Updated March 8, 2011: Permission is no longer necessary to approve answers. If you run into problems approving answers to questions you have asked, please contact us directly.
Updated July 15, 2010 5:11 PM: Permissions to approve answers must be granted.
Each day, our forums are chock full of new questions. Thanks to each of you, these questions don’t go floating off into the oblivion of the Internet, but rather they get answered, discussed and solved. But much like history, IT-related problems tend to repeat themselves and old questions can continue to help stumped IT pros long after the original inquirer has moved on.
One way to maximize the saving powers of older questions is to approve the answer that worked for you. It’s always great when multiple members get in on a discussion, offering ideas and methods, but this can cause confusion in future readings of the thread. If you’ve asked a question and you’ve received a suggestion that worked for you, approve the answer by clicking the gray check mark next to it! Not only will you pass along community love, you’ll give us a heads up to approve the answer for future users. Plus you get Knowledge Points if your answer is approved! (Knowledge Points can get you all kinds of goodies: Amazon Gift Cards, contest prizes, or good old-fashioned street cred.) Approved answers show up in the Answers Wiki with a big green check mark next to it and, in case that isn’t prominent enough, a large Approved Answer stamp.
If you have any suggestions or questions, send them over! Reach me via email at Melanie@ITKnowledgeExchange.com, in the comments section or by submitting a question in the forum. Happy answering (and approving)!
To compete in the new economy, organizations need to provide efficient and secure access to their internal applications and data for external entities, such as business partners, customers, and mobile employees.
Join Microsoft’s Senior Technical Product Manager, Brjann Brekkan, on July 20 from 11am-2pm ET for Microsoft Business Ready Security – Identity Access Management. He will discuss managing these redundant identities to avoid infrastructure complexities, inefficiencies, and increased security risks.
Get a reminder email.
This is the current—and hastily organized—state of Michael’s desk. Help him out? If you want some sweet IT books, head over to IT Answers and get to answering. See a question tagged Windows 7 in 2010 and know the answer? Give it your best shot then send me an email at Melanie@ITKnowledgeExchange.com or send us a message @ITKE with the link to the question, and you’ll get to take your pick of Michael’s deskmates. We’re giving five away, so get started!
Some titles to get you excited:
A Practical Guide to Fedora and RedHat Enterprise Linux 5th ed. (Full Fedora on DVD)
A Practical Guide to Linux Commands, Editors and Shell Programming 2nd ed.
Securing the Borderless Network: Security for the Web 2.0 World
Cisco Unified Computing (UCS)
CCIE Professional Development: Deploying and Troubleshooting Cisco Wireless LAN Controllers
Cloud Computing: Web-based Applications That Change the Way You Work and Collaborate Online
VMware VI and vSphere SDK: Managing the VMware Infrastructure and vSphere
Jhamn, or Julie Ann, is a Notes Specialist with expertise in server administration. She’s been with us at IT Knowledge Exchange for almost two years now, dedicating her past couple months answering questions on Lotus Notes. She’s also spurred some great discussions, like this one on user permissions in Lotus Notes. Thanks for being an active part of the community, Julie Ann!
Want to join the ranks of our featured members? Get involved by asking and answering questions over at IT Answers. You’ll earn Knowledge Points that count toward our latest contest; we’re giving away $50 Amazon Gift Cards and two Xbox 360 Slims. Upload a photo and update your profile so we can properly strut your stuff!
Mr. Denny was all over this week’s most-watched IT questions, giving great answers and suggestions all around. Have your own bit of knowledge on SQL Server? Head over to one of these questions and help him out!
1. Davewaltonuk was looking for SQL Server 2008 code to find fields containing similar text, and Mr. Denny gave it his best shot.
2. Mr. Denny quenched Mike800’s curiosity about linking users of Access 2003 to a SQL Server 2008 database.
3. Swales101 needed some help changing over to DR database from SQL 2005, and Mr. Denny (of SQL Server with Mr. Denny) was all over it.
4. If you need help creating Oracle triggers like RizwanSharief did, Meandyou provided an answer that’s been approved.
5. KulkarniMandar asked his first question: How can I write a SQL query to get the database name? Mr. Denny and Meandyou helped him out. Welcome to the community, Mandar! Continued »
This week’s member highlight goes to Pkpatel1151, who was busy this week answering your questions on Cisco, WAN and VPN. No wonder, since he’s got experience in Cisco networking, WAN, LAN, WLAN, and VPN. Paresh from Illinois is a jack-of-all-trades! Thanks for joining us, Pkpatel1151; we’re glad to have you!
Some related questions:
Want some pointers on becoming a featured member? Ask and answer some great questions at IT Answers. You’ll earn Knowledge Points that count toward our latest contest; we’re giving away $50 Amazon Gift Cards and two Xbox 360 Slims. Upload a photo and update your profile so we can properly strut your stuff!
This week’s top 10 blog posts have received the official seal of awesomeness by none other than you, the readers. Did your favorite blog post from this week not make it onto the list? Share it with everyone by highlighting it in the comments section. Meanwhile, check out what everyone else has been reading this past week:
1. Time for another MSDN Ultimate Giveaway! from SQL Server with Mr. Denny.
2. RHEL 6 Beta 2 released from the Enterprise Linux Log by Leah Rosin.
3. 2010 Magic Quadrant for Enterprise LAN: Few changes for a rapidly evolving industry from The Network Hub by Shamus McGillicuddy.
4. Coraid pulls Z-Series NAS after NetApp threatens lawsuit from Storage Soup by Dave Raffo.
Join IT Knowledge Exchange and Microsoft for these Upcoming Live Expert Chats
Today’s workforce faces a constantly evolving landscape of threats to information and infrastructure—and even to regulatory compliance. Endpoints are exposed to attacks both inside and outside the corporate firewall, resulting in lost productivity and real financial losses at businesses worldwide.
Microsoft Business Ready Security – Secure Endpoint
Join us on July 13th from 11:00am-2:00pm EDT for Microsoft Forefront – Are Your Endpoints Secured? to learn how Microsoft Forefront solutions protect client and server operating systems from emerging threats and information loss, while enabling more secure access from virtually anywhere. Click here for a reminder email for this expert live chat.
Microsoft Business Ready Security – Identity and Access Management
Join us on July 20th from 11:00am-2:00pm EDT for Identity Access Management: Is your IT Infrastructure Secure? During this live chat you’ll learn about Microsoft’s solution to enable more secure, identity-based access to applications, both on-premises and in the cloud. Click here for a reminder email for this expert live chat.
We hope to have you there!
Dave mc, or David Mcilraith, is an Operations Manager who hails from Melbourne, Australia. He has thirty years under his belt in Engineering and Facilities Management. From operational and strategic management of critical and commercial facilities, Dave carried out his responsibilities for large national portfolios and data centers.
He’s been spreading his knowledge around the community the past couple weeks, answering questions from effective data center power usage to data center cooling. Thanks for being such a big part of the community, Dave!
Some related questions:
What does it take to be a featured member? Ask and answer some great questions around the Exchange. Earn Knowledge Points that count toward our latest contest; we’re giving away $50 Amazon Gift Cards and two Xbox 360 Slims. Upload a photo and update your profile so we can properly strut your stuff!
There’s not much we love more than to hear from you, so let me know your suggestions in the comments section or email me directly.
This week’s most-watched IT questions come with a couple bounties, so get to answering some of our unanswered questions. Thanks to everyone asking great questions, keeping an eye on them and answering them! Keep up the great work and you could be nursing that new summer sunburn indoors with an Xbox 360 Slim.
1. Eabouzeid was having a bulk insert problem in SQL Server Management Studio 2005 and Mr. Denny helped him figure out the problem.
2. For Storage in 2010 last month, we were wondering if anyone used StarWind iSCSI for production network and what they had to say about its reliability and performance. Mr. Denny and Aguacer0 chimed in; how about you?
3. Azdavid99 was wondering how to create a network between five local locations. Mr. Denny came to the rescue with an answer and 9948 also discussed the question.
4. Bulldog98 asked a great question for last month’s Storage in 2010 about improving the performance of multiple databases & LUNs in SQL Server 2005. Back up Mr. Denny and see if you have anything to add to the discussion.
5. Jimg spurred a great discussion with this one: Considering MS Exchange 2010 but I’m getting mixed advice from Microsoft Exchange Online help and my MS reseller. Join Technochic, Mr. Denny and ITKE in giving Jimg some advice. Continued »