Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
How can I put web archives to JPG?
How can I download cookies?
Write an SQL query to the 6th highest salary of employee? I know how to write query for 6th highest salary of employee but it's too lengthy. Can any one simplify this query please. 2nd highest salary: select max(esal) from emp where esal <(select max(esal) from emp) 3rd highest salary: select...
We are running Exchange 2010 as a hybrid server between our 2003 environment and Office 365. We placed most of our conference rooms on the 2010 server since migrated and non-migrated users are able to see the calendars. One meeting room used to require a delegate to accept meeting requests. We...
How to fix corrupted .RAR archives? I see CRC error message when attempt to open my WinRar archive.
I'm trying to find a way to scan my whole Linux system for all of my files that contain a specific string of text. Just to clarify, I'm not looking for the file name, but the text within the file. After searching through several things, I found this solution: find / -type f -exec grep -H...
What are the rules for transforming a logical database design into a physical database schema?
hello, in my company there has few users archive size is more than 4 gb , i wanted to take backup on a DVD but wonn't possible. how do i broke one archive? any help pls
How do you delete unwanted folders you set up?
My remote access times out every two minutes. What is the problem?
Why IPsec tunnel does not support multicast traffic, why we have to use GRE traffic?
I am unable to connect to a share on our backup DR AS/400 I have tried mapping it through iNavigator and windows with no success. Originally we thought it was a network problem. I have a batch program that runs and connects all of my ifs mapping on our production machine and this prompts us for our...
What are the issues in access networks in NGN? What are the challenges and trends in MPLS in NGN?
I have a document I want to convert to XML. How do I do that?
I have an Exchange account setup on my android phone for work, while doing this I had to allow some permissions. But when I decided to check again. I'm a little concerned about the amount of things it requested to do wit my phone, such as make itself an admin, disable camera, set and remove...
Hi, I have a question regarding MCSE certification. I'm a bit confused about the benefit of MCSE cert for network engineer/CCNP certified guy. How much does MCSE give benefit to network engineers and whether I should go for MCSE as I'm have a CCNP certification already. Your help will appreciated....
I want the overview of SAP security. Where should I start?
IBAN maintenance during dialog processing within Tcodes XD02/XK02 /for Customer/Vendor bank details are creating double iDocs.
How do I do a simulation of IEEE 802.11 EDCA mode in MATLAB?? Can anyone provide code for that?
I want to know about the legal issues for information security best practices.