Coding In PI to detect and alert R/3 downtime

Hi Experts ,
                                 Mine is a FTP XI R/3 scenerio. Data from FTP enter XI [ FTP adapters]  , and after logicical manipulatations enter R/3 as idocs using IDOC adapters . The problem is sometime the production is needed to be put down, and at that time data is picked up by XI from FTP. This needs to be checked. The requirement is to write a CODE that can test the R/3 connection and if successful, then allow the data to be passed , and if DOWN , then send MAIL alerts to certain users, and may be stop the process.
Pls tell me indetails what can I do, and what all coding is necessary.There is no BPM in this scenerio.
Pls revert back if you need any other info.
Regards,
Arnab

Hi
Case 1:
You can create and RFC in R/3 which will just return you value TRUE if it System is up, just one field. if it cannot access the system it will throw an error with HTTP code 500, catch this error
write an java map ( i mean use the same FTP adapter to read all the data), in this java map write an method to check the status of the R/3 which will return you some value lets assume boolean ( true if system is up, false is system is down, in this method you have to catch the exception if it throws 500 http code check this logic how you want to handle)
so if this method is true, then process your files which are in your execute method as input stream also you can just email in this map itself notifying the concerned person telling SAP is down).
You can create two receivers one for sending email and other for processing the files, use the java map above to determine receiver based on the RFC call status you select your receiver.
Adapter Module: You can also do same using module, but if you write it as MAP you have flexibility in main ting from your side (NO XI server acess to deploy module and all).
Other important thing here is in any case you have to close your active XI pipeline, if you write it as a module and suppose you found SAP is down then you will send email, then how will you close the pipeline meaning fully...try to make this interface as such it executes sucessfully in eihter case just change in business logic based on receiver.
Make sure the logic in RFC just checks any system paramter to return you true or false, in doing so you should also take care of other RFC errors which might come if your RFC adapter itself is down, so when you catch the error 500 also check what the status code the RFC adapter can return if it is not able to connect to R/3.
Case 2:
If you have JDK 1.5 or higher,
then you can use the standard Java Method to check the status of the server
String host = "172.16.0.2"
int timeOut = 3000; // I recommend 3 seconds at least
boolean status = InetAddress.getByName(host).isReachable(timeOut)
this is same as PING command from CMD Prompt we run, with this also you can check the status is up or down of the server, to know more about this java class check this link
http://java.sun.com/j2se/1.4.2/docs/api/java/net/InetAddress.html
so based on this boolean value decide how you want to complete the rest design of XI.
regards
Nisar Khan
Edited by: Nisar Khan on Nov 27, 2008 1:02 AM
Edited by: Nisar Khan on Nov 27, 2008 1:28 AM

Similar Messages

  • Rogue Detection and SPT issues

    Deployed wireless a few months. From a client to infrastrure standpoint, majority of users are happy with the ability to go wireless with their personal and work devices.
    The problem we're facing is proper identification of rogue's AP's on our wired network (hot spots aren't important)
    I've setup a few linksys AP's connected to our access switches and found WLC/PRIME finds the rogue AP's but when a SPT is performed, both WLC/PRIME state it's not on the wired network (which is not true). If I do a manual trace, in Prime,  it will work but I can't do a manual trace everytime I get an alert (we're in a major US city). Further investigation shows the lan and wlan mac address of this linksys router is +/- from one another (confirmed by with arp table on access switch and going into prime and looking at the alert).. Which in this case, Prime should see it as WIRED and mark it as a ROGUE and alert me
    Found a document
    http://www.cisco.com/en/US/customer/docs/wireless/prime_infrastructure/1.3/configuration/guide/admin.html#wp1603927 stating only the following switches are supported: 3750, 3560, 3750E, 3560E, and 2960.
    I can't see how these are the only supported devices, most are older than the 4510. I posted this in another thread and a rep provided me the link
    http://www.cisco.com/en/US/products/ps6366/products_tech_note09186a0080b40901.shtml
    Read this and even went further and read ROGUE MANAGMENT WHITE PAPER
    http://www.cisco.com/en/US/products/ps6366/products_tech_note09186a0080b40901.shtml
    This does not mention a limitation of switches support. States if CDP and SNMP is enable, along with the local access switches added to PRIME it should work
    Here is the currently list of deployed devices, code and basic configuration
    Access Switches - 4510 - image: cat4500e-universalk9.SPA.03.02.02.SG.150-2.SG2.bin
    WLC - 5500 - image 7.4.103.9
    AIR-CAP3602I-A-K9 - 152 deployed, 151 are configured for Local Mode, 1 is configured as Rogue Detector (trunked with all access vlan's passing thru)
    RLDP is enabled on all Local Mode AP's - which after reading is not best practice because of time slicing and the fact is degrades client quality and can kick users off
    Basically looking for feedback from others who have deployed wireless and have succesfully configured their environement for ROGUE AP DETECTION with SPT.. What are your thoughts and what do you run?
    Thanks in advance

    Mark:
    Complaints about the performance of Switchport Tracing are pretty common.  The best way to build this out is to start with your planted rogue AP is connected to the same switch that your Prime Infrastructure server connects to--or the first wired switch that ESX/ESXi host connects to--and validate that it works there, make whatever changes you need to get it working, then move the planted rogue AP to the next switch and so on.  The logging modules Configuration, General, Monitor, GUI, System and Tools should cover everything you need to know why Switchport Tracing isn't giving the results you expect.  This "start small and work your way up" helps you learn lessons about what needs to be configured on all your switches to have it working the way you want it to.
    Configuring Switchport Tracing

  • What is the best malwear detection and protection for use on a Mac?

    What is the best malwear detection and protection for use on a Mac?

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is foremost a problem of human behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the left side of the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Can I get the detecting malware alert by System Center 2012 Endpoint Protection in Azure RemoteApp ?

    Can I get the detecting malware alert by System Center 2012 Endpoint Protection in Azure RemoteApp ?
    I want to get the alert and cleanup malware and alert our Azure RemoteApp users.
    the System Center 2012 Endpoint Protection exist Azure Virtual Machine gallery "Windows Server Remote Desktop Session Host”.
    I test the behavior of System Center 2012 Endpoint Protection by TrendMicro Malware sample "EICAR".
    Regards,
    Yoshihiro Kawabata

    Thank you Pavithra for reply.
    I have 3 points for alerting users and admins of Azure RemoteApp template image.
    point 1: Fix action.
      When the user detect a malware, There are some reasons,
      like viewing a malicious web site, like using the vulnerable applications.
      The User must fix his action in Azure RemoteApp session.
      "Hey, the reason is that you open this web site, Don't open this web site"
    point 2: Fix server.
      When the user detect a malware, ITpro of Azure RemoteApp fix the current Azure Virtual Machine of Azure RemoteApp.
      There may be infected with other malwares.
      ITpro need to fix the current Azure Virtual Machine of Azure RemoteApp before infecting other users.
      "Hey, This Azure RemoteApp collection will update with the template image after ten minutes."
    point 3: Fix damage.
      When the user detect a malware, ITpro of Azure RemoteApp research the damage of all system,
      like whether or not sent the infected email to other persons by other malware,
      like whether or not broken other related systems by other malwares.
      "Hey, Are other systems OK ?"
    Regards,
    Yoshihiro Kawabata     

  • Reporting Services 2012 for SharePoint and SQL Server Agent "Subscriptions and Alerts"

    After installing Reporting Services for SharePoint (Denali) in my test farm, I'm trying to configure the "SQL Server Agent" access for Reporting Services.  From Central Admin I'm going to the Reporting Service applicaiton configuration screen and selecting
    "Provision Subscriptions and Alerts".  I've tried both options on this screen.  I've manually executed the "download sql script" in SQL Server, as well as entering a user with SQL sys admin rights on the SQL server into the login fields on the screen. 
    The role and permissions have been created for the application pool service account, but Reporting Services is still trying to connect with the annonymous login because I'm getting the following alert each time I open the "Provision Subscriptions and Alerts"
    screen:
    Login failed for user 'NT AUTHORITY\ANONYMOUS LOGON'
    The "status" on the screen still shows "SQL Server Agent State cannot be determined".  Has anyone else seen this? 
    Thanks!!

    Thanks for your reply!
    1) Looks like the new Reporting Services does not run as a Windows Service so it's not listed in the "Configure Service Accounts" pulldown.  As a result, I don't see how to set the service account.  It's only assigned to an application pool. 
    I installed it into an existing application pool and that application pool "is" in the list and has a domain service account already assigned.
    2) Which users need to be in here in order to configure the "Provision Subscriptions and Alerts" screen?  I already have the farm admin account which is the account I use when running Central Admin.
    3) As mentioned in #1, I've installed Reporting Services into an existing application pool with other service apps.
    4) This link is for Reporting Services 2008 R2 which is very different install process.  But I did follow the SQL Server Reporting Services 2012 RC0 installation instructions and the Reporting Services is functioning correctly with no errors. 
    I'm just not able to configure the sceduling the alerting with interfaces with the SQL Server Agent.
    Thanks!

  • Report and Alert don't executed in the error handler with a JMS proxy service

    Hi,
    I'm working with OSB 11.1.1.4.0 and I'm facing a problem with the error handler of my JMS proxy service.
    My error handler contains two main elements :
    - a Report action
    - an Alert with a JMS destination defined
    When the business service failed the message remain in the queue. It's the expected behavior.
    The problem is :
    - the report is missing
    - the alert is raised but missing in the JMS destination defined in the Alert setting.
    I've noticed if I add a Reply with Failure or Success, Report and Alert are successfully executed.
    Unfortunately the message don't remain in the JMS queue.
    What can I do in order to have my report/alert done and the JMS transaction rollback in order to keep the message in the queue ?
    I've already met this problem in the past with alsb v3 and my solution was to add Service Callout in the error handler in order to externalize these actions.
    This solution is not convenient and I hope another solution is possible.

    Inventorying workgroups can be difficult, especially when it comes to remote access and network security. Because workgroups are not centrally managed, some of the items discussed in this
    wiki article on preparing your workgroup environment may require you to visit each machine individually.
    For non-domain credentials, you do not use the <systemname>\<user> format, you simply enter the user name. Regarding how to enter the credentials, if you have an account that uses the same username and password on all machines and is an administrator
    on all of those machines, then you can enter that in the All computers credentials page of the wizard. You can also do this if they are different user names. However, if some machines have an account with the same user name, such as Administrator,
    but different passwords on each machine, you will need to use the Manually enter computer names discovery method, and then enter the information for each group or each machine.
    As you can tell, workgroup environments can quickly negate any benefit that the agentless inventory nature of MAP provides.
    Please remember to click "Mark as Answer" on the post that helps you, and to click
    "Unmark as Answer" if a marked post does not actually answer your question. Please
    VOTE as HELPFUL if the post helps you. This can be beneficial to other community members reading the thread.

  • Is there a way to exclude specific calendars from Notifications and alerts?

    I have 4 calendars:  1 Exchange and 1 Yahoo that includes 2 shared calendars (wife and MIL).  I activate the Yahoo calendars only when I need them and do not need any yahoo reminders at all.  When I swipe down the Notifications page, it includes all four calendars including the shared Yahoo calendars. What's worse, I get alerts from all four calendars. 
    I only want Exchange alerts and notifications. Is there a way to exclude the Yahoo calendars from Notifications and alerts?
    Right now, the only way I can eliminate them is by deactivating the Yahoo account in Settings/Mail, Contacts, Calendars.

    Is there a way to only choose specific contacts from an existing group and add to a new group? 
     I mean there has be a faster way than typing everybody by hand..

  • Is there a way to automatically detect and delete duplicate photos in a library

    I just imported a load of photos into my main iPhoto '11 Library from several older MAC's Photo Libraries. Despite repeatedly using the "Don't Import Duplicate Photos" dialogue box, I have many duplicate photos. Is there a way to automatically detect and delete Duplicate Photos?
    I also have iPhoto Library Manager installed on my MAC, but cannot seem to locate on it anything that would do this.
    I have over 4,000 photos, so would really appreciate some help here! Thanks in advance...

    duplicate annihilator - http://www.brattoo.com/propaganda/
    And NEVER import an iPhoto library into another iPhoto library - doing so des not work and creates massive duplication
    if you still have all of the original iPhoto libraries I recommend you drag the bad one you created to the desktop (delete it later when everythin has successfully been completed) and start over usin iPhoto Library Manager - http://www.fatcatsoftware.com/iplm/ -  to merge the libraries
    LN

  • Trying to get a Trigger and Alert to work

    So im trying to get a trigger to work with an alert and the Alert seems to be right and the trigger complies which seems right to me, however the instruction that I have in my book does not produce the same output that I get from my Update.
    Here is the deal. I am to log into sql * with a default account as well as login as "SYSTEM"
    the trigger should invoke the Alert and output a message to re-order some more product and the status should = 0 since there is no wait time. However I don't get a "Message" from the Alert and the status = 1 which indicates timeout. So if you can take a look at my code and let me know what I did wrong or how to "Connect" the two that would be great.
    Trigger I created.
    CREATE OR REPLACE TRIGGER order_replace_trg
    AFtER UPDATE OF stock on bb_product
    FOR EACH ROW
    WHEN (OLD.stock = 24 AND NEW.stock = -2)
    DECLARE
    stock NUMBER(5,1);
    idproduct NUMBER(2);
    lv_msg_txt VARCHAR2(25);
    lv_status_num NUMBER(1);
    reorder NUMBER(3);
    BEGIN
    IF stock <> 24 AND reorder = 25 THEN
    lv_msg_txt := 'Product 4 Reorder Time!';
    DBMS_OUTPUT.PUT_LINE(lv_msg_txt);
    ELSE
    lv_status_num := 0;
    DBMS_OUTPUT.PUT_LINE(lv_status_num);
    END IF;
    END;
    The Alert:
    BEGIN
    DBMS_ALERT.REGISTER('reorder');
    END;
    DECLARE
    lv_msg_txt VARCHAR2(25);
    lv_status_num NUMBER(1);
    BEGIN
    DBMS_ALERT.WAITONE('reorder', lv_msg_txt, lv_status_num, 120);
    DBMS_OUTPUT.PUT_LINE('Alert: ' ||lv_msg_txt);
    DBMS_OUTPUT.PUT_LINE('Status: ' ||lv_status_num);
    END;
    Here is the block I need to run to test the trigger and alert.
    UPDATE bb_product
    SET stock = stock -2
    WHERE idproduct = 4;
    COMMIT;
    The message I should get is:
    Alert: Product 4 Reorder Time!
    Status: 0
    PL/SQL procedure successfully completed.
    This is what I get.
    SQL> /
    Alert:
    Status: 1
    PL/SQL procedure successfully completed.
    Thanks for your help!
    Mac

    Right. Register says "I'm interested in getting alerted to some particular event", Waitone says "I'm waiting until some event happens". Signal is the key thing that indicates that a particular event happened.
    As for your trigger, a couple of issues
    - I don't know why you're calling DBMS_OUTPUT. I'm guessing that you probably want to send a message along with your alert that the receiver gets and displays, not that you want to print a message to the window from inside the trigger.
    - You're using the local variables stock and reorder in your IF statement but you never initialize them. I'm guessing that you would want to eliminate those local variables and just use :new.stock and :new.reorder (assuming that REORDER is a column in the table).
    - Your WHEN clause doesn't seem to make sense. It's telling the trigger to fire only if you update stock from 24 to -2, which doesn't make sense. I'm not sure you would even need a WHEN clause here.
    Justin

  • A serious error has been detected and Adobe EPIC_APP cannot continue

    I have Adobe Acrobat Professional installed as part of a legal copy of CS3 Web on a Dell Lattitude D830 with Vista Business SP1. I have been using Acrobat without a problem until the latest update (8.1.2). After the installation I now get "A serious error has been detected and Adobe EPIC_APP cannot continue. Please reinstall the application and try again".
    PS I opened Photoshop, Dreamweaver and other programs in the suite and do not have a problem. A search on the forums and Google shows other people with the same problem but no solution. Any suggestions?

    An answer I found on Yahoo seems to solve the problem. I'm leaving it here in case someone else has the same problem:
    Uninstall.
    Reboot.
    Install with Admin privileges ( right-click on setup.exe >Properties>Compatability Tab> Select Run as Admin)
    Run it at least once from an admin account so it has access to Shell32.dll and can set the proper settings.

  • Please, Help Embedding Fonts in TextArea , TextInput and Alert Components

    Please, forgive my bad english.
    Here is my problem (using Flash CS3 ActionScript 2).
    I have on the stage :
    • an instance of TextArea with Instance Name :
    message_ta
    • an instance of TextInput with instance Name : name_ti
    • and I have in the library an instance of Alert
    component, with default linkage Identifier : Alert
    for each one of this components I need to embed the same
    font.
    I already created a New Font in the library, choosing the
    font I want to use, giving it name "my_font" and size 8px.
    Now, please, can someone help me to write the actions to
    embed that font (my_font) inside the TextArea, TextInput and Alert
    components ?
    Thank you .

    You're right,my mistake, components don't have a font
    parameter, I was thinking of the textField. In any case you can use
    setStyle.
    1. Import the font(s) that you want to use into your movie's
    Library.
    2. Set each font's Linkage to be exported for Actionscript.
    Set the identifier name as you like
    3. Set your component(s) on the stage.
    4. Name each component instance.
    5. In a frame action space, define the style for each
    component:
    componentName.setStyle("fontFamily","fontName");
    componentName.setStyle("fontSize",12);
    componentName.text = "hello";
    componentName.embedFonts = true;
    There is a section in the online help that lists the various
    style properties that you can set for each component.

  • "Conflict Detected" and/or "Changed on Disk" immediately after saving

    My setup:
    I've got a workstation and a laptop (Win 7 x64) that I use Lightroom 4.1 on both.  When files are imported, they are saved to a Windows 2008 (x64) server that I have so that I can work from either machine.  Everything is connected via gigabit ethernet.
    The problem:
    Both installations of LR4.1 are set to save metadata immediately, however, this never seems to happen.  A conflict or change always seems to be detected and I have no clue why.  This means that my catalog ends up being the only place the changes are kept unless I manually save the metadata and overwrite the changes (which may write the changes, but the files seem to pop back up immediately as conflicted).  This is NOT a problem because I'm using two machines, the problem exists whether I'm using just my workstation with the laptop powered off.
    Things I've tried that haven't helped:
    The server is on a UPS so I have disabled write-cache dumping to ensure as fast as possible access.
    Disabled AV from read/writing to these files and white listed Lightroom all together.
    Disabled NTFS Last Access updating.
    I switched from using .nef and .xmp sidecar files to using a straight DNG workflow.
    I've monitored file access via "Process Monitor" and can confirm nothing but Lightroom and system processes are touching the files on the client and server.
    I've tried enabling and disabling local network file caching (very useful if I can get it working on the laptop, because I can import into LR4.1 while I'm away from the server and it will automatically sync when my laptop is back on the same LAN as my server).
    Any ideas?

    Ive just been looking for the same. Theres an article (and a class) on javaworld on subject of saving bitmap-files, and in another thread in this forum, a guy described how to make jpg. with the jdk1.4 .... Like this:
    int w = comp.getWidth();
    int h = comp.getHeight();
    BufferedImage im = new BufferedImage(w, h, BufferedImage.TYPE_INT_RGB);
    Graphics2D g2 = im.createGraphics();
    comp.paint(g2);
    g2.dispose();
    ImageIO.write(im, "jpeg", new File("foo.jpeg"));
    im.flush();
    Im just referring, havent tried it yet. Good luck.
    Stig.

  • Regd: CCMS and Alert ?

    Hi @,
    I have some doubts regd CCMS and Alert :
    1.Whether CCMS config is mandatory to use alerts ?I havefound in some places tht it is not required then where will be alert available if i trigger
    2.Steps to configure CCMS to include XI as it is not configured in my system?
    REgards

    1.Whether CCMS config is mandatory to use alerts ?I havefound in some places tht it is not required then where will be alert available if i trigger: AlertInbox
    2.Steps to configure CCMS to include XI as it is not configured in my system?
    Follow these guidelines:
    Alerts
    transaction handling in XI
    /people/michal.krawczyk2/blog/2005/03/13/alerts-with-variables-from-the-messages-payload-xi--updated
    • Auto triggering of alerts
    transaction handling in XI
    • SCOT
    not sending email from alert inbox
    CCMS ALERTS
    /people/sap.user72/blog/2005/11/24/xi-configuring-ccms-monitoring-for-xi-part-i
    /people/sap.user72/blog/2005/12/05/xi-grmg-customizing-for-xi-ccms-heartbeat-monitoring-part-ii
    /people/aravindh.prasanna/blog/2006/02/20/configuring-scenario-specific-e-mail-alerts-in-xi-ccms-part-3

  • Exception Handling in Message Mapping and Alert

    Hello,
    1. Pls let me know the concept of Exception Handling and Alerts.
    2. Pls provide some blogs for Exception Handling in Message Mapping.
    3.What are Alerts and how it help us in XI. Pls provide some blogs for Alert
    4.How are Alerts and Exception Handling can be related say for some scenario
    Regards

    Hi,
    Plz check out these blogs of Sravya on Error Handling:
    /people/sravya.talanki2/blog/2006/11/22/error-handling-framework-xiout-of-the-box-episode-1
    /people/sravya.talanki2/blog/2006/11/23/error-handling-framework-xiout-of-the-box-episode-2
    Also check this SAP Presentation:
    https://www.sdn.sap.com/irj/sdn/go/portal/prtroot/docs/library/uuid/9418d690-0201-0010-85bb-e9b2c1af895b
    /people/alessandro.guarneri/blog/2006/01/26/throwing-smart-exceptions-in-xi-graphical-mapping
    Error Handling :
    http://help.sap.com/saphelp_nw04/helpdata/en/56/b46c3c8bb3d73ee10000000a114084/frameset.htm
    Alerts:
    /people/michal.krawczyk2/blog/2005/09/09/xi-alerts--troubleshooting-guide
    /people/michal.krawczyk2/blog/2005/09/09/xi-alerts--step-by-step
    http://help.sap.com/saphelp_nw04/helpdata/en/56/d5b54020c6792ae10000000a155106/content.htm
    BPM:
    /people/arpit.seth/blog/2005/06/27/rfc-scenario-using-bpm--starter-kit
    Working with acknowledgements
    regards

  • Purchased ringtones and alerts disappeared after updating to iOS 8.2

    since updating to iOS 8.2 purchased alert tones and ringtones have disappeared and following the restore times link does not restore them. Also, cannot update any apps from the App Store. How do I get back my purchased ringtones and alert tones?

    Greetings EmmsieK13,
    It sounds like you were trying to connect to the App Store when there were some system issues.
    You can check the status at
    Apple - Support - System Status
    Note you can scroll back on the Detailed Timeline by clicking the back button to see some previous days.
    Since the systems show they are up now, please try again and see this article for restoring your alert tones and ringtone purchases.
    Restore missing tones on your iPhone, iPad, or iPod touch running iOS 8.1.1 - Apple Support
    There's a section for "Restore your tones from the iTunes Store".
    Thank you for visiting Apple Support Communities.
    Nubz

Maybe you are looking for

  • How to compile a class from a Servlet using ant!!!

    Hi I have the following problem: I have a Servlet that must compile a java class. Here is the code that i use to compile: File buildFile = new File(build.xml path); String[] arg = { "-buildfile", buildFile.toString(), "compile" }; Properties userProp

  • Xfce runs some apps twice at startup

    Usually Xfce runs conky and keepassx twice during the startup. I tried cleaning ~/.cache/sessions while unlogged, but it didn't work. These apps figure only once in xfce4-sessions-settings and these are my settings.

  • PNG Metadata and Adobe Products

    Hi All. I have written a piece of code that inserts xmp metadata into a PNG file, using the method supplied by Adobe (ie. inserting a new iTXT chunk with the keyword "XML:com.adobe.xmp" followed by the xmp metdata). I am pretty sure I have done this

  • How do you configure 8.1.7 NT/IFS 1.1 to use Apache for IFS?

    Now that the 8.1.7 version for NT and IFS 1.1 is out how do you configure it to use Apache for IFS? There is no 'ifsapachesetup' file included in the download (the CDs are still not available). Installed 8.1.7 database on a clean (no oracle) PC runni

  • Having trouble upgrading to Leopard......

    First off, sorry if this seems like a stupid or obvious question. I'm currently running Panther and am trying to upgrade to Leopard but after I insert the CD and restart it goes to a dark gray screen and then I get that spinning pin wheel and it just