Is there a way to keep your data secure with cloud computing?
Data security within cloud computing.
View ArticleCan someone please explain Dynamic Data Center to me?
Explination on Dynamic Data Center.
View ArticleDoes Hyper-V/DPM offer Continuous Data Protection?
Continuous Data Protection in Hyper-V/DPM.
View ArticleIs there any way to restore the deleted contents in SQL SERVER?
I deleted contents of a table accidentally; I am not able to recover the deleted content now. Unfortunately there is no backup file for this table. I have made a copy of the .mdf file but again the SQL...
View ArticleCan I move disk from one storage system to the other?
Presently we have two storage network which is not supported & not being used for production. But still we are using these two storage networks for testing purpose. The issue is one system is fully...
View ArticleI am getting RAID error after rebuild.
I rebuilt the Raid on my Windows 2003 server; this had to be done because my Raid was broken. I used the Array configuration tool for the rebuild & this worked fine. However after the successful...
View ArticleData need to be retrieved from a remote system.
I need to transfer some data from a remote system to my AS400 system. I need a automatic process to do this job & no manual intervention is needed. We are not supposed to use the ftp option also....
View ArticleCriteria for moving to cloud computing.
We are planning to move to cloud computing, I would like to know if there is any criteria to move to cloud computing. I would like to know how critical data is handled in cloud computing. Is there any...
View ArticleCan notes be retrieved from overwritten archived folder?
I am using Lotus Notes 8 on my system. I do an archive of my data at the end of every day. Unfortunately I created a folder name which already existed, the archiving process has moved the new data...
View ArticleData Re-arrangement Effects.
I am planning to re-arrange the data on my dataset, can anybody let me know, what the effects of re arranging data are.
View ArticleAPI for entry specific data in security audit events.
I have entry specific data fields in my security audit events. I am facing difficulties extracting this information. This is because there is lot of information in this field & the size of this...
View ArticleWhat are your favorite interactive analysis tool?
There are many software that can do interactive analysis. The common used ones include: Excel: [Microsoft Excel - Spreadsheet - Office.com][1] R language: [The R Project for Statistical Computing][2]...
View ArticleIs there a way to know if your hard drive has been copied?
I want to know if my portable hard drive has been copied without me knowing about it. Is there a way to detect an unauthorized copy?
View Article
More Pages to Explore .....