Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Server exchange can't mount database. Error failed an active manageroperation failed, disk or controller issues may cause slow mount, failed due to timeout 300 seconds on server. I need help with this urgent.
Dear Members, Greetings! I hope this email finds you all in the best of your spirits. I work in a very large organization which uses SAP HR Travel Management module very extensively, We have dozens of trips taking place on a daily basis. Though we have SAP. we still use emails to get quotation...
What is the easiest way of coding if I want to have four separate logins to my system? I'm coding in Java in Netbeans.
HI ,I'm currently learning Oracle. Is it wise to Take up MCSE :Data platform as well to get a fill for both platforms ?
Hello sir, I'm new to the network security. I don't know how to calculate mask, subnet mask, broadcast address, network address and for each IP address how many devices can able to connect so. Could you please provide me guidelines for above mentioned topic. ...
Does anyone know what is the importance of Cisco as a vendor in networking platform?
We run a small network in my office which consist of a switch, a modem and about 10 systems. I would like to restrict users from streaming online, from viewing inappropriate sites and also to deactivate the internet when 1gb of data has been used up.
How to use a banner in a website?
I downloaded a document from Roads Scholar and it is in js code. I want to print it but don't know how. I have a Microsoft 7 system.
We are having a legacy running running on Oracle Forms and Reports. I want to change the database connection to point to a different database, how do I do that? P.S: I am pretty new to forms and reports
I've come to realize that my HP PC has been hacked. First, strange delays, interruptions, and "frozen" screens, then settings changes, and finally a new user account with Special Permissions that I can't change. Who knows how much of my personal info. was taken. Most likely everything. I'm sure...
"Either there is no default mail client or the current mail client cannot fulfill the messaging request. Please run Microsoft Office Outlook and set it as the default mail client". Note: I checked the mail profile, Outlook email default, Internet: Tools, options, programs tab and Outlook is default...
Is there a way for me to create a new database with SQL Server 2008 (Express) but not using SSMS? Do I have to use SP1 for this? Thanks again.
Hi,I have few remote users connecting to AS400 system. These users are using VPN connectivity to access iSeries system. Only single login allowed to these user profiles.The users are facing problem when their internet connection is disconnected.If the 5250 session is disconnected then these users...
How would I go about making our SaaS LMS TIC compliant?
One of my co-workers sent me a SQL code and I need to add a comment to it. Is there a way to do that? This is currently for MySQL. Thank you so much.
We have to create a Microsoft Access database using C#. What's the process to do that? Is there an API that we can use for the creation? Thanks.
In the event there is physical/environmental disaster that impacts our data center, after it is safe to enter, what are best practices in the aftermath to protect media and avoid further damage? Not kidding, our current plan says dry and throw diskettes in a drawer.
I have a task before to migrate folders, emails and tasks from public folder to mailbox. But after migrating those data. The tasks are missing from mailbox folder but I noticed that they are present in Webmail and Deleted Items. We're using this tasks to save Employee Entry/Leave as a note. Can you...
What are the best practices to be observed while cleaning data center?