Wow! Sounds frustrating Andrew. Does JDE have a website where they
about IBM PTF's? Do they mention this? Are they planning on providing
patch to JDE that will cooperate with this set of PTF's? Because a long
term strategy surely doesn't include never installing PTF's or removing
certain ones. Either IBM has to come up with a fix that not only
addresses the security breach but also works with JDE; or, JDE will have
to come out with a patch that works with the patch.
Much like I have to change CPYTOIMPF (if I still used it) every time IBM
came out with an 'upgrade' to that.
We have a ticket open with Oracle where I've tried to ask if they have
validated against this group. They in turn what us to generate logs on
the system and in E1, as they don't have a clue as to what is wrong. This
is difficult to do as we can get E1 up and running, but Server Manager (a
web based management tool in E1) still isn't running.
As the system also refuses to delete the PTFs in question, I have the
suspicion that IBM has fixed some holes and will not revert back to its
We are also opening a ticket with IBM, asking for either a way to revert
back or further patches to get E1 running on the new PTF group.
Please consider the environment before printing this e-mail.
This message and any attachments should be treated as proprietary to the sender
and confidential to the identified recipients and should not be disclosed to or
used by anyone other than the intended recipient unless pre arranged with the
sender. If you are not an addressee of this communication, have received this
e-mail by transmission error of the sender, recipient or due to another
originator by an error in transmission, you are hereby notified that any
disclosure, copying, use, distribution, or taking of any action in reliance on
the contents of this information is prohibited. In any such event, please
notify the sender immediately by contacting Spirax Sarco Inc., 803 714 2000 or
reply to this e-mail and then delete it from your system. Spirax Sarco Inc.
accepts no responsibility for software viruses and all recipients should check
for viruses before opening any attachments.