Migrating from One ERP to another

When migrating from Oracle ERP to SAP ERP, data governance plays a crucial role in ensuring the process is smooth, data integrity is maintained, and compliance requirements are met. Here are the key considerations related to data governance during this migration:


### 1. **Data Assessment and Inventory**

- **Data Mapping**: Identify all data elements in Oracle ERP and map them to the corresponding elements in SAP ERP.

- **Data Inventory**: Create a comprehensive inventory of all data assets, including metadata, master data, transactional data, and historical data.


### 2. **Data Quality Management**

- **Data Cleansing**: Cleanse the data in the Oracle ERP system to eliminate duplicates, correct errors, and ensure consistency before migration.

- **Data Validation**: Develop validation rules to ensure that the data being migrated meets the quality standards required by the SAP ERP system.


### 3. **Data Migration Strategy**

- **Phased Approach**: Consider a phased migration approach to minimize risks and allow for thorough testing at each stage.

- **Data Migration Tools**: Choose appropriate tools and technologies that support data extraction, transformation, and loading (ETL) processes.


### 4. **Data Governance Policies and Procedures**

- **Policies**: Establish and enforce data governance policies related to data access, usage, and security during the migration.

- **Procedures**: Develop detailed procedures for data migration, including data extraction, transformation, validation, and loading processes.


### 5. **Data Ownership and Stewardship**

- **Roles and Responsibilities**: Define clear roles and responsibilities for data governance, including data owners, data stewards, and data custodians.

- **Stakeholder Engagement**: Involve key stakeholders from both the Oracle ERP and SAP ERP teams to ensure collaboration and accountability.


### 6. **Compliance and Security**

- **Regulatory Compliance**: Ensure that the migration process complies with relevant regulatory requirements and industry standards (e.g., GDPR, HIPAA).

- **Data Security**: Implement robust security measures to protect data during migration, including encryption, access controls, and audit trails.


### 7. **Data Transformation and Standardization**

- **Data Transformation Rules**: Define and document the rules for data transformation to ensure that data from Oracle ERP is correctly translated into the SAP ERP format.

- **Data Standardization**: Standardize data formats, definitions, and values to maintain consistency across the new system.


### 8. **Testing and Validation**

- **Data Migration Testing**: Conduct thorough testing of the migration process, including unit testing, system testing, and user acceptance testing (UAT).

- **Data Reconciliation**: Perform data reconciliation to verify that the data in the SAP ERP system matches the data in the Oracle ERP system post-migration.


### 9. **Change Management and Training**

- **Change Management**: Develop a change management plan to address the impact of migration on users and business processes.

- **Training**: Provide comprehensive training for users on the new SAP ERP system and any changes in data governance practices.


### 10. **Continuous Monitoring and Improvement**

- **Monitoring**: Establish monitoring mechanisms to track the progress and success of the migration.

- **Feedback Loop**: Create a feedback loop to capture issues and lessons learned during migration, and use this information to improve future data governance practices.


### Summary

- **Data Assessment**: Inventory and map data assets.

- **Quality Management**: Cleanse and validate data.

- **Migration Strategy**: Plan a phased approach with appropriate tools.

- **Policies and Procedures**: Establish and enforce governance policies.

- **Ownership and Stewardship**: Define roles and responsibilities.

- **Compliance and Security**: Ensure regulatory compliance and data security.

- **Transformation and Standardization**: Define transformation rules and standardize data.

- **Testing and Validation**: Thoroughly test and reconcile data.

- **Change Management**: Manage the impact on users and provide training.

- **Continuous Monitoring**: Monitor progress and improve practices.


By carefully considering these key aspects, you can ensure a successful and compliant data migration from Oracle ERP to SAP ERP.

From Blogger iPhone client

ASP.net - Failed to enable constraints. One or more rows contain values violating non-null, unique, or foreign-key constraints (RDLC Report)

Failed to enable constraints. One or more rows contain values violating non-null, unique, or foreign-key constraints

 

 Solution


Question
1)

I had this error and it wasn't related with the DB constrains (at least in my case). I have an .xsd file with a GetRecord query that returns a group of records. One of the columns of that table was "nvarchar(512)" and in the middle of the project I needed to changed it to "nvarchar(MAX)".

Everything worked fine until the user entered more than 512 on that field and we begin to get the famous error message "Failed to enable constraints. One or more rows contain values violating non-null, unique, or foreign-key constraints."

Solution:  Check all the MaxLength property of the columns in your DataTable.

The column that I changed from "nvarchar(512)" to "nvarchar(MAX)" still had the 512 value on the MaxLength property so I changed to "-1" and it works!!.



changed a field length in the db and it no longer matched the dataset.  

 

 

Online Software Systems

There are currently various online examination systems available in the market.

Working in the education industry for 11 Years, i have came across following application software, utilizing their functions to conduct more than 500 Exams.

  1. TAO

    Website
    http://www.taotesting.com
    Demo
    http://demo.taotesting.com/tao/Main/login
    Username : demo Password : testdrive
  2. TCExam

    Website
    http://www.tcexam.org/

Free Domain Listing

Following are free domain service available in the market

https://my.freenom.com


How to review your website

You can review your website using following free website tools


http://wave.webaim.org
WAVE is developed and made available as a free community service by WebAIM. Originally launched in 2001, WAVE has been used to evaluate the accessibility of millions of web pages.


http://achecker.ca/checker/index.php






Invalid postback or callback argument - ASP.NET (Error 1)

Issue: If you encounter following error

Message: Invalid postback or callback argument. Event validation is enabled using

Invalid Postback or callback argument . Event validation is enabled using in configuration or <%@ Page EnableEventValidation="true" %> in a page.  For security purposes, this feature verifies that arguments to Postback or callback events originate from the server control that originally rendered them.  If the data is valid and expected, use the ClientScriptManager.RegisterForEventValidation method in order to register the Postback or callback data for validation. 

Many of us get this error message often, either in the event viewer or on the page itself. But what does it signify? When does it come up? What we can do to eliminate this exception due to coding mistakes? 

What does it signify?
 
In ASP.NET 2.0 we have added a feature called event validation. Event validation checks the incoming POST request to ensure that the event causing the Postback / callback is valid and the event which triggered the Postback /callback is expected by the Runtime. If the runtime finds a Postback / callback by an event which is not registered for validation, it throws an exception.  This has been added in ASP.NET 2.0 explicitly to prevent the attack to the application by spoofing a Postback. Event validation can help prevent injection attacks from malicious users who are trying to POST data by an event which does not come up from the controls registered to the page.
You can enable or disable this feature by simply setting up Property EnableEventValidation = true in the web.config or on the page level. By default it is enabled. You can find more information about this property in the MSDN link. 
So this is about all the “good” which event validation signifies. Agreed that this is a very good security feature which helps preventing script injection attacks but if it is coming during the normal execution of an application, the exception is not expected and does not hold “good” anymore. That is where we need to troubleshoot and find out the problem area.
 
When does it come up? What we can do to eliminate this exception due coding mistakes?
As I have already spoken about the script injection attack can cause this exception, we should not bother about why it is coming up. Rather in that case we can track down the client who is trying to inject the attack and take appropriate action. So I will rather focus upon the scenarios when it comes up due some coding mistakes.
These mistakes are many in number so I would rather cover just a couple of them in this Post:
1.     You have migrated an ASP.NET application from version 1.1 to version 2.0. In 1.1 we had to manipulate the "Select" button column for selecting the record and we normally set the visible property of this button column to FALSE.
The button column has "LinkButton" /”Button” for selecting records and we manually do a Postback using the __dopostback() method.
Agreed that the "LinkButton" /”Button” should register this method for event validation by internally calling the ClientScript.RegisterForEventValidation(). But with the “Visible” property set to FALSE, the control is not rendered and therefore control is not registered for EventValidation by ASP.NET 2.0. However, the DataGrid still utilizes this event. Since the event is not registered, it results in the above error.
In this scenario manually registering the client script for each DataGrid rows will help.
You can simply loop through the rows as mentioned in below code.
            protected override void Render(HtmlTextWriter writer)
{
foreach (DataGridItem row in DataGrid1.Items)
ClientScript.RegisterForEventValidation(row.UniqueID.ToString() +":_ctl0");
base.Render(writer);
}

So this signifies that if you are not rendering the control then it is not registered for the validation internally. You need to do that manually using the RegisterForEventValidation function.

2.     You have an ASP.NET 2.0 application which has a page with a lot of Javacript adding dynamic controls. On the POST of this particular page you will get the above mentioned exception for Invalid Postback or callback argument. This happens if Javascript is adding a FORM tag as well as adding dynamic controls resulting in the nested form Tags.
This can be reproduced quite easily as well –
In Default.aspx have the below code -
  
<%@ Page Language="C#" AutoEventWireup="true" CodeFile="Default.aspx.cs"
Inherits="_Default" %>
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
Untitled Page

So this signifies that if you have nested form tags the above mentioned error message will come up.
 
So with these two scenarios I will stop at this point. I hope this first post of mine might help you and happy reading.

Do not do the following - Security RISK

Resolution no 1: 

1) Go to Web.config file  and add the following in your pages/configuration section.
 
   

Add EnableEventValidation="false" to your aspx pages on the tag with Pages.

Resolution no 2: 

Add following exception per page as follow, on the aspx page top add:

Example:

<%@ Page EnableEventValidation="false" %>
 
or 
 
<%@ Page EnableEventValidation="false" Title="" Language="vb" AutoEventWireup="false" 
MasterPageFile="~/Master/Admin.Master" CodeBehind="default.aspx.vb" Inherits="ERP._default1" %>
 
 
Questions:
 ASP.NET - IIS Troubleshooting



Certified Information Systems Security Professional

 The Certified Information Systems Security Professional (CISSP) is a certification that is awarded by the International Information System Security Certification Consortium (ISC)². It is a globally recognized certification that is designed to assess the knowledge and skills of information security professionals.

The CISSP exam covers a wide range of topics, including:

  • Security and risk management
  • Asset security
  • Security architecture and engineering
  • Communication and network security
  • Identity and access management
  • Security assessment and testing
  • Security operations
  • Software development security
  • Legal, regulations, and compliance

To become a CISSP, you must have at least five years of experience in information security, or four years of experience and a bachelor's degree in information security or a related field. You must also pass the CISSP exam.

The CISSP is a valuable certification for information security professionals. It demonstrates that you have the knowledge and skills to protect information systems from a variety of threats. The CISSP can help you advance your career in information security and earn a higher salary.

Here are some of the benefits of having a CISSP certification:

  • Increased job opportunities: The CISSP is a highly respected certification, and it can help you to increase your job opportunities in the information security field.
  • Higher salary: CISSP certified professionals typically earn a higher salary than those who are not certified.
  • Professional development: The CISSP certification can help you to stay up-to-date on the latest information security trends and best practices.
  • Credibility: The CISSP certification is a mark of credibility in the information security field. It can help you to build trust with your clients and colleagues.
  • Networking opportunities: The CISSP certification can help you to network with other information security professionals. This can be a valuable resource for career advancement.