Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
I have process definition stored. Eg. given two activities A and B with their attributes, I wish to check that constraints defined in relation to one another will hold when there are multiple instances created. Is this possible to do in XPath?
If I enter a character value of '12345' then I need to get a output of 123.45 . I did like %dec(var:5:2) but its getting a run time error.
I would like to know from CL whether a specific job exists in the job queue or not before submitting another job.
I want create Partition on one table, I have SQL Server 2014. Where can I find "Create Partition wizard". I have done same in 2012, under table option "Storage->Create Partition"
I want to take backup with password but when I want to do it shows me this error: One or more of the options (password) are not supported for this statement. Review the documentation for supported options. So what can I do? To take backup WITH password.
Hi, We are using in our company on one physical server ESXi 5.1 host, and five virtual machines inside that host. Also we bought another physical server for some testing purposes. At the moment it's not yet configured. Goal question: What is the best solution to replicate these VM on...
What can I do to prevent from the data that doesn't have in database in SQL Server alert message? Don't I have to use connection a VB.NET to SQL Server from use textbox to search?
How to migrate the apps form from 1 instance to another instance. Is it possible to migrate using FND loader. What is the syntax and where this syntax must be executed?
How can I remove duplicates from the resulting array: $flavors =array( 'blue raspberry', 'root beer','root beer'); $two=array("fish","boy",'root beer') ; $result = array_map(null,$flavors,$two); $no_duplicates =array_map("unserialize", array_unique(array_map("serialize", $result))); when I run the...
What is the use of special names in Cobol/400, and how can we use it. Please provide some good examples.
I am a student. I have to convert an Excel 2013 spreadsheet with 7 tabs of different table information. I have to then import it from my host computer into SQL Server 2008 R2 which is located on my virtual machine. Please help me and if you need more information, then let me know. Thanks in advance!
Where does MSK format work on? Does it work on a pen drive?
Please help me reset my password.
What is the criteria for SAP FICO? I have BA background. Will I get the job? I need some more information about this course.
Need to determine the best real-time monitoring software for hardware. Would like non-vendor specfic information on usage and suggestions for data placement in Raids and NAS type of storage,along with SOX. This request for help was originally submitted to the Research Assistant on WhatIs.com.
Hello, I have a physical file called RTIP that has 4 logical files: RTIP00, RTIP01, RTIP02, RTIP03. What I need to do is to permit values in two columns: CDSTF and CDRMT. What is the best way to do this change knowing that my file has about 10 million rows? The best performance is achieved using...
Hi, In my present organisation the IT policy states that inappropriate and malicious sites will be blocked. In my last organistation I never came across any such site blocking system.So, I have few queries regarding this. I hope those working for companies where site blocking is present would have...
I have a HTC CDMA Phone which is SIM less. I purchased it from USA( Metro PCS) and I would like to operate it in India, how do use the phone?
How good is the security on the BlackPhone? what security algorithms does it use?
My ex boyfriend has gained access to my PC and my Android phone, he is in my Facebook, email, SMS, ect. He had used some of my contacts and wrote to me and call me, just like I was them. If I'm with someone, their phone rings and it's my ex! How does he do that?! My phone rings and I see the...