Best Practice to implement Reporting Exits

Hello,
I want to know the best practice to implementing reporting exits.
We have a case statement there and i_vnam.
THen we write like
WHen i_vnam
Code for filling the variable values.
The above method has a drawback that if one person is changing the program another person cannot at the same time and if one person transports it all the other changes are also transported. So if there is some code which is not ready to be used even it will be transported.
Another option is if we creae an include for each variable eg. ZBW_'variable name'...
And then for each variable we just have to transport the include and not the entire exit...
Do you see any drawbacks in this method or is there any other better way?

Hi,
You can create your program in SE38 for your own variable & call ZXRSRU01 program in it & pass the value to a variable which will in turn pass to to variable for CASE ivnam = "".
in this way the ZXRSRU01 will become accessible & can be called in any program.
But it will impact all the variables.
Its a good practice so that ZXRSRU01 is not impacted after that.
Hope it helps.
Thanks,
Rashmi.

Similar Messages

  • Best practice to implement different Xcelsius dashboard for different users

    I'm implementing an Xcelsius dashboard that requires to show each individual user with different content (e.g. When a user logins in, the dashboard shows her name and job title, her performance and her subordinate's performance).  I'm just wondering what's the best practice to implement scenario like this?  Thanks.

    Hi Thomas
    What you are looking at is "Row Level Security" within BusinessObjects and the options you have are determined by what type of data you are reporting off of (relational data, OLAP data, BW data, etc.)
    For instance, if you are using relational data with a Universe you could setup a database table with the BusinessObjects username to correspond with their e-mail address or other unique identifier. From there, you could add security to your universe using the @variable('BOUSER')
    That way, any objects created off of the universe (whether it is a Crystal Report, Web Intelligence, BI Web Service, QaaWS, LiveOffice, etc.) will filter the data based on this security model. So any Xcelsius dashboard based on this underlying data will also be filtered.
    And that is just one of the options you have, depending on your data source.

  • Best Practice to implement Business Packages

    Hello All,
    Need some clarification -
    What is the best practice to implement ESS/MSS Business Package onto Portal -
    (1) Should I just import and configure the content     OR
    (2) Should I import, create a copy and then configure it? If yes, are there any points to be kept in mind?
    All blogs/articles that have been published show to configure the standard content.
    The requirement is to maintain a different prefix/namespace for each Portal content that comes along the business package?
    Thanks,
    Ritu

    Hi Paul,
    I also build my own roles. The only time I might use the standard roles is for demo purposes early in a project.  You will find that in some cases the business packages like MSS don't always even include standard roles, so you have no choice but to build.
    I never change any of the standard iViews/Pages/Worksets - ever.
    The most contentious issue seems to be whether to do a full or delta link copy of the standard objects.  I tend to initially do a full copy of the objects into a custom folder set in the PCD and modify those. Then I only use delta links from Page to iViews where I need the option of setting different properties for the same iView if it appears in multiple pages.  Delta links can be a bit flakey at times, so I tend to only use them where I have to.  I suspect that I may get to a point where I don't use them at all.
    Just my 2 cents worth....
    Regards,
    John

  • Best practice for implementing Manufacturing Cost Planning ( MCP)

    is there any best practice for implementing Manufacturing Cost Planning ( MCP) using BI-IP?

    Hi:
            Both options are viable. If you reverse posting in FB50 then FI GL account postings will also be reversed and along with cost center postings. Hence here advantage is that cost center reversal will be with referenced to the original document with which wrong posting were made. Disadvantage here is that you will to post the entry again in FB50 . In KB11N you will simply transfer cost center amount from wrong to new one that should be in place of it but here you will have no reference . I personally think reversing posting through FB50 is viable options , reverse postings can be seen in KSB1 as well against that cost center.
    Regards

  • What are the best practices for audit report for SharePoint 2013 farm ?

    Hello,
    I am looking for the best practices for audit reporting in SharePoint 2013 farm.Can anyone please provide me checklist/tools/guidelines on same ?
    your help will be much appreciated.
    Thanks and Regards,
    Dipti Chhatrapati

    This is quite open ended question. A sharepoint farm should be well maintained as per :
    1. Microsoft's recommendations on : Topology, Hardware and Software requirements, Operational procedures and most important Capacity guidelines:
    http://technet.microsoft.com/en-us/library/ff758645(v=office.15).aspx
    http://technet.microsoft.com/en-us/library/cc262787(v=office.15).aspx
    2. Organisation's IT policies and procedures : Farm Configuration, Workload and monitoring
    http://technet.microsoft.com/en-us/library/ff758658(v=office.15).aspx
    http://technet.microsoft.com/en-us/library/ee748651(v=office.15).aspx
    3. Industry best practices
    I would suggest to start thinking over these lines and create a plan for your Sharepoint farm.
    You can then create powershell scripts to run these reports at certain frequency to find the changes, any deviation from the standard and health of the entire farm.
    Hope this helps!!
    I LOVE MS..... Thanks and Regards, Kshitiz (Posting is provided "AS IS" with no warranties, and confers no rights.)

  • Best practice for implementing a scalable ecommerce solution

    Hi,
    I'm new to SAP Business One, is there a white paper on the best practice of implementing a scalable ecommerce solution with SAP Business One using IIS/ASP.NET? What licensing and software(version)is need to implement a scalable ecommerce solution. How to integrate with trade partners via BizTalk server? Any help on these topics would be most helpful. Thanks in advance.
    Best Regards,
    Viet

    There already is a very robust ecommerce package certified by SAP that runs on ASP.Net and integrates into Business One. It is called NetPoint Commerce and it is made by Praxis Software Solutions. http://www.praxissoft.net you can see a working B2C site of it at http://www.yakpak.com and it also has robust B2B functionality you can email [email protected] for a demo. The cost is only a little more than it would cost to cover all appropiate licenses with SAP (included in the NetPoint cost) plus it works with SBO 6.5 and SBO 2004 and the DI Server is only available with SBO 2004

  • Best practices in implementation of MDM

    Hi ALL,
    What are the best practices for implementation of MDM?
    Regards,
    Pramod

    Dear Pramod,
    Pls go throught those links.
    My Best are
    1.       Step by Step approach
    2.       Data Governance
    [Top 10 CDI-MDM Best Practices|http://www.dmreview.com/specialreports/20061019/1064839-1.html]
    [Seven master data management best practices|http://searchsap.techtarget.com/news/article/0,289142,sid21_gci1219185_tax305408,00.html]
    [Technical Best Practices for Master Data Management|http://www.tdwi.org/publications/display.aspx?id=8148]
    Hope this helps,
    + An

  • Graphical display of best practice for implementing SAP NetWeaver

    Hi,
    in a presentation I need to show best practice to implement SAP NetWeaver is evaluating required KPIs, characteristics and so on and subsequently verifying the Business Content functionality and objects against these requirements.
    Can anybody provide a presentation or PDF document in which this process is displayed graphically? I am looking for a significant picture / diagram ...
    Any document or link to public SAP material which demonstrates the described process would be highly appreciated.
    [email protected]
    Best regards,
    Björn

    Hi,
    https://www.sdn.sap.com/irj/sdn/developerareas/bi?rid=/webcontent/uuid/e78a5148-0701-0010-7da9-a6c721c6112e [original link is broken]
    Regards,
    San!

  • Best Practices for KM Reports

    Hi all,
    Does anybody have some tip about the best practices to delivery reports for KM activities? Ex.: Users that access the a file, what's the file that a user has accessed and so. I'll need to define input criterias for it. Its better read the statistics file and publish reports with a Web Dynpro application, or use KM Reporting API and publish reports like https://www.sdn.sap.com/irj/servlet/prt/portal/prtroot/docs/library/uuid/7d28a67b-0c01-0010-8d9a-d7e6811377c0?
    Have some facilities to generate graphs from KM info?
    Best regards

    Hi Isaias,
    Have you read this blog: "How to use the Activity Data Collector" ?
    The ADC provides data on portal requests and stores them to flat files in a filesystem.
    The collected data can include items such as:
    u2022      Requested iView
    u2022      Processing time
    u2022      Browser type
    u2022      Requested headers
    u2022      etc.
    The collector creates a set of files that contain a line for each request. You can take these files to create reports about portal activity using Business Intelligence, Microsoft Excel or other analytics tools.
    For KM data collection:
    For example you can specify which KM operations should be monitored. Also you can define a positive or negative RID list. If you mark the checkbox u201CPositive Listu201D only the comma-separated RIDs listed in u201CRID Listu201D are monitored, if you donu2019t mark the checkbox and enter RIDs in u201CRID Listu201D these RIDs are not monitored (negative list). Details of the property description can be found here. 
    For more information you can read:
    http://help.sap.com/saphelp_nw70/helpdata/EN/46/e42c3ed63369b5e10000000a114a6b/frameset.htm
    Regards,
    Patricio.

  • Best Practices for Implementing Cryptographic VPN

    With Marcin Latosiewicz
    Welcome to the Cisco Support Community Ask the Expert conversation.  This  is an opportunity to learn and ask questions about implementing cryptographic VPN and how to prepare it for the future with expert Marcin Latosiewicz. 
    Marcin will share his best practices for implementing cryptographic VPN as well as advise those customers who are looking to build a new or update their existing setups how to maximize their potential.  Additionally, Marcin will provide insight into which technologies could be applicable for new deployments and exciting new technologies that will be available in the next few months. 
    Marcin Latosiewicz is a customer support engineer at the Cisco®  Technical Assistance Center in Belgium, with more than 6 years of  experience with Cisco Security products and technologies including  IPsec, VPN, internetworking appliances, network and system security,  Internet services, and  Cisco networking equipment. Prior to joining Cisco, he operated, administered, and ran UNIX and Microsoft networks for 14 years. Latosiewicz holds bachelors and masters degrees in engineering from Warsaw University of Technology. He also holds CCIE® certification in Security (No. 25784) and CCDP® certification.
    Remember to use the rating system to let Marcin know if you've received an adequate response. 
    Because of the volume expected during this event, Marcin might not be able to answer every question. Remember that you can continue the conversation in the Security community, subcommunity, VPN, shortly after the event. This event lasts through September 20, 2013. Visit this forum often to view responses to your questions and those of other Cisco Support Community members.

    Jouni,
    Good question. And answer is complex, there is in depth and there is in depth.
    Most people would be satisfied by reading a summary of all the different components - encryption, hashing, signing, PKI, how IPsec and SSL/TLS work. This group also counts most of security CCIEs.
    To this extent CCIE Security Study Guide (by Henry Benjamin) was a good read, if a bit outdated today.
    Most people who are in depth will look first into specification.
    RFC 4301 (IPsec architecture)
    RFC 2246 (TLS 1.0)
    Are a good start and contain references to other documents worth reading.
    This is where the good folks will base their knowledge of off.
    The really in depth people will look into the math behind it and will conquer topics like
    Elliptic Curve Crypto ( http://en.wikipedia.org/wiki/Elliptic_curve_cryptography ) and difference between CCM, GCM and CCB, to which you have really good materials published by universities.
    There are relatively a few who know this.
    To start with I can suggest:
    - http://www.cl.cam.ac.uk/~rja14/book.html (Ross' Anderson book is free, informative and suprisngly entertaining, this is a definitely a must-read for security/VPN).
    - Have a look at books recommended by Richard Bejtlich or Bruce Scheiner - while they might not be VPN specific it's a good security read most of the time.
    I'll have a look at the books at home see which one can be interesting to read, and edit this post.
    M.

  • Best Practice to implement row restriction level

    Hi guys,
    We need to implement a security row filter scenario in our reporting system. Following several recommendations already posted in the forum we have created a security table with the following columns
    userName  Object Id
    U1             A
    U2             B
    where our fact table is something like that
    Object Id    Fact A
    A                23
    B                4
    Additionally we have created row restriction on the universe based on the following where clause:
    UserName = @Variable('BOUSER')
    If the report only contains objects based on Fact table the restriction is never applied. This has sense as docs specify that the row restrictions are only applied if the table is actually invoked in the SQL statement (SELECT statment is supposed).
    Question is the following: Which is the best practice recommended in this situation. Create a dummy column in the security table, map into it into the universe and include the object in the query?
    Thanks
    Edited by: Alfons Gonzalez on Mar 8, 2012 5:33 PM

    Hi,
    This solution also seemed to be the most suitable for us. Problem that we have discover: when the restriction set is not applied for a given user (the advantage of using restriction set is the fact that is not always applied) the query joins the fact table with the security table withou applying any where clause based on @variable('USER'). This is not a problem if the secuity table contains a 1:1 relationship betwwen users and secured objects , but (as in our case) relathion ship is 1:n query provide "additional wrong rows".
    By the moment we have discarded the use of the restriction sets. The effect of putting a dummy column based on the security table may have undesired effects when the condition is not applied.
    I don't know if anyone has found how to workaround this matter.
    Alfons

  • JSP Best Practices and Oracle Report

    Hello,
    I am writing an application that obtains information from the user using a JSP/HTML form and then submitted to a database, the JSP page is setup using JSP Best Practices in which the SQL statments, database connectivity information, and most of the Java source code in a java bean/java class. I want to use Oracle Reports to call this bean, and generate a JSP page displaying the information the user requested from the database. Would you please offer me guidance for setting this up.
    Thank you,
    Michelle

    JSP Best Practices.
    More JSP Best Practices
    But the most important Best Practice has already been given in this thread: use JSP pages for presentation only.

  • Best practice in implementation of SEM-CPM

    Is someone have  the experiance of implementing SEM-CPM using best practice. and if so, does it reduces implementation time?

    We should be able to adopt the best pratices when the software finally gets integrated into netweaver.
    Ravi Thothadri

  • The best practice for creating reports and dashboard

    Hello guys
    I am trying to put together a list of best practice on how to create reports and dashboards using OBIEE presentation service. I know a lot of those dos and donts are just corporate words that don't apply consistantly in real world environment, but still I'd like to know if Oracle has any officially defined best practice or not.
    the only best practice I can think of when it comes to building reports and dashboards is:
    Each subject area should contain only one star schema that holds data for a specific business information
    Is there anything else?
    Please advice
    Thanks

    Read this book to understand what a Dashboard is, what it should do and look like to be used by the end users. Very enlightentning.
    Information Dashboard Design: The Effective Visual Communication of Data by Stephen Few (There are a couple of other books by Stephen and although I haven't read them yet, I anticipate them to be equally helpful.
    This book was also helpful to me:
    http://www.amazon.com/Performance-Dashboards-Measuring-Monitoring-Managing/dp/0471724173
    I also found this book helpful in Best Practices...
    http://www.biconsultinggroup.com/knowledgebase.asp?CategoryID=337

  • Best Practice for Implementing Exception Handling in BPEL

    Hi All,
    what is the best practice and the approach to follow Exception Handling in BPEL.
    1) Do we need to implement Exception Handling in BPEL as we do in Java, means
         method 3 throws error to method 2 (if any) and
         method 2 throws error to method 1 (if any) and
         finally method 1 throws error to the main Class.
    If we replicate the above scenario to BPEL
    In BPEL main Scope have Custom Fault, Catch ALL
         Each Invoke is surrounded by a Scope Activity with Remote Fault, Binding Fault & Custom Fault
    and follow the paradigm of Java, assuming we have Inner Scopes
         [ OR ]
    2) In BPEL main Scope have all exceptions defined like
         Remote Fault,
         Binding Fault,
         anyOther System Fault (selectionFailure / forcedTermination),
         Custom Fault (if required) and
         CatchALL
         and also
         each Invoke is surrounded by a Scopes Acitivity with Custom Fault (business fault) exception Handling
    I feel 1st one may not be a good practice, may be i am wrong...
    Any Suggestions from experts.
    Thanks in Advance
    anvv sharma

    Hi-
    In you can create different scope and use catch branch to catch binding, remote, custom faults, business faults etc. If an error happens in a scope it will not move to the next scope( eg: you have 3 scope, error occured in 2nd scope then it will not propogate to the 3rd scope. One thing to be noticed here is your transaction in the 1st scope doesnt gets commited when an error happens in 2d scope).
    You can have a catch all to catch error which are not being caught at catch level. So if any error happens which is not defined in catch block then then it will be caught in catch all branch.
    Edited by: 333333 on Apr 12, 2011 9:39 AM

Maybe you are looking for

  • Ovi Store and some app cannot install on Nokia C6-...

    I buyed my phone 2 days before and updated my phone's firmware to PR 1.1 . I don't really know it happened because new firmware  because i updated at first and didn't do anything on old one. I couldn't install Ovi Store and some applications on my ph

  • How do you make an alias of a sys pref panel

    I need to access the Sound Prefs Panel frequently... switching between inputs and outputs because of attached speakers, headphones, mics, etc. A shortcut would be nice. An alias of the Sound Prefs Panel perhaps??? Anyone know a way to do this?

  • DVD external compatibilities

    I have burned a Sony DVD-R 4x/1x using iDVD (iLife '05). Simple slideshow with iTunes music. The problem is it can play on only one of my external DVD players. And, while it plays fine on the G4 Powerbook, it will also not play on my Dell Latitude no

  • R/3 Reconciliation

    I'm trying to match BW numbers with R/3 numbers. The field is CO Actuals in my Purchasing cube. I've been trying to dig down to the table level but am having no success. The infosource involved is 0CO_OM_CCA_9. How can I properly match numbers of my

  • Why when i am using an aplication my iphone restarts? this happens to me once twice a day

    I an simply using an application and the phone close it and then it restarts itself. This happens to me no matter what application i am using almost every day .