Quick blog to help you save huge amounts of time which translates in to huge amounts of money and much smaller headaches!
According to the Customized Environments section (1-17) of the Oracle® E-Business Suite Upgrade Guide Release 12.0 and 12.1 to 12.2 Part No. E48839-13 documentation:
Caution: Customizing any concurrent program definitions, menus, value sets, or other seeded data provided by Oracle E-Business Suite is not supported. The upgrade process overwrites these customizations.
So, the upgrade process to 12.2.x overwrites any of these customizations and Oracle advises you to back them up! Catch is, they don't tell you how to back up "just" this data. Beyond a full database backup, they assume you would most likely do some sort of export of your customized data by way of a script that, if written correctly and accurately, will back up your customizations. One operative word in that statement is "correctly"; the other is "accurately". The one that's missing is "time". Scripting this export will take some serious time due to the specificity of what you're backing up! Time is just not a luxury most of us have. Enter Stat.
With Stat, you can very quickly and easily "backup" your customizations in one or several CSRs without having to script anything and by executing some very simple mouse clicks. That's it! Then, once you've upgraded, you simply drag and drop your archived customizations to your newly upgraded environment and viola! You've restored your customizations! No worrying that you transposed characters in your script or missed something because your backup was automated as is your recovery!
Now that we've made your life easier, go ahead and enjoy your time off!
I have a saying: Nothing free is easy, and nothing easy is free. That certainly holds true where SharePoint is concerned.
The ”trouble” with SharePoint has always been its blank canvas approach to what it is. For example, admins come to IT and ask for a document repository. SharePoint can do that. Legal comes to IT and asks for a search engine for legal files. SharePoint can do that, too.
You get the picture, SharePoint can do so much for so many businesses, but to get the most out of it requires strong in-house knowledge and skills.
SharePoint can do so much that it’s set up and configured for many different departments, however 20-40% of these departments never actually end up touching the platform. That’s often because the initial design wasn’t good enough to attract users, so they stayed with their legacy approaches: file systems, email folders, etc.
Some business units go outside the IT department to build their own SharePoint instance without IT guidance. That means the day that the hard drive fails, it becomes IT’s problem for not backing up the service even though IT never knew it existed in the first place!
Now, we find today’s biggest push is to the cloud. IT managers are being asked for a cloud-first strategy, ensuring IT again have additional work on their plates to get the company to the cloud as rapidly as possible — all without additional headcount or budget to support the push.
This is where SharePoint comes in again. You need to migrate your on-premises SharePoint instances to Office 365, where do you start?
With Dell Software, you can ensure a successful and affordable SharePoint migration to Office 365 or SharePoint 2016.
Our SharePoint consolidation and migration methodology, which includes assessing your current environment, migrating the needed content, ensuring coexistence and managing your new environment after the move, helps you:
This methodology is well tested and proven across many 10’s of thousands of successful migrations with Dell Software.
Don’t just take my word for it, though. Dell Software is the number one migration vendor worldwide and has proven this methodology through tens of thousands of successful migrations. See for yourself how we can help ensure your organization easily and successfully gets to Office 365 and SharePoint 2016.
About Michael Brooke
Michael Brooke is an experienced technology and IT consultant for Dell Software. Some of the solutions Michael works with include, technology refreshes (Desktops and servers), migrations between platforms (messaging and OS), security projects (privilege management and IAM) and IT management solutions.
View all posts by Michael Brooke
There are a lot of sharks swimming around your network. Most are friendly, but some are not. Can you tell the difference?
Fortunately, you don't need to. Thanks to a new partnership between Dell Software and Securonix, we are now offering user behavior analytics (UBA) to automatically detect suspicious shark behaviors.
The partnership combines the unique insights delivered by Change Auditor with actionable security intelligence. The AD-Securonix integration means organizations can rest assured that the keys to their critical data are protected by the most advanced security analytics solution on the market.
Securonix is the pioneer of user and entity behavior analytics (UEBA) for cyber security. The company’s products combine the latest advances in machine learning and artificial intelligence with advanced anomaly detection techniques to accurately predict, prevent, detect and respond to threats in real time.
The problem with sharks is that they're unpredictable. Until now.
Do you ever wonder why Spotlight throws an Access Denied or WMI error while monitoring a Windows server when your user account has all the permissions needed to access that server? You might encounter these errors on the Home page or even at the time of connection. The frustrating part is that even though you can connect via Remote Desktop and Ping the server, you still get those annoying errors! Well, Spotlight actually runs various WMI commands to connect to your server and collect performance metrics for monitoring. These underlying commands are a common cause of these errors. Utilizing some simple commands, you can identify and address the root cause and be on your way to monitoring in no time!
Before we get into the details, let’s clarify the characteristics of these errors:
To find the root cause and rectify these errors, follow these simple steps:
Our Deployment Guide includes a ‘Troubleshooting WMI’ section providing more details about these errors.
Interested in trying Spotlight on SQL Server Enterprise for yourself? Download a free 30-day trial.
This is an optional hotfix and can be installed on the following vWorkspace roles -
This release provides support for the following:
This hotfix is available for download at:
It’s no secret that cyberattacks are on the rise, putting enterprises of all sizes at risk. Organizations are working hard to defend themselves; according to Gartner, Inc., worldwide spending on information security will reach $75 billion for 2015, an increase of 4.7 percent over 2014, and other cybersecurity analysts predict that the global cybersecurity market will grow to a staggering $170 billion by 2020.
However, what that money should be spent on is changing, and it’s critical to keep up with the exciting new developments. In particular, endpoint security has traditionally been handled by software, such as anti-virus tools, multi-factor authentication, and Group Policy enforcing password standards and password changes. That software is extremely helpful — but increasingly insufficient. Ever more sophisticated and pernicious malware is infecting endpoints despite these software barriers, leading to security breaches, data loss, compliance violations, bad press and a variety of other consequences organizations are eager to avoid.
Hardware Can Help
Fortunately, now you can have a powerful new tool in your arsenal — hardware. That’s right: Hardware vendors are making improvements that enable the hardware itself to enhance IT security. Intel's new Skylake processors are being hawked in their press for their better CPU and GPU performance and longer battery life, but if you’re an IT pro responsible for protecting your network, their security features might be even more exciting. Skylake includes enhancements that make biometric and other strong authentication methods faster and more secure, while also protecting user privacy. For example, biometric measurements are kept in tamper-resistant hardware storage instead of the hard drive, and new image-processing capabilities speed up facial recognition.
Enterprise PCs and laptops based on Skylake are already available. But before you rush to fill out a requisition, you need to know that there are some challenges involved in migrating to the new technology. In particular, the corporate images you’ve spent years refining won’t work on the new machines, so you’ll have to build and test new ones, and then provision your new laptops and PCs. Done manually, that would be a lot of work and delay. But the KACE K2000 Systems Deployment Appliance automates image creation, deployment and maintenance, so you can easily ensure that your new computers are ready to be your next line of defense against attackers.
To learn more about the benefits of Skylake and how you can streamline its deployment using the K2000, view the on-demand webcast, “Top 8 Security Features in Skylake PCs."
Für einen Großteil der Unternehmen sind die Zeiten, als es nur eine Produktionsdatenbank gab, längst vorbei. Datenbank-Admins (DBA) müssen heutzutage eher eine Vielzahl an Produktionsdatenbanken verwalten, kürzere SLAs einhalten und in vielen Fällen auch noch mit Datenbanken verschiedener Hersteller umgehen.
Kundengespräche legen nahe, dass der häufigste Grund dafür Business Intelligence ist. Unternehmen sichern alle möglichen Arten von Daten, manchmal sogar, ohne dass für sie genau klar ist, welcher Wert oder Geschäftsvorteil beim Aufheben der Daten liegt – was man hat, hat man und wofür es gut ist, kann ja später noch geklärt werden. Der Umkehrschluss ist allerdings, dass die DBAs mit einer anwachsenden Datenmenge umgehen müssen, einhergehend mit einer niedrigeren Toleranz für Ausfälle, jedoch ohne dass das Budget ebenso anwachsen würde.
Diese Situation veranlasst DBAs und IT-Teams, neue Technologien zur Kostenreduzierung zu testen, egal ob cloudbasiert oder schlicht andere Datenbank-Plattformen. Allerdings führt das zu einem anderen Problem. Es ist meist die Ausnahme, dass ein Unternehmen mehrere Datenbanken hat, die nicht untereinander kommunizieren würden – die Daten müssen zwischen ihnen hin und her wandern. Das wiederum führt zu einer komplexeren IT-Infrastruktur mit einer Mischung aus DR- und Replikationstools, von denen einige im eigenen Haus entwickelt werden, andere stellen eine Verbindung aus nativen und/oder Angeboten von Drittanbietern dar, einige arbeiten in Echtzeit, andere im Batchmodus – Sie verstehen, was gemeint ist!
Ich würde Ihnen daher gerne SharePlex vorstellen – das Tool zur Erfassung von Datenänderungen. Ein einziges Tool mit dem Sie alles, was ich eben dargestellt habe, verwirklichen können, da die Änderungen der Daten zwischen den Datenbanken in Echtzeit oder batchweise erfasst werden.
Nehmen wir beispielsweise eine Firma mit dem eben beschriebenem Szenario. Sie haben in ihrem Rechenzentrum einige Oracle Produktionsdatenbanken mit verschiedenen Zwecken für das Unternehmen, mit einer selbst entwickelten, maßgeschneiderten Lösung zur Replizierung von Datenänderungen einer Untermenge von Tabellen zwischen den Datenbanken alle paar Sekunden. Alle Datenbanken haben RAC für Hochverfügarkeit und DataGuard für Disaster Recovery. Eine zweite selbst gestrickte Lösung repliziert stündlich batchweise Daten von Oracle Datenbanken zu einem SQL Server Data Warehouse auf Azure-Basis.
Das Schöne an SharePlex ist nun, dass man es für verschiedene Zwecke einsetzen kann, inklusive aller Szenarios, die oben beschrieben wurden: hohe Verfügbarkeit, Disaster Recovery, Replikation aller oder einer Untermenge von Tabellen und Replikation von Oracle zu SQL Server. Noch viel besser ist, dass man SharePlex auch für verschiedene Zwecke gleichzeitig verwenden kann. Sie könnten also mit SharePlex eine DR-Site aufsetzen, und da es immer verfügbar und aktuell ist, kann es ebenso den Wunsch nach einer hohen Verfügbarkeit erfüllen – und warum nutzen Sie diese DR/HA-Datenbank nicht auch noch zu Reportingzwecken? Sollte es dann irgendwann an der Zeit für Updates oder Migrationen der Datenbanken sein, können Sie minimale Ausfallzeiten und ein geringes Risiko mit SharePlex gewährleisten.
Ich denke, Sie stimmen zu, dass ein Tool, das alle diese Einsatzzwecke abdeckt, nicht nur Ihre IT-Umgebung vereinfacht und verbessert, sondern Ihnen auch Zeit und Geld spart, während Sie flexibel in Bezug auf Datenbanktechnologie und –plattformen bleiben können. Fehlt eigentlich nur noch, dass es Kaffee kochen kann…
By Nicholas Wakou, Principal Performance Engineer, Dell
Computer benchmarking, the practice of measuring and assessing the relative performance of a system, has been around almost since the advent of computing. Indeed, one might say that the general concept of benchmarking has been around for over two millennia. As Sun Tzu wrote on military strategy:
"The ways of the military are five: measurement, assessment, calculation, comparison, and victory. If you know the enemy and know yourself, you need not fear the result of a hundred battles.”
The SPEC Cloud™ IaaS 2016 Benchmark is the first specification by a major industry-standards performance consortium that defines how the performance of cloud computing can be measured and evaluated. The use of the benchmark suite is targeted broadly at cloud providers, cloud consumers, hardware vendors, virtualization software vendors, application software vendors, and academic researchers. The SPEC Cloud Benchmark addresses the performance of infrastructure-as-a-service (IaaS) cloud platforms, either public or private.
Dell has been a major contributor to the development of the SPEC Cloud IaaS Benchmark and is the first – and so far only – cloud vendor either private or public to successfully execute the benchmark specification tests and to publish its results. This article explains this new cloud benchmark and Dell’s role and results.
How it works and what is measured
The benchmark is designed to stress both provisioning and runtime aspects of a cloud using two multi-instance I/O and CPU intensive workloads: one based on YCSB (Yahoo! Cloud Serving Benchmark) that uses the Cassandra NoSQL database to store and retrieve data in a manner representative of social media applications; and another representing big data analytics based on a K-Means clustering workload using Hadoop. The Cloud under Test (CuT) can be based on either virtual machines (instances), containers, or bare metal.
The architecture of the benchmark comprises two execution phases, Baseline and Elasticity + Scalability. In the baseline phase, peak performance for each workload running on the Cloud under Test (CuT) alone is determined in 5 separate test runs. Data from the baseline phase is used to establish parameters for the Elasticity + Scalability phase. In the Elasticity + Scalability phase, both workloads are run concurrently to determine elasticity and scalability metrics. Each workload runs in multiple instances, referred to as an application instance (AI). The benchmark instantiates multiple application instances during a run. The application instances and the load they generate stress the provisioning as well as the run-time performance of the cloud. The run-time aspects include CPU, memory, disk I/O, and network I/O of these instances running in the cloud. The benchmark runs the workloads until specific quality of service (QoS) conditions are reached. The tester can also limit the maximum number of application instances that are instantiated during a run.
The key benchmark metrics are:
Benchmark status and results
The SPEC Cloud IaaS benchmark standard was released on May 3, 2016, and more information can be found in the Standard Performance Evaluation Corporation’s announcement. At the time of the release, Dell submitted the first and only result in the industry. This result is based on the Dell Red Hat OpenStack Cloud Solution Reference Architecture comprised of Dell’s PowerEdge R720 and R720xd server platforms running the Red Hat OpenStack Platform 7 software suite. The details of the result can be found on the SPEC Cloud IaaS 2016 results page.
Dell has been a major contributor to developing the SPEC Cloud IaaS benchmark standard right from the beginning from when the charter of SPEC Cloud Working Committee was drafted to when the benchmark was released. So it is no surprise that Dell was the first company to publish a result based on the new Cloud benchmark standard. Dell will continue to use the SPEC Cloud IaaS benchmark to compare and differentiate its cloud solutions and will additionally use the workloads for performance characterizations and optimizations for the benefit of its customers.
At every opportunity, Dell will share how it is using the benchmark workloads to solve real world performance issues in the cloud. On Wednesday, June 29th, 2016, I will be presenting a talk entitled “Measuring performance in the cloud: A scientific approach to an elastic problem” at the Red Hat Summit in San Francisco. This presentation will include the use of SPEC Cloud IaaS Benchmark standard as a tool for evaluating the performance of the cloud.
Computer benchmarking is no longer an academic exercise or a competition among vendors for bragging rights. It has real benefits for customers, and now – with the creation of the SPEC Cloud IaaS 2016 Benchmark – it advances the state of the art of performance engineering for cloud computing.
While relatively a newcomer to the IT compliance scene, PCI DSS has been mandated by all members of the PCI Security Standards Council, including Visa International, MasterCard Worldwide, American Express, Discover Financial Services and JCB International. What this means, essentially, is that all banks that process the payment transactions associated with these cards are responsible for ensuring that merchants meet the standard or face severe penalties.
PCI DSS has an extensive reach — it applies not only to your business, but also to virtually any vendor that supports your organization by accepting, storing, processing or transmitting payment card data, including personal data from credit and debit cards. Any business partner or vendor that handles cardholder data (CHD) or sensitive authentication data (SAD) in these capacities is classified as a PCI merchant and is required to comply. Objectives and requirements
The overriding goal of PCI DSS is to ensure payment card data confidentiality, which means making sure that you and your vendors have the proper operational processes and controls in place to secure customer data and ensure it is auditable. Specifically, PCI DSS requirements are intended to ensure that organizations
Build and maintain secure networks and systems
• Protect cardholder data
• Maintain a vulnerability management program
• Implement strong access control measures
• Regularly monitor and test networks
• Maintain an information
Many of the PCI DSS standards have detailed requirements that focus on key processes and controls organizations must have in place for managing user identities and entitlements.
These include controls that:
It’s August 5, 2016 and you settle down at your computer to watch the Olympic opening ceremony. You have no fear of catching Zika, unlike the thousands of people in Rio. Feeling safe, you navigate to the official broadcast site of the games and click on Watch the Olympics live.
But wait, there’s fine print: Simply Sign-In Using Your TV Provider Account Login/Password And You'll Have Access To FREE, LIVE Rio Olympics Coverage. Not cool. “Who pays for TV?” you ask yourself. “Haven’t they heard of streaming?” So you search on “Olympics live streaming free” and there, on the first page of results is:
The site doesn’t look official, but hey, the media player icon looks like YouTube, which you know is safe, so you click Play. The site asks you to download and install a video codec. The ceremony starts in five minutes and the screen screams “Stream in HD now!” You’re one step away from the Free Live Stream, so you click Accept…within microseconds, your computer is infected with a virus. Perhaps the video will start, perhaps it won’t, but in either case, the malware now on your computer will give you greater problems than missing the opening ceremonies.
How can you protect yourself from such a scenario? Here are some precautions you can take:
To learn more about the bad things that can infect you on the Internet and the ways that you can inoculate yourself, read our ebook - How ransomware can hold your business hostage.