Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, Cisco, CRM, Data Management, Database, DataCenter, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Is there a example email retention policy already developed for Office 365 that someone could point me to review and see the scope of topics addressed in this policy. My government agency is going with MS-Exchange 2013 - Office 365 and we're needing to up our email retention policy that...
How is the VHDL logic synthesizer is used to verify logical operation of any given circuit?
Why is Windows 10 showing as Windows 8 in file explorer?
I need to pivot my records in columns into rows. Here is sample data: create table #columnstorows ( Payer varchar (5), ID varchar (5), ClM varchar (2), Paid1 float, Paid2 float, Paid3 float ) go insert into #columnstorows (Payer, ID, ClM ,Paid1, Paid2,Paid3) select...
I want to get no of members in two multi member physical files in a one CL program using outfiles. Please give a pseudo code for this. How should I use DCLF, DSPFFD, RCVF in my CL program for getting no of members in 2 physical files, say my physical files are file1 and file 2. Please help. Thanks...
Hi, we are performing an activity of disk removal, we have new set up in 740 server. All the old disks have been moved to SAN. Can you give me the easy and comprehensive steps how to perform this activity looking at the following tasks. Stop all partitions Close down the complete machine Take away...
My Word document is too big and cannot open. What should I do?
I wish to upload to Phafare a photo image which I have received in a PDF format. I have downloaded the picture using Adobe Acrobat and can see it on my PC but when I try to upload to Phanfare I see that it must be in a the JPEG file format. How can I convert the PDF into JPEG? Adobe Acrobat doesn't...
I want consecutive Word pages to have even numbers (2, 4, 6, etc). Same problem with Excel.
I'm sending data over HTTPS and my content is encrypted but I'm not sure if my headers are encrypted. Are they? Thank you.
I have done my Btech (CSE) and MBA (Post Graduation Diploma Information Technology Management (Financial Systems). Is SAP FICO best for me or not? Is this useful for me? Can I get a job based on this? I do not have any accounts knowledge. I do not have a subject for accounts also in MBA.
Does anyone know what is meant by ALE and EDI in SAP?
What are the commands to split an RPG program so more lines can be added? Also, how to merge the 2 sources together again? My current source has 32,000 lines.
Can you assist with all phony binary option schemes?
What is the best technology (Ex: .NET, Java) to be used for developing software which is going to be used for industrial purpose (applications like manufacturing execution systems)?
Can someone tell me what is meant by SNMPwalk and why it is used.
Anyone know how this file is updated and which tag is updated when signal goes low.
Some documents on my computer have file extension .rkhnuph. Is this a virus?
Hi folks, I am using SSRS 2005 BI. As per MSDN standards SSRS 2005 will not support more than 240 columns in excel (while exporting, will get error). Now I am having more than 240 columns though I am using SSRS 2005, I am not getting any errors. However there is an error here: Reporting Services...
How can I hide all network devices from Nmap or any other network scanners? Is it by using Bridge, VLAN or DMZ?