Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
I have something very specific I want my spreadsheet to do for a schedule I am making. I want to be able to add data as text (IE shower or eat out) as a list 1-40. Ths list would give each text a value 1-5. If the text is already in the database, then it would only add the value to the balance...
I am trying to send e-mail to groups that I have in my address book with outlook (hotmail). My groups are 33-37 addresses. On my first attempt the message only went to 20 of 33 in the group. Is there a limit to how many can be in a group?
I'm using KeePassX as a password manager, and I've stored a KDB file in a Sparkleshare folder to back it up / sync with other devices.But just as a question (with the file being encrypted) if someone stole the file, they would several different versions of the file with minor variations. Would that...
Is it possible to use field-to-field comparisons in a select/omit statement or must the comparison be a literal?
I need to use DUPSPLF. How can I install TAA to be able to use DUPSPLF?
someone made a fake ask.fm account. how do i find out who it is?
I can't open webarchives or webgalleries on my mac..that i created in bridge ..either through the link or downloaded to the desktop on this mac book pro
I ran into an interesting issue the other day we were having mail flow issues, end users reported mail not working, I remember in exchange server 2010 I would normally check make sure its not a connectivity issue they were still connected to exchange server, next I would check toolbox next. with...
I have been looking into the different zero clients offered by companies like Dell, HP, Samsung, etc. From what I've seen so far, there are major price differences between some. However, with there being very little in them, how can differentiate some from others. Also, do all zero clients use...
I'm been doing some research on email security and I've realized that while emails are one of the main ways of business communication, sometimes it's not entirely secure.Does it make sense to use emails for these examples:E-TicketsSoftware license filesSo from a practical point of view, how...
Lately, I've been seeing a lot of talk discussing TCP/IP over DNS requests (usually because port 53 UDP is open and unfiltered). What techniques are out there to detect and block such tunnels? Have you seen such tunneling on a network before?
When I capture an image by my Nokia Lumai 520 and add it to my desktop, it shows so many nar files. Why?
Our development team is looking for a tool that can scan a PDF file to determine if it might contain malware or a virus. Alternatively, the tool assigns a risk level to PDF.A web-based solution could work if it's scriptable. Does anyone have any suggestions?
Can you please let me know the freeware or licensed testing tool to find out performance of VB 6.0 code including load balance testing?
How do I add a second phone number to a smart phone and do I have to pay for it?
How do I turn on the webcam on my Asus laptop?
(SDN may be good for businesses and the people implementing them, but if you are the user, its hard to regain control.) Seems like SDN has been implemented on my own home network. We have Cisco E2000, an ISP Provider set up. Now it seems, Either intruders or practicing IT family members have taken...
I want to audit some actions on my Windows 2008 Server environment. I need to manage some groups, having the complete information on which groups the users have been added before. Do you know that how to get this information on my Active Directory?
I have a file *.FRP. I do not have the program that created the *.frp file on the computer. Can I print the file and how?
Is it possible to use Wildcard certificates with Citrix Secure Gateway. There is already one on the server but when selecting it for use with the Citrix Secure Gateway, the site claims there is an invalid certificate installed and that it does not match the FQDN.