Difference between Equipment deletion and deactivation

Hi Experts,
Greetings
Can somebody clear me that what is is the difference deactivation of equipment and flag for deletion of an equipment
Thanks in advance.
R.A.Kiran

Hi,
    If u mean to stop reversing it then .. i believe u should be able to do it via User status ..
You should have a user status that gets activated with business transaction Mark for Deletion - You should make this as SET
& for business transaction Remove deletion Flag - You should make this as Forbid .., the lowest and highest status nos should be same - means once this status is there the user status will not go to other status ..
I was able to do it in my system -check it
regards
pushpa

Similar Messages

  • What is the difference between 'command delete' and using 'delete original and all versions'?

    My masters are not referenced and I usually have only one version.  What is the difference between using 'command delete' versus going to the top menu bar and using 'dele

    Good question  .
    When the Version is the only Version based on the Original of that Version, the two commands have the same effect.
    See this User Tip by master Aperturist Frank Caggiano.

  • Difference between Switch -off and disable of an aggregate.

    Hi All,
    Can any one please tell me whats the difference between Switch-off and Disable an aggregate?
    Appreciate ur help.
    Thanks,
    Soumya.

    Hi,
    You can temporarily switch off an aggregate to check if you need to use it. An aggregate that is switched off is not used when a query is executed.
    To do this select the relevant aggregate and choose This graphic is explained in the accompanying text Switch On/Off. An aggregate that is switched off is marked in column Filled/Switched off with This graphic is explained in the accompanying text.
    Since aggregates that are switched off must also be consistent, you do not have to activate the aggregate again or to fill it when you switch it back on.
    Execute a query or trace that would use the aggregate that was switched off. Compare the time that the database needs with the time that the query needs when using the aggregate. If the query is not significantly slower without the aggregate, you can deactivate or delete the aggregate.
    The system deletes all the data and database tables of an aggregate. The definition of the aggregate is not deleted.
    Deactivation
    Select the required aggregate and choose This graphic is explained in the accompanying text Deactivate.
    The status display in the columns Status and Filled/switched off change back to This graphic is explained in the accompanying text.
    If you want to, you can activate and fill the aggregate again later.
    More information:
    http://help.sap.com/saphelp_nw70ehp1/helpdata/en/26/4bc0417951d117e10000000a155106/frameset.htm
    Hope it helps.
    Regards,
    Ray

  • Re: what is difference between sap locking and database locking

    hi,
        what is difference between sap locking and database locking. Iam locked the table mara by using lock objects.
    But iam unable to unlock the mara table. I give u the coding. Please check it.
    REPORT zlock .
    CALL FUNCTION 'ENQUEUE_EZTEST3'
    EXPORTING
       MODE_MARA            = 'S'
       MANDT                = SY-MANDT
       MATNR                = 'SOU-1'.
    call transaction 'MM02'.
    CALL FUNCTION 'DEQUEUE_EZTEST3'
         EXPORTING
              mode_mara = 'E'
              mandt     = sy-mandt
              matnr     = 'SOU-1'.
    IF sy-subrc = 0.
      WRITE: 'IT IS unlocked'.
    ENDIF.

    Hi Paluri
    Here is the difference between SAP locks and Database locks, i will try to find the solution to your code.
    Regards
    Ashish
    Database Locks: The database system automatically sets database locks when it receives change statements (INSERT, UPDATE, MODIFY, DELETE) from a program. Database locks are physical locks on the database entries affected by these statements. You can only set a lock for an existing database entry, since the lock mechanism uses a lock flag in the entry. These flags are automatically deleted in each database commit. This means that database locks can never be set for longer than a single database LUW; in other words, a single dialog step in an R/3 application program.
    Physical locks in the database system are therefore insufficient for the requirements of an R/3 transaction. Locks in the R/3 System must remain set for the duration of a whole SAP LUW, that is, over several dialog steps. They must also be capable of being handled by different work processes and even different application servers. Consequently, each lock must apply on all servers in that R/3 System.
    SAP Locks:
    To complement the SAP LUW concept, in which bundled database changes are made in a single database LUW, the R/3 System also contains a lock mechanism, fully independent of database locks, that allows you to set a lock that spans several dialog steps. These locks are known as SAP locks.
    The SAP lock concept is based on lock objects. Lock objects allow you to set an SAP lock for an entire application object. An application object consists of one or more entries in a database table, or entries from more than one database table that are linked using foreign key relationships.
    Before you can set an SAP lock in an ABAP program, you must first create a lock object in the ABAP Dictionary.

  • Difference between customizing request and workbench request?

    Hi ,
    What is the difference between customizing request and workbench request?
    please reply.........

    HI,
    <b>Workbench Requests</b>
    When you change a Repository object of the ABAP Workbench, a query window appears in which you need to specify a Workbench request. You can only save the changes if you have assigned the object to a change request.
    Workbench requests and the tasks assigned to them are normally used to record changes to Repository objects and Customizing for all clients. However, you can also include client-specific Customizing.
    Whether the changes to Repository objects are transported depends on whether a transport route is defined from the current SAP System for the package of these objects. From the system settings, the system automatically determines whether the change requests are transportable and to which target system they should be transported.
    <b>Customizing requests</b>
    Customizing requests record client-specific Customizing settings made in a single client (the source client of the request).
    Automatic recording of configuration activities in the Customizing work for a client can be activated or deactivated for each client with Client Control. If automatic recording is active, a query window appears when you change Customizing settings, asking you to specify a Customizing request.
    Whether Customizing requests are transported or not, does not depend on the objects entered, as is the case with Workbench change requests. The Customizing requests in an SAP System (or in a client if you use Extended Transport Control) are either all transportable or all local, depending on the system setting. The system uses the standard transport layer to determine automatically whether the change requests are transportable and to which target system they should be transported. However, you can change this manually.
    pl reward if it helps.
    Thanks
    Sadhu Kishore

  • The difference between SOAP adapter and WS adapter in PI 7.1

    Hello all,
    can anybody explain what is the main difference between SOAP adapter and WS adapter in PI 7.1?
    I have checked this [link|http://help.sap.com/saphelp_nwpi71/helpdata/en/0d/5ab43b274a960de10000000a114084/frameset.htm]
    but was not able to find the real difference.
    Or better, what can I do with WS adapter I can't do with SOAP adapter? What are their advantages/disadvantages?
    Thank you all, Igor.

    In addition to RM, ws adapter also support other ws standard like SAML which is not available in SOAP adatper. Beside:
    if your sender or receiver is SAP system, you can also monitor the message in the sender/receiver in addition to the PI box. This is a very good thing, because sometime the MONI in PI shows nothing wrong, but the MONI in your receiver will show you error message that's only related to the receiver system.
    However, if you define ws sender CC, and your ws client doesn't support RM, you will have issue sending ws request.
    And ws CC will generate ws runtime in PI box, if your configuration is wrong (like user name and password not correct), even if you correct it, the ws runtime sometime won't be regenated based on the correction. In this case you need to delete the ws CC/agreement, and re-create it with all correct information.
    Beside make sure your basis team configured the PI system properly regarding ws. If not, you will have lot of pain to figure the problem which was my case.
    Jayson

  • What's the difference between "My Contacts" and "All Contacts"?

    What's the difference between "My Contacts" and "All Contacts"?
    I have no other account other then my iCloud account (from what I can tell), but "My Contacts" has a significantly smaller number of contacts then "All Contacts".
    What's the difference?

    Thanks for posting the screenshots, that's helpful.  I didn't realize that you were looking at your groups.
    "All Contacts" include (as the name implies) all of your contacts.  Below that are any contact groups that you may have defined.  These would normally be such things as "Work", "Personal", "Doctors", etc.; any groups that you find useful to define.  These contain subsets of the "All Contacts" group.
    At some point, perhaps inadvertently, you must have created a group called "My Contacts", or imported it to iCloud from your computer.  At the time this may have contained all of your contacts and would have had the same number of contacts as the "All Contacts" group.  Then over time you probably added 433 additional contacts that were never part of the original "My Contacts" group, resulting in an "All Contacts" group that contained 1465 contacts.
    If you don't have any use for the "My Contacts" group, you can delete it by clicking on it on the left sidebar, click the gear icon on the lower left and choose Delete.  If you're concerned about doing this, you can make a backup of this group first by selecting it on the left sidebar, clicking on a single contact within the group, pressing Control-A to select them all (they should all be highlighted), then clicking the gear icon and choosing Export vCard.  This will create a .vcf file that can later be imported back to iCloud if you ever need to (by clicking the gear icon again and choosing Import vCard).

  • Difference between BPC 5 and 7 ms

    Hello all,
    I have found documents about the bpc 7ms but however im looking for whats the difference between bpc 5 and bpc 7ms systems, new features and so on. Do anyone have information about this. Please Share =)
    Cheers
    Jojo

    hI,
    Right now BPC 5.1 is going on in the market, and BPC 7.0 NW version is in rampup.
    BPC 5.1 is the Microsoft version which uses the microsoft tools (Excel,powerpoint,etc) and the backend is SQL server, while BPC7.0 will be having both Microsoft version and Netweaver version.Here Microsoft version will be same as for BPC 5.1 with some advancements,while for NW version the backend will be BI.
    Between BPC 7.0NW and BPC 5.1
    What is In
    Integration with NetWeaver BI
    Increased dimensionality
    New Validations engine
    Integration with BI Accelerator
    Improved dynamic templates
    Lifecycle Management (transports)
    Statistics framework for monitoring
    64-bit ABAP A/S support
    Database neutrality
    Debugging capabilities (ABAP only)
    What is Out
    BPFs
    Books
    Drill-Through
    Dynamic Hierarchy Editor
    Insight
    SQL-Logic in Script Logic
    Some EV functions
    Ability to rename a member, delete a member being used, reduce the length of a property
    Custom Menus
    Thanks,
    Anila

  • What's differences between camera roll and photostream?

    what's differences between camera roll and photostream files?

    Camera Roll is all photos & videos taken directly with the device, including screenshots, and also any images saved from a text message, email or website.
    Photostream is a service that, after you've taken such a photo, after you close out the Camera app (or switch to a different app or your home screen), uploads a copy of that photo via wi-fi to your iCloud Photostream account. 
    Camera Roll photos are saved until you delete them.
    Photostream photos will remain in Photostream for 30 days minimum.  After that, they will be automatically purged from the system.  If there are photos in your Photostream that you would like to save permanently, copy them to your iPhone's Camera Roll, or download them to your computer using the iCloud Control Panel.

  • Difference between client 000 and 001.

    Hi,
    what is the difference between vclient 000 and 001 ?
    Best regards

    000: SAP standard client
    This client is used to set up new "neutral" clients by client copy. Do not change or delete this client.
    This is an SAP referce client
    Every time an SAP system is installed the 000 client is created by default woth 2 users SAP* and DDIC. Transport configurations are always done from 000 client. (they can t be done in any other client and they have to be done with the user DDIC).
    Other client like Customizing client, testing client etc are created form the 000 client. Similarly in the production environment also the productive environment client is copied from 000.
    001: SAP standard client
    This client is used to set up new "neutral " clients by client copy.
    This is also an SAP reference client. No changes should be done in this client either
    Do not change or delete client 000 or client 001.
    Regards,
    Prashant

  • What's the difference between the ssd and hd?

    I'm in the process of buying a Mac book pro but wanted to know and understand What's the difference between the ssd and hd?

    DDHeadley wrote:
    What's the difference between the ssd and hd?
    HD = hard drive, several metal platters stacked and data read/written magnetically.
    Pro's - less expensive and higher capacity of storage. Can scrub the drive of unwanted data. Unlimited write capability.
    Con'- bit rot can cause data and operating system to not be as reliable, mechanical moving parts means you can't move the machine while it's on.
    SSD = Solid State Disk, basically memory chips that can store data in a permanent fashion without power (like Random Access Memory needs)
    Pro's - faster read/write speeds in most cases. Shock resistant makes them ideal for portable uses.
    Con's - new technology issues, one cannot securely erase the data on them, unless it's ground into a fine powder. Limited write capability means they will wear out eventually like USB thumb drives do. Wear leveling (TRIM) is used to spread the writes evenly across the drive to maximize it's lifespan.
    If you can respect the machine, take care of it and not move it while it's on, or need to scrub the drive of unwanted data, or need higher capacity of storage without paying a fortune for a very large SSD, then a HD makes a lot of sense.
    It really comes down to your privacy, do you want a machine you cannot delete files off of?
    Do you want to carry around a machine that has all your dirty secrets etched in it for anyone with the right software to uncover?
    A computer is a personal machine, why it's called a Personal Computer. We all do things we sometimes are later ashamed of and want to erase all memory of it.
    Can't do that with a SSD, it knows all and you will be forced to destroy the machine to rid it of the unwanted data.

  • EXACT DIFFERENCE BETWEEN  FULL LOAD AND REPAIRFULL LOAD?

    HI Champ,
    Can anyone explain me the exact difference between  full load and Repairfull load?Give e some senario where we can go for this?Please.....
    10zin

    Hi,
    Full repair can be said as a Full with selections. But the main use or advantage of Full repair load is that it wont affect delta loads in the system. If you load a full to a target with deltas running you again will have to initialize them for deltas to continue. But if you do full repair it wont affect deltas.
    This is normally done we when we lose some data or there is data mismatch between source system and BW.
    Check the OSS Note 739863 'Repairing data in BW' for all the details
    Symptom
    Some data is incorrect or missing in the PSA table or in the ODS object (Enterprise Data Warehouse layer).
    There may be a number of reasons for this problem: Errors in the relevant application, errors in the user exit, errors in the DeltaQueue, handling errors in the customers posting procedure (for example, a change in the extract structure during production operation if the DeltaQueue was not yet empty; postings before the Delta Init was completed, and so on), extractor errors, unplanned system terminations in BW and in R/3, and so on.
    Solution
    Read this note in full BEFORE you start actions that may repair your data in BW. Contact SAP Support for help with troubleshooting before you start to repair data.
    BW offers you the option of a full upload in the form of a repair request (as of BW 3.0B). If you want to use this function, we recommend that you use the ODS object layer.
    Note that you should only use this procedure if you have a small number of incorrect or missing records. Otherwise, we always recommend a reinitialization (possibly after a previous selective deletion, followed by a restriction of the Delta-Init selection to exclude areas that were not changed in the meantime).
    1. Repair request: Definition
    If you flag a request as a repair request with full update as the update mode, it can be updated to all data targets, even if these already contain data from delta initialization runs for this DataSource/source system combination. This means that a repair request can be updated into all ODS objects at any time without a check being performed. The system supports loading by repair request into an ODS object without a check being performed for overlapping data or for the sequence of the requests. This action may therefore result in duplicate data and must thus be prepared very carefully.
    The repair request (of the "Full Upload" type) can be loaded into the same ODS object in which the 'normal' delta requests run. You will find this request under the "Repair Request" option in the InfoPackage (Maintenance) menu.
    2. Prerequisites for using the "Repair Request" function
    2.1. Troubleshooting
    Before you start the repair action, you should carry out a thorough analysis of the possible cause of the error to make sure that the error cannot recur when you execute the repair action. For example, if a key figure has already been updated incorrectly in the OLTP system, it will not change after a reload into BW. Use transaction RSA3 (Extractor Checker) in the source system for help with troubleshooting. Another possible source of the problem may be your user exit. To ensure that the user exit is correct, first load a user exit with a Probe-Full request into the PSA table and check whether the data is correct. If it is not correct: Search for the error in the exit user. If you do not find it, we recommend that you deactivate the user exit for testing purposes and request a new Full Upload. It If the data arrives correctly, it is highly probable that the error is indeed in the user exit.
    We always recommend that you load the data into the PSA table in the first step and check the result there.
    2.2. Analyze the effects on the downstream targets
    Before you start the Repair request into the ODS object, make sure that the incorrect data records are selectively deleted from the ODS object. However, before you decide on selective deletion, you should read the Info Help for the "Selective Deletion" function, which you can access by pressing the extra button on the relevant dialog box. The activation queue and the ChangeLog remain unchanged during the selective deletion of the data from the ODS object, which means that the incorrect data is still in the change log afterwards. After the selective deletion, you therefore must not reconstruct the ODS object if it is reconstructed from the ChangeLog. (Reconstruction is usually from the PSA table but, if the data source is the ODS object itself, the ODS object is reconstructed from its ChangeLog). You MUST read the recommendations and warnings about this (press the "Info" button).
    You MUST also take into account the fact that the delta for the downstream data targets is created from the changelog. If you perform selective deletion and then reload data into the deleted area, this may result in data inconsistencies in the downstream data targets.
    If you only use MOVE and do not use ADD for updates in the ODS object, selective deletion may not be required in some cases (for example, if incorrect records only have to be changed, rather than deleted). In this case, the DataMart delta also remains intact.
    2.3. Analysis of the selections
    You must be very precise when you perform selective deletion: Some applications do not provide the option of selecting individual documents for the load process. Therefore, you must first ensure that you can load the same range of documents into BW as you would delete from the ODS object. This note provides some application-specific recommendations to help you "repair" the incorrect data records.
    If you updated the data from the ODS object into the InfoCube, you can also delete it there using the "Selective deletion" function. However, if it is compressed at document level there and deletion is no longer possible, you must delete the InfoCube content and fill the data in the ODS object again after repair.
    You can only perform this action after a thorough analysis of all effects of selective data deletion. We naturally recommend that you test this first in the test system.
    The procedure generally applies for all SAP applications/extractors. The application determines the selections. For example, if you cannot use the document number for selection but you can select documents for an entire period, then you are forced to delete and then update documents for the entire period in the data target. Therefore, it is important to look first at the selections in the InfoPackage exactly before you delete data from the data target.
    Some applications have additional special features:
    Logistics cockpit: As preparation for the repair request, delete the SetUp table (if you have not already done so) and fill it selectively with concrete document numbers (or other possible groups of documents determined by the selection). Execute the Repair request.
    Caution: You can currently use the transactions that fill SetUp tables with reconstruction data to select individual documents or entire ranges of documents (at present, it is not possible to select several individual documents if they are not numbered in sequence).
    FI: The Repair request for the Full Upload is not required here. The following efficient alternatives are provided: In the FI area, you can select documents that must be reloaded into BW again, make a small change to them (for example, insert a period into the assignment text) and save them -> as a result, the document is placed in the delta queue again and the previously loaded document under the same number in the BW ODS object is overwritten. FI also has an option for sending the documents selectively from the OLTP system to the BW system using correction programs (see note 616331).
    3. Repair request execution
    How do you proceed if you want to load a repair request into the data target? Go to the maintenance screen of the InfoPackage (Scheduler), set the type of data upload to "Full", and select the "Scheduler" option in the menu -> Full Request Repair -> Flag request as repair request -> Confirm. Update the data into the PSA and then check that it is correct. If the data is correct, continue to update into the data targets."
    Refer.
    Repair full request
    Re: Repair full request
    Steps to perform repair full request
    full repair request
    repair full request
    Re: Repair Full Request
    Thanks,
    JituK

  • Difference between analytic privilege and package privilege

    Hello Team
                       Please suggest me on the difference between Analytic privilege and package privilege . Since both the privileges works on package only . So what is the exact difference between them .
    Regards

    Hi,
    SAP HANA have several categories of privileges such as system privileges, object privileges, analytic privileges, package privileges and application privileges.
    For analytic privileges and package privileges, they are very different.
    When you use analytic privileges, you can grant different users to see different data. For example you have an analytic view including some sales data and there is a column LOCATION. You can use analytic privilege to grant the sales in the east US to only see the sales data where LOCATION = "EAST" and grant the sales in the west US to only see the sales data where LOCATION = "WEST". This is just a simple example. In short, you use analytic privileges to grant different users to see different data.
    Regarding package privilege, when you develop on XS projects, you can grant different package privileges to different users. For example, you have a package named "services" in your XS project. You can use package privilege to grant user A to only read the content under "services" and grant user B to edit/activate or even delete the "services" packages.
    Best regards,
    Wenjun

  • Difference between settlement order and standing order

    Can someone state the difference between standing order and settlement order with examples in the organization tab of equioment.

    Hi,
    Standing Order
    Standing orders are used to carry out on-going maintenance jobs and settle them at month end rather than creating a fresh PM order every time. Using order hierarchies, you could attach sub-orders to the standing order and settle them to the standing order to provide you with more precise recording of maint costs at sub-order level as well as a budget monitoring at the standing order level.
    Please go through the following link.
    standing order
    Settlement Order
    Equipment master
    http://www.sapfans.com/forums/viewtopic.php?f=7&t=324724
    Regards,
    Maheswaran.

  • What is the difference between standard,sorted and hash table

    <b>can anyone say what is the difference between standard,sorted and hash tabl</b>

    Hi,
    Standard Tables:
    Standard tables have a linear index. You can access them using either the index or the key. If you use the key, the response time is in linear relationship to the number of table entries. The key of a standard table is always non-unique, and you may not include any specification for the uniqueness in the table definition.
    This table type is particularly appropriate if you want to address individual table entries using the index. This is the quickest way to access table entries. To fill a standard table, append lines using the (APPEND) statement. You should read, modify and delete lines by referring to the index (INDEX option with the relevant ABAP command). The response time for accessing a standard table is in linear relation to the number of table entries. If you need to use key access, standard tables are appropriate if you can fill and process the table in separate steps. For example, you can fill a standard table by appending records and then sort it. If you then use key access with the binary search option (BINARY), the response time is in logarithmic relation to
    the number of table entries.
    Sorted Tables:
    Sorted tables are always saved correctly sorted by key. They also have a linear key, and, like standard tables, you can access them using either the table index or the key. When you use the key, the response time is in logarithmic relationship to the number of table entries, since the system uses a binary search. The key of a sorted table can be either unique, or non-unique, and you must specify either UNIQUE or NON-UNIQUE in the table definition. Standard tables and sorted tables both belong to the generic group index tables.
    This table type is particularly suitable if you want the table to be sorted while you are still adding entries to it. You fill the table using the (INSERT) statement, according to the sort sequence defined in the table key. Table entries that do not fit are recognised before they are inserted. The response time for access using the key is in logarithmic relation to the number of
    table entries, since the system automatically uses a binary search. Sorted tables are appropriate for partially sequential processing in a LOOP, as long as the WHERE condition contains the beginning of the table key.
    Hashed Tables:
    Hashes tables have no internal linear index. You can only access hashed tables by specifying the key. The response time is constant, regardless of the number of table entries, since the search uses a hash algorithm. The key of a hashed table must be unique, and you must specify UNIQUE in the table definition.
    This table type is particularly suitable if you want mainly to use key access for table entries. You cannot access hashed tables using the index. When you use key access, the response time remains constant, regardless of the number of table entries. As with database tables, the key of a hashed table is always unique. Hashed tables are therefore a useful way of constructing and
    using internal tables that are similar to database tables.
    Regards,
    Ferry Lianto

Maybe you are looking for

  • Udf Data is not being displayed in the report

    Hi all, i have designed one report in which i am displaying some udf fields along with other system fields. i have not used any selection criteria. when i run report it doesn't display udf data of some random rows in the report even if data is perese

  • Web services build error

    Hi All, I have created and deployed a Java web service banking project now i want use this web services methods into .net clint. For that in .net peoples able to see the list of web services mathods when they are use those methods they face the probl

  • How to restrict the standard notifications processing

    Dear PM Gurus, i copied standard notifications and i used customized notifications. Now i want to restrict the standard notifications using. users are using standard notifications mistakely and system generates the standard notification "M1" actually

  • Sender Comm Channel

    Hi, what is the queue that appears when i select qos mode as EOIO in File Sender Communication Channel. and what value should i specify there.

  • Large Pdf using XML XSL - Out of Memory Error

    Hi Friends. I am trying to generate a PDF from XML, XSL and FO in java. It works fine if the PDF to be generated is small. But if the PDF to be generated is big, then it throws "Out of Memory" error. Can some one please give me some pointers about th