JSF for big traffic sites? Any experiences

I am wondering if JSF is a good choice for websites with a lot of traffic, e.g. all these mega-hyped Web 2.0 community sites? As far as I know mostly all of them use PHP. Does anyone at all use Java for something like that? Why not?
Is there any reason that a serious Java stack with JSF on top would be the wrong choice for it? Is the memory footprint per user too big? Are there not enough ready-to-use opensource modules (forums, chat, picsupload...) written in Java?
I have found one single Web 2.0 site using Java (Wicket to be exact). What are the others using? Facebook, MySpace, LinkedIn and so are all PHP (I think).
Please comment. I still think JSF is the future of web development and I am wondering why it is used mainly only for relatively small(in user count) and closed intranet applications.

Is there really noone out there that has tried this?

Similar Messages

  • ConfigMgr 2012 - Expected compression ratio for upstream traffic - Secondary site to Primary

    What compression ratio should we expect for upstream traffic (I guess mostly specific to inventory) from a ConfigMgr 2012 secondary site to a primary? We are debating between secondary site and DP for some sites with slow network links.
    We are concerned about SQL replication even working with a secondary site on some of the slower link sites (e.g. 512K)
    Thank you.

    It doesn't, I just wanted to get the full picture since you mentioned you were debating between secondary sites vs. dp's.  In my personal experience I've seen customers who want to do a Primary and Secondary when they only have a few hundred PC's and
    2 locations (which often is overkill depending on bandwidth and other factors).  Just wanted to make sure I had all info first.
    I'll try to find some exact numbers for you, I don't have any handy unfortunately.  In the meantime, here's this page in case you haven't seen it yet.  It is pretty handy and has some links to other, potentially useful pages.
    http://technet.microsoft.com/en-us/library/gg712701.aspx
    I can tell you from past experience the delta's that SCCM 2012 does for inventory are pretty low impact, but again, I don't have any exact numbers or ranges.  I do apologize I don't have exactly what you're needing handy.  I'll reply back if I
    can dig them up.

  • Need Help on Configuring the Site to Site VPN from Cisco 2811 to Websense Cloud for web Traffic redirect

    Hi All,
    I need help on Configuring the Site to Site VPN from Cisco 2811 to Websense Cloud for web Traffic redirect
    2811 having C2800NM-ADVIPSERVICESK9-M
    2811 router connects to the Internet SW then connects to the Internet router.
    Note- For Authentication am using the Device ID & Pre share key. I am worried as all user traffic goes with PAT and not firing up my tunnel for port 80 traffic. Can you please suggest what can be the issue ?
    Below is router config for VPN & NAT
    crypto keyring ISR_Keyring
      pre-shared-key hostname vpn.websense.net key 2c22524d554556442d222d565f545246
    crypto isakmp policy 1
    encr 3des
    authentication pre-share
    group 2
    crypto isakmp keepalive 10
    crypto isakmp profile isa-profile
       keyring ISR_Keyring
       self-identity user-fqdn [email protected]
       match identity user vpn-proxy.websense.net
    crypto ipsec transform-set ESP-NULL-SHA esp-null esp-sha-hmac
    crypto map GUEST_WEB_FILTER 10 ipsec-isakmp
    set peer vpn.websense.net dynamic
    set transform-set ESP-NULL-SHA
    set isakmp-profile isa-profile
    match address 101
    interface FastEthernet0/1
    description connected to Internet
    ip address 216.222.208.101 255.255.255.128
    ip access-group HVAC_Public in
    ip nat outside
    ip virtual-reassembly
    duplex full
    speed 100
    no cdp enable
    crypto map GUEST_WEB_FILTER
    access-list 101 permit tcp 192.168.8.0 0.0.3.255 any eq www
    access-list 103 deny   ip 192.168.8.0 0.0.3.255 host 85.115.41.187 log
    access-list 103 deny   ip 192.168.8.0 0.0.3.255 host 85.115.41.181 log
    access-list 103 deny   ip 192.168.8.0 0.0.3.255 host 85.115.41.182 log
    access-list 103 deny   ip 192.168.8.0 0.0.3.255 86.111.216.0 0.0.1.255
    access-list 103 deny   ip 192.168.8.0 0.0.3.255 116.50.56.0 0.0.7.255
    access-list 103 deny   ip 192.168.8.0 0.0.3.255 86.111.220.0 0.0.3.255
    access-list 103 deny   ip 192.168.8.0 0.0.3.255 103.1.196.0 0.0.3.255
    access-list 103 deny   ip 192.168.8.0 0.0.3.255 177.39.96.0 0.0.3.255
    access-list 103 deny   ip 192.168.8.0 0.0.3.255 196.216.238.0 0.0.1.255
    access-list 103 permit ip 192.168.8.0 0.0.3.255 any
    ip nat pool mypool 216.222.208.101 216.222.208.101 netmask 255.255.255.128
    ip nat inside source list 103 interface FastEthernet0/1 overload
    ip nat inside source route-map nonat pool mypool overload

    How does Websense expect your source IPs in the tunnel? 192.168.8.0 0.0.3.255 or PAT'ed 216.222.208.101 ?
    Check
    show crypto isakmp sa
    show crypto ipsec sa
    show crypto session
    You'd better remove the preshared key from your post.

  • I have an iMac 27" which is 4  years old and probably overdue for a clean-up. Is there any good reliable software out there that would help? Has anyone had any experience of 'Mackeeper'?

    I have an iMac 27" which is 4  years old and probably overdue for a clean-up. Is there any good reliable software out there that would help?
    Has anyone had any experience of 'Mackeeper'?

    Check how many applications are starting when you log in, I found that if there was a lot of activity at login Finder did not display the icons on the desktop correctly, again like you it did not occur at every login, just occasionally.
    For Safari have you tried resetting Safari, if that does not help you could disable plugins and extensions one at a time. You may find one of those is causing the problem.

  • I cannot get any of the zoom functions to work, period. When Firefox starts up it begins to display the page then it stops and redisplays it. So its like it flashes on for a second then completely regoes to the site, any site. The text zooms dont work eve

    I cannot get any of the zoom functions to work, period. When Firefox starts up it begins to display the page then it stops and redisplays it. So its like it flashes on for a second then completely regoes to the site, any site. The text zooms dont work even when i try to change the font on the content tab, nothing. I have reinstalled firefox still no luck help,!!!!!
    == This happened ==
    Every time Firefox opened
    == this month ==
    == User Agent ==
    Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322; InfoPath.2)

    Do you have that problem when running in the Firefox SafeMode?
    [http://support.mozilla.com/en-US/kb/Safe+Mode]
    ''Don't select anything right now, just use "Continue in SafeMode."''
    If not, see this:
    [http://support.mozilla.com/en-US/kb/troubleshooting+extensions+and+themes]

  • I have Nortons security suite under the old version the Idenity protection worked I kept all my passwords under this which used a master pasword I did not save passwords any were else and now can not get it to work supplying passwords for my l0gon site.

    I have Norton's security suite under the old version the Idenity protection worked. I kept all my passwords under this which used a master pasword I did not save my passwords any were else and now can not get it to work supplying passwords for my logon site.

    Symantec need to correct a mistake they made with their add-ons. They originally updated their add-ons after quite a delay to work with Firefox 4.0 as shown here - http://community.norton.com/t5/Norton-Internet-Security-Norton/Firefox-4-compatibility-hotfix-is-now-available/td-p/428894
    They made an error with the update in only listing it as compatible with Firefox 4.0, so they will not install on Firefox 4.0.1 and subsequent Firefox security updates. Symantec have indicated they will be releasing an update to correct their error soon, for details see http://community.norton.com/t5/Norton-Internet-Security-Norton/Norton-Toolbar-not-compatible-with-FF-4-0-1/td-p/442788/page/12

  • Any recommendations for a hosting site and photo album software?

    I'm looking for a hosting site that doesn't cost too much. All I want is the ability for someone to upload images (perhaps sometimes large) to a site that I can download and edit, then re-upload. I'm looking at an open source software called Gallery. The hosting sites are totally baffling to me., however. Thanks.

    No. Just wondering if that was what you were referring to. It seem like software you run on your own server. There are a number of sites out there that you can upload your photos to and share with others, no special software needed. http://www.flickr.com/ is one of them. Just do a Google search and you should find a bunch of possible candidates. I use iDisk for my photo sharing.

  • I am looking for a (free, ideally) virus scan/check for my MacBook Pro -- any suggestions?

    I am looking for a (free, ideally) virus scan/check for my MacBook Pro -- any suggestions?

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software.
    ☞ Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in everyemail attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • FCP and negative film color correction?  Any experience?

    Hello There,
    I'm running into more and more low budget filmmakers who are trying there hand at making short films in Super 8 movie film (yes, it's still around believe it or not). Kodak has two new film stocks out for Super 8 and one is 200T and the other is 500T (both cut down from their pro 16mm and 35mm pro stocks).
    When these filmmakers get this stuff developed they don't have the money to have it transferred at a pro shop so they are using equipment made by a company in Texas that does a very good job at transferring the film, but it doesn't have the adjustments needed to make negative film look the way it should.
    I know a few people who color correct it with FCP and FCE and they can actually make it look fairly good.
    My question is: is there a plug in or other software that can be used that is meant to do this? Or does anyone have any experience on this site with color correcting negative film with FCP? If so, what filters do you use?
    Any thoughts or comments would be great to hear from. Remember, I know this can be done by the big players, what I want to know can it be done with FCP and still look fairly good?
    Thanks for your help,
    Mike

    Well, this is pretty easy. Just throw a CHANNEL>INVERT on the negative footage before you color correct. You might have to do that before you even begin editing, as that turns the negative image into a positive one. It isn't Real Time though, so you'll have to render all the time...every cut. Unless you add the filter an export a self contained QT Movie of each tape. But then you lose time code.
    So why do they do this again? Cheaper...OK. Ease? Not really.
    Shane

  • Asking for comparisons of the reading experience (books) on an iPad vs an iPad Mini before I buy

    I'm looking for comparisons of the reading experience (books) on an iPad vs iPad Mini.  Would prefer getting the Mini, but wonder if the screen is too small for prolonged reading?

    Reading on a glossy glass LED backlit LCD is sometimes difficult for some people - they report eye strain and headaches and such.  If you are like that, then for a dedicated ereader, that pretty much rules out any tablet with a glass LED lit screen (iPad, iPad mini, Kindle Fire, Nook tablet, Kobo Arc, and so on).
    If you do not like using glass LED/LCD screens for long periods, then a B&W eINK screen might be much better for you - like an original Amazon Kindle model, or a Nook Simple Touch or a Kobo Touch.
    As long as the screen is alright to your eyes, and if you want to read magazines or enhanced eBooks with color art and such, then you would want an LCD screen, the choice between iPad or iPad mini is mainly a choice about the size and weight of the device.  One nice thing about an iPad is reading in landscape mode on the big screen as that just works well with certain formats or book layouts (and is much better for magazines, IMO).  However, the iPad mini is much smaller, lighter, more comfortable to hold for long periods and more easily slipped into a coat pocket or bag.
    While I love my iPad, I actually use my Nook Simple Touch (the original model) if sitting down to read for a long time.  It is the lightest ereader I've ever held, and the size is perfect for one hand holding while reading.  The eINK is superb for text only novels and such, and it is a non-glare glass screen (it does not use capacitive touch for control - the touch control is via infrared LEDs mounted along two sides of the device, forming an infrared grid over the screen).  My Nook Simple touch is about 1/3rd or less the size of an iPad weighs right about 7.5oz, while an iPad is a bit over 23oz.  That difference may not seem like much, until you've been sitting holding it for a half hour trying to read.  The iPad mini is only about 11oz, so maybe a nice compromize weight, as long as you like the screen for long periods of reading.
    P.S. I do read a lot on my iPad too, as glossy LCD screens do not bother me, but if settiling down on a weekend to read a novel, I'll tend to pick up the Nook ST instead.
    That also begs the question of whether you want a truly (or mainly) dedicated ereader, or do you also need tablet functions as well (email, web browsing, other apps/functions).  eINK readers are pretty much ereaders-only, as the screen technology is really only good for displaying text, and is much slower to refresh than an active matrix LCD is.

  • Any experience with refurb iMacs?

    Howdy all...
    Wondered if anyone here has any experience with purchasing refurbished units from the apple.com store site? There seem to be a few deals there, and they do offer applecare, just wondering if maybe that's where all the lemons end up?
    Any experiences at all would be great to hear, and don't need to be limited to iMacs... just really interested in the refurb experience as a whole.
    Thanks,
    adam

    I bought a refurbished BlackBook at the end of June and it arrived in absolutely perfect condition - it even smelled new.
    Refurbs are a great value. You get a discount, the full one year warrantee, and the ability to extend that to three years with AppleCare. For all intents and purposes, Apple treats it like a new unit.
    I have even read here about people getting "free" upgrades with refurbs. Apple advertises the base configurations and ships out whatever they have in stock. Sometimes that means a larger HD or more RAM, but do not count on it. I would hold off on ordering RAM or a larger HD until you actually receive it to see what it comes with.

  • How to Disable cache for an especific Site??

    How i can disable in the CE 507 the Cache for one Web Site???

    The reply at the link says to configure a rule for "no-cache". This will not prevent the CE from making the request, it only tells the CE to not Cache it.
    Reading the question, I am not sure of exactly what the request is, but if the goal is to have the client go directly to the server, there are multiple ways to do this.
    If you want the client to make the connection to the site, you can you a redirect list on the WCCP router
    In the following example, traffic to 172.18.124.193 will not be redirected to the CE, but will go directly to the server.
    router# configure terminal
    router(config)# ip wccp web-cache redirect-list 120
    router(config)# access-list 120 deny ip any host 172.18.124.193
    router(config)# access-list 120 permit ip any any
    Or, you can create a static bypass entry on the CE using the bypass command. Bypass, like the router redirect list, requires the use of WCCP.

  • Is it advisable to implement for big organizations ?

    Hi All,
    I have run through all the documents regarding HR BIS. But I could not get clear picture of this product. I have few questions mentioned below, could someone answer these please ?
    1. Is it advisable to implement this product for big organizations / clients (who have more than 50,000 employees) ?
    2. Is this good in performance while running the report for huge amount of data ?
    3. Can we run multiple reports at a time for different departments' level ?
    4. Does Oracle provide support if we customize the reports as per our requirements ? or is it the same as proffessional applications ?
    I appreciate your help!!
    Regards
    Jhansi

    Hi
    1. Is it advisable to implement this product for big organizations / clients (who have more than 50,000 employees) ?
    Personally, if you have more than 50,000 employees I would not use the out of the box HR BIS. In my opinion, and actually the opinion of a lot of my clients, most of the views that comprise the E-Business Suite BIS are too cumbersome and join to far too many tables. Its because they try to be like a jack of all trades, covering all eventualities, which means that they don't master anything. If you have a lot of data, which you will if you have 50,000 employees, the code will be slow to execute and you will find that the code does not meet all of your needs. I know Oracle don't like me saying this but that's what my clients say.
    Now the E-Business Suite itself is excellent and I would fully endorse its use. For reporting I wouldn't even customize. I would employ someone who knows what they are doing and create a business area and set of folders that give you exactly what you want. In the right hands such a business area could be completed in a couple of months with one, perhaps two consultants working on site. This is a very cost-effective solution for an organization of your size.
    If you have no experience of Discoverer, I would not recommend you try building this yourself. You need to employ the services of an expert and then take over a fully working EUL when they leave.
    There are several good people in this forum who could help. My company is are one of them and we have done this before but we are not the only ones. I tried looking for your email address but you don't have it displayed in your profile. Thus, if you want more information or want to speak with me about this please send me an email at [email protected].
    I think the answer to question 2 is partly covered in the above, and partly covered by the second paragraph to answer 3 below.
    To answer another of your questions:
    3. Can we run multiple reports at a time for different departments' level ?Absolutely. Discoverer is a great tool and can handle a scenario like this with no problem whatsoever. The power of the system should be in the database and in the Discoverer server, so don't underpower yourself in either of these areas. Discoverer is extremely flexible and you can use load balancing to hook multiple Discoverer servers together if need be.
    One area where you may have some issues is if you place a large number of Discoverer users onto the same production database as E-Business Suite. Because that database was not designed with reporting in mind, it is very common for heavy Discoverer usage to have a negative impact on your transaction system. In the short term you should be ok using Discoverer on the main server, especially if you employ some techniques such as materialized views, partitions and a virtual private database. In the medium term you might want to consider using a snapshot of production to get the Discoverer usage off the main server. Longer term you will probably be looking at some sort of operation data store or even data warehouse.
    4. Does Oracle provide support if we customize the reports as per our requirements ? or is it the same as proffessional applications ?
    No, Oracle does not provide support if you customize their BIS modules. You would be on your own. The code is hard to work with and because you will need to customize, I don't advise you basing your custom reporting system on their code. As I mentioned before, you will be far better off having someone come in and build you the custom EUL that you need.
    I hope this helps
    Best wishes
    Michael Armstrong-Smith
    URL: http://learndiscoverer.com
    Blog: http://learndiscoverer.blogspot.com

  • Any experience with JVC TMH-150CGU Production Monitor?

    I'm trying to find a affordable production monitor and was considering the JVC TMH-150CGU. Has anyone had any experience with unit?

    I'm using a Mac Pro (Intel 2 x 2.66 GHz) with NVidia 7300 and this monitor. I love it. It's amazing. Connected via single link DVI. Beware though, Acer shipped several models with a crippled native resolution through DVI. Resolved by firmware update that service has to provide.
    the one big problem is Apple needs to update the video card drivers to solve a blinking display issue when coming out of sleep. For me this is a minor issue for a beautiful 26" display, but getting really annoying.
    http://discussions.apple.com/thread.jspa?threadID=1095405

  • Email crashes immediately at opening??? Any experience with this?

    Email crashes at opening, we reinstalled software, no luck, any
    experience or how do you contact apple support via email, can
    not find a way on apple site to contact them??? Thanks
    Macmini   Mac OS X (10.4.9)  

    You’re welcome.
    Disabling the junk filter was meant just to identify the problem. It’s clearly not an acceptable solution. If the junk filter is crashing on you, try resetting the junk filter database (Preferences > Junk Mail > Reset) and re-enabling the junk filter. If Mail starts crashing again, proceed as follows to thoroughly get rid of all the files used by the junk filter, so that Mail creates them anew:
    1. If you have a .Mac account and .Mac synchronization of Mail data is enabled either in Mail > Preferences > General or in System Preferences > .Mac, disable it before proceeding.
    2. Quit Mail if it’s running.
    3. In the Finder, go to ~/Library/Mail/.
    4. Locate LSMMap2 and move it to the Trash. This file stores information about what does and doesn’t constitute junk, and allows the junk filter to learn. Deleting this file is what Preferences > Junk Mail > Reset does. The file was called LSMMap in early versions of Mail; delete that as well if you see it.
    5. Locate any MessageRules.plist (Mail 2.x) and/or MessageSorting.plist (Mail 1.x) files and move them to the Desktop. This is where Mail stores all the rules, including the rule that governs what the junk filter does.
    6. Locate DefaultCounts and move it to the Trash. This file keeps statistics about the number of messages that have been marked as junk, either automatically by the junk filter or manually by the user.
    7. Look for the account folders. The name of each account folder starts with the account type (POP, IMAP, Mac), followed by the account username and the incoming mail server. Open each of the account folders, locate the Junk.mbox or Junk.imapmbox folder within it, and move it to the Trash if present.
    8. Go to ~/Library/Mail/Mailboxes/. Locate any Junk.mbox mailboxes there (their name may include the account name in parenthesis), and move them to the Trash.
    Note: Steps 7 and 8 may be unnecessary. Also, messages in Junk mailboxes with an .mbox suffix are stored locally and will be lost forever as a result of doing steps 7 and 8. If there is a chance that you have legit messages there that you want to preserve, either try skipping those steps, or move the messages to another mailbox in Mail first, or move Junk.mbox to the Desktop (to be imported back later) instead of to the Trash. Junk mailboxes with an .imapmbox suffix aren’t a concern because they are stored on the server and Mail would rebuild them automatically.
    9. Open Mail. As a result of removing the rules file, the junk filter will be disabled now. You may want to either shut down the Internet connection before opening Mail or take Mail offline immediately after opening it, to prevent Mail from downloading anything until the junk mail filter has been enabled again.
    10. Go to Mail > Preferences > Junk Mail, enable junk filtering and configure it however you wish. I recommend choosing Automatic mode and leaving all the other options checked.
    11. Go online again if you went offline in step 9.
    12. If the problem is fixed now and .Mac synchronization of Mail data was enabled at the beginning, enable it again, go to System Preferences > .Mac > Advanced, click Reset Sync Data, and choose the appropriate options to reset the Mail data stored on the .Mac server with the data locally stored on the computer, i.e. sync data must flow from the computer to the .Mac server.
    If the above solves the problem and you don’t have any rules you’d like to preserve or recreating them is not a daunting task, the files moved to the Desktop in step 5 can be deleted.
    Note: For those not familiarized with the ~/ notation, it refers to the user’s home folder. That is, ~/Library is the Library folder within the user’s home folder, i.e. /Users/username/Library.

Maybe you are looking for

  • " change" button not visible in check status ?

    HI, We are under upgrade of SRM 4.0 to SRM 5.0 . In SRM 4.0 "change" button is visible in check status even if shopping cart is under approval state. But in SRM 5.0 "change" button is not visible in check status if Shopping cart is under approval sta

  • 10.5.5 Update destroys screen safer

    After the upgrade from 10.5.4 Client to 10.5.5, the screen safer is broken. When the OS tries to start the screensafer, the screen goes black and one second after, reappears again, then goes black again, reappears, ... and so on. The screen is consta

  • [SOLVED] xorg-server build from abs fails

    Hi, ever since I installed the update to gcc-5.1.0 the building of xorg-server from abs fails: $ makepkg -s CCLD libXextdpmsstubs.la xvdisp.c: In function ‘XineramifyXv’: xvdisp.c:1783:37: error: array subscript is above array bounds [-Werror=array-b

  • Condition error during VA02

    Hi, I have created a new conditon ZZ01, applied to the pricing procedure, tested it in sandpit and it works. But after transport it toour QA client, the error msg No text is defined for language EN usage A appl. V cond. type (T586T) Message no. V1201

  • Report server uninstall

    Hi 2 all DBA plz informa me how to uninstall report server components from application server 10g , or inform me which components of required for report server in application server 10g Thanks