Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
A user recently asked this question via e-mail: I want to design a network, the specification is given below. Can you help me in this regard. Specification are 1) We have 7 site. 2) Each site have about 250 user and site one have 500 users 3) Exchange server, Mail server should be located at main...
Hello. I have written an rpg/iv program that allows users to maintain certain network pc files from a green screen. it uses the /qntc file system to access those pc files. the problem I ran across is: unless the i5 userid and password is identical to the network userid and password, the program is...
We have an existing COBOL application using files defined in DDS format. We are considering to move from DDS to DDL for future development. What is the best strategy to take this approach?
Hello all, please I want help with the following issue: I have the following table named "CHECKINOUT" in ms ACCESS USERID NAME CHICKTIME 1 K1 5:45:11 AM 1 K1 3:45:12 AM 1 K1 6:45:11 AM 1 K1...
In the wake of floods warning i would specify the locating your DC on the first floors would be dangerous as " first hit ".
I have a pressure test rig that uses an RJ-45 jack to connect to our network. When the test rig was originally set up, it was stationary. We have changed our production method and now the rig is on wheels is used in 4 separate locations, thus I need a network cable at each of these locations, I...
Is there application which convert RTF documents to PDF and is running on i5. RTF files are on IFS folder and there is thousands of files to convert.
How can I prepare myself for the iSeries Operator Certification?
I need to convert integer to short and short to integer. I need a .dll which I can use in my VB6 project. Please help.
How do you configure a Linux router on a stick? I want it to be completely self contained.
Can somebody help with step by step setting on Windows 2003 server?
Bruce, can you figure out this piece of code? I don't understand the result I get. Before code is executed: XXAVAL = 0, LTSTHQ = 30, LTCUSQ = 30, LTPICQ = 0, XPQTY = 30, OLOLQT = 30 EVAL XXAVAL= LTSTHQ-(LTCUSQ+LTPICQ+XPQTY)+OLOLQT After code is executed: XXAVAL = 0. I figured XXAVAL should be 60?
Is Forefront Unified Access Gateway (UAG) 2010 supported on Firefox? This question is from the Microsoft Live Chat which took place on July 13th.
Hello everybody, Searching for answers I've found this interesting page!! I've created a SQL query to a paradox database, it works fine with a non- password protected table: Provider=MSDASQL;Persist Security Info=False;Mode=Read;Extended...
Hi We have a windows 2003 service domain and want to hide the netlogon and sysvol from clients, If I change the permission then the logon scripts don't work anymore as it can't execute the scripts. How do I hide these folders from all domain users? Thanks
Another free chapter download is available on the IT Bookworm Blog. Written by: Joe Schurman Book: Microsoft Voice and Unified Communications Overview: "Microsoft’s vision of voice products and services for consumer, small/medium businesses, and enterprise organizations including a foreword by...
Whenever I'm trying to send mail via outlook from oracle developer forms 6i it asked for a confirmation from user. ie:--- A program is trying to automatically send email on your behalf Do you want to allow this? If this is unexpected it may be virus and you should choose no I don't want to show...
Is there a way to grey out the private box that appears in the lower right corner when creating a new calendar? Is there a way to grey out the permissions tab when right clicking on a calendar and selecting properties?
Is it possible to block MAC addresses with ISA Server 2005?
Please could you submit a sample RPG program to scan specific letters in a string that contains numbers, letters and special characters. Thank you!