Introduction Most are familiar with the occasional discrepancies between the Item Ledger (F4111) and the On Hand Item Location (F41021); in fact, discussions around the topic go back as early as 2006. As of today, there isn’t a definitive answer to the cause. It could be timing, it could be record lock, or perhaps an […]
Gartner expects most enterprise data centers to move to the cloud by 2025. And that 99% of security failures will be the result of customer configuration errors, which can be combated by implementing and enforcing policies on cloud ownership, responsibility, and risk acceptance. For a successful cloud migration, customers should follow a life cycle approach […]
Introduction Most are familiar with the occasional discrepancies between the Item Ledger (F4111) and the On Hand Item Location (F41021); in fact, discussions around the topic go back as early as 2006. As of today, there isn’t a definitive answer to the cause. It could be timing, it could be record lock, or perhaps an […]
Congratulations! You have just successfully implemented Oracle E-Business Suite 12.2! After months of testing and working through issues, all your hard work has finally paid off. However, now that the general userbase is in the system, a few small issues have been reported and your DBA has found direct hits that suggest a few application […]
Gartner expects most enterprise data centers to move to the cloud by 2025. And that 99% of security failures will be the result of customer configuration errors, which can be combated by implementing and enforcing policies on cloud ownership, responsibility, and risk acceptance. For a successful cloud migration, customers should follow a life cycle approach […]
Introduction With JD Edwards Tools Release 9.2.6.4, Orchestrator designers can now enable end-users to provide input parameters for an orchestration. Use this tutorial to configure the solution for the business scenario presented. Business Scenario In many enterprises, buyers require you to send a copy of the printed purchase order(s) to specific recipient(s). Before this enhancement, […]
For many years, a constraining factor for storage performance has been the number of random I/Os per second (IOPS) that a disk can deliver. Even a high-performance disk can deliver only a few hundred IOPS. To compensate for this, large storage arrays with hundreds of disks are needed to deliver the 60,000 IOPS or more […]
Data is an extremely crucial and sensitive resource for any enterprise that regularly stores classified, confidential business data and information such as customer records, credit card information, and financial details. At the same time, it is essential to understand that corrupt, erroneous, or compromised data is equivalent to lost revenue, lost time, unhappy customers, or […]
One of our clients wanted to optimize their Business Intelligence (BI) 11g footprint from a 2-node cluster to single-node cluster. Listed below are some of the steps which should help you achieve this result. Prerequisites Perform a backup of the environment, node-1 and node-2 including the database Perform a backup of the configuration files biee-domain.xml, […]
This document is designed to address the issue of CPU spikes on HTML servers where the Java processes are consuming all server resources. The issue does not clear until HTML services are restarted. We will address the following possible causes and provide instructions for resolving this issue. Possible causes: Scroll to End Open Find Queries […]