Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
From a two column table, I want to choose from column 1 to populate one field and have the next field populated with column two. How can I do that?
Our customer has both Oracle DB EE and SE install bits on a same IBM host. The host have 2 processor pool and each provisions 2 LPARs. The bits locate on VM1 and VM3 which link to different proc pools. My question is: could I license EE by consider core capacity of pool 1, and license SE by...
How do you open a web archive file on a PC?
I'm pretty new to Ubuntu but I'm familiar with some things. I just installed it on my Lenovo IdeaPad and now I'm trying to get my graphics card recognized by the system information in Ubuntu. What's the process for this?
On my home laptop, I have Ubuntu installed already. For a dual boot, I'm looking to install Windows 7 too. Is there a way to do this? I don't want to damage/lose my Ubuntu files. Thank you.
Is it possible to access the name and destination of a CR export file within a report? The name and destination are selected before the report is generated during an export. Is there a way for the report to include this selected name and destination when the report is generated?
Is it relatively easy to add new file systems after data is available in remote location in Volume Based Replication?
What are operating system security devices/tools?
Hi, how are you and thank you so much for the great service. My question is I have downloaded a simulator game, and it required to purchase a key. Now I live in Zimbabwe, in Southern Africa and that's impossible. So after many months, I managed to contact a friend of mine in he UK to by it for me...
A user was given a new ID file after the old one became corrupted. After the ID file was re-created a new local replica was downloaded as the old one was encrypted using the old id file. Now user does not have access to the mail archive database. Is there a way to access the archive database using...
Since I downloaded Windows 10, it's slow to start up. Why is that?
How do I get to learn data technology?
On my iCloud, I need to back up an old iPhone. I need to transfer all phone information and storage to my new iPhone 5s.
I lost the icons on my iPad. How can I get them back?
I've a component (let's say drilling rig) in .easm format. I'm looking to make a web application that uses this rig drawing (the drawing in .easm format) as its interface. How do I export this drawing into its interactive form to this web application? Any help would be appreciated.
For Ubuntu, I don't need Apache and MySQL to run automatically when I startup. When I boot up, they automatically startup. How can I stop this from happening?:
I am trying to hack a server which is my friends. It's a game server. How would I get into the server? Can you guys please help me?
My phone is picking up other people's microphones. Only when I call one number. It only does it while dialing out to a certain number. There is soft clicking on the line when it does ring out. I have checked almost everything on my phone and came to VPN. I have never used it and haven't even heard...
My ex boss once showed me how he hacks ex colleagues accounts. He showed me a software he used which could hack anyone's emails. Subsequently I informed him how disgusting this behavior was and soon left the company as more unusual characteristics were revealed. Please can someone tell me how I...
How does one prevent themselves from becoming a victim of identity theft?