How can i use Oracle Adpaters without BPEL

I want to ask how to use adapters without using BPEL.
Is there any document about that ?
All document i read using the adpater inside BPEL project.
Thanks in advance,

Hi,
If you are refering to iWay Supplied adapters (like JDE, SAP, PeopleSoft etc. also known as Oracle Adapters) and using them from outside BPEL, then you can very well use them outside BPEL.
All the adapters can be deployed on to your Oracle Application Server as Resource Adapter for JCA access and also you can deploy Oracle Business Service Engine (OBSE/ iBSE) a servlet apps onto your Apps Server for Web Service generation.
Hope this is of any help.
Best Regards,
Sandipan

Similar Messages

  • How can i use my account without the billing info, as i do not have a credit card. and my shipping and billing info is under US. i'm in singapore. how do i change this?

    how can i use my account without the billing info, as i do not have a credit card. and my shipping and billing info is under US. i'm in singapore. how do i change this?

    If you are just visiting Singapore, then leave the account as it is. If you have moved there, then view your account using the iTunes app on a Mac or PC and change the country/region to your current location and address. If you do not have a bank card, you can fund your account using iTunes gift cards if available in Singapore.

  • HT2534 How can I use "Family Sharing" without giving details of my credit or debit card? I do not want to give my cards data, I have always used iTunes prepaid cards.

    How can I use "Family Sharing" without giving details of my credit or debit card? I do not want to give my cards data, I have always used iTunes prepaid cards.

    Hi Saramos,
    When setting up Family Sharing you must have a credit or debit card as your payment method. See this article for reference -
    Family purchases and payments
    When a family member makes a purchase it will be billed to any gift or store credit that they have first. If none exists it will be billed to you.
    As the family organizer, you may not set your billing method for purchases to anything other than a credit or debit card. If you have a store credit such as from pre-paid cards, it may not be shared with other family members. See this article for reference -
    How iTunes Store purchases are billed
    Thanks for using Apple Support Communities.
    Best,
    Brett L 

  • How can I use "Family Sharing" without giving details of my credit or debit card? I do not want to give my cards data, I have always used iTunes prepaid cards.

    How can I use "Family Sharing" without giving details of my credit or debit card? I do not want to give my cards data, I have always used iTunes prepaid cards.

    Hi Saramos,
    When setting up Family Sharing you must have a credit or debit card as your payment method. See this article for reference -
    Family purchases and payments
    When a family member makes a purchase it will be billed to any gift or store credit that they have first. If none exists it will be billed to you.
    As the family organizer, you may not set your billing method for purchases to anything other than a credit or debit card. If you have a store credit such as from pre-paid cards, it may not be shared with other family members. See this article for reference -
    How iTunes Store purchases are billed
    Thanks for using Apple Support Communities.
    Best,
    Brett L 

  • How can I use Office Update without the Office CD?

    How can I use Office Update without the Office CD? On the microsoft website I've clicked the options which mean I shouldn't need the CD (which wasn't supplied with the laptop), but poartway through updating the service pack I get a request for the Office 2000 Professional CD.
    Any suggestions?

    Hi
    Did you mean a Office or One Note?
    As far as I know the One Note is a part of the Recovering Image and the CD is not delivered with the unit. Furthermore the Toshiba units are not delivered with the Office 2000 software.
    Nevertheless, did you check the update function in the Help i.e. in Word?
    There you will find a options called Check for Updates
    http://office.microsoft.com/en-us/officeupdate/default.aspx
    Bye

  • How can I use this account without specify credit cards, only for free applications ?

    How can I use this account without specify credit cards, only for free applications ?

    Click here and follow the instructions.
    (94222)

  • How can I use the gps without internet in my Ipad3 - 4G

    How can I use the gps without internet in my Ipad3 - 4G. Do I need to download any additional app than the one that already came with it?

    The Maps app included in iOS, at least as of the current version, requires an Internet connection, so you'll need to get an app that allows you to download maps to be kept on the iPad. MotionX GPS Drive is one such app, but there are others available.
    Regards.

  • How can I use word count without it counting the words in the end notes by default?

    How can I use word count without it counting the words in the end?
    Now I have to highlight the text to get a count.

    I don't think that is possible, it does what it does.
    Peter

  • My iphone 4 button doesn't work. How can I use my phone without that working button?

    my iphone 4 button doesn't work. How can i use my iphone without the working button?

    Well if you restore your iPad that might work. If its a software issue, it might solve it. If that doesn't work, it might be a hardware issue that apple can fix.

  • I just made a new account and i placed the account in my ipod but now its asking me submit a payment method which i do not want to place because i do not want to purchase any app that requires money. how can i use my account without giving a payment metho

    now asks me to put in my payment method. i do not wish to place it in because i am not looking forward to purchase any app that needs to be paid for. How can i use my account but not give in my credit card data?

    Create a NEW account/ID using these instructions. Make sure you follow the instructions. Many do not and if you do not you will not get the None option. You must use an email address that you have not used with Apple before. Make sure you specify a birthdate that results in being at least 13 years old
      Creating an iTunes Store, App Store, iBookstore, and Mac App Store account without a credit card
    More details of how:
    http://ipadhelp.com/ipad-help-tips-tricks/how-to-get-free-apps-from-the-app-stor e-without-a-credit-card/

  • How can I use mac pro without signing in each time now that Ihave downloaded yosemite

    Yosemite10.how can I use my mac pro without having to sign in each time?

    You may need to unlock System Preferences by clicking on the padlock in the lower left corner.

  • HT204053 I am reluctant to give my visa details as there was large scale misuse recently. how can i use free services without giving my visa details

    I am reluctant to disclose my visa details due to recent largescae misuse of data. How can I use App store to down load viber and whatts app which are free?

    Buy and redeem a small cash amount iTunes Gift Card.

  • How can I use oracle function to decode the encode value

    Hi everybody,
    If the data is encode value how can I decode this value

    DBMS_OBFUSCATION_TOOLKIT
    DBMS_OBFUSCATION_TOOLKIT allows an application to encrypt data using either the Data Encryption Standard (DES) or the Triple DES algorithms.
    The Data Encryption Standard (DES), also known as the Data Encryption Algorithm (DEA) by the American National Standards Institute (ANSI) and DEA-1 by the International Standards Organization (ISO), has been a worldwide encryption standard for over 20 years. The banking industry has also adopted DES-based standards for transactions between private financial institutions, and between financial institutions and private individuals. DES will eventually be replaced by a new Advanced Encryption Standard (AES).
    DES is a symmetric key cipher; that is, the same key is used to encrypt data as well as decrypt data. DES encrypts data in 64-bit blocks using a 56-bit key. The DES algorithm ignores 8 bits of the 64-bit key that is supplied; however, developers must supply a 64-bit key to the algorithm.
    Triple DES (3DES) is a far stronger cipher than DES; the resulting ciphertext (encrypted data) is much harder to break using an exhaustive search: 2**112 or 2**168 attempts instead of 2**56 attempts. Triple DES is also not as vulnerable to certain types of cryptanalysis as is DES. DES procedures are as follows:
    DESEncrypt Procedure
    DESDecrypt Procedure
    Oracle installs this package in the SYS schema. You can then grant package access to existing users and roles as needed. The package also grants access to the PUBLIC role so no explicit grant needs to be done.
    This chapter discusses the following topics:
    Overview of Key Management
    Summary of DBMS_OBFUSCATION Subprograms
    Overview of Key Management
    Key management, including both generation and secure storage of cryptographic keys, is one of the most important aspects of encryption. If keys are poorly chosen or stored improperly, then it is far easier for a malefactor to break the encryption. Rather than using an exhaustive key search attack (that is, cycling through all the possible keys in hopes of finding the correct decryption key), cryptanalysts typically seek weaknesses in the choice of keys, or the way in which keys are stored.
    Key generation is an important aspect of encryption. Typically, keys are generated automatically through a random-number generator. Provided that the random number generation is cryptographically secure, this can be an acceptable form of key generation. However, if random numbers are not cryptographically secure, but have elements of predictability, the security of the encryption may be easily compromised.
    The DBMS_OBFUSCATION_TOOLKIT package does not generate encryption keys nor does it maintain them. Care must be taken by the application developer to ensure the secure generation and storage of encryption keys used with this package. Furthermore, the encryption and decryption done by the DBMS_OBFUSCATION_TOOLKIT takes place on the server, not the client. If the key is passed over the connection between the client and the server, the connection must be protected using Oracle Advanced Security; otherwise the key is vulnerable to capture over the wire.
    Key storage is one of the most important, yet difficult aspects of encryption and one of the hardest to manage properly. To recover data encrypted with a symmetric key, the key must be accessible to the application or user seeking to decrypt data. The key needs to be easy enough to retrieve that users can access encrypted data when they need to without significant performance degradation. The key also needs to be secure enough that it is not easily recoverable by an unauthorized user trying to access encrypted data he is not supposed to see.
    The three options available to a developer are:
    Store the key in the database
    Store the key in the operating system
    Have the user manage the key
    Storing the Key in the Database
    Storing the keys in the database cannot always provide bullet-proof security if you are trying to protect data against the DBA accessing encrypted data (since an all-privileged DBA can access tables containing encryption keys), but it can provide security against the casual snooper, or against someone compromising the database files on the operating system. Furthermore, the security you can obtain by storing keys in the database does not have to be bullet-proof in order to be extremely useful.
    For example, suppose you want to encrypt an employee's social security number, one of the columns in table EMP. You could encrypt each employee's SSN using a key which is stored in a separate column in EMP. However, anyone with SELECT access on the EMP table could retrieve the encryption key and decrypt the matching social security number. Alternatively, you could store the encryption keys in another table, and use a package to retrieve the correct key for the encrypted data item, based on a primary key-foreign key relationship between the tables.
    A developer could envelope both the DBMS_OBFUSCATION_TOOLKIT package and the procedure to retrieve the encryption keys supplied to the package. Furthermore, the encryption key itself could be transformed in some way (for example, XORed with the foreign key to the EMP table) so that the key itself is not stored in easily recoverable form.
    Oracle recommends using the wrap utility of PL/SQL to obfuscate the code within a PL/SQL package itself that does the encryption. That prevents people from breaking the encryption by looking at the PL/SQL code that handles keys, calls encrypting routines, and so on. In other words, use the wrap utility to obfuscate the PL/SQL packages themselves. This scheme is secure enough to prevent users with SELECT access to EMP from reading unencrypted sensitive data, and a DBA from easily retrieving encryption keys and using them to decrypt data in the EMP table. It can be made more secure by changing encryption keys regularly, or having a better key storage algorithm (so the keys themselves are encrypted, for example).
    Storing the Key in the Operating System
    Storing keys in the operating system (that is, in a flat file) is another option. With Oracle8i you can make callouts from PL/SQL, which you could use to retrieve encryption keys. If you store keys in the O/S and make callouts to retrieve the keys, the security of your encrypted data is only as secure as the protection of the key file on the O/S. Of course, a user retrieving keys from the operating system would have to be able to either access the Oracle database files (to decrypt encrypted data), or be able to gain access to the table in which the encrypted data is stored as a legitimate user.
    User-Supplied Keys
    If you ask a user to supply the key, it is crucial that you use network encryption, such as that provided by Oracle Advanced Security, so the key is not passed from client to server in the clear. The user must remember the key, or your data is nonrecoverable.
    http://download-west.oracle.com/docs/cd/B10501_01/appdev.920/a96612/d_obtool.htm#ARPLS028
    Joel P�rez

  • Adobe is asking for Java SE 6 runtime. How can I use Oracle's Java 7 instead?

    Platform: Mac OS X, version 10.9.2 (the latest available as of May 11, 2014)
    When trying to open my old Adobe Illustrator, as part of Creative Suite CS4, I get the following error message:
    To open "Adobe Illustrator CS4," you need a Java SE 6 runtime. Would you like to install one now?
    I have the latest Oracle Java 7 (Version 7 Update 55) installed and I don't want the historic Apple Java 6. How can I configure Adobe software to use the already installed Java 7?
    Best, regards
    Tom

    despite this being for a different os, read (especially the end paragraphs) Install Java (JRE) | Mac OS 10.7 Lion

  • How can i use Oracle intermedia with Oracle forms 9i

    Hi all,
    I have a requirment from one of our client that they want to manage a large amount of Images,by seeing the documents about the oracle interMedia we got some idea to manage this images ,but the client is alredy having a software which is been developed by Oracle forms9i and we need to develope this using oracle forms9i can anyone give us an idea that how can we make use of InterMedia through Oracle forms9i ....
    Thanks in advance....

    I am also trying to use interMedia objects with Oracle 9i forms. I've tried everything and I can't get it to work.
    So far I have a solution that loads images using WebUtil into a blob field in Forms 9i, then in a backend stored procedure I move the blob to an interMedia object. Which works, but the problem with the image item in Oracle forms is that the image format cannot be change at runtime, so the images will always be what you set at design time.
    Can someone out there please help.
    Thanks.
    Ray

Maybe you are looking for