Today’s featured member, Ken Sloan of Somerset, PA, is a senior programmer and analyst. His specialties include business application database, programming, and design for 5250 and browser. He’s been busy around the site, sharing his knowledge about AS/400, SQL Server 2005 and Crystal Reports. With over 20 years experience in AS/400, iSeries, RPG, SQL and C#, Slateken is a powerhouse on the AS/400 questions. Great job, Ken!
Where does your expertise lie? Search for questions that relate so you can spread your knowledge and build your credibility (and knowledge point balance). Each week we highlight two active members in the community; you could be next! Head over to IT answers, update your profile and upload a photo for better chances of being recognized in the community.
We love hearing from you, so let me know your suggestions in the comments section or email me directly.
This week’s most-watched IT questions will test your knowledge of routers, networking, backups, SQL and Active Directory. See something that matches your expertise? Give it your best shot!
1. T8sta wondered, “How can I configure a connection by PPPoE on a Cisco 2600 router?” And Mattmather came to the rescue with a sample for PPPoE configuration.
2. ETHMAN5 came to the right place to find out how to create an alert email when automatic failover occurs in SQL Server 2005 and 2000; Mr. Denny provided his expertise.
3. Handling123 was wondering if it is possible to add a 2.0 USB port in the blade server or what is the best and fastest way to back up a blade server. He’s provided the additional information needed to answer his question. Help him out?
4. Thanks to Carlosdl for providing some great suggestions for programs to use to receive network alerts for critical conditions.
5. Test12 inquired about publisher and subscriber size mismatch during transactional replication on SQL Server 2005; Mr. Denny assured him it’s normal. Continued »
Today’s featured member, Silvia Hagen is the CEO of Sunny Connection in Switzerland, working as a senior consultant and analyst. She’s been an active part of the networking industry since 1990, specializing in identity management, protocol and network performance analysis and IPv6. Her instinct to help others learn and understand stems back to her beginnings as an instructor; she’s developed courses and seminars for directory services and protocols. She’s authored several books on troubleshooting TCP/IP, IPv6 and service location protocol. Have a question about IPv6? This founding member of the Swiss IPv6 Council will surely have an answer for you.
Where’s your expertise? Search for questions that relate so you can spread your knowledge and build your credibility (and knowledge point balance). Each week we highlight two active members in the community; you could be next! Head over to IT answers, update your profile and upload a photo for better chances of being recognized in the community.
Today’s featured member is a little new to the site, but that hasn’t stopped Shanekearney from providing some great and in-depth answers. He’s a Network Engineer who hails from Ireland. From Windows 7 to IT careers, Shane’s been using his expertise in networking, Microsoft and servers to spread the knowledge. Thanks for all of your hard work, Shane!
Check out his step-by-step instructions on connecting two Windows 7 machines via WiFi.
**Trophy not included. Sorry.
From breaking iPhones out of jail to defending Search Cloud Computing’s credibility to an Android tablet that only costs $150 (!!!), this week’s IT blog top 10 has something for each of your tastebuds. Bon appetit!
1. Security Bytes’s Marcia Savage details the new flaw targeted at the Windows Kernel in New Windows vulnerability reported.
2. Legality is no longer a concern, but iPhone jailbreaking exploit sparks mobile security concerns, another piece from Marcia Savage of Security Bytes.
3. Black Hat 2010: Jim Reavis on first Cloud Security Alliance user certification: The Search Security staff brings us an interview with the cofounder of the Cloud Security Alliance.
4. Storage Soup’s Dave Raffo predicts that CommVault’s Simpana 9 is getting close.
5. Another interview from the Security Wire Weekly and Search Security staff, this time with Greg Hoglund on malware attribution and fingerprinting. Continued »
Check out what your peers around IT Knowledge Exchange have added to their watchlist this week. See something you have insight into? Click and answer! The key to IT Knowledge Exchange is collaboration.
1. Mr. Denny, Aguacer0 and EmNichs helped out in creating a duplicate SQL Server 2005 database.
2. Our dream team – Mr. Denny, Aguacer0 and EmNichs – weighed in again on this one: How do I setup a secondary DNS server on Windows Server 2003?
3. This question from the July 13th Microsoft Live Chat got a lot of attention from IT Knowledge Exchange members: Improvements in Windows Direct Access.
4. EmNichs and Aguacer0 teamed up again to provide help with perl script to add information to an Active Directory user profile.
Today’s featured member is Eric Jewett, or EAJewett, of Oxford, Ohio. He is an IT Manager of Applications at a small hospital who has experience in Lotus Notes and Domino, 3GL/4GL programming, mainframe system administration and programming, and supporting the tools that support programmers. Thanks for being such an active part of the community, Eric!
Check out some of the questions he’s answered in the past week:
- How do I create a rule in Lotus Notes 6.5 to deprioritize emails that I am copied on?
- Can we send a copy of mail to some other mail ID using agents?
1. Jo Maitland with the Troposphere wades deeper into the the story of did-they-or-didn’t-they-break-up between Amazon and Eli Lilly. High drama ensues.
2. You might want to sit down the latest from SearchServerVirtualization Blog’s Colin Steele: Dell, HP to resell Oracle VM. Yes, really.
3. The SearchSecurity team has a great listen for your daily walk, jog or stumble:
Black Hat 2010: Greg Hoglund on malware attribution and fingerprinting.
4. Think you’ve got your security down pat? Check out Jeromie Jackson’s rather worrying video where he shows just how easy your physical security is bypassed: Razor Burns and Identity Theft.
5. Fan of MrDenny? Then take this opportunity to get free training straight from the guru! See his post for details: Time is running out to register for a free full day of Storage and Virtulization training
Thanks to everyone who participated in the Xbox 360 contest. We randomly withdrew 5 names from our top 10 contributors list and came up with the following winners:
Congratulations to the winners! The rest of you, keep asking questions and provide feedback in the 2010 ITKE Member Survey, and you’ll continue to earn points. You never know when they’ll come in handy!
Today’s featured member, TheITProjectBlog, or Raj, has been busy around IT Knowledge Exchange the past couple of weeks, answering your questions on Windows XP, Outlook, Windows 7 in 2010, and switch routing. This jack-of-all-trades doesn’t discriminate when he’s looking to help out, so head over to IT Answers and ask your questions, maybe today’s featured member will be your rescuer! Great job, Raj, keep it up!
You can be a featured member, too! We’re always looking to highlight our quality answerers. Update your profile so we can properly strut your stuff!