Featured Article

Diagnosing and repairing Events 1030 and 1058
by ChiefIT
10 comments
Well, events 1030 and 1058 are very generic errors and can be caused by one of many different reasons. I often see questions at Experts Exchange on how to overcome these events. I don't have all the answers, but have helped out a lot of people diagnose and fix these events.

Get Access

Access our full library of articles written by our technology community. Read how-to guides, new perspectives on trending tech, and exclusive insights on industry news.

Articles For You

  • F248 Service Code Errors - Kyocera Printers
    Generally, an F248 error code will be caused by incorrect drivers on a Windows computer. Ensuring you have correct drivers installed and are not using Microsoft IPP Class Drivers and are not using a WSD port, are the most common solutions. This can also apply to non-Windows clients.
  • "Dirtied Form" in VB.NET
    by Sonny G
    3 comments
    MisAccess has a form property to determine if any controls on a form are changed. This property is called “Dirty”. Use of the Dirty property in MsAccess determines whether the current record has been modified since it was last saved. Read/write Boolean. I was unable to find a property in VB.NET
  • Part 6 - Build an immutable backup repository for Veeam Backup & Replication.
    For Veeam Backup & Replication, this guide will show you, step by step, how to create and implement a disk-based immutable backup repository from scratch.. In this part: Backup of the Linux server itself.
  • How the CISO Can Build Support from Senior Management
    1 comment
    Importance of appropriate Senior Management support for Cybersecurity and what is required to elicit the desired support. Article initially published by ISACA at below ink: https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2021/how-the-ciso-can-build-support-from-senior-management
  • Blank Page Screen In OWA/EAC Exchange 2013/2016/2019 Server
    by M A
    1 comment
    This article will help you fix blank screen when you try to login to EAC or OWA.
  • Data Center Security Solutions – Is Your DC Safe From Attacks?
    It is impossible to stop security attacks on data centers. But, we can protect crucial information by opting for resilient data center security solutions. This guide is all about the different types of data center security measures a company can use to secure people's data.
  • Enable or disable Outlook Anywhere (RPC-HTTP/MAPI-HTTP) in Exchange Server.
    by M A
    4 comments
    This article will help to do the below tasks. 1. Disable Outlook Anywhere for single mailbox. 2. Disable Outlook Anywhere for all mailboxes in the organization. 3. Enable Outlook Anywhere for single mailbox. 4. Enable Outlook Anywhere for all mailboxes in the organization.
  • Converting BYTES to CHAR on Oracle database
    In this article, I will be sharing the issues that we faced while converting the data type and NLS semantic to CHAR from BYTES. This was one of the business use cases where we needed to convert the entire columns throughout the schema from BYTES to CHAR types only for VARCHAR2 columns datatypes.

Newest Articles

Featured Author

Azure Solutions Architect

Popular Articles

Join a collaborative community of technology professionals.