Search results

Jump to navigation Jump to search
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for Contact Zone t :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for Contact Zone t
    2 KB (331 words) - 20:27, 5 January 2017
  • *Windows Server 2003 is not supported
    538 bytes (63 words) - 18:06, 17 September 2020
  • **C:\Program Files\Microsoft SQL Server\110\DTS\Binn **C:\Program Files (x86)\Microsoft SQL Server\110\DTS\Binn
    10 KB (1,551 words) - 22:27, 20 August 2020
  • ...e, which makes it appealing for some DBMS-oriented applications (using SQL Server, DB/2, Oracle, etc.).
    872 bytes (123 words) - 18:45, 25 November 2014
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for Contact Zone t :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for Contact Zone t
    5 KB (807 words) - 00:16, 5 January 2017
  • ;MX Server :Returns which MX Server was used to validate the email address. Only available in Premium Mode.
    3 KB (454 words) - 19:17, 1 June 2020
  • ...Data Cloud processing, except that CVC connects to a Contact Verification Server using the same protocols used by Melissa Data Cloud process to connect to t
    1,000 bytes (135 words) - 16:58, 28 May 2015
  • ...Data Cloud processing, except that CVC connects to a Contact Verification Server using the same protocols used by Melissa Data Cloud process to connect to t
    996 bytes (136 words) - 01:09, 3 January 2017
  • ...ten in most languages. The Web Services utilize SOAP/XML/REST based client/server messaging. ===What 3rd party software products (i.e. Websphere, Microsoft SQL Server, etc) are required to support your solution?===
    3 KB (370 words) - 21:41, 12 June 2014
  • ...to Melissa Data Cloud processing, except the component connects to a local server using the same protocols used by Melissa Data Cloud process to connect to t
    964 bytes (134 words) - 00:59, 12 June 2015
  • ...avoid spam traps, sending out too many invalid emails will cause the mail server to flag you as a potential spammer (which is why mailbox validation is impo ;What is an accept all mail server?
    11 KB (1,904 words) - 19:07, 10 January 2020
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for the component :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for the component
    3 KB (436 words) - 21:42, 19 December 2016
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for the component :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for the component
    3 KB (437 words) - 22:15, 19 December 2016
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for the component :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for the component
    3 KB (438 words) - 21:34, 19 December 2016
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for the component :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for the component
    3 KB (440 words) - 22:06, 11 January 2017
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for the component :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for the component
    3 KB (442 words) - 21:08, 11 January 2017
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for the component :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for the component
    3 KB (439 words) - 22:22, 19 December 2016
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for the component :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for the component
    3 KB (443 words) - 23:01, 10 January 2017
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for the component :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for the component
    3 KB (445 words) - 17:52, 11 January 2017
  • ...e server is temporarily overloaded or down, it is very likely that another server is up and running. For this reason, it is best to catch any errors returned ...low you to access our services using direct IP addresses. We have multiple server clusters and use a load balancing system to distribute incoming traffic. To
    9 KB (1,506 words) - 22:55, 16 February 2017

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)