One can imagine many scenarios where Dynamics CRM either publishes data to BizTalk Server or queries BizTalk-exposed service endpoints. For instance, when a customer requests a refund for a defective product, the call center agent may record this request in Dynamics CRM. After the phone call is over, Dynamics CRM should send a message to a returns processing system which handles the crediting of a customer's account. In another scenario, BizTalk Server may be the host of a data aggregation service which queries three enterprise systems that store "customer" data and aggregates the responses. Dynamics CRM may want to execute that service when a call center agent views a customer record so that they get a fuller picture of that customer's interactions with the company.
In this article by Richard Seroter, author of Microsoft BizTalk 2010: Line of Business Systems Integration, we will see how Dynamics CRM sends data to BizTalk Server.Read Communicating from Dynamics CRM to BizTalk Server in full
Microsoft Dynamics CRM 2011 is the latest and greatest relationship management software from Microsoft. This release of the product introduced a wide range of improvements to the user interface, a new WCF programming model, role-based forms, data analysis dashboards, tight integration with SharePoint 2010, Windows Azure integration, and much more. Dynamics CRM 2011 should be considered by anyone evaluating small or large CRM projects. But how do we make Dynamics CRM an integrated part of our enterprise landscape? This article focuses on that question.
In this article by Richard Seroter, author of Microsoft BizTalk 2010: Line of Business Systems Integration, we will cover:
- What is Microsoft Dynamics CRM and what problems does it solve?
- Why you should integrate Dynamics CRM with BizTalk Server
- How BizTalk Server makes requests to Dynamics CRM
This article by Jeremy Kashel, Tim Kent and Martyn Bullerwell, authors of Microsoft SQL Server 2008 R2 Master Data Services, provides an overview of SQL Server 2008 R2 Master Data Services (MDS), outlining the main features of the product as well as covering the architecture. In addition to covering the architecture, the purpose of this article is to get the reader comfortable with navigating around the main MDS interface, namely Master Data Manager.
In this article, we will cover the following:
- Master Data Services overview
- Master Data Services architecture
- Master Data Manager
XenApp 6 is the leader in application hosting and virtualization delivery, allowing users from different platforms such as Windows, Mac, Linux, and mobile devices to connect to their business applications. It reduces resources and costs for application distribution and management.
In this article by Guillermo Musumeci, author of Getting Started with Citrix XenApp 6, we will learn:
- XenApp 6 and its features
- System requirements for the installation of XenApp 6
Building financial function into Excel, as shown in the previous article, will augment the Excel toolset with user defined functions broadening the abilities of Excel. In this article wee will focus on depreciation, and the value of a dollar.
In this article by Andre Odnoha, author of Excel 2010 Financials Cookbook, we will learn:
- Calculating the depreciation of assets
- Calculating the future versus current value of your money
- Identifying the profitability of an investment
- Calculating and planning for inventory requirements
The objective of this article is to get you started using Oracle GoldenGate 10.4. We will discuss the history and evolution of GoldenGate Software, its success in the market and ultimate Oracle acquisition. You will become accustomed with the concepts of data replication and how GoldenGate provides enterprise-wide solutions to address the business requirements. Although an introduction, this article is designed to inspire thought by drilling into the key components, processes, and considerations required to build and implement a GoldenGate solution.
In this article by John P. Jeffries, author of Oracle GoldenGate Implementer's Guide, we will discuss the following points surrounding GoldenGate:
- The evolution of GoldenGate software
- The technology and architecture
- The solutions offered by GoldenGate
- The architecture and topology of GoldenGate, plus design considerations
- The supported platform and database versions
The use of interceptors provides a way of adding functionality to a business method without modifying the business method itself. The added functionality is not intermeshed with the business logic resulting in a cleaner and easier to maintain application. In the previous article we saw how the interceptors provide a means of moving code that is not central to a business method outside of the method. Here, we learn how to use interceptors to handle a number of different concerns including security and transactions.
In this article by Richard Reese, author of EJB 3.1 Cookbook, we will cover:
- Using interceptors to enforce security
- Using interceptors to handle transactions
- Using interceptors to handle application statistics
- Using lifecycle methods in interceptors
Interceptors provide a way to achieve cross-cutting activities like logging, managing transactions, security, and other aspects of an application. This article by Richard Reese, author of EJB 3.1 Cookbook, explains how the interceptors provide a means of moving code that is not central to a business method outside of the method. Later we will learn how to use interceptors to handle a number of different concerns including security and transactions in the next article.
In this article, we will cover:
- Creating the Registration Application
- Defining and using interceptors
- Using the InvocationContext to verify parameters
Security design is a critical part—of any implementation of PeopleSoft Financial application. By its very nature, a financial system needs robust security mechanisms to enforce appropriate controls on who can access the system and which features. PeopleSoft security consists of multiple aspects, such as User security, Row level security, Query security, Network security, Database security, Object security, and Field level security. We'll concentrate on security aspects that are typically configured by a Business Analyst or a Functional SME, that is, User-and Row-level security. Remaining aspects of security involve significant technical knowledge of PeopleSoft's application development environment (known as Application Designer) and security technologies, such as SSL.
In this article by Ranjeet Yadav, author of Oracle PeopleSoft Enterprise Financial Management 9.1 Implementation, we'll discuss user security components such as User Profiles, Roles, and Permission Lists. We'll also discuss how to enable and configure Row level security.Read Designing User Security for Oracle PeopleSoft Applications in full