Technologies collaboration

Hello everybody, and sorry for my bad english.
I am searching for a document (picture or/and text) explaining how and when exactly technologies are used in a typical web application:
I have a good idea about this, but some things are not really clear, more precisely about JNDI, RMI, DataSources, JDBC (I understand all this but I need some more informations like where are some config files), how the client tier contact the business tier when EJB3 is used, etc... I have found some good documents, but if you know good ones that give a "general" vision, I would be happy to see them!
Thanks in advance.

Hello everybody, and sorry for my bad english.
I am searching for a document (picture or/and text) explaining how and when exactly technologies are used in a typical web application:
I have a good idea about this, but some things are not really clear, more precisely about JNDI, RMI, DataSources, JDBC (I understand all this but I need some more informations like where are some config files), how the client tier contact the business tier when EJB3 is used, etc... I have found some good documents, but if you know good ones that give a "general" vision, I would be happy to see them!
Thanks in advance.

Similar Messages

  • Ask the Expert: Single-Site and Multisite FlexPod Infrastructure

    With Haseeb Niazi and Chris O'Brien 
    Welcome to the Cisco Support Community Ask the Expert conversation. This is an opportunity to learn and ask questions about Single-Site and Multisite FlexPod Infrastructure with experts Haseeb Niazi and Chris O'Brien.
    This is a continuation of the live webcast.
    FlexPod is a predesigned and prevalidated base data center configuration built on Cisco Unified Computing System, Cisco Nexus data center switches, NetApp FAS storage components, and a number of software infrastructure options supporting a range of IT initiatives. FlexPod is the result of deep technology collaboration between Cisco and NetApp, leading to the creation of an integrated, tested, and validated data center platform that has been thoroughly documented in a best practices design guide. In many cases, the availability of Cisco Validated Design guides has reduced the time to deployment of mission-critical applications by 30 percent.
    The FlexPod portfolio includes a number of validated design options that can be deployed in a single site to support both physical and virtual workloads or across metro sites for supporting high availability and disaster avoidance. This session covers various design options available to customers and partners, including the latest MetroCluster FlexPod design to support a VMware Metro Storage Cluster (vMSC) configuration.
    Haseeb Niazi is a technical marketing engineer in the Data Center Group specializing in security and data center technologies. His areas of expertise also include VPN and security, the Cisco Nexus product line, and FlexPod. Prior to joining the Data Center Group, he worked as a technical leader in the Solution Development Unit and as a solutions architect in Advanced Services. Haseeb holds a master of science degree in computer engineering from the University of Southern California. He’s CCIE certified (number 7848) and has 14 years of industry experience.   
    Chris O'Brien is a technical marketing manager with Cisco’s Computing Systems Product Group.  He is currently focused on developing infrastructure best practices and solutions that are designed, tested, and documented to facilitate and improve customer deployments. Previously, O'Brien was an application developer and has worked in the IT industry for more than 20 years.
    Remember to use the rating system to let Haseeb and Chris know if you have received an adequate response. 
    Because of the volume expected during this event, Haseeb and Chris might not be able to answer every question. Remember that you can continue the conversation in the Data Center community, subcommunity Unified Computing shortly after the event. This event lasts through September 27, 2013. Visit this forum often to view responses to your questions and the questions of other Cisco Support Community members.
    Webcast related links:
    Single-Site and Multisite FlexPod Infrastructure - Slides from live webcast
    Single-Site and Multisite FlexPod Infrastructure: FAQ from live webcast
    Single-Site and Multisite FlexPod Infrastructure - Video from live webcast

    I would suggest you read this white paper which details the pros and cons of direct connect storage. 
    http://www.cisco.com/en/US/partner/prod/collateral/ps10265/ps10276/whitepaper_c11-702584.html   This paper captures all the major design points for Ethernet and FC  protocols.
    I would only add that in FlexPod we are trying to create a highly  available solution and "flexible" solution; Nexus switching helps us  deliver on both with vPC and unified ports.
    NPV equats  to end-host mode which allows the system to present all of the servers  as N ports to the external fabric.  In this mode, the vHBAs are pinned  to the egress interfaces of the fabric interconnects.  This pinning  removes the potential of loops in the SAN fabric.  Host based multipathing of the  vHBAs account for potential uplink failures.  The NPV mode (end-host  mode) simplifies the attachment of UCS into the SAN fabric and that is  why it is in NPV mode by default.
    So for your last question, I will have to put my  Product Manager hat on so bear with me.   First off there is no drawback  to enabling the NPIV feature (none that I am aware of) the Nexus 5000  platform simply offers you a choice to design and support multiple FC  initiators (N-Ports) per F-Port via NPIV.  This allows for the  integration of the FI end-host mode described above.  I  imagine being a  unfied access layer switch, the Nexus team enabled standard Fibre  Channel switching capability and features first.  The implementatin of  NPIV is a customer choice based on their specific access layer  requirements.
    /Chris

  • CISCO Projectsquare / spark, how to dial VCS

    How do you use the new alternative Sparks to dial in to an sx20 of Expressway Server
    I normally would use jabber movi to dial [email protected]
    I am not seeing the option in spark to do so.

    This is, as far as I know, not possible at this stage. Spark now has its own support forum which you can find here: https://communities.cisco.com/community/technology/collaboration/cisco_spark
    /jens
    Please rate replies and mark question(s) as "answered" if applicable.

  • Adobe Rich Web Experts Speaking at India's Biggest Independent Technology Event

    Great Indian Developer Summit is India's Biggest Polyglot Conference for IT Professionals
    Bangalore, March 25, 2010: At the 2010 edition of Great Indian Developer Summit learn how browser and rich web technologies such as AJAX, DHTML, Mashups, Web 2.0, Enterprise 2.0 technologies, and Rich UI technologies are making money and gaining market-share for some of the leading businesses in the world. On 21st and 23rd April 1010, Rich Web experts from Adobe will speak about the changing face of web applications, enriching cloud applications with Adobe Flash, agile interaction design, developing multi-screen applications on Flash, building enterprise RIAs with Flex and Java, building data centric applications and killer RIAs with PHP and Flex. The summit will be held at the Indian Institute of Science in Bangalore.
    Ramesh Srinivasaraghavan, who leads the Adobe Flash Platform Evangelism initiatives of Adobe India, will keynote on the state of art in web application development and identify trends that could transform the way we create and use web applications. He will also conduct a separate session exploring the role that RIA technologies play in the new paradigm of developing applications for the cloud.
    The ubiquity of Adobe's Flash Player and AIR spans the spectrum of Web, Desktop, Mobile and devices such as set top boxes. Flash Engineer Hemanth Sharma will lead attendees through the development workflow for building multi-screen applications. In a separate session, Sujit Reddy explains model-driven and code-driven development approaches to build data-centric applications with Adobe Flex and Java. Also discover how you can migrate your existing J2EE applications to Adobe Flex based RIA's easily. Computer Scientist Harish Sivaramakrishnan, popularly known as flexgeek, will lead attendees on a whirlwind tour of Adobe Flash Catalyst - a sparkling new tool which he says is the best thing that happened to the designer-developer collaboration after sliced bread.
    On 23rd April while Prashant Singh conducts a 180-minute workshop on Data Centric Development features of Flash Builder and how to use them to create a Rich Internet Application powered by Java, Shyamaprasad will teach how to build PHP powered rich Internet applications using Flex. Starting off by setting up the Zend framework he will demonstrate how to build a complete Flex application that connects to a PHP server, using version 4 of Flash Builder.
    On 21st and 23rd April 2010, at GIDS.WEB Conference & Workshops learn how browser and rich web technologies such as AJAX, DHTML, mashups, Web 2.0, Enterprise 2.0 technologies, and Rich UI technologies are making money and gaining market-share for some of the leading businesses in the world.
    About Great Indian Developer Summit
    Great Indian Developer Summit is the gold standard for India's software developer ecosystem for gaining exposure to and evaluating new projects, tools, services, platforms, languages, software and standards. Packed with premium knowledge, action plans and advise from been-there-done-it veterans, creators, and visionaries, the 2010 edition of Great Indian Developer Summit features focused sessions, case studies, workshops and power panels that will transform you into a force to reckon with. Featuring 3 co-located conferences: GIDS.NET, GIDS.Web, GIDS.Java and an exclusive day of in-depth tutorials - GIDS.Workshops, from 20 April to 24 April at the IISc campus in Bangalore.
    At GIDS you'll participate in hundreds of sessions encompassing the full range of Microsoft computing, Java, Agile, RIA, Rich Web, open source/standards, languages, frameworks and platforms, practical tutorials that deep dive into technical skill and best practices, inspirational keynote presentations, an Expo Hall featuring dozens of the latest projects and products activities, engaging networking events, and the interact with the best and brightest of speakers from around the world.
    For further information on GIDS 2010, please visit the summit on the web http://www.developersummit.com/
    A Saltmarch Media Press Release
    E: [email protected]
    Ph: +91 80 4005 1000

    Im not sure if this is the right place to post this, but anyway thanks for the info :)

  • I have 3dparty software wirelessly with a cryptographic authentication system without my consent (seems to be new technology developed by stanford) obtaining ownership of my iPhone 4s software and controlling it with remote device to jail break. Now what?

    I have 3rd party software wirelessly injected and used on my iphone with a cryptographic authentication system without my consent (seems to be new technology developed by stanford and apple security is not updated for this technology) obtaining ownership of my iPhone 4s software and controlling it with remote device to jail breaking my phone, adding and removing software, changing settings all from a remotely controled device from different location (I have a Mac address I'd of this device to know for sure). Almost undetectable. When I look at the legal section of my phone it shows a list of all the unauthorized 3rd party software "as is" copyright encrypted on the phone.  This is the most basic way to legally steal software of any kind.  Because of this legalality 3rd party ownership have total control of certain software correlated with hardware use including visualization technology, etc.  most people luckily will never have this happen to them so it's unlikely many readers have not a clue of what I'm saying currently.  Either way, without needing to obtain specific warranty of any kind "as is" copyright control makes system restores not a solution because the source code is not directly encrypted on the actual hardware device only a copy right notice must appear on the specific device 3rd party software validation making it extremely difficult for me to take control of the situation. Apple claims their iOS technology prevents this type copyright obstruction from being possible, however, according to my phone a new form of technology was used developed by Tom wu of Stanford university called the STANFORD SRP AUTHENTICATION TECHNOLOGY which uses Some form of cryptographic authentication system and uses quote "secure remote password" which seems to suceed in hacking iOS apple technology apple claims is not possible to jailbreak an unstolen phone or without the owners consent As well as loading the device with 3rd party copyright Notices to make all of this legalized. My phone shows atleast 30 pages worth of legalized 3rd party copyright permissions! Yesterday my apple care provider labeled me a jailbreaker and refused to look at my legal documented proof which completely blew my mind because it voides my apple care contract I spent 100 on. This employee did not take all factors into consideration and made quick assumptions as well as verbally speaking to me as I'm an automatic criminal. I left the store yesterday with no payed insurance help on a problem I had no control over and couldn't prevent, leaving with voided contracts. This is an apple users worst nightmare and I have spent days researching all of this like i am some kind of lawyer only to be able to use my phone the way it should and spent alot of money on.  I can legally backup any claim I have just wrote above currently and have a large source of data collected to prove apple is wrong in voiding insurance support on this issue. The problem lies in apple avoiding and not wanting to believe their software can legally be obtained ot "hacked". Yet still labeled a jailbreaker basically.. What should I do????? Been to local apple store 3 times and rebooted my phone as well sprint service restore 4 times and spoke with reps twiice on the phone. Spoke with my phone provider who said apple has full control over these matters so they can't help me.  My case is according to apple "still open"...Anyone else heard of this or of Stanford's office of technology licensing? Maybe I need to buy a blackberry again or just use a landline so I can stop being my own lawyer and focus on other productive areas in life instead of this horrible mess. I shouldn't have to prove to apple I not a jailbreaker they should have to prove I'm one before voiding support I desperately need!!

    Mullaly75 wrote:
    I assume u guys don't understand what open source software is
    Yes, I think most of us do understand what open source software is. It sounds as if you don't. Here's some information:
    Open-source software (OSS) is computer software that is available in source code form: the source code and certain other rights normally reserved forcopyright holders are provided under an open-source license that permits users to study, change, improve and at times also to distribute the software.
    Open source software is very often developed in a public, collaborative manner. Open-source software is the most prominent example of open-sourcedevelopment and often compared to (technically defined) user-generated content or (legally defined) open content movements.
    from http://en.wikipedia.org/wiki/Open_source_software
    Yes, Tom Wu of Stanford wrote a paper on something called Secure Remote Access Protocol. It's a form of Asymetric Key Exchange and has nothing to do with hacking anything. It's actually intended to protect data.

  • Ask the Expert: Plan, Design, and Implement Mobile Remote Access, the Cisco Collaboration Edge Architecture

    Welcome to the Cisco® Support Community Ask the Expert conversation. This is an opportunity to learn and ask questions about planning, designing, and implementing mobile remote access (Cisco Collaboration Edge Architecture) with Cisco subject matter experts Aashish Jolly and Abhijit Anand.
    Cisco Collaboration Edge Architecture is an architecture that provides VPN-less access of Cisco Unified Communications resources to Cisco Jabber® users. This discussion is dedicated to addressing questions about design best practices while implementing mobile remote access.
    For more information, refer to the Unified Communications Mobile and Remote Access via Cisco VCS deployment guide. 
    Aashish Jolly is a network consulting engineer who is currently serving as the Cisco Unified Communications consultant for the ExxonMobil Global account. Earlier at Cisco, he was part of the Cisco Technical Assistance Center (TAC), where he helped Cisco partners with installation, configuring, and troubleshooting Cisco Unified Communications products such as Cisco Unified Communications Manager and Manager Express, Cisco Unity® solutions, Cisco Unified Border Element, voice gateways and gatekeepers, and more. He has been associated with Cisco Unified Communications for more than seven years. He holds a bachelor of technology degree as well as Cisco CCIE® Voice (#18500), CCNP® Voice, and CCNA® certifications and VMware VCP5 and Red Hat RHCE certifications.
    Abhijit Singh Anand is a network consulting engineer with the Cisco Advanced Services field delivery team in New Delhi. His current role involves designing, implementing, and optimizing large-scale collaboration solutions for enterprise and defense customers. He has also been an engineer at the Cisco TAC. Having worked on multiple technologies including wireless and LAN switching, he has been associated with Cisco Unified Communications technologies since 2006. He holds a master’s degree in computer applications and multiple certifications, including CCIE Voice (#19590), RHCE, and CWSP and CWNP.
    Remember to use the rating system to let Aashish and Abhijit know if you have received an adequate response. 
    Because of the volume expected during this event, our experts might not be able to answer every question. Remember that you can continue the conversation on the Cisco Support Community Collaboration, Voice and Video page, in the Jabber Clients subcommunity, shortly after the event. This event lasts through June 20, 2014. Visit this forum often to view responses to your questions and the questions of other Cisco Support Community members.

    Hi Marcelo,
       Yes, there are some requirements for certificates in Expressway.
    Expressway Core (Exp-C)
    - Can be signed by either External or Internal CA
    - Better to use a cluster name even if you start with 1 peer in Exp-C cluster. In the future, if more peers are added, changes would be minimal.
    - Better to use FQDN of cluster as CN of certificate, this way the traversal zone configuration on Expressway-E won't require any change even if new peers are added to Exp-C cluster.
    - If CUCM is mixed mode, include security profile names (in FQDN format) as Subject Alternate Names
    - The Chat Node Aliases that are configured on the IM and Presence servers. They will be required only for Unified Communications XMPP federation deployments that intend to use both TLS and group chat. (Note that Unified Communications XMPP federation will be supported in a future Expressway release). The Expressway-C automatically includes the chat node aliases in the CSR, providing it has discovered a set of IM&P servers.
    - For TLS b/w CUCM, IM-P & Exp-C
      + If using self-signed certificates on CUCM, IM/P. Load Cisco Tomcat, cup, cup-xmpp certificates from IM-P on Exp-C. Load callmanager, Cisco Tomcat certificates from CUCM on Exp-C.
      + If using Internal CA signed certificates on CUCM, IM/P. Load Root CA certificates on Exp-C.
      + Load CA certificate under tomcat-trust, cup-trust, cup-xmpp-trust on IM-P.
      + Load CA certificate under tomcat-trust, callmanager-trust on CUCM.
    Expressway Edge (Exp-E)
    - Signed by External CA
    - Configured Unified Communications domain as Subject Alternate Name
    - If using a cluster, select FQDN of this peer as CN and FQDN of Cluster + this peer as Subject Alternate Name.
    - If XMPP federation is being deployed, enter the same Chat Node Aliases as entered in Exp-C.
    For more details, please refer to the Certificate Creation Guide for Cisco Expressway x8.1.1
    http://www.cisco.com/c/dam/en/us/td/docs/voice_ip_comm/expressway/config_guide/X8-1/Cisco-Expressway-Certificate-Creation-and-Use-Deployment-Guide-X8-1.pdf
    - Aashish

  • Oracle Collaboration Suite in a box download file 3 is corrupt

    Hi
    I was just trying to download the "in a box" install for Collaboration suite and file:
    win32_ocs_90411_singlebox_Disk3.zip
    is not a valid archive. Can somebody please fix it and let me know when it is done as I am trying to do an evaluation of Oracle Files
    Thanks for your help
    Steve

    Hello Silvia:
    I know you can download the client tools on the Oracle site:
    http://www.oracle.com/technology/index.html
    You need to register, but it's free though
    Otherwise, if you licensed SAP with Oracle, on market place you'll get the Oracle DVD's. Inside those, run the Oracle Installer and instead of installing the DBMS, choose to install only client tools
    Greetings
    Alejandro.

  • How to work with others in a same workspace (I mean collaboration)?

    I need to work with others in a same workspace.
    Is there any mechanism support collaboration in JDeveploper?
    Many thanks.
    Ben

    You can use a version management software to do this.
    JDeveloper has excellent support for CVS which is a free version management tool.
    You need to install CVS on a server that will provide access to all the users and then you can check-in your workspace and others can check it out.
    In addition you can download extensions to JDeveloper that support Subversion, Clearcase, Perforce, and Serena Dimension as version management software.
    For a basic introduction to working in teams with JDeveloper and a CVS repository see:
    http://www.oracle.com/technology/products/jdev/viewlets/1013/cvs_viewlet_swf.html

  • Modelling Collaborative BPM across Value Chain Evaluation of Approaches

    Question: Which approach is easy for modelling Collaborative BPM across value chain A) Centralise, B.) Decentralise, and C) Peer to Peer approach for?  What are the pros and cons?  What are the other important factors related with each approach?
    Explanation of these approaches:
    Centralise CBPM:  Ownership of Collaborative System is with one Central Organisation and Other Partners Participate in this collaboration through various UI such as portal.  Example, Collaboration between the automobile manufacturer and dealer were auto mobile manufacturer provides portal for dealer to place order, manage its customer and handle warranty and recalls.
    Decentralise CBPM: In this approach every partner provides communication technology like Web Services for its Business Partner for collaboration.  The ownership is decentralise and more flexible.
    Peer-to-Peer CBPM: In ideal condition in this approach every Partner should have the same technology which is developed for handling collaborative Business Processes.  In this case the same modelling facility is available across the value chain.
    I kindly request you to post your views on this topic as this is related with my dissertation topic.
    I welcome your views and guidance.
    Regards,
    Ganesh Sawant

    kRISHNA,
    -->Send Step to send the file message with system ACK
    By system acknowledgement do you mean by acknowledgement type application or transport?
    -->After checking the status ,call the RFC synchronously.. i.e Synch Send Step.
    can i call rfc synchronously there after if yes then please let me know logic/reason behind...?
    -->But where are you planning to have mapping ?
    since in first two steps receive and send i am just picking the file and posting it some other place so no mapping is required but after posting the file i am using a graphical mapping program defined in IR only for mapping sync source message with the BAPi/RFC which is going to be triggered.
    but i am getting error related to mapping...
    Kindly correct me if i am wrong

  • Collaborative BPM across Value Chain Evaluation of Approaches

    Hi all,
    Question: Which approach is easy for modelling Collaborative BPM across value chain A) Centralise, B.) Decentralise, and C) Peer to Peer approach for? What are the pros and cons? What are the other important factors related with each approach?
    Explanation of these approaches:
    Centralise CBPM: Ownership of Collaborative System is with one Central Organisation and Other Partners Participate in this collaboration through various UI such as portal. Example, Collaboration between the automobile manufacturer and dealer were automobile manufacturer provides portal for dealer to place order, manage its customer and handle warranty and recalls.
    Decentralise CBPM: In this approach every partner provides communication technology like Web Services for its Business Partner for collaboration. The ownership is decentralise and more flexible.
    Peer-to-Peer CBPM: In ideal condition in this approach every Partner should have the same technology which is developed for handling collaborative Business Processes. In this case the same modelling facility is available across the value chain.
    I kindly request you to post your views on this topic as this is related with my dissertation topic.
    I welcome your views and guidance.
    Regards,
    Ganesh Sawant

    kRISHNA,
    -->Send Step to send the file message with system ACK
    By system acknowledgement do you mean by acknowledgement type application or transport?
    -->After checking the status ,call the RFC synchronously.. i.e Synch Send Step.
    can i call rfc synchronously there after if yes then please let me know logic/reason behind...?
    -->But where are you planning to have mapping ?
    since in first two steps receive and send i am just picking the file and posting it some other place so no mapping is required but after posting the file i am using a graphical mapping program defined in IR only for mapping sync source message with the BAPi/RFC which is going to be triggered.
    but i am getting error related to mapping...
    Kindly correct me if i am wrong

  • Collaborative BPM appraoch evaluation

    I am doing Masters dissertation in Collaborative BPM. My research topic is the evaluation of three approached for collaborating BPM across value chain.
    Explanation of these approaches:
    Centralise CBPM:  Ownership of Collaborative System is with one Central Organisation and Other Partners Participate in this collaboration through various UI such as portal.  Example, Collaboration between the automobile manufacturer and dealer were automobile manufacturer provides portal for dealer to place order, manage its customer and handle warranty and recalls.
    Decentralise CBPM: In this approach every partner provides communication technology like Web Services for its Business Partner for collaboration.  The ownership is decentralise and more flexible
    Peer-to-Peer CBPM: In ideal condition in this approach every  Partner should have the same technology which is developed for handling collaborative Business Processes.  In this case the same modelling facility is available across the value chain.
    I found below critical aspects for evaluating these three approaches:
    1] Autonomy
    2] Collaborative process Modelling
    3] Monitoring, Controlling, and Analysis
    4] u201CPlug and Playu201D based Platform for Collaboration (Includes Security, Web Service and various adapters for communication and Language Support like Java for easy custom enhancement)
    5] Governance
    I kindly request you all to post your views about pros and cons for evaluating these approaches from the aforementioned critical aspects.
    I welcome your questions and appreciate your valuable guidance.
    Thank you ,
    Regards,
    Ganesh Sawant

    Hi there,
    I am certainly not an expert, only started last month but lets hope I can be useful.
    2/ Install feature pack. Very easy to do that. You just select "exclude previous participant" and he wont be assigned the task.
    7/ When you generate the task form there is an "ACTIONS" menu. Amongst the choices there is "Escalate"
    Someone with more experience will have to help you through the rest.
    Regards,
    Yanis

  • Acrobat collaborative reviews - PDF electronic reviews

    Hello,
    I have been working with Acrobat 7 Pro for a year now, managing collaborative electronic PDF reviews. Acrobat 7 Pro allows you to initiate a browser-based review of a PDF. Reviewers can then use Acrobat's commenting and markup tools to communicate in live time to each other.
    In the publishing world, this has been a paper-based system for years. It took time to mark up pages, time to send the pages to each other and time to merge the comments of multiple reviewers in the end.
    Acrobat 8 Pro allows the user to initiate a PDF review to a fileserver, negating the need for a WebDAV server. It also allows the reviewing user to use the free Reader version of Acrobat to participate.
    Has anyone else been using Acrobat to manage collaborative reviews either webserver-based or fileserver-based?
    Levon Spradlin
    Technology Manager, Desktop Publishing Support Services
    Pearson | Assessment & Information
    512-989-5300 x 3989
    [email protected]

    Yes, I initiated the review. When I initiated the review, I saw a different dialog for entering my username and password. That took my credentials and uploaded the PDF to SharePoint.
    I don't remember seeing RSA dialog (see the image I attached to the first post) when I created the review, only when I opened the PDF after the review was generated. At that point, I did select to save the credentials, but it didn't seem to save them (since everytime the dialog appears it is blank).
    I had another one of our tech writers test it before sending it to the rest of the team, and he was able to access the review and put in test comments. He never saw the dialog. At that point, I looked at other reviews that I had initiated in the past, and was unable to add comments to those either (at least for the ones that didn't have a deadline). So I am pretty sure it is something that has changed on my system in the last few weeks. Perhaps a Microsoft Security update?

  • SCM Collaborative portal - works internally but  NOT through Internet

    I am posting this question this form as you have very good knowledge of portal and I believe  underlying technology of  SCM collaboration Portal and EP are same.
    I am working on Collaborate planning in APO (SCM) - sharing SCM planning books over internet so that collaborators (customers) can access our data.  I enabled all the required services using SICF and published services using SE80.
    Portal works correctly in Intranet (with in our network), But doesnot work in Internet, link/url doesn't not bring up log on screen and get error no page found.
    We are on SCM5.0 (Netwaver 7.0) and using integrated ITS.
    What other settings required to access through internet?
    Thanks in advance,
    Niranjan
    Edited by: Niranjan on Jan 4, 2010 5:47 PM

    Niranjan,
       follow my blog and your questions can be answered.
    http://rahulursportal.blogspot.com/2009/11/sap-web-dipatcher-and-enterprise-portal.html
    also make use of the google voice as i believe it is the only UNOFFICIAL - SAP Portal Hotline that exists.
    cheers !

  • Ask the Expert: Cisco Hosted Collaboration Solution

    With Chris Ward
    Welcome to the Cisco Support Community Ask the Expert conversation.This is an opportunity to learn about Cisco's new Hosted Collaboration Solution architecture and deployment with Cisco expert Chris Ward. Chris is a technical marketing engineer working on the Cisco Hosted Collaboration Solution. He previously held an escalation position in the Cisco Technical Assistance Center for the Cisco Unified Communications Manager team, where he worked for more than five years. Ward holds bachelor and master of science degrees in information technology from the Rochester Institute of Technology and also holds CCIE Voice certification.
    Remember to use the rating system to let Chris know if you have received an adequate response. 
    Chris might not be able to answer each question due to the volume expected during this event. Remember that you can continue the conversation on the Service Provider sub-community discussion forum shortly after the event. This event lasts through April 20 , 2012. Visit this forum often to view responses to your questions and the questions of other community members.

    Hi Tenaro,
    Thank you for your question.
    At current, we do not setup CUCM in a multi-tenant configuration. Each HCS end-customer gets their own unique CUCM cluster, the same goes for Unity Connection and Unified Presence.
    There are a few pieces of software that are unique to HCS
    1) HCM - F - This component is used to automate the upgrades of the UC applications, produce bundle-based billing reports from the configuration domain, and also automatically provision/configure the Service Assurance architecture so as you deploy HCS to end customers, the monitoring of those configurations is automatically done for you.
    2) Prime Central for HCS Assurance - This component is responsible for provides lots of functionality in regards to monitoring the HCS solution. It aggregates data from CUOM, CUSM, DCNM, and vCenter and can display all the events/errors/alarms that those components are reporting. It also has the ability to normalize these errors and forward them to an exisitng alarm management or ticketing system via SNMP traps. It also includes a reatures like fault correlation (root cause analysis) and service impact analysis which allows you to see what services are affected based on the error information that is being reported.
    3) This last item is not really a piece of software, but more an advantage over using UC on UCS as opposed to HCS. Within HCS we allow the over subscription of your UCS resources for some of the smaller OVAs where in UC on UCS you would be required to map a vCPU to an entire core. This allows for much greater denisty. Also, the HCS licensing scheme allows for the SP to pool licenses and transfer between the customers as needed where in UC on UCS, these licenses are bound to customers, once purchased.
    To answer your last question, we sell HCS to service providers and partners. Partners may need to have customers bring their own PSTN connectivity or partner with an SP to provide PSTN access, but either way, partners are just as capable of providing this service.
    Hope that helps. Thanks again Tenaro!

  • Oracle Collaboration Coexistence Gateway and Exchange 2010

    Hi,
    in the Beehive 2.0 Integration Guide is said that the Collaboration Coexistence Gateway is compatible with MS Exchange 2003 and 2007.
    Are there any plans to make in compatible to Exchange 2010 or is it even already compatible?
    Thanks for your help!

    Exchange 2010 will proxy ActiveSync for Exchange 2003.  For OWA, it will redirect, so you need a legacy redirect URL.  You can test all of this internally without changing your Internet connection.  For ActiveSync you can use a WiFi connection.
    Ed Crowley MVP "There are seldom good technological solutions to behavioral problems."

Maybe you are looking for

  • A mini review of FiOS TV and their new QIP-7232 DVR

    FiOS TV picture quality is stunning. No compression artifacts at all from what I can tell. The 7232 is pretty good but not excellent. I have the 7232 and a Tivo HD XL. IMHO the Tivo is considerably better but I see lots of room for improvement with t

  • Audio problem in bootcamp, the sound is really quiet

    I've tried so many things. Could someone give me a link to a fix for the low weak volume. Like a driver update or somthing? Thank you, Ben

  • Automatically start, then restart!

    Since "upgrading" to Mountain Lion, when my Mac Mini auto starts in the morning the desktop is now a bit of a mess with a couple of programs not working properly and Finder windows out of place. I find that if I immediately restart the machine everyt

  • I Movie help please

    I am trying to import movies from jvc mini camcorder? Only records from camera on pc does not see camcorder connected,  Have firewire,  what next

  • Does pure activation of BCT DataSources decrease performance?

    Hello, if I just activate (all) datasources from BCT in an ECC system (without actually using them for data uploading to BW), does this decrease any performance in the ECC? Or is it performance wise neutral as the activation only creates some metadat