Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Database, DataCenter, Desktops, Development, Exchange 2003, Exchange 2007, Hardware, iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Excel, Microsoft Exchange, Microsoft Windows, Mobile, Networking, Oracle, OS, Outlook, Outlook 2003, Outlook 2007, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Tech support, Virtualization, Visual Basic, VoIP, VPN, Windows 7, Windows Server, Windows Server 2003, Windows Server 2008, Windows XP ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
I can install the Android application in the BlackBerry Q10?
What book can you guys recommend for vb6.0 with practical exercises? Is it available in pdf or chm e.tc?Thanks.wakimani
How can be search external program (outside Synon) which is calling print file function (PRTFIL). Actually, I know to search all function which are calling print file by the option 91 or take U at subfile selector or 95 at object usage screen but that approach can only work to identify internal...
Can you suggest some good blogs that I can refer for cloud computing?
can i get more detailed information about kirchoofs law
Hi Experts, How to make a check on attribute(NUMBER) is positive or zero?
Does anyone know which antivirus program causes the least amount of slowdown while working in Microsoft Visual Studio? Every time my virus checker goes off I run into serious performance issues due to the system check. Does this happen to other people? Do you think the issue is the virus checker or...
With help of below query we are getting output for all tables and indexes "db2 reorgchk current statistics on table all". But I want only those tables which we can reorg on that tables like *---*,--** etc..... Please provide me SQL query where I can see only that tables name where they require...
What is the advantage of IPV6
Hello. We are looking for a simple solution to host a common set of catalog graphics for our remote sites that are both geographically and independent and separate. Any suggestions would be appreciated. Thanks. Paul.
After defragmenting my system disc, there sometimes remains a lot of fragmented .rbf files.I understand these files can be safely deleted.I also read that the Config.msi directory and files therein are automatically removed upon successful installation.This is not the case on my computer.How can I...
Hi, How do I become an expert as a security analyst? I graduated from business IT field without security knowledge. What area should I start studying with? Some people suggested me to take CEH first. What do you guys think? Is CEH a good cert to start with?Appreciate any feedback :)
during an IPL we received B200F001 LP=002. What is this error
Hi, I had generated the crystal report by using visual stdio 2010, having asp.net vb and ms access database. It is working fine on local server but displaying blank page on server. I am including the code for reference. Thanks a lot to for solution in advance.reportview.aspx.vb fileImports...
Am I safe giving away an old tower to a lady who needs one?
Hi! I could use some help. My company plans to send out critical data to our clients in encrypted PDF format. Is there a danger that they could be blocked in the future as virus scanners become more sophisticated and conclude that they could be carrying malware?
Can someone help me with iSeries DB2 searching text filters?
How do you protect a server against Denial of Service attacks? What techniques do advanced firewalls use to protect against DoS/DDoS attacks?
I'm new to the security world but I know that instant messaging uses "off-the-record" encryption (which means that a user would get authentication, encryption and forward deniability). But for my email, all we use is GPG/PGP, which offers authentication and encryption but doesn't allow forward...
Does anyone know how to reset Tellabs 532L DACS back to the factory default of TELLABS?