time DATA was entered in the other cell.
I am using RUNRMTCMD from an AS400 server to execute a c program in an AIX server, it is working fine but I want to know if there is an error message code I can monitor to know when the communication is lost. What is happening now is that the remote program continues running in the AIX but cannot...
this appears when I try to find a website--error No_db_file
I've been told that when I'm setting up my home network, I should make sure that all outgoing ports on my router should be blocked, although I should allow certain ones to open to support HTTP, HTTPS, etc. This even though I have a firewall in place. But is this really necessary if every computer...
Hi! I need to go into a Hotmail account. I have the sign-in and inbox URL. Can I just use this to see the inbox?
A part of our team has had to extend our website to try to communicate user credentials for a suppliers website. We're using a 256-bit key but they're using a static IV for decrypting the information. We've advised them not to use static because it's an a security risk. But we want to know how big...
**First submit blanked out all the original content** Sorry Environment - Windows Server 2003 SP1, SQL Server 2000 .exe version 2000.080.0760.00 I am helping to remove the clustering and migrate all databases on the cluster to a single machine in the cluster. I was able to evict Server 1 from the...
A clustered index is created automatically in SQLserver 2012 while creating a table with primary key. The index is created on the primary key field. My queries which are not using the primary key for search are costing 100% on clustered index scan. Should I create covered index for each and every...
Should a web server have antivirus software installed and active at all times? Are there situations where it is not needed? What should be considered when choosing one to install?
tools which are used to analyse vulnerabilities(which can be downloaded for free)
I'm trying to find some cyphers which are known to be secure for HTTPs. The OpenSSL website has a long list of cyphers that can be used with SSL and TLs, but how to tell which, if any, are still valid and of those which would support HTTPS? Is there a recent paper or similar tool I can use to find...
I have BSNL VPN connection in my office and I have a broadband internet connection in my home which is 2 km away. I want to do my office work even in my home. Suggest me the ways to get connect with my office BSNL VPN ADSL router. Thank you.
This is getting irritating. This is the second time in the past few months after a large windows update my system got corrupted. The last windows update I applied had 39 updates. After the updates were done I powered off the laptop. A week later I went to use it and it displayed the message...
How do I use Echo when using Avaya OneX Agent?
Hi Group,I am trying to understand the significance of sorting in COBOL/400.Sorting is used for arranging records into a specific sequence so that sequential processing can be performed. But, for arranging records in a particular order I can as well create a logical file and process it; Why should...
How do antivirus programs investigate hundreds of thousands of files so quickly while maintaining good detection rates? Most are able to do this in real-time while not slowing down computer processing rates by very much. How is this done?
Hi everyone, My self Vinod Kumar, having qualification of Master of Science in food technology, and working in company from last 7 years. I want to do SAP certification course, to get a job in SAP market. I'm requesting you please tell me whether it is possible to do some trainings and get a job in...
I have a table with an associated form listing all of our raw materials that we have in house (sometimes multiple lots of materials). I have a table with an associated form defining the components (raw materials) of all of our products I have a “Build” table with which we would use a form to...
How do spammers send e-mails that appear as if they came from a big company and more importantly, are there techniques to detect which messages are soam and which are real? Are the emails being sent from a spammers server or do they hijack the company's mail servers. Is it possible for someone to...