Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Hello,Our Iseries site is a heavy user of embedded SQL. We have over the past few months started using SQL UDFs and have recently been found out when the dependent UDFs have not been deployed along with the main deployed code. Would anyone know if there is an easy way of identifying dependent SQL...
I'm currently working on a project in which I'm trying to create PHP web-based paging for our tables that have over a million rows. I've figured out that I have three options:Retrieve all rows in resultset (Not possible due to the size)Retrieve 1,000 rows, put in temporary table and create an...
how to decrease the mscmap imeirequest message sent to eir from msc in order to reduce eir load.
I want to track changes happening to our files and folders on our windows server 2008. The changes which I want to track when files and folders are created, deleted, modified, accessed, viewed, renamed etc. Also, can I get real time alert when someone accessed or modified a particular file.
After attempting to implement a Policy Document, we have found that when we setup the Security Settings document, that the custom password rules do not apply to a user when trying to change their password through the internet. Our corporate rules require us to implement some of the custom password...
I'm looking for an innovative (read: free) way to scrape an AS/400 screen using PHP? Over time, we've had a number of programmers writing AS/400 applications and now I've been tasked with finding a way to make the screens they've developed available outside of AS/400. My first thought is to use...
I know this might be an off-topic discussion but I was recently told by one of our RPG programmers that none of our AS/400-based DB2 database tables can permit nulls because "they're really difficult to program" for in RPG. Is this true? If so, what makes the basic database feature so difficult in...
I'm running an iSeries ILE program and trying to end commitment control with ENDCMTCTL. Unfortunately, instead of this working correctly, I get the following error message: CPF8355 - ENDCMTCTL not allowed. Pending changes active What is the proper way to do this without simply signing out and...
I'm looking to drop a column, known as "id", which would auto incrementing PK. Here's the SQL:alter table "CO88GT"."XGLCTL" drop column id cascade;And I've been this error:Error: [SQL0952] Processing of the SQL statement ended. Reason code 10. SQLState: 57014 ErrorCode: -952I'm not sure but it...
I've been putting into production some RPGLE code, which uses "%alloc" and "dealloc" to allocate memory. I know programmers shouldn't worry about resulting memory leaks but I'm worried about if it actually does happen.So here's my question: If a programmer messes up and there actually is a memory...
I need to send an email with an attachment from IFS. Is this possible using an iSeries terminal?
Hello, Dear all is there any procedure in windows that user is allow to read the contents of share folder but it is not allow to copy it. How it is Possible. Secondly if we want to control Bandwidth per user in ISA how it is Possibe without using Third party software. Thanks Muhammad Usman.
As an IT security professional, does it really matter which school a degree is earned from? For example, I have two schools that are both online and regionally accredited: American Military University and University of Maryland University College. AMU offers a B.S. in Information Systems Security,...
What is the difference between domain security policy and domain controller security policy?
How can I see who is connected to my Windows 2003 FTP server and review what files have been uploaded or downloaded? Can I be emailed this log file daily or weekly? Can I be alerted if specific files or folders are touched?
Cisco IronPort Email Security Plug-In 7.1 is installed in OUtlook 2007 client. Symantec AntiVirus 10.1.6.6010 launches Windows Installer to install something from Symantec AntiVirus.msi. What is it trying to install? The MSI file used to install SAV isn't enough...it "wants" something else.
Dear all, I want to know what is the step to audit an antivirus product. What will be the plan of action?
This week's free IT book is your complete, authoritative guide to implementing, configuring, and managing AAA with CiscoSecure ACS. For a chance to win AAA Identity Management Security, answer one of the questions listed below and post the link to your answer in the discussion section of this...
I have inherited a SQL DB and need to give a group of users access to some views within a DB. We do not want them to access the tables, just the views. They will be connecting using MS Excel for reporting purposes. Do I use a role or schema? What is the best practice to accompish this task without...
i want to know where to go for security resources on the web