Questions & Answers

  • Open IT Forum: Which is the best security certification for cloud computing?

    Which is the best security certification for cloud computing? Certificate of Cloud Security Knowledge (CCSK), Terra, or any others?

    MelanieYarbrough6,345 pointsBadges:
  • AS/400: Create a CL program using DSPOBJD

    Regarding AS/400, I need to create CL program using DSPOBJD to find the PGM starts with any alphabets as our wish.

    parthibanumapathi5 pointsBadges:
  • Win 7 Pro machines can’t see all XP machines

    I am trying to integrate Win7 machines in my peer-to-peer network comprising of win XP pro machines and (1)Win 2000 server machine. The network addresses are assigned by the gateway/router, and all PC's can connect to the internet, but the Win 7 Pro machines do not show the XP or Win 2000 machines...

    lionvp15 pointsBadges:
  • Can anyone tell me name of any cloud simulator for the M.Tech Thesis Purpose?

    I am M.Tech student. I am finding a simulator for cloud computing, so I can create a private and public cloud. How can I do that?

    Pankil5 pointsBadges:
  • STRQMQRY

    If you use a CLP to pass parameters to a STRQMQRY command. How do you disable prompting this command.

    sorella85 pointsBadges:
  • Adding a security instance to Amazon EC2

    We currently have an Amazon EC2 instance running and we would like to add one another security group for that specific instance. After that, we want to move the security group already in there from that instance. Would that be possible?

    ITKE355,655 pointsBadges:
  • Connect HP laptop to HP Photomart

    How do I connect HP laptop to HP Photomart Premium C310

    Noah58935 pointsBadges:
  • What’s a System tray?

    What are the functions of system tray?

    jayike5 pointsBadges:
  • Microsoft Outlook resending meeting planners

    Why does Outlook keep resending meeting planners on my behalf? It has been sending daily the same recurring meeting planner and it says "Sent by Microsoft Outlook on behalf of _ME_". Why is it doing that. It's getting annoying and I'm sure the persons who are getting the same planner daily is...

    TMS19675 pointsBadges:
  • New account wont open due to mobile verification

    I'm trying to open an account for my sister, the first step is to verify a mobile number. I've tried to two different numbers and each time after I fill in personal details I get a message "oops something went wrong you must start over". I keep starting over until the number has been "used so many...

    AzzohCan5 pointsBadges:
  • Convert SWF file to MPEG

    I want to convert a SWF file to MPEG or AVI file format. How can I do that?

    nishan12310 pointsBadges:
  • WCF rest & post method

    How to allow both rest and post method on single wcf service

    nixonfrancisk5 pointsBadges:
  • Goals of an operating system

    What are goals of operating system?

    carlo125 pointsBadges:
  • Excluding one machine from proxy server via group policy?

    Can I exclude one machine from the proxy server using group policy or at least without having to visit this specific vice presidents Windows XP SP3 machine?

    TeachMeIT975 pointsBadges:
  • My Telco is blocking calls to several exchanges

    My Telco is blocking calls to several exchanges in my local are used by Voxbeam/Localphone. Is that legal? What can I do about it?

    RonHaber5 pointsBadges:
  • Op-ed social Media

    At my school I'm taking social media and I have to write an op-ed writing about 800 to 1000 words. Do you guys have any idea what I could write about social media. The teacher give us only one long example: how Twitter serves virtually no purpose in our current day and age and simply should be...

    juliastar15 pointsBadges:
  • Regarding my cloud based startup for eLearning and DBaSS

    Hi, I am an enterpreneur. I have launched a social community based eLearning or databases and this is a cloud based offering. I want to know how to reach out to people so that they can use it and benefit from it.

    ondemanddb10 pointsBadges:
  • Implementation of secure mechanism for side channel attacks in cloud computing

    Sir/madam, I'm a 2nd year PG student specializing in Computer and Information Science. As part of my course we have to do a 1 yr research project during 2013-14. I choose my domain as security in cloud. So by searching through the web I got 1 issue as side channel attacks in cloud.  Since the...

    mvidya199020 pointsBadges:
  • Copying a column formula

    I have created a Change Log. the first worksheet is the log itself. The subsequent worksheets are the individual changes (PCO's). An example of one formula that I am using is as follows: =IF('PCO 1'!M4=0,"",('PCO 1'!K18-TODAY())). Is there any way I can copy this and paste it on several lines. eg,...

    indy909115 pointsBadges:
  • Covert EBS instance to stored instance in Amazon EC2

    For Amazon EC2, I know it's possible to convert a stored instance to be EBS backed. But now I'm trying to do the opposite. Would I be able to take an EBS backed instance and convert it to a stored instance? If so, how would it be done?

    ITKE355,655 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following