Enterprise Articles

Microsoft Dynamics CRM 2011 Overview

by Danny Varghese | July 2013 | Enterprise Articles Microsoft

In this article created by Danny Varghese, the author of Microsoft Dynamics CRM 2011 Applications (MB2-868)Certification Guide you will learn about:

  • Introduction to CRM 2011
  • Training and certifications

 

Read Microsoft Dynamics CRM 2011 Overview in full

Creating an Image Profile by cloning an existing one

by Rodrigo Fraxino Araujo | July 2013 | Cookbooks Enterprise Articles

In this article by Abilash GB, the author of the book VMware vSphere 5.1 Cookbook, all the predefined Image Profiles available from an Offline Bundle that are read-only. To customize such Image Profiles, you will need to clone them to form new Image Profiles. In this article, we will learn how to create a new Image Profile by cloning an existing one.

Read Creating an Image Profile by cloning an existing one in full

Authorizations in SAP HANA

by Mark Walker | July 2013 | Enterprise Articles SAP

In this article by Mark Walker, author of Software Development on the SAP HANA Platform, we will examined the fact that some of your users might not be allowed to have access to all the data in the system, or might have specific rights, maybe to create data but not to see the data that is currently in the system. We'll see concrete example of access restrictions on both objects and their content in this article.

SAP HANA provides several different layers of security from which you can benefit, and in this article we'll be looking at each of them. We'll examine how we can create each type of object, how they interact with each other, and how we can use them.

The authorization concept in SAP HANA is comprised of different notions:

  • Roles

  • SQL privileges

  • Analytic privileges

  • System privileges

  • Package privileges

  • Users

     

We will take a look at each of these concepts in turn.

Read Authorizations in SAP HANA in full

DPM Non-aware Windows Workload Protection

by Flemming Riis Islam Gomaa Robert Hedblom Steve Buchanan | July 2013 | Enterprise Articles Microsoft

This article will cover how DPM can protect and recover some non-Microsoft workloads. When DPM can protect a workload natively, you simply go into DPM and select the data to protect and it will back up the components needed for a successful restore. An example of a Microsoft workload that DPM can protect natively would be a virtual machine running on Hyper-V. You simply select the virtual machine for protection and DPM will protect the VHD's, the virtual machine configuration and any snapshots of that virtual machine. DPM automatically knows to protect all of the virtual machines components because DPM understands Hyper-V. This understanding comes from the workloads Volume Shadow Copy Service; this is what is considered "DPM aware".

In this article by Steve Buchanan,Islam Gomaa,Robert Hedblom and Flemming Riis, authors of Microsoft System Center Data Protection Manager 2012 SP1, we will give you valuable insight into what components need to be protected for successful backups of DPM non-aware workloads.

DPM non-aware Microsoft workload protection includes the following:

  • Protecting DFS with DPM

  • Protecting Dynamics CRM with DPM

  • Protecting Dynamics GP with DPM

  • Protecting TMG 2010 with DPM

  • Protecting Lync 2010 with DPM

  • Protecting IIS

Read DPM Non-aware Windows Workload Protection in full

Rules and Events

by Nicolae Tarla | July 2013 | Cookbooks Enterprise Articles Microsoft

In this article by Nicolae Tarla,author of Microsoft Dynamics CRM 2011 Scripting Cookbook, we will cover the following topics:

  • Form load event usage
  • Form save event usage
  • Field change event usage
  • Working with tabs and sections
  • Combining events
  • Enforcing business rules
Read Rules and Events in full

Transition to Readshift

by Stefan Bauer | July 2013 | Enterprise Articles

This article created by Stefan Bauer author of Getting Started with Amazon Redshift, gets into some of the specifics and details you will need to get up and running with . As with most of the Amazon products you have used in the past, there are just a few preliminary things to take care of. You need to have signed up for the Redshift service on the Amazon account you will be using. Although these keys are not specific to Redshift, be sure to hang on to both your public and secret key strings from your user account. Those keys will be labeled Access Key and Secret Key. You can view the Access Key public portion from the user security credentials on the Security Credentials tab. However, if you do not capture the secret key when you create the keys, it cannot be recovered and you will need to generate a new key pair. You will need these when we start talking about loading data and configuring the command-line tools. Once you have the permissions for your account, the process to create the cluster is a wizard-driven process that you can launch from your Amazon Redshift management console.

Read Transition to Readshift in full

Performance Tuning – Systems Running BPEL Processes

by Jaswant Singh Ravi Saraswathi | July 2013 | Enterprise Articles SOA Oracle

This article is written by Ravi Saraswathi and Jaswant Singh, the authors of Oracle SOA BPEL Process Manager 11gR1 – A Hands-on Tutorial. This article covers performance tuning of SOA composite applications for optimal performance and scalability. The industry leading practices for the Oracle SOA Suite platform components, WebLogic server platform, JVM, operating systems, and load balancers are also included.

Performance tuning is an important step for any IT system implementation to optimize the systems and software resources needed for serving business functions. In other words, performance tuning enables us to optimize the system cost and performance to stay competitive in the market place. The process of performance tuning is iterative and in this article we will look into various systems and software components tuning options to optimize BPEL processes response time, scalability and availability, and underlying systems utilization.

Read Performance Tuning – Systems Running BPEL Processes in full

Getting Started with Oracle Data Guard

by Emre Baransel Nassyam Basha | July 2013 | Beginner's Guides Enterprise Articles Oracle

This article is written by Emre Baransel and Nassyam Basha, both of whom have also authored the book Oracle Data Guard 11gR2 Administration Beginner's Guide.

The objective of this article is to make you familiar with the Oracle Data Guard 11gR2 environment. We will discuss the definition, properties, and history of Data Guard. You will become accustomed with the concepts of standby databases and how Data Guard provides the robust solution of high availability and disaster recovery.

In this article, we will discuss the following topics:

  • The definition and features of Data Guard
  • The evolution of Data Guard
  • The architecture and topology of Data Guard
  • Comparison of Data Guard with other replication solutions

Let's get on with learning what Oracle Data Guard is and its primary features are.

Read Getting Started with Oracle Data Guard in full

Optimizing Performance

by Kristina Cutura | July 2013 | Cookbooks Enterprise Articles

This article by Kristina Cutura, author of Advertising on Google: The High Performance Cookbook, will provide tips on improving relevance, Quality Scores, and ROI. The most successful advertisers continuously refine and optimize their campaigns to keep them profitable. Your initial keywords and ads will need to be regularly updated, paused, and refined to stay on top of the latest trends in your market. Also, you'll need to adjust bids and other settings to keep on target with your goals such as a specific ad position or CPA.

Read Optimizing Performance in full

The important features of Tuxedo

by Biru Chattopadhayay | June 2013 | Enterprise Articles Oracle

In this article by Biru Chattopadhayay, author of Getting Started with Oracle Tuxedo,we will discuss various important built-in features (security, data-dependent routing, encryption, and so on) that come with the Tuxedo system and how these features can be used to make your application more secure, effective, and responsive to address your business needs. These features are configurable, and there is no need to do any custom development, hence they are very cost-effective and easy to use. We will also discuss responsibilities of Tuxedo administrator for administering the Tuxedo queue.

Read The important features of Tuxedo in full
Syndicate content
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software