The Syntax Blog

Where new ideas come alive.

JD Edwards Orchestrator: Orchestration Inputs from Form Extensions

Introduction With JD Edwards Tools Release 9.2.6.4, Orchestrator designers can now enable end-users to provide input parameters for an orchestration. Use this tutorial to configure the solution for the business scenario presented. Business Scenario In many enterprises, buyers require you to send a copy of the printed purchase order(s) to specific recipient(s). Before this enhancement, […]

How Can Exadata Smart Flash Cache Improve Storage Performance?

For many years, a constraining factor for storage performance has been the number of random I/Os per second (IOPS) that a disk can deliver. Even a high-performance disk can deliver only a few hundred IOPS. To compensate for this, large storage arrays with hundreds of disks are needed to deliver the 60,000 IOPS or more […]

Understanding the Value and Functionality of Oracle EBS Audit Trail

Data is an extremely crucial and sensitive resource for any enterprise that regularly stores classified, confidential business data and information such as customer records, credit card information, and financial details. At the same time, it is essential to understand that corrupt, erroneous, or compromised data is equivalent to lost revenue, lost time, unhappy customers, or […]

Managing HTML Server CPU Spikes in JD Edwards EnterpriseOne

This document is designed to address the issue of CPU spikes on HTML servers where the Java processes are consuming all server resources.  The issue does not clear until HTML services are restarted.  We will address the following possible causes and provide instructions for resolving this issue. Possible causes: Scroll to End Open Find Queries […]

Demystifying Zero Trust for JD Edwards Customers

by Matthew Rogers Global CISO Syntax Introduction With the increasing number of logged threats from cyber-attacks, data breaches, various forms of remote work exposures or bring your own device complexities, it’s important for leaders to implement more secure access control solutions. Many have looked to the Zero Trust architecture, which is one component of how […]

Zero Trust and SASE: Not Voodoo, Just Greater Security
In spite of what you might hear, Zero Trust (ZT) isn’t voodoo. It isn’t some black magic secret that nobody can decipher. At its core, Zero Trust Architecture (ZTA) takes a bunch of complex controls and makes them doable. Seamlessly. And your Zero Trust journey starts with your ERP. Let’s De-Mystify Zero Trust The National [...]