Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, NPfIT, Oracle, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Hi I have a call center in Bangladesh.I need IP bandwith requirement calculation for calling.Can anyone help me? Thanks
Can anyone help me delete my text messages from someone else's phone?
I have a .pbb file that is protected by one device only. How can I convert this file to any other app? Can I open up the file in multiple devices?
What is the difference between IP and IPX routed protocols? Particularly in their protocol stack and addressing scheme?
What message(s) does the iSeries isssue when a critical temperature is reached within the case?
If I run IBM BPM within my own enterprise, I can configure BPM to use my own SMTP server within my enterprise to send emails. However, when I run IBM BPM on Cloud I seem to have a puzzle/problem. To what SMTP server should I direct my requests to transmit emails? I can't target my internal SMTP...
Whenever I restart my laptop (that's running on Windows 10), my Tor browser gets uninstalled. The icon is still there but all of my files are missing. Why does this keep happening?
in Office 2016 try accepting meeting invite and get error "The attempted operation
I ran into a problem related to remote desktop connection and I don't know how to solve it. I want to connect to my computer in University from my laptop. For connecting to my computer, I should connect to university vpn and then run remote desktop connection. I just moved to a new apartment, and...
Can someone hack into your phone through Google + Stream?
My ex-husband is accessing my laptop remotely to sign into my outlook email account. I know the sign in was not me, but it has the IP address for my laptop as the IP used. I signed out of the account at 6:40pm last night from the laptop and today I see a sign in attempt at 11:17pm using my IP...
How do you view the code inserted by COPY or INCLUDE in a COBOL ILE program in AS/400? (Not using STRDBG)
We're using Asana right now but can't get our needs met.We're planning on switching to Hitask.What do you guys recommend?Thanks.
Is there a BPCS native file that shows the date in which a lot changes from status "H" to status "A"?
We installed a new print server and now our AS400 screen prints aren't working. All settings are the same and if we directly install a printer to a PC by adding an IP Port, the screen prints work fine. But once we install the printer through the print server, it does not work. I installed iSeries...
I am having huge issues with my iPhone over the last few months i.e. Soon after I got it. Some of the settings changes itself every day, the page flashes, the phone line keeps disconnecting even though I have network signal. My Facebook is hacked too as my friends request is sometimes deleted....
Hi, how can I hack an Android phone which I don't have any physical access to it?
All my accounts were hacked and manipulated by someone who had access to my email username and passwords, my Verizon account (he could actually read all my texts). Also he started a Google voice account and synced my number to to read texts then used the hangout dialer to get transcripts of my...
Can someone hack your phone and send/receive text through it without your knowledge? Example: Phone A sending/receiving with Phone B, but showing on Phone C's phone log.
Recently, I was sent a very eerie email: At first, I thought it was spam, and just for fun I wanted to find out who it was, but when I jokingly tried to log in as the account who sent me the email, I noticed that it was created using my phone number and alternate email. So, via that I actually...