People are capable of all kinds of good thinking, but some just don't see what's right in front of their noses.
Home
 

IT

NX or XD compatibility with Windows 8

You would need to enable NX or XD in order to make your machine compatible with Windows 8 Windows 8 has a dependency on the NX bit of the CPU and we are unable to install the Windows 8 RP unless it is enabled. NX stands for No eXecute and is a technology used in …Continue reading

Data Center

A Data Center is the primary container of inventory objects such as hosts and virtual machines. (from VMware’s perspective) From the datacenter, you can add and organize inventory objects. Typically, you can add hosts, folders and clusters to a datacenter vCenter Server can contain multiple datacenters. Large companies might use multiple datacenters to represent organizational …Continue reading

Information Rights Management

To download, see Microsoft KB 979099 In Exchange 2010, IRM protection can be applied to messages using the following methods: Manually by Outlook users   Your Outlook users can IRM-protect messages with the AD RMS rights policy templates available to them. This process uses the IRM functionality in Outlook, and not Exchange. However, you can use …Continue reading

Router Passwords

  http://www.routerpasswords.com/ This website is very useful to provide information for about default passwords used on routers, default web logins, CCTV systems and other electronic devices

SQL Server 2005 Backward Compatibility

This feature is installed automatically by the Microsoft SQL Server install for most editions of SQL Server, but is not included in the 32-bit install for SQL Server 2008 and above, so therefore only the x86 download is given. Automated installation of SQL Server 2005 Backward Compatibility is performed by Process Id 4IE and is …Continue reading

Essential skills on T-SQL Programming

> Create Database Objects – CREATE/ALTER/DROP TABLE/COLUMN – Data Types (XML, DATETIME, SPATIAL, VARCHAR) – Constraints (Primary Key, Foreign Key, Unique, Check, Default) – Calculated Column – Views – Indexed Views (SCHEMABINDING, COUNT_BIG(*), CLUSTERED INDEX) – Stored Procedures, [link]. – DML Triggers (INSERTED, UPDATED, UPDATE function) vs CHECK Constraint – TRIGGER for VIEWS (INSTEAD OF) …Continue reading

UDF | User Defined Functions – Scalar, ITV, MTV

UDF or User Defined Functions are a set or batch of code where one can apply any SQL logic and return a single scalar value or a record set. According to MS BOL UDFs are the subroutines made up of one or more Transact-SQL statements that can be used to encapsulate code for reuse. These …Continue reading

Move DB files to new location

In my opinion, we should  perform database migration/movement programmatically in order to achieve an automated task, freeing up human resources from tedious tasks. SQL Server 1) ALTER DATABASE <dbname> SET SINGLE_USER WITH ROLLBACK IMMEDIATE; 2) ALTER DATABASE <dbname> SET OFFLINE; 3) ALTER DATABASE <dbname> MODIFY FILE 4) ( 5)    Name = <dbname>_Data, 6)    Filename …Continue reading

Control calls with Asterisk

Asterisk is often described as a PBX in software – that is, a system for routing and connecting calls in a building or office. Asterisk’s developer prefer to describe it as ‘communication server’ since it’s the engine that powers a whole range of communication application including automated menus, call centres, conference bridges and voicemail servers. …Continue reading

Ubuntu 11.04

Buntu in Bahasa means “a dead-end”, however Ubuntu is changing from time to time without any foreseeable ending. For years, Ubuntu has used a generally vanilla Gnome setup as its default desktop environment, but now the world’s most popular Linux distribution is doing something radical. Gone is the trusty old Gnome, and in is the …Continue reading

1 4 5 6 7
Top