Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Hi, everyone. How can I know if a user profile has authority to modify auditing security in AS/400?
Hi, everyone. I have been going around AS/400 Security Reference and seemed to understand some part of it. but I find it so difficult the understand the table below. Special Authority User Classes *SECOFR *SECADM *PGMR *SYSOPR *USER *ALLOBJ All 10 or 20 10 or 20 10 or 20 10 or 20 *AUDIT All ...
I have a table with 20 columns, where column 2 is an ntext, and it contains 133 comma separated 'fields'. How do I read the 19 columns and include in the output, the 133 columns from the ntext column.
In iOS, when I tap a row in UITableView, the row is automatically highlighted / selected. Would I be able to disable this? So, basically tapping wouldn't do anything.
Hi, I have a clients computer that failed in an update they were trying to perform of adobe reader. Now adobe reader won't work at all and it also will not install clean. The error that I am getting is this: Error 1935. An error occurred during the installation of assembly I have the tried the...
In Java, is there a particular reason to use LinkedList over ArrayList? I've always used this code: List names = new ArrayList(); I use that as the type name for portability (allows me to redo my code). Any help would be appreciated.
What will be the network design for information dissemination network for a building?
How do we login to DST from SST in AS4/00. It would be great if someone lists all the steps.
What am I missing for this static route? I created a static route using this command: route -p add 192.168.61.8 mask 255.255.255.252 192.168.60.9 routing table looks like this: http://i.stack.imgur.com/FJvD4.png Interfaces: http://i.stack.imgur.com/AhnHO.png I can ping the route gateway:...
I am an in house lawyer at a software development company offering PaaS. In legal literature on this subject, everyone attaches legal effects to the geographical location of the hosting physical server (like it or not). Evidently, in the Cloud context it is not easy to determine where the server...
Is the null set a subset of every set? To prove A intersect the null set equals A.
Hello community, I've got a HP Proliant ML330 G6 server that was recently updated to use HP ESXi 5.1 update 3. The reason for the update was partly to get the storage health to appear in the vSphere console. Post upgrade I am still unable to see the storage health. The server is compliant for the...
I want to download Magento version 1.7 for my online shop but now at official site of Magento, they just offer the lastest version of Magento: 1.9. So please you guys could give me the website that I can download Magento 1.7? Thanks for help!
Our company is looking for cloud based financial application. Are there well-known consultancy firms who have helped customers doing this same evaluation. Preferable I am looking for a partner who have helped customers which are coming from an traditional ERP system like SAP and Oracle
Basic difference between user side control and server side control
What is the difference between server and host?
What is cryptography? How is cryptography related to network security over the internet?
What kind of program do I need to open an EMZ file? I have tried every image viewer I have and it is getting very frustrating!
I have a file that came from a Mac that has an extension of .webarchive. How can I open this file in a Windows environment?
How do I open .OLK messages?