Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, Cisco, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, Routers, RPG, RPGLE, SAP, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
How many IP addresses are in IPv6?
I develop some packages in Foxpro for Windows 2.6. Made EXE files but these exe files does not run independently. I have included the library file in root directory but still it does not run without foxpro2.6 programme. What should I do so Stand Alone Exe File can be created and run it...
Here is what is going on. Connection is a point to point short haul data services using fibre. 100Mbit speed We are only using it for voice. It has been used to extend the telephone network. Service provider reports no problems with the circuit. The Cisco switches at either end are set to auto...
Is it practical to assume that SAP APO can export demand planning information to higher level Financial Planning models? Presently, APO exports huge excel files that finance users need to transform and load into various Oracle Essbase applications.
What is the use of CCSID in AS/400 Physical File? How it is important? What are the considered/configured to be noted when we develop web application in AS/400 with native DB2 database?
When I turn on my desktop computer it will only stay on about 2 seconds then shuts off
Hi, This is Kumar. How do you solve the vehicle moving in Google maps? Please send me code in Java based. Thanks & Regards,
I hope you can answer this. I have searched for an answer for some time. I am in USA. If I access my email account in the UK and forward an email from that account to a different UK email account, will it show the IP address from the UK account show or will it be from the USA account (which is a...
How do I open PTN files?
How does one setup for ESX?
How do I get rid of multiple tabs on my Google Chrome browser?
How do I know what information is being "truncated"? Am I losing data when saved, or simply being "abbreviated" or shortened?
I noticed that my Outlook Express and Thunderbird both support the .eml-file format. But for some reason, Outlook doesn't. Would there be any way to save mails into into an .eml-file using Outlook?
I don't know much about the internet, so here goes. Do you need to have internet for a smart TV to use netflix? We don't plan on getting cable, just the internet.
What's the experience that I get if I work as a quality control?
Is NUMA a characteristic of the microprocessor, the motherboard, the OS, or something else?
I want to create an mdx file for dbase from access database. How do I do that?
I work in IT for a university and one of the PC's in one of our labs is connecting to a network called INSERTNAME.prv It is added to our domain and it is named properly. However, it will not connect to our network. I have local Administrator permissions but nothing on the networking side. I've...
What is the format of the create date and create time fields of the EDI DC segment as the IDoc is sent from SAP to external system via ALE communication link? Do these fields have - and : sub field separators? Is this different based on the communication method?
For interactive remote access (IRA) into devices within protected security perimeters, IRA is currently limited to Humans at keyboards. What would constitute system to system communications from outside of an electronic security perimeter to devices internal to the perimeter?