What skills are needed to manage Exalogic?

Hi there
Please let me know if I should be directing this question to another Forum and which Forum it should be.
We are thinking of purchasing Exalogic with a view to having a private Cloud.
What skills are needed or teams in order to manage Exalogic in-house?
I've used google but not really found the answers other than a couple of Oracle docs which suggest sys admins teams, network teams, etc could all have a hand in the management as they currently exist.
However, Management are wondering if a new team needs to be formed and what skills that team should have.
As we already have Exadata under the DBA team they are wondering if the skills the DBAs have will also apply for Exalogic.
Thanks.

Others are welcome to jump in!
Thanks and stay tuned to for results next week<a href="https://www.sdn.sap.comhttp://www.sdn.sap.comhttp://www.sdn.sap.com/irj/sdn/developerareas/technology">The Technology HomePage</a> for tally and scores

Similar Messages

  • Online Meet-up 17.What skills are needed to develop scenarios inside AII ?

    JAVA: to develop, enhance scenarios on the java stack:
    XI, AII
    ABAP: to enhnace idoc, etc on the abap stack (r3, ERP)
    XML: to understand flows in the XI and AII
    Regards,
    michal

    Others are welcome to jump in!
    Thanks and stay tuned to for results next week<a href="https://www.sdn.sap.comhttp://www.sdn.sap.comhttp://www.sdn.sap.com/irj/sdn/developerareas/technology">The Technology HomePage</a> for tally and scores

  • While doing ODI migration what things are needed to be setup in Topology?

    While doing ODI migration what things are needed to be setup in Topology manager ?
    1.Like in Toplogy in file we hive file paths.
    2. In Planning we set Logical schema .
    Not sure about other things.
    Hoping some can can help!!!!!!!!!!!!!!!11

    Lots of things are defined in the topology manager - below is a simplified list
    1) Physiccal Schemas the actual connection information / details related to any technology you plan to use in your ODI integration interfaces
    2) Logical schema, abstracted version of the Physical schema which allows greater flexibility ad reuse across environments
    3) Contexts - how you asssociate logical and physical schemas
    4) Agents - manage the execution of ODI jobs
    When you talk about migration, do you mean moving ODI objects between seperate environments such as Dev and Prod? If so you will need to ensure that all the technologies you use in Dev are present in Prod. The physical layer has been set up with all the correct connection details. Your logical scemas has been set up matching your configuration in the dev environment and you have used the contexts to associate the logical and physical layers as per your dev configuration.

  • How do I determine what xtras are needed?

    From the searching I have done it appears that xtras equired are mostly trial-and-error.
    Is there an efficient way to determine what xtras are needed for each lindividual movie?
    My programs are divided into a series of sequential movies.  At the end of each movie
    there is a goto statement to launch the next movie.  Does that require me to determine
    xtras for each separate movie? 
    In a perfect world there would be a way for Director to search a  folder for and present an aggregate list of all xtras required for that set of movies.
    If no such method exists, what is the recommended hunt and peck system?

    Thanks for the response, rduane.  But I refer to the procedures as a bit random for the reasons you mentioned in your explanation.  For example, you stated that, "Director will normally add all of the Xtras that you need to each movie as you build it".  And, yes, I know that it does add some automatically.  But, if Director really does "add all of the xtras that you need to each movie as it is built", how could I ever jump to one that is missing a needed xtra?  If it needs it, why wasn't it added when it was built?
    So, that's the reason I mentioned "trial and error", and "hunt and peck".  The system is not reliable in its handling of xtras, or which ones are needed where.  I am familiar with workarounds such as going to each movie and selecting Modify>Movies>Xtras to see which ones Director has added,  But that is all it tells you.  It does not tell you if it has added all the xtras "needed".  And when the error message comes up, it does name the missing xtra, but not which movie needs it.  So, one has to go find the named xtra and copy it over to the Xtras folder. 
    At least, that's what I do to fix it.  But I asked the question because I wanted to know if Xtras handling itself is unreliable, or if I'm doing something incorrectly.
    Dewey-+

  • What wires are needed to connect to a projector

    What wires are needed to connect a macbook to a projector

    A VGA or HDMI cable (Perferably HDMI). But you need mini-displayport connectors to the specific cables.

  • HT1386 Switching from a pc to a Mac. What steps are needed to get my iPhone and iPad to work with my new Mac?

    What steps are needed when upgrading from a pc to a Mac?

    Copy everything from your old computer to your new one.

  • WHAT PARTS ARE NEEDED TO SHOW MY MAC 10.8.4 OVER TV-.

    WHAT PARTS ARE NEEDED TO SHOW MY MAC 10.8.4 OVER TV….

    About AirPlay Mirroring in OS X Mountain Lion
    You need:
    An AirPlay-enabled device such as http://store.apple.com/us/ipod/ipod-accessories/apple-tv
    A suitable TV monitor
    A network
    HDMI cable
    A compatible Mac:
    iMac (Mid 2011 or newer)
    Mac mini (Mid 2011 or newer)
    MacBook Air (Mid 2011 or newer)
    MacBook Pro (Early 2011 or newer)
    Or, depending on the model Mac you intend to use: a Thunderbolt or MiniDP or DVI to HDMI adapter for a wired connection to your TV or AVR

  • What commands are needed to configure authentication?

    I'm running the JaasAcn Sample from a DOS prompt on a Win XP client and am getting 'authentication failed'. My Active Directory Realm is AD.COURSEWIZARD.COM and the KDC FQDN is ad.ad.coursewizard.com. It succeeds when I run the 'Sample' locally on the AD server. If I set 'isInitiator=false' in jaas.conf, it succeeds no matter what I enter for username & password. It seems that I need to configure an SPN.
    When setting an SPN, are you declaring that a particular AD user account is associated with a remote service that will be requesting authentication?
    Do I have to also use the 'ktpass' command, even though I'm using a Win client?
    If I use ktpass, but am just testing with a PC on the Inet, should I just use my IP address for domain since I don't have a FQDN?
    Do I need to move the keytab file, created by ktpass, to the client and configure it to use it?
    Does the ADS need to have a krb5.conf or krb5.init file? I don't see one under '../drivers/etc/'.
    What commands are needed in order to configure the server, and client, to authenticate successfully?
    Cheers

    Sorry, I haven't seen a nice JGSS for Windows guide yet.
    Back to your questions:
    1. When setting an SPN, are you declaring that a particular AD user account is associated with a remote service that will be requesting authentication?
    IMHO, setspn creates a service-like alias for a normal AD account, so that GSS style server program can use it as a NT_HOSTBASED_SERVICE name.
    2. Do I have to also use the 'ktpass' command, even though I'm using a Win client?
    ktpass is used at the server side, what you use at client side is unrelated.
    3. If I use ktpass, but am just testing with a PC on the Inet, should I just use my IP address for domain since I don't have a FQDN?
    Porbably not. Anyway, AD works fine with a DNS. If you haven't one, config the AD server as a DNS server.
    4. Do I need to move the keytab file, created by ktpass, to the client and configure it to use it?
    No, keytab is used at server side. The client side uses the native credentials cached in LSA after you login to Windows as an AD account.
    5. Does the ADS need to have a krb5.conf or krb5.init file? I don't see one under '../drivers/etc/'.
    Yes, Java needs the file for both client and server JGSS programs. Normally it should be inside the WINDOWS directory. Somethign weird woun happen if you uses Terminal Services or else. Add -Dsun.security.krb5.debug=true to the Java command line will show you when Java tries to look for this file.
    6. What commands are needed in order to configure the server, and client, to authenticate successfully?
    You need setspn.exe and ktpass.exe on the server to create the SPN and the keytab file. No tools are necessary on the client side, but MS's kerbtray.exe and klist.exe (attention: MS's klist, not Java's) are nice. BTW, a nice network sniffer (say, Wireshark) is also useful.
    I'm not an expert on all these questions, but I cannott resist the temptation to give an answer to each of them.

  • What programs are needed to build facebook games?

    I want to build a facebook game similar to Monster Legends.   It will have turn based pvp, leader boards, guilds, leveling, rankings, quests, various currencies, teams, jobs/professions, vendors, story modes, customizable characters, customizable skill sets, skill trees, various drop rates eg. low and high chances of certain items dropping from kills.    What programs are required to create a game like this?   Can it be done using only Adobe products?

    omorfidesign wrote:
    I want to build a facebook game similar to Monster Legends.   It will have turn based pvp, leader boards, guilds, leveling, rankings, quests, various currencies, teams, jobs/professions, vendors, story modes, customizable characters, customizable skill sets, skill trees, various drop rates eg. low and high chances of certain items dropping from kills.    What programs are required to create a game like this?   Can it be done using only Adobe products?
    Have you ever developed a game before? I only ask because there is a lot involved in doing so and you listed a long list of features you wish to accomplish. The game you mentioned was developed by Social Point, most of their games are for Facebook as well as a few for iOS, you can begin to see some of the technologies they leverage by looking at their job openings. They mention things such as: Illustrator, Flash, C++, Lua, Java, Air, Actionscript, MySQL, Apache, PHP, Python, PHP, Ruby, etc., and no doubt more is involved as well.
    As you can see a lot goes in to games such as these. If you wish to try and leverage Flash you would need to learn and become very proficient with AS3 if you are not already familiar with it, you would also need to also know or learn backend technologies for your leader boards, etc., Again there is a lot involved with this type of development. Of course I am not trying to discourage you but want you to know the road ahead may involve a lot of learning as games themselves can be very sophisticated applications regarding development.
    Here are some resources for Flash that may get you started if thats the direction you wish to take:
    http://gaming.adobe.com/
    http://gaming.adobe.com/technologies/gamingsdk/
    http://gaming.adobe.com/technologies/flascc/
    http://www.adobe.com/devnet/games/articles/getting-started-with-facebooksdk-actionscript3. html
    http://www.adobe.com/devnet/flashplayer/stage3d.html
    There are other possible alternatives also besides Adobe products such as Corona SDK, etc..

  • What do I need to manage shell shock or bash bug on my airport router

    What do I need to do to manage shell shock or bash bug on my airport router?

    I do have shell access to my apple router..
    When I run command to test for bash vulnerability.
    tcgen4# env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
    env: bash: No such file or directory
    If I just type bash.
    tcgen4# bash
    bash: not found
    So they have not complied bash into the airport routers.
    Apple routers are not running BASH.. you have nothing to worry about.
    (I have only tested  N wireless models)
    It is probably running the standard busybox shell. The env command shows the shell as SHELL=/bin/sh
    I do not have the latest version AC models.. but it is certainly not part of the earlier N wireless model airports. I would not think the change to the AC model will make any difference and it is still based on NetBSD.
    Thanks to John for sane comments.
    Ignore hyperventilating popular media outlets that thrive by promoting fear and discord with entertainment products arrogantly presented as "news". Learn what real threats actually exist and how to arm yourself against them.
    Do install updates from Apple as they become available. No one knows more about Macs and how to protect them than the company that builds them.
    My Mac is vulnerable.
    When I run the command..
    env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
    vulnerable
    this is a test
    The output shows that the Mac is allowing commands via bash.
    In order to access my computer from outside, a person would need passwords or something shared and open.. I have nothing.. and simply being behind a NAT router provides plenty of protection.. in due course when Apple releases the updates.. (I am fully up to date now).. I will apply it. Until then I suspect I will be more likely to die of heart attack than be hacked..

  • Hi good morning, I'm from malaysia, can I use apple education package my wife is a teacher, I'm interested for mac 13 inch water for her I be able to buy used apple education package how and what documents are needed

    hi good morning,
    I'm from malaysia,
    can I use apple education package
    my wife is a teacher,
    I'm interested for mac 13 inch water for her
    I be able to buy used apple education package
    how and what documents are needed

    You will need to contact th Apple Store. This is a user to user forum.
    http://www.apple.com/contact/
    http://store.apple.com/us-hed

  • I want to use SKYPE... what mike do I need & what Prefs are needed?

    My G4 has a mike input plug ... But the mike I was using on my old Graphite sys will not fit.
    Can anyone recommend a mike to use for SKYPE on my machine and please explain what Sys prefs are needed?
    Thanks in advance.
    Jim B

    You didn't say what kind of G4 you had, but bear in mind some Macs have a mic-level input and others have a line-level input. Those with the latter (eg the latest G5 dual core Macs) don't pick up enough sound from a normal microphone without an amplifier. It's confusing because both inputs use a 3.5 mm headphone style plug and they look identical.
    So if you're buying a headset that you might want to use if/when you change Macs, USB is the way to go.
    I use the Logitech 350 USB headset and avoid the mic input altogether. It's best to use a headset rather than a mic, because the incoming audio from your caller won't 'feed back' into your microphone. You can use non-usb headsets coupled with Griffin's iMic USB adaptor as well, but that's an expensive solution.
    Hope that helps.

  • What fonts are needed in Safari

    Some websites have type in certain areas that looks like symbol or greek. I found some suggestions by other writers but no one said what fonts I need to view webpages correctly. This problem is recent and I may have a conflict with other fonts that I'm using.
    Maybe I haven't removed enough. Can someone tell me what stays and what goes and where to eliminate, like which library? I'm running Tiger 10.4.2.

    The fonts to eliminate for sure are Helvetica Fractions and Times Phonetic, and all similar. Conflicting fonts are almost always located in Users/username/Library/Fonts (Apple doesn't put any there). The list is at
    http://docs.info.apple.com/article.html?artnum=301332

  • What cables are needed to extend the range of my airport extreme with my time capsule

    I just purchased a new Time Capsule, and I want to install it and use my current Airport Extreme to extend our home's wireless network. What extra cables are needed, and is there a diagram for this setup? We currently have a broadband network.

    Apple's instructions to do this are here:
    http://support.apple.com/kb/HT4260
    You will need an Ethernet cable to connect your new Time Capsule to the AirPort Extreme.

  • What permissions are needed on the client side for RunspaceFactory.CreateRunspace?

    Hi.
    I am running a remote powershell command from an IIS application to an Exchange server getting the below error. Everything works fine if the IIS application pool identity is in the local administrators group on the IIS server so we can rule out issues with
    firewall or anything on the Exchange server. It is a problem with lack of privileges on the local server. 
    So my question is: What permissions are required on the local server for RunspaceFactory.CreateRunspace? I find good documentation on the permissions required on the server side, but nothing about the client side.
    The last Win32 error code after failure is 1008.
    An internal error occurred. 
    at at System.Management.Automation.Remoting.Client.WSManClientSessionTransportManager.Initialize(Uri connectionUri, WSManConnectionInfo connectionInfo) 
    at System.Management.Automation.Remoting.Client.WSManClientSessionTransportManager..ctor(Guid runspacePoolInstanceId, WSManConnectionInfo connectionInfo, PSRemotingCryptoHelper cryptoHelper) 
    at System.Management.Automation.Remoting.ClientRemoteSessionDSHandlerImpl..ctor(ClientRemoteSession session, PSRemotingCryptoHelper cryptoHelper, RunspaceConnectionInfo connectionInfo, URIDirectionReported uriRedirectionHandler) 
    at System.Management.Automation.Remoting.ClientRemoteSessionImpl..ctor(RemoteRunspacePoolInternal rsPool, URIDirectionReported uriRedirectionHandler) 
    at System.Management.Automation.Internal.ClientRunspacePoolDataStructureHandler..ctor(RemoteRunspacePoolInternal clientRunspacePool, TypeTable typeTable) 
    at System.Management.Automation.Runspaces.Internal.RemoteRunspacePoolInternal..ctor(Int32 minRunspaces, Int32 maxRunspaces, TypeTable typeTable, PSHost host, PSPrimitiveDictionary applicationArguments, RunspaceConnectionInfo connectionInfo) 
    at System.Management.Automation.Runspaces.RunspacePool..ctor(Int32 minRunspaces, Int32 maxRunspaces, TypeTable typeTable, PSHost host, PSPrimitiveDictionary applicationArguments, RunspaceConnectionInfo connectionInfo) 
    at System.Management.Automation.Runspaces.RunspaceFactory.CreateRunspacePool(Int32 minRunspaces, Int32 maxRunspaces, RunspaceConnectionInfo connectionInfo, PSHost host, TypeTable typeTable, PSPrimitiveDictionary applicationArguments) 
    at System.Management.Automation.RemoteRunspace..ctor(TypeTable typeTable, RunspaceConnectionInfo connectionInfo, PSHost host, PSPrimitiveDictionary applicationArguments) 
    at System.Management.Automation.Runspaces.RunspaceFactory.CreateRunspace(RunspaceConnectionInfo connectionInfo, PSHost host, TypeTable typeTable, PSPrimitiveDictionary applicationArguments) 
    at System.Management.Automation.Runspaces.RunspaceFactory.CreateRunspace(RunspaceConnectionInfo connectionInfo) 

    Thanks Daniel.
    I see that the IIS server has a GPO setting 'Allow log on locally' to the local administrators group for this server. I will order add of the IIS app pool identity to this list.
    I tried the process monitor comparing runs with and without the app pool identity as local administrator. The runs are identical up to the point where one does something useful and the other closes 'HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WSMAN'.
    There are no failures.
    I am not using my runspace objects for multiple threads. I dispose after use.
    I will end up with the below if I change. Comments?
    public static PowershellResult RunPowerShellCommandExchange2010(string exchangeServer, string command, ICollection<KeyValuePair<string, object>> parameters, string usr, string pwd) {
    WindowsImpersonationContext impersonationContext = null;
    try {
    impersonationContext = WindowsIdentity.Impersonate(IntPtr.Zero);
    GetProcessInformation();
    try {
    var connectionInfo = GetExchange2010ConnectionInfo(exchangeServer, usr, pwd);
    using (var runspace = RunspaceFactory.CreateRunspacePool(1, 1, connectionInfo)) {
    using (PowerShell powershell = PowerShell.Create()) {
    var psCommand = new PSCommand();
    if (parameters != null) {
    psCommand.AddCommand(command);
    foreach (KeyValuePair<string, object> parameter in parameters) {
    if (parameter.Value == null) psCommand.AddParameter(parameter.Key);
    else psCommand.AddParameter(parameter.Key, parameter.Value);
    } else {
    //if parameters argument is null the command will be treated as script
    psCommand.AddCommand(new Command(command, true));
    powershell.Commands = psCommand;
    runspace.Open();
    powershell.RunspacePool = runspace;
    var resultPSObjects = powershell.Invoke();
    var psResult = new PowershellResult {
    PSObjects = resultPSObjects,
    Errors = powershell.Streams.Error.ToList()
    return psResult;
    } catch (Exception ex) {
    var windowsIdentity = WindowsIdentity.GetCurrent();
    int errorCode = Marshal.GetLastWin32Error();
    if (windowsIdentity != null) throw new Exception(string.Format("Failed to run Exchange powershell command '{0}' as user {1} passing executing user {2} due to: {3} at {4}. Server: {5}. Last error code: {6}", command, windowsIdentity.Name, usr, ex.Message, ex.StackTrace, exchangeServer, errorCode), ex);
    throw new Exception(string.Format("Failed to run Exchange powershell command '{0}' as unknown user passing executing user {1} due to: {2} at {3}. Server: {4}. Last error code: {5}", command, usr, ex.Message, ex.StackTrace, exchangeServer, errorCode), ex);
    } finally {
    if (impersonationContext != null) {
    impersonationContext.Undo();
    Tore Olav Kristiansen

Maybe you are looking for