Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
With help of below query we are getting output for all tables and indexes "db2 reorgchk current statistics on table all". But I want only those tables which we can reorg on that tables like *---*,--** etc..... Please provide me SQL query where I can see only that tables name where they require...
What is the advantage of IPV6
Hello. We are looking for a simple solution to host a common set of catalog graphics for our remote sites that are both geographically and independent and separate. Any suggestions would be appreciated. Thanks. Paul.
Hi, How do I become an expert as a security analyst? I graduated from business IT field without security knowledge. What area should I start studying with? Some people suggested me to take CEH first. What do you guys think? Is CEH a good cert to start with?Appreciate any feedback :)
during an IPL we received B200F001 LP=002. What is this error
Hi, I had generated the crystal report by using visual stdio 2010, having asp.net vb and ms access database. It is working fine on local server but displaying blank page on server. I am including the code for reference. Thanks a lot to for solution in advance.reportview.aspx.vb fileImports...
Am I safe giving away an old tower to a lady who needs one?
Hi! I could use some help. My company plans to send out critical data to our clients in encrypted PDF format. Is there a danger that they could be blocked in the future as virus scanners become more sophisticated and conclude that they could be carrying malware?
Can someone help me with iSeries DB2 searching text filters?
How do you protect a server against Denial of Service attacks? What techniques do advanced firewalls use to protect against DoS/DDoS attacks?
I'm new to the security world but I know that instant messaging uses "off-the-record" encryption (which means that a user would get authentication, encryption and forward deniability). But for my email, all we use is GPG/PGP, which offers authentication and encryption but doesn't allow forward...
Does anyone know how to reset Tellabs 532L DACS back to the factory default of TELLABS?
After a power outage at work, we lost connection to the Iseries. One of the AP files that holds multiple members lost one member of data. 2 days later this member shows up again without anybody doing anything. The CFO wants to know how this happened. Can anyone answer this?
How can you set up a cell to activate the current time when another cell has data entered into it? Just want to track what time DATA was entered in the other cell.
I am using RUNRMTCMD from an AS400 server to execute a c program in an AIX server, it is working fine but I want to know if there is an error message code I can monitor to know when the communication is lost. What is happening now is that the remote program continues running in the AIX but cannot...
this appears when I try to find a website--error No_db_file
I've been told that when I'm setting up my home network, I should make sure that all outgoing ports on my router should be blocked, although I should allow certain ones to open to support HTTP, HTTPS, etc. This even though I have a firewall in place. But is this really necessary if every computer...
Hi! I need to go into a Hotmail account. I have the sign-in and inbox URL. Can I just use this to see the inbox?
A part of our team has had to extend our website to try to communicate user credentials for a suppliers website. We're using a 256-bit key but they're using a static IV for decrypting the information. We've advised them not to use static because it's an a security risk. But we want to know how big...
**First submit blanked out all the original content** Sorry Environment - Windows Server 2003 SP1, SQL Server 2000 .exe version 2000.080.0760.00 I am helping to remove the clustering and migrate all databases on the cluster to a single machine in the cluster. I was able to evict Server 1 from the...