Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Data Management, Database, DataCenter, Desktop Management, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Why am I seeing iPhones send traffic on my LAN which are unrelated to my subnet? a8:5b:78:40:a4:1e 10.0.0.226 1427892453 eth0 a8:5b:78:40:a4:1e 10.89.24.26 1427726978 eth0 a8:5b:78:40:a4:1e 192.168.1.135 1427892236 eth0 a8:5b:78:40:a4:1e 169.254.195.147 1427818804 eth0
I am just wondering, What happens to the bit cut off when you run the OST PST crop tool? the bit cut off does it (a) go into another PST file or (b) gets deleted? shane.
I used Outlook 2010 with exchange server everything going good but few days ago My Outlook's OST database become unreadable my be it's corrupt and I have more than 2gB data of OST can you please give me some suggestion ,how can I recover my OST File . As i suggest by a friend that i need of OST to...
How do I cancel Active X?
How to write a simple program about to retrieval information? I'm using C++ language?
Hello. Looking convert for Outlook files. One of program's Recovery Toolbox and still don't convert to Outlook 2010. It has bug and etc problems. How convert ost2pst files?
I found such interesting security service Privatoria.net. It is a complex of secure services such as VPN, Anonymous E-mail, Secure chat, data transfer, etc. But I don't know if I can trust them. What do you think?
) In CL program how can we read a data base file in reverse order.
I am looking to prepare for CompTIA Network+ Exam. But still I'm not sure about my preparation. Can anyone tell more resources for my preparation?
Hi, I have a goldcoast broadband cable for my internet and television. I have an HDMI cable that connects from my wall to my TV and then have a wireless modem. I have another TV that I would like to add to the kitchen but do not want to purchase another broadband box. Instead I would like to split...
What is HTML? How to insert hidden comment in the HTML source code?
Will WCDMA phone support CDMA SIM cards?
SSRS Report server security group is set up right on folders with all rights. But we are getting an Windows account error that says a specific Windows account lacks rights to create a data source. What could cause this?
Some of my users are receiving this error when copying and pasting data. We're using Office 2010 and Windows 7.
Hello, I have to block some sites for employees in my office. How do I do that?
Since upgrading to 7.1 this past month we are experiencing a problem from one program from a subfile that is causing excessive job logs creating huge spool files. A message will appear in the subfile then its automatically answered with a 'C' and this happens several times in the spool file causing...
What are the advantages and disadvantages of smaller vs. larger disk sector size?
I need to: - add a favorite -add a link to the local intranet trusted sites -change a setting in the IE options - Advanced area - security
Why are the first level caches usually split (instructions and data are in different caches) while the L2 is usually unified (instructions and data are both in the same cache)?
I have a query where the field 'Time' is on hhmmss and I need it only with hhmm. How can I do that?