Search Results | Personal computing
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...128 NEXT
Sort by:  Most Relevant  |  Date
Altair inventor Roberts dies at 68

Blog  Noting here that Ed Roberts, inventor of Altair personal computer, died at 68. There is no one person that can claim the invention of the personal computer. But the Altair inspired many others. Roberts is far less known than Bill Gates and Steve Jobs both paid tribute at the time of his passing....

Last updated: Apr 2, 2010   5:20 PM GMT  |  Blog: Microservices Matters
Cabling Anomoly

Answer  Consider the following scenario: Each office has two Cat5e ports (A & B)and there is an 'A' Patch panel and a 'B' patch panel. When PersonA is plugged into port 1A and PersonB is plugged into port 28A they can see each others computer screen. If PersonA is online working and PersonB comes in to l...

Last updated: Mar 20, 2008   6:44 PM GMT   |    Cabling, Networking
IBM's cloud computing position: Make the PC obsolete?

Blog  IBM is using its clout with universities to pull the computer science curriculum n a more cloudy direction, to build awareness of and skills in cloud computing. According to our sources, IBMs radical shift is based on simple economics. IBM believes that as network bandwidth costs fall, what...

Last updated: Mar 2, 2009   3:58 PM GMT  |  Blog: Uncommon Wisdom

Answer  I used online/DISM as Mr. Ed Tittled recommended on my personal computing system and I receive a negative loading message proclaiming: ACCESS IS DENIED. How do I reverse this process from my command operator stream? I feel the hardware/software is for my personal use. Why should I have access den...

Last updated: Jul 11, 2013   8:10 PM GMT   |    DISM, Microsoft Windows
Logon to network only works after a cold boot.

Answer  I'm wondering what would cause a person's network logon to fail consistently after a reboot but succeed after a cold boot. This person's computer locks up frequently, and it apparently is due to a hardware problem. The computer will be replaced, so my question is not about the lockup. However, wh...

Last updated: Feb 6, 2007   12:53 AM GMT   |    DataCenter, Interoperability, Management
Oracle 6i Reports Builder

Answer  Hi, I am using Oracle Reports 6i to run a report. When running the report from my computer it runs perfectly. But on another persons computer it cuts off some of the letters of the same report which takes the values from the database. In the previewer the report looks fine but when it prints it ...

Last updated: Nov 17, 2008   4:03 PM GMT   |    Oracle 6i, Oracle Reports, Oracle Reports 6i
Trojan/Spyware on iPhone 5c

Answer  Can a hacker install a Trojan/spyware virus onto an iPhone 5c if you use it as a personal hotspot for a windows computer, if you visit a bad website and your compute gets the virus will my iPhone 5c also get it as it is the personal hotspot? I'm only talking about Trojans and spyware as I have suspi...

Last updated: Mar 24, 2016   1:15 PM GMT   |    iPhone, Spyware, Trojans
My computer hacked by someone in Afghanistan?

Answer  An AOL person says that my personal computer has been hacked by someone in Afghanistan; how can he tell?

Last updated: Feb 6, 2013   8:34 PM GMT   |    Hacking, Security
PCI Compliance for hosted merchant systems

Answer  We contract with an outside merchant who hosts a software system that is accessable through a secure login on select, internal personal computers. We contract as agents of that merchant to operate their system as a point of sale for services. Payment for those services can be by credit card and CC n...

Last updated: Feb 8, 2012   4:47 PM GMT   |    Dell Latitude, PCI, SABRE Travel Booking System
Operating system in a mainframe and personal computer

Answer  What are the differences between operating systems that are used in a mainframe computer and personal computer?

Last updated: Apr 22, 2015   8:45 AM GMT   |    Mainframe, Operating systems
copy contacts from laptop to Web Access Email

Answer  My contacts are all current and accounted for in both my personal laptop and my work laptop. They are not found when I log on to Microsoft Outlook Web Access meaning when Im on my personal laptop and instead of opening 2 different computers, I access my work email thru the web. (my work...

Last updated: May 14, 2008   9:44 PM GMT   |    Contact management, Microsoft Outlook, Microsoft Outlook contacts
Change log files on MacBook?

Answer  I am a writer. I am trying to figure out the best scenario for adding something to someone's computer. If a person had physical access could they change the log files over a long period of time (2 or 3 years) to add files or emails to a computer with correct past timestamps)? Could this be done usin...

Last updated: Nov 23, 2015   2:27 PM GMT   |    Log files, MacBook
Recover information on Microsoft Outlook 2016

Answer  I have moved all my .pst files from my old computer to my new computer. The old computer was using Outlook 2010 and the new computer is using the version from Office 365. Both computers are running Windows 10. I don't see my personal folders, calendar, or address book information on the new comput...

Last updated: Dec 27, 2016   9:11 PM GMT   |    Microsoft Outlook 2016
personal storage disabled?

Answer  I get this message,"Pst (Personal storage) usage is disabled on this computer" when I try to import my personal files from Office 2003. Previously an Exchange program had been installed - I'm trying to disable it.

Last updated: Jan 21, 2012   11:56 PM GMT   |    .pst, Exchange server software, Import
security problem

Answer  Hello, I have small workgroup having 10 computers in my office. I do some personal work in office like using yahoo messenger, checking personal e-mails and some online banking site. But how does one of my senior knows it? I do everything lonely and securely so that nobody in the office knows it. Bu...

Last updated: Oct 31, 2006   3:44 AM GMT   |    Access control, Application security, backdoors
Compound subjects and possessives

Blog   Which is correct? Either ______ or Ellen's computer needs more RAM for virtual memory to function properly. a. Frank b. Frank's Answer: b Explanation: If the sentence reads "Either Frank or Ellen's computer needs more RAM" that means either Frank (the person) needs more RAM or Ellen's com...

Last updated: May 7, 2009   12:48 AM GMT  |  Blog: Writing for Business
PCI compliance 1.4(b) on personal firewalls

Answer  Requirement 1.4(b) asks if personal firewall software is not alterable by employee-owned computer users. If we allow employees to alter their personal firewall software settings, what other compensating controls could we implement in order to meet satisfy the objective of this requirement?

Last updated: Apr 6, 2011   6:00 PM GMT   |    Firewalls, PCI, PCI compliance
Are Patient Portals mandatory in Texas?

Answer  My hospital has a patient portal but has never worked. I'm not an IT person, far from it - a patient only. The site I try to reach is through - but has never worked. Each time I try to log on - I get a logo at top of page which reads :Download Microsoft Moon Light...

Last updated: Apr 9, 2017   6:13 PM GMT   |    Healthcare, Healthcare IT
Should I install Firesheep on others' computer?

Answer  Should I install Firesheep on another person's computer??

Last updated: Mar 25, 2014   7:55 PM GMT   |    Browser security, Firesheep
How likely is it that my computer was tampered with?

Answer  With the type of work I'm in I often find myself working with the disadvantaged and homeless and late yesterday a situation arose whereby two young men needed assistance with their internet banking and circumstances dictated we use my personal computer as opposed to an office one. I watched all of t...

Last updated: Jan 4, 2016   2:42 AM GMT   |    Hacking, Security
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...128 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: