BI Security Implementation and restrictions at Infocube levels

Dear all,
I am trying to update myself on BI security and practical implementations. I read expert guide and other relevant documentation. We have BW security integrated with CRM and Portal.
Please explain or provide me some direction in understanding how BI security works at key figure level.
<b>Is it necessary to set the following InfoObjects as “authorization-relevant” . Is it MANDATORY to make the following settings as "Authorization-Relevant" before we start the BI Security
     0TCAACTVT
     0TCAIPROV
     0TCAVALID
     0TCAKYFNM</b>
and
     Add 0TCAIFAREA as an external hierarchy characteristic to 0INFOPROV
When I changed above infoobjects to Authorization relevant, BI Portal Users are complaining that they have Access issues. I have to change this setting back.
Can someone explain me the implication of making the above objects as Authorization Relevant. What making these objects, Do I need to complete some steps to make it work.
All users have 0BI_ALL object defined in S_RS_AUTH. I don't know how 0BI_ALL works for users.
I greatly appreciate if anyone can explain how I can achieve the following scenarios:-
1. How Can I restrict user access to all the Characteristics and Key Figures of Infocube ZEN_XXX1 except for Characteristic 0CRM_SALORG.
2. How can I restrict User access to all the Characteristics and Key Figures of Infocube ZEN_XXX1 except for Characteristic 0CRM_SALORG (Sales Organization CRM) and Key Figure ZVOLSU.
3. How can I restrict User Access to all Infocubes EXCEPT ZEN_T001 infocube.
I tried using PFCG but it does not work. 3rd scenario worked fine. I really need help in resolving scenario 1 and 2.
please eMail me if I need to go thru any other step-by-step procedure.
I am trying my best to resolve and at the same time reading other documentation and experimentation.
Waiting for a Positive Reply
Kumar

Hello Kumar,
<b>here are my statements:</b>> Is it necessary to set the following InfoObjects
> as “authorization-relevant” . Is it MANDATORY to make
> the following settings as "Authorization-Relevant"
> before we start the BI Security
>      0TCAACTVT
>      0TCAIPROV
>      0TCAVALID
>      0TCAKYFNM
<b>Be careful when checking 0TCAKYFNM. If you do so EVERY user will be influenced because reporting is based on key figures. But as you need to restrict to certain key figures you will have to check 0TCAKYFNM  authorization relevant. As a consequence every user will need key figure authorizations.</b>> 
> and
> Add 0TCAIFAREA as an external hierarchy
> characteristic to 0INFOPROV
<b>This is not mandatory but may be helpful if you want to restrict authorizations on InfoArea Level.</b>
> When I changed above infoobjects to Authorization
> relevant, BI Portal Users are complaining that they
> have Access issues. I have to change this setting
> back.
<b>They might complain because they do not have authorizations for any key figure.As I explained above checking this object has impact on every query because every query contains key figures and when you check 0TCAKYFNM users will need the authorizations for this object.</b> >
> Can someone explain me the implication of making the
> above objects as Authorization Relevant. What making
> these objects, Do I need to complete some steps to
> make it work.
>
> All users have 0BI_ALL object defined in S_RS_AUTH. I
> don't know how 0BI_ALL works for users.
<b>0BI_ALL is SAP_ALL on analysis level - you must not assign this to your reporting users!</b>>
> I greatly appreciate if anyone can explain how I can
> achieve the following scenarios:-
>
> 1. How Can I restrict user access to all the
> Characteristics and Key Figures of Infocube ZEN_XXX1
> except for Characteristic 0CRM_SALORG.
<b>Figure out if characteristic 0CRM_SALORG has to be marked as authorization relevant or not. If not - there's nothing to do. If yes - you will have to setup analysis authorizations.
Create an analysis authorization in RSECADMIN like:
ZEN_XXX1_ALL
0CRM_SALORG  = *
specify your other auth. relevant characteristics and enter ":" as values
0TCAIPROV = ZEN_XXX1
0TCAACTVT = 03
0TCAVALID = *
Do not forget to allow authorizations for these auth. relevant characteristics in your other infoproviders (where applicable).
Assign the authorization to the users in RSU01 or create a role containing S_RS_AUTH with the analysis auth. as value.
</b>
>
> 2. How can I restrict User access to all the
> Characteristics and Key Figures of Infocube ZEN_XXX1
> except for Characteristic 0CRM_SALORG (Sales
> Organization CRM) and Key Figure ZVOLSU.
<b>Create an analysis authorization in RSECADMIN like:
ZEN_XXX1_KEY
0CRM_SALORG  = CRM
specify your other auth. relevant characteristics and enter ":" as values
0TCAIPROV = ZEN_XXX1
0TCAACTVT = 03
0TCAVALID = *
0TCAKYFNM = ZVOLSU
And also do not forget to allow authorizations for these auth. relevant characteristics and all key figures in your other infoproviders.
Assign the authorization to the users in RSU01 or create a role containing S_RS_AUTH with the analysis auth. as value.</b>
> 3. How can I restrict User Access to all Infocubes
> EXCEPT ZEN_T001 infocube.
<b>Enter in auth object (PFCG) S_RS_COMP and S_RS_COMP1 your cube ZEN_T001 in field RSINFOCUBE,  RSZCOMPTP =  REP, ACTVT =  16
</b>
>
> I tried using PFCG but it does not work.
<b>Why? What was the problem? Keep in mind that you always will need the three special dimensions since BI 7.0</b>
3rd scenario
> worked fine. I really need help in resolving scenario
> 1 and 2.
>
> please eMail me if I need to go thru any other
> step-by-step procedure.
>
> I am trying my best to resolve and at the same time
> reading other documentation and experimentation.
>
> Waiting for a Positive Reply
>
> Kumar

Similar Messages

  • An alert message pops up upon opening saying could not initiate application security component, and it says to check to see if profile has no read/write restrictions.

    An alert message pops up upon opening saying could not initiate application security component, and it says to check to see if profile has no read/write restrictions. Than when it opens all of my saved passwords are gone, I use a master password and its disabled. When I try to enter in a new on e it says can't change password. I can't even open yahoo e-mail says that my ssl security is down but when I check it its clicked. I'm just very confused as to whats going on.
    == This happened ==
    Every time Firefox opened
    == 5/14/2010 ==
    == User Agent ==
    Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/532.5 (KHTML, like Gecko) Chrome/4.1.249.1064 Safari/532.5

    See [[Could not initialize the browser security component]]
    Rename (or delete) secmod.db (secmod.db.old) in the [http://kb.mozillazine.org/Profile_folder_-_Firefox Profile Folder] in case there is a problem with the file.

  • Data Level Security implementation question

    I had a quick data-level security scenario and wanted to solicit any input from the experts.
    In our current Subject Area we have one Presentation Layer using one Business Model. In this Subject Area have a Task and Employee Dimension. There is row-level Security on the Task Dimension that is done in the Business Model on the LTS Content tab. There are a batch of reports built off this Subject Area.
    There is now a request to build a new batch of reports, however, they want to now filter on the Employee Table and NOT filter on the Tasks. So the opposite of what has been applied above.
    From my perspective there are only a few ways this Security can be applied
    Business Layer: Basically either create an Alias of Employee and Task or build a second LTS for both. Then create new columns and map to these accordingly. Basically have 2 of each column in the Business Layer. One with Security applied and one without.
    Presentation Layer: Created a second Presentation Subject Area and apply the security at the Presentation Layer and remove it from the Business Layer.
    I know a third option could be put security on the Role/Group but for this case these reports are open to everyone.
    I'd just like to verify from the experts that I may have covered all solutions for this scenario or if there are any other suggestions?
    Thanks!

    Alright...
    If you have two LTS say A & B (basically duplicate) then add a column say LTS Indicator and assign 'A' for LTS A and 'B' for LTS B. Add the fragmentation content and apply the security filter and you can also create two different Presentation folders under same Subject Area if users have Answers Access so that the users know if they are querying for LTS A or LTS B.
    Similarly, build your reports making use of LTS indicators which will BI server to pick correct LTS. Say, where you want LTS A to be picked...use filter of LTS Indicator = 'A' and thats it.

  • How to do Setup and Security implementation in ODI

    HI Friends,
    I have few question regarding ODI installations.I am using
    Oracle DB version is Oracle Database 11g Enterprise Edition Release 11.2.0.3.0 - 64bit Production
    ODI is ODI 11.1.1.5 version.
    While installing can we go for
    One Master repository for Dev and UAT, mainly because we have one physical server for UAT connecting to UAT DB and Dev DB. And a separate Master repository for Production?
    We have 2 groups of users .One is developer and One is tester.
    Tester donot have a permission to use or check the development codes.They have only the Run permission in operator.
    How to do this security implementation in ODI while installing.
    Plz confirm me on this.
    Thanks,
    Lony

    The way I did it is,
    Created an Execution Mode work repository for the QA purpose and thus only Scenarios & Load Plans were deployed on this QA repo. This had its own Master Repo as well.
    For dev the Dev mode work repo is created where all the interfaces, packages, procedures can be developed or modified as and when required.
    Thus, the testers have access only to the QA environment.
    Otherwise you can assign roles to the users after the installation in the security tab. Give the operator, connect role to the testers.

  • My contacts and whats app messages are shown on my sister's iphone! How can I secure my iphone and have a high level of security and privacy! Her Contacts are shown in my iphone as well!!

    I have and iphone 6 with iOS 8.1. My contacts and whats app messages are shown on my sister's iphone! She have iPhone 6 and and iOS as well. How can I secure my iphone and have a high level of security and privacy! Her Contacts are shown in my iphone as well! Setting in mac and iphone are a bit presice and sensitive. Is there any way to solve my issue and increase the safety, security and privacy in my iPhone and its data?

    Your problem is that she used your icloud ID to connect to icloud and thus had all your data synced to her device.  Contacts are not saved in a backup to icloud, since they are stored independently in the Contacts section of icloud.  If someone deletes them, they are gone.  If you had them on the PC would they be available in some backup you frequently make of the PC?

  • SAP Security Planning and implementation with SOX/SOD compliance

    hello
    Hi guys, i am a security guy
    could you tell me ,"SAP Security Planning and implementation with SOX/SOD compliance" 
    what does it mean.
    <removed_by_moderator>
    thanks
    Ramesh
    Edited by: Julius Bussche on Feb 2, 2008 1:26 PM

    Ramesh Sammiti wrote:>
    > hello
    >
    > Hi guys, i am a security guy
    >
    > could you tell me ,"SAP Security Planning and implementation with SOX/SOD compliance" 

    > what does it mean.
    >
    >
    > <removed_by_moderator>
    >
    >
    > thanks
    > Ramesh
    Forgive me for saying, but it means:
    Implementing security which complies with Sarbanes Oxley requirements and takes into account Segregation of Duties.
    SOX and SOD are different things, from a security perspective SOX is generally technical security based and SOD is business process based (although bus proc has big SOX component).
    There is a plethora of information via yahoo/google etc.
    Edited by: Julius Bussche on Feb 2, 2008 1:28 PM

  • Filters at record level and filters restrictions at cell level

    Hello Crystal Report friends:
    We are aware that we can apply filters globally (record Level). We need to add additional filters(Restrictions) at cell level.How do we apply filters at a cell Level?
    Regards,
    Joe Gonzales

    And along with what Ian said be careful when exporting also, some suppressed fields may export even though you have supressed them, so you are not removing the data, just hiding it. If the user has rights to edit the report they could "unhide" the info.
    Depending on the version of CR you are using depends on the output, our export formats tend to change on how they work and what is exported etc.
    There are Various DB tools from SAP Enterprise that has the ability to do row level filtering if that is an option for you.
    Don

  • How to Restrict printing the document using IRM for a Single Document?Allow printing for some documents and restrict the printing for particular documents in same document library?

    Can we able to Configure the IRM in Document Level in SharePoint Document libraries?
    The document library contains multiple document sets , Can we restrict the printing according to document sets? Allow printing for some documents and restrict the printing for particular documents in same document library
     Is this possible?Please suggest.

    Yes, that can be done. But note that all administrators will have the same right to print, so you need to make sure the users are not administrators. You can include a macro to disable printing, but if the users disable macro, they can print the documents.
    Hence, there is no foolproof way to prevent printing documents. If you still need a foolproof security, PDF format provides password based security (viewing doesn't require a password) that can be implemented to prevent the document from printing,
    which doesn't require any special scripts and is tough.
    You can have a look at the following links:
    http://msdn.microsoft.com/en-us/library/office/ms458245(v=office.14).aspx
    http://msgroups.net/microsoft.public.word.docmanagement/prevent-printing-of-docum/91353
    http://www.go4sharepoint.com/Forum/prevent-printing-saving-documents-10150.aspx
    The following link explains about the security features in PDF. This is for information purpose only and not for promotion of any products:
    http://www.pdflib.com/knowledge-base/pdf-security/
    Balaji Kundalam

  • Currency Translation at Infocube Level

    Hi All,
    Currency Translation is possible at Infocube Level ? I am working on BI 7.0.
    I am working on Infocube 0IC_C03 where i have 2 key figures. 1) 0ISSVS_VAL 2) 0RECVS_VAL. I am getting value in USD,DKK & EUR. I have a requirement to add more 2 keyfigures 1) ZISSVS_VAL (USD) 2) ZRECVS_VAL(USD) where both my keyfigures will transfer all the values in USD.
    Here i see a problem is 0ISSVS_VAL & 0RECVS_VAL is getting calculated in start routine  and getting stored in 0IC_C03 info cube now i want 2 more keyfigures  to be added in Infocube and should get calculated from 0ISSVS_VAL & 0RECVS_VAL. i think it may be possible by END ROUTINE ? Correct me if i am wrong. if it is correct then I haven't worked on End Routine before. if anyone can let me know the ABAP for the same, i really appreciate..
    Regards,
    Komik Shah

    Hi Sudeep,
    Thanks for your response. Can you send me some ABAP code as from where to start ?
    Regards,
    Komik Shah

  • How to Restrict the node level in account hierarchy

    Hi experts,
    I want to restrict the node level in account hierarchy. I attached one example. in that if i click 6000 node again it want to show error message. for one parent node i want to create only two child node. Further if i create means it want to show error msgs and not allow to create the node..
    Regards,
    gopi

    Hi ,
    The component is bp_hier, and method is onnew_node.
    IF lv_tree->is_locked( ) = abap_false.
         lv_tree->lock( ).
       ENDIF.
       CHECK lv_tree->is_locked( ) = abap_true.
       lv_index = typed_context->accounthierarchy->selected_index.
       lv_tree_node = typed_context->accounthierarchy->get_node_by_index( lv_index ).
    *key = lv_tree_node->node_key.
      CALL METHOD lv_api->get_node_parent
         EXPORTING
           iv_node_key        = key
         IMPORTING
           ev_parent_node_key = lv_paent_key
    *      ev_tree_guid       =
    *   lv_parent = lv_tree_node->parent_entity.
    *    typed_context->accounthierarchy->parent_entity.
    CALL METHOD lv_tree_node->get_children
       receiving
         rt_children = rt_child.
       CHECK lv_tree_node IS BOUND.
       lv_tree_node->is_leaf = abap_false.
       TRY.
           lv_proxy_node ?= lv_tree_node.
           TRY.
               lv_object ?= lv_proxy_node->bo.
             CATCH cx_sy_move_cast_error.
               lv_mixed_node ?= lv_proxy_node->bo.
               lv_object ?= lv_mixed_node->if_bsp_wd_ext_property_access~get_model_node( ).
           ENDTRY.
           lv_object_name = lv_object->get_name( ).
           IF lv_object_name = 'BuilHierarchyNode'.
             lv_relation_name = 'BuilHNodeRel'.
           ELSEIF lv_object_name = 'BuilHierarchyHeader'.
             lv_relation_name = 'BuilHeaderNodeRel'.
           ELSE.
             RETURN.
           ENDIF.
           lv_tree_node->get_children( ).
           lv_object = lv_object->create_related_entity( lv_relation_name ).
           lv_child_node = lv_proxy_node->node_factory->get_proxy(
               iv_bo = lv_object
               iv_proxy_type = 'CL_BP_HIER_HIERARCHYTREEV_CN05'
               iv_parent_proxy = lv_tree_node ).
           lv_tree_node->expand_node( ).
           typed_context->accounthierarchy->refresh( ).
           typed_context->accounthierarchy->deselect_all( ).
           lv_child_node->selected = abap_true.
           lv_child_node->is_leaf  = abap_true.
    *accounthierarchy
    *      selectedhierarchynode
           lv_col_wrap = typed_context->selectedhierarchynode->get_collection_wrapper( ).
           lv_col_wrap->clear( ).
    This is the code.
    i wrote . but its not getting.

  • LDAP security provider and web service authentication

    Background: we are currently developing web services to our existing weblogic application. Our users can configure user/password authentication in one of three ways: database, LDAP, or SSO. Setting SSO aside, we need to implement the same authentication for database and LDAP that we use in our existing logon servlet in our web services. In our servlet we detect which they are configured for and, if database, authenticate the encrypted password to a database table we have for user id/password. If LDAP we use weblogic.servlet.security.ServletAuthentication and the weak() method to authenticate.
    We've to use SOAP headers to communicate username/password from the client to the web service. We want to code a SOAP message handler to grab the username/password and do the authentication there. We've successfully put something together that handles the database authentication no problem and are now struggling with how to handle the LDAP authentication. We distribute a LDAP security provider we've coded for LDAP authentication. I guess what I am looking for is an equivalent functionality provided with weblogic.servlet.security.ServletAuthentication. Note that I realize the weblogic.servlet.security package has been deprecated starting with Weblogic 9.0 but cannot find what functionality replaces it. Any help there would be appreciated as well.
    Note that I am fairly new to web service development (about 10 months now) and definitely new to web service security and Weblogic security. I tried digging into the volumes of documentation out there regarding these two topics but am simply having a difficult time sorting it all out and figuring out how to do what I want to do.
    Thanks in advance!
    Julia

    Hi,
    Add Provider (LDAP Credentials) in Admin console Security Realm --> defaultrealm -->Providers. Configuring Ldap in Admin Console will enable Admin Server to connect to LDAP. All the LDAP preconfigured Users/Groups will be available in Users and Groups Tab of Security Realms >defaultrealm >Users and Groups. Add Roles using Security Realms >defaultrealm > Roles and Policies > Global Roles > Roles. Add Role Conditions to the role by specifying users/groups configured in LDAP. If your webservice runs with SSL Anotate the Webservice file something like this below.
    @RolesAllowed({
    @SecurityRole(role="test")
    @Policy(
    uri="policy:Wssp1.2-2007-Https-UsernameToken-Plain.xml",
    attachToWsdl=true)
    Here the role is Preconfigired role in AdminConsole. Add the following tag in the soapenv:header.
    <soapenv:Header>
    <wsse:Security soapenv:mustUnderstand="1" xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd">
    <wsse:UsernameToken>
    <wsse:Username>test</wsse:Username>
    <wsse:Password Type="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordText">password</wsse:Password>
    </wsse:UsernameToken>
    </wsse:Security>
    </soapenv:Header>

  • Skipping security questions and answers

    Since recently, my iPad (but also iTunes on my mac) asks me for security questions and answers when I try to download an app. How can I download apps without providing these questions and answers?

    Thanks Michael, so it is possible without security questions. Unfortunately, I find the 2-stage verification even more worrying. I've accepted the situation as is and have picked three questions and have entered random data as answers to them.
    To clarify my objections to these security questions:
    These questions provide no additional benefit. I can pick a question and answer truthfully, but these are generally things others could find out (especially in targetted attacks, where the attacker tends to already know a bit about the victim - does anyone remember how Paris Hilton's T-Mobile account got accessed by attackers who knew her dog's name? (yes, that is an especially stupid example, but it shows the problem with these kinds of "security measures"))
    Entering random data is already a lot better, however iTunes will simply show your (random) answer on screen instead of the regular dots you see when entering your password. Apple tells us to keep your passwords private and not share them with anyone (including family). If family is sitting next to you while you type your random data, they can easily read along.
    As it stands, these security questions impose another hurdle for the user, not the attacker. Hence my attempt to circumvent this approach. I have a strong password and I have implemented safeguards to prevent forgetting it. The security questions do not improve my situation, they are an attempt at improving the situation of people that take security less seriously. These are the same people that provide all the answers to these security questions on their facebook (or whatnot) for all the world to see. Pointless.
    (Note that the 2-stage verification is a better approach that solves the problems mentioned above. However, it comes with new downsides that I won't detail here as this is already way too long).
    Anyway, thanks to all that responded. I have to say, suggestions of moving to another vendor seem somewhat ridiculous. That also means purchasing new devices when all I want to do is use my device (the device I've grown used to) as I have for quite some time. And there is no guarantee that such a new environment does not have similar stupid security measures in place.

  • BOE XI 3.1 Security Limitations and Assumptions

    Hi,
    Can any one please let me know the BOE XI 3.1 Security setup Limitations, Assumptions and Risks in Windows environment(Windows 2008 server)
    Also please share the mitigation and solutions of these risks.
    Regards,
    Jai

    Hi all,
    Please check out the "Windows pattern security" section and security related sections of the windows pattern book below -
    https://websmp201.sap-ag.de/~sapidb/011000358700000532872009E/xi31_bip_pattern_win_en.pdf
    The pattern book should address most of the XI3.1 implementation related questions.
    Below planning guide also provides good insight for planning your deployment
    https://websmp105.sap-ag.de/~sapidb/011000358700001647142008E/xi3-1_bip_deploy_plan_en.pdf
    regards,
    Shiva

  • Implementing and Exposing a Web Dynpro as a Callable Object

    Hi All,
    I am new to guided procedures.I am trying to implement and expose webdynpro as a callable object in CE7.1.In the library i found the following steps
    In the Component Properties view of the component, open the Dependencies tab page and add the following DCs:
    1)GP-CORE  ® caf/eu/gp/api/wd (public part GPWebDynproCO) 
    2)GP-CORE  ® caf/eu/gp/api (public part external)
    3)ENGFACADE  ® engine.security.facade (public part default)
    Choose Next and make sure that Design Time and Run Time are selected for each DC, and Build Time is selected for each of the public parts listed above.
    But i could not find ENGFACADE  ® engine.security.facade (public part default)
    Can anyone please help me.
    Regards,
    Sudhir

    Hi sudheer,
    For this we need NWDI otherwise  for NWDS sp7, we need to add caf/eu/gp/api files and toplevel dc's  externally.
    Have you added them or not .(First you try to bring those API files to your local development and then you need to add them to your DC).
    After that we need to select them for the development component >DC Meta data> used dc's .Here  select
    1)caf/eu/gp/api>Dc metadata>Public parts-->external
    and
    2)caf/eu/gp/api/wd
    3)From Local development>SAP_JEE>com.sap.security>api>sda
    Along with this you need to select the dependency type.
    Once you added API you'll be able to see those under used dc's and check their properties.There whatever dependency's you've selected , they  should be enabled  TRUE. Otherwise try to edit the used dc's by Right clicking on it and edit Used Dc's properties and make those dependency's like design time,build time and runtime as true.
    Make sure that you've added caf/eu/gp/api under library references.(DC properties>WebDynpro references>Library references-->add here and apply them.
    Please follow these steps and try to deploy your WD application.I hope you'll be able do it.
    Regards,
    Sitara

  • LDAP- When importing a Group it goes into Security Users and not Groups.

    Hello,
    I created a new LDAP Server
    cn=GroupBI,OU=Groups,OU=Systems,OU=Milan,OU=Italy,OU=Countries,DC=u,DC=a,DC=g
    Connection Test was ok.
    The problem is on importing members of my group, on Security Import window instead of having the group drop-down list populated I have the user drop-down list populated with "GroupBI".
    If I import this group (considered as a user by BI) it goes into Security > Users and not Security > Groups.
    This does not make sense.
    I'm sure this "GroupBI" is a group and not a user and the atribute type used is sAMAccountname
    Any help?
    Cheers

    Let me tell how we did Authentication using LDAP
    I havent imported any groups or users once the LDAP is set up and connection was successfull. I simply created the session variables USER DISPLAYNAME EMAIL and mapped to LDAP Variables uid, displayname, mail.
    Authentication is done in this way by mapping the OBIEE variables to LDAP variables instead of importing the groups.
    Now for Authorization I created the groups populated using some db tables and captured the group name and loglevel and applied filters on the group in the rpd for data level and permissions on the group in webcat for object level.
    So just for Authentication purposes I think we can authenticate with out really importing groups as long as you map OB variables to LDAP
    hope it helps
    Prash

Maybe you are looking for

  • IPod no longer recognised

    Hoping someone can help me as I can't find any relevant information... My flatmate recently got a 5th generation iPod which she has registered on my Toshiba laptop. Since this has happened iTunes and the laptop no longer recognises my poor old 2nd ge

  • NI DAQmx 8.3 and CPU usage

    I have similar problem as described on page http://forums.ni.com/ni/board/message?board.id=250&message.id=23831 but have solution and some reflections. first of all, about system system use 2x PCI-6143 and take data from 16 channels with maximum rate

  • No longer have old pc, will syncing to new pc lose my data

    no longer have old pc, will syncing to new pc lose my data

  • Add extra column in MM01/02/03

    Hi In the material master (MM01/MM02/MM03), Basic Data, Units of Messaure, I would like to insert one more column, with extra data. Does anybody know if it is possible?! If yes, how do I do??!! Best regards Lars

  • Question regarding Inheritance.Please HELP

    A question regarding Inheritance Look at the following code: class Tree{} class Pine extends Tree{} class Oak extends Tree{} public class Forest{ public static void main(String args[]){   Tree tree = new Pine();   if( tree instanceof Pine )   System.