If you are entering multiple purchase requisitions in the same log-in session, and a lot of those requisitions have the same information – such as Need by Date, Currency, or Project Related Information, etc., you can use the Requisition Preferences to automatically populate this data into your requisition making entry a snap! It’s as simple as entering the replicate data and saving it.
Blog | May 12, 2016
Java applet launching issues occur in large numbers for those users who have a 64 bit OS and are accessing the application through a VPN tunnel. While those who have 32 bit OS are less prone to face this issue regardless they are accessing through VPN tunnel or not.
Blog | Feb 11, 2016
A new 'dualfs' option is available when performing standard clones, as well as while adding a new node. With the 'dualfs' option, both the run and patch file systems are cloned and configured in a single operation.
Blog | Jan 12, 2016
The benefit we get here by moving away from Traditional SMTP/IMAP Server is to minimize In-house Exchange Overheads. It keeps you updated on the Critical Patches as well.
Blog | Nov 5, 2015
The Oracle Workflow Business Event System is an application service that leverages the Oracle Advanced Queuing (AQ) infrastructure to communicate business events between systems.
Blog | Oct 21, 2015
It can be easily seen, that the compressed table saves almost 60% on blocks compared to the uncompressed table in practical scenarios, this depends on how the data is structured.
Blog | Oct 20, 2015
One significant advantage is Oracle’s ability to read compressed blocks directly without having to first uncompress the block. Therefore, there is no measurable performance degradation for accessing compressed data.
Blog | Sep 22, 2015
The web features of ADI allow you to leverage the internet computing architecture to the benefit of your organization.
Blog | Sep 22, 2014
Oracle Access Manager (OAM) is a web access management system that provides a single, secure point of entry where a user’s identity can be verified and access to the enterprise resources can be managed. As a comprehensive identity management and access control system, it has simplified user access across different applications.
Blog | Jun 27, 2014
In contrast, the service industries are often at a loss in describing the strategic and financial impact of superior supply chain management for their large strategic spend categories, such as IT services, legal services and consulting.