BidVertiser

Sunday, August 30, 2009

Monday, August 24, 2009

TIBCO Origins and IT Services

Origins

TIBCO is an indirect successor to Teknekron Software Systems, Inc. Teknekron was formed in 1983,[3] and produced a software product it called The Information Bus (TIB),[4] which included as a substantial application the processing of stock quotes. In 1994, Teknekron was acquired by Reuters,[5][6] but was spun out as a separate company in 1994, named Tibco, after the TIB product.[7] In January 1997 Tibco Software Inc. was established as a separate entity to create and market software for integration of business applications outside the financial services sector. Reuters retained Tibco Finance to create and market software solutions for the financial services sector. In July 1999, Tibco went public on the Nasdaq Stock Market under the ticker symbol TIBX.

[edit] Greg the Architect
Greg Opening Sequence

Starting in 2007, Tibco promoted video and print ads starring an action figure called "Greg the Architect."[8] Since launching, the videos have been mentioned in numerous industry blogs, including the Wall Street Journal[9][10].

The campaign won an IAC Award (Internet Advertising Competition) in March 2007[11]. They were then honored with the BtoB Best Award for Best Online Campaign from BtoB Magazine[12]. "Greg" also won a Stevie Award for Best Corporate Film or Video in the Public Relations category at the 2007 American Business Awards[13].

Greg the Architect has been used in print as a comic strip in many industry magazines covering SOA and BPM. The campaign was also written about in a book from Harvard Business Press entitled Groundswell[14] concerning marketing using social technology. In a blog written by the authors of Groundswell, Greg parodies himself[15].

[edit] IT Services

IT Services companies who use Tibco to develop solutions

* CIBER
* Cognizant Technology Solutions
* EDS
* Capgemini
* Neoris
* TCS
* INFOSYS
* Accenture
* IBM
* Satyam
* MphasiS
* UST Global Inc
* HCL
* Wipro
* Patni Computer Systems
* Sierra Atlantic
* Larsen and Toubro
* Reliance Communications
* Tech Mahindra
* Logica
* MindTree
* CSC

TIBCO Software

TIBCO Software Inc. is a global company that develops integration software for companies including those in the energy, manufacturing, retail, healthcare, and financial services industries. Its headquarters is in Palo Alto, California, with offices in North America, Europe, Asia, the Middle East, Africa and South America. [1] The company's major commercial competitors are IBM[2], Oracle Corporation, and SAP AG.

In addition, TIBCO offers the message-oriented middleware products Rendezvous and SmartSockets (from Talarian acquisition).

Tuesday, August 4, 2009

Features new to Windows 7

New and changed features

Features new to Windows 7

The new Action Center which replaces Windows Security Center

Windows 7 includes a number of new features, such as advances in touch and handwriting recognition, support for virtual hard disks, improved performance on multi-core processors,[32][33][34][35] improved boot performance, DirectAccess, and kernel improvements. Windows 7 adds support for systems using multiple heterogeneous graphics cards from different vendors (Heterogeneous Multi-adapter), a new version of Windows Media Center,[36] a Gadget for Windows Media Center, improved media features, the XPS Essentials Pack and Windows PowerShell being included, and a redesigned Calculator with multiline capabilities including Programmer and Statistics modes along with unit conversion. Many new items have been added to the Control Panel, including ClearType Text Tuner, Display Color Calibration Wizard, Gadgets, Recovery, Troubleshooting, Workspaces Center, Location and Other Sensors, Credential Manager, Biometric Devices, System Icons, and Display.[37] Windows Security Center has been renamed to Windows Action Center (Windows Health Center and Windows Solution Center in earlier builds) which encompasses both security and maintenance of the computer. The default setting for User Account Control in Windows 7 has been criticized for allowing untrusted software to be launched with elevated privileges by exploiting a trusted application.[38] Microsoft's Windows kernel engineer Mark Russinovich acknowledged the problem, but noted that there are other vulnerabilities that do not rely on the new setting.[39]

The taskbar has seen the biggest visual changes, where the Quick Launch toolbar has been replaced with pinning applications to the taskbar. Buttons for pinned applications are integrated with the task buttons. These buttons also enable the Jump Lists feature to allow easy access to common tasks.[40] The revamped taskbar also allows the reordering of taskbar buttons. To the far right of the system clock is a small rectangular button that serves as the Show desktop icon. This button is part of the new feature in Windows 7 called Aero Peek. Hovering over this button makes all visible windows transparent for a quick look at the desktop.[41] In touch-enabled displays such as touch screens, tablet PCs, etc., this button is slightly wider to accommodate being pressed with a finger.[42] Clicking this button minimizes all windows, and clicking it a second time restores them. Additionally, there is a feature named Aero Snap, that automatically maximizes a window when it is dragged to either the top or left/right edges of the screen.[43] This also allows users to snap documents or files on either side of the screen to compare them. When a user moves windows that are maximized, the system restores their previous state automatically. This functionality is also accomplished with keyboard shortcuts. Unlike in Windows Vista, window borders and the taskbar do not turn opaque when a window is maximized with Windows Aero applied. Instead, they remain transparent.
The Windows 7 taskbar, with the Desktop Window Manager disabled.

For developers, Windows 7 includes a new networking API with support for building SOAP-based web services in native code (as opposed to .NET based WCF web services),[44] new features to shorten application install times, reduced UAC prompts, simplified development of installation packages,[45] and improved globalization support through a new Extended Linguistic Services API.[46] At WinHEC 2008 Microsoft announced that color depths of 30-bit and 48-bit would be supported in Windows 7 along with the wide color gamut scRGB (which for HDMI 1.3 can be converted and output as xvYCC). The video modes supported in Windows 7 are 16-bit sRGB, 24-bit sRGB, 30-bit sRGB, 30-bit with extended color gamut sRGB, and 48-bit scRGB.[47][48] Microsoft is also implementing better support for Solid State Drives[49], including the new TRIM command, and Windows 7 will be able to identify a Solid State Drive uniquely.

Internet Spades, Internet Backgammon and Internet Checkers, which were removed from Windows Vista, were restored in Windows 7. Windows 7 will include Internet Explorer 8 and Windows Media Player 12.
Search Wikinews Wikinews has related news: Windows 7 will allow users to disable Internet Explorer

Users will also be able to disable many more Windows components than was possible in Windows Vista. New additions to this list of components include Internet Explorer, Windows Media Player, Windows Media Center, Windows Search, and the Windows Gadget Platform.[50] Windows 7 includes 13 additional sound schemes, entitled Afternoon, Calligraphy, Characters, Cityscape, Delta, Festival, Garden, Heritage, Landscape, Quirky, Raga, Savanna, and Sonata.[51] A new version of Virtual PC, Windows Virtual PC Beta is available for Windows 7 Professional, Enterprise, and Ultimate editions.[52] It allows multiple Windows environments, including Windows XP Mode, to run on the same machine, requiring the use of Intel VT-x or AMD-V. Windows XP Mode runs Windows XP in a virtual machine and redirects displayed applications running in Windows XP to the Windows 7 desktop.[53] Furthermore Windows 7 supports the mounting of a virtual hard disk (VHD) as a normal data storage, and the bootloader delivered with Windows 7 can boot the Windows system from a VHD.[54] The Remote Desktop Protocol (RDP) of Windows 7 is also enhanced to support real-time multimedia application including video playback and 3D games. That means that Direct X 10 can be used in a remote desktop environment.[55] The three application limit will be removed from Windows 7 Starter.[56]

Development of Windows 7

Development

Development of Windows 7

Originally, a version of Windows codenamed Blackcomb was planned as the successor to Windows XP and Windows Server 2003. Major features were planned for Blackcomb, including an emphasis on searching and querying data and an advanced storage system named WinFS to enable such scenarios. However, an interim, minor release, codenamed "Longhorn" was announced for 2003, delaying the development of Blackcomb.[10] By the middle of 2003, however, Longhorn had acquired some of the features originally intended for Blackcomb. After three major viruses exploited flaws in Windows operating systems within a short time period in 2003, Microsoft changed its development priorities, putting some of Longhorn's major development work on hold while developing new service packs for Windows XP and Windows Server 2003. Development of Longhorn (Windows Vista) was also "reset," or delayed, in August 2004. A number of features were cut from Longhorn.[11]

Blackcomb was renamed Vienna in early 2006,[12] and again to Windows 7 in 2007.[13] In 2008, it was announced that Windows 7 would also be the official name of the operating system.[14][15]

The first external release to select Microsoft partners came in January 2008 with Milestone 1, build 6519.[16] At PDC 2008, Microsoft demonstrated Windows 7 with its reworked taskbar. Copies of Windows 7 build 6801 were distributed out at the end of the conference, but the demonstrated taskbar was disabled in this build.

On December 27, 2008, Windows 7 Beta was leaked onto the Internet via BitTorrent.[17] According to a performance test by ZDNet,[18] Windows 7 Beta beat both Windows XP and Vista in several key areas, including boot and shut down time, working with files such as loading documents; other areas did not beat XP, including PC Pro benchmarks for typical office activities and video-editing, remain identical to Vista and slower than XP.[19] On January 7, 2009, the 64-bit version of the Windows 7 Beta (build 7000) was leaked onto the web, with some torrents being infected with a trojan.[20][21] At CES 2009, Microsoft CEO Steve Ballmer announced the Windows 7 Beta, build 7000, had been made available for download to MSDN and TechNet subscribers in the format of an ISO image.[22] The Beta was to be publicly released January 9, 2009. Initially, Microsoft planned for the download to be made available to 2.5 million people on January 9. However, access to the downloads was delayed due to high traffic.[23] The download limit was also extended, initially until January 24, then again to February 10. People who did not complete downloading the beta had two extra days to complete the download. After February 12, unfinished downloads became unable to complete. Users can still obtain product keys from Microsoft to activate their copy of Windows 7 Beta. Users can still download Windows 7 via the Microsoft Connect program. The beta will expire on August 1, 2009, with shutdowns every two hours starting July 1, 2009. The release candidate, build 7100, has been available for MSDN and TechNet subscribers and Connect Program participants since April 30 and became available to the general public on May 5, 2009. It has also been leaked onto the Internet via BitTorrent.[24] The release candidate is available in five languages and will expire on June 1, 2010, with shutdowns every two hours starting March 1, 2010.[25] Microsoft has stated that Windows 7 will be released to the general public on October 22, 2009 and to Technet subscribers on August 6, 2009.[26] Microsoft announced that Windows 7, along with Windows Server 2008 R2 were released to manufacturing on July 22, 2009. Windows 7 RTM is build 7600.16385 which was compiled on July 13, 2009, and was declared the final RTM build after passing all Microsoft's tests internally.[3]

Goals

Bill Gates, in an interview with Newsweek, suggested that the next version of Windows would "be more user-centric".[27] Gates later said that Windows 7 will also focus on performance improvements.[28] Steven Sinofsky later expanded on this point, explaining in the Engineering Windows 7 blog that the company was using a variety of new tracing tools to measure the performance of many areas of the operating system on an ongoing basis, to help locate inefficient code paths and to help prevent performance regressions.[29]

Senior Vice President Bill Veghte stated that Windows Vista users migrating to Windows 7 would not find the kind of device compatibility issues they encountered migrating from Windows XP.[30] Speaking about Windows 7 on October 16, 2008, Microsoft CEO Steve Ballmer confirmed compatibility between Vista and Windows 7,[31] indicating that Windows 7 will be a refined version of Windows Vista.[31]

Windows 7

Windows 7 (formerly codenamed Blackcomb and Vienna) is an upcoming version of Microsoft Windows, a series of operating systems produced by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs and media center PCs.[2] Windows 7 was released to manufacturing on July 22, 2009,[3] with general retail availability set for October 22, 2009,[4] less than three years after the release of its predecessor, Windows Vista. Windows 7's server counterpart, Windows Server 2008 R2, is slated for release at the same time.

Unlike its predecessor, which introduced a large number of new features, Windows 7 is intended to be a more focused, incremental upgrade to the Windows line, with the goal of being fully compatible with applications and hardware with which Windows Vista is already compatible.[5] Presentations given by the company in 2008 focused on multi-touch support, a redesigned Windows Shell with a new taskbar, a home networking system called HomeGroup,[6] and performance improvements. Some applications that have been included with prior releases of Microsoft Windows, including Windows Calendar, Windows Mail, Windows Movie Maker, and Windows Photo Gallery, will not be included in Windows 7;[7][8] some will instead be offered separately as part of the free Windows Live Essentials suite.[9]

Monday, July 20, 2009

SAP Products

SAP's products focus on Enterprise Resource Planning (ERP). The company's main product is SAP ERP. The current version is SAP ERP 6.0 and is part of the SAP Business Suite. Its previous name was called R/3. The "R" of SAP R/3 stood for realtime - even though it is not a realtime solution. The number 3 related to the 3-tier architecture: database, application server and client (SAPgui). R/2, which ran on a Mainframe architecture, was the predecessor of R/3. Before R/2 came System RF, later dubbed R/1.

SAP ERP is one of five enterprise applications in SAP's Business Suite. The other four applications are:

* customer relationship management (CRM) - helps companies acquire and retain customers, gain marketing and customer insight
* product lifecycle management (PLM) - helps manufacturers with product-related information
* supply chain management (SCM) - helps companies with the process of resourcing its manufacturing and service processes
* supplier relationship management (SRM) - enables companies to procure from suppliers

Other major product offerings include: the NetWeaver platform, Governance, Risk and Compliance (GRC) solutions, Duet (joint offering with Microsoft), Performance Management solutions and RFID. SAP offers SOA capabilities (calling it Enterprise SOA) in the form of web services that are wrapped around its applications.

While its original products were typically used by Fortune 500 companies[citation needed], SAP is now also actively targeting small and medium sized enterprises (SME) with its SAP Business One and SAP Business All-in-One.
On 19 September 2007 SAP announced a new product named SAP Business ByDesign. SAP Business ByDesign is a Software as a Service (SaaS) offering, and provides a fully integrated Enterprise Resource Planning (ERP) solution, On Demand. SAP Business ByDesign was previously known under the code name "A1S".[22]

SAP officials say there are over 100,600 SAP installations serving more than 41,200 companies in more than 25 industries in more than 120 countries.[23]

But SAP has also in general been criticized for their One-size-fits-all product strategies implying that it now covers such a large scope that it has become a hindrance for company mergers and acquisitions.[citation needed]

SAP History

SAP was founded in 1972 as Systemanalyse und Programmentwicklung ("System Analysis and Program Development")[2] by five former IBM engineers in Mannheim, Baden-Württemberg (Dietmar Hopp, Hans-Werner Hector, Hasso Plattner, Klaus E. Tschira, and Claus Wellenreuther).[3]

As part of the Xerox exit strategy from the computer industry, Xerox retained IBM to migrate their business systems to IBM technology. As part of IBM's compensation for the migration, IBM acquired the SDS/SAPE software, reportedly for a contract credit of $80,000. The SAPE software was given by IBM to the founding ex-IBM employees in exchange for founding stock provided to IBM, reportedly 8%. Imperial Chemical Industries (ICI) was SAP's first ever customer in 1972.[4]

The acronym was later changed to stand for Systeme, Anwendungen und Produkte in der Datenverarbeitung ("Systems, Applications and Products in Data Processing").

In 1976, "SAP GmbH" was founded and the following year, it moved its headquarters to Walldorf. SAP AG became the company's official name after the 2005 annual general meeting (AG is short for Aktiengesellschaft).

In August 1988, SAP GmbH transferred into SAP AG (a corporation by German law), and public trading started November 4. Shares are listed on the Frankfurt and Stuttgart stock exchanges.[3]

Four of the founding members -- Hopp, Plattner, Tschira and Hector -- form the executive board. In 1995, SAP was included in the German stock index DAX. On 22 September 2003, SAP was included in the Dow Jones STOXX 50.[5] In 1991, Prof. Dr. Henning Kagermann joined the board; Dr. Peter Zencke became a board member in 1993.[6] Claus Heinrich,[7] and Gerhard Oswald [8] have been members of the SAP Executive Board since 1996. Two years later, in 1998, the first change at the helm took place. Dietmar Hopp and Klaus Tschira moved to the supervisory board and Dietmar Hopp was appointed Chairman of the supervisory board. Henning Kagermann was appointed as Co-Chairman and CEO of SAP next to Hasso Plattner. Werner Brandt joined SAP in 2001 as a member of the SAP Executive Board and Chief Financial Officer.[9] Léo Apotheker has been a member of the SAP Executive Board and president of Global Customer Solutions & Operations since 2002, was appointed Deputy CEO in 2007, and then became co-CEO alongside Kagermann in 2008.

Henning Kagermann became the sole CEO of SAP in 2003.[10] In February 2007, his contract was extended until 2009. After continuous disputes over the responsibility of the development organization, Shai Agassi, a member of the executive board who had been named as a potential successor to Kagermann, left the organization.[11] In April 2008, along with the announcement of Leo Apotheker as co-CEO, the SAP supervisory board also appointed to the SAP Executive Board, three new members, effective 1 July 2008: Corporate Officers Erwin Gunst, Bill McDermott and Jim Hagemann Snabe.[12]. With the retirement of Henning in May 2009, Leo has taken over as the sole CEO.

Thursday, June 11, 2009

Storage sharing

Storage sharing

Historically, data centers first created "islands" of SCSI disk arrays. Each island was dedicated to an application, and visible as a number of "virtual hard drives" (i.e. LUNs). Essentially, a SAN connects storage islands together using a high-speed network, thus allowing all applications to access all disks.

Operating systems still view a SAN as a collection of LUNs, and usually maintain their own file systems on them. These local file systems, which cannot be shared among multiple operating systems/hosts, are the most reliable and most widely used. If two independent local file systems resided on a shared LUN, they would be unaware of this fact, would have no means of cache synchronization and eventually would corrupt each other. Thus, sharing data between computers through a SAN requires advanced solutions, such as SAN file systems or clustered computing. Despite such issues, SANs help to increase storage capacity utilization, since multiple servers share the storage space on the disk arrays. The common application of a SAN is for the use of transactionally accessed data that require high-speed block-level access to the hard drives such as email servers, databases, and high usage file servers.

In contrast, NAS allows many computers to access the same file system over the network and synchronizes their accesses. Lately, the introduction of NAS heads allowed easy conversion of SAN storage to NAS.

DAS vs NAS vs SAN


Organization

[edit] SAN-NAS hybrid

Despite the differences between NAS and SAN, it is possible to create solutions that include both technologies, as shown in the diagram.
Hybrid using DAS, NAS and SAN technologies.

Network types

Network types

Most storage networks use the SCSI protocol for communication between servers and disk drive devices. They do not use SCSI low-level physical interface (e.g. cables), however, as its bus topology is unsuitable for networking. A mapping layer to other low-level protocols is used to form a network:

* ATA over Ethernet (AoE), mapping of ATA over Ethernet,
* Fibre Channel Protocol (FCP), the most prominent one, is mapping of SCSI over Fibre Channel (FC),
* Fibre Channel over Ethernet (FCoE),
* mapping of FICON over FC, used by mainframe computers,
* HyperSCSI, mapping of SCSI over Ethernet,
* iFCP[1] or SANoIP[2] mapping of FCP over IP.
* iSCSI Extensions for RDMA (iSER), mapping of iSCSI over InfiniBand (IB),
* iSCSI, mapping of SCSI over TCP/IP

What is SAN?

storage area network (SAN) is an architecture to attach remote computer storage devices (such as disk arrays, tape libraries, and optical jukeboxes) to servers in such a way that the devices appear as locally attached to the operating system. Although the cost and complexity of SANs are dropping, they are still uncommon outside larger enterprises.

Network attached storage (NAS), in contrast to SAN, uses file-based protocols such as NFS or SMB/CIFS where it is clear that the storage is remote, and computers request a portion of an abstract file rather than a disk block.

Saturday, May 30, 2009

IELTS Band Scale

Band Scale

IELTS is scored on a nine band scale, with each band corresponding to a specified competence in English.Overall Band Scores are reported to the nearest whole or half band.

For the avoidance of doubt, the following rounding convention applies; if the average across the four skills ends in .25, it is rounded up to the next half band, and if it ends in .75, it is rounded up to the next whole band.

The nine bands are described as follows:

[edit] 9 Expert User

Has full command of the language: appropriate, accurate and fluent with complete understanding. It is very hard to attain this score.

[edit] 8 Very Good User

Has fully operational command of the language with only occasional unsystematic inaccuracies and inappropriacies. Handles complex detailed argumentation well.

[edit] 7 Good User

Has operational command of the language, though with occasional inaccuracies, inappropriateness and misunderstandings in some situations. Generally handles complex language well and understands detailed reasoning.

[edit] 6 Competent User

Has generally effective command of the language despite some inaccuracies, inappropriacies and misunderstandings. Can use and understand fairly complex language, particularly in familiar situations.

[edit] 5 Modest User

Has a partial command of the language, coping with overall meaning in most situations, though is likely to make many mistakes. The candidate should be able to handle communication in his or her own field.

[edit] 4 Limited User

Basic competence is limited to familiar situations. Has frequent problems in using complex language.

[edit] 3 Extremely Limited User

Conveys and understands only general meaning in very familiar situations. Frequent breakdowns in communication occur.

[edit] 2 Intermittent User

No real communication is possible except for the most basic information using isolated words or short formulae in familiar situations and to meet immediate needs. Has great difficulty understanding spoken and written English.

[edit] 1 Non User

Essentially has no ability to use the language beyond possibly a few isolated words.

[edit] 0 Did not attempt the test

No assessable information provided.

IELTS Test Structure

IELTS Test Structure

All candidates must complete four Modules - Listening, Reading, Writing and Speaking - to obtain a Band, which is shown on an IELTS Test Report Form (TRF). All candidates take the same Listening and Speaking Modules, while the Reading and Writing Modules differ depending on whether the candidate is taking the Academic or General Training Versions of the Test.

The total test duration is around 2 hours and 45 minutes for Listening, Reading and Writing modules.
Listening: 40 minutes, 30 minutes for which a recording is played centrally and additional 10 minutes for transferring answers onto the OMR answer sheet.
Reading: 60 minutes.
Writing: 60 minutes.
(n.b. No additional time is given for transfer of answers in Reading and Writing modules)

The first three modules - Listening, Reading and Writing (always in that order) - are completed in one day, and in fact are taken with no break in between. The Speaking Module may be taken, at the discretion of the test centre, in the period seven days before or after the other Modules.

The tests are designed to cover the full range of ability from non-user to expert user.

What is IELTS?

IELTS (pronounced /ˈaı.ɛlts/), or 'International English Language Testing System', is an international standardised test of English language proficiency. It is jointly managed by University of Cambridge ESOL Examinations, the British Council and IDP Education Australia, and was established in 1989.

There are two versions of the IELTS: the Academic Version and the General Training Version:

* The Academic Version is intended for those who want to enroll in universities and other institutions of higher education and for professionals such as medical doctors and nurses who want to study or practice in an English-speaking country.
* The General Training Version is intended for those planning to undertake non-academic training or to gain work experience, or for immigration purposes.

It is generally acknowledged that the reading and writing tests for the Academic Version are more difficult than those for the General Training Version, due to the differences in the level of intellectual and academic rigour between the two versions.

IELTS is accepted by most Australian, British, Canadian, Irish, New Zealand and South African academic institutions, over 2,000 academic institutions in the United States, and various professional organisations. It is also a requirement for immigration to Australia and Canada. This has been criticised in Canada, because the English accents employed in the Listening section of the IELTS are far removed from typical Canadian accents.

An IELTS result or Test Report Form (TRF - see below) is valid for two years.

In 2007, IELTS tested over a million candidates in a single 12-month period for the first time ever, making it the world's most popular English language test for higher education and immigration.[1]

Wednesday, May 13, 2009

What is TOEFL?

The Test of English as a Foreign Language (or TOEFL, pronounced "toe-full")
evaluates the ability of an individual to use and understand English in an academic setting. It is an admission requirement for non-native English speakers at many English-speaking colleges and universities.

Additionally, institutions such as government agencies, licensing bodies, businesses, or scholarship programs may require this test. A TOEFL score is valid for two years and then will no longer be officially reported since a candidate's language proficiency could have significantly changed since the date of the test. Colleges and universities usually consider only the most recent TOEFL score.

The TOEFL test is a registered trademark of Educational Testing Service (ETS) and is administered worldwide. The test was first administered in 1964 and has since been taken by more than 23 million students.

Policies governing the TOEFL program are formulated with advice from a 16-member board. Board members are affiliated with undergraduate and graduate schools, 2-year institutions and public or private agencies with an interest in international education. Other members are specialists in the field of English as a foreign or second language.

The TOEFL Committee of Examiners is composed of 12 specialists in linguistics, language testing, teaching or research. Its main responsibility is to advise on TOEFL test content. The committee helps ensure the test is a valid measure of English language proficiency reflecting current trends and methodologies.

TOEFL Paper-Based Test

Paper-Based Test

In areas where the iBT and CBT are not available, a paper-based test (PBT) is given. Because test takers cannot register at the testing center on the test date, they must register in advance using the registration form provided in the Supplemental Paper TOEFL Bulletin. They should register in advance of the given deadlines to ensure a place because the test centers have limited seating and may fill up early. Tests are administered only several times each year.

The PBT tests essentially the same skills as the CBT, albeit with some differences, noticeably the number of questions (which is higher in the PBT) and the score scales. The test lasts 4 hours more or less. Students can take the test as many times as they wish. However, colleges and universities usually consider only the most recent score.

1. Listening (30–40 minutes)

It consists of three parts. The first one contains 30 questions about short conversations. The second part has 8 questions about longer conversations. The last part asks 12 questions about lectures or talks.

2. Structure and Written Expression (25 minutes)

This part has 15 exercises of completing sentences correctly and 25 exercises of identifying errors.

3. Reading Comprehension (55 minutes)

It has 50 questions about reading passages.

4. Writing (30 minutes)

One essay with 250-300 words in average

TOEFL Internet-Based Test

Internet-Based Test

Since its introduction in late 2005, the Internet-Based test (iBT) has progressively replaced both the computer-based (CBT) and paper-based (PBT) tests. The iBT has been introduced in phases, with the United States, Canada, France, Germany, and Italy in 2005 and the rest of the world in 2006, with test centers added regularly.

Although the demand for test seats was very high, and candidates had to wait for months, it is now possible to take the test within one to four weeks in most countries.[1] The four-hour test consists of four sections, each measuring mainly one of the basic language skills (although some tasks may require multiple skills) focusing on language used in an academic, higher-education environment. Note-taking is allowed during the iBT. The test cannot be taken more than once a week.

1. Reading

This module determines proficiency in understanding intellectual reading issues. The Reading module contains questions about 3 to 5 long passages. The passages are chosen from the academic topics, which are found in undergraduate university textbooks.

2. Listening

This module determines proficiency in understanding spoken English as it is used in colleges and universities. The listening module consists of 6 comprehensive passages. Two passages will be conversations between students, and the other four will be academic lectures or discussions. Students have to understand the conversations and answer the corresponding questions.

3. Speaking

This module determines proficiency with speaking in English. The speaking module consists of 6 tasks: two independent tasks and four integrated tasks. In the independent tasks, students have to answer opinion questions concerning academic life. In two of the integrated tasks, students have to read a passage, listen to a passage, and speak about how the ideas in the two passages are related. In the other two integrated tasks, students have to listen to long passages, review them and speak about the information in the passages.

4. Writing

This module determines proficiency with writing in English that is pertinent for colleges and universities assignments. The writing module consists of two tasks: one independent task where students have to read an academic passage, listen to an academic passage and write their reviews about the two passages, and another integrated task where students have to write an essay.

Task iBT Approx. time
READING 3 passages and 39 questions 60 minutes
LISTENING 6 passages and 34 questions 50 minutes
SPEAKING 6 tasks and 6 questions 20 minutes
WRITING 2 tasks and 2 questions 55 minutes

At least one of the sections of the test will include extra, uncounted material. Educational Testing Service includes extra material to try out material for future tests. If the test taker is given a longer section, he must work hard on all of the materials because he does not know which material counts and which material is extra. For example, if there are four reading passages instead of three, three of the passages will count and one of the passages will not be counted. It is possible that the uncounted passage could be any of the four passages.

Friday, May 1, 2009

MQ Best Practices

* when installing MQ Server, do install MQ Client also. It is very useful to connect to remote sites.
* naming convention (MD00, GG24-4469 and MD04)

See Intercommunication manual for suggested naming conventions
o queue name max length = 48 chars (all MQ objects, except ...)
o channel name max length = 20 chars

* use ReplyToQ/ReplyToQMgr fields
* use REPLY type in response message
* use triggering if possible. Use TRIGGER FIRST. TRIGGER EVERY only if needed. Avoid TRIGGER DEPTH.
* do not use persistence if possible
* copy Message_Id into Correl_Id field to correlate response to request
* request a Report if your message is rejected or expires.
* know the default queue manager and verify it exists - used by runmqsc -w
* MQ & clustering :
o define a Qmgr to be exclusively FR1 and another Qmgr to be FR2
o use 2 (and no more) Full Repositories
o make sure both FRs have a Cluster Sender Channel to the other FR
* MQ under HACMP :
o use virtual IP in "IPADDR( )" at listener definition
o use separated disks for Data & Log - better performance
o if cluster is used, place FR's on HACMP machines
* MQ for MB :
o increase LOG size, as default MQ log for Windows is not enough to deploy a 500KB bar file
o increase CM 2 BK channel message length; otherwise flows wont be deployed. Easiest way is: immediately after creating the queue manager, ALTER the MAXMSGL attribute of SYSTEM.DEFAULT.LOCAL.QUEUE, SYSTEM.DEF.SENDER, SYSTEM.DEF.RECEIVER, SYSTEM.DEF.CLUSSDR, and SYSTEM.DEF.CLUSRCVR. Even better: have a script to create queue managers for MB that does log size and MAXMSGL automatically.

IBM Websphere MQ Tools

MQ tools

Tool / file name Purpose
amqsaicq.c Create a local queue using the MQ Administration Interface (MQAI)
amqsaiem.c Event monitor using the MQ Admin Interface (MQAI)
amqsailq.c Inquire the current depth of all local queues using MQAI
amqsaxe0.c ApiExit which traces MQAPI calls
amqsbcg0.c Browse messages, text and header (use amqsgbr for text only)
amqsblst.c Bandwidth and connectivity tester
amqscnxc.c Client connection information on MQCONNX
amqsecha.c Echo messages to reply to queue (triggered program) (sent by amqsreq, maybe)
amqsgbr0.c Browse messages, text only (use amqsbcg for text and header)
amqsget0.c Get a message
amqsgrma.c Get reference messages from a queue. Checks that the objects, identified in the messages, exist
amqsinqa.c MQINQ sample (triggered program)
amqsldpc.c Look up the MQ host name, channel name and queue name in an LDAP directory + MQPUT
amqsmon0.c Get an statistics or accounting message
amqsprma.c Create a reference message
amqsptl0.c Put messages to a list of queues
amqsput0.c Put a message
amqsqrma.c Channel message exit program to process reference messages
amqsreq0.c Put request messages to a queue, and show the reply message (sent by amqsecha, maybe)
amqsseta.c MQSET sample (triggered program)
amqsspin.c SSPI Channel Exit routines (Security)
amqsstop.c Inquire on all the connections for a selected process and request them to be stopped
amqstrg0.c Trigger monitor - read an initiation queue, and start the program associated with trigger message
amqstxgx.c Get transaction for Tuxedo
amqstxpx.c Put transaction for Tuxedo
amqstxsx.c Server for Tuxedo
amqsvfc0.c Skeleton of a Data Conversion exit
amqswlm0.c CLWL exit that chooses a destination QMgr
amqsxae0.c Sample Encina program
amqsxrma.c Channel message exit to process reference messages
amquregn.c Dump MQ values from Registry (NT)
amqzscgn.c CICS GLobal User Exit (GLUE) program for the CICS Task termination user exit (UE014015)
amqzscin.c XA switch program for CICS XA Initialisation

Saturday, April 25, 2009

IBM Websphere MQ Features

WebSphere MQ provides assured one-time delivery of messages across a wide variety of platforms. The product emphasizes reliability and robustness of message traffic, and ensures that a message should never be lost if MQ is appropriately configured.

It needs to be remembered that a message in the context of MQ has no implication other than a gathering of data. MQ is very generalized and can be used as a robust substitute for many forms of intercommunication. For example, it can be used to implement reliable delivery of large files as a substitute for FTP.

MQ provides application designers a mechanism to achieve non-time-dependent architecture. Messages can be sent from one application to another, regardless of whether the applications are running at the same time. If a message receiver application is not running when a sender sends it a message, the queue manager will hold the message until the receiver asks for it. Ordering of all messages is preserved, by default this is in FIFO Order of receipt at the local queue within priority of the message.

It provides a means for transforming data between different architectures and protocols, such as Big Endian to Little Endian, or EBCDIC to ASCII. This is accomplished through the use of message data "exits". Exits are compiled applications which run on the queue manager host, and are executed by the WebSphere MQ software at the time data transformation is needed.

WebSphere MQ allows receipt of messages to "trigger" other applications to run, and thus provides the framework for a message driven architecture.

It implements the JMS standard API, and also has its own proprietary API, known as the Message Queuing Interface.

Unlike email, MQ itself is responsible for determining the destination of messages by the definition of queues, so processing of sent messages can be moved to a different application at a different destination. MQ provides a robust routing architecture, allowing messages to be routed via alternative paths around a network of MQ managers. MQ can be implemented as a cluster, where multiple MQ implementations share the processing of messages to allow higher performance and load balancing.

IBM Websphere MQ History

Developed in Scotland, Telecommunications Access Method (TCAM) came along in 1971 with the birth of TSO. It supported asynchronous messaging, as with MQ. TCAM 3.0 added in reusable disk message queues for recovery soon thereafter, as with MQ. A high-level PL/I program could be used to access TRANSIENT datasets (dynamic message queues). Reading a message from a transient dataset resulted in that message is removed from the queue, as with a non-browse READ with MQ. With the advent of computers, IBM saw an opportunity to apply new technology to the need for message switching. In the early 1960s, IBM marketed computer-like devices, such as the 7740 and 7750 message switching systems.

The IBM System/360 was announced in April 1964 and with it came communication access methods such as BTAM and QTAM (Basic and Queued Telecommunications Access Methods). In the late 1960s, still another communication access method became available and it was known as TCAM, the Telecommunications Access Method. TCAM offered its users a more advanced form of message switching or message routing. TCAM was widely accepted, especially in the financial and brokerage industries.

In the late 1960s, transaction management systems came into being, each trying to achieve a leadership position in the industry. Within IBM, CICS and IMS were chosen as strategic products to address the need for transaction management. Within both CICS and IMS, each had its version of message switching, IMS being a front-end queued system and CICS having its Transient Data facility as the possible basis for message switching.

CICS established itself as a popular transaction management system in the 1968-1971 timeframe, those users who had adopted TCAM for its message handling capabilities, now wanted a combined use of TCAM with CICS. In December 1971, IBM announced CICS support of TCAM as part of the CICS/OS-Standard product, to be delivered in December 1972. For interested customers, this enabled them to use TCAM for its message handling strengths and also have TCAM-connected terminals or computers interface with CICS online applications.

In January 1973, TCAM continued to be supported by CICS/OS-Standard Version 2.3. However, TCAM support was omitted from the initial release of CICS/VS, announced in February 1973 and delivered in June 1974. Needless to say, many CICS-TCAM customers were not happy with that product direction.

With considerable pressure from CICS-TCAM customers, the CICS support of TCAM was reinstated in the CICS/VS 1.1 product, as of September 1974. In addition to the previous DCB support, with this reinstatement of TCAM support, CICS began to support TCAM access via VTAM, also known as the ACB support. CICS TCAM ACB support was discontinued as of the CICS/ESA Version 3 product in 1990.

In 1992, IBM announced a new product family called WebSphere MQ. WebSphere MQ was to be the extension of TCAM functionality from IBM-only systems to all other platforms. WebSphere MQ had an architecture which enabled heterogeneous systems to communicate with each other (e.g. IBM, HP, Sun, Tandem, etc). WebSphere MQ can be used with CICS systems to send and receive data to/from any other MQ-eligible system. WebSphere MQ can be used to initiate work in a CICS system or a CICS transaction can initiate work in another CICS or non-CICS system.

WebSphere MQ now supports 80 different environments and has become the leading message switching/routing product in the industry.

Sunday, April 19, 2009

IBM Websphere MQ Processes

Processes

AMQMTRBN . amqhasmn.exe - the logger.
amqmsrvn.exe - COM server.
amqmtbrn.exe - . amqpcsea.exe - the command server.
amqrmppa.exe - channel process.
amqrrmfa.exe - repository process (for clusters).
amqsvc.exe - . amqxssvn.exe - shared memory server(s).
amqzdmaa.exe - deferred message processor.
amqzfuma.exe - OAM process.
amqzlaa0.exe - queue manager agents (LQM agents).
amqzllp0.exe - checkpoint processor.
amqzxma0.exe - processing controller.
runmqchi.exe - channel initiator. runmqlsr.exe - listener.

Description of MQ tasks :

When a queue manager is running, you see some or all of the following batch jobs running under the QMQM user profile in the MQ subsystem.
Job name Function AMQALMPX The checkpoint processor that periodically takes journal checkpoints. AMQCLMAA Non-threaded TCP/IP listener. AMQCRSTA TCP/IP-invoked channel responder. AMQCRS6B LU62 receiver channel and client connection (see note). AMQFCXBA Broker worker job. AMQPCSEA PCF command processor. Handles PCF and remote administration requests. AMQRMPPA Channel process pooling job. AMQRRMFA Repository manager for clusters. AMQZDMAA Deferred message handler. AMQZFUMA Object authority manager (OAM). AMQZLAA0 Queue manager agents that perform the bulk of the work for applications that connect to the queue manager using MQCNO_STANDARD_BINDING. AMQZLAS0

Queue manager agent. AMQZXMA0 The execution controller is the first job started by the queue manager. Deals with MQCONN requests. Starts agent processes to process MQ API calls. AMQZMGR0 Process controller. Used to start up and manage listeners and services. AMQZMUC0 Utility manager. Do critical utilities, as the journal chain manager. AMQZMUR0 Utility manager. Do critical utilities, as the journal chain manager. RUNMQBRK Broker control job. RUNMQCHI The channel initiator. RUNMQCHL Sender channel job that is started for each sender channel. RUNMQDLQ Dead letter queue handler. RUNMQLSR Threaded TCP/IP listener. RUNMQTRM Trigger monitor.



End the processes in the following order:
amqzmuc0 Critical process manager amqzxma0 Execution controller amqzfuma OAM process amqzlaa0 LQM agents amqzlsa0 LQM agents amqzmur0 Restartable process manager amqrmppa Process pooling process amqrrmfa The repository process (for clusters) amqzdmaa Deferred message processor amqpcsea The command server

What is Channel?

A channel is a communication link used by distributed queue managers. There are two categories of channel in MQ:

Message channels, which are unidirectional, and transfer messages from one queue manager to another.

MQI channels, which are bidirectional, and transfer MQI calls from a MQ client to a queue manager, and responses from a queue manager to a MQ client.

There are two types of MQI channel : server-connection and client-connection.
MQ 6.0, "Application Programming Guide", SC34-6595-01, page 45 [65/601]
The definition of each end of a message channel can be one of the following types:
Sender
Receiver
Server
Requester
Cluster sender
Cluster receiver
Do not confuse message channels with MQI channels. There are two types of MQI channel : server-connection and client-connection.
A message channel is defined using one of these types defined at one end, and a compatible type at the other end. Possible combinations are:
Sender - Receiver
Requester - Server
Requester - Sender (callback)
Server - Receiver (server is used as a sender)
Client-connection with Server-connection
Cluster sender-cluster receiver
MQ v 6.0, "Intercommunication", SC34-6587, page 8 [30/573].
Server / Requester use
Supose we have this environment, where firewall prevents QM2 to start a normal Sender-Receiver channel from QM2.TO.QM1, but not TCP connections from QM1 to QM2.
.-----. .---. .-----. QM1 <===== F <======= QM2 .-----. .---. .-----. We shall use a SERVER channel at QM2 and a REQUESTER channel at QM1. In this way, the data can flow from QM2 to QM1, and the channel is started from QM1. SVRCONN A server connection channel object defines the name of a channel that a client can use to connect to a queue manager and the attributes of the MCA that hosts that connection. CLNTCONN This is different to all other channel types, because it is never used by the queue manager itself. Instead, an entry is added to a client channel definition table (CCDT) file, which can be distributed to other machines and used by client applications to configure their MCAs. How to start A channel can be caused to start transmitting messages in one of four ways. It can be: Started by an operator (not receiver, cluster-receiver or server-connection channels). Triggered from the transmission queue (sender, and fully-qualified server channels only). You will need to prepare the necessary objects for triggering channels. Started from an application program (not receiver, cluster-receiver or server-connection channels). Started remotely from the network by a sender, cluster-sender, requester, server, or client-connection channel. Receiver, cluster-receiver and possibly server and requester channel transmissions, are started this way; so are server-connection channels. The channels themselves must already be started (that is, enabled). In Windows systems, start a listener as a background process at the receiver end of each channel. On the source queue manager, type: runmqlsr -t TCP -m source.queue.manager On the target queue manager, type: runmqlsr -t TCP -m target.queue.manager Then start the channels, again as background processes: On the source queue manager, type: runmqchl -c source.to.target -m source.queue.manager On the target queue manager, type: runmqchl -c target.to.source -m target.queue.manager System Administration, page 63 [87 of 567]
Auto-Magic
If you want the first message put in the queue DESA4 to start the associated transmit channel DESA3.DESA4, then define the queue this way :
def ql(DESA4) usage(xmitq) maxmsgl(104857600) + trigger TRIGTYPE(EVERY) TRIGDPTH(1) + trigdata(DESA3.DESA4) + /* channel name */ initq(SYSTEM.CHANNEL.INITQ) replace /* mandatory */
The TrigData attribute must contain the name of the channel to be triggered. The InitQ must be SYSTEM.CHANNEL.INITQ

Sunday, April 12, 2009

Oracle Fusion Middleware Components

Oracle Fusion Middleware Components

Enterprise Application Server
Weblogic Server
Oracle Application Server
Integration & Process Management
BPEL Process Manager
Business Activity Monitoring
Business Rules
Enterprise Connectivity (Adapters)
Enterprise Messaging Service
Enterprise Service Bus
Oracle Application server B2B
Service Registry
Web Services Manager
Development Tools
Application Development Framework
JDeveloper
SOA Suite
TopLink
Forms Services
Developer Suite
Business Intelligence
Business Intelligence 10g[7]
Business Activity Monitoring
Discoverer
Data Hubs
BI Publisher
Reports Services
Systems Management
Enterprise Manager 10g
Web Services Manager
User Interaction
Beehive
Collaboration Suite
Portal
Oracle Webcenter
Real-Time Collaboration
Unified Messaging
Workspaces
Content Management
Web content management
Records management
Enterprise search
Digital asset management
Email archiving
Identity management
Identity Management
Enterprise Single sign-on
Identity Manager
Oracle Access Manager
Oracle Adaptive Access Manager
Grid Infrastructure
Services Registry
Application Server Security

ORACLE Middleware

Oracle Fusion Middleware (OFM) is a portfolio of software products, produced by Oracle, that spans multiple services, including J2EE and developer tools, integration services, business intelligence, collaboration, and content management. OFM is based on open standards such as BPEL, SOAP, XML and JMS.[1] Many of the products included under the Oracle Fusion Middleware banner are not themselves middleware products, Fusion Middleware essentially being a rebranding of many of Oracle's products outside of their core database and applications software offerings. According to Oracle, by 2006 over 30,000 organizations were Fusion Middleware customers, including over 35 of the world's 50 largest companies and more than 750 of the BusinessWeek Global 1000, with OFM also supported by 7,500 partners.[2]

Oracle Fusion Middleware is designed to support development, deployment, and management of Service-Oriented Architecture. It includes what Oracle calls "Hot-Pluggable" architecture, which allows users to leverage existing investments in applications and systems from other software vendors such as IBM, Microsoft, and SAP AG.[3] Oracle will also leverage what is called configurable network computing, (CNC) techology that it got from its combined PeopleSoft and JDEdwards acquisition in 2005. Oracle Fusion Applications are under development based on Oracle Fusion Middleware.

HP, in order to provide standards-based software to assist with business process automation, have incorporated OFM into their Service-Oriented Architecture (SOA) portfolio.[4]

In January 2008, Oracle Universal Content Management won InfoWorld's Technology of the Year award for "Best Enterprise Content Manager", with Oracle SOA Suite also winning the award for "Best Enterprise Service Bus".[5]

In 2007, Gartner said "OFM has reached a degree of completeness that puts it on par with, and in some cases ahead of, competing software stacks", reporting revenue from the suite of over $1bn US during FY06, estimating the revenue from the genuinely middleware aspects at $740M.[6]

Thursday, April 9, 2009

WebSphere Message Broker

WebSphere Message Broker

WebSphere software

Features and benefits

IBM WebSphere® Message Broker V6.1 supports the following key capabilities and benefits:

Platform-Independent Based Enterprise Service Bus

*

Distribute any type of information across and between multiple diverse systems and applications, providing delivery of the right information in the right format at the right time
*

Reduce point-to-point interconnections and simplify application programming through separation of integration logic from the applications and from process logic
*

Powerful publish-and-subscribe matching engine routes information in real time based on topic and content to any endpoint
*

Validate and transform messages in-flight between any combination of different message formats, including Web Services, other XML and non-XML formats
*

Route messages based on (evaluated) business rules to match information content and business processes
*

Improve business agility by dynamically reconfiguring information distribution patterns without reprogramming end-point applications
*

Powerful runtime security model to address security concerns.
*

Integrated JCA based WebSphere Adapters as built-in nodes
*

Strengthens security and accelerates Web Services Security processing with DataPower SOA Appliance
*

Integration and enhancement of WebSphere Service Registry and Repository support to virtualize services for greater reuse

Enhance SOA support with advanced Web Services

*

Mediates (provides routing, transformation and logging) between Web Service requesters and providers
*

Mediates between Web Services and other integration models as both a service requester and a service provider
*

Delivers support for Web Services Security and Web Services Addressing, and compliance for Basic Profile
*

Works with the latest implementations of standards such as WSDL (Web Services Definition Language), SOAP (Simple Object Access Protocol), SOAP with attachments, any JMS (Java™ Message Service) HTTP(s) (Hypertext Transport Protocol), MTOM/XOP, and MQ
*

Enhanced support for provider and consumer scenarios
*

Toolkit support for WSDL drag and drop for skeleton flow creation and configuration
*

Full message set round-tripping for WSDL imports and exports.
*

New Web services parser creates more consumable message tree.

Integration without bounds with connectivity and transformation capabilities

*

Integrated WebSphere MQ transports - for Enterprise, Mobile, Real-Time, Multicast and Telemetry end points - extend the reach, scope and scale of the enterprise integration bus, out to mobile and handheld devices, along with embedded devices such as sensors or actuators.
*

Enable the secure and seamless interaction of enterprise applications with thousands of users within the Intranet and across the Internet
*

Provide native JMS interoperability, acting as a bridge between any combinations of different JMS providers.
*

Out-of-the-box nodes to simplify management and improve performance for key enterprise resource planning (ERP) integration scenarios (for example, SAP, Siebel, and PeopleSoft) through WebSphere Adapters packaged as native message-processing nodes
*

Native support for large file processing, including FTP, to simplify processing of large, repeating complex file records without using excessive storage
*

New Email Output node
*

Integration with WebSphere Transformation Extender, including the launcher, enabling WebSphere Transformation Extended maps to run natively in WebSphere Message Broker

Improved Consumability, Productivity and Systems Management

*

Provides a quick start with a single-click installation; install the product and run a sample in less than an hour
*

Simple packaging allowing for easy identification of appropriate install assets
*

Single install DVD for Windows and Linux desktops
*

ISMP installer for all platforms, SMP/.E for z/Os systems
*

Comprehensive "samples gallery" for all new and existing functions
*

Enterprise-wide identity, authentication, and authorization with Tivoli and Lightweight Directory Access Protocol (LDAP) servers to enforce service policy at the user level for greater security
*

Administration of both WebSphere MQ and WebSphere Message Broker networks in one console with the Eclipse-based Message Broker Explorer
*

Roll back with a single click

Extend your infrastructure with broader platform support and performance

*

Extend an existing WebSphere MQ and WebSphere Event Broker infrastructure
*

Available on IBM z/OS®, IBM AIX®, Linux (zSeries®, Intel, Power), Solaris (x86-64 and SPARC), HP/UX(PA-RISC, Itanium) and Microsoft® Windows® Server
*

Full range of industry standard databases includting support for DB2, SQL Server, Oracle, Sybase and Informix
*

Accounting and statistics reports support usage based charges and real-time graphical performance analysis for internal business charging
*

Enhanced SAP IDOC support
*

Improved binary data modeling within text messages.
*

64-bit capability on Linux and UNIX, Java Database Connectivity (JDBC) XA support, and Java 5 on all platforms
*

Ultra High Performance XML parser, including schema validation
*

Compacted memory footprint

Enhanced Developer Productivity

*

Eclipse based Message Broker Toolkit compatible with Rational Application Developer V6 and available on Windows and Linux
*

Data transformation options to match the data format and the developer skill set
*

Reduced toolkit size with enhanced look and feel improvements including productivity aids.
*

Standards based metadata including XML Schema and Web Services Definition Language
*

Java Debug Protocol (JDP) enabled withing toolkit
*

Graphical message metadata and mapping definition
*

Visual trace capability to display message path through flow in real time in Eclipse
*

New message viewer to graphically identify source and/or target message element locations
*

Simplified development with a configuration-drive approach for all new nodes
*

Eclipse based Type Designer and Map Designer integrated with the toolkit

Tuesday, April 7, 2009

What is Middleware?

Middleware is computer software that connects software components or applications. The software consists of a set of services that allow multiple processes running on one or more machines to interact across a network. This technology evolved to provide for interoperability in support of the move to coherent distributed architectures, which are used most often to support and simplify complex, distributed applications. It includes web servers, application servers, and similar tools that support application development and delivery. Middleware is especially integral to modern information technology based on XML, SOAP, Web services, and service-oriented architecture.

Middleware sits "in the middle" between application software working on different operating systems. It is similar to the middle layer of a three-tier single system architecture, except that it is stretched across multiple systems or applications. Examples include database systems, telecommunications software, transaction monitors, and messaging-and-queueing software.

The distinction between operating system and middleware functionality is, to some extent, arbitrary. While core kernel functionality can only be provided by the operating system itself, some functionality previously provided by separately sold middleware is now integrated in operating systems. A typical example is the TCP/IP stack for telecommunications, nowadays included in virtually every operating system.

In simulation technology, middleware is generally used in the context of the high level architecture (HLA) that applies to many distributed simulations. It is a layer of software that lies between the application code and the run-time infrastructure. Middleware generally consists of a library of functions, and enables a number of applications – simulations or federates in HLA terminology – to page these functions from the common library rather than re-create them for each application

Sunday, April 5, 2009

Middleware Interview Questions2

7. What are the different categories of client/Server applications?
Classes of client/server applications: Client/Server applications can be categorized by class,
based on where most of the processing is done. Each class requires different hardware and
software capabilities on the client, the server and the network.
1. Host-Based Processing
2. Client-Based Processing
3. Coopeartive Processing


8. What is meant by Client, Server & Network?
Client : The client hardware is the desktop machine that runs client software. It could be a micro
or a workstation. The client software formulates data request and passes the request to the
network software. This software sends the request to the server, accepts the result from the server
and passes the request back to the client software.
Server : A server is the machine that runs data management software that has been designed for
server functionality. A server has operating system software, data management software and a
portion of the network software.
Network : The network hardware is the cabling, the communication cards and the devices that
link the servers and the clients.

9. Define Application server.
Application Server : Application server, which provides specific application services to an
application. Application servers are the type of middleware, which occupy a large chunk of
computing territory between database servers and end users.

10. What is meant by HTTP and ODBC?
1. ODBC : Open database connectivity is a windows technology that lets a
database client application connect to a external database. To use ODBC,
the database vendor must provide an ODBC driver for data access.
2. HTTP : Hyper Text Transfer Protocol is the underlying protocol used by
the world wide web. HTTP defines how messages are formatted and
transmitted and what action web servers and browsers should take in
response to various commands. HTTP only supports transmission of text.

11. Define Group Server.
Groupware Server : A Groupware server is a software designed to enable users to
collaborate, regardless of location through the internet or a corporate intranet and to work
together in a virtual atmosphere.

12. Define TCP/IP and IPx/SPx.
TCP/IP : Transfer control Protocol and Internet Protocol

Middleware Interview Questions 3

13. What is Peer-to-Peer communication?
Peer-to-Peer : Most early client/server applications were implemented using low level
conversational peer-to-peer products. The term peer-to-peer indicates that the two sides of a
communication link use the same protocol interface to conduct a networked conversation. Any
computer can initiate a conversation with any other computer. A peer-to-peer network
relationship defines one in which computer on the network communicate with each other as
equals. Each computer is responsible for making its own resources available.

14. What are the different categories of client/Server applications?
a) Host-Based Processing
b) Client-Based Processing
c) Coopeartive Processing

BDV-842844-BDV
15. What is Server & Network?
Server : A server is the machine that runs data management software that has been designed for
server functionality. A server has operating system software, data management software and a
portion of the network software.
Network : The network hardware is the cabling, the communication cards and the devices that
link the servers and the clients.

16. What is meant by Client & Network?
Client : The client hardware is the desktop machine that runs client software. It could be a micro
or a workstation. The client software formulates data request and passes the request to the
network software. This software sends the request to the server, accepts the result from the server
and passes the request back to the client software.
Network : The network hardware is the cabling, the communication cards and the devices that
link the servers and the clients.

17. What is Application server ?
Application servers, which provide specific application services to an application. An
example is a server that runs a database that a distributed application users.
Application servers are the type of middleware, which occupy a large chunk of computing
territory between database servers and end users, and they often connect the two.

18. What is Database servers ?
Database servers, which provide database storage and data sharing with other computers in
the network. Database servers more and store data records or databases over corporate networks
and across the internet.

19. What is Group Server ?
A Groupware server is a software designated to enable users to collaborate, regardless of
location through the internet or a corporate intranet and to work together in a virtual atmosphere.

20. What is Web Server ?
A Web Server is a computer system that delivers web pages. Every web server has an IP
address and possibly a domain name.

Thursday, April 2, 2009

Middleware Interview Questions

Middleware Technologies

UNIT I

1. What is Client/Server?
Client : The client hardware is the desktop machine that runs client software. It could be a micro
or a workstation. The client software formulates data request and passes the request to the
network software. This software sends the request to the server, accepts the result from the server
and passes the request back to the client software.
Server : A server is the machine that runs data management software that has been designed for
server functionality. A server has operating system software, data management software and a
portion of the network software.

2. Define File server.
File Server : File servers manage a work group’s applications and data files, so that they may
be shared by the group. File servers are very I/O oriented. They pull large amounts of data
off their storage subsystems and pass the data over the network. When the data from the file
is requested, a file server transmit all records from the file.

3. What are the Service Specific middleware available?
1. ODBC : Open database connectivity is a windows technology that lets a database
client application connect to a external database. To use ODBC, the database
vendor must provide an ODBC driver for data access.
2. HTTP : Hyper Text Transfer Protocol is the underlying protocol used by the
world wide web. HTTP defines how messages are formatted and transmitted and
what action web servers and browsers should take in response to various
commands. HTTP only supports transmission of text.

4. Define the services provided by Web server.
Web server : A webserver is a computer system that delivers web pages. Every web server
has an IP address and possibly a domain name. for example an URL:
http://www.niceindia.com/index.html in our browser. This sends a request to the server
whose domain name is niceindia.com. the server fetches the page named index.html and
sends back to our browsers.

5. Define TCP/IP and IPx/SPx.
TCP/IP : Transfer control Protocol and Internet Protocol.


6. What is Remote Procedure Call?
Remote Procedure Call (RPC): One of the earliest facilities that was created to help programmers
write client/server software is known generically as a Remote Procedure Call mechanism. When
implementing a program, the programmer uses procedures to keep the code manageable. Instead
of defining a single, large procedure that performs many tasks, the programmer divides the tasks
into sets and uses shorter procedure to handle each set. A client procedure process calls a
function on a remote server and suspends itself until it gets back the result. This process that
issues the calls and waits until it gets the result is called remote procedure call.

BDV-879698-BDV

Wednesday, April 1, 2009

Cisco Certified Internetwork Expert (CCIE)

Cisco Certified Internetwork Expert

Expert Level Knowledge and Experience
Cisco CCIE
Cisco Certified Internetwork Expert (CCIE®) is the highest level of technical networking certification offered by Cisco. Put your knowledge and experience to the test. Achieve Cisco CCIE certification and accelerate your career.

CCIE is the Industry’s Most Respected IT Certification
For over fifteen years, CCIE has identified networking professionals with the highest level of expertise. Less than three percent of all Cisco certified professionals earn their CCIE. Experience is the best preparation for the hands-on CCIE lab exam.



CCIE Security Lab Exam Changes to Go Live April 20, 2009
Effective April 20, 2009, important content changes will be implemented in the CCIE Security Lab exams. Candidates for lab exams scheduled April 20, 2009 or later should prepare using the v3.0 Lab Equipment and Software Versions and v.3 Blueprint. Candidates prior to April 20, 2009 should continue using the v2.0 Lab Equipment and Software Versions and v 2.0 blueprint.

Updates to the CCIE Lab and Written Exam Question Format and Scoring
Effective February 1, 2009, Cisco will introduce a new type of question format to CCIE Routing and Switching lab exams. In addition to the live configuration scenarios, candidates will be asked a series of four or five open-ended questions, on the computer screen, drawn from a pool of questions based on the material covered on the lab blueprint. No new topics are being added.



Candidates will also see two other changes to the CCIE written exams. Effective February 17th, 2009, candidates will be required to answer each question before moving on to the next question. In other words, candidates will no longer be allowed to skip a question and come back to it at a later time. Finally, there will be an update to the overall score report. The overall exam score and the exam passing score will now be reported on a scale from 300-1000.



To find out more information regarding updates to the CCIE Lab and scoring format, access the CCIE Q&A session in the link below.



Click Here for More Information!

New Cisco CCIE Wireless Certification
The Cisco CCIE Wireless certification assesses and validates wireless expertise. Candidates who pass the CCIE Wireless certification exams must demonstrate broad theoretical knowledge of wireless networking and a solid understanding of wireless LAN technologies from Cisco, the market leader in WLAN technology.



Benefits of CCIE Certified Wireless Certification



•Provides greater opportunity for salary increase and job advancement
•Validates expertise in major aspects of wireless LAN technology
•Provides a stepping stone for individuals interested in a career in managing or working with Cisco wireless technologies
The Cisco CCIE Wireless certification validates that a professional has the expertise to design and manage wireless networks and to make mission-critical and business-critical wireless network decisions. It confirms that you have the job skills and technical knowledge required of an expert-level network IT practitioner.



Find out more about the Cisco CCIE Wireless Certification.



Cisco Refreshes Lab Portion of its Popular CCIE Voice Exam
To meet the needs of today’s expert-level voice services professionals, Cisco has refreshed the lab portion of its popular CCIE Voice certification. The revised CCIE Voice lab exam will be live and available beginning July 16, 2008. The revised Cisco CCIE Voice Lab Exam addresses critical skills that voice professionals must posses including the ability to define integrated network services and mitigate future performance problems.



For more information about the new Cisco CCIE Voice Lab Exam including lab blue prints and recommended reading, visit the Cisco Learning Network at www.cisco.com/go/learnnetspace.



Introducing the Cisco 360 Learning Program for CCIE Routing and Switching
Designed with high-potential network professionals in mind, the Cisco 360 Learning Program for CCIE Routing and Switching is a comprehensive, blended learning program designed to accelerate expert-level competency and provide the skills and training needed to prepare candidates for the rigorous CCIE Routing and Switching

Friday, March 27, 2009

Comparison of Java and C Sharp

This is a comparison of the C# programming language with the Java programming language. As the two are both garbage-collected runtime-compiled languages with syntax derived from C and C++, there are many similarities between Java and C#. However, there are also many differences, with C# being described as a hybrid of C++ and Java, with additional new features and changes. This page documents the strong general similarities of the languages and then points out those instances where the languages differ.

Object handling

Both C# and also Java are designed from the ground up as object oriented languages using dynamic dispatch, with a syntax similar to C++. (C++ in turn is derived from C.) Neither language is a superset of C or C++, however. Both use garbage collection as a means of reclaiming memory resources, rather than explicit deallocation of memory. Both include thread synchronization mechanisms as part of their language syntax.

[edit] References

C# allows restricted use of pointers. Pointers and pointer-arithmetic are potentially unsafe in a managed environment as they can be used to bypass the strict rules for object access. C# addresses that concern by requiring that code blocks or methods that use the feature be marked with the unsafe keyword, so that all clients of such code can be aware that the code may be less secure than otherwise. The compiler requires the /unsafe switch to allow compilation of a program that uses such code. Generally, unsafe code is either used to allow better interoperability with unmanaged APIs or system calls (which are inherently "unsafe"), or for performance reasons. Java does not allow pointers or pointer-arithmetic to be used.

[edit] Data types

Both languages support the idea of primitive types (all of which, except for String, are value types in C#/.NET). C# has more primitive types than Java, with unsigned as well as signed integer types being supported, and a decimal type for decimal floating-point calculations. Java lacks unsigned types. In particular, Java lacks a primitive type for an unsigned byte, while C# bytes are unsigned by default. Strings are treated as (immutable) objects in both languages, but support for string literals provides a specialized means of constructing them. C# also allows verbatim strings for quotation without escape sequences, which also allow newlines.

Both allow automatic boxing and unboxing to translate primitive data to and from their object form. Effectively, this makes the primitive types a subtype of the Object type. In C# this also means that primitive types can define methods, such as an override of Object's ToString() method. In Java, separate primitive wrapper classes provide such functionality. In Java primitive values are not implicitly boxed when dereferenced and an explicit cast is required for an instance call on a primitive value ((Integer)42).toString() instead of a C# instance call 42.ToString(). Another difference is that Java makes heavy use of boxed types in generics (see below), and as such allows an implicit unboxing conversion (in C# this requires a cast). As these implicit unboxing conversions can potentially throw null pointer exceptions, modern integrated development environments and compilers can be configured to highlight them.

[edit] Value types

C# allows the programmer to create user-defined value types, using the struct keyword. From the programmer's perspective, they can be seen as lightweight classes. Unlike regular classes, and like the standard primitives, such value types are allocated on the stack rather than on the heap. They can also be part of an object (either as a field or boxed), or stored in an array, without the memory indirection that normally exists for class types. Structs also come with a number of limitations. Because structs have no notion of a null value and can be used in arrays without initialization, they always come with an implicit default constructor that essentially fills the struct memory space with zeroes. The programmer can only define additional constructors with one or more arguments. This also means that structs lack a virtual method table, and because of that (and the fixed memory footprint), they cannot allow inheritance (but can implement interfaces).

[edit] Enumerations

Enumerations in C# are derived from a primitive 8, 16, 32, or 64 bit integer type. Any value of the underlying primitive type is a valid value of the enumeration type, though an explicit cast may be needed to assign it. C# also supports bitmapped enumerations where an actual value may be a combination of enumerated values bitwise or'ed together. Enumerations in Java, on the other hand, are objects. The only valid values in a Java enumeration are the ones listed in the enumeration. As objects, each enumeration can contain its own fields which can be modified. Special enumeration set and map collections provide fully type-safe functionality with minimal overhead. Java enumerations allow differing method implementations for each value in the enumeration. Both C# and Java enumerations can be converted to strings and can be used in a switch statement.

[edit] Arrays

Array and collection types are also given significance in the syntax of both languages, thanks to an iterator-based foreach statement loop. In C# an array corresponds to an object of the Array class, while in Java each array is a direct subclass of the Object class (but can be cast to an array of an element type that is an ancestor of its true element type), and does not implement any of the collection interfaces. C# has true multidimensional arrays, as well as the arrays-of-arrays that are available in Java (and which in C# are commonly called jagged arrays). Multidimensional arrays can in some cases increase performance because of increased locality (as there is a single pointer dereference, instead of one for every dimension of the array as is the case for jagged arrays). Another advantage is that the entire multidimensional array can be allocated with a single application of operator new, while jagged arrays require loops and allocations for every dimension. Note, though, that Java provides a syntactic construct for allocating a multidimensional jagged array with regular lengths (a rectangular array in the C# terminology); the loops and multiple allocations are then performed by the virtual machine and need not be explicit at the source level.

[edit] Inner classes

Both languages allow inner classes, where a class is defined entirely within another class. In Java, these classes have access to both the static and non-static members of the outer class (unless the inner class is declared static, then it only has access to the static members). Local classes can be defined within a method and have access to the method's local variables declared final, and anonymous local classes allow the creation of class instances that override some of their class methods.

C# also provides inner classes, but unlike Java, requires an explicit reference to the outer class to its non-static members. Also, C# provides anonymous delegates as a construct that can provide access to local variables and members (see Event handling). Local classes and anonymous classes are not available.

[edit] Partial classes

C# allows a class definition to be split across several source files using a feature called partial classes. Each part must be marked with the keyword partial. All the parts must be presented to the compiler as part of a single compilation. Parts can reference members from other parts. Parts can implement interfaces and one part can define a base class. The feature is useful in code generation scenarios where a code generator can supply one part and the developer another part to be compiled together. The developer can thus edit their part without the risk of a code generator overwriting that code at some later time. Unlike the class extension mechanism a partial class allows "circular" dependencies amongst its parts as they are guaranteed to be resolved at compile time. Java has no corresponding concept.

Visual Basic .NET

Visual Basic (VB), formerly called Visual Basic .NET (VB.NET), is an object-oriented computer language that can be viewed as an evolution of Microsoft's Visual Basic (VB) implemented on the Microsoft .NET framework. Its introduction has been controversial, as significant changes were made that broke backward compatibility with older versions and caused a rift within the developer community.

Visual Basic .NET (VB 7)

The original Visual Basic .NET was released alongside Visual C# and ASP.NET in 2002. C# — widely touted as Microsoft's answer to Java — received the lion's share of media attention, while VB.NET (sometimes known as VB7) was not as widely covered.[citation needed]

[edit] Visual Basic .NET 2003 (VB 7.1)

Visual Basic .NET 2003 was released with version 1.1 of the .NET Framework. New features included support for the .NET Compact Framework and a better VB upgrade wizard. Improvements were also made to the performance and reliability of the .NET IDE (particularly the background compiler) and runtime.

In addition, Visual Basic .NET 2003 was also available in the Visual Studio .NET 2003 Academic Edition (VS03AE). VS03AE is distributed to a certain number of scholars from each country for free.

[edit] Visual Basic 2005 (VB 8.0)

Visual Basic 2005 is the name used to refer to the update to Visual Basic .NET, Microsoft having decided to drop the .NET portion of the title.

For this release, Microsoft added many features, including:

* Edit and Continue
* Design-time expression evaluation
* The My pseudo-namespace (overview, details), which provides:
o easy access to certain areas of the .NET Framework that otherwise require significant code to access
o dynamically-generated classes (notably My.Forms)
* Improvements to the VB-to-VB.NET converter [2]
* The Using keyword, simplifying the use of objects that require the Dispose pattern to free resources
* Just My Code, which hides boilerplate code written by the Visual Studio .NET IDE
* Data Source binding, easing database client/server development

The above functions (particularly My) are intended to reinforce Visual Basic .NET's focus as a rapid application development platform and further differentiate it from C#.

Visual Basic 2005 introduced features meant to fill in the gaps between itself and other "more powerful" .NET languages, adding:

* .NET 2.0 languages features such as:
o generics [3]
o Partial classes, a method of defining some parts of a class in one file and then adding more definitions later; particularly useful for integrating user code with auto-generated code
o Nullable Types
* XML comments that can be processed by tools like NDoc to produce "automatic" documentation
* Operator overloading [4]
* Support for unsigned integer data types commonly used in other languages

[edit] 'IsNot' operator patented

One other feature of Visual Basic 2005 is the conversion of 'If Not X Is Y' to 'If X IsNot Y' which gained notoriety [5] when it was found to be the subject of a Microsoft patent application [6] [7].

[edit] Visual Basic 2005 Express

As part of the Visual Studio product range, Microsoft created a set of free development environments for hobbyists and novices, the Visual Studio 2005 Express series. One edition in the series is Visual Basic 2005 Express Edition, which was succeeded by Visual Basic 2008 Express Edition in the 2008 edition of Visual Studio Express.[8]

The Express Editions are targeted specifically for people learning a language. They have a streamlined version of the user interface, and lack more advanced features of the standard versions. On the other hand, Visual Basic 2005 Express Edition does contain the Visual Basic 6.0 converter, so it is a way to evaluate feasibility of conversion from older versions of Visual Basic.

[edit] Visual Basic 2008 (VB 9.0)

Visual Basic 9.0 was released together with the Microsoft .NET Framework 3.5 on November 19, 2007.

For this release, Microsoft added many features, including:

* A true conditional operator If (boolean, value, value) to replace the IIF function.
* Anonymous types
* Support for LINQ
* Lambda expressions
* XML Literals
* Type Inference

[edit] Visual Basic 'VBx' (VB 10.0)

Visual Basic 10, also known as VBx, will offer support for the Dynamic Language Runtime (DLR). VB 10 is planned to be part of Silverlight 2.0.[citation needed]

[edit] Relation to older versions of Visual Basic (VB6 and previous)

Whether Visual Basic .NET should be considered as just another version of Visual Basic or a completely different language is a topic of debate. This is not obvious, as once the methods that have been moved around and that can be automatically converted are accounted for, the basic syntax of the language has not seen many "breaking" changes, just additions to support new features like structured exception handling and short-circuited expressions. Two important data type changes occurred with the move to VB.NET. Compared to VB6, the Integer data type has been doubled in length from 16 bits to 32 bits, and the Long data type has been doubled in length from 32 bits to 64 bits. This is true for all versions of VB.NET. A 16-bit integer in all versions of VB.NET is now known as a Short. Similarly, the Windows Forms GUI editor is very similar in style and function to the Visual Basic form editor.

The version numbers used for the new Visual Basic (7, 7.1, 8, 9, ...) clearly imply that it is viewed by Microsoft as still essentially the same product as the old Visual Basic.

The things that have changed significantly are the semantics — from those of an object-based programming language running on a deterministic, reference-counted engine based on COM to a fully object-oriented language backed by the .NET Framework, which consists of a combination of the Common Language Runtime (a virtual machine using generational garbage collection and a just-in-time compilation engine) and a far larger class library. The increased breadth of the latter is also a problem that VB developers have to deal with when coming to the language, although this is somewhat addressed by the My feature in Visual Studio 2005.

The changes have altered many underlying assumptions about the "right" thing to do with respect to performance and maintainability. Some functions and libraries no longer exist; others are available, but not as efficient as the "native" .NET alternatives. Even if they compile, most converted VB6 applications will require some level of refactoring to take full advantage of the new language. Documentation is available to cover changes in the syntax, debugging applications, deployment and terminology.[9]

An Inspirational film that touches your Soul

Wednesday, March 25, 2009

Oracle Fusion Middleware for Applications

Market-Leading, Certified, Hot-Pluggable - For a Lower TCO
Oracle Fusion Middleware for Applications applies Oracle's market-leading middleware portfolio to the leading business applications. Extend the business value of your applications across user communities, lines of business, and organizations.

Learn more about Oracle's middleware strategy.



BENEFITS


* Increase your capacity for growth and change—The only comprehensive and integrated middleware foundation certified with Oracle HCM, CRM, financial management, and other business applications
* Enable business insight—Pervasive Business Intelligence delivers insights from across information sources to drive more effective strategies, actions, and processes
* Mitigate risk and ensure compliance—The industry's only hot-pluggable middleware automates information access and document management across applications and business processes
* Empower users for productive interactions—Unified access to processes, information, and services for customers, partners and workers


Oracle is #1 in Middleware
Only Oracle delivers the #1 portfolio of open, world-class middleware products. Three core design principles help drive Oracle Fusion Middleware's leadership position in the market:

* Comprehensive—Provides a complete offering—ranging from Java application servers and business process management to Enterprise 2.0 user interaction and content management
* Preintegrated—Delivers best-in-class middleware products that work together and with Oracle Database and Oracle Applications to lower the cost of ownership
* Hot-pluggable—Allows customers to drop and deploy Oracle middleware into heterogeneous IT environments, providing long-term flexibility, and the ability to optimize existing IT investments


A World-Class Combination
The addition of BEA products to Oracle Fusion Middleware advances Oracle's middleware strategy and further strengthens key areas of the Oracle Fusion Middleware family. Hear from Oracle executives on the strategic direction of Oracle Fusion Middleware in this in-depth Webcast (Presentation PDF). See what customers, partners, and user communities are saying. Learn more about Oracle Fusion Middleware's strategic products in the table below:



PRODUCT AREA STRATEGIC PRODUCTS LISTEN
Middleware Oracle Fusion Middleware Podcast 1
Podcast 2
Application Server Oracle WebLogic Server
Oracle WebLogic Suite
Oracle WebLogic Application Grid
Oracle Coherence
Oracle JRockit Podcast
Podcast
Podcast
Podcast
Podcast
Transaction Processing Oracle Tuxedo Podcast
Service-Oriented Architecture Oracle SOA Suite Podcast
SOA Governance Oracle SOA Governance Podcast
Developer Tools Oracle JDeveloper
Oracle Enterprise Pack for Eclipse Podcast
Podcast
Podcast
Enterprise 2.0 and Portals Oracle WebCenter Suite
Oracle WebCenter Services Podcast
Podcast
Business Process Management Oracle BPM Suite Podcast
Enterprise Content Management Oracle Content Management Podcast
Collaboration Oracle Beehive Podcast
Identity Management Oracle Identity Management Podcast
Business Intelligence Oracle Business Intelligence Enterprise Edition Plus Podcast
Event-Driven Architecture Oracle EDA Suite Podcast
Data Integration Oracle Data Integration Suite Podcast
Service Delivery Platform Oracle Service Delivery Platform



WHAT CUSTOMERS ARE SAYING



* Procter & Gamble
* USi, an AT&T company
* Farmers Insurance Group
* Ingersoll Rand
* Logitech
* First Horizon
* The First American Corporation
* Kabel Deutschland
* PG&E
* BAE Systems Australia
* NetApp
* TIAA-CREF



* INDRA
* CRIS (Indian Railways)
* InterCall
* Habitat
* WebEx Communications
* Intermountain Healthcare
* Synapse Group Inc.
* California State University
* Colorcon
* Novartis Pharma AG
* London Stock Exchange
* Schneider National Inc.