Additional header request needed for OData4j

To get OData4J working with Netweaver Gateway 2.0 I had to add the following in the header
X-Requested-With: XMLHttpRequest
Not sure why this is necessary, would be interested in hearing why, I thought i would share how its done.
//ODataConsumer c = ODataConsumer.create(Constants.flightSVC);
ODataConsumer c = ODataConsumer.create(Constants.flightSVC , new OClientBehavior(){
      @Override
      public void modify(ClientConfig cc) { }
         @Override
         public ODataClientRequest transform(ODataClientRequest request) {
            String userPassword = Constants.USER + ":" + Constants.PASSWORD;
            String encoded = Base64.encodeBase64String(userPassword.getBytes());
            encoded = encoded.replaceAll("\r\n?", "");
            request = request
                   .header("X-Requested-With", "XMLHttpRequest")
                   .header("Authorization", "Basic " + encoded);       
            return request;
// Create new entity
OEntity newBooking = c.createEntity(Constants.BookingCollection)
            .properties.....
Hope this helps someone.
Cheers
John P
PS. TCPGW tool (note 856597) is an effective way to trouble shoot HTTP API's

Hi Genady,
Thanks for reply.
I am not an expert in this area but I will walk you through why I am questioning the need for this particular header value, feel free to correct me where I am wrong.
XMLHttpRequest (XHR) is an API available to browser scripting languages like javascript.
First off I have to put the request in the header when using a Java or .Net client, these clients have nothing to do with XHR.
Secondly without JSON formatted feeds and forgetting about REST test clients and the like, you are left with XML calls, using XHR with XML you have to follow the Same-Origin-Policy, that is the code and the client have to reside on the same domain, not much room for Cross-Site Request Forgery unless you use a server side proxy.
Cheers
JSP

Similar Messages

  • Additional firewire port needed for Canopus

    I have always used a Canopus to change analog video as I download onto my Mac G5 for video editing in iMovie. I recently replaced one that quit on me and now new one is not working right. Both analog and digital lights stay on, rather than one or the other depending on my need. I took it back and exchanged thinking it was broken. The second one did the same thing. Apple store said to try the firewire in the back of the tower as front one may not be working. I do not have one in the back that is not in use. Anyone have any advice?

    You could try using a firewire hub like [this one|http://www.amazon.com/gp/product/B0006BHCEK].
    Capturing video using a hub is not really recommended, but at least you would be able to leave everything connected, and do some troubleshooting.

  • What additional plug ins needed for video

    http://veehd.com/video/3724046_Derren-Brown-Investigates-1
    says I need additional plug in to play.But no plug in shown when clicked. I already downloaded DivX Plus Web Player
    I then get a message that a manual install is available but that brings me to the media player page at http://www.divx.com/en/software/divx-plus and that is already installed. Tried downloading again and running and get a GUI saying its installed. see screenshot below

    Thanks cor -el. I cannot check options as i cannot open the player. It says it is there as in screenshot but when i look in C:\program Files\Divx it is not there. it does not show in a search of the start menu either

  • What kind of virus and malware protection do I need for my new iMac?

    I am new to Apple computers, what virus or malware protection do I need?

    Agreed, please read Thomas's guide!
    As a general rule of thumb though, no additional software is needed for malware or virus protection.  Apple computers are incredibly secure, the best protection is running Software Update often and not downloading from illegal software from torrent sites. Other than that, OS X is incredibly secure and best left alone to run well. 

  • I am heading to Mexico for a quick business trip, I only want to receive texts and make a call or two. What do I need to turn off to avoid ANY additional charges? Cellular Data/Data Roaming/MMS/visual voicemail? And should I turn wifi on and leave it on?

    I am heading to Mexico for a quick business trip, I only want to receive texts and make a call or two. What do I need to turn off to avoid ANY additional charges? Cellular Data/Data Roaming/MMS/visual voicemail? And should I turn wifi on and leave it on?
    I have a new Iphone 5s.

    wifi is not something you can be charged for

  • Do I need additional anti-virus protection for my Macbook Pro for everyday us than what is already on the laptop when you buy it?

    I just purchased my Macbook Pro so it is brand new and I will only use my laptop for everyday use at college. So do I need extra protection for it and if I do what do you recomend.

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use the free software  ClamXav— nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to catch some terrible disease every time you install an application, read email, or visit a web page. But neither should you have a false sense of safety. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then also feel free to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • HT1222 I am trying like **** to download itunes 10.6.3 (64 bit - Windows 7) and I keep getting "the installer was interrupted before the requested operations for iTunes could be completed.  Your systems has not been modified."  I NEED HELP, PLEASE!

    I am trying like **** to download itunes 10.6.3 (64 bit - Windows 7) and I keep getting "the installer was interrupted before the requested operations for iTunes could be completed.  Your systems has not been modified."  I NEED HELP, PLEASE!

    I got it figured out myself... yaaaaay for me!

  • Information Broadcasting - need for additional Licensing?

    One of the key features that is prompting us to upgrade to BW 3.5 later this year is the Information Broadcasting functionality. 
    This will allow us to easily push reports directly to our user base rather than the traditional method of manually emailing workbooks. However will this generate a need for additional licences?  From the testing we have performed so far in order to broadcast a report the receiving user needs to have an account in BW together with the email in the address book. 
    We will have a considerable number of users whose only interaction with BW will be to receive a report that has been broadcasted.  Does anyone have any experience of this same issue?
    any help/advice appreciated.
    thanks
    Mike

    Hello Michael,
    One possibility is to create an email alias that is a distribution list of the users that you want to broadcast to. Create a broadcast setting, in step 2 of the broadcaster wizard specify the distribution list. You shouldn't need to create SAP logon IDs for these users.
    I hope that this helps.
    Cheers,
    Scott

  • I need a request code for offline activation. Because i cannot connect with adobe server for online activation. But I receive "The request code is invalid." by generate answer code.

    I need a request code for offline activation. Because i cannot connect with adobe server for online activation. But I receive "The request code is invalid." by generate answer code.

    Dear Anubha,
    I hope these windows illustrate what I am facing.
    The above window shows the prompt that the software requires activation.
    The version is 8.1.0.
    This next window is the point where I select activation by phone.
    This final window shows that the "response code" is not returned.  I get an
    "Activation Number" instead.
    Steven
    On Tue, Jan 27, 2015 at 10:50 PM, Anubha Goel <[email protected]>

  • Is an anti-virus needed for a new macbook pro?

    Is an anti-virus needed for a new macbook pro with retina display?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • I have recently upgraded to Mavericks and I am being subjected to additional password requests and the monitor take store ever to boot up.  Approximately 5 mins which is way in excess of previous operating system.

    I have recently upgraded to Mavericks and I am being subjected to additional password requests and the monitor take store ever to boot up.  Approximately 5 mins which is way in excess of previous operating system.

    You may need to rebuild permissions on your user account. To do this,boot to your Recovery partition (holding down the Command and R keys while booting) and open Terminal from the Utilities menu. In Terminal, type:  ‘resetpassword’ (without the ’s), hit return, and select the admin user. You are not going to reset your password. Click on the icon for your Macs hard drive at the top. From the drop down below it select the user account which is having issues. At the bottom of the window, you'll see an area labeled Restore Home Directory Permissions and ACLs. Click the reset button there. The process takes a few minutes. When complete, restart.   
    Repair User Permissions
    Startup Issues - Resolve
    Startup Issues - Resolve (2)

  • List of long running Conc Requests required for last 6 days

    Hi All,
    I need List of long running Conc Requests required for last 6 days.But somewhat my query is not working and giving me the output.
    Could anyone please let me know what is wrong in the query which gives me the output for 60 mins but not for the last 6 days as required.
    Query:
    set echo off
    set feedback off
    set linesize 97
    set verify off
    col request_id format 9999999999 heading "Request ID"
    col exec_time format 999999999 heading "Exec Time|(Minutes)"
    col start_date format a10 heading "Start Date"
    col conc_prog format a20 heading "Conc Program Name"
    col user_conc_prog format a40 trunc heading "User Program Name"
    spool long_running_cr.lst
    SELECT
    fcr.request_id request_id,
    TRUNC(((fcr.actual_completion_date-fcr.actual_start_date)/(1/24))*60) exec_time,
    fcr.actual_start_date start_date,
    fcp.concurrent_program_name conc_prog,
    fcpt.user_concurrent_program_name user_conc_prog
    FROM
    fnd_concurrent_programs fcp,
    fnd_concurrent_programs_tl fcpt,
    fnd_concurrent_requests fcr
    WHERE
    TRUNC(((fcr.actual_completion_date-fcr.actual_start_date)/(1/24))*60) > NVL('&min',45)
    and
    TRUNC(((fcr.actual_completion_date-fcr.actual_start_date)/(1/30))*6) > NVL('&days',5)
    and
    fcr.concurrent_program_id = fcp.concurrent_program_id
    and
    fcr.program_application_id = fcp.application_id
    and
    fcr.concurrent_program_id = fcpt.concurrent_program_id
    and
    fcr.program_application_id = fcpt.application_id
    and
    fcpt.language = USERENV('Lang')
    ORDER BY
    TRUNC(((fcr.actual_completion_date-fcr.actual_start_date)/(1/24))*60) desc,
    TRUNC(((fcr.actual_completion_date-fcr.actual_start_date)/(1/30))*6) desc;
    spool off
    Thanks for your time!
    Regards,

    Hi,
    I suggest that you look at this line in particular:
    TRUNC(((fcr.actual_completion_date-fcr.actual_start_date)/(1/30))*6) > NVL('&days',5)and consider whether it is asking the question that you want it to ask.
    Furthermore, it looks like you are expecting to get time in minute from the following line, and this definitely does not return minutes:
    TRUNC(((fcr.actual_completion_date-fcr.actual_start_date)/(1/24))*60) I recommend finding one or two IDs for concurrent requests that you know are running for a long time, comparing the start and end times, testing that information against the output of the above functions, and adjusting your query accordingly.
    Regards,
    John P.
    http://only4left.jpiwowar.com

  • Estimating Security Resources Needed for Support Organization

    Hi Gurus,
    As our implementation winds down, I've been tasked with the pleasure of defining the security resource requirements needed for the future state support organization.
    Some high level details of the environment:
    -ECC 6.0, SCM SNC 7.1, BI, XI/PI; expected to be approximately 10 instances in stable environment between DEV, Q, Prod
    -10000 users
    -100 business roles; 1000 single roles
    -Custom security for one area that will require incremental additions of sales group/sales office across the BI, SNC and ECC systems in the roles (not too often)
    -90 day password reset enforcement
    -Manual access request forms
    -Use of SPM and RAR
    I've done some searches and found a fair amount of forum postings, but I'm seeing all types of different responses.  While I understand it can vary, I am curious if any of you have (from your experience) developed a helpful equation that can help us deteremine whether 2, 3 or 10 resources are needed.
    Please let me know if there is any more context I can provide.  If you are aware of another thread that already discusses this, please let me know.  Thanks in advance.
    Sincerely,
    Chris

    Depending on your frequency of role changes, user changes I would expect a team of 3 (2 reasonably strong + 1 admin) to be able to comfortably manage that landscape with some capacity for performing additional project support work & holiday cover.
    If you have low complexity/change then there is no reason why 1 or 2 people would not be able to cover the admin side once the solution is mature.
    Unfortunately no equation for it but based on what I see clients operating effectively over the last few years.  Automation (position based assignment, use of CUP etc) can help reduce the administrative workload.
    If you have metrics for expected user and role changes (difficult to come up with at the end of an implementation) then you can be more scientific about it.  There are many variables that have a material impact on the support requirements.
    All the consultancies & out sourcers have models that they use for this.  Usually I find them to be a bit generous on the resource side as they have to provide contingency for the unknown stuff.  One of my clients has out sourced some admin tasks and the out sourcing firm applied their metrics to it and fell quite short due to the complexity of it.  This isn't a criticism of those firms, rather that even these companies who do this stuff for a living can miss many things.

  • Appraisal -Additional header data

    HI,
    we have implemeted the HRHAP00_ADD_HEADER  Badi to get the additional employee data in the print layout of a form.
    I attahched this badi to  the additonal header data in the Lay out of a from ,still iam unable to get the further details of a employee in the print form.
    If any one has the similar experience or worked with the additional header data badi please share with me how to  get the additonal header data functionality.
    Thanks in advacne
    VK

    Hi ,
    Thanks for the reply. As you pointed out ,we are moving from ehp3 smart forms to ehp4 adobe forms.
    The BAdi was working fine with the smart form ,when we attached the same with the ehp4 standard print layout it  is not working.
    As i do not have much exposure to the techinical aspects i am unable to crack this issue. Please advise me where exactly i need to work and how to incorporate the BAdi into the form.
    Thanks a lot for your response.
    Thanks
    VK

  • Order Management: Additional Header Information

    dears,
    we recive the following error "values have not been entered for one or more required segments sales order" we tried to but the flexfileds not requerd but still the same we recive the error we also tried to put default value for the flexfiled but we also recive the error
    any hint
    fadi

    Fadi,
    I am sorry I got confused. I read this post as Additional "Order" Information where you are referring to Additional "header" information.
    As this is DFF, and you have set this up as required, did you enter a value in the DFF segment that is required. If yes, you should be able to proceed. If you do not want this segment to be populated, may be you need to make this segment not required in the Additional Header Information DFF.
    Thanks
    Nagamohan

Maybe you are looking for

  • TS1398 can you change the connection order in iOS for known networks

    Is it possible to change the order of preference for known Wifi networks. When I turn on Wifi at home it selects the BT fon connection not the private network connection because the Fon connection was set up after the private network. This gets annoy

  • EJB + ADF app

    Hi. I'm using JDeveloper 11.1.2.2.0 and I'm developing "normal" adf application. Inside this application there is also project named Interface which uses EJB3 tchnology to communicate with outer world and outer world can communicate with my app. If I

  • Getting duplicate icons from Docky

    I've been scouring for a while and have decided to finally make a post I've tried changing .desktop files in /usr/share/applications and was wondering if there's another way, one that actually works.

  • Modify popup exceptions multiple systems

    We are rolling out a feature that integrates salesforce with our phone system and I need to add salesforce.com to the pop up exception list for 70 users. How can I do this without having to visit each user? I've read about the permissions.sqlite but

  • New mask tracker is not working

    I am trying to use the new mask tracking feature in Premiere Pro CC 2014 and it does not work.  I am using native AVCHD footage from a Canon C100.  Editing on a mid-2012 Macbook Pro with Retina and OSX 10.9.3.  The project has GPU enabled. I drop a G