Search results
Jump to navigation
Jump to search
- ...own for maintenance and updates. To ensure all requests are sent to a live server, please use the official URL’s.748 bytes (92 words) - 23:06, 9 June 2014
- :Processing will be performed on a dedicated Contact Verification Server using Web service protocols. These servers may be hosted locally or remotel :If your network uses a Proxy Server, check this box and enter the Proxy information below.8 KB (1,317 words) - 23:56, 22 December 2016
- :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for Contact Zone t :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for Contact Zone t2 KB (330 words) - 20:18, 5 January 2017
- ...d the same request is sent again, both requests are still processed by the server and the CASS and NCOA reports will log both the timed out and the subsequen681 bytes (110 words) - 01:07, 8 December 2018
- :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for Contact Zone t :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for Contact Zone t2 KB (333 words) - 00:12, 5 January 2017
- :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for Contact Zone t :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for Contact Zone t2 KB (331 words) - 20:27, 5 January 2017
- *Windows Server 2003 is not supported538 bytes (63 words) - 18:06, 17 September 2020
- **C:\Program Files\Microsoft SQL Server\110\DTS\Binn **C:\Program Files (x86)\Microsoft SQL Server\110\DTS\Binn10 KB (1,551 words) - 22:27, 20 August 2020
- ...e, which makes it appealing for some DBMS-oriented applications (using SQL Server, DB/2, Oracle, etc.).872 bytes (123 words) - 18:45, 25 November 2014
- :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for Contact Zone t :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for Contact Zone t5 KB (807 words) - 00:16, 5 January 2017
- ;MX Server :Returns which MX Server was used to validate the email address. Only available in Premium Mode.3 KB (454 words) - 19:17, 1 June 2020
- ...Data Cloud processing, except that CVC connects to a Contact Verification Server using the same protocols used by Melissa Data Cloud process to connect to t1,000 bytes (135 words) - 16:58, 28 May 2015
- ...Data Cloud processing, except that CVC connects to a Contact Verification Server using the same protocols used by Melissa Data Cloud process to connect to t996 bytes (136 words) - 01:09, 3 January 2017
- ...ten in most languages. The Web Services utilize SOAP/XML/REST based client/server messaging. ===What 3rd party software products (i.e. Websphere, Microsoft SQL Server, etc) are required to support your solution?===3 KB (370 words) - 21:41, 12 June 2014
- ...to Melissa Data Cloud processing, except the component connects to a local server using the same protocols used by Melissa Data Cloud process to connect to t964 bytes (134 words) - 00:59, 12 June 2015
- ...avoid spam traps, sending out too many invalid emails will cause the mail server to flag you as a potential spammer (which is why mailbox validation is impo ;What is an accept all mail server?11 KB (1,904 words) - 19:07, 10 January 2020
- :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for the component :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for the component3 KB (436 words) - 21:42, 19 December 2016
- :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for the component :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for the component3 KB (437 words) - 22:15, 19 December 2016
- :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for the component :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for the component3 KB (438 words) - 21:34, 19 December 2016
- :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for the component :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for the component3 KB (440 words) - 22:06, 11 January 2017
- :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for the component :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for the component3 KB (442 words) - 21:08, 11 January 2017
- :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for the component :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for the component3 KB (439 words) - 22:22, 19 December 2016
- :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for the component :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for the component3 KB (443 words) - 23:01, 10 January 2017
- :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for the component :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for the component3 KB (445 words) - 17:52, 11 January 2017
- ...e server is temporarily overloaded or down, it is very likely that another server is up and running. For this reason, it is best to catch any errors returned ...low you to access our services using direct IP addresses. We have multiple server clusters and use a load balancing system to distribute incoming traffic. To9 KB (1,506 words) - 22:55, 16 February 2017
- ...Data Cloud processing, except that CVC connects to a Contact Verification Server using the same protocols used by Melissa Data Cloud process to connect to t1 KB (142 words) - 17:36, 11 January 2017
- ...to Melissa Data Cloud processing, except the component connects to a local server using the same protocols used by Melissa Data Cloud process to connect to t1 KB (141 words) - 19:57, 11 January 2017
- IP Locator Server using the same protocols used by Melissa Data Cloud processing to connect t931 bytes (134 words) - 00:17, 5 January 2017
- :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for Contact Zone t :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for Contact Zone t9 KB (1,449 words) - 00:58, 3 January 2017
- ...rs to influence your email reputation. For example, if you are on a shared server – other companies/users could be sending out their own campaigns without ...emails, if the scores are already terrible for your current email campaign server IPs, it might benefit to do email campaigns on a new or more reputable IP t9 KB (1,412 words) - 16:51, 26 August 2020
- ::Returns security protocols used on the receiving mail server ::We have made improvements at the MX server level to identify issues at the domain level more accurately, resulting in5 KB (631 words) - 00:21, 4 February 2023
- ==What server architecture and what type of redundancy is in place with this Web Service? ...balancing so incoming requests are sent immediately to the next available server. Melissa Data provides monitoring and real time testing of all servers so t4 KB (733 words) - 17:14, 12 December 2018
- 1. To open SSIS please find the version of SQL Server and open SQL Server Data Tools.3 KB (468 words) - 01:48, 7 January 2023
- ...odes:Enterprise Solutions#Contact Verification Server|Contact Verification Server]]4 KB (597 words) - 20:02, 13 January 2015
- ...ument will guide you through the process of installing Unison on an Ubuntu server. #Copy the Unison zip file to somewhere convenient on your server. I am using the home directory for the currently logged in user.3 KB (530 words) - 00:55, 8 March 2024
- :If your network uses a Proxy Server, enter the Proxy Host information on this field in order to communicate wit :If your network uses a Proxy Server, enter the Proxy Port information on this field in order to communicate wit10 KB (1,531 words) - 17:28, 23 December 2016
- *Email Object’s MXlookup function is querying MX records from a root DNS server, and is not properly utilizing the DNS resolver functionality of the Operat1 KB (166 words) - 22:45, 15 December 2016
- :If your network uses a Proxy Server, enter the Proxy Host information on this field in order to communicate wit :If your network uses a Proxy Server, enter the Proxy Port information on this field in order to communicate wit10 KB (1,542 words) - 17:24, 11 January 2017
- :Processing will be performed on a dedicated Contact Verification Server using Web service protocols. These servers may be hosted locally or remotel :If your network uses a Proxy Server, check this box and enter the Proxy information below.16 KB (2,517 words) - 16:45, 14 February 2018
- |MX Server||MXServer :A string value listing the security protocols used on the receiving mail server.13 KB (1,650 words) - 00:08, 9 September 2022
- ...avoid spam traps, sending out too many invalid emails will cause the mail server to flag you as a potential spammer (which is why mailbox validation is impo ;What is an accept all mail server?14 KB (2,311 words) - 00:53, 24 February 2022
- ...that is available in Visual Studio 2015+ when used in correlation with SQL Server 2014. Which causes the BusinessCoder component not to appear in the SSIS T ==SSIS VMWare: SQL Server 2016 Compatibility with VMWare==13 KB (1,972 words) - 22:54, 7 June 2023
- ...ow remain static. This release officially supports SQL Server 2016 and SQL Server 2017.3 KB (531 words) - 22:36, 3 June 2019
- ...ve Visual Studio 2012 or later. It must be installed at least once on host server. #Direct traffic to another application or server. The update will require the dll’s and data files be unloaded.4 KB (595 words) - 22:44, 10 August 2017
- ...e, which makes it appealing for some DBMS-oriented applications (using SQL Server, DB/2, Oracle, etc.).1 KB (197 words) - 18:44, 25 November 2014
- ...essary resource usage and downtime associated with updates. By polling the server at regular intervals, you can automatically monitor for and download update1 KB (207 words) - 00:50, 15 March 2023
- ...e server is temporarily overloaded or down, it is very likely that another server is up and running. For this reason, it is best to catch any errors returned ...low you to access our services using direct IP addresses. We have multiple server clusters and use a load balancing system to distribute incoming traffic. To11 KB (1,819 words) - 18:19, 18 November 2019
- #DSLAM, CMTS, POP Server analysis1 KB (176 words) - 21:51, 9 August 2019
- <li>Log in to the server you are rolling back.</li>2 KB (284 words) - 21:00, 14 September 2021
- ...fore display a map to the user’s local area determined by the selected Map Server.5 KB (652 words) - 23:47, 31 May 2018