Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
hi all i want to do sap security some body recommned me to do that course is it will give good job opportunity in that area any body pl give me reply
what form or procedeure would you use for a final security Audit after the Avaya system is installed?
What are credible entry level security certifications? There are so many and Im confused. I am Comptia A+, network+ and MCTS server 2008 certified along with a CIS bachelors
p implise pare equilent p ^ nehation q implize r^ negation r
Hi,I have some lotus script that creates multiple documents from a form and then sends a doc link to selected recipients.What I'm trying to is the same thing except to create multiple copies of an existing document and then sends a doclink to the selected recipients .... ie If one recipient is...
Does the Avaya wireless phones can support Cisco Call Manager?
I have my adressbook in Outlook , that is pst files...and would like to have the same in a windows adressbook which is using wab...what to do ?
I want to pass parameter from obi publisher to RPD. So that i can fetch record from opaque view on the basis of that parameter. As it is done in answer with the help of session variable and request variable.
I have something very specific I want my spreadsheet to do for a schedule I am making. I want to be able to add data as text (IE shower or eat out) as a list 1-40. Ths list would give each text a value 1-5. If the text is already in the database, then it would only add the value to the balance...
I am trying to send e-mail to groups that I have in my address book with outlook (hotmail). My groups are 33-37 addresses. On my first attempt the message only went to 20 of 33 in the group. Is there a limit to how many can be in a group?
I'm using KeePassX as a password manager, and I've stored a KDB file in a Sparkleshare folder to back it up / sync with other devices.But just as a question (with the file being encrypted) if someone stole the file, they would several different versions of the file with minor variations. Would that...
Is it possible to use field-to-field comparisons in a select/omit statement or must the comparison be a literal?
I need to use DUPSPLF. How can I install TAA to be able to use DUPSPLF?
someone made a fake ask.fm account. how do i find out who it is?
I can't open webarchives or webgalleries on my mac..that i created in bridge ..either through the link or downloaded to the desktop on this mac book pro
I ran into an interesting issue the other day we were having mail flow issues, end users reported mail not working, I remember in exchange server 2010 I would normally check make sure its not a connectivity issue they were still connected to exchange server, next I would check toolbox next. with...
I have been looking into the different zero clients offered by companies like Dell, HP, Samsung, etc. From what I've seen so far, there are major price differences between some. However, with there being very little in them, how can differentiate some from others. Also, do all zero clients use...
I'm been doing some research on email security and I've realized that while emails are one of the main ways of business communication, sometimes it's not entirely secure.Does it make sense to use emails for these examples:E-TicketsSoftware license filesSo from a practical point of view, how...
Lately, I've been seeing a lot of talk discussing TCP/IP over DNS requests (usually because port 53 UDP is open and unfiltered). What techniques are out there to detect and block such tunnels? Have you seen such tunneling on a network before?
When I capture an image by my Nokia Lumai 520 and add it to my desktop, it shows so many nar files. Why?