Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CRM, Data Management, Database, DataCenter, Desktop Management, Development, Hardware, IBM DB2, IBM iSeries, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
I have a part number called "Machine1", and it is comprised of several cartons, lets say carton 1, carton 2 and carton 3. Can JDE handle my Machine1 part number and tell me which location to pack away stock of carton1, carton 2 and carton 3, even though they are different sizes etc. Also will it...
Can image compression be in our own method and what is the range that a image can be compressed?
How to use a push button with numeric field? I mean I have a numeric field of six length which is showing 456789 (for Ex). When I click this value like a button it need to show another window. Thanks in advance. Surey
How do I open an .exe file in Android (jellybean)?
Already have a wireless Wi-Fi network service with a wireless Wi-Fi company. Do I haft to use Skype Wi-Fi services?
10. Choosing a block size when creating VMFS datastores Eric Siebert has written a guide on how to choose the right size for VMFS datastores. 9. How to use command line arguments in VBScript via the Wscript.Arguments Object Jerry Lees explains a helpful VBScript trick. 8. Using VRDP to view...
How is holiday overtime used in Kronos?
What are the current norms for ASA? Who are the best Industry benchmarks? I've reviewed average time to abandon but fully realize that we modify caller behavior based on the reason for the call, tolerance, call back options, etc.
What are your thoughts on the implementation of a DMZ to limit remote access?
I recently transferred to a new laptop using Windows 8. I have moved everything and sorted out the new screens with one exception. I cannot get Gbridge installed and since that is the heart of my client support system, I cannot fully transfer to the new computer without it. The issue appears to be...
Be able to extract the Logs from Windows (App & Sys), IIS, Individual App Logs ( Ex Sharepoint Logs, AD Logs, biztalk logs) etc into a Central Logging Server repository A friendly GUI to check the status of the transfer etc. Simple email alerting of the transfer would be good. Able to generate...
For the past two years, I've been hacked on my cell phone, laptop and desktop. Can someone help me with more inept security as the person doing this is very intelligent, a tech and my ex.
I decided to go ahead this morning and set up Outlook 2013 this morning. When I clicked on it, it came up with this message: "Cannot start Microsoft Outlook. Cannot open the Outlook window. The set of folders cannot be opened. The file C:\Users\XXX\AppData\local\Microsoft\Outlook\XXX_m sn.ost...
Is it possible to use greedy algorithm to be used for cloud storage and file accessing
I had to reboot my computer and lost the print shop program. I reinstalled print shop but am unable to recover the PDG files that were saved. How can I move the PDG files back into Print Shop 22?
AutoCAD 2015 block editor appears to be opening in paper space. How do I change to model space?
I am researching whether my county can create its own ILEC (Independent Local Exchange Carrier). I am clear on the state laws that apply, but am curious as to what federal regulations apply to ILEC and what steps would need to be taken on the federal level. I know the FCC regulates ILECs, but that...
If someone gets your mobile pin number, what all can they do with that information? How far reaching is that?
How can I find the source the used my email in spoofing?
I would like to receive acknowledgements from vendor once they received our email. Can the PO be updated in SAP automatically from the email confirmation?