• DB2/400 SQL Sub Query Performance?

    Here is the problem. Table INVEHH is a (Events header table) with about 500 records and INVEHD (Event Details) with about 22 million records. These tables are on a DB2/400 database. 1) Original Query that takes forever: select EVENT, INUMBR, ISTORE, EVHYY, EVHMM, EVHDD from INVEHD where EVENT in...

    Apothen0 pointsBadges:
  • Corrupted log file on Exchange still needs to be restored.

    How would you recover Exchange server when the log file is corrupted?

    Karl Gechlik9,860 pointsBadges:
  • How do I open a .DBF file to a tab in my worksheet?

    I need a macro that will open a .DBF file to a tab in my worksheet. Is this possible? If so, can you show me the code needed and if not would you have any alternative suggestions? Thank you

    myleszikiom5 pointsBadges:
  • Convert PST to CSV

    Can I convert a PST to CSV? If yes, how?

    awa2kee5 pointsBadges:
  • Record format in DB2/400

    How to check file name using record format in DB2/400?

    vishwaraj60 pointsBadges:
  • Date dd-mm-yyyy reversed to mm-dd-yyyy

    Hi guys, Could you tell me why when I insert date into a database table, it's reversed from (dd-mm-yyyy) to (mm-dd-yyyy)? I have well defined my date format on form design already, but when it's inserted into the table it automatically reversed. How can I solve it?

    srithea155 pointsBadges:
  • PCI compliance for storing SSNs in a hosted database

    Do we have to be PCI compliant when it comes to storing SSNs in our hosted database? We're a nonprofit and it would be hosted in a CRM database. Thank you.

    ITKE363,905 pointsBadges:
  • How to offer a high availability database environment

    Can I configure VMware Fault Tolerance, or another VMware technology, to host an active DB2 database at one data center, and host a standby DB2 database at a second data center? Applications would access the primary DB when available, and then access the standby DB if the primary failed. The data...

    JimInTexas5 pointsBadges:
  • Advantages of a database over data structures

    What's the advantage of a database over data structures?

    josphinanitha5 pointsBadges:
  • Fingerprint recognition in Java

    I want a programing source code for fingerprint recognition time and attendance payroll system in Java language. I also want the source code for capturing a fingerprint image and storing in MS Access in Java language for the same project.

    Anikketthakre5 pointsBadges:
  • Does temporary storage of credit card info meet PCI DSS requirements?

    For our department, we need to make sure that our temporary storage of our user's credit card information meets PCI DSS requirements. We have to make sure that deletion is compliant DoD's security standards. We thought about using MySQL but we're not sure about the reliability. What should we do?

    ITKE363,905 pointsBadges:
  • How to purge database records for PCI compliance

    I have to store some credit card information. To be compliant with PCI DSS, we need to purge the data from our disks by not just deleting the file but writing over the bytes with a random sequence of data (because that would make it harder to recover the data). We would still like to leverage a...

    ITKE363,905 pointsBadges:
  • How to forward incoming mail from Lotus Notes 8.5 mail into DB inbox?

    I have created a main in database in Lotus Notes 8.5 for a group of recipients. How can I forward incoming mails from this mail into DB to each of its member's own email address with sequence?

    Ferzl1525 pointsBadges:
  • Authenticate database for PCI compliance

    We have a PCI compliant website that connects to a database but doesn't store any users' info. However, it does contain HTML / JavaScript snippets that might get rendered into the payment process. Here's my question: Do we have to authenticate the database to remain PCI compliant? Thanks!

    ITKE363,905 pointsBadges:
  • RDBMS and DBMS in Oracle

    What is RDBMS and DBMS in Oracle?

    Gkg5 pointsBadges:
  • Random generate in Access SQL

    If one random generate program on web, can it be hacked by a hacker and get the result?

    eessm13975 pointsBadges:
  • How do I create a database using C language?

    how to create database using c language

    Subject5 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • Converting from RPGLE to DB2/400 SQL

    My shop just announced that it intends to convert from RPGLE on the ISeries 400 platform, to SQL, such that the procedures will be portable to other hardware platforms. What documentation to I need to acquire to train on writing SQL procedures; initially within DB2/400?

    SeaRancher5 pointsBadges:
  • Measure occurrences in MS Access SQL

    I was wondering whether it is possible (and if it is, the way) to perform the following task in Microsoft Access: there are two tables; first one consists of three columns 1) ID 2) tweet text and 3) date. Second table is a single vector of words, like a lexicon. For every row of the first table, I...

    dempar5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following