The Syntax Blog

Where new ideas come alive.

How Does Online Patching Work in EBS 12.2?

Congratulations! You have just successfully implemented Oracle E-Business Suite 12.2!  After months of testing and working through issues, all your hard work has finally paid off. However, now that the general userbase is in the system, a few small issues have been reported and your DBA has found direct hits that suggest a few application […]

JD Edwards Orchestrator: Orchestration Inputs from Form Extensions

Introduction With JD Edwards Tools Release, Orchestrator designers can now enable end-users to provide input parameters for an orchestration. Use this tutorial to configure the solution for the business scenario presented. Business Scenario In many enterprises, buyers require you to send a copy of the printed purchase order(s) to specific recipient(s). Before this enhancement, […]

How Can Exadata Smart Flash Cache Improve Storage Performance?

For many years, a constraining factor for storage performance has been the number of random I/Os per second (IOPS) that a disk can deliver. Even a high-performance disk can deliver only a few hundred IOPS. To compensate for this, large storage arrays with hundreds of disks are needed to deliver the 60,000 IOPS or more […]

Understanding the Value and Functionality of Oracle EBS Audit Trail

Data is an extremely crucial and sensitive resource for any enterprise that regularly stores classified, confidential business data and information such as customer records, credit card information, and financial details. At the same time, it is essential to understand that corrupt, erroneous, or compromised data is equivalent to lost revenue, lost time, unhappy customers, or […]

Managing HTML Server CPU Spikes in JD Edwards EnterpriseOne

This document is designed to address the issue of CPU spikes on HTML servers where the Java processes are consuming all server resources.  The issue does not clear until HTML services are restarted.  We will address the following possible causes and provide instructions for resolving this issue. Possible causes: Scroll to End Open Find Queries […]

Demystifying Zero Trust for JD Edwards Customers

by Matthew Rogers Global CISO Syntax Introduction With the increasing number of logged threats from cyber-attacks, data breaches, various forms of remote work exposures or bring your own device complexities, it’s important for leaders to implement more secure access control solutions. Many have looked to the Zero Trust architecture, which is one component of how […]