Remember
Register
1
new
Chill
new
Puzzles
new
GK
new
Sports
new
Business
Home
Questions
MCQs
Unanswered
Tags
Users
Ask a Question
Write Article
Articles
Connect to us
Most popular tags
lte
interview questions
ue
java
c
enodeb
5g
informatica
sql
linux
php
freshers
oracle
c++
python
data structures
mac
android
asp.net
nr
Recent questions
Recent
Hot!
Most votes
Most answers
Most views
+3
votes
1
answer
What is the difference between sub & correlated subquery?
posted
Apr 18, 2014
by
Merry
sql server
+1
vote
0
answers
HREFs in user controls
posted
Apr 18, 2014
by
Khusboo
asp.net
vb.net
.net
+1
vote
1
answer
Where is Service Pack 1 for Windows 7?
posted
Apr 18, 2014
by
Sanketi Garg
windows
windows7
+4
votes
0
answers
What is Regex.Replace()? How and when is it used?
posted
Apr 18, 2014
by
Merry
vb.net
+4
votes
1
answer
Sorting a list of strings without using any built-in sort method
posted
Apr 18, 2014
by
Muskan
data structures
c
java
c++
.net
+3
votes
0
answers
Error - SqlDateTime overflow. Must be between 1/1/1753 12:00:00 AM and 12/31/9999 11:59:59 PM
posted
Apr 18, 2014
by
Merry
sql server
asp.net
vb.net
+2
votes
0
answers
How do I assign a cursor or table data type?
posted
Apr 18, 2014
by
Muskan
sql server
asp.net
+4
votes
0
answers
How to construct BFS-suitable data structure for adjacency list?
posted
Apr 18, 2014
by
Merry
c#
c
data structures
0
votes
1
answer
convert NCHAR data type to INT
posted
Apr 18, 2014
by
Khusboo
sql server
sql
+3
votes
1
answer
What are the Dynamic management views in sql server?
posted
Apr 18, 2014
by
Neeraj Pandey
sql server
+3
votes
0
answers
How to delete y number of nodes after x number of nodes in a single linklist?
posted
Apr 17, 2014
by
Chahat Sharma
data structures
linklist
c
+2
votes
1
answer
Whats the benifit of creating table definition manually in informatica (Source Analyzer) instead of importing
posted
Apr 17, 2014
by
Madhavi Kumari
informatica
+1
vote
1
answer
Extraction of data from Siebel Data base to Dat file and staging table
posted
Apr 17, 2014
by
Pooja Bhanout
informatica
+3
votes
1
answer
Searching for a source table in search criteria in Source analyser in Informatica PowerCenter
posted
Apr 17, 2014
by
Rohini Agarwal
informatica
+2
votes
0
answers
How to use String .Format for an email id?
posted
Apr 17, 2014
by
Muskan
vb.net
asp.net
+4
votes
1
answer
LTE: What type of MCS is being used for MBMS data ?
posted
Apr 17, 2014
by
Harshita
lte
enodeb
ue
mac
mbms
+4
votes
0
answers
How to put boot into interactive mode on Fedora?
posted
Apr 17, 2014
by
Tarun Singhal
fedora
boot
+3
votes
0
answers
gprof out of memory on HP-UX system?
posted
Apr 16, 2014
by
Jai Prakash
gprof
c
hp-ux
memory
+2
votes
1
answer
VB.NET: How to remove decimal from currency datatype?
posted
Apr 16, 2014
by
Khusboo
vb.net
+3
votes
1
answer
How to identify, whether two trees are isomorphic or not?
posted
Apr 16, 2014
by
Atul Mishra
data structures
+3
votes
1
answer
How we can force a function to be called only once.
posted
Apr 16, 2014
by
Vikash Kumar Gupta
c
+2
votes
2
answers
Why we need QoS in LTE
posted
Apr 16, 2014
by
anonymous
lte
qos
+1
vote
1
answer
Hyperlink not created in comments section of bugzilla?
posted
Apr 16, 2014
by
Kiran
bugzilla
+5
votes
1
answer
Given a linked list, reverse alternate nodes and append at the end?
posted
Apr 16, 2014
by
Atul Mishra
data structures
c
+5
votes
2
answers
Windows8 : Why my disk space is reaching out 100% though i am running few programs?
posted
Apr 16, 2014
by
Hiteshwar Thakur
windows8
windows
+2
votes
0
answers
Hi everybody I've a problem and hope someone here can help That.
posted
Apr 16, 2014
by
Rahul Mehra
php
+2
votes
1
answer
LTE: How does Partial Purge UE procedure works ?
posted
Apr 16, 2014
by
Harshita
lte
mme
diameter
s6a-interface
sgsn
+2
votes
1
answer
S6a/S6d : Why does HSS send "PUA-flags" within the Purge UE answer message ?
posted
Apr 16, 2014
by
Harshita
lte
diameter
mme
sgsn
s6a-interface
+3
votes
2
answers
How do we know that this hardware (motherboard, CPU) really support Fedora version 18
posted
Apr 16, 2014
by
Kiran Kumar
fedora
fedora18
hardware
+1
vote
1
answer
Reduce sessions' log size
posted
Apr 15, 2014
by
Madhavi Kumari
informatica
+1
vote
1
answer
How to Rename the ODBC Data source in Import tables->connect to database in informatica?
posted
Apr 15, 2014
by
Pooja Bhanout
informatica
+2
votes
1
answer
overload of session log in informatica
posted
Apr 15, 2014
by
Rohini Agarwal
informatica
+3
votes
1
answer
Given only a pointer to a node to be deleted in a singly linked list, how do you delete it?
posted
Apr 15, 2014
by
Atul Mishra
data structures
+2
votes
2
answers
Data masking for mysql
posted
Apr 15, 2014
by
Deepti Singh
mysql
data-masking
+3
votes
1
answer
Write a function that counts the number of times a given int occurs in a Linked List?
posted
Apr 15, 2014
by
Vishvachi Tiwari
data structures
+1
vote
1
answer
What is the difference between oracle fusion and oracle ADF?
posted
Apr 15, 2014
by
Prasad
java
oracle
+4
votes
1
answer
How to create hotspot in Ubuntu?
posted
Apr 14, 2014
by
Sachidananda Sahu
ubuntu
linux
+3
votes
2
answers
Legally who is the owner of the MSISDN Either Operator or User who is using the number ?
posted
Apr 14, 2014
by
Hiteshwar Thakur
telecom
+5
votes
1
answer
Can someone give me the call flow of Handover from 3GPP access to Trusted Non-3GPP IP Access with MIPv4 FACoA on S2a ?
posted
Apr 14, 2014
by
Hiteshwar Thakur
lte
handover
s2a interface
+1
vote
1
answer
Is it possible to have access to form beans from struts1 in struts2
posted
Apr 14, 2014
by
Kaushik
struts2
struts
struts1
+3
votes
1
answer
What is the role of DigRF amd How does it impacts on LTE design ?
posted
Apr 14, 2014
by
Kuldeep Apte
lte
+2
votes
3
answers
What are the changes has been considered to jump towards LTE-advanced from LTE?
posted
Apr 14, 2014
by
Karan Joglekar
lte
lteadvanced
+3
votes
1
answer
Wireshark : How to print the buffer you received in a packet in the terminal
posted
Apr 14, 2014
by
Sachidananda Sahu
wireshark
c programming
+2
votes
0
answers
Hive install under hadoop
posted
Apr 14, 2014
by
Arjuna
hadoop
hive
install
+1
vote
1
answer
Is RHEL is vulnerable to HeartBleed bug?
posted
Apr 14, 2014
by
Sonu Jindal
rhel
heartbleed
+2
votes
0
answers
Why links from myside is shown as possible spam or not safe at facebook?
posted
Apr 13, 2014
by
anonymous
facebook
+5
votes
1
answer
LTE: Why physical cell identity has been divided into PSS and SSS forms ?
posted
Apr 13, 2014
by
Harshita
lte
pss
sss
enodeb
+3
votes
1
answer
Why is the Mac OS X version always way behind the latest Git version?
posted
Apr 13, 2014
by
Sanketi Garg
git
mac
version
+1
vote
1
answer
set_time_limit() - is it CPU time or elapsed time in PHP?
posted
Apr 12, 2014
by
Gurminder
php.
time
+5
votes
1
answer
How H(e)NB are authenticated in LTE/SAE?
posted
Apr 12, 2014
by
Hafeth Dawbaa
lte
aka
security
authentication
henb
Page:
« prev
1
...
283
284
285
286
287
288
289
...
next »
...