One Stop Shop for all BOBJ EIM (Data Services) Issues/Queries

Hello Folks,

Here is another link which had immensely helped me during BOBJ EIM setups:


SAP BusinessObjects Security – Security Model Patterns

While Implementing Security during BOBJ Implementation, you might find this blog really very helpful:


SAP BusinessObjects WIKI on SCN

Hello Folks!

Regarding SAP BusinessObjects, this link has always been very helpful to me. Hope this helps you as well:

One stop shop for BOBJ related stuff on SCN:


The market for executive leadership training in Asia is booming

Great Article on Executive Leadership Training

Leave a comment

Posted by on August 1, 2013 in General Awareness


SAP BusinessObjects Enterprise 3.x: Ideal Architecture Skillset

BusinessObjects Enterprise Infrastructure provides the basic messaging mechanism needed for BusinessObjects Enterprise components to communicate with one another. The Enterprise Infrastructure is a series of services that are designed to communicate via CORBA (Common Object Request Broker Architecture), which runs over TCP/IP.

Some CORBA applications use a name server. The name server service is a facility of the underlying CORBA architecture that binds the BusinessObjects Enterprise servers together. The name server provides a directory of the servers registered in the

BusinessObjects Enterprise environment and helps establish connections between clients and these servers. The name server service is a part of the Central Management Server (CMS).

There are 5 Tiers to the BusinessObjects Server Architecture model. These tiers comprises of:

  1. User Tier: End Users’ Systems (Desktops, Laptops, HandHeld Devices, PDAs)
  2. Web-Application Tier: Users make requests to this Web-App server (Tomcat, Weblogic, WebSphere, etc.) and it processes the Pages for user’s view
  3. Intelligence Tier: This Tier consists of Servers (BO specific) which can decide the validation process. The decisions on whether to process the request or what processing server will further process this request.
  4. Processing Tier: After the Validation, this tier decides and formulates the processing of the user’s request. This will further look into the Data tier to ask for the data requested
  5. Data Tier: At last, the data will be fetched from this Tier.

A Business Objects Professional should have sound Knowledge of Process Flows and Jobs of specific Servers are important to further drill into the architecture. To further enhance the Load-balancing / Failover features and high performance optimization features, there are concepts like CLUSTERING, and Distributed Deployments. Cross Domain Architectures (blend of Windows & UNIX) are also implemented to meet those purposes. Concepts like Migration, Version Management, User Security are the ones, we should be well versed with, in order to meet the interviewers’/ Projects’ expectations

Apart from the Architecture (Administration), candidate following BI Stack should also practice these concepts:

Implementation, Deployment (All WebApp Servers), Sizing, Distributed Deployments, Clustering, Migration, Troubleshooting Issues, Networking


Facebook’s Advertising Ecosystem, Explained

Advertising on Facebook has become more sophisticated, varied, and data-intensive. Facebook has rolled out a spate of new ad formats in the past year and now offers at least seven major ways to advertise.

Leave a comment

Posted by on July 31, 2013 in General Awareness


Installing Oracle Database on a Pre-Configured (w.r.t. Network) Windows Machine

From the Administration Point of View, whenever we install BI Systems, we also need to setup a Database for them. Most of the time it is Oracle’s. And Installing Oracle Database comes with it’s own pre-requisites, some of which are not well written and available. Here is one which has helped me in various Oracle DB Installations.


While Installing Oracle 10g Database, this error comes in:

Error Message:

Checking Network Configuration requirements …

Check complete. The overall result of this check is: Failed <<<<
Problem: The install has detected that the primary IP address of the system is DHCP-assigned.
Recommendation: Oracle supports installations on systems with DHCP-assigned IP addresses; However, before you can do this, you must configure the Microsoft LoopBack Adapter to be the primary network adapter on the system. See the Installation Guide for more details on installing the software on systems configured with DHCP.

Resolution: Installing a Loopback Adapter on Windows 2003 or Windows XP


1. From the Start menu, select Control Panel.

2. Double-click Add Hardware to start the Add Hardware wizard.

3. On the Welcome screen, click Next.

4. On the Is the hardware connected? screen, select Yes, I have already connected the hardware, and click Next.

5. On the The following hardware is already installed on your computer screen, select Add a new hardware device, and click Next.

6. On the The wizard can help you install other hardware screen, select Install the hardware that I manually select from a list, and click Next.

7. From the list, select the type of hardware you are installing screen, select Network adapters, and click Next.

8. On the Select Network Adapter screen, make the following selections:
Manufacturer: select Microsoft.
Network Adapter: select Microsoft Loopback Adapter.

9. Click Next.

10. On the The wizard is ready to install your hardware screen, click Next.

11. On the Completing the Add Hardware Wizard screen, click Finish.

12. If you are using Windows 2003, restart your computer.

13. Right-click My Network Places on the desktop and choose Properties. This       displays the Network Connections control panel.

14. Right-click the connection that was just created. This is usually named “Local Area Connection 2”. Choose Properties.

15. On the General tab, select Internet Protocol (TCP/IP), and click Properties.

16. In the Properties dialog, do the following:
IP Address: Enter a non-routable IP for the loopback adapter. Oracle recommends the following non-routable addresses:
192.168.x.x (x is any value between 1 and 255)

a. Subnet mask: Enter

b. Leave all other fields empty.

c. Click OK.

17. Click OK.

18. Click OK in the Local Area Connection 2 Properties dialog.

19. Restart the computer.

20. Add a line to the C:\windows\system32\drivers\etc\hosts file with the following format, after the localhost line:

IP_address   hostname.domainname   hostname


IP_address is the non-routable IP address you entered in step 16.

hostname is the name of the computer.

domainname is the name of the domain.

For example:   mycomputer

21. Check the network configuration:

Open System Properties, and select the Computer Name tab. In Full computer name, make sure you see the hostname and the domain name.

Click Change. In Computer name, you should see the hostname, and in Full computer name, you should see the hostname and domain name.

Click More. In Primary DNS suffix of this computer, you should see the domain name.


Leave a comment

Posted by on July 31, 2013 in Business Intelligence


Tags: ,

Technology Trend Analysis

From The Other Side

Shirish Dubey's Blog

Your life is your message to the world. Make sure, it's Inspiring.

The Daily Post

The Art and Craft of Blogging

The Blog

The latest news on and the WordPress community.