Anybody using cTable UI element in real life projects?

Hi guys,
just curious, since there is very few content about the client side table (available since NW 7.30) Web Dynpro ABAP UI element here on SDN ( sap help link )
Is anybody using this UI element in a more ore less complex application? Since I'd like to discuss several things like the "useAvailableHeight" attribute or the personalization features but I don't know if anybody cares. However, cya!

Hi Johns,
BizTalk is OLTP system, yes. But latency is an issue in my case. I need <100 msec latency for the MessageBox round trip for most cases. In some cases I need <10 msec.
And SSD is so cheap, we could replace burned disk each couple months, if we need. It would be still cheaper than good hard-drive subsystem.
And we tolerate some message lost. At last we use now the custom made HA solution and didn't find any problems with, no lost messages.
Leonid Ganeline [BizTalk MVP]

Similar Messages

  • Can you give some real-life use of tables in BW?

    Hi,
    In reading links and notes from here, I took a leap to try and understand how tables are used in the BW environment, by following:
    se16
    RSZ* then  F4
    then I Double click on:
    i.
    RSZRANGE        Selection specification for an element
    If execute, I get a table with a several fields with values.
    What is this table suppose to tell me and can you give me a real-life scenario where you made use of such a research to solve a problem?
    ii.
    RSZOPRATOR       Formula Operators
    similarly, here I found fields with operators and mostly numbers.
    What is this table suppose to tell me and can you give me a real-life scenario where you made use of such a research to solve a problem?
    iii. Later I tried RSU* then
    RSUPDDAT        Update rules key figures
    Nothing recognizable here about the update rules.
    What is this table suppose to tell me and can you give me a real-life scenario where you made use of such a research to solve a problem?
    iv.
    Also, sometimes here conversations like, research on which tables have the fields you need and let’s generate reports against them. I though tin BW, reports are always generated against data targets (ODS, Cubes, etc). I didn’t know of tables.
    Can you give a real-life scenario where you had to combine fields in 2 or 3 tables and use them in project?
    Thanks

    Amanda,
    There are many scenarios where you can use the tables behind the screen. But most of the times the scenarios are sophisticated requirement. Suppose your installation has many data targets and all are getting loaded nightly, weekly or even monthly intervals. Usually in most places the person on call will go and look at all the targets in the morning whether all the loads are successful (they would have beeped if something faild during loading at nights). Instead of going thru this manual process you can write an ABAP program which will look at the infocubes and ODS and see how many records were added, transferred, updated success or failure all kinds of information.
    RSA1 is just a front end and all the information you see are all coming from tables which are stored here. go to SE80 or SE11 and search for the tables behind the screens. Every bit of detail that you see is coming from tables or available in tables. There are many tables and they are all relational. So you can pretty much do anything you like in accessing them. Please just read (SELECT) from them. Don't try to delete, insert anything unless you know what you are doing absolutely.
    Hope this helps.
    Good luck with your learning.
    Alex.

  • Using SSD for BizTalk DB. Real-life experience

    Hi,
    We are considering to use SSD disk for the MessageBox [and maybe other] database.
    In theory it should increase speed of the BizTalk as a whole system.
    Did anybody try it in real life scenarios? If so, what are the real numbers in performance?
    What is the real danger of the SSD degradation over time? What is the reliability? What about HA, is it worth to use SSD for the HA on SQL level?
    Leonid Ganeline [BizTalk MVP]

    Hi Johns,
    BizTalk is OLTP system, yes. But latency is an issue in my case. I need <100 msec latency for the MessageBox round trip for most cases. In some cases I need <10 msec.
    And SSD is so cheap, we could replace burned disk each couple months, if we need. It would be still cheaper than good hard-drive subsystem.
    And we tolerate some message lost. At last we use now the custom made HA solution and didn't find any problems with, no lost messages.
    Leonid Ganeline [BizTalk MVP]

  • Any real-life experience using SSD yet?

    In my mind playing around with a demo unit in an Apple store isn't all that useful, and the benchmarks don't provide a real-life story. Anyone have an SSD they've used - at home, or office, in a real-life situation - yet?
    What're your impressions re: speed? Is there a noticeable boost over the standard HD unit? Does it seem MacBook zippy?
    Any feedback - good or bad - would really help!

    Think of SSD as a grown-up version of those flash memory sticks you slip into your Mac’s USB ports. Instead of storing data on spinning platters, as a standard hard drive does, SSDs store data in solid-state memory—either NAND flash memory or SDRAM. Increase that USB stick’s capacity and add an ATA or SATA interface, and you’ve got an SSD. SSDs seem like the perfect mass storage devices for a notebook. They have no moving parts, so they’re less susceptible to damage from the shocks and jolts of travel. SSDs can withstand 10 times as much impact as a standard hard drive. They also deal well with vibration. Then there’s an SSD’s parsimonious power consumption. Powered down, SSDs consume virtually no juice—somewhere around 0.05 watts. Even when operational, an SSD draws only 1w or so—about a third the consumption of a comparable hard drive. In terms of seek times and throughput, SSD performance is about equal to that of a standard hard drive. But SSDs turn on instantly: They don’t have to spin up platters as hard drives do, so they reduce computer boot, restart, and wake-up times substantially. In addition to being sturdier, more power efficient, and faster than standard hard drives, SSDs are also slightly lighter and can, if necessary, be molded into different form factors to fit tight spaces. The circular platters of a hard drive don’t allow for that kind of design flexibility.

  • Where can i find some real-life flex applications?

    Hi,
      i am trying to find some real-life flex applications.
      previously, there is a list of application in :http://flex.org/showcase/
      but, now (after site reconstruction?), the list is gone.
      anyone have that list of applications?
      or could you please give me some list of flex application??
      thank you.

    Hi all,
      thank you for your advices...
      actually, i am assigned a task to do a preliminary study about whether Flex is a good candidate for revamp my
    company's core application (about healthcare -- that serve many patients a year)..
      currently, the application is written in powerbuilder, which consist of the following functions (in simplest and in technical term):
    1. draw picture and show image (for diagnosis )
    2. create report dynamically and print report (PB datawindow)
    3. integrate with OS (mainly win32 dll / C library...etc) for third party equipment (e.g. thermo printer, credit card / debit card reader, medical
        equipments...etc)
    4. integrate with other systems (through HTTP, FTP or web service)
    5. barcode generation ....1D, 2D or even QR code..etc
    i have created a sample application, with flex builder 3, to evaluate:
    1.  draw picture and show image
         ==> simple line/ dot / polygon, is there any good and common library for drawing?
    2. create report dynamically and print report (PB datawindow)
        ==> use jasperreport (in server side) and jasrereport flash viewer (code modification required to add print and paging function)
                to show report and print report.... is there a good reporting solution for flex?
       ==> dynamic report generation seem difficult...need to build from scratch?
    3. integrate with OS (mainly win32 dll / C library...etc) for third party equipment (e.g. thermo printer, credit card / debit card reader...etc)
       ==> seems impossible with flex due to security issue. require activex or java applet and javascript with externalinterface..
    4. integrate with other system (through HTTP, FTP or web service)
       ==> HTTP OK (with seems no buildin HTTP basic authentication support, require to add header by code)
       ==> web service  OK (but no buildin ws-security X.509, SAML  supported, [user name token profile support by using 3rd library])
    5. barcode generation
       ==> not test
    i haven't test all other functionality yet.... but after playing flex for a while,
    i am not confident that i should go ahead with flex for the application revamp...
    it seems flex is strong in UI...but weak for other functionality...especially integration with other systems....
    anybody have some reference materials / opinion for me that can convince me to invest more effort about evaluation of flex?
    thank you.

  • What is step by step in real time project i.e. end-to-end life cycle?

    what is step by step in real time project i.e. end-to-end life cycle?

    Hi Vamsi,
    The below explanation gives you an idea of what is going to come after what in a software development.
    These below stages are know as Software Development Life Cycle/Waterfall Model.
    1. System/Information Engineering and Modeling
    As software is always of a large system (or business), work begins by establishing the requirements for all system elements and then allocating some subset of these requirements to software. This system view is essential when the software must interface with other elements such as hardware, people and other resources. System is the basic and very critical requirement for the existence of software in any entity. So if the system is not in place, the system should be engineered and put in place. In some cases, to extract the maximum output, the system should be re-engineered and spruced up. Once the ideal system is engineered or tuned, the development team studies the software requirement for the system.
    2. Software Requirement Analysis
    This process is also known as feasibility study. In this phase, the development team visits the customer and studies their system. They investigate the need for possible software automation in the given system. By the end of the feasibility study, the team furnishes a document that holds the different specific recommendations for the candidate system. It also includes the personnel assignments, costs, project schedule, target dates etc.... The requirement gathering process is intensified and focussed specially on software. To understand the nature of the program(s) to be built, the system engineer or "Analyst" must understand the information domain for the software, as well as required function, behavior, performance and interfacing. The essential purpose of this phase is to find the need and to define the problem that needs to be solved .
    3. System Analysis and Design
    In this phase, the software development process, the software's overall structure and its nuances are defined. In terms of the client/server technology, the number of tiers needed for the package architecture, the database design, the data structure design etc... are all defined in this phase. A software development model is thus created. Analysis and Design are very crucial in the whole development cycle. Any glitch in the design phase could be very expensive to solve in the later stage of the software development. Much care is taken during this phase. The logical system of the product is developed in this phase.
    4. Code Generation
    The design must be translated into a machine-readable form. The code generation step performs this task. If the design is performed in a detailed manner, code generation can be accomplished without much complication. Programming tools like compilers, interpreters, debuggers etc... are used to generate the code. Different high level programming languages like C, C++, Pascal, Java are used for coding. With respect to the type of application, the right programming language is chosen.
    5. Testing
    Once the code is generated, the software program testing begins. Different testing methodologies are available to unravel the bugs that were committed during the previous phases. Different testing tools and methodologies are already available. Some companies build their own testing tools that are tailor made for their own development operations.
    6. Maintenance
    The software will definitely undergo change once it is delivered to the customer. There can be many reasons for this change to occur. Change could happen because of some unexpected input values into the system. In addition, the changes in the system could directly affect the software operations. The software should be developed to accommodate changes that could happen during the post implementation period.
    Reward if helpful.
    Thankyou,
    Regards.

  • Anybody use Matrox DualHead2Go

    I'm thinking about getting a macbook pro for my work. I need a machine that will be able to drive three screens. A main control screen, and two projectors. And the whole setup needs to be fairly portable. So a macbook pro fits the bill if I can get two external screens connected to it.
    I'm wondering if anybody has ever used the Matrox DualHead2Go expansion module.
    The website states it works for mac, I'm just wondering if anybody has any real life experience with this unit. How it works, etc.
    I'm probably not going to be running anything bigger than VGA size, so the GPU should have the power.
    Thanks for any help.

    I'm using the Matrox DualHead2Go DP version / two 24" monitors / Mac Book Pro. Everything is working perfect except for mouse tracking issues when iTunes or QuickTime is running. See:
    http://discussions.apple.com/thread.jspa?threadID=2499192&start=0&tstart=0

  • How are Game Center "Friend Recommendations" people I know in real life? (Meetup/Facebook data?)

    This seems like a major privacy concern, but mainly I'm just very curious how this can possibly happen:
    The Game Center app suggests primarily people I have met in real life... but have had NO online interaction with!
    I life in a high-population US city, yet at least 2/3 of my Friend Recommendations (maybe more if they had photos or knew these peoples' last names) are people I have actually MET in person and know vaguely... but who I do now know well and who are NOT friends/contacts in any online service.
    I have never emailed them (with two exceptions); we don't even know each others' email addresses, and even if we did, my Apple ID email is not one I use for actual emailing purposes. Nor do we know each others' phone numbers, nor gaming nicknames; often not even last names. I didn't even know that they owned iOS devices or played games at all!
    We have certainly never played games with one another before; in fact, I have never used Game Center's friend feature and I don't have any GC friends. I only play random matches, and almost always on non-GC game services, for that matter.
    None of them has ever made a friend request to me. I've only ever gotten one GC request, long ago, and I denied it; it was not someone I knew.
    Some of them list "zero games in common" so it's not even that (and anyway, millions of people have games in common with me).
    Only one of them is in my Contacts (iOS/Mac address book), and knowing how serious they are about privacy, I doubt the email address I have is their AppleID. I know your address book can (for now) be accessed without permission, but these people just aren't listed.
    But I DO run into these recommendations in person every so often!
    These cannot be randomly selected by geography because a) they're not super close to me in miles, and b) there are millions of iOS users near me. No way that most of the suggestions would be people I've met, if this were chance alone. SOME source of data is being used by GC, and I'm baffled as to what it could be.
    The closest three theories I can come up with are all pretty implausible:
    1. Indirect Facebook connection. These people are NOT my Facebook friends (with a couple exceptions; I never actually use Facebook but I do have an account, and if someone requests, I generally accept). I double-checked that. But they MAY be "friends of friends" possibly. But how would Apple obtain my FB friend list? And if they did have it, wouldn't they just suggest my actual FB friends, not friends-of-friends? My Facebook login email address is an alumni address that I have never used for any other purpuse; it is not my Apple ID. And I have diligently set nearly every option to "hidden" on Facebook: even friends see a mostly blank profile!
    2. Meetup.com. This is a 100% correlation! I'm in several local groups that use Meetup.com to schedule meetings, and ALL of these Game Center recommendations are memebers of Meetup groups that I too am a member of. That's how I've met most of them. But Meetup has no "friends" feature, and most of these people have had no online connection with me (Meetup messages etc.) through Meetup. We've just attended the same events--which do have online RSVP lists--or else we are merely listed as members of the same group(s). (But we're talking large groups, so I haven't actually met most of the members, and I have met most of these GC recommendations.) But how would Apple obtain my Meetup info? Again my Meetup account's email address is not my Apple ID, and I have never used that email address with any Apple service (although it is on my Contacts card).
    3. Maybe Apple harvested my address book/contacts list (which does NOT contain these people), and also harvested the contacts lists of these people, AND also harvested the contacts lists of people we know in common who happen to have both of us listed. Then they put it all together. (That's a stretch: the people I know the best on Meetup--whose info I do have in Contacts--are Android users!) But again, why not recommend my actual contacts, instead of contacts-of-contacts? My actual contacts--which contain numerous iOS users and games--are notably absent from the recommendations (with one exception).
    Obivously Apple cannot, and does not, literally know who I have met. (No foil hat for me!) But they DO seem to have some data source that correlates closely with people I have met (and Meetup activity especially). I'm dying to know how that's possible.
    This is a privacy concern, for at least three reasons I can think of:
    1. GC lists these people's real names AND GC nicknames together--BEFORE I have accepted them as friends! And vice versa, I'm sure my nickname is being shown with my real name to total strangers. That means strangers, employers, stalkers, whoever, can now tie a person to their nickname (often the same one they use all over the Interner, not just GC). But we're not talking random suggestions: this is being show to people I DO know. Maybe I don't want them Googling my online nicknames! Maybe I complain about my work with that nickname Maybe I want my online friends and real-life acquaintainces kept separate. I definitely want EVERYTHING kept separate from these people I barely know but run into from time to time! One of these people is, in fact, on the sex offenders registry, and has stalked a friend of mine both online and offline. Maybe he'll learn my GC nickname--the same way it has shown me his--and can now Google that!
    2. If I have a lot of "games in common" listed, then they can peg me as a "gamer," which is sometimes a negative. Maybe I want my boss (or whoever) to think I'm more serious, even if he games too, and now he knows I have 30 games and wonders why I'm not staying late to work Maybe I just don't want to be roped into being "friends" online with my boss, or having to let him win games! Again, although this is a small issue at first glance, it's less small when things are being shared with people you really DO know in real life. What if my hypothetical stalker sees I have games in common? Sure, I can deny their friend request and cancel their 500 game attempts, but I'd rather be 100% hidden from them in the first place. I have no prior online contact, I want it to stay that way, and I've never given Apple permission, that I know of, to share my real name with people I never friended. (And even if I did, it should be with random strangers--not actual acquaintances.)
    3. The big mystery--how is Apple getting data that correlates with who I've met in the first place? I'm guessing that some people see the same pattern I do, and some don't; which might lead to an answer, but so far I'm stumped. (If this does tie to Meetup some bizarre way, that would be unnerving because Meetup ties me to real places and specific times.)
    Theories are welcome! And a basic question: what data sources DOES Game Center have available to use in making friend suggestions? I would have guessed maybe Location Services (nearby people) and people who have played a game with me (or made a friend request) in the past. But those sources are not what I'm seeing.
    (Even weirder is that nobody else seems to have posted about this happening; it may not happen to everyone, but surely some people have had this same question? I feel like I'm in a Kafka novel...)

    That's a good thought that could explain some cases, but not mine: these people definitely don't know my email address, and I'm not in their Address Book. (Some of these are people I might meet on a hike, say, and nod to in passing on other hikes once a or twice a year, and that's the extent of the "relationship"--no contact info ever exchanged. We don't even know what cities each other are from.)
    we don't even know each others' email addresses, and even if we did, my Apple ID email is not one I use for actual emailing purposes. Nor do we know each others' phone numbers, nor gaming nicknames; often not even last names.
    I should correct my first post: I said I "do now know well"... that should be "do NOT know well".

  • HP in Real Life - Tell us your story.

    Hi everyone,
    In support of the HP in Real Life program, I thought we would support it by not only talking about it, but also starting some stories here about how we use our HP products to make our life, and the lives of those around us, better. 
    Tell us how HP products help you tackle everyday tasks like keeping family connected across the country or around the globe, balancing work and play, or just planning life and events. 
    You can either share your experience here, or go over to the Real Life website to share your story in videos, pictures or words to show others what HP helps you accomplish. If your story is selected, you'll be featured on the HP in Real Life website! 
    What started as a thoughtful gift from a friend has quickly turned into the thriving hub of business for Rebecca, the owner and founder of Danette Kenneth Photography. Learn how she uses her Compaq Presario CQ50 Notebook PC to help run and promote her business.
    Andy and Irwin have been passionate about ham radio for years. Learn how they use the latest technology in their HP and Compaq laptops to establish connections, translate Morse code and log new contacts from around the world.
    Have a great week. See you on the Boards.
    GarenT
    HP Product Expert for the Officejet Pro X Series.
    Was your question answered? Mark it as an Accepted Solution!
    See a great post? Give it a Kudos!

    Hello,
    There are many posts on this site concerning issues such as this from your region. Many who have posted have reported that, when they escalated through their proper support channels, they have been told that the problem is network congestion. But, "blame" shifts back and forth between RIM and the local mobile service providers. Consequently, I recommend that all who are experiencing this problem contact their mobile service providers and open a formal support ticket on this issue. The more of those that get placed, the more likely they will actually do something about it.
    Good luck!
    Occam's Razor nearly always applies when troubleshooting technology issues!
    If anyone has been helpful to you, please show your appreciation by clicking the button inside of their post. Please click here and read, along with the threads to which it links, for helpful information to guide you as you proceed. I always recommend that you treat your BlackBerry like any other computing device, including using a regular backup schedule...click here for an article with instructions.
    Join our BBM Channels
    BSCF General Channel
    PIN: C0001B7B4   Display/Scan Bar Code
    Knowledge Base Updates
    PIN: C0005A9AA   Display/Scan Bar Code

  • How to view actual size as in real life at 100%?

    I am designing the user interface for an iPhone app using Adobe Illustrator CS4. The screen size of the iPhone 4 is 640x960px, which I have entered as the artboard size. The problem here is that at 100% zoom in Illustrator, I do not see the actual iPhone screen size as how it would look like in real life, rather I see it much larger (around x3 if not more). The resolution of the monitor I am working on is 1680x1050. Does this issue of getting the actual size of 640x960px have anything to do with my monitor resolution/size? How can I see the actual size of 640x960 on my monitor at 100% without resorting to manual methods such as placing a ruler on the monitor, etc.
    Please advise, I would greatly appreciate your help.

    I believe it actually calculates your screen resolution and then displays the the illustrated profile as actual size.

  • Real life SD Project - Gurus requested to give brief feedback

    Hi,
    Please read the real life SD - FICO scenario given below and if you think you have the solution, kindly state your suggestion. Would be much appreciated.
    ===================================================
    Engineering Services Orders  (Inter-company) 
    Process Steps  (As-is)
    1.Purchase Order is received in Co. A – via EDI,  from Co. B
    2.Sales Order (services) is automatically generated in Co. A. It has item 10 as hours and item 20 as travel expenses in $ amount
    Sales accounting creates ‘settlement rule’ and ‘internal order’ number and advises the engineers who will provide the services
    3.Later on, engineers report actual hours for services rendered, by using CATS system This merely reports data in SAP system but does not make an FI posting
    They use the order number advised to them in step 2 to create an internal order
    4 Actual travel expenses are added by Payroll  -  as a direct posting to FI
    5. Periodic CATS batch job is carried out by relevant IT person, to settle costs to an ‘internal order’ (not to sales order). These costs are labor hours and travel expenses
    6. FICO personnel then do transaction K08G to settle internal order --> sales order
    7. (Manual Step) Sales Accounting then runs report KVBI to view and select data related to service orders The data is downloaded to an Excel worksheet and handed over to SD-Billing.
    8. (Manual step) The cost data in dollar figures is converted to hours by SD-Billing, dividing cost data with rate / hour given in the sales order condition record
    9. SD-Billing creates invoice. Since it is order-related invoice, it has open quantities coming in from the order. These are now manually over-written / replaced with the actual data from step 7 & 8. An invoice is thus, generated for each order individually.
    Process (To-be)
    To create an interim document (billing request?) to replace manual steps 7 and 8. This interim document needs to capture actual cost data form the system –  and also show the remaining / open quantities from the sales order
    QUESTION: what is the best route to go?
    •  Configure a Billing Request document (by modifying a standard Credit Memo   Request / Debit Memo Request)  or
    • Going via the route of resource-related billing?

    Refer to the document: J48 - Project with Intercompany Billing
    Link: http://help.sap.com/bp_blv1500/BL_India/index.htm
    This is a very good document for guidance.
    Regards,
    Rajesh Banka

  • Digital signatures in real life

    Hi,
    I've been trying to grok the concept for a while, not without a modicum of success. Yet the big picture escapes me. I'm interested primarily in electronic document workflow as a substitute for classic paper document workflow. There must be software frameworks serving the concept, protocols of higher level than gpg, industry standards - something like that. Links and keywords are extremely welcome. It's hard to start googling effectively without a keyword or two.

    Maybe how citizenship smartcards work and are used in real life is of interest? Belgium eletronic identity cards and Portuguese citizenship cards support that.
    The involved standarts are something like pkcs11, pkcs10, etc. If you understand the way private and public assimetric keys work you will understand the process at high level. From there it's all details on how to actually sign something how to and where get and store the keys, etc.
    For example, the portuguese card has 2 pairs of private / public keys. One of them for authenticity purposes and the other pair for signing. It also contains the certificates that form the chain of trust and allow to verify the keys are still valid.
    Having a smartcard reader and obviously one of those cards you can just plug it in the laptop, create a document, like a pdf file or even a word file in the office and choose to sign it. Now for example if you sign a pdf file, the person that receives it can just open and it magically says if the signature is valid or not. It does this by magic also .
    Ok, not everything is magic. When you sign the document in the process yoru certificate file that contains your public key is attached to it, then when the document is opened it will check the cryptographic signature of the file. Aditional verifications will be done for example in adobe reader, like checking the signature timestamp with an online service and also checking the certificates chain of trust.
    But i'm kind sleppy and may be saying something stupid. Someone else can correct me and add more information
    Last edited by Diaz (2013-12-19 07:28:06)

  • Microsoft Course VS Exam VS Real life = Not even close relevant!

    Howdy folks,
    I'm writing this just after taking my exam, 70-410. (644, so fail)
    Seeing it is a fail and i'm not really new to the microsoft scene, i do company migrations etc and been doing it for years.
    For the exam, i've done the most things anyone would do:
    - Get the Microsoft book for the Exam and go thru it.
    - See what you are not so good at and repeat it and test it in labs.
    - Brush up on Powershell, did the virtual acadamy for the basics, jumpstart series.
    After my exam, fail.. what i noticed during the exam and annoys me to death:
    - Subnetting, hellow microsoft, if i want to be a great subnetter en supernetter i will take the CCNA of Cisco. In real life we get those info's from the network guys. If not google, subnetting tools etc, you'll find it, stop re-inventing the wheel..
    - What powershell Cmdlet would you use to do this.... the creator of powershell says: "Remember NOTHING we spend ages optimizing the Get-Help or Get-Command functions and building a whole friggn' ISE, because powershell is to big to memorize." i can't
    stress this enough, STOP this, give an ISE and let your students MAKE the Cmdlet.
    - Calculator in the exam, c'mon, not even an advanced calculator for subnetting.....???
    So Microsoft, i hope you will do something about this crap because, c'mon your books are basic, use trainsignal, pluralsight or cbtnuggets, virtual labs and in the end you hang the result of an exam on what powershell Cmdlet you would use???
    Kind regards,
    Someone who will think 3 times of the value of your certifications.

    It's a common complaint that the exams contain questions that are not "real life" or they are unfair, such as memorizing a PS cmdlet for doing a certain task when you'd normally just look it up or make your own.
    Agreed! However, you still need to pass this exam.
    Write down everything you can remember in the exam that gave you problems. Spend at least an hour doing this. Then study up and write notes on all those topics, then take it again within a couple weeks.
    It's a "brute force" method but it will help you answer those difficult (unfair?) questions and help you put this exam behind you.
    Microsoft knows their exams are hard and expects you to retake them when you fail. Even Microsoft employees fail exams and retake them. I've failed my share but thankfully there is no record of my failed exams available anywhere - just the exams I have passed.
    It bites, I know.
    Good luck.
    Best wishes, Davin Mickelson

  • Real life technical and business issues--FICO--implementation

    Hello,
    Can someone please give some real-life Technical and Business issues and problems faced by FICO consultant in different-different phases of implementation (asap)? please provide from basic to critical examples? 
    Thanks,
    Amit
    Moderator: Please, respect the rules of the forum

    What you are asking is very project specific.
    Try to do the following:
    1. Ask for the detailed business requirements
    2.  Ask for the design documents. Usually, there will be bunch of documents that got documented when the project team made the design. There must be documents like conceptual / high level design, detailed / low level design, ABAP specifications, report specifications, etc.
    3. The design documents will contian other things, DATA FLOW DIAGRAM. Here in this diagram, you will see where the data comes and how it gets processed and transformed when the data reaches BW.
    4. Ask for your access to the develoment system or the sandbox ( where you can play around without affecting anybody's work).
    5. With the data fliow, you keep reviewing the objects in BW and also in the source system.
    6. Even if you dont get access to dev or sandbox, you cans till view the objects in display mode.
    7. Open the query designer and see how the variables are defined and how formulas are defined and how the restricted key figures are defined.
    8. In production system, go to SM37 and see the jobs that are scheduled.
    9. Try and co ordinate weekly calls with your team members and this is the place where ideas  and problems will be shared.
    If you have specific questions ot need some specific help, dont hesitate to send me a note. My email is [email protected]
    Best luck,
    Ravi Thothadri

  • Like to see few real life usage of Binary Tree C#

    whenever we read something about BTree then this kind of program shown in article with code.
    code as follows.
    Main File
    static void Main(string[] args)
    //Creating the Nodes for the Tree
    Node<int> tree = new Node<int>('6');
    tree.Left = new Node<int>('2');
    tree.Right = new Node<int>('5');
    Console.WriteLine("Binary Tree Display");
    Console.WriteLine(tree.Data);
    Console.ReadLine();
    Node Class
    class Node<T> where T : IComparable
    private T data;
    public Node<T> Left, Right;
    public Node(T item)
    data = item;
    Left = null;
    Right = null;
    public T Data
    set { data = value; }
    get { return data; }
    in our daily program where we can use btree to store and retrieve data? so please all share your idea how you guys use btree in your program in real life application development. thanks

    "in our daily program where we can use btree to store and retrieve data?"
    Given that your example mentions IComparable I suppose you're talking specifically about binary search trees, not any binary tree. In that case it's unlikely that you'll see anyone using a binary tree directly. People use collections such as SortedDictionary and
    such collections are usually implemented using binary search trees.
    Note that btree isn't a good abbreviation for binary tree, there is such a data structure called B-Tree and it's not the same thing as binary tree. Incidentally B-Trees are also used for searching - databases use them for indexes and filesystems
    use them to store directory entries.
    @Joel Engineer: "Binary trees structures are built into the Net Library Hash Class"
    Binary trees and hash tables have nothing in common.

Maybe you are looking for

  • Problem in transporting Transformations

    Hi, We are transporting transformations to our production system (BW Patch 15) for the first time after the 7.0 upgrade. We are seeing the following error message in the transports. Start of the after-import method RS_TRFN_AFTER_IMPORT for object typ

  • How big can a word document be before Pages (iPad1) crashes?

    I have an iPad1 and was thinking of using it for some quick edits. Since my MacBook struggles a bit with some of my larger word documents, I wondered how the iPad would fare. I don't want to waste the $10 on Pages if it isn't going to work for me. My

  • Session State Replication of Referenced Objects

    Here is question on Clustering and Session state replication:           Scenario:           Consider two Session Objects A and B.           Object A has-a reference to object B.           So whatever changes done to Object B is reflected in Object A.

  • Where can I download a previous version of Firefox?

    I need an older version of Firefox. The new version does not support an add on that I need for everyday use. I need RoboForm Toolbar in Firefox. Firefox Version is 31.0 RoboForm Version is 7.9.8.5 This worked fine in previous versions. I tried to loc

  • Truncate Tables in OWB_RRO

    Hi, I am using OWB 10.1 My table space of OWB_RRO schema is full.So the processes are failing. Space for me is a constraint. Do we have any procedure to truncate these audit tables in Runtime Repository Schema. thanks