• How to connect more than one DASD to IBM mainframe

    how to connect more than one dasd to ibm mainframe?

    Ytyt5 pointsBadges:
  • Domain registration, VPN connections, and port configuration

    1.How should you configure your Domain to be seen by the public without registering your domain name. 2. How do you configure Terminal services client duriing the 120 day  grace period. 3. What ports neet to be open in order to use vpn. 4. How do you configure port forwarding on your router when...

    Jadinc1235 pointsBadges:
  • Oracle 10g database issue

    how to increase the space of mount point dev/sdc1 scsi

    Chiya12335 pointsBadges:
  • Is *JOBCTL needed to view job logs?

    I have read IBM's Security manual and Work Management manual and I know that *JOBCTL is needed to change job priorities and other things for jobs on the system, but I do not see any statements that say *JOBCTL is needed to view the job logs of other user's jobs on the system. Does anyone know if...

    Bkr0963c0 pointsBadges:
  • Transfer Report from AS/400 to PC

    Is there any utilities/tools that can help me to create a program on AS/400 (CL program) to transfer the reports that are created at a certain output queue on AS/400, transfer them automatically to a specific folder at PC side so as to be opened with any application at MS Windows, keeping the...

    Qawasmeh0 pointsBadges:
  • Problems Deleting a file in IFS directory?

    I have look all over the internet and found a couple of useful tips. I tried them all and this file refuses to delete. The file is in /qdls/hdrpprt/ and is named ~$100028.htm This file is definately corrupt. I have tried the following 1-I installed PTF MF34337 with no help 2-RMVLNK...

    Johnluf0 pointsBadges:
  • Opposite of a Wireless Router to act as a switch

    I need the opposite of a Wireless Router. I have a wireless network set up, but My pc workbench is across the room and I how have a cat5 cable running across the floor into a switch that I can then connect to the wired desktops that I am working on.   I would like to have a contraption that would...

    Woeisme5 pointsBadges:
  • How to sort Alternate Array?

    Arr1       s        10 A Dim(4)   Perrcd(2)  Fromfile(abc) Arr2       s         2  0  Dim(4) Alt(arr1) Now , I have load records From file to that array then i want to show these record in reverse Order How i can do this?

    Sms121185 pointsBadges:
  • Pass Ticket with CA-ACF2

    From Cobol in CICS TS 4.1, can you use the VERIFY command to validate a temporary Pass Ticket instead of a permanent ACF2 password? If not, how do you validate a  temporary Pass Ticket?

    VinUnderwood5 pointsBadges:
  • Beginning DB2 programming in mainframes

    how to start db2 programming in mainframes detailed

    Practical5 pointsBadges:
  • OS/400 System Security; Limiting User Capabilities

    We have set up our AS/400 user profiles with Limit Capabilities *NO. However, this does not keep them from being able to enter a command on a command line. How do we accomplish this?

    Mgramly0 pointsBadges:
  • kpi’s on scorecard

    how do i define a kpi that will have subordinate kpi's under it, and the parent kpi will contain the sum value of all of the subordinate kpi's listed under it.

    Ntkjd5 pointsBadges:
  • Migrate XP users to terminal server accessed by thin clients

    How can we migrate all of our users xp data to our new terminal server where they will be working out of? There computers will be replaced with thin terminals. We want their experience to stay the same or improve but we will not settle for less.

    Karl Gechlik9,860 pointsBadges:
  • Adding softphones/voip to a win/mac network

    We want to add soft phones to our network. We currently have windows and macs running on a new HP switch. How can we implement VOIP and Soft phones?

    Karl Gechlik9,860 pointsBadges:
  • Why do Snow Leopard machines bound to Active Directory stop letting the user authenticate after about 24 hours?

    the AD 2003 domain they seem to lock up after several days of up time. At some point the users can no longer log in, use a user name or password to allow a system change. When ad bindings are removed the problem is gone. 

    Karl Gechlik9,860 pointsBadges:
  • What does a dell remote access card do?

    What does a dell remote access card do? Can I safely remove it frrom my power edge server?

    Karl Gechlik9,860 pointsBadges:
  • Virtual Server converted to Physical server; Windows Server 2003 & HP Bladesystem C3000

    Hi, Has anyone done it before? Convert a virtual server to a physical one. The OS is Windows server 2003 on HP blade system C3000. I will like someone that has done it to tell me how to go about it.   Thanks WaleAde

    Dewa5 pointsBadges:
  • range of lan connectivity

    how long can be the range of lan cable connectivty.without traffic or interferrence?

  • IPSEC between Unix servers and Windows XP client

    Is there a way to set up IPSEC between Unix servers and windows xp client separated by firewall in between. Also will it be possible to limit the ports in which a application hosted on unix server talk back to windows client sitting on other side of firewall by using IPSEC

    Tech215 pointsBadges:
  • Access Microsoft Exchange 2003 emails remotely

    I know that this question has been asked a million times before; however none of them seem to fit my problems exactly, so I would be ecstatic to get some help. We are a small business, and as the youngest member of staff, and the one with the most computer knowledge, I have got the job of...

    Nolligb5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following