Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Cisco, Database, DataCenter, Development, Exchange 2003, Exchange 2007, Hardware, iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Windows, Mobile, Networking, Oracle, OS, Outlook, Outlook 2003, Outlook 2007, Routers, RPG, RPGLE, SAP, Servers, SQL, SQL Server, SQL Server 2005, Storage, Tech support, Virtualization, Visual Basic, VoIP, VPN, Windows 7, Windows Server, Windows Server 2003, Windows Server 2008, Windows XP ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Where all the places we use Layer 2 and Layer 3 Switches?
In Hotmail, when I send a reply to a message from my inbox, my reply email gets attached to my original inbox email. How can I disable this feature? I want to send my email to other people and don't want everybody to see the complete history of where I sent my email. Didn't used to have this...
Based on the definition of Twain driver, am I correct to say that it is most popular with desktop multi function printers and desktop scanners? While with the more expensive networked multi function devices (for mid to large enterprises), twain driver is not offered or lost its advantage as it...
How do I shut off Auto Launch items in Windows Vista?
My partner owns a Blackberry She then got a new Samsung Note early September. Mid October I found a troublesome (romantic) message dated 20 Sept, 2012 from my partners ex boy friend! She claims its a very very old message not a new one!!?? Other names on her messages list did not have messages...
How to unlock computer administrator when it's locked?
How do I setup a printer?
My computer couldn't read a FN file pictures. How can I convert these files to another file? Thanks.
I've just managed to set up a second mail connection in my Outlook 2007 system. I wanted it to be IMAP but I only seemed to see the option to make it POP. Can I change it to IMAP or is it that all connections need to be of the same type? Thanks in advance if you can help
Can I start up an internet cafe but try to ignore a router but instead use a modem and a switch. and if it can be possible, what can I use as my DHCP server
In Outlook 7 I get message: This operation has been canceled due to restrictions on this computer. Please contact your administrator
What is the difference between UBCD and UBCD for Windows? - besides it's two different programs and two different programmers.
Hi, I would like to check for locks on a PF/LF and need to send message to corresponding user. So, I cant use WRKOBJLCK as it will act interactively or Print the locks. Please suggest me if there is any alternative to check for file locks. Thanks, Pradeep
We have cyberoam firewall at most of the remote end. VPN has been established successfully. There are number of VPNs which are working fine. We had the LAN IP changed at the obne of our remote end.VPN is established successfully but no traffic is getting passed to and fro. Troubleshooting is done...
in LAN we get a bandwidth which is much more than that of WAN.So while testing an application in LAN which is meant to work in WAN environment we need to limit the bandwidth in a WAN emulator.
Hi, I have done my B.Sc in Chemistry and then MBA in HR. Presently I am working with consultancy as IT Recruiter and having around 3 yrs exp. Now i don't want to continue with Recruitment and want to sift into Technical side. I am thinking to do DBA or Datawarehousing course. Can anyone guide me...
Access local only....why?
As RIM prepares for the much anticipated release of the BlackBerry 10, the company continues its fall in the smartphone market. Will the BlackBerry 10 revive RIM? What are your expectations for it?
What temporary modifications can I make to Windows Firewall on Windows 7 computer that stands between the web server and the internet that would allow legitimate customers to access the web server while blocking a Denial of Service Attack?
CL control program Starts commitment control STRCMTCTL LCKLVL(*CHG) CMTSCOPE(*JOB) Calls a complex sequence of RPGLE programs Issues COMMIT Issues ENDCMTCTL A rather complicated series of RPGLE programs: open files for update read records sometimes update records sometimes call other programs...