Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Cisco, Database, DataCenter, Desktops, Development, Exchange 2003, Exchange 2007, Hardware, iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Windows, Mobile, Networking, Oracle, OS, Outlook, Outlook 2003, Outlook 2007, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Tech support, Virtualization, Visual Basic, VoIP, VPN, Windows 7, Windows Server, Windows Server 2003, Windows Server 2008, Windows XP ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
How to transmit 850 to IBM iseries
I have a need to encrypt 1 field in a file that I'm sending outside the company. I know the file level encryption, but have never dealt with Field level. Is it possible to have AES field level? Possible without purchasing a package? iSeries V5R4M0. Any Help would be greatly appreciated!
From what I understand, ciphers are divided in to two categories: Stream & Block. What are the advantages/disadvantages to using each type of cipher?
object missing operation failed when sending outlook 2007 mail. Currently tried to uninstall Office 2007 using the Windows add/remove programs and reload. This same result. Operation Failed, object missing message appreas. How can I get a fresh copy of MS outlook 2007 to load?
Hi , how to configure multipath in the host side.here ia using HPXP24000 storage&having 2 SAN switchs ie CiscoMDS9513 and 2 edge switchs ie cisco9124 for each host . in our synaria each server having 2 hba ports.one port connected to 1st edge switch & 2nd port connected to 2nd edge...
A 2-sided high-density disk contains 80 tracks and 18 sectors per trak with 512bytes per sector. How do you calculate the total capacity of the disk?
I recently created a program that I've been working on that downloads files. It's been working fine until a user is using AVG. It seems that in order to fix the issue, AVG's "Email Protection" must be disabled. I've already tried adding either my program or the JRE to an exceptions list. It doesn't...
Hi. We have a proprietary Access Database/program that a former employee created for us. We have no knowledge of how to fix it, most of the time it still works just fine. A user in our office gets the error in the subject when he tries to run it. It worked fine up until a few days ago and I have...
I have 2 files (both htm) that I am trying to save in Google Sites. I can not get these files to play once they are listed in Google Sites but they play fine from the 2nd source who sent it to me. How can I get these to load and play within Google Sites?
Hi, we have just migrated from an old 530 AS400 to a smaller 170 model with a view to winding down the systems as thet get migrated to other platforms. We have an issue with one system which is a VB 6 front end and utilises the AS400 as a database. Since the migration this application is extremely...
Hi, can a HP DL 380 G6 or G7 server have AIX as the operating system?
How auto fill a form by selecting a column on another sheet? I want auto fill three columns by selecting one set of data.
few topics which i tried search but could find a clear discription are as follows:1. What is a JOB in as400... 2. What is LoCAL DATA AREA and GROUP DATA AREA.. and their purposes.
Why when I run a full scan, there is a large number of, "skipped items"? Does this mean that these items are not being evaluated for possible viruses?
I need to get some suggestion about non-owners access to user mailboxes regarding full access permissions. In most cases Only users should access to their mailboxes on computers that are running Exchange 2008. I want to audit any changes made to any mailbox regarding Full Access Permissions and I...
is there any way to rebuild PMIS without implementing 112841 sap note?
I travel a lot for my company and have been doing some work in third-world countries lately. I've been using the Internet at different Internet cafes and I'm worried about if anyone could have stolen my password or listen to my keystrokes. I've heard one way to get around that would be to write...
How do I convert .txt files to .mps files?
I'm trying to connect to my email server via SSL (SMTP/SSL) and I know the recipient also only checks his email via SSL (web/https or IMAP/SSL). Does anyone know if this increases the security for the message content in any way? What I mean is will the communication between my providers email...
What is a VPN tunnel? What's the difference between a VPN and a VPN tunnel?