• IBM Consulting

    DBA Consulting can help you with IBM BI and Web related work. Also IBM Linux is our portfolio.

  • Oracle Consulting

    For Oracle related consulting and Database work and support and Migration call DBA Consulting.

  • Novell/RedHat Consulting

    For all Novell Suse Linux and SAP on Suse Linux questions releated to OS and BI solutions. And offcourse also for the great RedHat products like RedHat Enterprise Server and JBoss middelware and BI on RedHat.

  • Microsoft Consulting

    For Microsoft Server 2012 onwards, Microsoft Client Windows 7 and higher, Microsoft Cloud Services (Azure,Office 365, etc.) related consulting services.

  • Citrix Consulting

    Citrix VDI in a box, Desktop Vertualizations and Citrix Netscaler security.

  • Web Development

    Web Development (Static Websites, CMS Websites (Drupal 7/8, WordPress, Joomla, Responsive Websites and Adaptive Websites).

28 May 2013

Oracle Fusion Middleware

Oracle Fusion Middleware

Oracle's complete family of application infrastructure products—from the #1 Java application server to SOA and enterprise portals—are integrated with Oracle Applications and technologies to speed implementation and lower the cost of management and change. Best-of-breed offerings and unique hot-pluggable capabilities provide a foundation for innovation and extend the business value of existing investments.

This comprehensive family of products is now even more seamlessly integrated to help you create, run, and manage agile and intelligent business applications. Oracle Fusion Middleware 11g's
hot-pluggable architecture allows you to make the most of your current investments in applications and technology, while also taking advantage of modern hardware and software architectures. The goal of this release is to maximize your efficiency in both IT and business processes to give you the agility to adapt and innovate. Oracle Fusion Middleware 11g is the foundation for innovation.



Modular Middleware Approach Leverages Existing Investments
Oracle Fusion Middleware's hot-pluggable capabilities enables customers to "drop & deploy" various Oracle Fusion Middleware products into their existing IT environments. Spanning from industry-leading business process management and development tools to best-of-breed identity management and application server technology, hot-pluggable Oracle Fusion Middleware gives customers more choices, long-term flexibility, and better use of their current technology investment. Oracle Fusion Middleware supports the Eclipse development environment in addition to its own JDeveloper SOA development tool, and offers a range of interoperability features for Microsoft .Net and Office.




What is E-Business Suite Release 12?

Oracle’s E-Business Suite Release 12 is Oracle’s latest version of their business applications. Not all EBusiness Suite customers are running this latest release – Oracle has customers still using Releases 10.7/11.0 (though hopefully not many), and a lot of customers are running on various point releases of Release 11i, Release 12’s predecessor. Oracle also supports customers running other business applications, including the JD Edwards, PeopleSoft and Siebel product lines.



What are the Fusion Applications?

The Fusion Applications will unify best-of-breed capabilities from all Oracle Applications in a complete suite delivered on Oracle’s open technology. For those of us who only support the E-Business Suite of Applications, when Oracle says “all Oracle Applications”, they mean the JD Edwards EnterpriseOne, JD Edwards World, Oracle E-Business Suite, PeopleSoft and Siebel product lines.

These new applications will focus on end-to-end business processes like Order2Cash, Procure2Pay, and Hire2Retire. They will provide more cost effective integration, flexible business processes and extensibility and they will fuse processes, people, and products to leverage the best parts of each. The Fusion Applications will embrace a service-oriented and standards-based information architecture.


Fusion Application Design Principles

The application design principles for Fusion are straightforward. First, Fusion Applications must improve business insight by offering real-time operational analysis to enable taking action. They will accomplish this by using Oracle’s Event Driven Architecture, BI Tools, and Dashboards. Second, the Fusion Applications must mirror Adaptive Industry Processes to make it simpler to integrate and customize the applications to match your business requirements. They will accomplish this by using Service-Oriented Architecture (SOA) and Business Process Management (BPM). Finally, the Fusion Applications must provide a better ownership experience. Oracle’s goal is to provide applications that allow zero downtime and increased automation. To do this, Oracle is investing heavily in lifecycle management.

Focus on Business Process Management and Improvement

With Business Process Management (BPM), the various stakeholders, from business analysts to developers to end users can work together to make process improvements using existing applications. Business Process Analysis (BPA) tools simulate business and process models before implementation using real customer data. Business Process Execution (BPE) tools allow customers to implement new processes and then monitor and optimize those processes using Business Process Monitoring (BAM) tools.



Fusion Middleware is the “Enabler”

Oracle has coined the term “the Fusion Effect”, and defines it as the sustainable competitive advantage achieved by continuous blending of business insight and adaptable processes. This effect depends on Fusion Middleware and its family of more than 40 software products. Fusion Middleware leverages the Oracle Application Server 10g (the 11g Application Server is currently in beta testing) and takes advantage of software from many Oracle acquisitions. Of course, Fusion Middleware is built on industry standards, which is what makes it so flexible and adaptable.

Fusion Middleware Areas

Fusion Middleware solutions address several areas, including Development Tools, User Interaction, Business Intelligence, Integration and Process Management, the Application Server, the Grid infrastructure, Systems Management and Identity Management:



Applications Integration Architecture (AIA)

Oracle’s Applications Integration Architecture (AIA) provides an open standards based framework for creating cross-application business processes that support the way you run your business today, while paving the way for your long term, strategic business transformation plans. Powered by Fusion Middleware, the AIA includes a pre-built SOA Integration Layer for BPEL. Best Practice Processes are represented as abstract models and extensible execution flows. Enterprise Business Objects provide a standard definition of business objects. Enterprise Business Services provide a common service definition.


Best of Breed Application Service Components provide logic and data. Hubs are used to Consolidate Key Entities to a common definition.


The AIA components are the Foundation Pack, the Process Integration Packs and the Industry Reference Models. The Foundation Pack leverages SOA (Service-Oriented Architecture) to allow customers to create custom process integrations more quickly and cost-effectively than traditional approaches. The Process Integration Packs provide flexible out-of-the-box process integrations that can be easily extended and  evolved as business requirements change. Oracle’s Industry Reference Models provide customers with tools and documented business process flows to adapt to specific marketplace requirements by using industry best practices.

This architectural model provides an open, standards-based architecture that accelerates time-to-value. The model provides pre-built, sustainable integrations to reduce implementation risk and cost. The extension framework protects your investment from upgrades. Documented best practice reference models help you optimize business operations. The application independent design makes it easy to plug and play new applications, including the Fusion Applications.



Business Intelligence Tools

Business Intelligence (BI) is the process of getting information about your business from available data.

Oracle provides a number of different BI tools, including:


Oracle Business Intelligence Enterprise Edition (OBIEE) – formerly Siebel Analytics, OBIEE is a comprehensive suite of enterprise BI products that deliver a full range of analysis and reporting capabilities

BI Publisher – formerly XML Publisher, is an enterprise reporting solution that allows users to create, manage and deliver all kinds of highly formatted documents

Oracle Discoverer – use this tool for creating and maintaining a business-oriented view of relational data

Business Activity Monitor (Dashboards) – allows executives to monitor key business services and processes and to quickly make changes in business process to take corrective action

Oracle Business Intelligence Warehouse Builder – use this tool to design, implement and maintain a data warehouse environment and the metadata for building reports

Daily Business Intelligence – a set of reporting and analylsis applications that deliver accurate, timely, actionable information to executives, managers and front-line workers


Event Driven Architecture (EDA)

Oracle’s Event Driven Architecture (EDA) is built into the Fusion Middleware products. It allows customers to monitor, analyze and respond to business events and requires minimal coding to do so. Creating a new user, for example, might create a business event that triggers emailing the new user a user guide, or shipping a security token, or scheduling training. EDA is designed to control Workflow, and does so by working outside the Application Suites. EDA leverages Business Activity Monitoring (BAM) and uses Enterprise Messaging (JMS). Best of all, EDA will be interoperable with non-Oracle applications, providing a tremendous amount of flexibility for customers.

Service Oriented Architecture (SOA)

A Service Oriented Architecture (SOA) implements applications as a small series of building blocks, each of which performs a discrete step or function. These blocks are then combined using another software component to create a complete application. By building this solution in a Java Enterprise toolkit, it is possible to create a solution that is based upon vendor-neutral standards, has the potential to interoperate with other applications, and can exploit Grid Computing to its best potential.



Applications Roadmap Overview

The following chart shows the upgrade paths for Oracle’s different product suites:



How the Fusion Applications Fit In

You might say that the Fusion Applications will be just another Applications product line, just like JDE, EBS, PeopleSoft and Siebel are product lines. Customers can choose an end to end solution based on one product line, or they can take a best of breed approach with components for each. For example, a customer could integrate E-Business Suite Financials with PeopleSoft Human Resources and Siebel CRM. It is Fusion Middleware that all customers will use, regardless of the applications product line they choose.



Oracle Fusion MiddlewareOverview and Strategy :


Fusion Technology Essentials:


Fusion MiddleWare for Innovation:



The Road to Fusion - Roadmap Concepts

We leave you with the following recommendations for preparing for Fusion:


Pick Your Fusion Applications “Jump-off Point” – for E-Business Suite, you must be running either Release or Release 12. If you are not running one of those releases and want to migrate to the Fusion Applications when they become available, you will have to upgrade first.

Upgrade to Your “Jump-off Point” as soon as possible.

Upgrade to Oracle Version 10g as soon as possible.

Implement Standard NAS/SAN Utilities for Snapshots

Implement Standard Oracle Utilities like Oracle Enterprise Manager with with the Applications Management Pack (AMP)

Stay Current on your “Jump-off Point”. You’ll need to stay current on the ATG Release Update Pack, year-end patches, and Critical Patch Updates (CPUs).

Evaluate and document your customizations. Determine what customizations you have, map them to Applications functionality and decommission customizations where possible if the Applications provide the same functionality. You’ll want to convert customizations to Fusion technology-based solutions where decommission is not possible. As an example, since we know that Workflow will be replaced by BPEL for the Fusion Applications, now is the time to learn BPEL. Any existing workflow customizations – or new ones – should be written using BPEL.

Start Leveraging Your Available Fusion Tools. Fusion is already here! Fusion tools that can already be used with the E-Business Suite include XML (BI) Publisher, the SOA Suite and WebCenter, and Business Intelligence tools like OBIEE or DBI and Discoverer 10g.



There is no lack of communication on Oracle’s part as to where the Applications are going in the next few years. With what you know about Oracle’s Applications Unlimited support offerings, you can plan your migration to the Fusion Applications today. The Fusion Middleware tools are already here, so you can begin learning to use them now, rather than wait until you have no choice.




WebLogic with TopLink Grid Overview

more information on Oracle Fusion Middleware can be found at these links: 


For more information please contact me at:
Drs. Albert Spijkers
DBA Consulting
web:            http://www.dbaconsulting.nl
blog:            DBA Consulting blog
profile:         DBA Consulting profile
Facebook :   DBA Consulting on Facebook
email:          info@dbaconsulting.nl 

IBM Smarter security helps you protect your data

IBM Smarter security helps you protect your data
IBM Smarter Planet:
 IBM is defining the smarter planet as "intelligent infrastructure for our energy grids, transportation system, food supply and healthcare networks... It is also about trillions of devices and objects connecting to the Internet and changing the way billions of people live and work.'
Security through smarter storage:
IBM Cloud Storage:
As mobile adoption grows, so do threats to mobile security
The projections tell a compelling tale: one billion enterprise smartphones and 1.2 billion mobile workers expected by 2014—with large enterprises tripling their smartphone user base by 2015.2 The adoption of consumer-owned rather than enterprise-dedicated devices in 85 percent of large companies by 2014.2 Half of organizations planning to deploy their own mobile applications within 12 months.2 But with rapid adoption come mounting threats. The need to maintain business agility and to support changing employee behaviors not only will feed continued growth in the use of mobile devices, it will require organizations to find ways to mitigate the operational risks associated with mobility.


While enterprises have learned security lessons from the PC and Internet era, mobility brings both new challenges and the evolution of previous ones. At the top of the threat list are lost and stolen devices, but rogue applications, social engineering, malware, identity theft, stolen data, malicious websites and denial of service are becoming more sophisticated and are constantly on the increase. At the same time, the diversity of platforms and applications, general lack of enterprise visibility and control, and increased complexity in demonstrating regulatory compliance make it more difficult for IT to support mobile initiatives. Most mobile platforms are not natively designed to provide comprehensive security, and with the explosive growth in numbers of mobile devices, hackers have a strong incentive to develop new techniques or create attacks aimed specifically at these devices.

Organizations must therefore put into place tools and processes that enable them to meet threats designed to exploit mobility-related vulnerabilities, including:
Ø  Credentials that enable access to business or personal accounts
Ø  Sensitive data such as confidential business or personal information
Ø  Device communication services
Ø  The mobile device itself, which can be a jumping-off point to accessing other corporate resources
Follow the flow of data
Unprotected endpoint devices are like open doors into sensitive information. Organizations need to guard the data on those devices—whether the data is at rest or in motion over unse-cured networks and infrastructure. Data protection must be the primary objective when developing an enterprise mobile strategy. Effective security for mobile environments should therefore be designed to follow the flow of data and to defend that data from unauthorized access. The design of an adaptive security posture should include policy management and security intelligence to guide the overall initiative as well as capabilities for protecting data throughout the mobile lifecycle.

With diverse devices in use throughout the enterprise— especially when the organization has adopted a “bring your own device” (BYOD) policy—it is first necessary to put into place comprehensive, cross-platform capabilities for managing and securing devices and applications. Secure access to enterprise assets should include secure connectivity with capabilities for managing identities, access and authorization. Conduct vulnerability testing of mobile applications to support the organization’s trust relationships with customers, employees and business partners. Visibility into the full data flow is important for keeping the mobile security program ahead of constantly growing threats. In the world of mobility, more so than in traditional IT environments, it is important that the security model adapt to the user rather than requiring the user to comply with mandates. Another reason for security to adapt to the user is that attacks tend to be more targeted at individuals, departments or organizations rather than being general, mass attacks. It is important to remember that user behavior is different when the issues are mobile devices and mobile access—more emphasis is placed on avoiding disruption of the user experience. The security model that adapts to a user’s mobile context—for example, location, type of content accessed, time of day or risk profile—and that has minimal impact on user experience will help ensure compliance with security policies and ultimately assist in securing enterprise data.

The IBM portfolio ensures business-driven mobile security

IBM takes a holistic approach to mobile security requirements, using the well-established IBM Security Framework as a reference. IBM Mobile Security solutions help customers address challenges in mobile device management, access management, application security and security intelligence. Each not only
delivers mobility-focused capabilities, but is designed to extend and complement existing IT security infrastructures, policies and procedures. Designed to help organizations transition from being reactive to taking the initiative in a constantly changing mobile security landscape, IBM solutions emphasize an integrated, end-to-end security model with visibility across the enterprise, as well as facilitate proactive responses.


Mobile enterprise security roadmap


No matter how capable a mobile security solution is, its value is greatly diminished if it cannot be efficiently deployed or easily managed. The organization needs to carefully assess the overall risks to the enterprise and the effort required for initial roll-out and ongoing management of a solution. To help build an effec-tive mobile enterprise strategy and roadmap, IBM can deliver a range of comprehensive professional security services, either directly or through local business partners.


Building on technology leadership and worldwide engagements with organizations across industries and of all sizes, IBM takes a risk-based approach to securing the mobile enterprise with the following steps:

Securing the mobile device:

Capture detailed device information and identify non- compliant devices;  detect  “jail broken”  or “rooted” devices

Enforce security best practices and take corrective action including updates, denying or removing access, virtual private network configuration and delivery of anti-malware solutions

Remotely locate, lock and perform selective wipes when devices are lost, stolen or decommissionedLeverage a single infrastructure to deliver controls for a broad set of enterprise endpoints including smartphones, tablets, desktops, laptops and servers

Protecting access to enterprise resources:

Deploy context-aware authentication and authorization of mobile users and their devices

Support mobile-friendly open standards such as OAuth

Implement strong session management and protectionExtend the infrastructure employed for protecting access from any endpoint with the ability to address requirements unique to mobile computing

Delivering safe mobile applications:

Support developers with security features including data encryption, direct updates and application validation

Perform vulnerability assessments during development, testing and runtime to mitigate the risk of deploying unsafe applications

Employ a secure channel through which to deliver mobile applications to enterprise mobile usersOffer a secure runtime environment for mobile applications that enables centralized management with application locking

Attaining visibility and delivering an adaptive security posture:

Generate reports on compliance

Assess consistency of security policy enforcement

Be proactive in responding to emerging threats and adapt to changing user behaviors



Why IBM technologies?


With IBM solutions, organizations can support mobile employees, enable mobile collaboration with partners and nurture customer relationships. They can realize new revenue channels as they reduce risk. They can ensure effective security for their mobile environments with capabilities for mobile device management, mobile identity and access management, network and data protection, and mobile application security. The industry-leading IBM X-FORCE® research and development team provides the expertise for a solid, preemptive security approach. The team provides reports documenting all aspects of threats that affect Internet security, as well as maintaining a comprehensive threats and vulnerabilities database that powers the preemptive protection delivered by IBM products. In addition, the team distributes alerts and advisories that provide information about how IBM products and services can protect against the latest threats.

Security intelligence, analytics and governance, risk and compliance At the device Manage device and data People Data Applications IBM Security Framework domains Infrastructure Malware protection Application security Secure access Over the network and enterprise Monitor and protect Secure connectivity Secure applications For the mobile application Integrate securely Manage applications Mobile security strategy and lifecycle management IBM Endpoint Manager for Mobile IBM Mobile Device Security (hosted) IBM Worklight IBM Security Access Manager for Mobile IBM WebSphere DataPower IBM QRadar IBM Lotus Mobile Connect Internet Corporate intranet IBM Security AppScan IBM WebSphere DataPower IBM Worklight Meet mobility needs with IBM solutions

 Security Info Graphics:





Managed security video IBM:

IBM's Managed and Cloud Services solutions offer your organisation a simple, efficient and cost-effective way to delegate time-consuming and complex IT activities

 to learn more visit www-935.ibm.com/services/au/en/it-servic­es/managedservices.html





A video animation made with atoms:


For more information please contact me at:Drs. Albert Spijkers
DBA Consulting
web:            http://www.dbaconsulting.nl
blog:            DBA Consulting blog
profile:         DBA Consulting profile
Facebook :   DBA Consulting on Facebook
email:          info@dbaconsulting.nl 

13 May 2013

RedHat sessions roadmap and RedHat 7 new features

RedHat sessions roadmap and RedHat 7 new features


The presentations and videos from Red Hat's in-house conference provide information on current and forthcoming products from the open source specialist, including version 7 of Red Hat Enterprise Linux.

Red Hat Enterprise Linux (RHEL) 7 will be based on Fedora 18, which is due for release in November and the first public beta of RHEL 7 is scheduled for sometime in the first half of 2013. The open source specialist provided these and several other details of upcoming and planned new products at Red Hat Summit and JBossWorld 2012, its in-house conference held in Boston in the last week of June.

There are, however, still various details to be fleshed out in the plans for the next generation of RHEL. On Btrfs, for example, Red Hat manager Jim Totten told The H's associates at heise Open that they are watching the development of the filesystem and will offer support in RHEL when it is ready. Btrfs is still marked as experimental in the kernel.org Linux kernel, but has been supported in SUSE Linux Enterprise (SLE) and RHEL derivative Oracle Linux since the spring. Btrfs can be used in RHEL 6, but is marked as a technology preview, meaning that Red Hat takes no responsibility if it blows up in the user's face.

Red Hat has not released any concrete information about the actual level of support for Btrfs
Source: Red Hat The "Red Hat Enterprise Linux Roadmap Highlights"
 presentation revealed that RHEL 7 will support ext4, XFS and Btrfs for both data and boot partitions. Whether ext4 will remain the default filesystem or be supplanted by Btrfs is unclear. The presentation slides include further information on enhancements planned for the next generation of RHEL. Version 7 should, for example, fully support Linux containers (LXC) – these are, and will remain, a technical preview in RHEL 6. No specific plans for ARM support in RHEL were officially presented, but Red Hat staff have pointed out that Fedora already runs on ARM. Red Hat is also reported to be working with Linaro to improve Java performance on ARM.

The presentation also discussed some of the changes that have found their way into the recently released RHEL 6.3 and RHEL 5.8, as well as some of the updates planned for RHEL 5.9 and 6.4. The highly informative presentation, in which various Red Hat managers elucidate the new features in their areas, is available as two 50 minute long videos.

In this 'Best of' session at the 2012 Red Hat Summit and JBoss World, Tim Burke, vice president of Linux Engineering at Red Hat, describes feature enhancements in recently released versions of Red Hat Enterprise Linux.

Burke then has his team of engineering development managers highlight their technology area and key initiatives. They also discuss emerging technologies targeted for delivery in future releases.

Burke first gives a brief Red Hat Enterprise Linux life cycle overview, and an explanation of various themes within Linux development today. He then explores timeframes and Red Hat Enterprise Linux 7 feature possibilities and Fedora 18 enhancements.

He then turns the session over to his teams, who present technology area highlights, including information about:

- virtualization
- kernel and virtual memory
- hardware enablement
- storage and volume management
- filesystem and Gluster




This is part 2 of a 'Best of' session with Tim Burke, vice president of Linux Engineering from Red Hat, at the 2012 Red Hat Summit and JBoss World

Tim Burke, vice president of Linux Engineering at Red Hat, briefly summarizes the first half's content, then has a team of engineering development managers highlight their technology area and key initiatives. They also discuss emerging technologies targeted for delivery in future releases.

Areas they discuss in this part include:

- filesystem
- base OS commands and util
- security
- desktop features
- developer tool features





RedHat Roadmap:



RedHat enterprise virtualization:


Among the videos is a recording of a presentation giving an overview of the company's Red Hat Enterprise Virtualization (RHEV) virtualisation product – much of this presentation is taken up with describing new features planned for RHEV 3.1. It will, for example, fully support the platform-independent web administration portal, which will mean the demise of the old Internet-Explorer-based administration interface. Live snapshots and live storage migration are also planned, though the latter will only be included as a technology preview.


In this session from the 2012 Red Hat Summit, Andrew Cathrow, product manager, and Chuck Dubuque, product marketing manager for Red Hat Enterprise Virtualization. They discuss Red Hat virtualization, including Red Hat Enterprise Virtualization 3, and the past, present, and future of virtualization technology.

Dubuque discusses the current environment, including virtualization competitor VMware, and the opportunity that a second source for virtualization--a open standards source--offers.

He then offers details about Red Hat Enterprise Virtualization, including information about management features, hypervisor technology, specVIRT success, and opportunities for cost savings.

Cathow then joins in to talk about development of Red Hat Enterprise Virtualization 3 and 3.1, and the growth of the communities surrounding it, including Fedora and oVirt.

Cathow highlights features and changes in Red Hat Enteprise Virtualization, including:

- OpenJDK requirement for proprietary Oracle JRE is eliminated.
- Support for Jasper 4.7 and two new directory servers
- Scalability to 160 Virtual CPUs per VM and 2T virtual RAM per VM
- enhanced physical to virtual migration (P2V)
- Live snapshots
- Shared disks
- SDK availability
- new top-level manager for managing disks
- direct LUN access

Cathow details many other system and version features, including a overview of key technologies for future versions of Red Hat Enterprise Virtualization and Red Hat Enterprise Linux. He also intermittantly takes questions from the audience.



RedHat 7 New Features: 



The enterprise cloud was a frequent topic of discussion among delegates and was also covered in a number of presentations. Shortly before the conference, Red Hat firmed up its plans for marketing its OpenShift platform-as-a-service (PaaS) and presented four private and hybrid cloud products at the conference. An overview of these and other cloud products and services can be found in the presentation "Red Hat Cloud – Present, Future & Benefits".


In this Best of Session video from the 2012 Red Hat Summit and JBoss World, Bryan Che (senior director of product management in cloud operations at Red Hat), discusses what Red Hat is doing and is planning to do in the cloud. He details Red Hat strategy, our innovative portfolio, and the shape of cloud at Red Hat.



Here are the slides:




For more information on RedHat and support pleased contact me at:

 DBA Consulting
web:            http://www.dbaconsulting.nl
blog:            DBA Consulting blog
profile:         DBA Consulting profile
Facebook :   DBA Consulting on Facebook
email:          info@dbaconsulting.nl