• NDM Client resource requirements

    When defining capacity requirements for a Linux VM that will use NDM, how much available memory must I allow for the NDM client on the VM?

    mikeq005 pointsBadges:
  • Blue screen problem

    Hello,  I tried to install Windows XP professional on my Acer system. I made my first bootable device as CD-ROM and the second as HDD. The system boots from the CD and shows that setup is loading the files. And immediately after that a blue screen pops up and says a message. I'm not able to move...

    Mooncmc5 pointsBadges:
  • List of modules in Service Program.

    I have a service program, I need to know the modules that are present in it. Using DSPPGMREF command can we find the list of the modules that are present in a service program?

    mvrkrishna525 pointsBadges:
  • consult about insert CLOB data into tha table in my database

    I would like to be sure about my procedure out put t!! I write the following procedure phtml (p_airpcode in varchar2, File_Metar OUT CLOB)ASreq UTL_HTTP.REQ;resp UTL_HTTP.RESP;i integer ;BEGIN DBMS_OUTPUT.ENABLE(3000000); req := UTL_HTTP.BEGIN_REQUEST...

    abdmet7420 pointsBadges:
  • Exporting vb6 data to pdf using sql select query from ms access .

    hi my name is vishal. I think i have a problem in exporting vb6 data to PDF using sql select query(join query from multiple tables). i have a form in which when user selects a GRNno from combobox and then press button with caption:Generate it should generate a PDF report regarding GRNno.Given below...

    Ametuer30 pointsBadges:
  • Linux Security

    Will Sophos anti-virus, security, etc. software work with Linux operating system?

    Rknopp5 pointsBadges:
  • Linux OS

    Interested in moving to Linux from Explorer, and Windows OS 8

    blackbird50110 pointsBadges:
  • Outlook Express contacts

    how can I import OE contacts into Windows Live Mail

    Wrig15 pointsBadges:
  • Logical files – V5R4

    HI we all know DSPDBR command on a PF will fetch all the dependent logical files. Can anybody tell me with a logical file's name only known is it possible to fetch the Physical files's name on whom it is dependent?   happy new year n best wishes to all Ram

    ten20081,150 pointsBadges:
  • Math test in VBA – Thank you

    Hello :-) I want to create a maths test for my 6 year old daughter. I wish to create a list of questions and she would need to key her answers. If she is gets its correct she gets the "Well done" msgbox otherwise "wrong answer". I've done the following, how can I create a list, whether or not she...

    VBAlearner15 pointsBadges:
  • Occupancy percentage in call center operation

    what is the difference between utilisation and occupancy in an inbound campaign?how to calculate occupancy percentage?

    Svachaspati5 pointsBadges:
  • MEMS

    What is MEMS?

    gudnews5 pointsBadges:
  • Apache server

    We have an application which is using Apache server in production environment and in DEV no where its connected with Apache. Still its working fine. Could you tell me the exact use of Apache server? why wont it impact on DEV environment?

    PradeepKotian5 pointsBadges:
  • Purchase Requisitions

    How to list FIRMED Requisitions

    FarrowR10 pointsBadges:
  • Exchange 2013 message size

    In Exchange 2013 we have a 9MB message limit. It seems we set the messagelimit higer but it won't take the settings. Any idea?

    Engeltje5 pointsBadges:
  • ISeries Printing

    When creating an OUTQ, can I put the word 'PASS' in the "Remote Printer queue field?

    sjohns585 pointsBadges:
  • COPYBOOKS and MODULES in ILE

    Hi Group,I am new to the ILE environment. My question is......When do we go for COPYBOOK creation and when do we go for a MODULE creation?Regards,M

    mvrkrishna525 pointsBadges:
  • Display image on Crystal Report in C#.net

    I have a store image on my Access database in bytes format. I want to show this image on Crystal Report using dataset in c#.net.

    kishorkabadi5 pointsBadges:
  • ShaVe & ShaKe Protocols

    Hi Experts, Can you give me an in depth explanation on ShaVe and ShaKe protocols? I just know its used for secure pairing of mobile devices to get accelerated data. Its initial key exchange with comparison of sensor data for verification of key authority. Please explain me more clearly on practical...

    Mystica10 pointsBadges:
  • Zimbra Storage

    This a mail from my colleague, "I would like for us to use the zimbra briefcases for storage of latest datasheets and specs for the future. This enables global (but controlled) access to the documents (for example you or I can specify exactly which people can access the folders)." So my question is...

    shrieveIT5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following