Tag: PeopleSoft Enterprise

WorkStrategy will provide an overview of 9.2 8.56 upgrade steps, functional enhancements, and PUM installation tips. Presenters will highlight new Fluid application features, WorkCenters and Activity Guides, Simplified Analytics, Guided Self Service, customization reapplication approach. Webinar will also cover upgrade methodology and project phases.

Objectives:
• Understand how to leverage new 9.2 functional enhancements
• Review Project Planning and Resource Allocation
• Learn about PUM installation best practices
• Review Fluid configuration options
• Review tips for upgrades and customer case studies 

*This session was part of Quest Experience Week-PeopleSoft Day*

Presented by Brian McIntyre, President of WorkStrategy

  • Quest Customer Learning Team
  • Recordings & Presentations
  • 12/06/18

Presented by Jessica Becker, Savannah River Nuclear Solutions

Savannah River Nuclear Solutions, LLC. (SRNS) is the Management Contractor for the Department of Energy (DOE) Savannah River Site near Aiken, South Carolina. SRNS uses PeopleSoft 9.2 ERP software to manage our business in Human Resources, Finance, and Supply Chain Management. SRNS recently implemented a new PUM (PeopleSoft Update Manager) Strategy and with this tool,  updated our system to Image 26, People Tools 8.54 in the Public Sector / Government environment. This session will provide functional examples that successfully utilized Page and Field Configurator, as well as some ideas that were not a good fit for this functionality. The use of Application Data Sets (ADS) for migration of the configuration will be discussed. We will also discuss Ideas in Oracle Community that may be able to further enhance the use of Page and Field Configurator.

*This session was part of Quest Experience Week, PeopleSoft Day*

Oracle has dramatically extended its PeopleSoft investment in the Fluid User Experience which delivers PeopleSoft applications / pages in a modern and intuitive way across any type of mobile device. Additionally PeopleSoft 9.2 and PeopleTools 8.55 delivers revolutionary innovation by creating an improved user experience that fundamentally changes how users interact with PeopleSoft.

This session will cover Reed Smith’s journey to deploying PeopleSoft Fluid User Interface and the results and benefits for their organization.

Topics covered:

• A Strategy for deploying Fluid
• The Drivers for deploying the Fluid User Interface
• Where and how Fluid is being used
• The Roll out of the Fluid User Interface to end users
• The Lessons learned other customers could benefit from
• Obstacles encountered while deploying Fluid
• Results and Benefits Since deploying Fluid

Presented by Elizabeth Peterson & Rachel Steckel, Reed Smith LLP and Derek Tomei, Velocity Technology Solutions Inc.

*This session was part of Quest Experience Week- PeopleSoft Day*
 

With organizations looking to fully leverage their investment in PeopleSoft, strategies to enhance PeopleSoft’s mobility have proven to be a key priority. However, expanding users’ access to PeopleSoft comes with the additional access points that can put data at risk, and the objective to maintain strict data security policies must accompany any mobility projects. Balancing the desire for added mobility and productivity, with this increased threat exposure can be daunting, but is necessary to tackle both in tandem.

As access potentially moves outside the corporate firewall, organizations must focus on application-level security to protect themselves from malicious outsiders, privilege-abusing insiders, and inadvertent data leakage. In this insightful session, PeopleSoft security professionals Greg Wendt and JD Bell will demonstrate how to:

Protect your publicly-facing PeopleSoft applications from cybercriminals gaining access through phished credentials or brute force attacks
Embed two-factor authentication within PeopleSoft to restrict access to sensitive systems and information
Dynamically control access to systems handling sensitive information based on the context of request (corporate/remote network, known/unknown device, etc.)
Monitor suspicious activity that occurs outside normal business hours.
Leverage data visualization to execute on-going risk management strategies
Presented by Greg Wendt & JD Bell, Appsian

*This session was part of Quest Experience Week-PeopleSoft Day*
 

  • Quest Customer Learning Team
  • Recordings & Presentations
  • 12/06/18