Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
A European customer of us is actually using SYNON 6722SS1 V5R1M0 010525 Release 6.2 COOL:2E Version: 62070 and wants to upgrade his IBM systems iSeries 825- AND 9406-720 VERSION OS V5R4 to an IBM Power System 8xx under OS V7R1
Where can I find free RDBMS training online?
Is there a way to have an auto filter of distinct values on columns in SQL Server Reporting Services?
what is the difference between MM & SRM ORG structure
I'm working on a LEI to transfer LN data to SQL. To do this, we have to map the LN fields and SQL columns. Problem here is that LEI does not support computed for display items. These items can be seen in the document properties list so i hope there should be a way to map them in the LEI using the...
I've been trying to get a handle on a Lotus Notes file attachment in an email. This is the first time I've run into this problem. I already have a code that searches the document for Embedded Objects but it's not returning with the file. I'm able to see the file in the email / see the $FILE field...
I'm trying to convert flat file to CSV file using RPGLE. As it is a comma separated file for certain fields like description as and when comma is encountered data is written to next column. I need to place each field value in respective columns even if comma is present in a field value. Can some...
I'm trying to execute following command: OVRDBF FILE(PF2) TOFILE(TESTLIB/PF@) MBR(*ALL) SHARE(*YES) PF2 file having records and PF@ is replica of PF2. PF@ doesn't have any record but after OVRDBF, it should have records. After executing above OVRDBF command, PF@ still showing blank.
Hi everybody, I've just recorded a keyboard input macro for a repetitive process on iSeries, but I want to know if it's possible to loop this macro n times instead of executing it once at a time. Thanks.
I've been running an unprocessed document so it only runs as a selected document in Lotus Notes and now I'm at column values so I can export the document to Microsoft Excel. My code has been working fine but the first document is always displaying last after all of the other documents in the Excel...
Is Trillian still being supported or developed? The last time I used it, it got too buggy to even open. Plus, Trillian's own support page is saying that it's just been quiet on their end. Is it safe to assume I won't be able to use it again?
Would I be able to write a 3rd-party application that can capture a SMS / incoming call on Windows Phone 8?
Can biometric identifiers be used for fraud prevention in a developing nation?
I was given a Gmail ID and password from Verizon Wireless. I don't know either one of them. Can you help me either figure it out or get a new one? I have an iPhone and I can't go to iTunes without it. I am giving you my mother's email address below so you can respond with the answer. Thanks.
Hi Folks, Whilst reading the article on using the SANS Secure the human for security education and awareness programs, it prompted me to consider what is the size of this market in terms of $ value?
I am an non IT-mother looking at putting key log software on his laptop. It's remote so I can't physically access it. Is it safe and untraceable? I worry about him. What would you recommend for a program. Will it be visible to him!
Can someone tell me what bandwidth is?
Please...I need some big time help! I need SSH access for an Amazon EC2 instance that's currently running on Ubuntu but all I have is the Amazon username and password. How can I do this?
I have three PCs on a Wi-Fi network, I want two of them to be also linked between the Wi-Fi with high-speed ethernet. Is that possible?
A private club serving liquor must maintain a sign-in log for guests and other non-members. How long must these logs be maintained before they can be discarded?