Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
We are looking at implementing PHP to develop applications - we are not sure where to begin - what resources will we need on iSeries - does anyone have a pseudo checklist of requirements for iSeries setup - any suggestions on what type of training would be required to efficiently use PHP?
I'm liking what I have now. Why should I upgrade? According to MS, I would be able to view docx files.
How do I remove pop-ups from anti-spy wear programs. The ads keep coming and I can't "X" them out. They just keep coming.
The following command wrote ABC to my data area. (As a text value).
Are there tools/quick tips I can access to help uninstall previous AV products? This question is from the Microsoft Live Chat which took place on July 13th.
Can you please tell me how to find mask when only subnets are known? e.g find out mask when subnets are 50?
I am trying to replicate a DFS link in DFS on windows server 2003 Enterprise Edition SP2. these are the steps that I found: To initiate file replication Open Distributed File System. Click the domain root or link for which you would like to initiate replication. On the Action menu, select Configure...
Hello, I'm just learning how to use macros and have this fairly large project to do. It concerns extracting data from a schedule (timetable) with the courses, course code, name of tutor on it. I have managed to extract from a cell and have the following information come up in a message box (course...
I am preparing to start using an Exchange Server on our network. As part of this preparation, I want to run some tests using Virtual PC. Can anyone tell me how Virtual PC deals with licenses? Will it use up one of my licenses if I install Exchange Server on Virtual PC? Thanks, NickThanks! We'll email you
when relevant content is
added and updated.
First the environment is XP SP3, Office 03 SP3, Exchange 03 SP2. My question is does anyone know how or if there is a tool to repair and or recover an 8 gig archive. It is a new installation, trying to pull over the archive, and it just keeps checking the archive for errors, takes nearly 3 hours to...
We make use of temporary tables when we develop stored procedures, but they also become very slow when there is a heavy workload. We have an ISCSI SAN running RAID 10, and our database, logs and tempdb (15 GB) are on the SAN. We think the SAN is overworked; the SQL Server shows no CPU. Should we...
My environment is 2 DCs (one of them is the GC), new Exchange 2007 server, and an old Exchange 2003 server. For some reason when I am setting up a new account in Outlook 2007 with the new Exchange 2007 server, it says the following error when trying to Check Name. "The action can not be...
What are the specific settings to connect a Lexmark model 658 to an iSeries system using ip and crtdevprt.
I have two LAN one is without subnetting and another one is with subnetting, now I have to check the performance of with subneting LAN with respect to without subnetting LAN.
Is there any way other than Rights management to prevent employees from sending confidential files using free email accounts (Yahoo, Google, etc). I can't disable access to all known free email accounts. There are just too many of them. We already use endpoint security to lock down USB drives.
I'm trying to get the power requirements for an AS/400 model 9406 600. I have look all over and I'm still unable to find any information. Any information would be greatly appreciated.
I have an internal IP of a router, The problem is I can't access its login page for configuration by typing it in a browser, why? And how can I manage that?
SBS 2003 Exchange is testing as an open relay according to spamhelp.org and instructions in TechNet Article 324958. In the TechNet Article it lays out how to close the open relay. All our server settings met the articles settings in the first place. We are not using the built in firewall (ISA...
I have some licenses on our Windows Server 2003 Terminal server that are for systems that are no longer in existence but the license does not expire for quite some time. Is there a way to expire that license lease early or delete it so that the license can be used elsewhere?
We are using RUNRMTCMD between two i boxes using IP. We are calling a CL program on the remote box. It connects and runs the CL program successfully. The CL invokes an RPG program that produces a printed report. The report is not going to the outq associated with the user profile on the remote...