Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, Cisco, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
How do I list the contents of a list in AS/400?
I am looking for instructions or reference to instructions on how to compile a set of SQL statements into an executable file to be submitted as a scheduled batch file. Any thoughts?
I keep getting this error: proxy server not available. What should I do?
Windows 8, how can I tell, or CAN I tell, if someone is mirroring keystrokes? How is that done? And if data is entered on the touchscreen's keyboard, can those "strokes" (taps) also be mirrored?
One of our NetApp NAS filer that keeps failing from time to time. We're not sure if it's network related. We noticed that the System.IO.File.Copy(...) command fails unexpectedly sometimes but then works a minute later. Here's the exception we're getting: System.IO.IOException: The specified network...
How do I reinstall Office 2015 after my Toshiba computer crashed?
I just tried to export my contacts into an excel spreadsheet. I followed the instructions but when it imported, all it imported was the title line, you know first last title company email website phone fax cell address city state zip. However NONE of that information imported over. None. What do I...
Hi this is Adam, recently due to security issues in Android and iPhone, I switched to BlackBerry and I purchased blackberry passport, My question is as BlackBerry passport supports version 10.3.2, can I install Android application through Android emulator, so does these mean even in BlackBerry my...
My office computer went down so I'm temporarily using someone else's for my Outlook mail. While I'm a user on that computer somehow my "sent" emails get stored under a different users app data plus my inbox is listed separately, not in the "inbox" under Personal folders. How do I re-set Outlook so...
Is there a way I can open QIF files?
How to use and know web technology?
In a batch FTP I send QUOTE RCMD RSTLIB SAVLIB (......the command is 130 characters long, although the RSTLIB was executed without errors on server, the client report " 500-error occurred on command RSTLIB ....... truncated to 80 characters . Does someone know how to fix that?
Can someone tell me how to copy a pipe delimited text file to PF on iSeries?
What are the things to look at, when you want to increase the processing speed of your computer?
Hello I am locked out of my OWA email. I am the Administrator for our organization, unfortunately I forgot my password. Kindly give me a code or step for accessing my mail and reset my password. Thanks! Ahmed
I have multiple Physical files (Trans2006, Trans2007, Trans2008, etc…) with same record layout with the yearly transactions on my iSeries. I want to merge these files (for temporary period). Is it possible to create a Logical file? If so please help me.
Error Message after creating a user in Window 2008 Server. You can not log on because the logo method you are using is not allowed on this computer. Please see your network administrator for more details. Can some one help me out as no new user can logon. I just inherited this Infrastructure.
Does Bluetooth have the capability to control the volume of a paired speaker?
I've deleted and re-installed my Linux Based OS dozens of times. My hacker has mocked me by making comments about my online and offline use. My desktop screen use is recorded. VPN is useless. My hacker has downloaded confidential financial files from my computer and attempted to commandere my bank...
Why we have to use DLTOVR after OVRDBF command?