Posts tagged business rule
To be useful, data held and used in information systems has to live up to a number of expectations. The data should be an accurate representation of its source. It should be reliable. The data should have internal consistency. The data should adhere to rules based on the logic of the real world. This accuracy, internal quality, and reliability of data is frequently referred as data integrity.
Safeguarding the integrity of data is a challenge, one that increases in complexity when multiple users access and manipulate the data simultaneously , obviously a common situation. And that challenge reaches new heights when the data is managed in multiple independent data stores rather than a single database.
Earlier this month, the Oracle Technology Network published an article that I recently wrote on this subject: http://www.oracle.com/technetwork/articles/soa/jellema-data-integrity-1932181.html. I was triggered into writing it by two recent experiences.
One was at a customer of mine where we are designing a service oriented architecture, based on a number of distinct and independent data domains. These domains are exposed through elementary (entity) services. A second tier of More >
How Oracle Database uses internal locks to make statement level constraint validation robust at the transaction level0
Data Constraints are essential in protecting the integrity of the data in any relational database. The Oracle Database provides four types of declarative constraints that help implement various types of data rules. These are: Primary Key, Unique Key, Foreign Key and Check Constraint. Although these constraints can be configured to be enforced at transaction time (when the transaction is committed) by setting them to be deferred, the default behavior of the constraints is to enforce the integrity rule at statement level. That means that when a transaction performs multiple DML statements, the constraints are validated during execution of the statement. When the statement is done, the integrity is ensured (otherwise the statement would have failed) and additional statements can be executed.
In the multi session environment that is the Oracle Database, you could be wondering – as was I – how the Oracle Database ensures that other sessions executing DML operations can not undermine the integrity of the data touched by the current transaction. And how it can do so without needlessly preventing other sessions to perform data manipulation using various forms of locking.
It turns out that More >
I have just completed my first ever presentation on the Expertezed.com network – http://www.expertezed.com/ , a reprise from my session on Oracle OpenWorld 2012. This presentation includes a number of slides regarding 12c features, based on the session and slides from Tom Kyte (Top 12 new features) and my notes from the excellent session CON8511 – Temporal Database Capabilities with the Latest Generation of Database Technology that I attended during the conference.
You can download the slides from this presentation here:Expertezed_OOW2012_TheVeryVeryLatestInDatabaseDevelopment.pptx .
Ben jij een (junior) Oracle consultant die een stap verder wil maken? Wil je verder groeien en ontwikkelen tot principal consultant? AMIS geeft je de kans om die stap te zetten. Bij ons krijg je de ruimte om te experimenteren én te leren samen met de experts op je vakgebied.
Laat ons in een vrijblijvend gesprek vertellen welke mogelijkheden we je kunnen bieden. Neem voor een afspraak met een van onze consultants contact op met Eva.email@example.com of bel haar op 030-6016000. Je bent van harte welkom.
AMIS merkt dat haar concept van hoogwaardige en kennisintensieve dienstverlening erg succesvol is. Onze toekomst ziet er erg aantrekkelijk uit met interessante opdrachten bij toonaangevende klanten. Vandaar dat we op zoek zijn naar uitbreiding van ons team.
Denk niet direct dat je hiervoor te weinig kennis of ervaring hebt: jouw toekomstige ervaren collega’s doen niets liever dan jou verder helpen. Ons trainingsprogramma voorziet in een grote diversiteit aan opleidingen en tijdens onze interne kennissessies kun je op veel terreinen iets van je collega’s opsteken. Concreet hebben we de volgende vacatures:
Introducing Decision Tables in the SOA Suite 11g Business Rule component through a game of Rock, Paper and Scissors0
The Business Rule component in SOA Suite 11g is used to implement business logic. The logic is extracted from BPM or BPEL process definitions for from Java or other program code, exposed to be invoked from those contexts and defined in a way that makes it accessible to the business. That at least is the theory. Business Rules capture logic that ranges from the very simple – simple IF/THEN rules for allowing or disallowing based on one input parameter – to very complex, performing extensive ns and calculations, for example using the Decision Table. The Decision Table is a smart, compact way of clustering many IF/THEN rules together, as will be demonstrated in this article.
This article demonstrates how the decision table can be put to good use to implement the business logic behind the classical game of Rock, Paper and Scissors. (for a refresher on that game, see: http://en.wikipedia.org/wiki/Rock-paper-scissors).
Before even opening JDeveloper for working on the Business Rule, let’s briefly discuss the game itself: a simple game, played with two players. At the same time, they raise their hand, indicating either a rock, a pair of scissors or a piece of paper. The rules of the More >
Recently I was invited to read and review a recent publication on an important component of the Oracle Fusion Middleware stack: BPM Suite 11g. This book is titled Oracle BPM Suite 11g Developer’s Cookbook. It was written by Vivek Acharya and has been published by Packt Publishing. It contains close to 500 pages. The book homepage on the Packt Web Site is: : http://www.packtpub.com/oracle-bpm-suite-11g-developers-cookbook/book.
This article provides an overview of this book and my first impressions of it. In short:
The breadth of the book is impressive. Vivek has done a great job in describing many topics and aspects of the BPM Suite story. Along with the impressive scope, he also manages to provide a lot of details and in depth descriptions, for example in his discussion of business indicators and BAM, configuration of fault policies and on the development of User Interfaces with ADF to support Human Tasks. He uses a single case throughout the book – a case that is clear and comprehensive. Not too simplistic to become trivial and neither too complex to overburden the reader. Both business and process analysts as well as developers will benefit from this book – although I think More >