CCM 2.0 - Files Storage for high volume of files

Hi all,
I have seen in one message the following information:
<i>1. Files storage.
My point is that I think you've created a virtual folder on the SRM Server in SICF, which means that all your files are stored internally in the database, and not physically on the server.
The most simple way is to create a physical folder on the server OS, and then create analias in SICF to this folder. You then will be abble to load in mass the pictures on the server using FTP, or network Share.</i>
I want to upload images in the Catalog (CCM 2.0) and in my case I have high volume of files. Where is the best place to stored this data, in the database or in the server?
And if it is in the server, how I can create an alias?
Many thanks!!
Regards

Hi ,
What we had done for image upload for CCM 2.0 was like this:
1. in SE80 go to MIME repository -> drill down to services -> bc /sap/bsp - >Create a personal folder
2. Import your image .jpeg in this folder.
3. Derive an URL with the structue : server name/domain name/services/file name
4. test this URL in IE browser ,it should open the picture in IE for you.
5. then paste this URL in the characteristic 'image' of an item in master catalog in CAT
with this in EBP we could see the photos of the items.
BR
Dinesh
reward if helps

Similar Messages

  • My volume button for higher volume(F12) is not working whereas mute and lower volume(F10 and F11) buttons are working, what should I do?

    My volume button for higher volume is not working

    I think there is a Windows bootcamp application that will recognize those keys. The bootcamp stuff is here: http://www.apple.com/support/bootcamp/
    I think it is called bootcamp assistant. Look here: http://www.mac-guides-and-solutions.com/boot-camp-assistant.html

  • How to process overly compressed high volume audio files

    I used a process in scientific filters in audition 3 to process overly compressed high volume audio files normalized to 0 db. It was like magic.
    How would you process this sort of file in Audition 6.

    Below was the process used in Adobe Audition 3. The sound was much improved. Try the steps on a file you have to hear the difference.
    Effects- Amplitude - Normalize - uncheck the decibles format box - normalize to and normalize L/R boxes checked, enter 48 into percentage box.
    After normalization was complete
    Effects - Filters - Scientific filters - select Chebychev 1 tab - band pass button and select the following parameters.
    Cutoff =4, high cutoff = 22050, order = 18 all other settings at defaults values (0). Delay radio button sellected, check the extended range box, press OK.
    Increase to appropriate volume after processing if necessary.

  • Architecture/design for high volume web service calls from on Demand

    Hi,
    We have hundreds of end users (less than 600 users) that will be initiating web service calls from On Demand that will deal with both querying (stateful transaction) and inserting/updating data (stateless). Currently, we see a limitation on the number of stateless sessions (33) that can initiate web service calls. We are afraid this will lead to poor performance with the number of sessions that are allocated for stateless sessions.
    Can someone provide any design or framework information that can be implemented for high volume web service calls from On Demand? We anticipate 35K+ web service calls that will be initiated from On Demand per hour.
    Thanks.

    Hi,
    We have hundreds of end users (less than 600 users) that will be initiating web service calls from On Demand that will deal with both querying (stateful transaction) and inserting/updating data (stateless). Currently, we see a limitation on the number of stateless sessions (33) that can initiate web service calls. We are afraid this will lead to poor performance with the number of sessions that are allocated for stateless sessions.
    Can someone provide any design or framework information that can be implemented for high volume web service calls from On Demand? We anticipate 35K+ web service calls that will be initiated from On Demand per hour.
    Thanks.

  • I have just purchased my Iphone 4s, and the volume of the sound is very low, I can hardly hear the other person. I have tried the button for higher volume, but there is no change

    I have just purcahsed my Iphone 4s, and the volume is very low, I can hardly hear the other person talk. I have tried the botton for higher volume, but it doesn`t work. Can anybody give me an answer to what is wrong?

    Did u take out the screen protection?

  • How are the c:\Program Files\Microsoft DPM\DPM\Volumes\Replica\File System\vol_ directories locked down?

    Hi,
    Even as an administrator on the DPM server, I cannot drill down into subdirectories of c:\Program Files\Microsoft DPM\DPM\Volumes\Replica\File System\vol_ . . For example: c:\Program Files\Microsoft DPM\DPM\Volumes\Replica\File System\vol_9fd89f55-92d7-469b-9196-c7d5e0d07943\2401168f-0a90-46ff-b719-9aa6bf817c5f\Full\. 
    I get access is denied.  I think this is by design, that DPM is designed to only allow access to these files through the interface. 
    Is that true? 
    Would there be ANY way for someone to gain access to these files, either from the DPM server itself, or from <DPMServer>\c$?
    Thanks,
    Casie

    Hi,
    In most cases you can access them from an administrative command prompt.  If you still get access denied you perform the following:
    1)      Download psexec.exe from
    www.sysinternals.com
    2)      Run PSEXEC -s cmd.exe   (this will switch window to system context)
    3)      Afterwards - type WHOAMI it should return:
                      nt authority\system
    4)  Now CD to the replica volume under program files\Microsoft DPM\DPM\Volumes\replica\...
    Please remember to click “Mark as Answer” on the post that helps you, and to click “Unmark as Answer” if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread. Regards, Mike J. [MSFT]
    This posting is provided "AS IS" with no warranties, and confers no rights.

  • Can I change the default 'File Type' for PL/SQL Source File to '*.prc' ?

    Want to change the 'default' extension for PL/SQL source to '*.prc'
    When navigating 'File' / 'Save As', and selecting the 'File Type' list box,
    The default 'File Type' for PL/SQL Source File is '*.pls'.
    Can I change the default 'File Type' for PL/SQL Source File to '*.prc' ?
    I have followed , 'Tools', 'Preferences' , 'File Types' and added '.prc' as 'Sql Script' file type, because (PL/SQL Source) is not present in the list.

    You can certainly overwrite the 'Save As' extension as you are saving the file. I have added an ER for more control over this functionality.
    sue

  • Question on QoS for File-- SOAP synchronous high volume interface

    Is it possible to have a File to SOAP (sender file adapter --> receiver SOAP adapter, synchronous - response needed by sender ) scenario with FIFO (first in first out). This is a high volume interface (about 8 messages/second). If FIFO possible, will a failed message block the succeeding messages?
    My understanding is that QoS of receiver SOAP CC is Best Effort.
    Thank you.

    yes..EOIO will block the queues if its predecessor are not in final state...
    for ur design u can rfer the below wiki...instead of RFC u can use soap adapter..
    http://wiki.sdn.sap.com/wiki/display/XI/File-RFC-File%28Without%20BPM%29

  • Defining NTFS Permissions for High Volume Security

    The default NTFS file permissions for the boot volume in Windows 8.1 appear to give Modify access to "Authenticated Users".   That is really permissive.   I have a lot of folders I do not want anyone not authenticated as Administrator
    to touch.   Of course I could change every folder manually and test for side effects, but I am hoping someone has already tested this and has published a document.   I am looking for a detailed description of how to secure the volume so that ordinary
    users cannot modify attributes, filenames, or data for most files on the volume.
    Will

    Ronald, thanks for your reply.  Now we are talking the right topic.    
    1) How did you modify the root permissions?  One way to do that might be to remove Modify and Create authority for the "Authenticated Users" entity and replace that with just Read & Execute.
    2) I understand that Microsoft tightened things to prevent normal users from having modify access inside subfolders.   This works fine for well behaved applications that use things like the "Program Files" subfolder.   Unfortunately, many
    applications are badly behaved and put themselves directly under the root of the boot volume.  AMD for example puts its video drivers in c:\amd by default.     Since that folder inherits from the root, and the root gives permissive access to
    users to create and modify files, now many sensitive DLLs in this install folder could be easily modified by any user.
    One of the worst viruses I ever had was a denial of service virus that acted simply by hiding every single file on your file system.   We had locked down NTFS permissions but had forgotten to lock down file attributes.   It took forever to recover
    from that.   
    So, bottom line, I like to run as tight a file security as possible, and I like to stay logged in as a normal user and greatly restrict what normal users can change.    
    Microsoft definitely tightened things up in Windows 8 and that's great.
    Will

  • Oracle database integration with SAP PI for high volume & Complex Structure

    Hi
    We have requirement for integrating oracle database to SAP PI 7.0 for sending data which is eventually transferred to multiple receivers. The involved data structure is hugely complex (around 18 child tables) with high volume processing requirement (100K+ objects need to be processed in 6-7 hours). We need to implement logic for prioritizing the object i.e. high priority objects must be processed first and then objects with normal priority.
    We could think of implementing this kind of logic in database procedures (at least it provides flexibility for implementing data selection logic as well as processed data can be marked as success in the same SP) but since PI sender adapter doesn't support calling Oracle stored procedures currently so this option is rules out. we can try implementing complex data selection using oracle table function but table function doesn't allow any SQL query which changes data (UPDATE, INSERT, DELETE etc) so it is impossible to mark selected objects in table function from PI communication channel "Update Query" option.
    Also, we need to make sure that we are not processing all the objects at once as message size for 20 objects can vary from 100 KB to 15 MB which could really lead to serious performance issues for bigger messages.
    Please share any implementation experience for handling issues:
    1 - Database Integration involving Oracle at sender side
    2 - Complex Data structures
    3 - High Volume Processing
    4 - Controlled data selection from database to contro the message size in PI
    Thanks,
    Panchdev

    Hi,
          We can call the stored procedure using receiver adapter using ccBPM, we can follow different approaches for reading the data in this case.
    a) In this  a ccBPM instance needs to be triggered using some dummy message, after receiving this message the ccBPM can make  a sync call to the Oracle database the store procedure(this can be done using the specific receiver data type strucure), on getting the response message the ccBPM  can then proceed with the further steps.The stored procedure needs to be optimized for improving the performance as the mapping complexity will largely get affected by the structure in which the stored procedure returns the message.Prioritization of the objects can be handled in the stored procedure.
    b) In this a ccBPM instance can first read data from the header level table, then it can make subsequent sync calls to Oracle tables for reading data from the child tables.This approach is less suitable for this interface as the number child tables is big.
    Pravesh.

  • Upgrading RAM and Flash Storage for higher capacity

    If I purchase a MacBook Pro with Retina Display with 8GB or RAM and 256GB Flash Drive, can I later upgrade the RAM and Flash Drive for higher capacity?

    Just to clarify...
    If I were to purchase a "regular" MacBook Pro (non-"retina", DVD drive, FireWire port, etc.) and seek aftermarket options for...
    (1: replacing the main RAM with 16 gigabytes of RAM (I understand that the newest "regular" MBP is limited to a BTO option of only 8 GB.)
    and
    (2: replacing the hard drive with a larger-capacity aftermarket Solid State Drive, preferably one with a capacity of either 768 gigabytes or 1 terabyte.
    Do such aftermarket options exist for the newest "regular" MacBook Pro? Can this model handle 16 GB of RAM? If there are aftermarket kits available, who installs them?

  • Online file storage with access control and file manager integrated to APEX website

    I have APEX 4.2 website with few user accounts. I would like to share approximately 100 GB of documents to users. Some documents will be public (in some public folder) and everyone with account in my website will be able to download that public files. And some files/folders will be with restricted access and only user with appropriate credentials will be able to download it.
    I would like to find some cheap cloud file storage.
    Some storage that offers plugin/component = file manager that will be integrated to my APEX website and authentication will be transparent to my users (authentication with some API or URL). Every user will see only his files. I want some ready to use component and call only minimum API.
    I would like to integrate that storage to my website or call some user specific URL and redirect my user to some page with file manager.
    All files will be read only for all users.
    Thanks for some tips

    what will you be using for your file manager?  Or do you even know yet?
    I do not have tons of experience but if I had to come up with a solution I would build the interface with APEX and use the database to store the files inside so you can control access.
    You can create a procedure that takes in parameters like username, session id, encrypted session id from the browser cookie and either return the file or give the user an error message letting them know they arent authorized.  You could use plugins to give the users a better file managing experience like the 'multiple file upload' plugin that allows AJAX based multiple file uploading.
    Id put this on an amazon EC2 cloud micro instance.  It's uber cheap.

  • Dynamic file naming for two or more files in same mappin

    Hello,
    I am working with Dynamic file naming on receiver files...
    Here two files are coming as output files...
    I am using JAva UDF to handle the two file name....
    But  one one file is formed and another is missing as its 505 file aleady existing error is coming in Receivr Communication channel monitoring...
    How to name different dynamic names for the two differenet files

    Hi Sunil,
    Go thru this blog:
    The specified item was not found.
    Use this Variable Substitution method as an alternative option:
    http://help.sap.com/saphelp_nw2004s/helpdata/en/bc/bb79d6061007419a081e58cbeaaf28/frameset.htm
    SAP NetWeaver XI: Variable Substitution with Adapter-Specific Message Attributes via DynamicConfigurationBean
    OR
    The specified item was not found.
    Regards,
    Vinod.

  • BRARCHIVE backup for high volume offline redo log files on Standby Database

    Hi All,
    We are through with all of Standby database activity, also started applying the offline redo log files on the Standby site.
    The throughput is not utilizing the actual available bandwith.
    So we are not able to copy the offline redo files on time, as the offline redo files are piling up on the Production side.
    My query is how we can parallely copy the offline redo log files on the DR site (ie. 4-5 redo files at a time).
    Kindly guide for the same.
    Regards,
    Shaibaz

    hi,
    I have one doubt.
    On other server (r3qas) the Umask settings are as followed
    User     UMASK value
    <sid>adm          077              
    ora<SID>           077
    root                   077
    Running SAP System :   SAP R3 4.6C
    Running DBMS          :  Oracle 9.0
    Operating System      :- HP_UX
    On this system The new offline redo log files are created with 600 permissions. There is not a problem here, while taking the backup. I checked last "r3qas-archive" backups. There, i have not found any single error related to permissions, or any others (something like, Cannot open /oracle/RQ1/../.........dbf).
    If everything is working fine, with this umask setting on this server, then, what's going wrong with the BW Quality server, which have the same umask settings (also others) for all the concerned users, as mentioned above.
    Regards,
    Bhavik Shroff

  • Journaled file system for startup volume only?

    I have been told that the advantage of a journaled file system is only realized on the startup volume. Surely, protecting the critical startup files is first priority for most users, but does the advantage of a journaled file system apply to other drive volumes, too? Please explain why this is or is not true. Thanks.

    Moof666 wrote:
    I have been told that the advantage of a journaled file system is only realized on the startup volume. Surely, protecting the critical startup files is first priority for most users, but does the advantage of a journaled file system apply to other drive volumes, too? Please explain why this is or is not true. Thanks.
    it applies to all drives but it's much less relevant for non startup drives. startup drives are being written to constantly and other drives are not. the likelihood of an external drive being written to at the moment of say a power outage is much smaller than that for the startup drive. therefore having journaling on on nonstartup drives is not as crucial. you can still do it though if you want to.
    Message was edited by: V.K.

Maybe you are looking for

  • The Mystery Of Free Public WiFi

    Almost everywhere I travel, I see a Computer-to-Computer network listed call 'Free Public Wi-Fi'. Clearly that's not what it is (oh, and I can see it now, in some hotel in the armpit of Ohio), so I guess it must be some bizarre PC phenomenon that has

  • New Field not Showing up in Report.

    I have a CR query that I am editing to add a column to my report.  When I make my edits, the query runs, but I do not see the new field in the field explorer.  The part in purple is what I added.  Do I need to add it elsewhere in the code? WITH SEL_A

  • Installing Mac OS X Leopard on a Power Mac G4

    Being the proud owner of a "new" Power Mac G4, I recently acquired the Mac OS X Leopard Disc. However, after looking at some articles (including EnGadget's article on the same subject), I am wondering if I am actually able to install the OS on a less

  • Error.  Cannot install public key for specified user

    I'm getting "Error. Cannot install public key for specified user" when trying to add a public ssh key for a service processor user on a V20z. I've tried it for different users and still get the error. The same operation works fine on a V40z. Any help

  • Getting advice on using Visual Studio 6 on Windows 8.1

    What is the right forum to discuss using Visual Studio 6 on Win 8.1? (I got it working on 8.0 despite its compatibility issues. After upgrading to 8.1, running a debugee under VS 6 in Win 8 compatibility mode is v-e-r-y   s-l-o-w. Please assume I hav