Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Desktop Management, Development, Hardware, IBM DB2, IBM iSeries, Linux, Lotus Notes, Management, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Uncategorized, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Is an out of office auto-reply considered a bounce in email marketing?
I understand I'm using an old version of Outlook (2003 to be exact) but this is a pretty old machine. Can I increase the font size on Outlook? I have really small font and I can barely read it. What can I do?
After making a full scan today, I choosed "disinfect" for my .pst file, because I don't wanted to "delete" them. That was a huge misunderstanding, since it seems to me, that ad-aware deleted and shredded those files, instead of "disinfecting" them. I want to recover my .pst outlook files, but I...
When I scan my security on my phone and check my Wi-Fi speed, it says that there is 3 devices using the bandwidth when there should only be mine. Does this mean that there is devices using my Wi-Fi and are on my Wi-Fi network so someone found my password. Help please.
For my email - I always use Microsoft Outlook. I noticed a couple of days ago that there's this caution sign on my Outlook icon. And as it turns out, I haven't received any emails for two days. There's no warning message. What should I do?
For some reason, my Outlook 2011 continues to close after launching. Nothing literally happens. All I'm seeing is this error: 255. Can I correct this error? What are the steps?
How can we use 3 ISPs all at the same time to maximize its usage?
I've purchased VST plugins from various online vendors. Is it possible to hack the coding used for the software? Can a full version of a software be created from the demo version?
How can we improve our school internet connectivity? We have around 400+ students and during high traffic days, our internet connectivity comes to a halt. We don't have enterprise level routers, just home networking routers: Asus, RT-AC68p, Netgear r7000, another Asus and Linksys routers spread out...
When I add a Key to the registry I add a command to run for that key under a new subkey called 'command'. I tried to do the same thing using a VBS script but got an error stating it is not a valid ".exe". How do you add VBS scripts as action to take for a registry key?
We have HP thin client T520, thin pro connected with bloomberg KB with bio metric device. The connection protocol is RDP and remote FX is not enabled on the server side. We checked with Nutanix for the server side to enable remote FX and replied back there is no option for this specific device to...
I am getting .net compile errors when trying to access the log in page. Here is the exception:Compiler Error Message: CS0234: The type or namespace name 'controls' does not exist in the namespace 'com.citrix.wi' (are you missing an assembly reference?)Here is my web.config. this is a brand new...
How do I flush email transaction logs in Exchange 2010?
Can someone hack into your phone through Google + Stream?
My friend and I have an application that executes a bunch of things with Git and we're trying to put it in a Docker container. But here's the issue: We can't figure out how to add a SSH key to the container itself. We tried using Git (Git SSH wrapper) but no luck. What should I do?
Basically my laptops are getting longer DHCP leases than my Android devices, and this matters because my mobile devices are discoonnecting every 1.5- 5 minutes. I noticed the main IP addresses are different between my laptop and my android devices, and wondering if this may hae something to do...
How important is the use of video in website design?
I used to be able to bypass proxy with a VPN but that is blocked now. Is there any other way for me to bypass proxy when VPN and Tor is blocked?
What is the typical ROI expected for implementing a business intelligence system and / or platform?
A post online from My IP & Appears from my device, yet I did not post. Can someone fraudulently do this & it be traced to the wrong computer? (Nobody else uses the device)