We’ve been welcoming new members to IT Knowledge Exchange by the day, so we figured maybe it was time to update some great pointers on how to get the most out of your community. One thing that new members may run into without knowing why is the mysterious missing question. To avoid getting the reputation of being a black hole, we thought we’d clear up the specific reasons this happens to keep it from happening to you or your loved ones.
To better understand why your question suddenly fell off the edge of our forums, I’ll lay out our process:
ITJoe encounters baffling IT situation.
ITJoe posts his situation on IT Answers.
Your community moderators wade through the questions, including ITJoe’s.
We look through each question that comes into the community; we correct spelling, ask for clarification when needed (for ease of answering), or assign appropriate tags (for ease of search). We also delete questions. But, why? You might ask. The answer’s pretty simple; we delete any question that falls into one of the following categories:
- Homework or exam questions
- Sales pitches
- Basic questions that can easily be answered in a search engine: “What is cloud computing?”, “What does VPN stand for?”
- Consumer questions: “How do I change the ringtones on my BlackBerry?”
- Job postings
- Questions that are not enterprise IT-specific: “How do I format my spreadsheets?”
We do this in your interest, to minimize questions that don’t apply to you, whether it’s in your email topic updates, RSS or your Watchlist, we want to make sure that you’re only receiving what you signed up for. We wade through the junk questions to deliver you the most relevant content.
This is our main objective, anyway, and like it takes a village to raise a child, to run a community you need the help of the community members. See something you don’t think belongs here? Let us know! Flag a question, post a discussion or email me directly. We’ve had some great discussions posted by some of our most active members, so check them out for some great tips on asking and tagging questions, answering questions and general uses of IT Knowledge Exchange.
Want another venue to share your feedback? Here’s your chance: Fill out the 2010 IT Knowledge Exchange member survey and let us know what we’re doing right and where we can improve. (Aside from being an integral part in your community, you’ll get 250 Knowledge Points that can get you ahead in our latest contest.)
Thanks again for being a part of this community and working with us to make it as helpful as possible!
This week’s top 10 IT blog posts are indeed awesome; Carl Brooks clears up the confusion around how confusing cloud computing is (and isn’t), Dave Raffo outlines the details of Coraid’s alleged patent infringement, and Laura Smith explains the Heaven-sent security solution straight from Back to the Future. And that’s only three of them, check them out for yourself!
1. VMware adopts per-VM licensing, pricing from the Search Server Virtualization blog by Colin Steele.
2. Coraid pulls Z-Series NAS after NetApp threatens lawsuit from Storage Soup by Dave Raffo.
3. SQL injection flaw leaves door wide-open to valuable user information on a popular file sharing site from Software Quality Insights by Dan Mondello.
4. 2010 Magic Quadrant for Enterprise LAN: Few changes for a rapidly evolving industry from The Network Hub by Shamus McGillicuddy.
5. So what’s up with this storage array that doesn’t use any sort of RAID? from SQL Server with Mr. Denny by Mr. Denny.
6. RHEL 6 Beta 2 released from the Enterprise Linux Log by Leah Rosin.
7. Biometric fingerprints find new, mobile audience from Total CIO by Laura Smith.
8. Cloud confusion? Does not compute from The Troposphere by Carl Brooks.
9. vSphere vs. Azure: The real battle from the Search Server Virtualization blog by Colin Steele.
10. Oracle to face challenges in pushing customers to its complete stack from Eye on Oracle by Mark Fontecchio.
Is your favorite blog post not on this list? Share it with us and others via email or in the comments section!
Derek Catanzaro is a senior network administrator for a company based in Lake Forest, Illinois. His over fifteen years of IT experience—in networking, Lotus Notes/Domino, BlackBerry Enterprise Server, and VPN solutions—have turned him into a busy bee around IT Knowledge Exchange. He’s been the go-to guy for Lotus Notes for the past couple months, and we really appreciate it! Thanks again, Derek.
Join the ranks of our featured members by getting involved: ask and answer questions over at IT Answers. You’ll earn Knowledge Points that count toward our latest contest; we’re giving away three $50 Amazon Gift Cards and two Xbox 360 Slims. Upload a photo and update your profile so we can properly strut your stuff!
Updated March 8, 2011: Permission is no longer necessary to approve answers. If you run into problems approving answers to questions you have asked, please contact us directly.
Updated July 15, 2010 5:11 PM: Permissions to approve answers must be granted.
Each day, our forums are chock full of new questions. Thanks to each of you, these questions don’t go floating off into the oblivion of the Internet, but rather they get answered, discussed and solved. But much like history, IT-related problems tend to repeat themselves and old questions can continue to help stumped IT pros long after the original inquirer has moved on.
One way to maximize the saving powers of older questions is to approve the answer that worked for you. It’s always great when multiple members get in on a discussion, offering ideas and methods, but this can cause confusion in future readings of the thread. If you’ve asked a question and you’ve received a suggestion that worked for you, approve the answer by clicking the gray check mark next to it! Not only will you pass along community love, you’ll give us a heads up to approve the answer for future users. Plus you get Knowledge Points if your answer is approved! (Knowledge Points can get you all kinds of goodies: Amazon Gift Cards, contest prizes, or good old-fashioned street cred.) Approved answers show up in the Answers Wiki with a big green check mark next to it and, in case that isn’t prominent enough, a large Approved Answer stamp.
If you have any suggestions or questions, send them over! Reach me via email at Melanie@ITKnowledgeExchange.com, in the comments section or by submitting a question in the forum. Happy answering (and approving)!
To compete in the new economy, organizations need to provide efficient and secure access to their internal applications and data for external entities, such as business partners, customers, and mobile employees.
Join Microsoft’s Senior Technical Product Manager, Brjann Brekkan, on July 20 from 11am-2pm ET for Microsoft Business Ready Security – Identity Access Management. He will discuss managing these redundant identities to avoid infrastructure complexities, inefficiencies, and increased security risks.
Get a reminder email.
This is the current—and hastily organized—state of Michael’s desk. Help him out? If you want some sweet IT books, head over to IT Answers and get to answering. See a question tagged Windows 7 in 2010 and know the answer? Give it your best shot then send me an email at Melanie@ITKnowledgeExchange.com or send us a message @ITKE with the link to the question, and you’ll get to take your pick of Michael’s deskmates. We’re giving five away, so get started!
Some titles to get you excited:
A Practical Guide to Fedora and RedHat Enterprise Linux 5th ed. (Full Fedora on DVD)
A Practical Guide to Linux Commands, Editors and Shell Programming 2nd ed.
Securing the Borderless Network: Security for the Web 2.0 World
Cisco Unified Computing (UCS)
CCIE Professional Development: Deploying and Troubleshooting Cisco Wireless LAN Controllers
Cloud Computing: Web-based Applications That Change the Way You Work and Collaborate Online
VMware VI and vSphere SDK: Managing the VMware Infrastructure and vSphere
Jhamn, or Julie Ann, is a Notes Specialist with expertise in server administration. She’s been with us at IT Knowledge Exchange for almost two years now, dedicating her past couple months answering questions on Lotus Notes. She’s also spurred some great discussions, like this one on user permissions in Lotus Notes. Thanks for being an active part of the community, Julie Ann!
Want to join the ranks of our featured members? Get involved by asking and answering questions over at IT Answers. You’ll earn Knowledge Points that count toward our latest contest; we’re giving away $50 Amazon Gift Cards and two Xbox 360 Slims. Upload a photo and update your profile so we can properly strut your stuff!
Mr. Denny was all over this week’s most-watched IT questions, giving great answers and suggestions all around. Have your own bit of knowledge on SQL Server? Head over to one of these questions and help him out!
1. Davewaltonuk was looking for SQL Server 2008 code to find fields containing similar text, and Mr. Denny gave it his best shot.
2. Mr. Denny quenched Mike800’s curiosity about linking users of Access 2003 to a SQL Server 2008 database.
3. Swales101 needed some help changing over to DR database from SQL 2005, and Mr. Denny (of SQL Server with Mr. Denny) was all over it.
4. If you need help creating Oracle triggers like RizwanSharief did, Meandyou provided an answer that’s been approved.
5. KulkarniMandar asked his first question: How can I write a SQL query to get the database name? Mr. Denny and Meandyou helped him out. Welcome to the community, Mandar! Continued »
This week’s member highlight goes to Pkpatel1151, who was busy this week answering your questions on Cisco, WAN and VPN. No wonder, since he’s got experience in Cisco networking, WAN, LAN, WLAN, and VPN. Paresh from Illinois is a jack-of-all-trades! Thanks for joining us, Pkpatel1151; we’re glad to have you!
Some related questions:
Want some pointers on becoming a featured member? Ask and answer some great questions at IT Answers. You’ll earn Knowledge Points that count toward our latest contest; we’re giving away $50 Amazon Gift Cards and two Xbox 360 Slims. Upload a photo and update your profile so we can properly strut your stuff!
This week’s top 10 blog posts have received the official seal of awesomeness by none other than you, the readers. Did your favorite blog post from this week not make it onto the list? Share it with everyone by highlighting it in the comments section. Meanwhile, check out what everyone else has been reading this past week:
1. Time for another MSDN Ultimate Giveaway! from SQL Server with Mr. Denny.
2. RHEL 6 Beta 2 released from the Enterprise Linux Log by Leah Rosin.
3. 2010 Magic Quadrant for Enterprise LAN: Few changes for a rapidly evolving industry from The Network Hub by Shamus McGillicuddy.
4. Coraid pulls Z-Series NAS after NetApp threatens lawsuit from Storage Soup by Dave Raffo.