Backup setting for ECC 6.0 on DB2 and Windows

Hi Expert
Please send step for Online and offlice disk backup for ECC 6.0 on DB2

Hi,
Please check this
[Backup|http://www.sdn.sap.com/irj/sdn/db6;jsessionid=%28J2EE3417800%29ID0376369650DB12213101997818761989End?rid=/library/uuid/80e61772-e471-2c10-60b1-9529b69b50c5]
[http://publib.boulder.ibm.com/infocenter/db2luw/v9r7/index.jsp?topic=/com.ibm.db2.luw.admin.cmd.doc/doc/r0001933.html]
Regards,
Muralidhar

Similar Messages

  • Backup profile for Ecc 6.0

    Hi,
    How to take backup profile for Ecc 6.0 as i'm using Oracle Database 10g and windows server 2003 as my OS.
    Kindly help me out.
    Thnx in advance.
    Regards
    Promod

    Hi,
    See this thread's - Re: Steps to do System restore Ecc 6.0
                                  Backup Problem
    Regards,
    Sen

  • Do I still need to use the old mobile me backup system for backing up a mac desktop and if I delete it will it affect the memory of my system which has now Maverics

    Do I still need to use the old mobile me backup system for backing up all my data and having it able to get at in case of a crash, or can the icloud reset everything? Because I can not find any structured refrence, as to how it would be done. I am updated to Maverics. Also does the icloud continue if I uninstall the backup to free up space?

    MobileMe was discontinued in 2012 and all the data stored on it was deleted, and iCloud can't make backups of Macs.
    What I recommend you to make backups is to get an external drive and use Time Machine or an application like Carbon Copy Cloner. With this, you can access to your data everywhere and safely, and then, if you want, use a cloud storage service like CrashPlan. You can keep on using iCloud without backups

  • In imovie 11, with an iMac, latest Mountain Lion, sometimes I insert a still and when I playback, the previous image freezes the last frame and holds during the duration I set for the still, skips both transitions, and jumps to the next clip. why?

    in imovie 11, with an iMac, latest Mountain Lion, sometimes I insert a still and when I playback, the previous image freezes the last frame and holds during the duration I set for the still, skips both transitions, and jumps to the next clip. why?

    in imovie 11, with an iMac, latest Mountain Lion, sometimes I insert a still and when I playback, the previous image freezes the last frame and holds during the duration I set for the still, skips both transitions, and jumps to the next clip. why?

  • External HDD formatting for use in Mac OS X and Windows

    I've been gifted with WD (My Passport) 1TB External HDD. On the box it says it requires reformatting for use in Mac OS X.
    I used the earlier discussions. I couldn't decipher the steps details as it was mostly by level 4 above.
    Can any honourable member advice me on how to reformat my new external HDD for use in Mac OS X and Windows (As in office and during meetings I might haveto use wwindows system)
    Also if done with formatting will this be allowing to setup Time Machine back ups.
    Please be sure that I want to use time machine exclusively for backup, some earlier discussions mention that TM can also be used for OS booting etc.,
    I would be greatful to all who will help me in these regard

    Normally the drives are formated as exFAT which could be used by both a Mac and a PC out of the box.  Connect the drive to your computer it should be able to read it.  If not then the system will ask you if you want o erase the hard drive.  Select yes, it will format the drive for use with a Mac only.  This is the required format to use it as a Time Machine backup.  As stated in our post you would like to use this hard drive on both Windows and Mac, you should reformat the hard drive as exFAT in disk utility. 

  • I have a 2008 macbook that I originally set up as a dual platform (mac and windows).  I don't use the pc side.  Can I reconfigure?

    I have a 2008 macbook that I originally set up as a dual platform (mac and windows).  I don't use the pc side.  Can I reconfigure it? If so, how?

    Hi Niel,
    I tried but I get this message: I am trying to remove it not install it.  I don't think I have the installer disc anymore. What now?

  • Backup of solution manger system on DB2 and windows.

    Hello Gurus,
    I am new to this DB2 database. I have newly installed the Solution Manager 7.0 on windows 64 bit EE and DB2 V9.5 UDB. I am not able to take full backup by choosing the action 'Database Backup to Device'. I am also confused for what value to be entered for Number of Buffers,Buffer Size,Parallelism,Priority in Action details. I am getting the following error in Action log tab.
    Message
    Job started
    Step 001 started (program RSDBAJOB, variant &0000000000000, user ID BASIS)
    Backup_Dev:Database Backup to Device
    Backup_Dev:started by CL_DB6_JOB_BACKUP_DEVICE       on server SOLMAN
    Backup_Dev:Parameter TESTMODE has not been set
    Backup_Dev:Parameter PARALLELISM has been set to " 0"
    Backup_Dev:Parameter RUNTIME has not been set
    Backup_Dev:Parameter BACKUP_MODE has been set to "ONLINE"
    Backup_Dev:Parameter PARTITION has not been set
    Backup_Dev:Parameter BACKUP_TYPE has been set to ""
    Backup_Dev:Parameter COMPRESS has been set to "COMPRESS"
    Backup_Dev:Parameter INCLUDE LOGS has been set to "INCLUDE LOGS"
    Backup_Dev:Parameter NUMBER_BUFFERS has been set to " 0"
    Backup_Dev:Parameter BUFFER_SIZE has been set to " 0"
    Backup_Dev:Parameter PARALLELISM has been set to " 0"
    Backup_Dev:Parameter UTIL_IMPACT_PRIORITY has not been set
    Backup_Dev:Parameter FILE_PATH has been set to "H:\BKUP_251108"
    Backup_Dev:Command '   'failed
    Exception CX_DB6_CON in program CL_DB6_JOB_BACKUP=============CP / CL_DB6_JOB_BACKUP=============CM002 at line ADBC error with return code = 1.208
    Backup_Dev:Exception CX_DBA_JOB in class CL_DB6_JOB_BACKUP
    Backup_Dev:  Kernel Error ID:
    Backup_Dev:SYSID:
    Backup_Dev:  SY-SUBRC: 1208
    Backup_Dev:  SY-TABIX: 0
    Backup_Dev:  Message: ADBC error
    Backup_Dev:  Database:
    Backup_Dev:caused by
    Backup_Dev:Exception CX_DB6_ADMINCMD in class CL_DB6_ADMIN_CMD method EXECUTE_CM
    Backup_Dev:  D line 43
    Backup_Dev:  Kernel Error ID:
    Backup_Dev:  SYSID: SMS
    Backup_Dev:  SY-SUBRC: 1208
    Backup_Dev:  Message: ADBC error
    Backup_Dev:  Command: BACKUP DATABASE SMS ONLINE TO"H:\BKUP_251108" COMPRESS INCL
    Backup_Dev:UDE LOGS
    Backup_Dev:  Database:
    Backup_Dev:caused by
    Backup_Dev:Exception CX_SQL_EXCEPTION in class CL_SQL_STATEMENT
    Backup_Dev:  Kernel Error ID:
    Backup_Dev:  DB Error: Yes
    Backup_Dev:  SQL Code: 2413-
    Backup_Dev:  SQL Message: SQL2413N Online backup is not allowed because the dat
    Backup_Dev:  abase is not recoverable or a backup pending condition is in effect ro
    Backup_Dev:w=1
    Backup_Dev:  DB Object Exists: No
    Backup_Dev:  Duplicated Key: No
    Backup_Dev:  Internal Error: 1
    Backup_Dev:  Invalid Cursor: No
    Backup_Dev:  Unknown Connection: No
    Backup_Dev:  Connection Closed: No
    Exception CX_DBA_JOB in class CL_DB6_JOB_BACKUP method  line 40
    Backup_Dev:terminated with error
    REASON=ADBC error
    Job finished
    Please suggest me what to to resolve this problem. Is there I need to set the perticular db parameters settings by changing default one. Also please tell me any special post installation activity required for DB2 database after installation unlike Oracle or SQL server.
    Please Reply.

    Backup_Dev:  SQL Message: SQL2413N Online backup is not allowed because the dat
    Backup_Dev:  abase is not recoverable or a backup pending condition is in effect ro
    You are cyclically overwriting your log - that´s why you can´t do an online backup. To change that, you have to configure logging properly and then do an offline backup first. After that you can do online backups (also see https://publib.boulder.ibm.com/infocenter/db2luw/v9r5/index.jsp?topic=/com.ibm.db2.luw.messages.sql.doc/doc/msql02413n.html)
    To get an idea what you need to do configure check the guide
    https://www.sdn.sap.com/irj/sdn/db6
    --> Database Administration Guide "SAP on IBM DB2 for Linux, UNIX, and Windows
    Markus

  • Does Revel have a backup retention for deleted files in the cloud and what is the encryption level it uses both end-to-end and locally?

    I'm interested in the premium version of this service however I'd like to know if:
    1. Revel has any kind of cloud backup feature for accidentally deleted files.
    2. What encryption strength does it use for it's end-to-end transfers and also for the local app and cloud storage
    3. Does it have 2 stage authentication?
    I ask because I need something picture friendly but is also HIPAA and SEC compliant.
    thanks!

    Hi nick2048,
    We take security and privacy very seriously and send all communication over encrypted channels.
    However, as a consumer photo site that supports user sharing, it is not our goal to achieve HIPAA certification
    Hope this helps!
    Glenyse

  • Network Backup HD for Mac OS 10.3.9 and 9.2.2

    Hi,
    I'm going to be putting a 320 GB PATA Hitachi 320 GB HD into a Firewire enclosure
    for Backing up my 10.3.9 HD with Data Backup scheduling. I also have a G3 B&W with Mac OS 9.2.2 and Dantz retrospect express to use for Backup too.
    Is there a way to have this Firewire drive used for Network Backups for the 2 Macs with different scheduled backups, partitions, etc..?
    The FireWire drive enclosure only has two firewire ports, but I also have the eMac and the G3 hooked up to a router and cable modem. I only have one Firewire
    cable currently. The Network way would seem the best option though. (less cables)
    Thank you for any helps!
    Michael
    Message was edited by: Learning+

    Hi John,
    Thank you for your reply!
    Can I replace my FireWire drive enclosure for a NAS enclosure? Where and how do you hook these NAS drives up?
    I'm thinking I'll just have to manually attach the FireWire cable and mount the drive for backups (for the G3) It doesn't get used as much anyway. The first partition will be 130 GB for OS 9 and the rest will be for OS X. I'll just have to do it that way. Unless I can use Dantz over the Network, but that would still be the manual way of doing this. And more work. The G3 isn't on all the time anyway.
    It doesn't seem to be a problem to do it this way. But, I'll need to be mindful of my incremental schedule for OS X when I backup OS 9.
    Oh well..
    Thank you!
    Michael

  • Is there a way to set an auto sync feature to icloud and windows contacts without using outlook or Windows live messenger just straight to windows contacts?

    Need to sync icloud contacts to windows contacts without using outlook or windows live messenger on my pc, i have itunes and icloud fully set up on my pc and i have an ipad2. itunes setting for syncing to windows contacts is not working, nor will it sync to my gmail. I tried to get icloud to sync to my gmail, and thought that i could then sync my gmail to windows contacts, but icloud isn't syncing to gmail either. I configured it correctly, (or at least tried). I was able to copy the csv and all that, and do it manualy, but would like it to sync automatically. Please help.
    using itunes new version (9/30/2012), on my windows 7 pc. My ipad2 is running ios 6.

    No, you need Outlook.

  • What antivirus is better for those who work with mac and windows?

    In my home I use an iMac, but in college I use Windows, and more than once I found an infected file. I know not affect iMac, but I prefer that viruses are removed. Right now I use ClamXv, but I don't know if it is effective.
    Am I to continue using ClamXv? or, do I use another?
    If there are others better AV for mac, what is most recommended?
    **I have also used Sophos, but it makes the iMac go very slow.
    Thanks for your attention.

    1. This is a comment on what you should and should not do to protect yourself from malicious software ("malware") that circulates on the Internet. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to your computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
       3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandboxing security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know what is safe?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one, is unsafe.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders," for example, are outside the safe harbor, though not all are malware.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe. For instance, if a web page warns you that Flash is out of date, do not follow an offered link to an update. Go to the Adobe website to download it, if you need it at all.
    There is an increasing tendency for rogue websites such as "Softonic" and "CNET Download" to distribute free applications that have been packaged in a superfluous installer that also installs malware or something else that you don't want. Never visit those sites, and get all freeware directly from the developer's own site whenever possible.
    Software attached to email that you didn't request is unsafe, even if it comes (or seems to come) from someone you trust.
    Software advertised by means of spam is unsafe.
    Unknown "free" software that a stranger on the Internet is eager for you to download is unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    "FREE WI-FI !!!" networks in public places are unsafe unless you can verify that the network is not a trap (which you probably can't.) Even then, do not download any software or transmit any private information while connected to such a network, regardless of where it seems to come from or go to.
    I don't say that leaving the safe harbor just once will inevitably result in disaster, but making a habit of it will weaken your defenses against malware attack. Doing any of the things alluded to above should make you uncomfortable.
       6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. New threats are emerging on a daily basis. Research has shown that most successful attacks are "zero-day" — that is, previously unknown. Recognition-based malware scanners do not defend against such attacks.
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware, and even for that use it's not completely effective. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular trojan it is, but do you really care? In practice, there's seldom a reason to use the software unless an institutional policy requires it. Windows malware is so widespread that you should assume it's in every unknown email attachment until proven otherwise.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither should you assume that you will always be safe from exploitation, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. "Hmmmm, this torrent is a crack of that new game I want. I think I'll download it. It could be a trojan, but the antivirus will warn me if it is." Then they wonder why their Mac is so slow all of a sudden. It's slow because it's running flat out mining bitcoins for a hacker who has already sold their credit card number and banking passwords to a criminal gang. Maybe a week later the antivirus does warn them, but what good does that do?
    Nothing can lessen the need for safe computing practices.

  • SAP Conversion Agent for PI 7.1 EHP 1 and Windows 2008 Support

    Hello
    I have read that some people were able to run SAP Conversion Agent on a PI 7.1 EHP1 Installation on Windows 2008 Sever. But in the Product Availability Matrix there is no support for 2008 yet.
    In the SAP Library (http://help.sap.com/saphelp_nwpi71/helpdata/en/43/fc39c16bfb025ee10000000a1553f7/frameset.htm) under the release notes for SAP Conversion Agent there is still version 8.5, but when I install the actual Support Package I have Conversion Agent 8.6 running and according to information on the informatica.com site this version is running under 2008!
    Has anybody clear and actual information about which OS the newest SAP Conversion Agent for PI 7.1 EHP1 supports? Or has anyone experiance on Conversion Agent and Windows 2008 Server?
    Thanks
    Christoph

    Hi Mark
    Thanks for your reply! Fact is that in the actual Package (SP06) the version of Conversion Agent Engine supplied is not 8.5.5 as in the SAP Note mentioned, it is version 8.6.0:
    C:\Documents and Settings\pi1adm>CM_console -v
    Engine-Version: 8.6.0(Build:30)
    Engine-Syntaxversion:4.00.10
    I will oben a ticket for that ...
    Regards
    Christoph

  • Converter for video that works on Mac and Windows

    Which converter is best to use for Mac and Windows?

    Here I recommend a powerful yet easy to use 6 in 1 Video Converter Ultimate – The Combination of Video Converter, Youtube Downloader, Video Editor, Video Player, DVD Ripper & DVD Creator.
    You can use it to: Download Youtube & Other Online Videos With One Click; Convert Video & Audio to Any Format You Want; Edit Videos With Built-in Advanced Video Editor; The Ultimate DVD Toolkit; Transfer Video Without USB Cable

  • SAP Landscape for ECC,EP,BW,XI, DMS and TREX

    Hi all,
    I am in the role of SAP Basis Consultant for an IT organisation. One of their client require to install SAP ECC ( FI-CO,MM,PS,HR,REM,PM), EP, BW, XI, DMS and TREX. Their plan is to use ECC 6.0 ( Netweaver 7.0 SR2) with EP 7.0 and all others are latest version. The Dev setup in WIndows-Oracle and production will be AIX-Oralce. In the Dev setup, install all the components in separate servers and in production it is to be combined as follows ERP+ SRM(later) in one server, EPXI in another server, BW in one server and DMSTREX in last one.
    Here my doubt is, this installation plan will have any issue?.
    Second, the data export from DEV ( windowsoracle) Production ( unix-AIXoracle) will have any issue?
    Please reply with details. As the project is in the planning phase.
    regards,
    Siby Syriac.P

    Hi Siby,
    If your client need such a broad installation (SAP ECC ( FI-CO,MM,PS,HR,REM,PM), EP, BW, XI, DMS and TREX), I'm sure that they hired a Senior Project Manager together with a team of senior consultants in each of the areas to look after the implementation. Also i presume they have look into hardware requirements to ensure the landscape will deliver the adecuate performance to the target amount of concurrent users.
    As far as i can see from the 10 lines you wrote, I can't see a QA environment been considered... which I think is a mistake (thats only my own opinion). I can't see any issues having DEV runnning Windows and PRD running AIX (As long that youre confortable working in both environments). About the installation plan is very difficult to tell by your 10 lines but I'll try avoid having two big systems in the same box as ECC and SRM.
    Thats my 2 cents
    Regards
    Juan

  • Partitioning Hard Drive for Use with Mac (Time Machine) and Windows

    I have a brand new Imac on which I am also running WIndows Vista through Boot Camp (sweet, by the way). I have a large external hard drive on which I set up Time Machine easily enough. I would like to partition the drive somehow so that I could use half the drive to separately back up files on the WIndows side, but I can't seem to do this. Any suggestions? Is this even possible with Time Machine?

    You can use Disk Utility create two partitions. Choose FAT for the Windows partition and Mac Extended (Journaled) for the Mac. One limitation of FAT32 is that you can't write files bigger than 4GB. You can reformat this partition as NTFS within Vista which will allow bigger file sizes but you won't be able to write to this partition from within OS X without other utilities. Also you can't write to the OS X partition from Vista without other software.
    Time Machine will not be able to back up the windows formatted drive partition.

Maybe you are looking for