Cross line to dispaly in layout..anybody help me??

Hi,
I know how to disaply vertical & horizontal lines.
I've to display a cross line, which resembles " / ".
Any body can help me out
Regards,
Raja.
Message was edited by: raja gurrala

Hi raja,
1. Intersection of vertical and horizontal line
   = criss/cross line
   eg +  (plus sign)
2. I don't think (i could n't find)
  any ascii character
  which could be used in abap for printing puropse.
3. At the most +
   is there, but it won't MIX/MATCH with
   horizontal & vertical lines
   _________-- ||||||||||||
regards,
amit m.

Similar Messages

  • Crossed line for past 10 days.NO HELP from BT what...

    I have had a crossed line for the past 10 days. Its actually crossed with a talktalk number with a house on the next street.
    They get our calls i get theirs.
    BT have done nothing.
    What part of  "can you please fix this problem?" do you not understand?

    This is a BT residential customer to customer forum. Your post does not go to BT.
    You need to contact BT and report the problem to them.
    See link for contact details.
    https://bt.custhelp.com/app/contact#h=eyJzdGVwMCI6ImNvbnRhY3RJdGVtTGluazU2MjciLCJzdGVwSWR4IjoxLCJzdG...

  • Crossed line in SmartForm Layout

    Hi All,
    There is a requirement in my project, One form should be developed with crossed line.
    How we are dividing a square in to two equal Triangles by using a crossed line, Like that I should design in my layout.
    How Can I print ?
    Advance Thanks to Helpful answers.
    Regards,
    Suresh

    Hi,
    Only option I could think of is creating a black and white image with the cross feed line. The image size should be the same as your page size. Then import the bitmap image in Application server using SE78. Then use Background Picture tab in the page options in SMARTFORMS to use the same as background. This would give your page a look of Cross Feed lined page.
    Thanks.
    Ravi

  • E book" it tells me that the bI have prepared a photobook, made a pdf and when I press "buy the book is missing photos on one ore more pages. The book does not miss any photos or text, all layouts are ok, the background color is ok. Can anybody help me?

    I have prepared a photo book, made a pdf and when I press "buy thhe book" it tells me that the book is missing photos on one ore more pages. The book does not miss any photos or text, all layouts are ok, the background color is ok. Can anybody help me?

    You are missing one or more photos - youprobably have a page background that requires a photo which is behind a page with photos on it - all pages must either have a photo or be a color - if you have a gray background it requires a photo - look through the book carefully and be sure to look at the background on any full page photos - you will find one or more missing photos
    LN

  • Cross lines in voip. help needed !!

    hi all ,
    i wasnt much familiar abt cross lines in voip (though we get cross lines on PSTN) till i got cross line last week.
    I got a GK to which my GWs will get registered to ,
    there were two GWs with same GW ID , registered with
    my GK which caused cross line for first time.
    (note: either it can be duplication of ID or duplication of IP)
    but now the problem is , im getting CROSS line when im on a confrence call. it happened two or 3 times , but when i checked all my GWs are registed with the GK properly , there wasnt any duplicaiton on ID or IP. cna some one help me in this issue ?
    thanks
    Prashanth

    The reason why crosstalk occurs in the first place is because long cable runs radiate some power, and cables that are run parallel to them will pick up this radiation by induction.
    Check out your cabling . the pin numbers and the cable corresponds according to specfication .

  • Data Model Layout (crossing lines)

    Hi Everybody,
    I downloaded the SQL Data Model and doing some modeling. It is doing a good job.
    How can I adjust the crossing lines in the diagram. I am not able to bend the relationship lines.
    Are there any hidden (undocumented) shortcut KEYS to do that?
    Where can I find those defined shortcut KEYS?
    Do we have an auto layout option to adjust the Entities and relationships in a page?
    Thanks in sharing your experience.

    Hi,
    you need to switch "Auto route" off and you'll be able to position manually the lines.
    Do we have an auto layout option to adjust the Entities and relationships in a page?There is limited "auto layout" functionality in relational model but it's not page oriented.
    Philip

  • I am facing problem regarding graphical user interface. I am using text box for editing files. I want to show the line numbers and graphical breakpoint​s along with text box. Can anybody help me in this? Thanks.

    I am facing problem regarding graphical user interface. I am using text box for editing files. I want to show the line numbers and graphical breakpoints along with text box. Can anybody help me in this? Thanks.

    Thanks for you reply.
    But actually I don't want to show the \ (backslashes) to the user in my text box. 
    Ok let me elaborate this problem little more. 
    I want to show my text box as it is in normal editors e.g. In Matlab editor. There is a text box and on left side the gray bar shows the line numbers corresponding to the text. Further more i want that the user should be able to click on any line number to mark specific line as breakpoint (red circle or any graphical indication for mark). 
    Regards,
    Waqas Ahmad

  • Can anybody help? My Safari browser keeps crashing. The whole window just turns grey.

    Can anybody help? My Safari browser keeps crashing on iMac 10.7.5. The whole window just turns grey. It started happening around the time of the new bookmarks menu upgrade recently which changed the bookmarks to be only on the side and makes it so you can see all your bookmarks while browsing.  I know I have a lot of bookmarks, so I tried hiding them, but it still happens. I ALREADY TRIED CLEARING MY HISTORY, AND THAT DID NOT HELP, AND I HAVE NO EXTENSIONS FOR THIS BROWSER.
    Does the fact that I am in Brasil have anything to do with it?
    Thank you to anyone who can help. In case no one can come up with an answer, is there an easy way to transfer my bookmarks from safari to either firefox or chrome?
    Much appreciated.

    1. This is a comment on what you should and should not do to protect yourself from malicious software ("malware") that circulates on the Internet. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
       3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you always stay within a safe harbor of computing practices. How do you know what is safe?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is unsafe.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are outside the safe harbor, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe. For instance, if a web page warns you that Flash is out of date, do not follow an offered link to an update. Go to the Adobe website to download it, if you need it at all.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    "FREE WI-FI !!!" networks in public places are unsafe unless you can verify that the network is not a trap (which you probably can't.) Even then, do not download any software or transmit any private information while connected to such a network, regardless of where it seems to come from or go to.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. Most of the real-world danger of malware attack comes from highly targeted "zero-day" exploits that are not yet recognized.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Cross line in Ekbe

    Hi friends
    I have 2 question.
    P.S. I am using OO ALV please give me your response in OO ALV because I cann't convert Reuse_alv... codes into OO ALV
    1- I am creating a variant it is sorting ebeln and calculate ebelp column in subtotal line. Can I display only subtotal line? I don't want display items in the list. (It is an option. If user want display only totals I want show only totals.)
    2- Some users adding items in ekbe table after that they cross line this item. Meaning
        .....  120,21
        ..... -120,21
    How can I block this cross lines in my application? Do you have any technique?
    1000000004 10     1 2006 5000000312 E     101     950,000
    1000000004 10     1 2006 5000003501 E     101     1.064,000
    1000000004 10     1 2006 5000003593 E     102     1.064,000
    1000000004 10     1 2006 5000004238 E     101     1.064,000
    This lines from my ekbe table. When I select this data I want give only first and last lines. Becuase 2 and 3 lines are cross lined. (They have reference field their reference field is same)
    How can I modify my select statement.
    Select * from Ekbe Where Ebeln = p_ebeln and ebelp ? p_ebelp and bewtp = 'E'.
    Sorry for my poor english

    Hello Mehmet,
    To display only subtotals lines, do as follows. I will give you an example using program BCALV_GRID_DEMO, which is an example program for ALV grid.
    Run the program to display the data. Select the column Airfare and select the total/aggregation button (the green sigma sign). This produces totals on Airfare.
    Now select on the ID column, and click the subtotal button (next to the total button). This produces subtotals by the ID column.
    Finally, use the dropdown on the subtotal button, and select the Drilldown Sum Lvl option. Choose the level 1 item (which represents the subtotal for Airline ID). The list now only shows the subtotal items.
    This should answer the first part of your question. You can also programatically create layout variants like this to do the same. (There is documentation in the online help).
    I am not sure what you mean with the second part of the question.
    Regards,
    Martin

  • My camera in twist s230U after upgrade to win 8.1 show a diagonal cross line

    After windows 8.1 update I am unable to use my camera for skype in my twist S230U and take a snap.It shows a diagonal cross line in the camera image but the camera light shows up,.getting click sound but camera could not take a picture or use video in skype.Any solution please/
    Solved!
    Go to Solution.

    I also had this problem and could not find the detailed solution but this thread did help me get the camera going. I tried uninstalling the camera device, downloading the latest driver and re-installing, rebooting and no change.
    What did work immediately for me was to go to the "Lock Screen" settings then “Swipe down on the lock screen to use the camera” setting,  turn it off, then back on, (it was already on) and the camera was back to normal once again.
    My suggestion is to do this first, before anything else, and see if it works for you?
    Here's an article about accessing the lock screen settings:
    http://www.technologyguide.com/feature/how-to-do-everything-new-in-windows-8-1-microsoft/

  • I recently update Safari and it crashes every time I opened. Can anybody help me?

    I recently update Safari and it crashes every time I opened. Can anybody help me?

    Launch the Console application in any of the following ways:
    ☞ Enter the first few letters of its name into a Spotlight search. Select it in the results (it should be at the top.)
    ☞ In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. The application is in the folder that opens.
    ☞ Open LaunchPad. Click Utilities, then Console in the icon grid.
    Step 1
    For this step, the title of the Console window should be All Messages. If it isn't, select
              SYSTEM LOG QUERIES ▹ All Messages
    from the log list on the left. If you don't see that list, select
              View ▹ Show Log List
    from the menu bar at the top of the screen.
    In the top right corner of the Console window, there's a search box labeled Filter. Initially the words "String Matching" are shown in that box. Enter the name of the crashed application or process. For example, if iTunes crashed, you would enter "iTunes" (without the quotes.)
    Each message in the log begins with the date and time when it was entered. Select the messages from the time of the last crash, if any. Copy them to the Clipboard by pressing the key combination command-C. Paste into a reply to this message by pressing command-V.
    ☞ The log contains a vast amount of information, almost all of which is irrelevant to solving any particular problem. When posting a log extract, be selective. A few dozen lines are almost always more than enough.
    Please don't indiscriminately dump thousands of lines from the log into this discussion.
    Please don't post screenshots of log messages—post the text.
    ☞ Some private information, such as your name, may appear in the log. Anonymize before posting.
    Step 2
    In the Console window, select
              DIAGNOSTIC AND USAGE INFORMATION ▹ User Diagnostic Reports
    (not Diagnostic and Usage Messages) from the log list on the left. There is a disclosure triangle to the left of the list item. If the triangle is pointing to the right, click it so that it points down. You'll see a list of crash reports. The name of each report starts with the name of the process, and ends with ".crash". Select the most recent report related to the process in question. The contents of the report will appear on the right. Use copy and paste to post the entire contents—the text, not a screenshot.
    I know the report is long, maybe several hundred lines. Please post all of it anyway.
    If you don't see any reports listed, but you know there was a crash, you may have chosen Diagnostic and Usage Messages from the log list. Choose DIAGNOSTIC AND USAGE INFORMATION instead.
    In the interest of privacy, I suggest that, before posting, you edit out the “Anonymous UUID,” a long string of letters, numbers, and dashes in the header of the report, if it’s present (it may not be.)
    Please don’t post other kinds of diagnostic report—they're very long and rarely helpful.

  • Can anybody help out in ALE?

    Hi friends,
                  Can anybody help me out by giving the navigation steps of configuring the ALE.......Please urgent
    Useful Answers will be definetly rewarded points.

    hi,
    1.     INTRODUCTION TO ALE DEVELOPMENT
    To develop a new custom ALE scenario, comprises 5 steps:
    1.     Design and develop the custom IDoc with it’s segments and a new message type
    2.     Configure the ALE environment with the new IDoc and message type (customer model, partner profiles and linking IDoc to message type)
    3.     Develop the outbound process which does the following:
    •     Populates the custom IDoc with control info and functional data
    •     Sends the IDoc to the ALE layer for distribution
    •     Updates status and handles errors
    4.     Configure the ALE inbound side (partner profiles with inbound process code)
    5.     Develop the inbound process which does the following:
    •     Reads the IDoc into a BDC table; selects other data that is required
    •     Runs transaction using call transaction or BDC session
    •     Updates status and handles errors
    2.1.     Create IDoc type (WE30) Client independent
    The IDoc type refers to the IDoc structure that you will require for your development
    To create the IDoc type, follow these next few steps:
    •     Enter transaction WE30 (ALE -> Extensions -> IDoc types -> Maintain IDoc type)
    •     Type in ZINVRV01 and click on Basic IDoc type, click the Create icon
    •     Click on Create new (we are creating an IDoc from scratch but you may want to copy another IDoc if it is similar to your requirements) and enter a description, and press enter
    •     Click on ZINVRV01 and then on the Create icon
    •     Enter Z1INVRV as the segment type (must start with Z1), check mandatory if the segment must exist (in this case check it), enter 1 in minimum number and 1 as maximum number. (Make the maximum number 9999999999 if there are going to be many of these segments in each IDoc. IE. When line items are passed via IDocs), click on Segment editor
    •     Enter a description for your segment type and create
    •     Enter a description for your segment, enter each field required in your IDoc, in our case type LIFNR across for Field name, DE structure and DE documentation, repeat for XBLNR and press enter to validate.
    •     Save and generate, press back
    •     To release the segment choose Goto, Release from the menu
    •     Check the box on the line of your new segment
    •     Save, back and enter
    •     Your IDoc type structure should be displayed with your new segment
    •     Save and back
    •     To release the IDoc type choose Extras, Release type from the menu and Yes
    Your IDoc is now ready for use. If you need to add fields or segments to your IDoc type, you will need to cancel the release of the IDoc type as well as the segment release using a similar
    procedure followed above (except now you uncheck the release box for the segment and you choose cancel release for the IDoc type).
    2.2.     Create message type (WE81) Client independent
    To create a new message type, follow these next few steps:
    •     Enter transaction WE81 (ALE -> Extensions -> IDoc types -> Maintain message type for intermed. Structure -> Create logical message type)
    •     Choose Create logical message type by double clicking on it
    •     Click on change icon to enter change mode
    •     Click on New entries to add a new type
    •     Enter the required message type, in our case it is ZINVRV and an appropriate description
    •     Save and exit.
    Your message type has now been created. The next step will be to link it to the IDoc.
    2.2.1.     Link message to IDoc type (WE82 & BD69) Client independent
    To link the message type to the IDoc type follow these next few steps:
    •     Enter transaction WE82 (ALE -> Extensions -> IDoc types -> Maintain message type for intermed. Structure -> EDI: Message Types and Assignment to IDoc Types)
    •     Click on change icon to enter change mode
    •     Click on New entries to create the link
    •     Enter the message type ZINVRV and the BasicIDoc type as ZINVRV01
    •     Save and exit
    •     Enter transaction BD69 (ALE -> Extensions -> IDoc types -> Maintain message type for intermed. Structure -> Assign message type to IDoc for ALE)
    •     Click on change icon to enter change mode
    •     Click on New entries to create the link
    •     Enter the message type ZINVRV and the BasicIDoc type as ZINVRV01
    •     Save and exit
    Your IDoc is now linked to your message type. We still need to link object types and add the message to the model before we can use the message.
    2.2.2.     Maintain object type for message type (BD59) Client independent
    The ALE objects are used to create links between IDocs and applications objects, to control the serialisation, to filter messages in the customer model and to use listings.
    For our own message type and IDoc you must maintain object types for the links.
    If you want to check the serialisation for the message type, then you must maintain object types for the serialisation. If no serialisation object has been maintained for a given message type, then the serialisation will not be checked for this message type.
    To add an object type to our message type, follow these next few steps:
    •     Enter transaction BD59 (ALE -> Extensions -> ALE object maintenance -> Maintain object types)
    •     Type in your message type ZINVRV and press enter
    •     Click on New entries
    •     Enter your object type, LIFNR (We need to use the vendor as a filter object), the segment name where LIFNR resides, Z1INVRV, a number 1 for the sequence followed by the actual field name LIFNR
    •     Save and exit.
    You have now created an object that we’ll use as a filter object in the customer model to direct the flow of messages to the various logical systems based on the vendors in the filter of the message type ZINVRV.
    We now need to add our new message type to the distribution model.
    2.3.     Configuring the Distribution Model
    This task is performed on your ALE reference client.
    2.3.1.     Manual Configuration (BD64) Client dependent
    To manually configure the customer distribution model, read the ALE configuration procedure, and follow these steps:
    •     Perform the Maintain customer distribution model directly function. (ALE -> Distribution customer model -> Maintain customer distribution model directly)
    •     Specify the customer model you want to maintain and the logical system that is to be the sender of the messages OR create a new model. (Create model ALE with logical system ALELS1C400)
    •     Choose the receiving systems to which the sending system must forward message type ZINVRV to.
    •     For each receiving logical system allocate the message type necessary for communication to the receiving systems as per ALE configuration procedure.
    •     Create filter objects (in our case LIFNR as the object type with the associated vendor number, 0000018001 with leading zeros, in the object area) for the message types.
    •     Save the entries.
    NOTES:
    You cannot maintain a message type between the same sender and receiver in more than one customer distribution model.
    Only the owner is authorised to modify the model.
    To change the owner of a model, choose the 'Maintain ownership of customer distribution model' function. Make sure that all changes will be distributed to all systems that know the corresponding model. To do so, you can use the correction and transport system.
    To transport the customer distribution model you should use the Distribute customer model function of the IMG as described below.
    2.3.2.     Distribute customer model (BD71) Client dependent
    After the customer model has been created centrally, it must be distributed to the other remote systems. This entails first of all setting up the communication for the distributed systems and then sending the model.
    2.3.2.1.     Distribute Model (BD71) Client dependent
    This task is performed on your ALE reference client. To distribute the customer distribution model, read the ALE configuration procedure and follow these steps:
    •     Make the settings for the communication with the other decentral systems, you have not set them yet.
    •     Define the RFC destination for R/3 connections whose names correspond to the name of the corresponding logical system.
    •     Create the output partner profile.
    •     Distribute the customer model
    •     Specify the name of the customer model.
    •     You must specify the target system to which you want to distribute the customer model.
    •     You must repeat this function for every distributed logical system.
    2.3.2.2.     Maintain sending system partner profile (WE20) Client dependent
    With this function, you define the partner profiles for all outbound and inbound messages on the basis of the customer distribution model.
    After you have defined and distributed the customer model, you will have to maintain the partner profiles locally. To do this read the ALE configuration procedure.
    •     Enter the output mode (background, immediately) and the package size for outbound processing.
    Requirements
    •     The customer model must be maintained.
    •     RFC destinations must be maintained.
    •     The customer model must be distributed.
    •     To ensure that the appropriate persons in charge are informed if a processing error occurs, you must make settings in: Error processing Maintain organisational units.
    2.4.     Populate & distribute IDoc using ABAP
    An IDoc consists of a control record with structure edidc and one or more data records with structure edidd. The control record contains the sender and recipient of the IDoc, as well as information on the type of message.
    To be able to pass an IDoc to the ALE layer, you must set up a field string with structure edidc and an internal table with structure edidd. They are used to call function module master_idoc_distribute, which performs the save to the database and triggers the dispatch if necessary.
    Hope this helps, Do reward.

  • I am trying to shift my backup folder for many weeks to another location/drive on my pc hard drive(windows xp). have tried to use the recommended JUNCTION for the same but do not have a complete step by step instruction to do that. can anybody help me

    i am trying to shift my backup folder for many weeks to another location/drive on my pc hard drive(windows xp). have tried to use the recommended JUNCTION for the same but do not have a complete step by step instruction to do that. can anybody help me

    You can redirect <Profile>\<AppData>\Apple Computer\MobileSync\Backup to a folder on another drive using NTFSLink (shell ext., might only work on XP) or Junction (cmd line tool).
    In essence you move the existing folder to a new location, create an empty folder where the old one used to be, then get the operating system/tool to link the two togther and silently redirect any file operation on the old location through to the new one.
    tt2

  • Can anybody help me with the product costing report... URGENt!!!!!

    Hi,
    Can anybody help me with the logic. teh present logic is given below. But as per the new requirement in the Selection screen when I add Material as Select Options then Logic should "expecting to get the report either in Product Group or (single/multiple/range) Material" . Please reply ASAP.
    get the list of product groups based on the range entered by the user.
      SELECT KSTRG FROM CKPH INTO TABLE I_KSTRG
                   WHERE KSTRG IN SO_KSTRG.
    for each product explode the hierarchy get all sub product groups
      LOOP AT I_KSTRG.
        CLEAR I_CKPH. REFRESH I_CKPH.
        CALL FUNCTION 'K_CKPH_GET_HIERARCHY'
             EXPORTING
                  DATBI     = '99991231'
                  KSTRG     = I_KSTRG-KSTRG
             TABLES
                  CKPH_I    = I_CKPH
             EXCEPTIONS
                  NOT_FOUND = 1
                  OTHERS    = 2.
        IF SY-SUBRC EQ 0.
        save all unique product groups within the hierarchy.
          LOOP AT I_CKPH.
            MOVE 'EQ' TO F_KSTRG-OPTION.
            MOVE 'I' TO F_KSTRG-SIGN.
            MOVE I_CKPH-KSTRG TO F_KSTRG-LOW.
            COLLECT F_KSTRG.
            MOVE I_CKPH-KSTRG TO KSTRG-LEVEL2.
            MOVE I_CKPH-UEKTR TO KSTRG-LEVEL1.
            COLLECT KSTRG. CLEAR KSTRG.
          ENDLOOP.
        ENDIF.
      ENDLOOP.
    SORT KSTRG BY LEVEL2 LEVEL1.
    check if there are product groups extracted.
      CLEAR Z_LINES. DESCRIBE TABLE F_KSTRG LINES Z_LINES.
      IF Z_LINES GT 0.
    get the materials attached to each product group.
        SELECT KSTRG WERKS MATNR
          INTO CORRESPONDING FIELDS OF TABLE I_CKPE
          FROM CKPE
          WHERE KSTRG IN F_KSTRG
            AND WERKS = PA_WERKS.
      IF NOT I_CKPE[] IS INITIAL.
    get the order info order number & object number
          SELECT AFPOMATNR AUFKOBJNR
             INTO CORRESPONDING FIELDS OF TABLE I_AFPO
             FROM AFPO AS AFPO INNER JOIN AUFK AS AUFK
             ON AFPOAUFNR = AUFKAUFNR
             FOR ALL ENTRIES IN I_CKPE
           WHERE AFPO~MATNR = I_CKPE-MATNR.
        ENDIF.
        SORT I_AFPO BY MATNR.
        LOOP AT I_CKPE.
      get the division for the material.
          CLEAR: Z_SPART, MARA.
          SELECT SINGLE SPART
                   INTO Z_SPART
                   FROM MARA
                  WHERE MATNR = I_CKPE-MATNR
                    AND MTART = 'ZTFG'.
          MARA-SPART = Z_SPART.
        only proceed with processing if division is within users selection
          IF Z_SPART IN SO_SPART.
            LOOP AT I_AFPO WHERE MATNR = I_CKPE-MATNR.
              CLEAR: Z_MATERIAL_FLG, Z_EXPENSES_FLG, Z_SCRAP_FLG,
                     Z_OUTVAR_FLG, Z_ACTIVITY_FLG.
              LOOP AT I_COEP WHERE OBJNR = I_AFPO-OBJNR
                              AND  VRGNG NE 'KOAO'.   "changed by Kasturi
                PERFORM GET_DATA_FOR_REPORT TABLES I_DATA I_DATA_QTY.
                ENDLOOP.
              ENDLOOP.                       "afpo
            ENDIF.                           "division check
          ENDLOOP.                           "ckpe
        ELSE.
      no product groups extracted.
         MESSAGE i011.
      ENDIF.

    Has this been resolved?
    Your requirement is not clear. Could you please elaborate more about the output required?
    Thanks,
    F~Y

  • I have done the new update and my itunes account is using another iphone i have on the computer can anybody help

    hi, i did the new software update on my phone today but there is another iphone thats connnected to the same computer i now have all their bank details coming up then when i have changed them it brings up a completely different email address to mine it has now put every single photo that is on my computer onto my phone. can anybody help?

    i called apple and they are sending me snow leopard so i should, *fingers crossed, be able to run the newer version of itunes. we'll find out for sure in a few days when it arrives

Maybe you are looking for

  • File to RFC

    The scenario is file to RFC. The RFC is called via a BPM, which receives back the respond from the RFC as well. I am finding a red flag at the receiver end in the MONI. When I click on the PE in the MONI  I find ,in the workflow diagram that the file

  • Using own modem and router

    Hi, I've decided not to use the home hub 4 and to use my own modem equipments. I was told that I only need to enter [email protected] as login name and password as password, then internet should work... It is strange because the modem could get an IP

  • IE 10 appending unselectable=on

    I am working on a website. In the UI, a dropdown menu is not working. Using the Dev tools, came to know that IE 10 is somehow appending "unselectable=on" for the <div> which contains the dropdown menu. The code does not have anywhere unselectable att

  • Photoshop CS6 random color shifts

    Here's the lowdown on my system/machine: Photoshop CS6 (version 13.0.4) Mac platform, OSX (version 10.8.4) 2 x 2.4 GHz Quad-Core Intel Xeon I'm having  problems with color shifts in a batch of images from a common Photoshop document. I make 28 images

  • CS6 beta along side CS5

    Will there be any conflict to installing CS6 in Win 7 64 without uninstalling CS5? I've been trying it out on Win 8 but hit a snag (no drivers for certain HW) and I really don't wish to uninstall CS5.