Oracle officially, although quietly, announced the latest upgrades to the Exadata platform last week, and we have seen the X4-2's hitting the ground already from… Read more
With the mounting concerns around identity theft, confidentiality of personal information, privacy of health information and accurate accounting of financial transactions, the proper retention of… Read more
Use Case A Use Case that I have commonly encountered during Oracle Business Process Management (BPM) projects involves exposing an initiable human task through a… Read more
Oracle’s WebCenter Capture is document capture software where users can scan documents, index them and send them to a repository. There is often confusion about… Read more
In project management, there’s no such thing as perfect. No project goes entirely as planned, stays right on schedule, delivers a flawless product the first… Read more
The term “stakeholder” always is featured prominently in any discussion of project management. You know you are supposed to: Get their “buy in” so you… Read more
What is the difference between information fields and applications fields in WebCenter Content? This is a question I have seen posted to forums, and I have… Read more
Summer is coming, which means the hurricane, tornado season is here. Do you have a contingency plan for your critical IT infrastructure? If so, is… Read more
At the core of a biometric system is the one-to-many identification process, where the input sample is compared with the stored templates in the biometric… Read more
What do your stakeholders value most about your current project? If you don’t answer this critical project management question correctly, you may waste a significant… Read more
A question was asked a few months ago on the WebCenter Content OTN Discussion Forums about WebCenter Content storing page numbers for documents. I am wondering how can i… Read more
National Institute of Standards and Technology (NIST) announced the Final Release of Special Publication (SP) 800-53, Revision 4, “Security and Privacy Controls for Federal information… Read more
So, you want to get some data OUT of a non-Oracle system and IN to your Oracle database. How to do it? We recently had… Read more
“All the perfumes of Arabia will not sweeten this failed Salesforce.com deployment” - paraphrased from Macbeth, Act V Scene I. Many cloud providers will come… Read more
When conducting a security vulnerability assessment using an automated scanner on a large number of hosts, it is very tempting to create one or more… Read more
Federal Information Processing Standards (FIPS) 140-2 is used to accredit cryptographic modules (hardware and software) used on federal government computer systems that process sensitive information. … Read more
Sarbanes-Oxley Act (SOX) set up new and enhanced standards that public companies must follow. However, the impact is not just on the company board, management… Read more
The Federal Information Security Management Act (FISMA) of 2002 has been the cornerstone for information security in Federal Government for the last 11 years. It… Read more
“Et tu Wordpress!” – paraphrased from Julius Caesar Act III, Scene I If Shakespeare blogged, I wonder if he would have used Wordpress? I don't have… Read more
Are you considering going Agile? It’s a brave move since even positive change may entail risk. This is definitely true for the transition to Agile… Read more
Agile project methodology is proving to be a valuable innovation in industries that require fast turnaround on projects that fluctuate in scope and complexity. Software… Read more
The implementations of technology solutions, such as those provided by Oracle are often large-scale projects in complex organizations. Project management is a key to success… Read more
Pillows come in different sizes and shapes and they can have different colors, styles, cushions, and features. However, the best pillow is not necessarily the… Read more
I can understand why Dorothy was so worried. Customers often struggle with the question of if they should integrate their OAM environment and applications with… Read more
Companies use reverse engineering processes to improve their own products by analyzing other companies’ products, such as software. Quite often, reverse engineering processes are used… Read more
To successfully complete one iteration after another with short sprints, an Agile development should be conducted like a symphony orchestra - it requires high degree… Read more
My kids are big fans of the movie "Ratatouille." One of the characters, a food critic named Anton Ego, has a wonderful response when asked… Read more
In WebCenter Content 11g, a new security feature was introduced. You may have run into this feature and received the following error: Content Server Request… Read more
When attempting to use the Oracle UCM Web Service, GenericSoapService, I ran into the following error using SoapUI: I was able to track down this… Read more
A colleague of mine recently posed the following question to me: The above is an example of a common problem: the need to access data… Read more
Data modeling is the key to success in Business Intelligence (BI). It is paramount that the process is business-centered. It starts with the clear understanding… Read more
“And it must follow, as the night the day, thou canst not then avoid Active Directory” – paraphrased from Hamlet: Act I, Scene III. Who… Read more
A broad range of security controls can be implemented to protect databases, including technical, administrative and physical. On the technical side, vendors, like Oracle, have… Read more
“Doubt that the sun doth move, doubt truth to be a liar, but never doubt the need for SSO in your Fusion Middleware deployment” –… Read more
CANCER LETS BEAT IT!!! Mythics is proud to announce our support and sponsorship of the annual "Dive for A Cure" fundraiser on April 26th-27 2013. … Read more
Oracle's main message to the marketplace, "Engineered to Work Together", is impossible to miss. It is visible on almost every piece of Oracle collateral, marketing… Read more