Questions & Answers

  • Can a greedy algorithm be used for cloud storage?

    Is it possible to use greedy algorithm to be used for cloud storage and file accessing

    Cyrel235 pointsBadges:
  • Open a PDG file

    I had to reboot my computer and lost the print shop program. I reinstalled print shop but am unable to recover the PDG files that were saved. How can I move the PDG files back into Print Shop 22?

    ainsword5 pointsBadges:
  • AutoCAD 2015 edit block

    AutoCAD 2015 block editor appears to be opening in paper space. How do I change to model space?

    greglove5 pointsBadges:
  • Regulations that apply to ILECs

    I am researching whether my county can create its own ILEC (Independent Local Exchange Carrier). I am clear on the state laws that apply, but am curious as to what federal regulations apply to ILEC and what steps would need to be taken on the federal level. I know the FCC regulates ILECs, but that...

    wwelsh5 pointsBadges:
  • Pin number to mobile phone mistakenly given

    If someone gets your mobile pin number, what all can they do with that information? How far reaching is that?

    lindyindy5 pointsBadges:
  • Finding source of spoofed email

    How can I find the source the used my email in spoofing?

    bgill55025 pointsBadges:
  • SAP PO acknowledgement

    I would like to receive acknowledgements from vendor once they received our email. Can the PO be updated in SAP automatically from the email confirmation?

    lmcass5 pointsBadges:
  • Windows 7 homegroup network issues

    I have a small network of 5 clients, a server and 2 printers running on win7homegroup network with DHCP running. I have 2 clients sharing a wired port via a switch. all connects to another switch and then to a router for internet access. When one of the clients attached to the switch (with 2 comps...

    poppalarry5 pointsBadges:
  • Third party service providers requirement 12.8.2 – does it apply to clients?

    If a PCI compliant service provider hosts his technology to third party clients with the third party having only web access to a portal (with viewing cardholder data/debit/credit card permissions), does the client require to be PCI compliant since all storing/coding/encryption is performed by the...

    Dendeni25 pointsBadges:
  • What kind of wire protocol is used in a 3-tier server architecture?

    In a typical 3-tier server architecture what kind of wire protocol (such as HTTP) is used? Is it common to see a L7 SLB between Web Tier and APP Tier? Also, in a typical server servicing HTTP request is it common to encounter a large number of static objects - I.E object not generated dynamically...

    knbkn685 pointsBadges:
  • Metrics for customer service functions and “rule of thumb” trigger points

    At what point(s) (e.g., metrics, KPI) should a small B2B software provider look to automate their customer service functions?

    Petiesmom10 pointsBadges:
  • Adding a New Tab in ATG Service Center

    How to add a new tab in ATG Service Center using ATG COntrol Center

    Sarun5 pointsBadges:
  • How to create a common SQLite database for different Android devices?

    I want to create a common database for a group of four to five Android devices. Basically I want to use a single database for all the devices. Data manipulated by any one device can be seen effective for the whole group. I have a thinking that something like dropbox or cloud storage might work, but...

    hussain22juzer525 pointsBadges:
  • Can we reserve an Amazon EC2 instance?

    We currently have a huge Amazon EC2 instance that's running in one of our regions (Asia to be exact). Now, we're trying to reserve that instance in the AWS management console but we're only seeing the option to purchase a reserved instance (not change it into a reserved one). Did we miss something?...

    ITKE355,620 pointsBadges:
  • Business development for AWS re:Invent

    What kind of business development opportunities does AWS re:Invent give?

    shruthiudupa5 pointsBadges:
  • Importance of metadata schema

    What is the importance of metadata schema?

    david20305 pointsBadges:
  • Creating two way communication using RFID transceiver

    How do I create two way communication using RFID transceiver?

    saateesh5 pointsBadges:
  • Dollar signs ($) after dimension styles

    Why does the dollar sign come in when I add a dimension to my drawing?

    lstehura40 pointsBadges:
  • Overlay Positions vary

    Hi, I have used Overlay concept to populate data to the word document. In my development server, its worked fine. We got the report output with data fitted to the correct position. But when we promote this objects to client server, the data is not aligned properly. How to fix this issue?

    22917560 pointsBadges:
  • The effects of cache memory deletion on actual data

    What effects does deleting your cache memory have on your actual data?

    AaronPaul25 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following