Search results

Jump to navigation Jump to search
  • ...own for maintenance and updates. To ensure all requests are sent to a live server, please use the official URL’s.
    748 bytes (92 words) - 23:06, 9 June 2014
  • :Processing will be performed on a dedicated Contact Verification Server using Web service protocols. These servers may be hosted locally or remotel :If your network uses a Proxy Server, check this box and enter the Proxy information below.
    8 KB (1,317 words) - 23:56, 22 December 2016
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for Contact Zone t :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for Contact Zone t
    2 KB (330 words) - 20:18, 5 January 2017
  • ...d the same request is sent again, both requests are still processed by the server and the CASS and NCOA reports will log both the timed out and the subsequen
    681 bytes (110 words) - 01:07, 8 December 2018
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for Contact Zone t :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for Contact Zone t
    2 KB (333 words) - 00:12, 5 January 2017
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for Contact Zone t :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for Contact Zone t
    2 KB (331 words) - 20:27, 5 January 2017
  • *Windows Server 2003 is not supported
    538 bytes (63 words) - 18:06, 17 September 2020
  • **C:\Program Files\Microsoft SQL Server\110\DTS\Binn **C:\Program Files (x86)\Microsoft SQL Server\110\DTS\Binn
    10 KB (1,551 words) - 22:27, 20 August 2020
  • ...e, which makes it appealing for some DBMS-oriented applications (using SQL Server, DB/2, Oracle, etc.).
    872 bytes (123 words) - 18:45, 25 November 2014
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for Contact Zone t :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for Contact Zone t
    5 KB (807 words) - 00:16, 5 January 2017
  • ;MX Server :Returns which MX Server was used to validate the email address. Only available in Premium Mode.
    3 KB (454 words) - 19:17, 1 June 2020
  • ...Data Cloud processing, except that CVC connects to a Contact Verification Server using the same protocols used by Melissa Data Cloud process to connect to t
    1,000 bytes (135 words) - 16:58, 28 May 2015
  • ...Data Cloud processing, except that CVC connects to a Contact Verification Server using the same protocols used by Melissa Data Cloud process to connect to t
    996 bytes (136 words) - 01:09, 3 January 2017
  • ...ten in most languages. The Web Services utilize SOAP/XML/REST based client/server messaging. ===What 3rd party software products (i.e. Websphere, Microsoft SQL Server, etc) are required to support your solution?===
    3 KB (370 words) - 21:41, 12 June 2014
  • ...to Melissa Data Cloud processing, except the component connects to a local server using the same protocols used by Melissa Data Cloud process to connect to t
    964 bytes (134 words) - 00:59, 12 June 2015
  • ...avoid spam traps, sending out too many invalid emails will cause the mail server to flag you as a potential spammer (which is why mailbox validation is impo ;What is an accept all mail server?
    11 KB (1,904 words) - 19:07, 10 January 2020
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for the component :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for the component
    3 KB (436 words) - 21:42, 19 December 2016
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for the component :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for the component
    3 KB (437 words) - 22:15, 19 December 2016
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for the component :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for the component
    3 KB (438 words) - 21:34, 19 December 2016
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for the component :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for the component
    3 KB (440 words) - 22:06, 11 January 2017
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for the component :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for the component
    3 KB (442 words) - 21:08, 11 January 2017
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for the component :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for the component
    3 KB (439 words) - 22:22, 19 December 2016
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for the component :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for the component
    3 KB (443 words) - 23:01, 10 January 2017
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for the component :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for the component
    3 KB (445 words) - 17:52, 11 January 2017
  • ...e server is temporarily overloaded or down, it is very likely that another server is up and running. For this reason, it is best to catch any errors returned ...low you to access our services using direct IP addresses. We have multiple server clusters and use a load balancing system to distribute incoming traffic. To
    9 KB (1,506 words) - 22:55, 16 February 2017
  • ...Data Cloud processing, except that CVC connects to a Contact Verification Server using the same protocols used by Melissa Data Cloud process to connect to t
    1 KB (142 words) - 17:36, 11 January 2017
  • ...to Melissa Data Cloud processing, except the component connects to a local server using the same protocols used by Melissa Data Cloud process to connect to t
    1 KB (141 words) - 19:57, 11 January 2017
  • IP Locator Server using the same protocols used by Melissa Data Cloud processing to connect t
    931 bytes (134 words) - 00:17, 5 January 2017
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order for Contact Zone t :If your network uses a Proxy Server, enter the Proxy Port information on this field in order for Contact Zone t
    9 KB (1,449 words) - 00:58, 3 January 2017
  • ...rs to influence your email reputation. For example, if you are on a shared server – other companies/users could be sending out their own campaigns without ...emails, if the scores are already terrible for your current email campaign server IPs, it might benefit to do email campaigns on a new or more reputable IP t
    9 KB (1,412 words) - 16:51, 26 August 2020
  • ::Returns security protocols used on the receiving mail server ::We have made improvements at the MX server level to identify issues at the domain level more accurately, resulting in
    5 KB (631 words) - 00:21, 4 February 2023
  • ==What server architecture and what type of redundancy is in place with this Web Service? ...balancing so incoming requests are sent immediately to the next available server. Melissa Data provides monitoring and real time testing of all servers so t
    4 KB (733 words) - 17:14, 12 December 2018
  • 1. To open SSIS please find the version of SQL Server and open SQL Server Data Tools.
    3 KB (468 words) - 01:48, 7 January 2023
  • ...odes:Enterprise Solutions#Contact Verification Server|Contact Verification Server]]
    4 KB (597 words) - 20:02, 13 January 2015
  • ...ument will guide you through the process of installing Unison on an Ubuntu server. #Copy the Unison zip file to somewhere convenient on your server. I am using the home directory for the currently logged in user.
    3 KB (530 words) - 00:55, 8 March 2024
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order to communicate wit :If your network uses a Proxy Server, enter the Proxy Port information on this field in order to communicate wit
    10 KB (1,531 words) - 17:28, 23 December 2016
  • *Email Object’s MXlookup function is querying MX records from a root DNS server, and is not properly utilizing the DNS resolver functionality of the Operat
    1 KB (166 words) - 22:45, 15 December 2016
  • :If your network uses a Proxy Server, enter the Proxy Host information on this field in order to communicate wit :If your network uses a Proxy Server, enter the Proxy Port information on this field in order to communicate wit
    10 KB (1,542 words) - 17:24, 11 January 2017
  • :Processing will be performed on a dedicated Contact Verification Server using Web service protocols. These servers may be hosted locally or remotel :If your network uses a Proxy Server, check this box and enter the Proxy information below.
    16 KB (2,517 words) - 16:45, 14 February 2018
  • |MX Server||MXServer :A string value listing the security protocols used on the receiving mail server.
    13 KB (1,650 words) - 00:08, 9 September 2022
  • ...avoid spam traps, sending out too many invalid emails will cause the mail server to flag you as a potential spammer (which is why mailbox validation is impo ;What is an accept all mail server?
    14 KB (2,311 words) - 00:53, 24 February 2022
  • ...that is available in Visual Studio 2015+ when used in correlation with SQL Server 2014. Which causes the BusinessCoder component not to appear in the SSIS T ==SSIS VMWare: SQL Server 2016 Compatibility with VMWare==
    13 KB (1,972 words) - 22:54, 7 June 2023
  • ...ow remain static. This release officially supports SQL Server 2016 and SQL Server 2017.
    3 KB (531 words) - 22:36, 3 June 2019
  • ...ve Visual Studio 2012 or later. It must be installed at least once on host server. #Direct traffic to another application or server. The update will require the dll’s and data files be unloaded.
    4 KB (595 words) - 22:44, 10 August 2017
  • ...e, which makes it appealing for some DBMS-oriented applications (using SQL Server, DB/2, Oracle, etc.).
    1 KB (197 words) - 18:44, 25 November 2014
  • ...essary resource usage and downtime associated with updates. By polling the server at regular intervals, you can automatically monitor for and download update
    1 KB (207 words) - 00:50, 15 March 2023
  • ...e server is temporarily overloaded or down, it is very likely that another server is up and running. For this reason, it is best to catch any errors returned ...low you to access our services using direct IP addresses. We have multiple server clusters and use a load balancing system to distribute incoming traffic. To
    11 KB (1,819 words) - 18:19, 18 November 2019
  • #DSLAM, CMTS, POP Server analysis
    1 KB (176 words) - 21:51, 9 August 2019
  • <li>Log in to the server you are rolling back.</li>
    2 KB (284 words) - 21:00, 14 September 2021
  • ...fore display a map to the user’s local area determined by the selected Map Server.
    5 KB (652 words) - 23:47, 31 May 2018

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)