Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Database, DataCenter, Development, Exchange 2003, Exchange 2007, Hardware, iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Windows, Mobile, Networking, Oracle, OS, Outlook, Outlook 2003, Outlook 2007, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Tech support, Virtualization, Visual Basic, VoIP, VPN, Windows 7, Windows Server, Windows Server 2003, Windows Server 2008, Windows XP ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
how many ports in cisco 2811 router
What are top advantages of Cisco 1900 series? Cisco 1941? or Cisco 1921? Better for enterprise...
ospf in cisco 3560G
What is the reason that websites have very specific directives about the type of password and it's length that you can enter (8 characters with 2 being numbers, etc.). Are there technical reasons why its this way other than to stop stupid people from entering passwords that are easy to crack?
Could any one tell me how to generate reports on all critical changes made to exchange mailbox permissions such as Full Access, Read or Write with complete details of the user who changed the permission.
I'm running a system that runs Windows 7 and Windows XP, with Red Hat soon to be added. All this in conjunction with Grub 2 boot loader. How would I go about setting up a multiboot system with hard drive encryption and pre-boot authentication?I know TrueCrypt could be used to pre-boot...
I have a desktop without bluetooth. Will 4.0 allow me to connect bluetooth earphones requiring bluetooth 2.1 & EDR to connect to my computer?
How to share the Data area for twojob, I have a COBOL program which submit the Purge job for one table, that table has so many records. So in turn, it submits so many jobs for purge the same table but the job which submit first lock the data area, so the next jobs has been ended with error. Now I...
How do you insure that a file uploaded through web page is safe? On our site, we plan to allow users to upload PDFs and TIFF images, but are worried that someone could purposely or by mistake upload a file virus. Are there any programs that can be used to scrub such files? I understand that it is...
One of my good friends, he's a developer and wanted me to ask this question on the forum. He currently sends a DLL or EXE file to one of his customers (who's a part of a big company). This is his process:Rename the executable file (module.dll -> module.d__)zip the file with password so that it...
Hello! Sir...can you define some stress among software quality experts and how we can monitor it? I'm waiting for your replay. Thanks!
What does this problem mean: Windows XP Professional not installed with error code 7.
I own an Internet domain. We complete Property Management tasks for individual Australian Real Estate Agents at our Offshore Office in India. Indian staff remote into the desktop or local server based Property Management Software of the Australian Real Estate Agent clients & complete the tasks...
What is a User defined function in AS/400. What would be its member type and how can I use it. I referred to IBM topics but could find anything. Can someone give clear details and kindly guide me/
Hello Everyone, Well im actually needs help on finding a data management\archiving software. The criteria of the software: 1. Will need to works with Windows and NetApp 2. Have strong reporting ability that can be use for capacity planning (preferably running on SQL Database), have ability to...
Our company is using 2 Zyxel PLA407 powerline adapters. We currently have one router downstairs that's connected to one adapter. The other is located upstairs (currently 30 feet away connected to a desktop). We've recently noticed that the speed is much faster when you just plugin, rather than...
On a cisco ASA if you issue the follow command 'crypto isakmp enable outside' it allows for all external ip address to try to establish a vpn tunnel, is there a way to filter the request down to a certain ip address ? Example Only accept udp 500 reqest from 188.8.131.52 ?
I Have SharePoint 2013 setup. I am a complete beginner with 2013. can anyone tell me how to make my site public and accessible from the internet.I could do it in sharepoint 2010 but don't have any idea how this is done in SharePoint 2013
I have a Fujitsu MH330 laptop that I would like to connect to my LG LED TV (model: 29FU1RLX). What specific cables do I need for video and audio connection?
I need to insert multiple rows of data into multiple tables from one temporary table. I need to put some of the columns into one, some into another, and the remainder into another table. I realize I will need to create INSERT statements for each table insert. Is there an easy way to select specific...