Recent posts

I am planning to buy a new printer for my home office.Is it advisable to have a continuous ink system with your printer? How is the life span of printers with continuous ink system compared to regular printers that does not have it? Which is more advisable for home...



Read more

Anyone agree with me that Windows XP is the best OS for gaming? For me, yes, because for many years as an avid gamer I only use Windows XP for this is lighter compare to other OS and also it is user-friendly to the user. So, it is convenient...



Read more

I wanted to place the other 40GB hard disk into my system. After installation when I opened the system and booted it using Partition magic 8.0 the problem struck in which stated, "Cylinder range inconsistent in the hard drive. Do you want Partition Magic to fix it".

By putting my...



Read more

I am planning to install vcenter server 4.1 so i want to know the minimum requirements for installing it .



Read more

I have some questions to be followed in cloud computing can any expert explain about the total lock down feature and active directory service in ESX



Read more

What are the new features added in application services and infrastructure servuces in VMware vsphere 4.1



Read more

I want to increase my RAM memory. I have RAMs of two different categories. One is an SDR and the other is a DDR SDRAM. Can I use both on the motherboard of DELL GX280 chip type:INTEL(R)82915G/GV/910GL Express Chipset Family. Or I have to buy the other one of...



Read more

How to configure ESX Server on IBM blade server using SAN devices?



Read more

I am working as a professional transactionist. I am using a laptop with an operating system of Windows 7 Starter. I was encoding documents and was about to send the files but suddenly I encountered an error code showing "999 Unable to process request at this time --- error 999". What...



Read more

Discuss and explain the various threats an enterprise system faces. Choose a system and state whether it is host-based, client-based, server-based, Web-based, mainframe-based, or uses another system technology. Explain the types of malicious attacks that your chosen system might face, and any known vulnerabilities that allow for these threats...



Read more