Enterprise Articles

Excel 2010 Financials: Identifying the Profitability of an Investment

by Andre Odnoha | July 2011 | Cookbooks Enterprise Articles Microsoft

Building financial function into Excel, as shown in the previous article, will augment the Excel toolset with user defined functions broadening the abilities of Excel. In this article wee will focus on depreciation, and the value of a dollar.

In this article by Andre Odnoha, author of Excel 2010 Financials Cookbook, we will learn:

  • Calculating the depreciation of assets
  • Calculating the future versus current value of your money
  • Identifying the profitability of an investment
  • Calculating and planning for inventory requirements
Read Excel 2010 Financials: Identifying the Profitability of an Investment in full

Packt Classics

by | July 2011 | Enterprise Articles Open Source

 

Packt Classics

Some things are too good to leave in the past...

Read Packt Classics in full

Getting Started with Oracle GoldenGate

by John P Jeffries | July 2011 | Enterprise Articles Oracle

The objective of this article is to get you started using Oracle GoldenGate 10.4. We will discuss the history and evolution of GoldenGate Software, its success in the market and ultimate Oracle acquisition. You will become accustomed with the concepts of data replication and how GoldenGate provides enterprise-wide solutions to address the business requirements. Although an introduction, this article is designed to inspire thought by drilling into the key components, processes, and considerations required to build and implement a GoldenGate solution.

In this article by John P. Jeffries, author of Oracle GoldenGate Implementer's Guide, we will discuss the following points surrounding GoldenGate:

  • The evolution of GoldenGate software
  • The technology and architecture
  • The solutions offered by GoldenGate
  • The architecture and topology of GoldenGate, plus design considerations
  • The supported platform and database versions
Read Getting Started with Oracle GoldenGate in full

EJB 3.1: Working with Interceptors

by Richard M. Reese | July 2011 | Cookbooks Enterprise Articles Java

The use of interceptors provides a way of adding functionality to a business method without modifying the business method itself. The added functionality is not intermeshed with the business logic resulting in a cleaner and easier to maintain application. In the previous article we saw how the interceptors provide a means of moving code that is not central to a business method outside of the method. Here, we learn how to use interceptors to handle a number of different concerns including security and transactions.

In this article by Richard Reese, author of EJB 3.1 Cookbook, we will cover:

  • Using interceptors to enforce security
  • Using interceptors to handle transactions
  • Using interceptors to handle application statistics
  • Using lifecycle methods in interceptors
Read EJB 3.1: Working with Interceptors in full

EJB 3.1: Introduction to Interceptors

by Richard M. Reese | July 2011 | Cookbooks Enterprise Articles Java

Interceptors provide a way to achieve cross-cutting activities like logging, managing transactions, security, and other aspects of an application. This article by Richard Reese, author of EJB 3.1 Cookbook, explains how the interceptors provide a means of moving code that is not central to a business method outside of the method. Later we will learn how to use interceptors to handle a number of different concerns including security and transactions in the next article.

In this article, we will cover:

  • Creating the Registration Application
  • Defining and using interceptors
  • Using the InvocationContext to verify parameters
Read EJB 3.1: Introduction to Interceptors in full

Designing User Security for Oracle PeopleSoft Applications

by Ranjeet Yadav | July 2011 | Enterprise Articles Oracle

Security design is a critical part—of any implementation of PeopleSoft Financial application. By its very nature, a financial system needs robust security mechanisms to enforce appropriate controls on who can access the system and which features. PeopleSoft security consists of multiple aspects, such as User security, Row level security, Query security, Network security, Database security, Object security, and Field level security. We'll concentrate on security aspects that are typically configured by a Business Analyst or a Functional SME, that is, User-and Row-level security. Remaining aspects of security involve significant technical knowledge of PeopleSoft's application development environment (known as Application Designer) and security technologies, such as SSL.

In this article by Ranjeet Yadav, author of Oracle PeopleSoft Enterprise Financial Management 9.1 Implementation, we'll discuss user security components such as User Profiles, Roles, and Permission Lists. We'll also discuss how to enable and configure Row level security.

Read Designing User Security for Oracle PeopleSoft Applications in full

SQL Server 2008 R2: Multiserver Management Using Utility Explorer

by Satya Shyam K Jayanty | June 2011 | Cookbooks Enterprise Articles Microsoft

SQL Server 2008 R2 improves the ability to manage multiple servers centrally with Utility Control Point (UCP). In order to manage multiple instances efficiently, there are certain settings available within the Utility Explorer tool. In this recipe by Satya Shyam K Jayanty, author of Microsoft SQL Server 2008 R2 Administration Cookbook, we will focus on how to manage multiple instances using Utility Explorer by setting global policies for data-tier applications (DAC), and managed instances.

Read SQL Server 2008 R2: Multiserver Management Using Utility Explorer in full

Best Practices for Microsoft SQL Server 2008 R2 Administration

by Satya Shyam K Jayanty | June 2011 | Cookbooks Enterprise Articles Microsoft

As a DBA and advanced user of SQL Server 2008 R2, you have to develop best practices that combine a streamline of services for deployment, migration, and management of your data platform. SQL Server 2008 R2 has rich and intuitive GUI management tools, which lower the costs in data management by incorporating automation and delegation of administrative tasks. This article covers the SSMS features that are new and enhanced in SQL Server 2008 R2 to enable operational efficiency in developing the joint best practices and integrated solutions.

In this article by Satya Shyam K Jayanty, author of Microsoft SQL Server 2008 R2 Administration Cookbook, we will cover:

  • Implementing Utility and Non-utility collection sets
  • Designing and refreshing Scalable Share database features and enhancements
  • Managing SQL Server Replication processes
  • Implementing security for SQL Server Agent jobs management
Read Best Practices for Microsoft SQL Server 2008 R2 Administration in full

Microsoft SQL Server 2008 R2: Managing the Core Database Engine

by Satya Shyam K Jayanty | June 2011 | Cookbooks Enterprise Articles Microsoft

The core database engine is the main platform for managing all of the business data for your organization—both archived and current—in a relational database management system. Managing the Core Database Engine, enables the user to produce a resilient data platform, which is possible with new features of SQL Server 2008 R2 such as Utility Control point, multi-server management, and implementing central management feature enhancements.

In this article by Satya Shyam K Jayanty, author of Microsoft SQL Server 2008 R2 Administration Cookbook, we will cover:

  • Implementing Central Management feature enhancements
  • Designing Multi-server management from SQL Server 2008 R2
  • Managing Utility Control Point data warehouse database
Read Microsoft SQL Server 2008 R2: Managing the Core Database Engine in full

An Overview of Oracle PeopleSoft Commitment Control

by Ranjeet Yadav | June 2011 | Enterprise Articles Oracle

Commitment Control is an optional feature of PeopleSoft used for enforcing budget control over an organization's spending. It enables an organization to perform what is known as "encumbrance accounting", or commitment accounting. Using this feature, organizations can define budgets for various categories of their spending and track each spending transaction against available budget amounts. Although commitment control configurations are part of the General Ledger module, it spans many more modules such as Purchasing, Accounts Payable, Expenses, Billing, Accounts Receivable, and so on, which are responsible for creating transactions for spending as well as generating revenue.

In this article by Ranjeet Yadav, author of Oracle PeopleSoft Enterprise Financial Management 9.1 Implementation, we'll cover the following important topics:

  • Understanding commitment control
  • Commitment control configurations
Read An Overview of Oracle PeopleSoft Commitment Control in full
Syndicate content
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software