Appsian Blog Center

These Resources Will Help You Navigate The Challenges Of ERP Threats

Read Our blog

PeopleSoft teams often face threats caused by excess privilege, malicious insiders, and access misuse. Most of these can be mitigated with internal policies and periodic…...
May 27, 2022
When PeopleSoft users transition to different roles or offboard, their previous roles and accounts in the system often remain intact. These unused roles and authorizations…...
May 6, 2022
Maintaining a state of audit readiness has become more critical than ever for organizations using PeopleSoft and other ERP systems in general. Today’s complex business…...
May 2, 2022
PeopleSoft applications process and store vast amounts of customer, employee, and financial data that are constantly accessed by an increasing number of users from various…...
April 12, 2022
The financial, reputational, and regulatory impact of a data breach can be catastrophic. Data exfiltration, whether malicious or accidental, typically originates from employees’ legitimate access…...
April 8, 2022
Data privacy is often associated with how companies are allowed to collect and handle customer data. Lost in the data privacy breach headlines is that…...
April 6, 2022
Every day, countless people have access to your PeopleSoft application, where they perform a variety of transactions and access critical data. But do you know…...
April 5, 2022
When it comes to PeopleSoft data privacy, the financial, reputational, and regulatory impact of having your employees’ or executives’ compensation or personal data accessed can…...
March 31, 2022
Security threats exist at the application, transaction, and data level. Unfortunately, default PeopleSoft data masking and logging capabilities are insufficient to meet today’s modern data…...
March 22, 2022
Privileged user accounts are hacker magnets. With cyberattacks getting more targeted and sophisticated, intruders can easily bypass traditional authentication measures. So it's no wonder that…...
March 18, 2022
On December 9, 2021, the Federal Trade Commission (FTC) published a final rule amending the requirements for safeguarding customer information under the Gramm-Leach-Bliley Act (GLBA)…...
March 11, 2022
The University of Nebraska uses PeopleSoft Campus Solutions for its student information system and wanted to streamline authentication for students, faculty, and staff across eight…...
March 3, 2022
Since 2008, the University of Oklahoma Health Sciences Center (OUHSC) has successfully used the Appsian Security dynamic MFA solution to secure the ERP data on…...
September 23, 2021
Don’t Risk the Security of your Data with Customized SSO SAML/ADFS Integration for PeopleSoft I was on a recent discovery call, and the Senior Software Engineer shared…...
July 29, 2021
Collin County, like all counties in Texas, is considered an extension of state government. Located just north of Dallas, Collin County (the County) provides various government…...
June 25, 2021
Appsian’s Executive Director for Security Solutions, Greg Wendt, appears in the latest episode of IAM Pulse, a podcast from BIO-key International that discusses all things…...
May 12, 2021
As work-from-home continues into 2021 indefinitely and the reality of this increased risk becomes clearer, organizations should heavily prioritize the modernization of their existing business…...
January 4, 2021
It’s not uncommon for higher education institutions to approach us (with great haste) about our Single Sign-On (SSO) solution for PeopleSoft Campus Solutions. Lately, I’ve noticed an uptick in the urgency. Nobody’s hair is literally on fire, but…...
August 4, 2020
Just a few days ago, the Australian Prime Minister, Scott Morrison announced that Australia is being continuously targeted by sophisticated, state-sponsored cyber-attacks. The hacking attempts…...
June 23, 2020
California State University, the largest four-year public university system in the country, made headlines when it announced Tuesday that it intends to continue with remote teaching in…...
May 13, 2020
On April 19, 2020, Oracle announced on its PeopleSoft Support blog that the company is extending support for the ERP application through 2031. As stated on…...
May 6, 2020
It’s no secret that managing PeopleSoft passwords can be challenging. This has been a hot topic for years – and with COVID-19, we're seeing a…...
April 7, 2020
With the workforce disruption caused by Coronavirus (COVID-19),enabling remote access to ERP applications like Oracle PeopleSoft has become a business requirement. This has resulted in…...
March 18, 2020
Enabling mobile access to PeopleSoft is a primary objective for many organizations. Naturally, there are security concerns when making transactions available on the internet. Here…...
March 11, 2020
With companies like Microsoft, Amazon, and Twitter encouraging workers to stay home, many wonder if this is the beginning of a “work-from-home revolution” with no…...
March 9, 2020
Cats & dogs, oil & water… Apparently, these groups don’t get along. You can definitely add Security Admins & Business Users to that list. The…...
November 14, 2019
What is Single Sign On in PeopleSoft? PeopleSoft, an ERP application designed by Oracle, lacks native Security Assertion Markup Language (SAML) support. This makes it…...
September 6, 2019
As the premier deep-dive PeopleSoft-focused event of the year, PeopleSoft Reconnect (presented by Quest Oracle User Group) has always touted itself as "created for PeopleSoft…...
August 2, 2019
We live in a connected economy.  We live in a connected world. We want our games, our movies and our friendships to be accessible on…...
April 3, 2019
I was at the Alliance conference in Orlando this past week, and in the course of presenting and listening to multiple institutions in the higher…...
March 7, 2019
Establishing security best practices for your PeopleSoft applications is always a work in progress. As newer, more advanced threats come to light, staying current can…...
November 28, 2018
In the digital security world, social engineering is defined as the act of tricking someone into doing something that is often detrimental to themselves or…...
October 26, 2018
This week, Hackensack Meridian Health (HMH), a New Jersey-based not-for-profit health care organization (and Appsian customer) was identified as a PeopleSoft Innovator for their use of PeopleSoft Fluid…...
October 24, 2018
With the support for PeopleSoft 9.1 ending earlier this year (Jan 2018), most PeopleSoft customers are busy upgrading to PeopleSoft 9.2. As you upgrade to…...
July 3, 2018
The European Union's General Data Protection Regulation (GDPR) came into effect on May 25th, 2018 and made a far-spreading impact on how organizations record, manage…...
June 25, 2018
Gartner recently released a report addressing the speculations around Oracle’s on-premise and cloud ERP applications. Focusing on Oracle ERP customers' frequently asked questions, the report…...
May 8, 2018
Did you know that... A *2014 Forrester study of a major US-based University showed that over 50% of user password resets could not be completed…...
May 3, 2018
In a previous blog ‘Time is Money’ we discussed what lacking a PeopleSoft-integrated SSO is costing your organization. By now, we all should fully understand…...
April 19, 2018
GreyHeller is proud to announce the arrival of PeopleSoft Security Analytics   Next-generation software providing actionable insights into how your PeopleSoft data is being accessed…...
February 5, 2018
Who does GDPR Affect? Does your organization store or process European Union (EU) consumer data? Do you have employees that are citizens of any EU countries? If you answered ‘yes’ to either of these…...
January 9, 2018
In our blog this past June we discussed the merits of utilizing SAML as a protocol for sharing a person’s identity between systems. More specifically,…...
October 17, 2017
In honor of October being National Cyber Security Awareness Month, we ask you to consider this scenario: How Cyber-Criminals are Stealing Direct Deposit Information Bob is…...
October 1, 2017
What it is? Event Mapping is a new subcomponent of the Related Content Framework. PeopleTools released Event Mapping with version 8.55. What makes it relevant…...
September 17, 2017
If you’re responsible for Accessibility at your organization, you have a lot of responsibilities:  facilities, training, technology, documentation, note taking, testing, and in the case…...
September 10, 2017
Stop me if you’ve heard this one... “Do you want to get the most from your ERP? Then you must move to the cloud. Your bottom…...
September 6, 2017
We are disheartened by the recent publication of the Trump Administration's Unified Agenda of Regulatory and Deregulatory Actions which changed the status of its web…...
August 22, 2017
Direct deposit is a given for most of us. Until it doesn't work. I definitely remember the days of getting paper checks in the mail....or…...
August 11, 2017
The 2017 Accessing Higher Ground conference focuses on the implementation and benefits of: Accessible media, Universal Design and Assistive Technology in the university, business and…...
August 6, 2017
Leveraging GreyHeller’s PeopleUX technology platform, our customer – University of Minnesota – made its Student Self-Service, Faculty, Job Applicant components accessible and Section 508/WCAG 2.0…...
August 6, 2017
A GreyHeller customer – one of the largest financial services firms in the US – licensed and implemented our ERP Firewall layered security platform specifically…...
August 6, 2017
SAML. ADFS. Shibboleth. Your network team may be bringing up these terms as they relate to your organization’s security initiatives and all you may know…...
June 7, 2017
When securing enterprise systems every PeopleSoft customer knows they need strong passwords and secure networks. A good firewall is a critical first line of defense.…...
February 15, 2017
July 26, 2016 marked the release of Campus Solutions 9.2 bundle image 2 and the introduction of Fluid self-service transactions. In this demo-intensive session, we…...
November 14, 2016
“All organisations should now assume that they are in a state of continuous compromise," Rajpreet Kaur, Senior Research Analyst at Gartner. Gartner believes the main challenge organisations…...
September 23, 2016
Today Yahoo Chief Information Security Officer Bob Lord released this - "We have confirmed, based on a recent investigation, that a copy of certain user account information…...
September 22, 2016
Our customer - Florida State University - and our partner - Oracle - presented at OpenWorld this week. The components of FSU's solution are: Enterprise…...
September 22, 2016
Jim Marion's PeopleTools Tips & Techniques session at Oracle OpenWorld 2016 was standing room only....
September 20, 2016
Please join us for our Fall Webinar Series. UX Webinars Make The Most of Campus Solutions 9.2 and Fluid Wednesday, September 21st at 11 AM…...
September 15, 2016
This Webinar details how PeopleSoft customers can securely push Fluid HCM Self-Service transactions outside the corporate network....
February 24, 2016
This webinar is from last year but the topic and information is still very relevant, perhaps even more relevant considering the recent breach at University…...
February 23, 2016
We hear lots of noise about Cloud but in Higher Education it looks like for what The Campus Computing Project terms high clouds - ERP,…...
February 5, 2016
Join GreyHeller in promoting Data Privacy Day - the goal is to promote a safer and more trusted Internet.  Data privacy and protection is integral…...
January 25, 2016
Educause's 2016 report puts Information Security at the top of the list. Lots of reasons, but here's one that stands out (other than the well publicized…...
January 19, 2016
After the PS_TOKEN threat vector was announced at Hack in the Box Amsterdam in May 2015, security organizations started adding specific tests for PS_TOKEN into…...
December 2, 2015
Since many PeopleSoft customers utilize weblogic for their PeopleSoft environment, we wanted to highlight yesterday’s security alert. Oracle released an out of band security update…...
November 11, 2015
After the PS_TOKEN threat vector was announced at Hack in the Box Amsterdam in May 2015, security organizations started adding specific tests for PS_TOKEN into…...
November 6, 2015
Security professionals are generally most concerned with outside hackers, malicious insiders and accidental data loss.  However, if they don’t focus on internal processes around their…...
October 15, 2015
A layered approach is critical to protect your PeopleSoft system against multiple threat vectors. Deploying a series of security barriers requires the bad guys to…...
September 22, 2015
Back by popular demand, join GreyHeller for its Fall Customer Focus Webinar Series to learn more about our customers' Security and Mobile projects.  Learn how: 9/30 UNC Chapel Hill…...
September 18, 2015
Designed to intelligently move functionality based on available real estate, transforming the user experience. What is True Responsiveness? Your employees and constituents expect to be…...
September 16, 2015
Appsian has been offering security assessments to both customers and non-customers around the potential of a PS_TOKEN configuration vulnerability. Over the past month, we have…...
September 4, 2015
Today, Google changed its logo to better represent its presence on platforms other than desktop PC’s — where people initially interacted with Google’s software.  This…...
September 1, 2015
According to Kate Hash, Manager of ITS Communications at UNC Chapel Hill, “Up until Friday, our largest download month had been 600 downloads of the…...
August 31, 2015
While some organizations believe hacks come from only external sources, these companies may be missing an even larger threat: internal, privileged users. According to the…...
August 25, 2015
Background In recent blog posts, we’ve mentioned that PeopleSoft provides a number of security protections out of the box. In this entry, we wanted to…...
August 14, 2015
Want to sort cybercrime fact from fiction? Do you think you know the difference? Test your knowledge. In this OHUG sponsored webinar, GreyHeller will set the…...
August 2, 2015
As a follow-up to our June 3rd post PS_TOKEN vulnerability and prevention, I wanted to share recent activity about which you might be interested. On…...
July 7, 2015
GreyHeller was founded on the idea that much of the available enterprise software needed to be simplified.Co-Founders Chris Heller and Larry Grey worked at PeopleSoft…...
June 24, 2015
In this two-part series, GreyHeller founders and former, early PeopleSoft Technical Strategists, Larry Grey and Chris Heller will discuss ERP trends and how they affect…...
June 6, 2015
If you weren’t in Amsterdam last week,  you missed out on a session at the Hack in the Box conference that is sure to be…...
June 3, 2015
At GreyHeller we speak with hundreds of ERP systems customers every year across all industries. Because we develop and license enterprise-class software products that modernize…...
April 20, 2015
4/22 Protecting PeopleSoft for Self Service Time: 11am PST / 2pm EST Description: Your employees are demanding better access to their pay, benefits, time and labor. Oracle…...
April 9, 2015
Is is ignorance? The ostrich strategy? Breach fatigue? Whatever, the data are mind-boggling. In a recent Raytheon-Ponemon survey of 1006 CIO, CISO's and senior IT…...
April 7, 2015
GreyHeller is thrilled to showcase our Mobile and Security solutions at Collaborate 2015. From announcing new partnerships, to launching your institution’s mobile strategy, to practical ways to…...
March 31, 2015
GreyHeller is thrilled to showcase our Mobile and Security solutions and our customers’ sessions at Alliance 2015.  From announcing new partnerships, to launching your institution’s mobile strategy, to practical…...
March 11, 2015
Naturally, we're pleased that our products address 2 of the most strategically important technologies per this 2015 CEO survey by PwC: Mobile & Cybersecurity....
February 18, 2015
Now we're getting somewhere... Obama recently signed Executive Order 13636 to much fanfare at Stanford University. Of particular interest to us is encouragement of the…...
February 17, 2015
Check out this chart for the top breaches... Date (2014) Company Number of records exposed Types of records 25 Jan Michael's 2,600,000 payment cards 6…...
February 3, 2015
(more…)...
February 3, 2015
Shelley Nelson,Vice President of Services San Ramon, California – January 28, 2015 – GreyHeller, LLC, provider of the leading security and modernization software for legacy…...
January 29, 2015
The Sony breach – and virally every other recent high profile breach – has finally driven home what GreyHeller has been saying for some time…...
January 7, 2015
We've been talking about this tipping point for some time now. Supporting our view... The Cybersecurity Tipping Point - from TechCrunch Assume you are always under attack…...
January 6, 2015
January 5, 2015 - San Ramon, CA – GreyHeller today announced an Insider Threat Security Webinar Series focused on helping organizations protect their ERP sensitive…...
January 6, 2015
Smart consumers - pounded by the relentless onslaught of breaches affecting them directly (my household had new credit cards issued because of the Target and…...
December 22, 2014
I heard a term yesterday that frightened me - Breach Fatigue (being in the Security business can make one paranoid). As a leader in Security…...
December 18, 2014
The year has been full of cyber attacks that have left sensitive information ranging from bank accounts to social security numbers exposed and vulnerable. From data…...
December 18, 2014
Companies, higher education institutions, healthcare organizations are not only fighting organized cybercrime rings (makes the Mafia look like a cottage industry by comparison) but also…...
December 17, 2014
Really? This has us scratching our heads....no editorializing necessary. An audit by PriceWaterhouseCoopers over the summer warned Sony - “Security incidents impacting these network or infrastructure…...
December 13, 2014
Data Masking could have helped prevent recent, high-profile destructive cyber attacks. How? By scrambling or removing sensitive data from production and non-production systems, Data Masking…...
December 9, 2014
We're getting closer to a tipping point where organizations are going to have to prove conclusively to their customers, lenders, investors, shareholders that they are…...
December 6, 2014
GreyHeller's Executive Director of Security Solutions, Greg Wendt, leads a demo-intensive session showing how organizations can deploy fluid transactions safely using the following techniques: Location-based…...
December 4, 2014
  2-Part Webinar Series Fluid UI – An Early Look Join Larry Grey, GreyHeller's President, and Chris Heller, CIO at GreyHeller, for an early look at Fluid UI with a two-part…...
November 24, 2014
August 26, 2014 - San Ramon, CA – According to a recent advisory issued by Research and Education Networking Information Sharing and Analysis Center (REN-ISAC),…...
November 18, 2014
On November 5, 2014, OHUG sponsored the webinar: GreyHeller and Fluid UI– The Best of Both Worlds. GreyHeller’s Responsive Design technology for Mobile and Desktop…...
November 17, 2014
Ethical Hackers at Rhino Security Labs released information about serious security holes within Oracle applications this week. Millions of records were at risk across numerous…...
September 17, 2014
Join us for a series of informative webinars hosted by Larry Grey, President, Chris Heller, Chief Technology Officer and Greg Wendt, Executive Director, Security Solutions &…...
August 18, 2014
June phishing attacks accounted for over $400 million in global losses. 57% of global phishing attacks are targeted at the U.S. The attacks in June…...
August 8, 2014
A Russian crime ring has collected over 1.2 billion user names and passwords. The statistics within this breach are stunning. 420,000 websites, 4.5 billion records,…...
August 8, 2014
Homeland Security issued a new report warning about hackers attacking remote access software. Checking in from home leaves entry for hackers. Victims of these attacks…...
July 31, 2014
Top 10 Data Breaches of the Past Five Years (Infographic) By TSC Advantage, Holistic Security Consultancy...
July 23, 2014
Kevin R. Brock, a leading cybersecurity expert and the FBI’s former Principal Deputy Director, National Counterterrorism Center and Assistant Director for Intelligence, in a recent…...
July 21, 2014
Organizations seek protection of their Oracle PeopleSoft applications from cybercrime San Ramon, California – July 15, 2014 Today, GreyHeller announced the hiring of Greg Wendt…...
July 17, 2014
In our conversations with Oracle® PeopleSoft customers about modernizing and mobilizing their PeopleSoft pages and customizations, we always introduce the concept of Responsive Design. What…...
July 4, 2014
Recently, one of our Higher Education customers - a highly regarded US university - implemented another option for Two-Factor Authentication using our ERP Firewall software…...
July 3, 2014
If organizations won't spend what's necessary to license technology that protects their sensitive data because of cost considerations,we believe class action lawsuits will be a…...
July 2, 2014
Last week the website Code Spaces was attacked by a distributed denial of service attack (DDoS). This is a pretty normal occurrence that gets handled…...
June 27, 2014
A single compromised website hosted 862 PHP scripts. Think about that for a minute – 1 server, with 862 scripts. These scripts targeted banking, webmail,…...
June 24, 2014
Costs associated with the Maricopa County Community College District (MCCCD) data breach that occurred in April 2013 continue to rise and have nearly reached the $20 million…...
May 21, 2014
One of the very useful features in Application Designer is the ability to compile the PeopleCode for a project.  You can select Tools -> Compile…...
February 13, 2014
Larry just posted a YouTube video that describes how our ERP Firewall product's 2-Factor Authentication feature can help prevent students from hacking into PeopleSoft Campus…...
June 17, 2013
Chicago office opens Well, we just couldn't stay put in the San Francisco East Bay. Based on 2010 growth, and a great first half of…...
May 26, 2011
Today, I was helping a customer configure our Desktop Single Signon product for use with nVision. Because this was a brand-new machine where nVision had…...
March 21, 2011
Did you know that the average PeopleSoft URL is over 100 characters long and is completely nonsensical to the average PeopleSoft user? Long PeopleSoft URLs…...
October 13, 2010
David Pigman of SpearMC consulting presented Advanced PeopleSoft Security Audit. Most of the presentation consisted of walking through slides of the PeopleTools security table structures,…...
September 20, 2010
Hit this error message earlier and noticed that no search engines had the answer so I wanted to share. When running App Engine from a…...
September 14, 2010
When you create a domain for a PeopleSoft application server, the default configuration for the Tuxedo listener is a variable called %PS_MACH% (which expands to…...
September 3, 2010
One of the biggest challenges of end-users is to figure out where the data they want to query against resides. This is yet another tip…...
June 24, 2010
One limitation of PeopleSoft Query is that when you use "In Tree" criteria, the effective date of the tree is forever stored in that criteria.…...
June 22, 2010
System Availability. This is a very important topic, that has received a lot of attention, especially in the area of handling system failover, redundancy, and…...
July 24, 2009
I had a question the other day about getting going with PeopleSoft Performance Monitor so I thought I'd post a quick roundup/summary of the various…...
July 8, 2009
I helped some folks the other day with an issue that had the potential to be very serious for them; exposure of production data without…...
June 28, 2009
In our previous blog post we introduced a Continuous Integration server called Hudson to run automated tests against a PeopleSoft system for us. We didn't…...
May 10, 2009
We wrote awhile back about a customization that can be done to limit a user's roles dynamically at a signon time, but wanted to point…...
April 26, 2009
  In the past few weeks, we've had a lot of interest in our new Version Control for PeopleSoft product. For those interested in learning…...
March 10, 2009
  This blog post falls under the category of why haven't we done this earlier? Over the almost 4 years that we've been in business,…...
February 20, 2009
When you run an Application Engine program from within Application Designer (as we mentioned in our blog post on Application Engine Development Tips) and turn…...
February 15, 2009
Workflow History When workflow was first added to PeopleSoft 5 back in 1995, the mantra was the three Rs: Rules, Roles, and Routings. I'll bet…...
February 7, 2009
Continuing on in the cool stuff we’ve been working on series, I wanted to post something about a topic that goes way, way back.Many years…...
January 26, 2009
A little while back we had a request for help from Genentech to solve an issue that was causing them fits. They have several Macs…...
November 14, 2008
I've had a few conversations recently about the strangeness of LDAP query syntax so I thought a post some useful information and links here. You…...
September 22, 2008
(update : check out demo 4 in the Flash demo for our ERP Firewall to see some additional real world examples of multi-factor authentication for…...
July 7, 2008
Yesterday's blog post on Java 5 and PeopleTools 8.49 (and my high hopes that it would have fixed something that been annoying me) didn't have…...
July 6, 2008
Session 3291 in the OAUG section. I went to Sylvain Nguyen's presentation on PeopleSoft global rollouts. Sylvain used to be a manager for PeopleSoft Global…...
April 15, 2008
We had an interesting situation with one of our customers recently where creative use of one of our products, the ERP Firewall for PeopleSoft, saved…...
April 11, 2008
This is another of those posts that I had intended to get completed a while ago, but ended up getting distracted. One of our loyal…...
April 9, 2008
This is another blog posting that Chris and I had discussed putting out there (but got distracted doing other things, one of which is keeping…...
March 17, 2008
This is a question that came up on the ITToolbox forum peopletools-l. I decided that it would be a good idea to flush out my…...
March 14, 2008
So, you know that there’s opportunities for improving your end-users’ ability to get meaningful information out of PeopleSoft, but it seems very daunting. We’ve had…...
March 13, 2008
Dear Mr. Icahn,We see that you are getting access to BEA’s internal financial system. As you may or may not be aware, BEA uses PeopleSoft…...
November 5, 2007
Looks like someone didn't implement workflow for approving vendor payment changes. Label- changes...
October 23, 2007
Internet Explorer manages a whole host of security settings through the concept of security zones. Security zones have names such as Internet, Intranet, Trusted Sites.…...
September 26, 2007
For those who are familiar with our demo and posting that discusses how to drill from a report into a page (blog posting here), you…...
September 21, 2007
  The blog entry goes under the heading of "If Grey Sparling Solutions were a B-School case study". You see, the Grey Sparling management team…...
July 19, 2007
    Here are a couple of events that we'll be at:   Northern California PeopleSoft RUG meeting(June 15 at the Fremont Mariott)I'll be taking…...
June 4, 2007
Preface Readers should note that this post is about PeopleTools 9, not PeopleSoft 9 applications. PeopleSoft 9 has shipped to customers. PeopleSoft 9 applications are…...
May 24, 2007
This is another blog entry I started a while back, but never completed. As mentioned in yesterday’s entry, there was a lot of work done…...
May 14, 2007
In the past couple of days, we’ve received lots and lots of emails from folks who attended our sessions at the Alliance Conference and wanted…...
March 20, 2007
Although I put together a previous posting on Drilling and nVision, I only included a single nVision drill layout to illustrate this. I already put…...
March 16, 2007
Over the past 24 hours, I’ve had lots of folks wanting to learn more about the HCM reporting examples in yesterday’s post. I decided to…...
January 10, 2007
We survived Oracle OpenWorld 2006. A very long, but rewarding week. We originally planned to to blog the show as some other folks did. However,…...
October 27, 2006
I haven't written anything on the Java and PeopleCode series (part 1, part 2) recently, so I thought I'd whip something together this evening. As…...
August 30, 2006
We had an interesting "Ask the Experts" question yesterday about how to disable the PeopleSoft page bar across the entire system. The page bar is…...
August 25, 2006
David Kurtz has a good tip on his weblog about how to get rid of an annoying little bug in the index management in Application…...
August 23, 2006
A common headache for DBAs managing PeopleSoft applications is not knowing which user a particular piece of SQL is being executed for. This happen because…...
August 13, 2006
Well, at least a city near you if you live near Richmond, VA or Washington DC. We've been asked to present at the Mid Atlantic…...
July 27, 2006
For those who know about Report Manager, it's the PeopleSoft-delivered means of finding and accessing reports. For those who support people who use Report Manager,…...
May 22, 2006
In my previous posting on passing parameters to nVision, I briefly mentioned something that was unknown to one of the other experts here at Grey…...
May 18, 2006
Application Engine can be fairly handy in a PeopleSoft developer's toolchest. Aside from all of the useful batch processing things that it can do, it…...
May 13, 2006
In my previous blog entry on nVision and Siebel Analytics, I shamelessly embedded a couple of screenshots from Mark's Blog. This morning, he posted an…...
May 8, 2006
(Sept. 20 update: since writing this we have created a Desktop Single Signon snap-on product that works with PeopleSoft Enterprise. Here's the announcement and here…...
April 27, 2006
Since Java is the language of choice for the Oracle Fusion applications, I thought it would be nice to have some posts that show some…...
February 28, 2006
(update : see ERP Firewall for PeopleSoft) A few years back I had the opportunity to help out with an interesting customer requirement for dynamic…...
January 19, 2006
After reviewing my last posting, I realized that although I covered the specifics of style definitions and nVision, I missed a critical set of information.…...
January 9, 2006
So, you’ve created this really cool nVision report that gets all the data you want, but you can’t for the life of you figure out…...
January 6, 2006
While consulting at the same customer in NYC, we were looking at performance issues related to implementing row level security. As with many customers who…...
December 27, 2005
This week, one of our blog readers asked us for advice on filtering his/her nVision reports with respect to dates. All of you nVision experts…...
November 11, 2005
Our apologies to our loyal blog readers for the lack of content in the past few weeks. Grey Sparling Solutions has had all hands on…...
November 1, 2005
In the previous post about row level security, I mentioned that the two PeopleCode events SearchInit and SearchSave were not intended for providing row level…...
October 16, 2005
One of the things that is often misunderstood about PeopleSoft applications is how row level security works. Part of the reason for this is that…...
October 14, 2005
There was another set of requirements that were important to the customer in my conference call yesterday. That was hierarchical reporting in nVision. The customer’s…...
September 29, 2005
For something as fundamental as Setid indirection, it’s surprising how few people really understand how it works. Hopefully, this will shed some light on the…...
August 31, 2005
Yesterday, I created a posting that discussed this for PS/nVision. Today, we'll talk about PS/Query. Tricks... Tricks... What tricks?Well, actually, the sky's the limit. Many…...
July 29, 2005
Actuate's Managed Spreadsheet Solution I was interested in this presentation specifically because when I worked at PeopleSoft, I worked on PS/nVision and part of this…...
July 25, 2005
The last large session of the day was the Technical Roundtable. Chris Heller and Larry Grey of Grey Sparling were asked to lead the discussion…...
July 25, 2005

Start your free demo

"Learn how you can reduce risk with rapid threat protection, audit response and access control. All from a single, comprehensive platform"

Trusted by hundreds of leading brands