Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
does anyone know the features of a backing hardware?
How do I put black cartridge in my printer?
I have a 32" TV in my bedroom that the tuner has been going bad for a few months. How much will the repair cost to fix this? The HDMI ports are dead also since the tuner has been acting up.
How do I open a Vizio remote?
If and how to turn my photos and videos on my Motorola Android, moto e, Mobile, into JPG?
There are many Anti-virus and Spyware downloads out there that boast they are free, but either are not OR collect information about the user that is intrusive. Is there a program out there that you would recommend for college students who would be able to get a deeply discounted rate or even free...
I'm assuming a switch does check the frame check sequence (FCS) of any ethernet frame. How exactly does the source get notified?
What is the public cloud maximum block size?
How to open a WDP file?
I need to add a personal password to my Netgear router. How can I do that?
I lost my Facebook icon on my desktop. How can I get it back?
What is cloud accounting? Can anyone explain this concept?
What is the purpose of PR and PI in calling program and called program?
How can I catch the person who changed all my passwords to my accounts
I want to know what requirements would I need for 15 to 20 phones. I don't need any outside service just station to station on the vessel. I'm fairly new to VOIP. I've found tons of information on standard systems. I was wondering if building a system that doesn't need to reach the outside world...
How do I get bold fonts in RDL files?
Hi there, I'm looking for a way to insert the Email document Identifier (See below example) into the body of all emails before they are delivered. So I'm guessing I'll need to create a Pre-Delivery Agent. Any ideas how I would go about this? I've tried to find examples of just inserting some...
Recall that BitTorrent uses a choking mechanism to allocate bandwidth to peers. It “unchokes” four peers who have given it the best download performance (tit-for-tat), plus one of the remaining peers chosen at random (optimistic unchoking). The choice of four best peers, as well as the random...
Is there a way for me to do rounded corners, in CSS, that will condense in Google Chrome? Can someone show me the command to do this?
I knew my friend's (completely unrelated with my web accounts) e-mail address and password. One day, I logged in, and saw an e-mail, in which there were lots of photos that I have watched or seen in my computer! Those photos included my and my friends' Facebook photos, Google photos, every single...