Do You Recommend Portal??

I have a question on Portal.
1)Is it harder to customize the look of portal pages due to the limited flexibility of using the Wizard for Portal?
2)Overall is this product really right for me if I want to have control on the layout of the page and ease of integrating Java code and Javascript/DHTML code without going through the extra steps of having the Portal layer?
3) To other users, do you recommend this product?
If I get no answer from Oracle, I will assume the answer is that this is not the right product for me.
Thank you
null

I've worked with portals for over 2 years...
In my opinion, if you are a completely Oracle shop (i.e. Most
of your business runs on Oracle Apps and DB, etc), then
Oracle portal makes sense (which is the case at my
company right now). This is because eventually (over next 1-2
years) Oracle will get it right and integrate their other
products by providing portlets for them. Right now, there's
not many out-of-the box integration options with the Oracle
product suite.
Whereas, if your IT environment is fairly heterogeneous
with different app servers, accounting systems, and legacy
systems, and you don't have lots of PL/SQL experience in-house,
then I would recommend looking at other, more flexible and
more mature portal products.
ORACLE IS NOT A PORTAL COMPANY OR PORTAL EXPERT.
If a portal is what you need, then I would go to a pure-play portal
company and get the best portal product (not just one with a big
name on it :)
Two recommendations would be:
- PlumTree for ASP/windows shops and smaller departmental portals.
Large portal market share. http://www.plumtree.com
- Netegrity Interaction Server for enterprise-wide portals.
Its a J2EE-based portal which can run on top of several application
servers. Netegrity bought a pure-play portal company which had
over 3 years of portal experience, and the features and flexibility
of their product is at least 2 generations ahead of Oracle.
http://www.netegrity.com (unfortunately no free downloads.)

Similar Messages

  • I just purchased MBP and it is my first Apple computer. How concerned should I be about virus software and what do you recommend for security software?

    I just purchased MBP and it is my first Apple computer. How concerned should I be about virus software and what do you recommend for security software?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.
    For more information about Gatekeeper, see this Apple Support article.
    4. Beyond XProtect and Gatekeeper, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    5. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was never a good idea, and Java's developers have had a lot of trouble implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style "virus" affecting OS X. Merely loading a page with malicious Java content could be harmful. Fortunately, Java on the Web is mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers. In Safari, this is done by unchecking the box marked Enable Java in the Security tab of the preferences dialog.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a specific task, enable Java only when needed for the task and disable it immediately when done. Close all other browser windows and tabs, and don't visit any other sites while Java is active. Never enable Java on a public web page that carries third-party advertising. Use it only on well-known, password-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow these guidelines, and you’ll be practically as safe from malware as you can be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    8. The greatest harm done by anti-virus software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but they get a false sense of security from it, and then they may behave in ways that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • I am new to Oracle, would you recommend some reading material

    I am new to Oracle, would you recommend some reading material? and the method to study Oracle. I also want to pass the OCA examination.

    Are you going to be a developer or an administrator? Oracle provides a WEALTH of documentaiton. At a minimum I recommend you read the Oracle Concepts Guide for the Oracle version you are using. That will explain in depth how Oracle works. Here is a link to the [Oracle 10gR2 Concepts Guide|http://www.oracle.com/pls/db102/to_toc?pathname=server.102%2Fb14220%2Ftoc.htm&remark=portal+%28Getting+Started%29|Oracle Concepts Guide].
    If you are going to be an administrator continue with the [Administrators Guide|http://www.oracle.com/pls/db102/to_toc?pathname=server.102%2Fb14231%2Ftoc.htm&remark=portal+%28Getting+Started%29|Administrators Guide] and the RMAN [Backup and Recovery Guide. |http://www.oracle.com/pls/db102/to_toc?pathname=backup.102%2Fb14192%2Ftoc.htm&remark=portal+%28Administration%29|Backup and Recovery]
    If you are a developer start reading the [Oracle SQL Reference|http://www.oracle.com/pls/db102/to_toc?pathname=server.102%2Fb14200%2Ftoc.htm&remark=portal+%28Getting+Started%29|SQL Reference] and [Oracle PL/SQL Reference|http://www.oracle.com/pls/db102/to_toc?pathname=appdev.102%2Fb14261%2Ftoc.htm&remark=portal+%28Getting+Started%29|PL/SQL Reference].
    HTH!

  • I used to have an application in my iPhone 4 and 4s that captures business card and creates its content to my contacts. Its no longer working with my i5. Can you recommend me a new apps for this same function

    I used to have an application in my iPhone 4 and 4s that captures business card and creates its content to my contacts. Its no longer working with my i5. Can you recommend me a new apps for this same function

    Try CardMunch it works well for me

  • HT4972 I am unsure of this update. Do you recommend putting my entire itunes library onto a separate hard drive while i do the latest update? I was told everything in my itunes library as well as my ipod touch would be lost if i do the latest update. Plea

    Im unsure of this update. Do you recommend putting my entire itunes library on a separate hard drive while i do this update? I was told everthing in my itunes library as well as my ipod touch would be lost if i update it. Please help.

    Who told you that?
    I would stop listen to him if he is providing that kind of advice.
    Allan

  • What external hard drive to you recommend to free up space on an old Macbook Pro?

    My Macbook Pro is approx. 5 years old. I have since gotten an imac, however would like to use my old Creative Suite 2 on the macbook. When I updated it to "Lion" - it denied access to my creative suite apps. I have since contacted Adobe, and they have given me a solution to get it up and running again, however, my startup disk is just about FULL. Therefore I can't upgrade or really even open more than one app without getting the warning pop up about getting rid of some files asap or risk malfunction of the laptop.
    What external hard drive do you recommend to get the most bang for my buck in terms of offloading a massive amount of photos to in order to be able to use the laptop again?

    Your picture folder would have to be 10 times larger and then it would be close to 1 TB in size.  I have an aphorism, 'one cannot have too much storage'.  If the bank account can afford it, follow Ralph's advice and do go for the larger storage drive.  Given enough time, you might just grow into it..
    Now there is an issue that you should consider.  Since these pictures will no longer be on your MBP, do you want to have them backed up?  If so, you then are going to need an additional HDD to store the backups.  All HDDs will eventually fail, you just do not know when.
    Ciao.

  • HT2589 I just bought an Imac. I have an ipad2 and an iphone 4s. My wife has an iphone 4s. Both of us have different apple ids. Would you recommend a new one or use an existing id?  Why?

    I just bought an Imac. I have an ipad2 and an iphone 4s. My wife has an iphone 4s. Both of us have different apple ids. Would you recommend a new one or use an existing id?  Why?

    It is best to stop making all new apple IDs, as software is permanently tied to them, and you can't converge them. Make differnt ones if you plan to get divorced though....

  • Do you recommend sharing an apple ID with my wife or using my own?

    Currently my wife and I own an Ipad and have one Apple ID which we use for itunes to buy apps and songs and what not and sync to our desktop PC... however I just upgraded through AT&T to our first iphones for each of us... she is getting the free 3gs and I am getting a 4s... woo hoo!
    My question is, should I set up our Iphones all with the same apple ID or should I create a separate @me IDs for each device (her iphone, my iphone and the ipad)?  There are some apps that we would like to be able to share with the Ipad so we don't have to purchase them again and it would be nice to be able to share items through Icloud through all of the devices... but I am sure my wife and I will want to have some different apps on our phones and have different amounts songs, different contacts, pictures and other data... Is it possible to have all of the differentiation within one apple ID and syncing to the same computer on the same Itunes account?  Do you have step by step directions on how to do this or can you point me in the direction of some?  I have been searching and searching online and can not find a good answer... What do you recommend? 
    Please let me know if you need more information on our situation to help you give the best answer... thanks for your help!

    Gottcha... so we will still use the same apple id for setting up nd acivating the phones and downloading apps and such through itunes, but I should create a different @me ID for my wife's iphone, my iphone and our Ipad when setting up icloud?
    So if I take a picture on my iphone, can I then see it on the ipad since it will be on a different @me ID?  Or could my wife see it on her phone?  Or does everyone have to be logged in to the same ID to see and share items?

  • I Mini with an i7 processor. I would like to use Boot Camp to install windows based CAD software on my MAC. Would it be better to use a plugin external hard drive to load my software on and if so what hard drive would you recommend?

    I Mini with an i7 processor. I would like to use Boot Camp to install windows based CAD software on my MAC. Would it be better to use a plugin external hard drive to load my software on and if so what hard drive would you recommend?

    Thank you for your quick response. I can then use a ZIP drive for data storage. I want to keep as much of my hard drive free of data as possible.

  • I have a great number of Hi8 video tapes and I would like to burn them onto CDs through MacBook Pro (ME665LL/A), but I do not know how to transfer those footage into Mac. What would you recommend?

    Hello everybody! My question is; my parents and I have a great number of video tapes (Hi8 and mini DV) and since I purchased a MacBook Pro (ME665LL/A) I would like to burn them onto CDs, but I do not know how to transfer those footage into Mac. What would you recommend(it can be a software, a hardware or combination of both)? By the way, I also purchased an external DVD-RW(Asus SDRW-08D2S) separately.

    Just Google "convert hi8 to dvd" and you'll find a number of software/hardware combinations that will allow you to do what you want. One important piece of the puzzle is whether or not you still have access to the video recorder(s) that the movies were shot on.
    Good luck,
    Clinton

  • I need to buy a camcorder -- upgrading from a Flip. Which would you recommend as easiest to use with iMovie 11? Which for Final Cut Pro? Thanks!

    I need to buy a camcorder -- upgrading from a Flip. Which would you recommend as easiest to use with iMovie 11? Which for Final Cut Pro? Thanks!

    You can't run iMovie 11 on a PPC G5 running the old OS 10.3 Panther - which is what you say you have.
    iMovie 11 - cameras supported:
    http://help.apple.com/imovie/cameras/en/index.html?lang=en_US
    iMovie 9 - cameras supported:
    http://support.apple.com/kb/HT3290?viewlocale=en_US
    iMovie 8 Camcorders supported:
    http://support.apple.com/kb/HT1014
    Digital camera RAW formats supported by OS X Lion:
    http://support.apple.com/kb/HT4757?viewlocale=en_US
    Digital camera RAW formats supported by OS X Snow Leopard:
    http://support.apple.com/kb/HT3825?viewlocale=en_US

  • HT3910 I face problems with the Nvidia 8800 GS on my iMac 24'' 3.06Ghz intel core duo. OS 10.06.08. What can I do to solve the problem and if you recommend upgrade to mountain Lion

    I  face problems with the Nvidia 8800 GS on my iMac 24'' 3.06Ghz intel core duo. OS 10.06.08. What can I do to solve the problem and if you recommend upgrade to mountain Lion

    If you want to sync it to the iPad from that Mac, you need to upgrade it to at least 10.5.8.
    If you want to copy the music to another Mac, you don't. Move the iTunes folder of the item in the Finder's sidebar over as you would any other folder. If you put it somewhere other than the Music folder, launch iTunes with the Option key held down and point it to that location.
    (61713)

  • How do you recommend a JE configuration according to app. construction?

    Hi to all,
    When we use JE as following configuration, CPU utilization is consistently high ans sometimes low.
    How do you recommend a JE configuration according to application construction?
    Our Application and use of JE configuration is as follows.
    - App. logic and JE usage as following;
    Application creates 4 Environments(each one has data-store-Database for class-store-Database). Environments are not linked to each other, completely independent.
    App. executes concurrent non-transactional 1600 inserts(Database.put), 1600 updates(Database.put) and 1600 deletes(Database.put) in a second ( It means 1600/4 inserts, 1600/4 updates, 1600/4 deletes for one environment)
    Also using SerialBinding to store app. object that implements java.io.Serializable.
    Environment.sync method called 1 time in minutes.
    Insert-Update objects are the same and size of the object approximately 500 bytes-1 K.
    %80 of inserted records will be updated 1 time in one second and than deleted in a 5 seconds.
    %20 of inserted records will be updated 10 times in 28,5 hours and than deleted.
    We have 50 GB disk space, totally 24 cpu with model name : Intel(R) Xeon(R) CPU X5675 @ 3.07GHz
    - Our JVM settings as following;
    -Xmx33g
    -Xms33g
    -XX:+UseParNewGC
    -XX:+UseConcMarkSweepGC
    -XX:CMSInitiatingOccupancyFraction=50
    -XX:+PrintTenuringDistribution
    -verbose:gc
    -XX:+PrintGCApplicationConcurrentTime
    -XX:+PrintGCApplicationStoppedTime
    - je.properties as following;
    ## Environment
    je.env.isReadOnly=false
    je.env.isTransactional=false
    je.maxMemoryPercent=30
    je.log.bufferSize=20971520
    je.log.numBuffers=2
    je.log.fileMax=209715200
    je.cleaner.minUtilization=30
    je.cleaner.minFileUtilization=5
    je.cleaner.threads=2
    je.cleaner.lockTimeout=100000
    je.cleaner.expunge=true
    je.cleaner.bytesInterval=104857600
    je.checkpointer.bytesInterval=104857600
    je.checkpointer.highPriority=true
    - Last JE Statistics;
              (1)CacheTotalBytes= The total amount of JE cache in use, in bytes.
              (2)DataBytes= The amount of JE cache used for holding data, keys and internal Btree nodes, in bytes
              (3)AdminBytes= The number of bytes of JE cache used for log cleaning metadata and other administrative structures
              (4)LockBytes= The number of bytes of JE cache used for holding locks and transactions.
              (5)NEvictPasses= Number of eviction passes, an indicator of the eviction activity level.
              (6)NCacheMiss= The total number of requests for database objects which were not in memory.
              (7)TotalLogSize= An approximation of the current total log size in bytes.
              (8)SharedCacheTotalBytes= The total amount of the shared JE cache in use, in bytes.
              (9)NTotalLocks= Total locks currently in lock table.
         Environment-1:(1)=174,757,042 (2)=132,804,551 (3)=9,235 (4)=216 (5)=0 (6)=188 (7)=284,132,682 (8)=0 (9)=2
         Environment-2:(1)=174,803,884 (2)=132,850,463 (3)=10,165 (4)=216 (5)=0 (6)=179 (7)=277,346,265 (8)=0 (9)=2
         Environment-3:(1)=174,739,257 (2)=132,776,071 (3)=19,930 (4)=216 (5)=0 (6)=184 (7)=278,147,194 (8)=0 (9)=2
         Environment-4:(1)=174,767,092 (2)=132,776,471 (3)=47,365 (4)=216 (5)=0 (6)=185 (7)=292,163,876 (8)=0 (9)=2
         Sum of Data-store-Database.count = 1137265
    - Last CPU utilization ;
         top - 10:33:58 up 102 days, 22:42, 3 users, load average: 2.55, 3.22, 3.48
         Tasks: 403 total, 1 running, 402 sleeping, 0 stopped, 0 zombie
         Cpu0 : 2.6%us, 2.3%sy, 0.0%ni, 95.1%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu1 : 6.8%us, 1.3%sy, 0.0%ni, 91.9%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu2 : 3.3%us, 0.3%sy, 0.0%ni, 96.4%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu3 : 8.1%us, 2.3%sy, 0.0%ni, 89.3%id, 0.0%wa, 0.0%hi, 0.3%si, 0.0%st
         Cpu4 : 7.5%us, 2.0%sy, 0.0%ni, 90.5%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu5 : 7.5%us, 1.3%sy, 0.0%ni, 90.9%id, 0.0%wa, 0.0%hi, 0.3%si, 0.0%st
         Cpu6 : 7.1%us, 0.6%sy, 0.0%ni, 92.2%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu7 : 8.4%us, 1.0%sy, 0.0%ni, 90.6%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu8 : 6.5%us, 2.3%sy, 0.0%ni, 91.2%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu9 : 7.5%us, 2.6%sy, 0.0%ni, 89.9%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu10 : 31.2%us, 0.3%sy, 0.0%ni, 68.2%id, 0.0%wa, 0.0%hi, 0.3%si, 0.0%st
         Cpu11 : 2.9%us, 0.6%sy, 0.0%ni, 96.1%id, 0.0%wa, 0.0%hi, 0.3%si, 0.0%st
         Cpu12 : 6.8%us, 0.3%sy, 0.0%ni, 92.8%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu13 : 9.2%us, 2.9%sy, 0.0%ni, 87.6%id, 0.0%wa, 0.0%hi, 0.3%si, 0.0%st
         Cpu14 : 8.1%us, 0.6%sy, 0.0%ni, 91.2%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu15 : 12.1%us, 5.2%sy, 0.0%ni, 81.8%id, 0.0%wa, 0.0%hi, 1.0%si, 0.0%st
         Cpu16 : 2.6%us, 0.6%sy, 0.0%ni, 96.8%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu17 : 12.6%us, 5.5%sy, 0.0%ni, 80.3%id, 0.0%wa, 0.3%hi, 1.3%si, 0.0%st
         Cpu18 : 7.5%us, 0.6%sy, 0.0%ni, 91.9%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu19 : 11.3%us, 4.9%sy, 0.0%ni, 83.2%id, 0.0%wa, 0.0%hi, 0.6%si, 0.0%st
         Cpu20 : 6.8%us, 0.3%sy, 0.0%ni, 92.5%id, 0.0%wa, 0.0%hi, 0.3%si, 0.0%st
         Cpu21 : 8.5%us, 8.1%sy, 0.0%ni, 82.1%id, 0.0%wa, 0.0%hi, 1.3%si, 0.0%st
         Cpu22 : 26.9%us, 0.6%sy, 0.0%ni, 72.1%id, 0.0%wa, 0.0%hi, 0.3%si, 0.0%st
         Cpu23 : 6.5%us, 0.3%sy, 0.0%ni, 92.2%id, 0.0%wa, 0.3%hi, 0.6%si, 0.0%st
         Mem: 49454804k total, 26187100k used, 23267704k free, 1933064k buffers
         Swap: 50331640k total, 66092k used, 50265548k free, 4475980k cached
         PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
         22509 mtsmsc 18 0 34.3g 17g 14m S 260.8 37.6 1552:12 java
         top - 10:16:56 up 102 days, 22:25, 2 users, load average: 5.43, 4.32, 3.31
         Tasks: 400 total, 1 running, 399 sleeping, 0 stopped, 0 zombie
         Cpu0 : 7.3%us, 0.7%sy, 0.0%ni, 92.1%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu1 : 7.7%us, 2.0%sy, 0.0%ni, 90.3%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu2 : 1.7%us, 0.0%sy, 0.0%ni, 98.3%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu3 : 6.3%us, 1.3%sy, 0.0%ni, 92.1%id, 0.0%wa, 0.0%hi, 0.3%si, 0.0%st
         Cpu4 : 2.3%us, 0.3%sy, 0.0%ni, 97.4%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu5 : 6.6%us, 1.3%sy, 0.0%ni, 91.7%id, 0.0%wa, 0.0%hi, 0.3%si, 0.0%st
         Cpu6 : 27.7%us, 0.0%sy, 0.0%ni, 72.3%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu7 : 7.0%us, 1.0%sy, 0.0%ni, 92.0%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu8 : 7.6%us, 0.7%sy, 0.0%ni, 91.4%id, 0.0%wa, 0.0%hi, 0.3%si, 0.0%st
         Cpu9 : 7.0%us, 2.7%sy, 0.0%ni, 90.4%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu10 : 6.3%us, 2.0%sy, 0.0%ni, 91.7%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu11 : 7.3%us, 2.3%sy, 0.0%ni, 90.4%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu12 : 3.0%us, 2.0%sy, 0.0%ni, 95.0%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu13 : 9.3%us, 3.3%sy, 0.0%ni, 86.4%id, 0.0%wa, 0.0%hi, 1.0%si, 0.0%st
         Cpu14 : 5.0%us, 0.3%sy, 0.0%ni, 94.7%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu15 : 11.3%us, 5.6%sy, 0.0%ni, 81.8%id, 0.0%wa, 0.3%hi, 1.0%si, 0.0%st
         Cpu16 : 6.3%us, 0.3%sy, 0.0%ni, 93.4%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu17 : 11.9%us, 5.6%sy, 0.0%ni, 81.5%id, 0.0%wa, 0.0%hi, 1.0%si, 0.0%st
         Cpu18 : 40.9%us, 0.0%sy, 0.0%ni, 59.1%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu19 : 10.6%us, 4.3%sy, 0.0%ni, 84.4%id, 0.0%wa, 0.0%hi, 0.7%si, 0.0%st
         Cpu20 : 2.3%us, 0.7%sy, 0.0%ni, 96.7%id, 0.0%wa, 0.0%hi, 0.3%si, 0.0%st
         Cpu21 : 14.9%us, 6.6%sy, 0.0%ni, 76.8%id, 0.0%wa, 0.3%hi, 1.3%si, 0.0%st
         Cpu22 : 5.6%us, 0.3%sy, 0.0%ni, 94.0%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
         Cpu23 : 3.3%us, 0.7%sy, 0.0%ni, 95.7%id, 0.0%wa, 0.0%hi, 0.3%si, 0.0%st
         Mem: 49454804k total, 33344956k used, 16109848k free, 1931968k buffers
         Swap: 50331640k total, 66092k used, 50265548k free, 11654696k cached
         PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
         22509 mtsmsc 18 0 34.3g 17g 14m S 260.4 37.6 1511:00 java
    Many thanks in advance.
    Edited by: 906759 on Jan 16, 2012 1:12 AM

    When we use JE as following configuration, CPU utilization is consistently high ans sometimes low.Do you consider this a problem? Or are you just asking for general tuning advice? Normally, high CPU utilization is considered to be a good thing.
    Some additional questions:
    * What version of JE are you using? If you are writing a new app, be sure to use JE 5.0.
    * What is the total/maximum size of your data set?
    * What is the key size (byte length)? (I see the data size is 0.5 to 1.0 KB)
    * Are there no read operations?
    * You mention throughput numbers (for example "%80 of inserted records will be updated 1 time in one second"). Is this a goal, or the measured value in your test, or both?
    A couple initial comments:
    * Calling Environment.sync is not appropriate for durability in JE 5.0, and will negatively impact performance. Instead use Environment.flushLog.
    * Using multiple Environments in a single process is not recommended for maximum write performance. A single Environment with a shared cache (EnvironmentConfig.setSharedCache(true)) will result in better write throughput, because all writes are appending to the same log file and disk head movement is minimized.
    * You may see better performance by using the DPL (persist package) or a custom binding, rather than SerialBinding. In general, if you find you are CPU-limited, take several thread dumps during this period too see if most threads are executing in the same place.
    Performance tuning is an iterative process. Be sure to try only one change at a time to determine whether the impact is positive or negative.
    --mark                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                           

  • Which Case Do you Recommend?

    I purchased a Black Nano for my husband for Christmas. I would like to order him a case soon to have for Christmas. I have looked at the Agent 18 Case. Which one would you recommend? I know that there is a certain way that you put on this case. Also, does it take away from the black? Please give me your recommendations for a case. Thanks

    Hi,
    I'd have to say that I'd recommend the iSkin Duo Nano case without a second thought. I have one for my iRiver H140 as well and its never been out of it since installed. Same with the nano.
    They are beautifully made, have 2 layers of protection, come in some cool colours and have screen/click wheel protectors.
    Its changed the way I use my nano. Before I was always a little nervous about putting it in a bag or pocket. Now I don't worry.
    There a belt clip for jogging and all 'holes' are covered when not in use. The only access is to the hold switch.
    The only issue, as with all cases, is that if you have an iPod dock then it will no longer fit.
    If silicone is your weapon of choice then look no further.
    Hope this is of use.
    NIALL 8-)

  • HT201210 My Ipod-touch was ios5 when I bought. You recommend to upgrade ios6, because set-up icon always shows me "+".  For that on facebook I can't see wall photos. So I want my ipod touch to be back as initial version ios5. How can I do? please tell me.

    My Ipod-touch was ios5 when I bought. You recommend to upgrade ios6, because set-up icon always shows me "+".  For that on facebook I can't see wall photos. So I want my ipod touch to be back as initial version ios5. How can I do? please tell me.

    Unfortunately, I don't think it solved the problem. I believed the new iPod thing solved the weird behavior problem, but after that the button stopped working.
    Do you know how to contact Genius? Because I don't think I can find a store in my area, when I tried to.

Maybe you are looking for