Steps to Deploy the OFSAA application in WEBLOGIC server: ========================================================= 1) Generate the "context_name.ear" from the FIC_WEB area by executing the ./ant.sh 2) Create a folder by the name "applications" within the domain directory 3) Create a folder by the name "context_name.ear" within the newly created "applications" folder 4) Copy the context_name.ear file from the FIC_WEB folder to the newly create the "context_name.ear" folder created within the applciations folder 5) Explode the .ear file copied from the FIC_WEB area (jar -xvf context_name.ear), There are 2 files and 1 directory created after the .ear file is exploded as mentioned below a) context_name.war ---> file b) context_name.ear ---> file c) META_INF ---> folder 6) Delete the above files (.ear and .war files) 7) Create a new folder by the name "context_name.war" 8) Copy the context_name.war file from th...
1) How do you decide the defect prone area ? 2) What do you do when you have resources with low competency ? 3) Example of risk and how to mitigate it ? 4) What do you do to increase teams productivity ? 5) What is effort estimation process in your company ?
What is: The client–server characteristic describes the relationship of cooperating programs in an application. The server component provides a function or service to one or many clients, which initiate requests for such services. Advantages: * In most cases, a client–server architecture enables the roles and responsibilities of a computing system to be distributed among several independent computers that are known to each other only through a network. This creates an additional advantage to this architecture: greater ease of maintenance. For example, it is possible to replace, repair, upgrade, or even relocate a server while its clients remain both unaware and unaffected by that change. * All data is stored on the servers, which generally have far greater security controls than most clients. Servers can better control access and resources, to guarantee that only those clients with the appropriate permissions may access and change data. * Since data storage is centralized, update...
Comments
Post a Comment