Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, Cisco, CRM, Data Management, Database, DataCenter, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Hi all, Just looking to see if anyone knows what 'Anexgate' means or what it is? Thank you
I have to do disclouser attack using Java...can I do it? If yes, then please help. How can I do it because I am studing about security and I know what is happening in disclouser attack but I have to practically know it.
I constantly have to insert Images from an extensive Photo Library, and in an ideal world, I'd like to know if it is possible to have the Caption insert the File Name of the image. Alternatively, any method of having the name of the File printed alongside or below the image would also suffice. Any...
Hi experts I am looking for a high level remote access security reference architecture and best practices. Following NIST document looks like a good start. Can anyone please give any further recommendations? Thanks in Advance.
In my department, my boss shares his Outlook calendar with me so I can see the calendars for several of our conference rooms. When I look at my calendars, it brings me to the calendar I viewed last. This is an issue because I create a meeting on the wrong calendar. Can I set a default so it just...
Hi, Please let me know the difference b/n File Level identifier, Record Format Level Identifier and Member level identifier with an example
Is there a way I can get the queries history in SQL Server?
I'm using Exchange 2013 - and I noticed that the 'calendar attendant' is accepting all of my meeting invites and updates them too. I don't want this setting. Can I remove it? Or at least disable it?
I am trying to open videos of my son, from when he was a baby...but the are alll mvi files with a .jpeg rather than the .avi that all the other videos are. I am not very tech savvy and really would appreciate help. We are on an old Mac desktop. Thank you.
How do I make FoxPro 2.6 billing software work okay and which database file is to choose?
Is there anyway to get Goldmine 6.7 (32-bit program with 10-years of history) software to function on a new computer with Windows 10. Running OK on Windows 7 but concerned about GM email in Windows 10.
Hello I am pursuing my Masters in engineering management. If anyone could suggest me which module of SAP would be good for my career. I also know a little programming part. Thanks in advance!
What are the advantages of waterfall over iterative?
Which are the databases required for IPF integration?
Should I install ActiveX program on my Windows 7 machine?
How can I open a file in this format in Catia v5?
We have dozens of Windows 10 computers on our domain and every time I join Windows 10 PC to a domain, it logs me into a temp profile. Not all Windows 10 PCs though but just one particular PC. I'm not sure what the reason is?
Hi, About a month ago - I created a group of roughly 10 people in Skype (for meetings). Since our meetings are officially over, I want to delete the group. How can I do that? Thank you.
Hello, I'm a novice in Linux but I'm still learning. Now, is there a way for me too see which process is using a certain port? Perhaps, a command? Any help would be great. Thanks!
I had to log into a Google Chrome using a friend's device. But now my passwords are saving on his device. I trust my friend but I need to wipe out all of my information. How can I (or my friend) go about this? Worst case scenario: Should I just change all of my passwords?