Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
How do you tag data and store it in TDS format?
What is the mechanism of stacks in stack computing?
Can I write a record into PF having Maximum members is *NOMAX and Number of members is 0? In COBOL there is on file having same structure and they write the Records using WRITE opcode. They defined the file like this way: SELECT GIBLPF ASSIGN TO DATABASE-GIBLPF ORGANIZATION IS...
Queries on Oracle database black screen?
I need to combine several fields into one text field and thinking about using *CONCAT for that. However it seems that *CONCAT can only merge two fields at a time. If so it would mean a lot of code if I have ten fields to merge. Am I understanding this correctly? Thanks for any help! Lars Holmberg...
Is there ever a meaningful advantage to using this for a screen file? We are looking at changing all of our display files to RSTDSP *YES and my fear is there's a subtle downside somewhere. This is in an environment of all RPG or RPGLE programs.
I am in need of help finding a thesis question. My broad topic is Cybersecurity in educational institutions.
According to this doc: http://hortonworks.com/wp-content/uploads/2013/12/StingerTechnicalPreviewInstall.pdf Stinger is coming to work with hive (0.13) for full support of SQL queries. In addition another advantage is the faster performance and in order to check out the performance advantage of...
I have configured Windows Server 2012 Domain for Smart Card log on and have logged on using a Smart Card. The issue I am having is that when I shut down the server for a day or 2 then attempt to log on using the Smart Card I receive the following error: "Smart Card Log on is not supported for your...
I am at a network computer and want to log on as administrator, what should I do?
We had a Red Hat virtual machine (VMware vSphere) that is hosting the database for our application the application runs normaling at some point it crashes with the error below seen on db2diag: ZRC=0x840F0001=-2079391743=SQLO_ACCD "Access Denied" DIA8701C Access denied for resource "", operating...
Does anyone know what SAo2 is in SAP?
If connected to office computer remotely, can I connect to the Internet on the home computer? While remotely connected to office, does it affect my office computer?
Why are there 4 cartridges?
I keep getting this error on my Dell PowerEdge 2800: Error loading operating system.
Coworker had to use my computer. She doesn't have my password and supposedly logged in as a different user. Problem is, my desktop came up and she had access to everything as if she was me. How is this possible? My IT says there is no way she could have accessed my password.
I put the computer on (HP) it shows 2 options, a) Home, b) Guest; if I click on Home, nothing happens, it won't come out, (Black screen), nothing happens. If I click on Guest, no problem at all, but I can not access my files installed with Home, how can I fix this to come back to a working Home...
How can I receive .mdb files in Microsoft Outlook?
When I use skype, my calls are often REDIRECTED to someone else. This happens when I make Skype-to-Skype calls, and also when I make Skype-to-phone calls. They also spoof the id's of my contacts to make Skype-to-Skype calls to harass me. How do they do this? How can I stop them?
My Office 2010 word menu bar is missing. How can it be restored?