Thursday, May 28, 2015

If Workstation fails to load or you have issues using the Workstation UI. (90/285 technotes for 2015)

Windows:
  1. Navigate to the VMware Workstation folder in Program Files.
  2. Double-click vm-support.vbs support script.
  3. When the process completes, you are presented with a message informing you that a file was created in a folder calledvmware-support in your host’s %TEMP% folder. The compressed support bundle name begins with vmsupport and includes a date stamp for month, day, and year.
  4. After collecting your support data, upload it as an attachment to your Support Request (SR). For more information, seeUploading diagnostic information to VMware (1008525).

References: 

Complete article - http://vmw.re/1RrInD5

Wednesday, May 20, 2015

Creating Virtual NIC (Network Interface Card) using Microsoft Loopback Adapter.

  • Under hdwwiz.exe - … - 
  • Select from list - Network Adapters, you should have a"Microsoft Loopback Adapter" device.
  • Finish 


References:

http://superuser.com/questions/339465/creating-a-virtual-nic-on-windows-7

What is Microsoft Wifi Mini Virtual Adapter? (88/285 technotes for 2015)



Virtual WiFi is a technology that virtualizes your network adapter much in the same way VMWare virtualizes your entire operating system. Once virtualized, you can basically convert one physical wireless adapter into two virtual ones



References:

http://bit.ly/1EYpbE3

Tuesday, May 19, 2015

Basic’s of Networking. (87/295 technotes for 2015)

What is a Public IP Address?

image

What is a Private IP Address?

image


What is a Default Gateway?

Default Gateway - is a the device that passes information from the local subnet to some other subnet (local network to internet)


In home, the home router is assigned the default gateway ip address - 192.168.1.1

What is a CIDR Notation?

First address of a network, followed by a slash character (/), and ending with the bit-length of the prefix. For example, 192.168.1.0/24 is the prefix of the Internet Protocol Version 4 network starting at the given address, having 24 bits allocated for the network prefix, and the remaining 8 bits reserved for host addressing


What is a Subnet?

The practice of dividing a network into two or more networks is called subnetting. 

image



Subnets may be arranged logically in a hierarchical architecture, partitioning an organization’s network address space into a tree-like routing structure.


What is a Subnet Mask?

A subnet mask is a screen of numbers used for routing traffic within a subnet. Once a packet has arrived at an organization’s gateway or connection point with its unique network number, it can be routed to its destination within the organization’s internal gateways using the subnet number.

What is a DHCP Server?


Where is a DHCP Server located?

DHCP server is located in the Router. If you do ipconfig /all you will see any entry mentioning the DHCP entry.

image

Goto your browser and type the ip address of the DHCP Server -> it will take you to the router admin console

image

Most likely it will be the same as the default gateway.


What is a DNS Server?

Domain Name Servers (DNS) are the Internet’s equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. This is necessary because, although domain names are easy for people to remember, computers or machines, access websites based on IP addresses

Where is a DNS Server located?

DNS Server is a servics provided by the ISP - http://dns.comcast.net/

Some smart routers act as a local DNS Server by remembering ip addresses of a websites.

Command - ipconfig /all | findstr /R "DNS Servers"


What is a primary DNS?


References:

Friday, May 15, 2015

What is a Root CA and Intermediate Certificate? (86/285 technotes for 2015)

  • The Root certificate has the private key issued by the CA (Certificate Authority). 
  • This is set offline and has to be in a secured location as it contains the private key.
  • From the Root CA - 2nd Level / Intermediate Certificate’s are generated
  • 2nd Level Certificates are responsible for issuing certificated to any websites which require certificates.
  • In order for the browser accesing a website to trust a certificate, the browser has to be pre-loaded with the Root Certificate (the red arrow).

References:

https://youtu.be/LRMBZhdFjDI

Wednesday, May 13, 2015

IBM ODM Introduction (85/285 technotes for 2015)

Challenges Solved:

  • Rules hidden in your application or processes - hard to find and change
  • You want to Automate Operational Decisions - assuming safe
  • Legacy system is hard to use - and not accessible by Business users
  • Change requests often take months to implement

TIME TO SWITCH to ODM - ODM is all about CHANGE

  • Rules that change
  • Detect real time Business Events - apply rules accordingly

ODM (Operational Decision Management) system is the evolution of BRMS (Business Rules Management System).

  • Easy to use system to automate day-to-day operational decisions
  • Intuitive interface both for business and IT

References:

ODM for Dummies - http://ibm.co/1PjfJq6

Importing Image into AWS as an AMI using AWS CLI. (84/285 technotes for 2015)

Importing an external image into AWS requires the steps below.

aws ec2 help

  • Download the VM image from its current environment as an OVA file (or VMDK, VHD, or RAW).
  • Upload the VM image to S3 using the web console. Goto S3 –> choose / create a bucket and upload the VM file.
image
image


  • Once the VM image is uploaded, import your VM using the ec2 import-image command.

aws ec2 import-image –cli-input-json “
{  "Description": "Datapower OVA",
    "DiskContainers": [
          { "Description": "First CLI task",
            "UserBucket": 

             { "S3Bucket": "datapower-bucket", 

               "S3Key" : "rel_agoradco_nonpd_xen.vhd" 

           }
        } ]
}”

  • Use the ec2 describe-import-image-tasks command to monitor the import progress.

aws ec2 describe-import-image-tasks –import-task-ids import-ami-fgifmh5x

  • Once your import task is completed, you can use the ec2 run-instances command to create an Amazon EC2 instance from the AMI generated during the import process.

References:

Monday, May 4, 2015

Global Business Process Management (BPM) as a Service Market 2015-2019

Global Business Process Management (BPM) as a Service Market 2015-2019

How to disable a wsdl/port type is WSRR? (82/285 technotes for 2015)

Login to WSRR –> WSDL Document –> click on the wsdl that you want to “retire” –> Governance tab –> “Retire from use” –> Transition

image
image
image

Red Hat Extends Open Source BPM Momentum | Open Source Application Software Companies content from The VAR Guy

Red Hat JBoss BPM and RedHat PaaS 

JBoss BPM suite in OpenShift


Red Hat Extends Open Source BPM Momentum | Open Source Application Software Companies content from The VAR Guy

Top 3 vendors in smart/intelligent BPM space. (81/285 technotes for 2015)

Changing Market - iBPMs include social, analytics and cloud in their offering

For different factors for iBPMs are

  • Composition of intelligent, process-centric applications
  • Continuous process improvement (CPI)
  • Business transformation
  • Digitalized process

Appian

  • what is happening right now within their organization, markets and customers, and accelerate the translation of that awareness into action and business outcomes 
  • social centricity 

Short Comings

  • does not have full CEP(Complex Event Processing) and analytics capabilities 


  • less support for top down transformation.

Pega System

  • Largest pure play vendor
  • can be leveraged for large complex business scenarios


  • advanced operational decision management capabilities, predictive analytics and IoT integration

Short Comings

  • did not focus on low end mid market
  • finding resource is difficult

IBM BPM

  • Steadily moving to cloud
  • enabling mobile, social, cloud and big data while driving efficiency and optimization into end-to-end processes.

  • starting to handle -  more-agile, lightweight projects.

  • leader in decision management 

Short Comings

  • relatively hard to configure and deploy
  • customer feedback is lukewarm / tepid.

References:

http://bit.ly/1R6rXk4

Friday, May 1, 2015

Benefits of using IBM Business Process Manager Advanced. (80/285 technotes for 2015)

Connectivity

RecProcess Integration Challenges:

  1. Variety of different types of messaging - over TCP/IP and SNA etc, propriety data formats, unusual and one off integration mechanism.
  2. Long running Business processes and handling failure scenarios 
  3. Undoing Business processes in a controlled manner.
  4. Data mapping is complex
  5. Inbound event based Business processes.
  • In particular, an automated recovery method allows you to bypass the manual interventions that would have been used