Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
DVD - 209
How can I convert FXP to PRG?
Throughput under bit-reversal. What fraction of capacity does a 4-ary 2-fly achievewhen routing the bit-reversal traffic pattern?
Hi guys, I was wondering how you would go about making a clone of your hard-drive and putting it on an SSD? I would be doing this on my laptop, if anyone has a link to a good guide or can provide some insight that'd be much appreciated. The only I/O I have are USB 2.0 so would be easiest to do it...
Hi Group,I created a PF and I need to enter -ve values in one of the field by using STRDFU.the field is defined in the following manner: SALES 5P 0 ALIAS(EP_SALES)Thanks & Regards,Rama Krishna
Could anybody give me insights about Open Source ERP, benefits over specific modules other than the cost implications/ Also, are there any risks involved? Does there exist any framework for the implementation process?
Is E-BOMB good or bad?mention its advantages and disadvantages.
Every month my bank sends me a monthly statement in the form of a password protected PDF attachment. Is this truly a secure way to send sensitive financial information via email?
How could I login to an AS/400 system. After entering ID/password, it asks me to press enter twice and after pressing enter, it comes back on login page.
I'm doing some research on HTTPS encryption and from what I understand, it looks like cookies can be sent unencrypted over HTTP even if the site is only using HTTPS if they have something called a "secure flag". What does that mean? My site only uses HTTPS, so this seems important.
Pls how do i restore my local and wide area networks to my already connected laptop?
What are the security implications for a firewall that allows ICMP? Are there times where it should be turned off?
I'm trying to learn more about "IT Security" and I've come across two-factor authentication. I understand two-factor authentication mechanisms use SMS to deliver single-use passphrase to the user. But how secure is it? Is it hard to intercept the SMS message containing the passphrase? Do mobile...
I want to use a filter that would be the equivalent of the "like" command in SQL. so it could read column name NOT LIKE 'pos%' as and example.
Hi experts, I've set a rule in my mailbox for "All Document" to "Send full copy to" another person mailbox. But somehow it doesn't work. If anybody send an email to me, it'll show the "email has been forwarded" symbol but actually it is not being sent to the intended person's mailbox. Any idea?...
My smart tv sees my novatel mifi but cannot make a connection.
internet speeds using the Ookla speed test return a paltry 18.8 Mbps download and about 7 Mbps upload speed. I am using a cable modem to attach to the Comcast network. How can I speed up the performance of the modem/network?
I work at a care facility that offers guest rooms to family memebers that are from out of state. Any time we book one of the rooms for less than a 24 hour period it appears on our calendar as two sepperate reservations. However when we make a reservation for more than 24 it appears as one. What can...
This may seem as a general question but I'm wondering how experienced users actually test "stateful firewall" with TCP/IPv6. I would include these two tests:Echo reply without requestTCP ack without synIs there anything else other than this? Especially that pertains to IPv6?