This article by Jeremy Kashel, Tim Kent and Martyn Bullerwell, authors of Microsoft SQL Server 2008 R2 Master Data Services, provides an overview of SQL Server 2008 R2 Master Data Services (MDS), outlining the main features of the product as well as covering the architecture. In addition to covering the architecture, the purpose of this article is to get the reader comfortable with navigating around the main MDS interface, namely Master Data Manager.
In this article, we will cover the following:
- Master Data Services overview
- Master Data Services architecture
- Master Data Manager
XenApp 6 is the leader in application hosting and virtualization delivery, allowing users from different platforms such as Windows, Mac, Linux, and mobile devices to connect to their business applications. It reduces resources and costs for application distribution and management.
In this article by Guillermo Musumeci, author of Getting Started with Citrix XenApp 6, we will learn:
- XenApp 6 and its features
- System requirements for the installation of XenApp 6
Building financial function into Excel, as shown in the previous article, will augment the Excel toolset with user defined functions broadening the abilities of Excel. In this article wee will focus on depreciation, and the value of a dollar.
In this article by Andre Odnoha, author of Excel 2010 Financials Cookbook, we will learn:
- Calculating the depreciation of assets
- Calculating the future versus current value of your money
- Identifying the profitability of an investment
- Calculating and planning for inventory requirements
The objective of this article is to get you started using Oracle GoldenGate 10.4. We will discuss the history and evolution of GoldenGate Software, its success in the market and ultimate Oracle acquisition. You will become accustomed with the concepts of data replication and how GoldenGate provides enterprise-wide solutions to address the business requirements. Although an introduction, this article is designed to inspire thought by drilling into the key components, processes, and considerations required to build and implement a GoldenGate solution.
In this article by John P. Jeffries, author of Oracle GoldenGate Implementer's Guide, we will discuss the following points surrounding GoldenGate:
- The evolution of GoldenGate software
- The technology and architecture
- The solutions offered by GoldenGate
- The architecture and topology of GoldenGate, plus design considerations
- The supported platform and database versions
The use of interceptors provides a way of adding functionality to a business method without modifying the business method itself. The added functionality is not intermeshed with the business logic resulting in a cleaner and easier to maintain application. In the previous article we saw how the interceptors provide a means of moving code that is not central to a business method outside of the method. Here, we learn how to use interceptors to handle a number of different concerns including security and transactions.
In this article by Richard Reese, author of EJB 3.1 Cookbook, we will cover:
- Using interceptors to enforce security
- Using interceptors to handle transactions
- Using interceptors to handle application statistics
- Using lifecycle methods in interceptors
Interceptors provide a way to achieve cross-cutting activities like logging, managing transactions, security, and other aspects of an application. This article by Richard Reese, author of EJB 3.1 Cookbook, explains how the interceptors provide a means of moving code that is not central to a business method outside of the method. Later we will learn how to use interceptors to handle a number of different concerns including security and transactions in the next article.
In this article, we will cover:
- Creating the Registration Application
- Defining and using interceptors
- Using the InvocationContext to verify parameters
Security design is a critical part—of any implementation of PeopleSoft Financial application. By its very nature, a financial system needs robust security mechanisms to enforce appropriate controls on who can access the system and which features. PeopleSoft security consists of multiple aspects, such as User security, Row level security, Query security, Network security, Database security, Object security, and Field level security. We'll concentrate on security aspects that are typically configured by a Business Analyst or a Functional SME, that is, User-and Row-level security. Remaining aspects of security involve significant technical knowledge of PeopleSoft's application development environment (known as Application Designer) and security technologies, such as SSL.
In this article by Ranjeet Yadav, author of Oracle PeopleSoft Enterprise Financial Management 9.1 Implementation, we'll discuss user security components such as User Profiles, Roles, and Permission Lists. We'll also discuss how to enable and configure Row level security.Read Designing User Security for Oracle PeopleSoft Applications in full
SQL Server 2008 R2 improves the ability to manage multiple servers centrally with Utility Control Point (UCP). In order to manage multiple instances efficiently, there are certain settings available within the Utility Explorer tool. In this recipe by Satya Shyam K Jayanty, author of Microsoft SQL Server 2008 R2 Administration Cookbook, we will focus on how to manage multiple instances using Utility Explorer by setting global policies for data-tier applications (DAC), and managed instances.Read SQL Server 2008 R2: Multiserver Management Using Utility Explorer in full
As a DBA and advanced user of SQL Server 2008 R2, you have to develop best practices that combine a streamline of services for deployment, migration, and management of your data platform. SQL Server 2008 R2 has rich and intuitive GUI management tools, which lower the costs in data management by incorporating automation and delegation of administrative tasks. This article covers the SSMS features that are new and enhanced in SQL Server 2008 R2 to enable operational efficiency in developing the joint best practices and integrated solutions.
In this article by Satya Shyam K Jayanty, author of Microsoft SQL Server 2008 R2 Administration Cookbook, we will cover:
- Implementing Utility and Non-utility collection sets
- Designing and refreshing Scalable Share database features and enhancements
- Managing SQL Server Replication processes
- Implementing security for SQL Server Agent jobs management