In this article by Abilash GB, the author of the book VMware vSphere 5.1 Cookbook, all the predefined Image Profiles available from an Offline Bundle that are read-only. To customize such Image Profiles, you will need to clone them to form new Image Profiles. In this article, we will learn how to create a new Image Profile by cloning an existing one.Read Creating an Image Profile by cloning an existing one in full
In this article by Mark Walker, author of Software Development on the SAP HANA Platform, we will examined the fact that some of your users might not be allowed to have access to all the data in the system, or might have specific rights, maybe to create data but not to see the data that is currently in the system. We'll see concrete example of access restrictions on both objects and their content in this article.
SAP HANA provides several different layers of security from which you can benefit, and in this article we'll be looking at each of them. We'll examine how we can create each type of object, how they interact with each other, and how we can use them.
The authorization concept in SAP HANA is comprised of different notions:
We will take a look at each of these concepts in turn.Read Authorizations in SAP HANA in full
This article will cover how DPM can protect and recover some non-Microsoft workloads. When DPM can protect a workload natively, you simply go into DPM and select the data to protect and it will back up the components needed for a successful restore. An example of a Microsoft workload that DPM can protect natively would be a virtual machine running on Hyper-V. You simply select the virtual machine for protection and DPM will protect the VHD's, the virtual machine configuration and any snapshots of that virtual machine. DPM automatically knows to protect all of the virtual machines components because DPM understands Hyper-V. This understanding comes from the workloads Volume Shadow Copy Service; this is what is considered "DPM aware".
In this article by Steve Buchanan,Islam Gomaa,Robert Hedblom and Flemming Riis, authors of Microsoft System Center Data Protection Manager 2012 SP1, we will give you valuable insight into what components need to be protected for successful backups of DPM non-aware workloads.
DPM non-aware Microsoft workload protection includes the following:
Protecting DFS with DPM
Protecting Dynamics CRM with DPM
Protecting Dynamics GP with DPM
Protecting TMG 2010 with DPM
Protecting Lync 2010 with DPM
In this article by Nicolae Tarla,author of Microsoft Dynamics CRM 2011 Scripting Cookbook, we will cover the following topics:
- Form load event usage
- Form save event usage
- Field change event usage
- Working with tabs and sections
- Combining events
- Enforcing business rules
This article created by Stefan Bauer author of Getting Started with Amazon Redshift, gets into some of the specifics and details you will need to get up and running with . As with most of the Amazon products you have used in the past, there are just a few preliminary things to take care of. You need to have signed up for the Redshift service on the Amazon account you will be using. Although these keys are not specific to Redshift, be sure to hang on to both your public and secret key strings from your user account. Those keys will be labeled Access Key and Secret Key. You can view the Access Key public portion from the user security credentials on the Security Credentials tab. However, if you do not capture the secret key when you create the keys, it cannot be recovered and you will need to generate a new key pair. You will need these when we start talking about loading data and configuring the command-line tools. Once you have the permissions for your account, the process to create the cluster is a wizard-driven process that you can launch from your Amazon Redshift management console.Read Transition to Readshift in full
This article is written by Ravi Saraswathi and Jaswant Singh, the authors of Oracle SOA BPEL Process Manager 11gR1 – A Hands-on Tutorial. This article covers performance tuning of SOA composite applications for optimal performance and scalability. The industry leading practices for the Oracle SOA Suite platform components, WebLogic server platform, JVM, operating systems, and load balancers are also included.
Performance tuning is an important step for any IT system implementation to optimize the systems and software resources needed for serving business functions. In other words, performance tuning enables us to optimize the system cost and performance to stay competitive in the market place. The process of performance tuning is iterative and in this article we will look into various systems and software components tuning options to optimize BPEL processes response time, scalability and availability, and underlying systems utilization.Read Performance Tuning – Systems Running BPEL Processes in full
This article is written by Emre Baransel and Nassyam Basha, both of whom have also authored the book Oracle Data Guard 11gR2 Administration Beginner's Guide.
The objective of this article is to make you familiar with the Oracle Data Guard 11gR2 environment. We will discuss the definition, properties, and history of Data Guard. You will become accustomed with the concepts of standby databases and how Data Guard provides the robust solution of high availability and disaster recovery.
In this article, we will discuss the following topics:
- The definition and features of Data Guard
- The evolution of Data Guard
- The architecture and topology of Data Guard
- Comparison of Data Guard with other replication solutions
Let's get on with learning what Oracle Data Guard is and its primary features are.Read Getting Started with Oracle Data Guard in full
This article by Kristina Cutura, author of Advertising on Google: The High Performance Cookbook, will provide tips on improving relevance, Quality Scores, and ROI. The most successful advertisers continuously refine and optimize their campaigns to keep them profitable. Your initial keywords and ads will need to be regularly updated, paused, and refined to stay on top of the latest trends in your market. Also, you'll need to adjust bids and other settings to keep on target with your goals such as a specific ad position or CPA.Read Optimizing Performance in full
In this article by Biru Chattopadhayay, author of Getting Started with Oracle Tuxedo,we will discuss various important built-in features (security, data-dependent routing, encryption, and so on) that come with the Tuxedo system and how these features can be used to make your application more secure, effective, and responsive to address your business needs. These features are configurable, and there is no need to do any custom development, hence they are very cost-effective and easy to use. We will also discuss responsibilities of Tuxedo administrator for administering the Tuxedo queue.Read The important features of Tuxedo in full
In this article by Stephen Redmond, author of QlikView for Developers Cookbook, we will look at how Section Access security works by linking a user to the data model. When that user logs in, the data is reduced to only show them the data that they are associated with.
If you have been working with QlikView for a while, you may have come across loops in the data model, causing Loosely Coupled associations. That means you might find it counterintuitive to think about connecting a security table to multiple dimensions in a way that might normally cause a loop. However, QlikView will allow it.Read Linking Section Access to multiple dimensions in full