Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
I've been running an unprocessed document so it only runs as a selected document in Lotus Notes and now I'm at column values so I can export the document to Microsoft Excel. My code has been working fine but the first document is always displaying last after all of the other documents in the Excel...
Is Trillian still being supported or developed? The last time I used it, it got too buggy to even open. Plus, Trillian's own support page is saying that it's just been quiet on their end. Is it safe to assume I won't be able to use it again?
Would I be able to write a 3rd-party application that can capture a SMS / incoming call on Windows Phone 8?
Can biometric identifiers be used for fraud prevention in a developing nation?
I was given a Gmail ID and password from Verizon Wireless. I don't know either one of them. Can you help me either figure it out or get a new one? I have an iPhone and I can't go to iTunes without it. I am giving you my mother's email address below so you can respond with the answer. Thanks.
Hi Folks, Whilst reading the article on using the SANS Secure the human for security education and awareness programs, it prompted me to consider what is the size of this market in terms of $ value?
I am an non IT-mother looking at putting key log software on his laptop. It's remote so I can't physically access it. Is it safe and untraceable? I worry about him. What would you recommend for a program. Will it be visible to him!
Can someone tell me what bandwidth is?
Please...I need some big time help! I need SSH access for an Amazon EC2 instance that's currently running on Ubuntu but all I have is the Amazon username and password. How can I do this?
I have three PCs on a Wi-Fi network, I want two of them to be also linked between the Wi-Fi with high-speed ethernet. Is that possible?
A private club serving liquor must maintain a sign-in log for guests and other non-members. How long must these logs be maintained before they can be discarded?
I have 75 meters of distance and a 1gbps D-Link switch available. I hope my connection gets better. Will that work?
I'm searching a centralized logging approach for vertx (groovy) multi-verticale case. My aim is to have a single log-file where I could write my logging information from all currently connected clients. Could you recommend appropriate for this aim a logging framework?
I have done Cert 3 Network Administration. What should I go for? I am interested in network security, system administration and web designing. Any help is appreciated.
I need some help with my career choice. Can someone please help me with my choices: CCNA & Networking Web Design Please, what should I do?
Over the past few weeks, I've been setting up Panda in an Amazon EC2 instance. Everything was going great...I set up my account and tools and used SSH to interact with the instance. But all of a sudden, I can't get permission to get into Panda's EC2 instance. Here's what I'm getting:@ WARNING:...
What's the best Linux OS to run on SAP?
Does anyone know if you can create an SSH session from an as/400 command line? I know I can telnet to a remote RHEL server, but it's not as secure as SSH, and not as reliable. I would like to create an SSH session, to create a session on the remote RHEL server (with update capability).
Google notified me today that someone in the UK attempted to get into my Gmail, from 188.8.131.52. I ran a tracert on this address, and it goes back to btcentralplus.com - which has a rather seedy sounding reputation going back many years. BT is supposed to be an ISP, but the complaints about...
My friend has been trying to set up a Lotus Notes account to accept emails from a client / save each email as a text file that will be processed by another application. So he's been looking to create an Agent that automatically exports the emails to text. He wants to know what's the best way to do...