AcdntlPoet 2700019V2G Visits (7945)
You've likely seen our recent announcements including our new IBM Watson IoT division and our new global IoT headquarters in Munich.
The platform will offer all of the features that you’re familiar with and will be expanding with new capabilities across Connect, Information Management, Analytics and Risk Management.
So login today and take a look!
AcdntlPoet 2700019V2G Visits (6019)
Exploring Maximo Downtime in Watson Analytics! Are you ready for a life-changing data analysis experience? Watch as Pam Denny highlights Liz, a fictional data analyst at a global manufacturing corporation, use Watson Analytics to explore Asset Downtime. She'll begin by simply importing a Maximo .csv file into Watson and have Watson guide her thru various data explorations, and analytic views. She then creates an InfoGraphic Dashboard of her explorations and analytic charts to share with her peer and management team. INCREDIBLE!
AE91_SHINJI_KANAI 110000AE91 Visits (8942)
If your current version of Rhapsody Design Manager (RDM) is v5.0.2, you can now directly upgrade to v6.0.1; previously you must upgrade to v6.0 first. Note that the direct upgrade process is only supported from version 5.0.2 interim fix (so called iFix) 011 or higher, so you still need to apply the
doboski 310000SJR4 Visits (10388)
Managing your security groups in TRIRIGA
There are some things to know about managing your security groups in TRIRIGA. Out of the box, TRIRIGA comes with pre-defined groups based on various roles. You might be able to map one of your roles to an existing security group. But if you have a need to make additions to an existing group, then it would be best to copy the group that it closely resembles. Then you can modify it for your needs. It is best to know what out of the box groups offer and what your needs will be. Then you can determine if you can use an existing one or create a new one. It is a best practice to copy an existing group and make changes to the copy if you need to remove or add access. This way if something is not being granted correctly, you can refer to the out of the box role to see if the problem still occurs.
It should also be noted that you do not have to define one giant security group if you have a user who might have multiple roles. For instance you might have a user who is a Lease Manager but might also have a role with Facilities Maintenance. You would associate the user to 2 different security groups – one for Lease Manager and the other for Facilities Maintenance. This way, if you end up with security issues, the best way to troubleshoot them is to remove groups until there is 1 associated to the user. Test. Then remove that group and add another one.
The exception to coming security groups is the Administrative group. This is a group that should not be copied. This is because it is a special group with special privileges. Copying this group would not copy all the privileges. You can certainly add users to this group. But as mentioned, this is a special group. You might not want to have all users in this group. Instead, you would want to consider putting your Administrative users in the TRIRIGA Application Administration group. This group has most, if not all Administrative privileges that would be needed by an Administrator.
If you do have a need to create your own security group, then it is best to first map out the access that you want it to have. See if there is an existing group that resembles what you are looking for. Then copy it and modify to what you need. Copying an existing group and then modifying is certainly easier than creating a new group scratch.
Another important note regarding managing your security groups is defining if they are specific to a specific organization or geography. Depending on how widespread you use TRIRIGA, you could have your data defined across multiple organizations and geographies. You could have Lease Managers in different organizations and geographies but they would not want to see each other’s data so you would have a Lease Manager role for each organization. But there might be some people in a role who would want to see the data across multiple organizations so then the group would have the same access but the organization and geography level would be one level higher to incorporate children in the hierarchy. Once you have defined System Organization and System Geography, then only records that have those fields defined can be accessed. So you need to be careful with the data and access. It is important to note that your group structure can be difficult to manage if your groups combine System Organization, System Geography and application security in the same group. The best practice is to use multiple groups and layer groups for each user.
For example, Group 1 defines System Organization security as \Org
For more information regarding System Organization and System Geography please check out the wiki
After creating or modify your security groups, it is a good practice to go into the Admin Console -> Cache Manager and clear the Security Scope cache.
AcdntlPoet 2700019V2G Visits (8928)
Maximo 7.6 - Release long running database connections feature: Turning on and setting up the feature to close long running Maximo database connections by David Leftwich
AcdntlPoet 2700019V2G Visits (8240)
How to configure Reverse Proxy for CLM - Part 1: IBM Rational Collaborative Lifecycle Management v5.0, IBM HTTP Server v8.5.5, configuring reverse proxy for CLM, presented by Shradha Srivastav.
And don't miss the other parts to this series, noted below for your convenience:
AcdntlPoet 2700019V2G Visits (6818)
Rational Rhapsody: Simplifying the Rhapsody User Experience with Domain Specific Modeling- Andy Lapping demonstrates how to simplify the Rhapsody User Experience with Domain Specific Modeling
ScottRuch 270004QNFJ Visits (10515)
How To: Reassign Pending Approval Records for a Person in IBM TRIRIGA
A person could leave a company or an organization for various business reasons including termination, retirement, layoffs, new job role / promotion in a different organization, or departmental re-organization. In the IBM TRIRIGA, this person (user) could have pending Approval records in the system that needs to be reassigned. IBM TRIRIGA has a process to address this business need. It can be accessed from the menu: Requests > Manage Requests > Other > Reviewer Admin.
The “Reviewer Admin” form allows an admin user to reassign the Approval records that are pending the person leaving the organization. On the form, the user will select the ‘Currently Assigned To’ person and the ‘Reassign To’ person then click ‘Create Draft’ and ‘Issue’ to process it. Then, processing occurs to update the ‘Currently Assigned To’ person’s Approval records to indicate each has been reassigned. The system also creates a new Approval records and assigns to the ‘Reassign To’ person. Standard request processing continues and it completes the Reviewer Admin record. At this point, the ‘Reassign To’ person has pending approvals assigned to review and take action on.
In summary, the ‘Reviewer Admin’ functionality in IBM TRIRIGA assures that pending approval records are not lost in the system when the business situation of a person leaving the company or an organization occurs.
Reblogged from the TRIRIGA Wiki:
JeffLong 270005B0Q4 Visits (8255)
If you are getting an error message that states, “Current browser does not support native SVG.” Internet Explorer 11 64bit (IE11) does support native SVG as delivered.
Customer tested with Firefox and did not get the message. However, when the customer tests other environments at their location with their IE11 browser native SVG works ok.
The conflicting tests of IE11 working on other environments and FireFox working in the environment where IE11 does not makes this tricky to troubleshoot. We will use a test SVG file to test the browser locally and then test the SVG file on the web server to see if it works from both locations in IE11. If the file will test ok on the local PC, but fails on the web server, this indicates a web server configuration issue.
First, create a simple SVG file for testing. Simply create a new text document and copy and paste this into it”
Once this is copied into the file save the file to a known location on your computer and name it “simple.svg”.
Now, open your browser and find and open the simple.svg file that you created. If you can see part of a black circle in the top-left corner of your browser after opening the file, your browser should work with native SVG. The circle part will look something like the example below:
Testing the web server:
Place the same file that you tested on your PC onto your web server and using the web server url with the file location and name included, see if your browser loads the SVG file and if you see the circle part as you did in the previous test. If this test fails, you most likely have a web server configuration problem. If that is the case, please consult your web server vendor for help with configuring your web server to work with native SVG.
AcdntlPoet 2700019V2G Visits (6211)
Importing an IBM Rational Rhapsody model into IBM Rational Software Architect - Senior Technical Support Engineer, Pritesh Patel, explains how to import a Rational Rhapsody model into Rational Software Architect