Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Database, DataCenter, Desktops, Development, Exchange 2003, Exchange 2007, Hardware, iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Excel, Microsoft Exchange, Microsoft Windows, Mobile, Networking, Oracle, OS, Outlook, Outlook 2003, Outlook 2007, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Tech support, Virtualization, Visual Basic, VoIP, VPN, Windows 7, Windows Server, Windows Server 2003, Windows Server 2008, Windows XP ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
What do I do to download Skype for BlackBerry 9900?
I know this might sound like a broad question but I'm looking to start a good discussion here. For many SMBs, acquiring malware sometimes feels like an inevitability (despite putting in different security patches/antivirus software/etc.). I'm not looking to talk about the prevention of viruses but...
what is network modulation?
I cannot receive photos or use my browser I get restriction 36
Hi all, I have a scenario where I need to read from a File F1 based on Product name only (F1 Key is Product name+ XXX+YYY+ZZZZ) write to file F2. Both F1 and F2 having same fields except F1 have 1 Additional field(ZZZZ) which we are not populating to F2(F2 Key is Product name+ XXX+YYY). So for each...
Hi all, I have a batch job which calls a CL program which internally have a call to another RPG program, after submission of the job I am getting decimal data where.... I'm adding the value of the Zoned decimal variable to Packed decimal variable. But when I run the RPG program individually there...
Dear all, Kindly note that I had sometimes on AS/400, some jobs running in Qbatch and take almost the whole CPU for long time. Any other interactive job that should have few seconds, takes longer time to be completed. Can we limit the CPU let say to 50% for Qbatch jobs? Thanks in advance, Wissam
I have created an RPG Program which reads data from one file and writes to another, based on some conditions with the help one Sub routine to write. Now when I try to compile the program, I am getting level 20 error because of which I am not able get the object. The error message is: " The source...
I'm running multiple jobs one by one. each job is writing data into one particular(A) file. Next doing coping the data into B from A And data is cleared from A file One job Again same is repeating couple of times each job. Finally I want to copy the data from B to A all the records. The order of B...
Hi All, My below SQL query is running fine: - SELECT a.USRP,a.USER1, SUBSTR(a.USER1,23,3) as Template, BRCB, b.MGRP,b.ICDE,INAR,a.SECL,ACA1,ACA2,ACA3,ACA4,ACA5,ACA6 FROM muserdd as a left outer join MACBRDD as b on a.USRP = b.USRP left outer join MITEMDD as c on b.MGRP = c.MGRP and b.ICDE = c.ICDE...
Is Ubuntu's disk utility encryption very secure? If so, what kind of algorithm runs it? Does anyone have documentation about it or know where I can find it?
I receive emails, but Outlook won't send emails. What settings do I need to use?
I'm too confused...should I do MCA management (pune university) or MBA-IT (pune university) as I want to do a career in networking. Can you suggest me which can be the best?
I've been recently been doing some studying on different security topics and I came across this: Is it more secure to send out a password reset link when a user forgets their password or send the original password unencrypted in an email? Now obviously I know not encrypting a password is bad...
I have some questions to protect web-server as below: Can you please tell me where is the leak of my security? Why my server is hacked, can you please tell me the possible reasons? How can I protect my server from hacker?
how to create excel file 2010 from oracle forms 11g using any library or package... some example can help me??
Does maintaining a password blacklist on database create any security risks? Basically, I'm looking to create a list of 500 or so commonly used passwords to stump very basic automated spambots.
This has been happening to me a lot lately...I'm writing an application in Delphi and after I compile it, my antivirus scanner is telling me that I'm actually creating a virus and it immediately deletes the executable again. It's easy to fix (by doing a full rebuild) or simply waiting but it's...
Does anyone in the call center measure calls abandoned from hold? if yes> what is the metric and what should be a result to be considered as good?
How would I know if I'm "visualizing" properly?