***** Highly Critical URGENT *****

Our BASIS guys have done the system copy/refresh from the prod box to preprod BI.
I want to know what BI Configurations / Functional Tasks has to be done after the refresh.
Could you please give me BEST advice. which transactions to look for etc...
Please help this is highly urgent task. I will reward full points.*****

Hi Asif,
Check this
SAP Note-886102
https://www.sdn.sap.com/irj/servlet/prt/portal/prtroot/com.sap.km.cm.docs/oss_notes/sdn_oss_bw_whm/~form/handler
Also check these links
http://www.sapfans.com/forums/viewtopic.php?p=850405&sid=d8113ddd8d035e17d3ce1b09adb1f504
Check this thread too
/thread/333172 [original link is broken]
Hope this clears
Regards
Karthik

Similar Messages

  • IPhone - Discerning High Importance/Urgent Mail Messages

    Help! I have an iPhone 3G S. I can see my work email (MS Hosted Exhcange) on my unit, but I can't figure out how to discern when I get a High Importance/Urgent message. Like on Outlook it gives you an exclamation point. Any suggestions?
    Thanks much.

    The iPhone mail app treats all emails equally. The importance rating thing is an Outlook thing.

  • OC4J high availability Urgent!!

    Hi,
    I have three instances working as a cluster but right now I have thre different url to access their deploys.
    How can I have just one url serving all my request so I can have high availability on my environment?

    Always access your apps through a single adress, which is either a load-balancer or the webcache on one of the three nodes. Configure this adress on all three HTTP Servers as a VirtualHost, and (if used) on all three webcaches as a website, then only that name will be used. The clustering can take care of the load-balancing, or manually configure load-balancing on webcache (site-to-server mapping) or mod_oc4j.

  • Highly critical Samba vulnerability

    Applies to versions 3.0.0 - 3.0.29 (current Arch version from extra repo is 3.0.28A):
    http://www.samba.org/samba/security/CVE-2008-1105.html

    It is known.  http://bugs.archlinux.org/task/10526 
    The usual maintainer is currently away so the devs are being careful not to break the package in their efforts to fill in for him.

  • Urgent : How to use pricing scale base type "G" in CRM?

    Hi Gurus
    We are facing a problem regarging scale base type G which is scale based on a formula in SAP ECC side. I one of our Z condition type wea re using scale base type G and using a formula 901 to calculate pricing in SAP R/3.
    But scale base type "G" is not supported in CRM as the entry is not there in /SAPCND/T681VS and we could not find any ways to include it in CRM. We even tried by entering the entried in the table by debug method but then the records, specialy the supplement record, are not replicating correctly in CRM from ECC.
    So for time being we changed the scale base type to C from G in ECC side.
    Can you please guide me if there is any way to use scale base type G in CRM? Or what can be the way around to use scale based on formula in CRM ?
    Is it possible to change the scale base type while the records are getting replicated to CRM?? But how will it work then.
    This is very urgent.
    An useful answer will be highly appreciated.

    Hello Singamshetty and Micheal,
    We are facing exact same issue. Problem is that formula 901 does not get called in ECC with scale base type = 'c' in condition type ZSH1.  Because of this, order and billing document in ECC have wrong condition value and then order document in CRM also gets wrong value once the billing document is saved.
    This is highly critical issue as it's a big $ loss. Any expert, please suggest how to correct it?
    Thanks
    Sandeep

  • Interface Criticity

    Hi experts,
    how would you define :
    a high criticity interface ?
    a medium ?
    a low ?
    Kind regards,
    Jamal

    Adding to what Mike said....
    For most of the organization critical interface would be that carries vital information in terms of Business (data).
    For an organization handling its customers and suppliers, a customer interface might be more critical than a supplier interface. But saying that its all a definition from the organization itself. They define whats critical to them

  • Details for KT

    Hi Experts ,
              i am going to get KT for the new project in that discussion what are the question i have to ask and this is supporing project,could u please share me what type of discussions will happen...
    advanced thanks
    Regards
    guttireddy

    Hi,
    Support project Tips,
    you need work on Reports ,enhancements,loading,  performance issues  some times u need to work on Ticket resolving
    Create ADHOC reports,Validating Reporting(Reconciliation) Validationg DATA with in targets By using validating reports or by comparing with BW data with R/3
    Add/Remove  fields depend upon user requirement
    Ticket Resolving
    Critical,urgent,high,medium,low priority tickets
    The response times and resolution times again are defined in the SLA based on the clients requirement
    Critical:Critical means it is most complicated issues,Need to solve in 1 day or half a day
    The concept of Ticket varies from contract to contract in between companies.Like High Priority, Low priority and so on. If a ticket is of high priority it has to be resolved ASAP.If the ticket is of low priority it must be considered only after attending to high priority tickets.

  • Office 2013 Std (local) in combination with Office 2013 Pro (App-V)

    Hello,
    I have multiple RDS servers, that have Office 2013 Std installed locally. I did this on purpose, after reading some blogs pointing out Office 2013 is a complicated applicatie to stream well. And of course Office 2013 is highly critical to my clients.
    So I have a local installation of Office 2013 Std on every RDS server.
    The catch is, that the client also has an open license for Office 2013 Pro. This is because some users need to work with 'Access 2013'.
    So I thought it would be nice to use App-V to stream Access 2013 to the RDS servers. I have created the package for Office 2013 Pro, with Access in it. And I succesfully published Access 2013 to the group of users. So I can use Access on the RDS servers.
    The problem is, that when I click on the appliation "MSACCESS.exe", the application pops up in taskmanager and is immidiatly shut down again. So it never launches. No error, no nothing.
    I can't find any directions in the server, applicatie or App-V logs in the eventviewer. Does anyone have a clue where to look?
    Thanks in advance

    I think to be on a safe side, using a 'true' control system like AppSense or using dedicated RDS servers would be the only legally valid option.
    Even when Office (or at least Access) is virtualized, the licensing part and product key handling is done natively on the RDS servers by the 'Office 2013 Deployment Kit'. Besides others this includes a locally installed 'licensing stump'. Therefor there
    can be only one Office Suite product key be assigned to a RDS server machine.
    In fact you could tell the Deployment Kit to use the Office Pro key (allowing a virtualized Access to run), but then also the locally installed Office Version would (attempt to ) be licensed as 'Pro'. That potentially won't work. In fact you could re-configure
    the local Standard Office installation to consume Pro licenses, but that doesn't fit to your legal licenses.
    As Aaron write, legally an Office license is bound to the endpoint device, so you'd have to make sure that your Access App-V package can only be access by permitted client machines. And while App-V can filter application on the accessing user and the executing
    machine, it can't filter on the accessing end-point.
    Though we don't like it... 3rd party or a server silo seem the way to go.
    Falko
    Twitter
    @kirk_tn   |   Blog
    kirxblog   |   Web
    kirx.org   |   Fireside
    appvbook.com

  • Is it possible for SA540 to work in transparent bridge mode?

    Hi all,
    I've been considering to use a Cisco SA540 in an industrial project; please consider Scenario 1 and 2 files attached (bear with me - I'm an engineer, not an artist).
    All networks mentioned in both scenarios are regular and well known Ethernet TCP/IP networks. The Corporate Network and Automation Network (including the DMZ) are in different subnets. The Corporate Network is the biggest one, similar to any company's corporate network you all know. The Automation Network exists for the purpose of operating and maintaining the industry process; it's smaller but highly critical. Only specific staff (automation staff and dedicated operators) have access to it. Although many devices and networks in the Automation Network are industry specific - not so well known, a small segment of it is plain Ethernet TCP/IP, as I've already stated. The Automation Network has a DMZ, where we lay servers that provide industry process information for the Corporate Network.
    Scenario 2 may look at a first glance the best option, since it's simpler, doesn't require another router and benefits from Cisco SA540 support for both a LAN and a DMZ. The problem with Scenario 2 is the following:
    Since both networks are maintained by different teams under different management, TI staff would have absolute control over the Cisco SA540. This way automation staff could not grant that the Automation Network is really protected from the Corporate Network.
    TI staff may even demand for another device to interface with the Automation Network - which is not Cisco SA540, since they rule everything that lives in the Corporate Network. In this case, I have my hands tied!
    Scenario 1 solves the above problems. Since automation would have absolute control over the Cisco SA540, they could grant security for the Automation Network (except for DMZ, but that's the reason why it is called a DMZ!). TI staff could ask for any router they prefer to interface with the DMZ, I would never mind about it.
    Considering the above, I will probably be forced to adopt Scenario 1 instead of Scenario 2. So here comes my question: is it possible for Cisco SA540 to work with the same subnet for both WAN and LAN interfaces (in Scenario 1, no DMZ interface is required)? In other words, is it possible for Cisco SA540 to work in transparent bridge mode? I've been through all of the Cisco SA540 Administration Manual and as far as I could understand, routing is not an option - it is demanding.
    Although I understand I could adopt Scenario 1 and still have different subnets for DMZ and the rest of the Automation Network by connecting the DMZ to the WAN interface and the rest of the Automation Network to the LAN interface in the Cisco SA540, I believe it's not worth the effort. The Automation Network is so small and we do all we can to keep it as simple as possible.

    Adriano, there is a RV042G, which supports the gig ports and a 800 mbps nat throughput. Here is the datasheet
    http://www.cisco.com/en/US/prod/collateral/routers/ps10907/ps9923/ps12262/data_sheet_c78-706724.html
    If you are using a DSL connection, the SRP527/547 models may be an alternative. These models support the RFC 1483 Bridges EOA Please note the SRP547 should be 10/100/1000. Also note the SRP521/541 are Fast Ethernet units and they do differ from the SRP527/547. The main selling point of these devices are the FXS/FXO ports. So this may also be a bit of an "unfocused" solution. But it's worth throwing the idea out there!
    Here is the admin guide;
    http://www.cisco.com/en/US/docs/voice_ip_comm/unified_communications/srp540_series/administration/srp500_AG_2567701.pdf
    Here is the datasheet;
    http://www.cisco.com/en/US/prod/collateral/voicesw/ps6790/gatecont/ps10500/data_sheet_c78-550705.pdf

  • Satellite M30: coloured lines run up and down on display

    Hi there
    Ive got a problem with the display on my Satelite M30. I can boot into windows fine etc but coloured lines run up and down my display as well as general artifacts. I cant even install nvidia drivers without a blue screen.
    The strange thing is that if i apply pressure to the left side of my touch pad i can instal the drivers and everything is fine! Release the pressure and the computer crashes. Ive opened the laptop up and can find nothing that could be causing this.
    Any insight here?
    Maki43

    Hi
    You could check if the problem is related to the LCD monitor or to the graphic card.
    Try to connect the external monitor and check if the lines appear on the second display.
    If the lines does not appear then the graphic card should be ok.
    Did you try to install the graphic driver from the Nvidia website??? Such drivers are not designed for the usage on the Toshiba notebook. You have to use the own Toshiba graphic drivers because the drivers supports an overheating protection.
    If the temperature increases to the higher, critical level the Toshiba drivers will decreases the graphic card performance.
    The other graphic drivers dont support such function and therefore the graphic chip can overheat!
    Anyway, I think also the technician should check the notebook

  • Oracle Security : what do you think about the following policy violation ?

    If you install OEM10, you will be able to see if you violate some security guidelines :
    Interresting is revoking UTL_FILE from public, which is critical. Also revoke UTL_TCP and UTL_SMTP. This is going to upset an expert I know...
    Take care about the failed login attempts. If you set it to 10 to the default profile, and if your DBSNMP password is NOT the default password, then Oracle will lock your account after node discovery!
    In Solaris, you can disable execution of the user stack with the system parameters set noexec_user_stack=1
    set noexec_user_stack_log=1. I did not find how to do it on AIX. However, those settings may have side effects.
    About the ports, it complains about open ports, even if this is the port oracle listener is using! Simply ignore most of the violations there.
    About JAccelerator (NCOMP), it is located on the "companion" CD.
    Ok, Waiting for your feedback
    Regards
    Laurent
    [High]      Critical Patch Advisories for Oracle Homes     Configuration     Host     Checks Oracle Homes for missing critical patches          
    [High]      Insufficient Number of Control Files     Configuration     Database     Checks for use of a single control file          
    [High]      Open ports     Security     Host     Check for open ports          
    [High]      Remote OS role     Security     Database     Check for insecure authentication of remote users (remote OS role)          
    [High]      EXECUTE UTL_FILE privileges to PUBLIC     Security     Database     Test for PUBLIC having EXECUTE privilege on the UTIL_FILE package          
    [High]      Listener direct administration     Security     Listener     Ensure that listeners cannot be administered directly          
    [High]      Remote OS authentication     Security     Database     Check for insecure authentication of remote users (remote OS authentication)          
    [High]      Listener password     Security     Listener     Test for password-protected listeners          
    [High]      HTTP Server Access Logging     Security     HTTP Server     Check that HTTP Server access logging is enabled          
    [High]      Web Cache Access Logging     Security     Web Cache     Check that Web Cache access logging is enabled          
    [High]      Web Cache Dummy wallet     Security     Web Cache     Check that dummy wallet is not used for production SSL load.          
    [High]      HTTP Server Dummy wallet     Security     HTTP Server     Check that dummy wallet is not used for production SSL load.          
    [High]      Web Cache owner and setuid bit'     Security     Web Cache     Check that webcached binary is not owned by root and setuid is not set          
    [High]      HTTP Server Owner and setuid bit     Security     HTTP Server     Check the httpd binary is not owned by root and setuid bit is not set.          
    [High]      HTTP Server Directory Indexing     Security     HTTP Server     Check that Directory Indexing is disabled on this HTTP Server          
    [High]      Insufficient Redo Log Size     Storage     Database     Checks for redo log files less than 1 Mb          
    [Medium]      Insufficient Number of Redo Logs     Configuration     Database     Checks for use of less than three redo logs          
    [Medium]      Invalid Objects     Objects     Database     Checks for invalid objects          
    [Medium]      Insecure services     Security     Host     Check for insecure services          
    [Medium]      DBSNMP privileges     Security     Database     Check that DBSNMP account has sufficient privileges to conduct all security tests          
    [Medium]      Remote password file     Security     Database     Check for insecure authentication of remote users (remote password file)          
    [Medium]      Default passwords     Security     Database     Test for known accounts having default passwords          
    [Medium]      Unlimited login attempts     Security     Database     Check for limits on the number of failed logging attempts          
    [Medium]      Web Cache Writable files     Security     Web Cache     Check that there are no group or world writable files in the Document Root directory.          
    [Medium]      HTTP Server Writable files     Security     HTTP Server     Check that there are no group or world writable files in the Document Root directory          
    [Medium]      Excessive PUBLIC EXECUTE privileges     Security     Database     Check for PUBLIC having EXECUTE privileges on powerful packages          
    [Medium]      SYSTEM privileges to PUBLIC     Security     Database     Check for SYSTEM privileges granted to PUBLIC          
    [Medium]      Well-known accounts     Security     Database     Test for accessibility of well-known accounts          
    [Medium]      Execute Stack     Security     Host     Check for OS config parameter which enables execution of code on the user stack          
    [Medium]      Use of Unlimited Autoextension     Storage     Database     Checks for tablespaces with at least one datafile whose size is unlimited          
    [Informational]      Force Logging Disabled     Configuration     Database     When Data Guard Broker is being used, checks primary database for disabled force logging          
    [Informational]      Not Using Spfile     Configuration     Database     Checks for spfile not being used          
    [Informational]      Use of Non-Standard Initialization Parameters     Configuration     Database     Checks for use of non-standard initialization parameters          
    [Informational]      Flash Recovery Area Location Not Set     Configuration     Database     Checks for flash recovery area not set          
    [Informational]      Installation of JAccelerator (NCOMP)     Installation     Database     Checks for installation of JAccelerator (NCOMP) that improves Java Virtual Machine performance by running natively compiled (NCOMP) classes          
    [Informational]      Listener logging status     Security     Listener     Test for logging status of listener instances          
    [Informational]      Non-uniform Default Extent Size     Storage     Database     Checks for tablespaces with non-uniform default extent size          
    [Informational]      Not Using Undo Space Management     Storage     Database     Checks for undo space management not being used          
    [Informational]      Users with Permanent Tablespace as Temporary Tablespace     Storage     Database     Checks for users using a permanent tablespace as the temporary tablespace          
    [Informational]      Rollback in SYSTEM Tablespace     Storage     Database     Checks for rollback segments in SYSTEM tablespace          
    [Informational]      Non-System Data Segments in System Tablespaces     Storage     Database     Checks for data segments owned by non-system users located in tablespaces SYSTEM and SYSAUX          
    [Informational]      Users with System Tablespace as Default Tablespace     Storage     Database     Checks for non-system users using SYSTEM or SYSAUX as the default tablespace          
    [Informational]      Dictionary Managed Tablespaces     Storage     Database     Checks for dictionary managed tablespaces (other than SYSTEM and SYSAUX)          
    [Informational]      Tablespaces Containing Rollback and Data Segments     Storage     Database     Checks for tablespaces containing both rollback (other than SYSTEM) and data segments          
    [Informational]      Segments with Extent Growth Policy Violation     Storage     Database     Checks for segments in dictionary managed tablespaces (other than SYSTEM and SYSAUX) having irregular extent sizes and/or non-zero Percent Increase settings

    Interresting is revoking UTL_FILE from public, which is critical. Also revoke UTL_TCP and UTL_SMTP. This is going to upset an expert I know...Okay, as this is (I think) aimed at me, I'll fall for it ;)
    What is the point of revoking UTL_FILE from PUBLIC? Yes I know what you think the point is, but without rights on an Oracle DIRECTORY being able to execute UTL_FILE is useless. Unless of course you're still using the init.ora parameter
    UTL_FILE_DIR=*which I sincerely hope you're not.
    As for UTL_SMTP and UTL_TCP, I think whether a program is allowed to send e-mail to a given SMTP server is really in the remit of the e-mail adminstrator rather than the DBA.
    Look, DBAs are kings of their realm and can set their own rules. The rest of us have to live with them. A couple of years ago I worked a project where I was not allowed access to the USER_DUMP_DEST directory. So every time I generated a TRC file I had to phone up the DBA and a couple of hours later I got an e-mail with an attachment. Secure yes, but not very productive when I was trying to debug a Row Level Security implementation.
    I have worked on both sides of the DBA/Developer fence and I understand both sides of the argument. I think it is important for developers to document all the privileges necessary to make their app run. Maybe you don't have a better way of doing that than revoking privileges from PUBLIC. Or maybe you just want to generate additional communication with developers. That's fine. I know sometimes even DBAs get lonely.
    Cheers, APC

  • Mac Mini Server - Is it really good enough?

    Hi
    The new Mac Mini Server configuration may be great for small workgroups wanting to collaborate on Wikis, calendaring and a little bit of file sharing, but when it comes to backup, this little baby really doesn't cut the mustard. So, how to backup your valuable data? AIT-2 Turbo drives have Firewire interfaces, but AIT technology is/is being discontinued and LTO is only available as SAS or SCSI and there's no way to connect it to a Mac Mini. For a small amount of data, an Iomega REV drive can be used, but if you configure a Mac Mini Server as per Apple's suggestion on their store with a Promise SmartStor DS4600, all of a sudden you've got 3TB of data storage and no effective way of backing up.
    Has anybody else thought about this and perhaps thought of a solution? I'd be interested to know.
    Paul

    Hi,
    I would say in this situation Time Machine is your best bet, backing up to either a USB/Firewire device, or a NAS box of some kind.
    Failing that, you can get USB tape devices from a wide range of suppliers (they are actually standard SATA/SAS/SCSI devices usually, and simply feature a converter in the enclosure).
    I think the real questions you need to be asking here are:
    -How critical is the application/data you are thinking of hosting on your Mini?
    +-If it's highly critical, you need to look at investing in a high end NAS/tape device, or maybe finding a way to cluster two Minis together...+
    +Remember that your chosen backup solution depends on how you need to protect the data. For example, if you are simply wanting to protect against data loss due to a hard drive failure, a solution that mirrors the disk directly (or at the end of every day) will be good.+
    +If you need to have periodic snapshots of your data going back over x number of days, your system will automatically become alot more complex and expensive.+
    -Is the cost of what is required in securing the data going to make the option of selecting a different system (such as the Mac Pro or a low-end/second user X-Serve) more cost effective.
    +-The Mini is intended to be a desktop machine. Look at any server on the market (PCs too!) and you will see that even low-end workgroup servers tend to feature at least 2 disks!+
    I hope this helps,
    Jon

  • Forget the loss of face Adobe, do the right thing

    All the time that this débacle persists, millions of Flash Player users are exposed to malware threats.  What is more important, functionality or safety?  Your first duty is to use best efforts to make the player as safe and secure as you are able to.  You are failing in this.  No amount of stonewalling can conceal the mess.  What incentive is there to keep software up to date and secure when new releases fail as badly as this one?  It's hard enough to persuade most people to keep their systems safe and up to date without this sort of thing happening.
    Version 10.0.2.45 installed like a dream.  Didn't Adobe test this new release?  It's pathetic to suggest workarounds when the installer software should be doing the job properly.
    Shame that a highly critical security problem occurred coincidentally with a new release.
    Flash Player is not free software.  It is paid for by users of the Flash creation software.  Without Flash Player, their work cannot be viewed.

    Try here:
    The Complete Guide to FaceTime: Set-up, Use, and Troubleshooting Problems

  • PI 7.1 and central SLD

    Hello, colleagues.
    We have already central SLD based on SAP Solution Manager (SM+ERP systems). Now we plan to setup PI 7.1 (three-system configuration).
    Should we include PI-systems in the central SLD or organize second separate SLD for PI-systems?
    We have some doubts about it and cannot yet make right decision.
    Can we hear your suggestions of this matter?

    Hi,
    Personally I recommand to have at least two SLD for PI systems: one for PI prod, and another for PI non-prod (dev, Qua, Pre-prod). As your current SLD is linked to ERP, I presume it has a high criticity, so for me I think you can use it for your PI prod.
    Or you can have only one central SLD (yours) which populate the local SLD of each PI, by synchronization.
    with SLD, there are several choices, but keep in mind that for the SLD of PI prod, it should have a "hight" criticity. If its SLD is shut down, PI can work only during several minutes without SLD info... thanks to its SLD cache, but after that PI exchanges are down.
    Regards.
    Mickael

  • CRM 5.0 - IC WebClient - Service Ticket vs Service Order Navigation

    Hi Gurus
    Have any of you experts out there used the Badi: Navigation to Service Ticket and Service Order.
    This Badi is located at: SPRO->IMG->Customer Relationship Management
    ->Interaction Center Webclient->Business Transactions->Service Ticket
    ->Business Add-Ins (Badi)s.
    We are using Service Tickets only, yet when searching in the Inbox we locate our Service Ticket Transactions, when we select the Transaction it opens in Service Order view, not Service Ticket view.
    My understanding is that this Badi can resolve the issue, does anyone have an example of the code they've used in this Badi to force navigation to the Service Ticket.
    This is highly critical to our implimentation, therefore maximum points for the right answer
    Many Thanks
    Panduranga

    Hi Panduranga ,
    Here is a method in BADI.
    pay attention that's only one BADI can be active so deactivate default BADI.
    method IF_EX_CRM_ICWC_SERVICE_NAV~NAVIGATE.
        case iv_process_type.
         when 'TSVO'.                                           "#EC NOTEXT
    * navigate to Service Ticket
           rv_navigation_link = 'ServiceToSrvTHead'.            "#EC NOTEXT
           return.
         when 'ZTSV'.                                           "#EC NOTEXT
    * navigate to Service Ticket
           rv_navigation_link = 'ServiceToSrvTHead'.            "#EC NOTEXT
           return.
    *    when 'WRS1'.                                           "#EC NOTEXT
    * navigate to WebRequest
          when others.
    * navigate to "normal" Service Order
            rv_navigation_link = 'ServiceToServHeader'.         "#EC NOTEXT
            return.
        endcase.
    endmethod.
    Good Luck
    Eli Steklov
    <b>Please Reward Points if it Helps </b>

Maybe you are looking for

  • Safari main window not showing up in my user account when launched

    Safari main window is not showing up when launched in my user account. For some unknown reason, there must be a bug with Space and Safari as when I switch from Space 1 to Space 2 (and vice versa) I can see the Safari main window for less than 1 sec b

  • Where has my music library gone?

    I've loaded iTunes onto my new laptop, logged on with my ID but there is no music in my library!  Nothing!  Not even a whisper!

  • Playback of repeats in score editor

    Is there any way to have Logic intelligently follow the repeats indicated in the score editor during playback? DP, even though the score editor *****, has a way to do this. One of the main reasons I switched to Logic was so that I wouldn't have to ex

  • GSOAP invocation question

    Hi, We have created a custom service by merging two OOTB services GeneratePDF service and ApplyPolicy services. Invoking this custom service via gSOAP web service fails with the following error. SOAP 1.1 fault: SOAP-ENV:Server.userException [no subco

  • Hashtable not updated, question for experts!

    I have a Hashtahble which holds a pait <key, MyObject>, the I get the object via the get Method provided by the hastable class as follows: MyObject obj=(MyObject)myHashTable.get(key); then i modify the properties of my object: obj.updateProperties();