Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Lotus note: Hi, I am using IBM Lotus Notes 8.5, My requirement is I am receiving many emails from client, that emails reference number (Eg:- AD197-ADMA-NTC-00397) mentioning inside the body of email, I want to add that reference number to starting of subject automatically instead of copy pasting....
Using SQL SERVER 2008 R2: I have a table with 35 million records, one of the field is of datatype VARCHAR(MAX), it has well formed XML stored. Now we have to convert this column to XML data type. Trying 2 possible ways 1) Creating new column with XML data type and updating that column using...
I am trying to make labels, for several different people and the program only allows me to make 1 at a time, instead of printing out a whole page of different labels.
I'm currently running Mac OS X and I currently have a system firewall and stealth mode enabled. When I opened up my system console, I discovered a ton of blocked connection attempts from different places that I'm not familiar with. I've actually checked the locations are some are located in China...
No Notes group and Notes user in installation box, only root-root. What did I do wrong?
I'm read in the news lately (online and print) that people are starting to conceal their email traffic. So instead of sending emails to a person's inbox, they're writing messages but leaving them in a draft folder or dropbox. Then the other person would log onto the same account and look at the...
Over the past several years, I was always taught to never create my own crypto algorithm. But now I'm looking into Voltage SecureMail (which does use identity-based encryption) and I think I'm way over my head in trying to figure out the quality of the system.If you've used Voltage before, I'm...
How can I stop receiving meeting requests in my inbox for my manager of whom I am a delegate? I need to be able to view and edit his calendar but do not want to receive all of his requests.
I will like someone to help me with configuration example of these three cisco devices in a university campus network; cisco NAC 3355 NAC Manager, Cisco NAC 3315 series NAC Server and Guess Server. We just bought the equipment and I was saddle with the responsibility to make it work for the...
What has to be done to fix error message CP237.
how many ports in cisco 2811 router
What are top advantages of Cisco 1900 series? Cisco 1941? or Cisco 1921? Better for enterprise...
ospf in cisco 3560G
What is the reason that websites have very specific directives about the type of password and it's length that you can enter (8 characters with 2 being numbers, etc.). Are there technical reasons why its this way other than to stop stupid people from entering passwords that are easy to crack?
Could any one tell me how to generate reports on all critical changes made to exchange mailbox permissions such as Full Access, Read or Write with complete details of the user who changed the permission.
I'm running a system that runs Windows 7 and Windows XP, with Red Hat soon to be added. All this in conjunction with Grub 2 boot loader. How would I go about setting up a multiboot system with hard drive encryption and pre-boot authentication?I know TrueCrypt could be used to pre-boot...
I have a desktop without bluetooth. Will 4.0 allow me to connect bluetooth earphones requiring bluetooth 2.1 & EDR to connect to my computer?
How to share the Data area for twojob, I have a COBOL program which submit the Purge job for one table, that table has so many records. So in turn, it submits so many jobs for purge the same table but the job which submit first lock the data area, so the next jobs has been ended with error. Now I...
How do you insure that a file uploaded through web page is safe? On our site, we plan to allow users to upload PDFs and TIFF images, but are worried that someone could purposely or by mistake upload a file virus. Are there any programs that can be used to scrub such files? I understand that it is...
One of my good friends, he's a developer and wanted me to ask this question on the forum. He currently sends a DLL or EXE file to one of his customers (who's a part of a big company). This is his process:Rename the executable file (module.dll -> module.d__)zip the file with password so that it...