Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Uncategorized, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Do I have to uninstall, then reinstall with a CD if it's the same model?
In Kali Linux, installed tor browser, but when I am trying to start tor service followings errors shows: when I type service tor status, it shows: tor.service loaded: not - found Active: Inactive But i have installed tor and run tor successfully with few tweaks. What would be the problem?! :(
How can I create / read an INDL file?
What is the purpose of SuperComputing under Red Hat? What is SuperComputing's system tools or utilities?
What is direct mail/direct marketing? And is it useful in the IT space?
How do you delete accounts and passwords in Windows 10?
I can't remember the right password of my computer. I need to access it now. What is the fastest way to recover or reset the password?Edit: It is a login password not BIOS password. Dell XPS 13.
I have a Master's Degree in IT. Is it ok to take a two year degree for a Diploma in IT Security? This is to further my knowledge about IT Security. Your thoughts?
What is the advantage and disadvantage of client/server?
I did M.Sc. And i have taken training in linux system programming. I am confident in c language, linux programming(pipes,files,directories,fifo,IPC), linux socket programming and little bit of device drivers and kernel(2.4.and 2.6 versions).Give me an advice to do a certification course under linux...
Can CCIE or CCNP certifications replace the need for obtaining a degree to get a best job in the networking field.
What do you understand by loop in flowchart?
Can someone tell me what is a hacker?
How can I save a PHP array to a MySQL field? And, once that is done, would it be possible to get it in array form? Thanks for all the help.
I am interested in the key security risks associated with AWS Machine Learning. IT Domains specific to which I seek information are listed below: Access Control and User Authentication System / Product Security Application Development Network and Infrastructure Security Internet Facing Applications...
I persuade my b.tech from c.s.e department. I want to bright my future in the field of I.C development. Please help me to know: How can I program an IC? Which programming language is accepted by an I.C?
What exactly is the difference between primary and super key if both are considered to be unique? Why do we need super key when there is primary key?
I understand that LED lamps are put into Risk Groups as regards human health, with RG0 and RG1 lamps the safest. Does anyone know which LED replacement light bulbs (for incandescent bulbs) are RG0 or RG1?
I have a need to have the screen do an Automatic Refresh. I have created a working sample using CLP and setting the Display file to waitrcd(5). CRTDSPF WAITRCD(5). So I know it can work. I have found several examples using RPG. I need to do it using COBOL. Can any one help? I have taken everything...