Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Cisco, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
What is the best security tool out there to use to manage virtual machines?
I've mentioned security risk, not to mention how upgrading will do a world of good and provide more features to allow us to enhance our tools to make us more productive. I come from an ISP where IT was not a cost center. I may be spoiled, but we are running on Hoary, and everything is manual it...
I am trying to connect to a Win 2003 VPN server from a PC running Windows XP Professional wired to a Linksys WRTP54G router (Vonage voIP) and cable modem. On Thursday, January 5, I got the VPN connection working fine. I used it multiple times including rebooting the PC. That night the automatic...
Hello, I'm an editor for SearchNetworking.com, and I'd like to throw out a question. I know that SearchNetworking readers are very interested in network security, but there also seems to be tension between the networking team and the security team in large organizations. Does anyone have any...
For those of you who have outsourced email security, what were you looking for in terms of differentiators between email SaaS providers?
I having issues configuring Home directory file sync. After I configured folder redirection by MS recommendations, I receive a folder permissions error when I right click on a file and tell it to sync. Following MS's white paper on configuring redirected folders,...
Are datasheet and whitepaper each one word? (white paper vs. whitepaper; data sheet vs. datasheet)
I work in a small office and we run a router with a dedicated hardware firewall behind it that filters and routes traffic before it hits the LAN. It seems a lot of our internal PC issues are caused by our current firewall, but we obviously can't just turn it off.Does it make sense for us to...
Hi,I want to know if its possible to run my c++ programs that i write when i connect the flash drive to my PC. Just run them as portable apps and that they would function properly. Some of the programs are really simple like a calculator, etc. I also want a very simple UI to works.Thanks!
Am running windows 7 64 bit on my laptop i would like to run vmware player on my usb pendrive with backtrack as my gust machine I was wondering if it can be done.
Can someone suggest me what network simulator should I use to make simulation of multimedia delivery over LTE networks?
In an existing database, I have copied an existing query and an existing report so my new report will be in the same format as existing reports. I changed the criteria on the query so that it is pulling only the information I need. Now I need to link the two so the report will pull just that...
Is it possible to convert a 10g generated report to excel without excel convater?
how do you convert DCF files into CSV files for export to Excel Spreadsheet
I have some questions about bcrypt since I'm looking for an unusual way to protect my passwords.I know its like 15 years old, but its not widely adopted and I haven't heard any tales of it being cracked. So does anyone use it? Are there any NIST recommendations about it? I couldn't find any.
How can two laptops have the same IP address? We have a wireless connection to our home computer and somehow we both ended up with the same IP address. This strikes me as infinitely impossible, but it happened, so clearly there is something I don't understand about how IP addresses are distributed....
Hi ,We have 36 Additinal Domain Controllers in remote branches. All are windows 2008 R2. In Data center, Root domain exist. We configured sites based upon the network and geographical locations. Eventho, respective ADC is up and running, client computets resolving Domain DNS from other DNS servers....
Are there any issues with using iSeries access in a VDI environment. Would it work without any special configurations?
Is it my mobile phone my carrier or is it my Wi-Fi that's causing the shutdown?
How to configure inter-VLAN switching?