Using the Eval with %Dec BIF will work for this. You may want to do a TESTN first. What if you have other alpha characters uin the field? Is it possible to have a negative number in the field? Is it always right justified or left justified? Depending on the answer to those questions will [...]
View Answer | March 21, 2013 11:01 AM
AS/400, AS/400 Fields
You need to check your Internet connectivity and account settings. Also check your server settings. If it does not help then contact your ISP. Regards Maria
View Answer | March 21, 2013 5:44 PM
Microsoft Outlook, Microsoft Outlook permissions
Here is a link to fee online courses for EXCEL. You will find all the help you need here. http://www.wiseowl.co.uk/excel/ I have taken the courses on VBA and found them to be execellent.
View Answer | March 20, 2013 3:08 PM
Microsoft Excel 2007, microsoft excel functions
you can create a file for your program to process. QFTPSRC is a regular source file (PF-SRC) that we store ftp scripts and logs you can use any source file you want (you will specify it in the OVRDBF commands). In your CL you would: OVRDBF FILE(INPUT) TOFILE(QFTPSRC) MBR(GETLIST) OVRSCOPE(*CALLLVL) OVRDBF FILE(OUTPUT) TOFILE(QFTPSRC) MBR(GETLISTLOG)OVRSCOPE(*CALLLVL) OVRDBF FILE(LSOUTPUT) [...]
View Answer | March 20, 2013 11:55 AM
AS/400, CPYFRMIMPF, RPGLE
Hi, Your outlook has been crashed than it may be possible that you have lost all email information from outlook. So should try to repair the outlook. The software has ability to repair the corrupt outlook file and recover all email messages, contacts and attachments from outlook
View Answer | March 20, 2013 4:19 PM
Microsoft Outlook 2010, Microsoft Outlook error messages
May Be your sim had burned so to make sure you can visit any center or calling Customer service
View Answer | March 20, 2013 7:59 AM
If it’s web mail, you’ll know you’re using an encrypted connection if you see “https://” in the address field. The other email protocols SMTP, POP3, and IMAP can use encrypted connections over ports 465, 995, and 993 respectively. If you see any mention of these ports in your email configuration then you’re connections may very [...]
View Answer | March 19, 2013 5:52 PM
Encryption, Security, Security policies
There are lot of moving parts here, and variables that you aren’t mentioning. It depends on what you need. I’m sure Wayport (AT&T Wi-Fi), Cisco, and many others have a solution for you. If you can share some more about your needs we can probably drill down and help further.
View Answer | March 19, 2013 10:43 PM
Bandwidth management, Firewall, Internet, Internet connection
Please have a look at these link and hope they will help you… http://www.youtube.com/watch?v=w0X21ebVy4A http://www.youtube.com/watch?v=R_ouf3Asrwo http://www.youtube.com/watch?v=soy1XJDEyfU&lc=T7Xrhmbf0WMKlIpHMtVuJ34slcH2Qi48BrmOHxe6hKY&lch=email&feature=em-comment_received Hope it helps you.
View Answer | March 19, 2013 11:11 PM
Windows Server 2003, Windows Server configuration
Hi Different articles are been discussed on the same. Please refer these link and hope it will help you. http://social.technet.microsoft.com/Forums/en-US/exchangesvrdeploy/thread/43ca31e7-4296-4c4f-980b-34b391b6e082/ http://social.technet.microsoft.com/Forums/en-US/smallbusinessserver/thread/1f0a7919-ef21-4b91-8b95-2a2d7731d7ee/ Moreover, This will be a new Hyper-V 2012 host with two Server 2012 VMs. 1 DC and 1 Exchange 2013. Late this year It will probably get a SQL Server VM too but that is [...]
View Answer | March 19, 2013 9:40 PM
Microsoft Exchange Server, SBS 2003
I found this answer on another web site by a person named “Dan Riehl:” where he says the The command DSPAUTUSR(Display Authorized Users) has a parameter SEQ, that allows you to specify that you want to list out user profiles, within group profile. Here’s the command, and the resulting output. DSPAUTUSR SEQ(*GRPPRF) [...]
View Answer | March 19, 2013 4:01 PM
AS/400, AS/400 User Groups
please see this in youtube, http://www.youtube.com/watch?v=vNL5sREsWZ0, on how to check and install RAM sticks.
View Answer | March 19, 2013 2:01 AM
Memory, Memory management
How do you mean? Often, you cannot “sign out” and be forced to “sign back in” unless you have a password enabled on your phone. More info would be helpful.
View Answer | March 18, 2013 1:48 AM
Mobile, Mobile applications
It could be formatted with a different file system. Or it could be encrypted. There are lots of variables. Provide us some more info and we’ll see if we can help.
View Answer | March 18, 2013 7:28 PM
Hard Drive Installation, Windows XP
You need to make sure you are using the correct lable template and the correct font size for you labels.
View Answer | March 18, 2013 5:24 PM
Microsoft Word, Microsoft Word features
Thanks for coming to ITKE. For best results on this particular question, just do a simple google search on ISV Extension. You will get all the answers you need. ISV usually means Independent Software Vendor.
View Answer | March 18, 2013 5:55 PM
What do you mean by “entry number”? If it is the key field for the table, the RDMS system will do that automatically, though in terms perhaps obscure to the user.
View Answer | March 18, 2013 7:27 PM
Microsoft Access 2007, Microsoft Access database
I have no idea what JohnKennedey is talking about. I open my access 2003 backend on the server directly nearly every day while I and/or my users have front ends open. I can make updates in the tables and changes to the queries. However, you cannot change the table properties unless all frontends are closed, [...]
View Answer | March 18, 2013 3:19 PM
Microsoft Access, Microsoft Access updates
Good question Chris. I’ve found that the more hoops you make your users jump through, the greater the chance they’ll find a workaround. I haven’t seen any clients take the sandboxed email client approach but it’s worthy of consideration. I’d just recommend making sure you think things through first and get management on board before [...]
View Answer | March 18, 2013 2:05 PM
Cloud Security, Cloud Services, Sandboxing, Security
Generally speaking, no society is not prepared…nor are most IT shops based on what I see in my work. I think the overarching issue is the fact that many (most?) people don’t truly understand computer security and what’s at stake…hence the continued security gaffes we see. The Mandiant APT1 report was fascinating…some eye-opening things for [...]
View Answer | March 18, 2013 2:18 PM