Reading time 4 Minutes Fast and easy batch processing and conversion of images The goal of Ascomp's new software, it seems to me, is uncomplicated and intuitive processing
Read more
Everything about what there is no category for. Tips and tricks in handling as well as instructions for installation, commissioning and optimization.
Reading time 4 Minutes Fast and easy batch processing and conversion of images The goal of Ascomp's new software, it seems to me, is uncomplicated and intuitive processing
Read moreReading time 2 Minutes What is a reference user? I found a very nice article that is told from practice. We ourselves use tenfold to do a lot
Read moreReading time <1 Minute Dismantle Windows Remote Management Activating WinRM and putting it into operation is very easy. Then the next small configuration follows, followed by the next
Read moreReading time <1 Minute Event logging after each restart It happens more and more often under Windows Server 2019 that the entry in the registry is not removed after a dirty shutdown
Read moreReading time <1 Minute Find Product Key for SSRS Short and sweet without a lot of words. The product key for activating the reporting services can be found in the DefaultSetup.ini. The DefaultSetup.ini
Read moreReading time 4 Minutes Strictly speaking, of course, not a week goes by without some exciting game finding its way into the Google and Apple app stores. Currently there are
Read moreReading time 8 Minutes The topics of "computers of the future" and "artificial intelligence (AI)" are becoming increasingly important. Often the field of AI is already so advanced that
Read moreReading time 3 Minutes The fourth matchday of the UEFA Nations League was tough. The 20 games had a lot to offer the audience. Evictions, penalties
Read moreReading time 4 Minutes Nowadays, many people keep wondering what the term “smart home” is all about. In fact, the term appears frequently. In
Read moreReading time 3 Minutes Limiting or fixing working memory As with a Microsoft SQL server or a database / instance, the entire available memory (RAM) is used when required. The
Read moreReading time <1 Minute Who is the real sender? Caution should be exercised when dealing with suspicious e-mails. If an e-mail does not seem serious and straight to the inbox
Read moreReading time 4 Minutes Data recovery with Stellar Data Recovery 9 Professional In the past I have already been able to test and use a number of products in practice. Let's see
Read more