Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
I am doing a conversion of documents to RFT but I want the documents to open as read-only. Any suggestions? I do not want to have to save each document individually.
Is this used to recover a lost file?
I have received a document with extension as .WXP. What software would open and convert the file into LaTeX or MS Word document format?
Just got a new Lenovo laptop with Windows 10 on it. I was pretty excited about it until I noticed an issue with the battery settings. I'm not getting any warning messages when it's low battery. It just shuts right off. What can I do? Any help would be great. All of my Windows Updates are installed...
I recently bought a brand new laptop with the extended warranty. I have to sent it back through for repair - something got screwed up with the keyboard. Do you think I should remove the hard drive from it first before I send it back? I'm just nervous about all the data I have on it already. Not...
Can you install / run Microsoft Office Suite and LibreOffice Office Suite on the same Windows computer, 64-Bit system? Same Hard Drive?
Let's say command XYZ has PUBLIC set to *EXCLUDE. If I have access to command line and not *ALLOBJ, I cannot access that command, right? If I have *ALLOBJ or belong to the authorization list, then I can launch it? Second question: if a user have full access to command line (Limit cap = *NO), but...
How can I troubleshoot asymmetric routing in TCP based connection?
I'm on a Mac using Visual Studio. Help me out here - I can't for the life of me add a VIM extension into VS. What's the process here?
I'm on Windows 10 and I recently purchased a USB floppy drive. When I put it in, I keep getting this message: This disk media is not recognized - it may not be formatted. How can I configure this disk for my computer?
Hello, I have several thousand images in a bunch of different formats (.JPG, .PNG, etc.) and I would like to move all of them into one specific folder. How can I search for all of them / move them? I'm using Windows. Thanks!
I'm currently on my home laptop that runs Office 2010. My co-worker gave me an Excel 2013 file that I can't open. Excel 2010 is telling me that it's a corrupt file. How can I view / open this file? Thank you so much.
A particular user profile is getting disabled often and the user has not logged on during that time. Is someone trying to logon using that ID or there is some other reason behind it? Please advise.
Dear docs, I am very new to AS/400 administration. In our environment we have AS/400 server V6R1 with OS/400 OS and IBM MQ software installed in it. Recently we found some of the software files were deleted from the system. We have check the job logs with dsplog and wrksplf command but did not find...
Hi all, Two questions: If public is *USE to a program that adopts QSECOFR authority, how do I determine if a user can use the program, through attention key program and command line (if limit cap = no)? Which values do I need to look at? If public is *EXCLUDE, is my risk covered or a user with...
I have a client who says their IBM rep said they should only have one batch subsystem, and they are adamant that this is gospel. How do I prove this wrong?
When creating a DML statement trigger on a table, what are the components that you must define?
Dears, we have many users with mobile devices (not owned by The Business) need to check the Email, send report via Whatsِapp or other APP and they use direct connection to the internet as you know vulnerabilities with Android. They may be send message infected by malware to person on our local...
Would it be possible for me to install antivirus on my external hard drive?
Can I use Quick Heal Internet Security or Quick Heal Total Security in our office? What is a good quality antivirus for a 15 people office environment?