GG Director and Monitor

Hi ,
i'm new for GG, We are going to implement GoldenGate tool for our replication purpose. can any one help on the below queries?
1. what is the difference between GG director and GG monitor?
2. Can we install gg monitor alone ? why we need director ? director is instead of ggsci ?
3. what are the prerequisites for GG monitor on Solaris server with oracle 11.2 ?
4. is there seperate unix and database user required for gg Monitor?
Thanks

1. what is the difference between GG director and GG monitor?GG director was what Oracle acquired when it took over GoldenGate software. GG monitor is a new GUI stuff meant for monitoring GG configurations including STOPs, ABENDs, LAGs etc...you can also configure mail alerts for the parameters you would like to monitor.
2. Can we install gg monitor alone ? why we need director ? director is instead of ggsci ? You can. Both director and monitor are separate products and can be used independently.
3. what are the prerequisites for GG monitor on Solaris server with oracle 11.2 ?GG software version has to be 11.1.1.1 or above (i think i wrote that correctly but please verify). About installing on Solaris and any prerequisites for that, please refer to the documentation at docs.oracle.com
4. is there seperate unix and database user required for gg Monitor?
Yes a separate database that will be used as repository.

Similar Messages

  • How to trace changes in directories and files in windows using java.

    Hi,
    Want to know how to trace changes in directories and files in windows using java.
    I need to create a java procedure that keeps track of any changes done in any directory and its files on a windows System and save this data.
    Edited by: shruti.ggn on Mar 20, 2009 1:56 AM

    chk out the bellow list,get the xml and make the procedure.....     
         Notes          
    1     Some of the similar software’s include HoneyBow, honeytrap, honeyC, captureHPC, honeymole, captureBAT, nepenthes.     
    2     Some of the other hacking software’s include keyloggers. Keyloggers are used for monitoring the keystrokes typed by the user so that we can get the info or passwords one is typing. Some of the keyloggers include remote monitoring capability, it means that we can send the remote file across the network to someone else and then we can monitor the key strokes of that remote pc. Some of the famous keyloggers include win-spy, real-spy, family keylogger and stealth spy.          
    3     Apart from theses tools mentioned above there are some more tools to include that are deepfreeze, Elcomsoft password cracking tools, Online DFS, StegAlyzer, Log analysis tools such as sawmill, etc.

  • What is the best product for network mapping and monitoring? I am an inexperienced user). Mac 10.9.2 laptop

    I have lots of questions, but the gist is that I want to know the best product, preferably from the app store, that I can use for network mapping mapping and monitoring.
    I want to get their mac address or other police trackable etc info so I can use my computer safely.
    I am also being cyberbullied.
    I try just using ethernet but still get intruded on, for instance, messages that "other devices are using my ip address". The only other device I own is an iPod that I keep sahut off plus wifi turned off then.
    (NOTE:  You can skip the rest of this message if you want. It regards hacking attempts etc,  a little out of the scope of discussion, perhaps).
    Also a home intrusion where computer was thoroughly hacked with router(s) set up "very very close to me," according to Apple.
    Also, hackers get into my Facebook and gmail and yahoo mail, really,  no matter what I try to do on my computer and how many times I change passwords it does no good.
    Also,  The ip addresses for google and the one in syste preferences and the one looking up my ip address on ip chicken always gets three different results.
    More worrisome it that hackers got into my Wells Fargo account a week after the intrusion even though I changed all account #'s and pw plus notified bank. They also broke into paypal using my new account numbers.
    Also, stuff like Facetime pops up on my computer without my clicking on it even though I'm using ethernet to connect. I've given up on Time Capsule because I'm told that's how the hackers hacked my computer so thoroughly duriung the intrusion.
    Thanks.

    Aubry,
    why don't you send your sequences straight to Compressor first, encode your movies as MPEG 2 and AC3 audio and import all assets in DVD studio PRO?
    G.

  • Create Remote Control and Monitor VI

    Hi all,
    I have 2 VIs. One is PC Host VI and other is cFP2200  real-time running VI.
     Now I can use PC host and cFP shared variable to control and monitor in the same network.
    But I have a problem that I need 2 or more cFP in the same network.How can I seprate to control themone by one?
    They are using the same program but set with different IP.
    Does shared variables are using fix IP and can I type the cFP2000 network IP in PC Host VI to select different cFP?
    How to do ?
    Thanks.
    Robert

    Hello Robert,
    You will need to use a separate shared variable for each cFP. You can create a Case Structure in your Host VI to select which shared variable to use based on which cFP you select. I think that's the simplest option for you.
    There is also a way to programmatically change the data binding for a shared variable, but this requires the DSC Module. Take a look at this article if you want to check out this option: http://digital.ni.com/public.nsf/allkb/2E8BAD0EA218A7558625712E0003F044?OpenDocument
    Product Support Engineer
    National Instruments

  • EMIEsitelist and EMIEuserlist hidden directories and dat-files

    2014-04-05
    Cross-posted from
    http://answers.microsoft.com/en-us/windows/forum/windows8_1-security/erniesitelist-and-ernieuserlist/00407bd2-e349-423c-a8e5-cb6127840ea5
    Original Post dated April 21, 2014
    EmieSiteList and EmieUserList
    Microsoft Security - Privacy Concerns
    I found two unknown directories on my PC in my user profile.  I have, so far, been unable to identify what put them there, which process owns them, and when I delete them (using Admin escalated privileges) they come back after a few minutes or immediately
    after reboot.
         c:\users\USERNAME\appdata\local\EmieSitelist\container.dat
         c:\users\USERNAME\appdata\local\EmieUserlist\container.dat
         C:\Users\USERNAME\AppData\LocalLow\EmieSiteList\container.dat
         C:\Users\USERNAME\AppData\LocalLow\EmieUserlist\container.dat
    It was time, anyway, so I wiped the drive using factory low-level overwriting and performed a clean install of Windows 8.1 Pro using a freshly downloaded ISO from Microsoft; one with an ESD distribution, written to a new just out-of-the-bedamned-hardshell-plastic
    flashdrive..
    I just completed the clean install, in this sequence:
    Boot to flashdrive and let Windows create partitions then install.  Reboot.  Check AppData; no folders found.
    Activate.  Check AppData; no folders found.
    Run first Update; install everything except Bing Bar and Desktop.    Check AppData; no folders found.  Reboot.  Check AppData; no folders found.
    Add Feature Windows Media Center.  Check AppData; no folders found.  Reboot.  Check AppData; no folders found.
    Run Updates a second time.  Check AppData; no folders found.  Reboot.  Check AppData; no folders found.
    Remove MS C++ v12 x86 and x64 installed during Update.    Check AppData; no folders found.  Reboot.  Check AppData; no folders found.
    Download from MSDN (http://msdn.microsoft.com/en-us/vstudio/default) Redistributables MS C++ x86 and x64, 2005, 2008, 2010, and 2012.4 versions, and install in sequence.  Check AppData
    after each install; no folders found.  Reboot after each install and check AppData; no folders found.
    Run Updates a third time.  Response was No Updates Available.  Check AppData; no folders found.
    Reboot.  Check AppData; all four sub-directories are now present.
    These sub-directories and dat-files are not, so far, present in the AppData\Roaming directory.
    There is nothing except Microsoft Windows 8.1 Pro WMC and the 10 MS C++ packages installed; and MS Silverlight and AMD (videocard) Catalyst Control Center on the machine.  Windows Defender is present but is installed as part of Windows 8 and 8.1;
    and its' updates are provided via the MS Update process.  All - repeat ALL of these items are provided by Microsoft.
    My questions are:  What are the Emie directories for; what program created them, and what does the various container.dat files "contain"?  And . . . if not absolutely necessary, How do I get rid of them and keep them from coming back?
    First attempt at Solution:
    Permissions are Full for System, USERNAME, and group Administrators.  The USERNAME is the Owner, and Effective Permissions for each of the 3 is Full.
    Open Command Prompt (Admin)
    C:\Windows\system32>cd\
    C:\>attrib -r -h +s C:\Users\USERNAME\AppData\Local\EmieSiteList\container.dat
    C:\>attrib -r -h +s C:\Users\USERNAME\AppData\Local\EmieSiteList
    C:\>attrib -r -h +s C:\Users\USERNAME\AppData\Local\EmieUserList
    C:\>attrib -r -h +s C:\Users\USERNAME\AppData\Local\EmieUserList\container.dat
    C:\>attrib -r -h +s C:\Users\USERNAME\AppData\LocalLow\EmieUserList\container.dat
    C:\>attrib -r -h +s C:\Users\USERNAME\AppData\LocalLow\EmieUserList
    C:\>attrib -r -h +s C:\Users\USERNAME\AppData\LocalLow\EmieSiteList
    C:\>attrib -r -h +s C:\Users\USERNAME\AppData\LocalLow\EmieSiteList\container.dat
    C:\>
    BOTH Files and Directories are no longer Hidden.  The Directories still show that the files within are READ-Only, but checking the actual file shows that it is no longer R-O.
    I then deleted each of the 4 directories and  closed Windows (File) Explorer.
    After less than 3 minutes reading pages on the internet (at Microsoft's Ask Windows Community), I opened Windows Explorer to check and found that the sub-directories had re-created themselves in both the Local and LocalLow directories.
    The container.dat files were back in the Local sub-dir and after another few minutes, also back in the LocalLow sub-dir.
    Both the sub-directories and the container.dat files are once again Super-Hidden.
    Analysis using Windows utilities and SysInternals and NirSoft tools have not identified which object or process or service owns these objects.
    ADDED:  My system is a home system, not connected to any work domain via VPN or otherwise.  WHY is the Windows Update Team not spending time to implement condition-and-error-checking to ensure that unneeded updates, services, and changes are not made
    without the system owner/operator permission?  Further, WHY is this particular issue so hard to find info about; what is being kept from customers and why?

    Dear sir Shovel Driver,
       About:  EMIEsitelist  and  EMIEuserlist
    .., hidden directories and dat-files
    Internet Explorer 11 (on Windows 7 and Windows 8.1) provides increased performance, improved security, and support for the modern technologies like HTML5 and CSS3 that power today’s Web sites and services. By adding better backward compatibility with
    Enterprise Mode, Internet Explorer 11 now helps customers stay up to date with the latest browser—and facilitates using the latest software, services, and devices.
    IE11 Enterprise Mode can be set in the Group Policy Console, or by adding a
    Registry setting:
    REGISTRY:
    Windows Registry Editor Version 5.00
    [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer]
    [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main]
    "EnterpriseMode"="Disable"
    [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode]
    Or a edit a Group Policy setting, which you can find under:
    [Windows-Key]+[R]->[Run]->Type here:
       gpedit.msc
    Press [Enter], with an UAC Warning:
    Do you want to allow the following program to make changes on this computer:
    gpedit.msc ?
    Select/Press: Yes
    Go to in the Left pane of the GPedti.msc Window:
      Computer Configuration
      Administrative Templates
      Windows Components
      Internet Explorer
    Change / Add at right list, down under:
      "Use the Enterprise Mode IE website list"
    Set this option to - whatever you need;  Disabled,
    Enabled (Default is: Not Configured)
    When Enabled, you need to add a list with Web-Sites, Domains or Web-Pages.
    This policy setting lets you specify where to find the list of websites you want opened using Enterprise Mode IE, instead of Standard mode, because of compatibility issues. Users can't edit this list.
    If you enable this policy setting, Internet Explorer downloads the website list from your location
      (HKCU or HKLM\Software\policies\Microsoft\Internet Explorer\Main\EnterpriseMode),
    opening all listed websites using Enterprise Mode IE, Web-Sites are seperated by a sign: "
    If you disable or don't configure this policy setting, Internet Explorer opens all websites using Standards mode.
    Now to
    properly close and conclude this
    mystery:
    EMIEsitelist and EMIEuserlist
    .., are hidden directories and dat-files
    Thses directories and dat files are used to store data for the IE11
    EnterpriseMode.
    It is not a: Virus, neither it is a Trojan, Hoax, KeyLogger or anything else bad.
    TECHNET Sources:
     Turn on Enterprise Mode and Use a Site List (Deploy):
     http://technet.microsoft.com/en-us/ie/dn262703.aspx
     What is Enterprise Mode?:
     http://technet.microsoft.com/library/dn640687.aspx
    If you find this usefull, please Vote at the button
    "I Find This Usefull"
    Thank you! ;)
    Best regards, MPVS
    MP|VS

  • How to connect an external hard drive and monitor a single port thuderbolt

    how to connect an external hard drive and monitor a single port thuderbolt

    Yu connect the HDD to your Mac and then the monitor to the HDD.
    The HDD  should have TWO T-Bird ports on the enclosure.
    Its called daisy chaining and up to five devices can be connected in this fashion.

  • Hello, I have a Mac computer with NVIDIA 750M dedicated graphics card and monitor EIZO but the problem was there when I was working with Windows and Acer monitor. When I open a file from Camera Raw in PS this is smaller than the screen so I double-click w

    Hello, I have a Mac computer with NVIDIA 750M dedicated graphics card and monitor EIZO but the problem was there when I was working with Windows and Acer monitor. When I open a file from Camera Raw in PS this is smaller than the screen so I double-click with the tool "hand" to fit on the screen, but the picture loses sharpness and becomes blurry. If you magnify the image even only slightly with the tool "zoom" the picture comes back clear. In Camera Raw instead is always sharp. I solve the problem by turning off the graphics card in PS but often use plugin that need the graphics card otherwise the processing time is much longer. I ask for help.
    Thanks.

    Hello, I have a Mac computer with NVIDIA 750M dedicated graphics card and monitor EIZO but the problem was there when I was working with Windows and Acer monitor. When I open a file from Camera Raw in PS this is smaller than the screen so I double-click with the tool "hand" to fit on the screen, but the picture loses sharpness and becomes blurry. If you magnify the image even only slightly with the tool "zoom" the picture comes back clear. In Camera Raw instead is always sharp. I solve the problem by turning off the graphics card in PS but often use plugin that need the graphics card otherwise the processing time is much longer. I ask for help.
    Thanks.

  • Have a problem with my MacBook Pro.5,3 and monitor.  Intermittently, the desk top screen becomes broken up into vertical sections, which appear in the wrong order, creating a haphazard picture.    The Apple icon, usually at top left corner, appears in to

    have a problem with my MacBook Pro.5,3 and monitor.  Intermittently, the desk top screen becomes broken up into vertical sections, which appear in the wrong order, creating a haphazard picture.
    The Apple icon, usually at top left corner, appears in top right corner  in a strip including all that left hand.  When the computer is restarted, the screen goes back to normal.  But I have to move the mouse to the far left of the screen and then up until it reappears on the far right hand side of the screen so that I can hit shut down button.
    It seems to happen randomly though always on desk top and sometimes when I move mouse and computer switches on from rest mode.   My large flat screen is relatively new.
    The video card on this computer, which is approximately two years old, is Nvidia FeForce 9400M.
    Any help would be welcome as my usual source of assistance is not available and I am not well versed in workings of the Mac although I have used one for many years.

    That sounds like a Hardware problem.
    You may be able to confirm that with Apple Hardware Test, or make an appointmenst for a free Genius Bar evaluation.

  • How to install the windows7 agent and monitor the same machine

    Hi ,
    I have installed OMS on Oracle Linux 5.7-64 bit machine. Now I am able monitor the OIM which is installed on Linux. I have some of oracle applications (domains) on windows7 machine. I want monitor the same. On em, agent deployment page I am not able to see the windows agents.
    Can you please guide me how to install the agent on windows and monitor the same?
    OEM version: 11.1.0.1
    Thanks in advance
    Regards,
    Kishore Tummeti

    If you just need to install some agents on Windows the best (imho) option is not to use the push option because getting Cygwin to run can take hours (if at all).
    Here you find a good instruction how to install the agent by hand: http://www.peasland.net/?p=122
    Sometimes the –silent mentioned in step 4b needs not to be put as second argument but as last argument.
    Eric

  • Performance analysis and monitoring of a Forteapplication

    Hello,
    It would be good if one could do some performance analysis and monitoring of
    a Forte application at production time.
    By performance analysis I mean measure the time some selected methods take
    to return. In a CS application such a method would be some selected method
    of a key remote service representative of the application's activity.
    One would like to mesure the min, max, average time, and also give a
    threshhold which when reached will automatically generate an alarm or some
    pre-defined processing.
    The most powerful way would be to use a SNMP application through a Forte -
    SNMP gateway. (see the G. Puterbaugh paper "Building a Forte-SNMP gateway"
    in the 96' Forte Forum proceedings).
    But before going that far some simple means accessible through EConsole
    would already be great.
    A collegue of mine when to that Forum and reported that Puterbaugh said that
    such an agent is currently missing, but that its implementation is not
    difficult.
    I looked at all the agents and their instruments. I came to the following
    conclusions :
    1) instrumented data are available at the granularity level of a partition,
    not at a smaller granularity. For example, the DistObjectMgr agent gives you
    very useful information : the number of events (sent/received) and the
    number of (remote) methods (called/invoked), but this for the entire
    partition. Thus it prevents making tuned observations (unless you partition
    in a special way your application to put in a dedicated partition the thing
    you want to observe and only this thing).
    2) there is no instrumented data related to processing time.
    This leads me to the point that no information observed by the standard
    agents help me figuring out my performances. Thus I have to add at
    development time some lines of code to the methods I potentially want to
    observe later at production time to generate the appropriate information a
    custom agent will then display (process) with the appropriate instruments.
    Does someone share this position ?
    Has someone implemented such an agent and assotiated means ?
    PS: I will probably implement my own one if no other way around.
    best regards,
    Pierre Gelli
    ADP GSI
    Payroll and Human Resources Management
    72-78, Grande Rue, F-92310 SEVRES
    phone : +33 1 41 14 86 42 (direct) +33 1 41 14 85 00 (reception desk)
    fax : +33 1 41 14 85 99

    Hello,
    It would be good if one could do some performance analysis and monitoring of
    a Forte application at production time.
    By performance analysis I mean measure the time some selected methods take
    to return. In a CS application such a method would be some selected method
    of a key remote service representative of the application's activity.
    One would like to mesure the min, max, average time, and also give a
    threshhold which when reached will automatically generate an alarm or some
    pre-defined processing.
    The most powerful way would be to use a SNMP application through a Forte -
    SNMP gateway. (see the G. Puterbaugh paper "Building a Forte-SNMP gateway"
    in the 96' Forte Forum proceedings).
    But before going that far some simple means accessible through EConsole
    would already be great.
    A collegue of mine when to that Forum and reported that Puterbaugh said that
    such an agent is currently missing, but that its implementation is not
    difficult.
    I looked at all the agents and their instruments. I came to the following
    conclusions :
    1) instrumented data are available at the granularity level of a partition,
    not at a smaller granularity. For example, the DistObjectMgr agent gives you
    very useful information : the number of events (sent/received) and the
    number of (remote) methods (called/invoked), but this for the entire
    partition. Thus it prevents making tuned observations (unless you partition
    in a special way your application to put in a dedicated partition the thing
    you want to observe and only this thing).
    2) there is no instrumented data related to processing time.
    This leads me to the point that no information observed by the standard
    agents help me figuring out my performances. Thus I have to add at
    development time some lines of code to the methods I potentially want to
    observe later at production time to generate the appropriate information a
    custom agent will then display (process) with the appropriate instruments.
    Does someone share this position ?
    Has someone implemented such an agent and assotiated means ?
    PS: I will probably implement my own one if no other way around.
    best regards,
    Pierre Gelli
    ADP GSI
    Payroll and Human Resources Management
    72-78, Grande Rue, F-92310 SEVRES
    phone : +33 1 41 14 86 42 (direct) +33 1 41 14 85 00 (reception desk)
    fax : +33 1 41 14 85 99

  • How do I get a list of directories and sub-directories?

    Hi All,
    I'm new to Java and have a couple of questions that are really stumping me and I sure could use some help.
    Question 1:
    I have this class file that I want to return back me a list of directories and only directories, not files. I can't figure out how to do this. I know I need to use the isDirectory() function but I can't figure out how to use it. The class file currently is returning back both directories and files. Please help!
    Question 2:
    Once I get the list of directories, I need to also get a listing of all subdirectories to form a directory tree starting at my File dir value (example: C:\Windows) in the constructor. Any ideas?
    Thanks
    import java.io.*;
    public class DirList {
         private String list = "";
         public DirList(File dir){
              File f = new File(dir.toString());
              String[] files = f.list();
              for ( int i=0;i<files.length; i++ ){
                   list += files[i] + "\n";
              }  // end for
         }  // end constructor
         public String getList(){
              return list;     
         }  // end method getList
    }  // end class DirList

    I'm not familiar of the recursion technique that you speek of. If
    this would work, please share it with me.Okay, i'll try, I assume that you don't care what level a subfolder is right! With a selected folder (from fileChooser), you want to obtain a list of all subfolders.
    After you have select a folder from the filechooser
    import java.io.File;
    import java.util.ArrayList;
    public class AllSubFolders
      private static ArrayList allSubFolders = new ArrayList();
      public static void main(String [] args) {
        File selectedFolder = ....; //a folder seleted from the filechooser
        getSubFolder(selectedFolder );
      public static void getSubFolder(File aFolder) {
        File[] file = aFolder.listFiles();
        for (int n = 0; n < file.length; n++) {
          if (file[n].isDirectory()){
         allSubFolders.add(file[n]);
         System.out.println(file[n].getAbsolutePath());
         getSubFolder(file[n]); //recursion method call
    }You can see that getSubFolder() method call it self, it will do right down to the end of the tree, try it out by replacing the line
    File selectedFolder = ....; to
    File selectedFolder = new File("c:\\yourFolder\\");

  • How to give browse and monitor only options of an ICM script to a certain group?

    I am looking for an option in the Feature Control Set, how to give "Browse and Monitor" only options for a certain group in our contact centre. If someone give me some clue, it would be appreciatable.

    Hello Praveen,
    This work at some point. But it's not resolving what I intend to do. When I give "Read Only" previledge, to the certain group, it won't be able to do other tasks what they do day to day. I am looking specifically to give read only previledge in the scripting level. Not at the configuration level.
    Thanks.

  • Mapping and Monitoring all the User and the Field exits

    Hello Dears,
    Are possible, with the Solution Manager to map and monitor all the user and the field exists existing in my ECC6 Productivity Environment?
    Anyone has some documentation?
    Regards to all.
    FS.

    Hello Gurus,
    Someone has any information about this question?
    Regards to all.
    FS.

  • Autonomy, Governance and Monitoring Inter Organisational BPM

    Hi All,
    Which technological approach is suitable for implementing Collaborating BPM across the value chain from the point of view of Autonomy, Governance, Security, and Monitoring? What are the benefits of selecting the one approach over the other?
    These approaches are Centralise, Decentralise, and Peer-to-Peer.
    Explanation of these approaches:
    Centralise CBPM: Ownership of Collaborative System is with one Central Organisation and other Partners Participate in this collaboration through use of various UI’s such as portal. Example, Collaboration between the automobile manufacturer and dealer were automobile manufacturer provides portal for dealer to place order, manage its customer and handle warranty and recalls.
    Decentralise CBPM: In this approach every partner provides communication technology like Web Services for its Business Partner for collaboration. The ownership is decentralise and more flexible
    Peer-to-Peer CBPM: In ideal condition in this approach every Partner should have the same technology which is developed for handling collaborative Business Processes. In this case the same modelling, monitoring, and implementation technology is available across the value chain.
    I kindly request your views and appreciate any questions and guidance.
    Regards,
    Ganesh Sawant

    PROS:
    Using the Webservices you can trigger the BPM Process and pass the values from the web dypro component which will available for the end user and pass it on to the BPM Proess.
    We can use EJB as a webservice, where the automated activity in the BPM can output the value based on the logic in the EJB Function. We can manage the automated activity which runs in the back ground of the process as per our logic and returns the value to the next task.
    CONS
    Using Webservices in the various activity with fewer data is not advisable as it takes longer time to deploy the process. And any change in the data in the webservices requires regularly re importing of the web services.

  • Autonomy, Governance and Monitoring in Inter Organisational BPM

    Which technological approach is suitable for implementing Collaborating BPM across the value chain from the point of view of Autonomy, Governance, Security, and Monitoring?  What are the benefits of selecting the one approach over the other?
    These approaches are Centralise, Decentralise, and Peer-to-Peer.
    Explanation of these approaches:
    Centralise CBPM:  Ownership of Collaborative System is with one Central Organisation and other Partners Participate in this collaboration through use of various UIu2019s such as portal.  Example, Collaboration between the automobile manufacturer and dealer were automobile manufacturer provides portal for dealer to place order, manage its customer and handle warranty and recalls.
    Decentralise CBPM: In this approach every partner provides communication technology like Web Services for its Business Partner for collaboration.  The ownership is decentralise and more flexible
    Peer-to-Peer CBPM: In ideal condition in this approach every Partner should have the same technology which is developed for handling collaborative Business Processes.  In this case the same modelling, monitoring, and implementation technology is available across the value chain.
    I kindly request your views and appreciate any questions and guidance.
    Regards,
    Ganesh Sawant

    PROS:
    Using the Webservices you can trigger the BPM Process and pass the values from the web dypro component which will available for the end user and pass it on to the BPM Proess.
    We can use EJB as a webservice, where the automated activity in the BPM can output the value based on the logic in the EJB Function. We can manage the automated activity which runs in the back ground of the process as per our logic and returns the value to the next task.
    CONS
    Using Webservices in the various activity with fewer data is not advisable as it takes longer time to deploy the process. And any change in the data in the webservices requires regularly re importing of the web services.

Maybe you are looking for