ERM implemented: What about PFCG now?

Hi all,
Under the following scenario:
- ERM is the role management tool.
- Roles are generated from ERM to R/3 DEV System and then transported them from DEV to QA and PROD.
How would the role designer be able to transport role if we restrict access them from PFCG?
Which is the best practice for this scenario? Role designer will be using ERM for role definition but they will need to transport roles in the backend from DEV to QA and PROD.
Thanks for all. Best regards,
  Imanol

Hello Imanol,
You can get this info regarding the authorizations objects related with PFCG in order to define a custom role for the "restricted PFCG" from the transaction SU24, where you can get the information regarding objects that you have in your system and also the objects that SAP recommends to be there with that particular transaction.
Regards,
Hersh.
http://www.linkedin.com/in/hersh13

Similar Messages

  • HT204053 My kids now each have an itouch, should we all have different apple ids even if I am paying for all itunes and app store purchases? what about icloud? I would like to share itunes and app purchases, but not necessarily photos...help please!

    My kids now each have an itouch, should we all have different apple ids even if I am paying for all itunes and app store purchases? what about icloud? I would like to share itunes and app purchases, but not necessarily photos...help please!

    The recommended solution for most families is to share the same Apple ID for iTunes and App Store purchases, so you can share your purchases, but us different IDs for iMessage, FaceTime and iCloud.  With this arrangement, each person can automatically download purchases made on the shared ID (by turning this feature on in Settings>iTunes & App Stores), while keeping their FaceTime calls, text messages and iCloud data (including photo stream) separated.  There is no requirement that the ID you use for purchasing be the same as the ID you use for these other services.
    This article: http://www.macstories.net/stories/ios-5-icloud-tips-sharing-an-apple-id-with-you r-family/.

  • HT4009 What about upgrading? I can't do that from where I live w/o connecting to my hd. Now with the new changes to ITunes, I don't see how I can upgrade thru the traditional route I took b4. Now what do I do?

    What about upgrading apps on your IPhone? I can't do that from where I live w/o connecting directly to my laptop. With Apple's new Itunes page, I don't see how I can navigate successfully now to acheive the same result as before. Hmmm. I would appreciate some quick guidance. Thanks.

    With iTunes 11 you can enable the left-hand sidebar that used to show on previous versions of iTunes via option-command-S on a Mac, control-S on a PC. You can then select the Apps part of your iTunes library on that sidebar and on the right-hand side of iTunes click the Check For Updates button at the bottom to see if any of your apps have updates available. Then connect your phone and select it on the sidebar, and on the Apps tab on the right-hand side click the Sync button at the bottom of it to copy the updates over

  • I just took in my macbook to the apple store to clean the fan because it was starting make a little noise but instead of making it stop it sounds like an airplane about to take off all the time, it doesn't matter what i'm doing. I dont know what to do now

    I just took in my macbook to the apple store to clean the fan because it was starting make a little noise but instead of making it stop it sounds like an airplane about to take off all the time, it doesn't matter what i'm doing. I dont know what to do now? any ideas on how to make it stop?

    take it back asap.  If it wasn't doing it before they cleaned the fans, they may have accidentally done something that is causing this behavior.

  • Now that Apple is selling iphone unlocked, what about those ho bought locked ?

    Now that Apple is selling iphone unlocked, what about those ho bought locked ?
    Can i unlocked my iphone now ?

    AT&T have not announced any change to their no-unlocking policy. Only AT&T could authorize the phone to be unlocked.
    The fact that Apple now sells (independently of AT&T) unlocked GSM iPhones does not change this.

  • What about security in adf faces application ?

    It seem that the documentation has a little bit changed about security for adf faces application.
    SRDemo J2EE sample application only implemented the security at the web container and may be for the session beans (don't remember) by using security-role and security-constraint in web.xml configuration file.
    It seem that the documentation recommand now to implement adf security and didn't find anymore the reference to the standard j2ee security implementation.
    We found also that the security constraints checked by the web container was sometimes ignored and the container didn't ask us to login before displaying a page.
    Is ADF security a clear Oracle recommandation for ADF Faces application ?
    What about j2ee security for this type of application (why it is not recommended to use it) ?

    Hi,
    there is no single recommedation about security because security ideally is applied on several levels to implement security in depth. Container managed security with J2EE is a good option to secure page access and - if using EJB - to propagate the user identity for method level access control.
    Using ADF Security, which is security added to the binding layer based on JAAS, a second layer of the security onion becomes available that allows you to define which user is allowed to perform which operation on an iterator or attribute binding. This goes beyond of what container managed security can do for you.
    The thrid layer is business layer security and eventually database security.
    For Oracle Open World we will have a developmengt track and one of the presentation I am giving with Ric Smith from our team is about end-to-end application security for ADF Faces, ADF, ADF BCor TopLink/EJB and the Oracle database.
    The plan is to also write this up in a paper, but this would come late because of other priorities I have on my plate. So attending OOW probably is the best option for you to get the big picture
    Frank

  • Palm handhelds are history, what about PalmOS?

    Greetings,
    I've joined this forum as a last resort to trying to get some questions answered. Can't seem to get a human being to answer a telephone at Palm (scary, since now Palm is only going to make phones ;^)  ). Anyway, I have a customer that has fielded thousands of devices in the oil & gas industry with an Ir window to download data to, you guessed it, Palm devices. I was contacted by them the other day with them wanting to know what 'platform' to now go to, and how to get their application to run on whatever that may be. They were told (since they resell palms to their customers) that handhelds were history. They say they were also told that PalmOS is history. They found that their application would run on the T-3, T-5, E-2, TX and LifeDrive. Not sure why it wouldn't run on others, and I don't have of list of what those that it wouldn't run on is. I guess if it runs a version of Palm OS that supports IrCOMM, then it ought to work.
    So, smartphones seem to be the remaining platform...  I see the Treo has an Ir port as well as the centro. The Treo runs WindowsMobile (and from what I can 'find out', only WindowsMobile), and the centro runs PalmOS, which as I stated before is supposedly also going away. I imagine the centro now has a limited lifetime to look forward to.
    I need to know how to answer my customers concerns. I need to know what smartphone(s) that Palm will make that will talk IrCOMM through an Ir port, and how to 'port' their old PalmOS code to run on whatever smartphone that might be, or, if there would be an emulator available to allow PalmOS apps to run on WindowsMobile, or, if PalmOS will be made available on any of the new smartphones.
    I don't have their source code yet, and don't know what development tools were used to write their code, but I beleive that CodeWarrier was mentioned somewhere along the way, if that helps.
    Thanks for help anyone can provide!
    Post relates to: Palm TX

    Ok I want to start off on a high level and address some of your concerns.
    1. Handhelds (afaik) are not history
    2. Treo's are not only Windows Mobile, these also run on PalmOS
    3. PalmOS is a dying OS, but is not completely history
    4. PalmOS can run on Windows Mobile with a little help
    Ok so that was a quick high level answer to your questions. So now I will spend a little time and go into detail on each point.
    1. Handhelds (afaik) are not history
    You can go to the palm store and still purchase an E2 and a Palm TX. Here is a link to the E2 page to purchase it, and it is currently in stock
    http://store.palm.com/sm-palmone-and-153-tungsten-and-153-e2-handheld--pi-1971034.html
    Older handhelds T-5, T-3 those can't be purchased directly through Palm. Your sources are correct that they are somewhat history. You can still get support for these products, but purchasing is limited.
    2. Treo's are not only Windows Mobile, these also run on Palm OS
    There are two types of Treo's ones that run Palm OS and one's that run Windows Mobile. The Palm OS Treo's are typically easily distingushed by a "p" on their name (IE Treo 700p, Treo 755p) there are a few exceptions to this such as the Treo 680 which does run Palm OS. On that same token the windows mobile devices are using distingushed with a "w" on their name (IE Treo 700w, Treo 700wx) same as with the 680 there is some exceptions such as the Treo 750 which does run Windows Mobile.
    3. PalmOS is a dying OS, but is not completely history
    The PalmOS is an old operating system and Palm is currently working on a brand new OS, WebOS, this is the predecessor of palm os. With that being said when this OS launches Palm isn't just going to stop and no longer support devices still running Palm OS. Instead we have implemented a product lifecycle (you can find more informatin about it here)
    http://kb.palm.com/SRVS/NUA/launchKB.asp?c=11439&fn=treo&mn=800w&cn=sprint
    If the link doesn't work you can go to http://kb.palm.com and type in solution id 11439
    So all Centro users are still going to get support through Palm as long as the device still falls within a supported lifecycle stage.
    4. PalmOS can run on Windows Mobile with a little help
    There is a program called StyleTap that is available. What this program does is allows Palm OS programs to run on a Windows Mobile unit. The program itself is a little pricey, but for those that need this functionality is well worth it. On that same note StyleTap is also wanting to design a program that will run PalmOS apps on the new WebOS when it launches but none of that is final.
    Hopefully this addresses everything you mentioned. If not please feel free to post and we will assist you further with as much information as is available.
    Post relates to: Centro (Sprint)

  • Mifi 4510L Mifi Hotspot...is it the network? and what about the firmware update?

    I have spent several months trying to seek a solution on the repeated and frequent disconnects from the Verizon wireless network using my Mifi 4510 L.  No success.  I have conversed with Verizon Wireless "experts" on this matter and have basically been ignored, since they do not have a solution. It has cost me a pretty penny in wireless costs due to lost connections in downloads, etc...for which I do not get any credit from Verizon on my wireless bill...go figure.
    I have even been accused by Verizon that the problem is my computer and hardware, even though I have ran several hardware, software, and "real-life" connection checks on other wireless networks with no issues at all.  I even have been getting better connectivity when I use my Verizon USB UML290...but I hate having to switch moving my SIM card from the USB Modem to the MIfi4510L...one of these days the SIM card will fail. Verizon has checked the signal strength at my home and work locations (which I already knew as good), but never heard back from them.
    Anyway,  I have verified that my wireless network adapter works just fine on other wireless networks (no dropouts, etc).  I have even upgraded to another Windows Operating System - Windows 7...which is more superior than Vista in dealing with wireless communications.  I have implemented quite a number of the solutions provided by other great Verizon Wireless Community members, but the connectivity problems continue to occur.
    When I did a review of my wireless hardware logs, I noticed that when I was encountering problems, the dynamically assigned address given to me on the Verizon Wireless network changed quite a bit, even when I was using the same web site. When my wireless connection worked fine, the dynamically assigned address was consistent.  This seemed to change when I encounter peak network load times. 
    I would appreciate a straight answer from Verizon Wireless on what is going on with the network.  I live in a solid 3G coverage area...but just far away from 4G to benefit for the increased throughput.  The closest 4G location footprint is about 40 miles away from me.
    Finally, what about the Mifi 4510 L firmware update?  I have yet to see any notification about this firmware update, either through normal e-mail channels or even through my Mifi configuration site
    http://192.168.1.1/mifi.cgi
    What gives?
    I realize that I am sounding a little perturbed about this matter, but it has been almost 4 months now...and Verizon is not living up to their part of the bargain on providing good tech support on the Mifi 4510L.  When they do not have an answer...they ignore the customer.   Not good business!!!
    Kevin Smith
    Metropolis, IL

    kescom11 wrote:
    Finally, what about the Mifi 4510 L firmware update?  I have yet to see any notification about this firmware update, either through normal e-mail channels or even through my Mifi configuration site 
    The firmware update was released a few weeks ago and there were multiple threads in this forum for it:
    Software Update: Verizon Wireless 4G LTE Mobile Hotspot MiFi™ 4510L
    The firmware update primarily addresses a problem with the MiFi switching from 3G to 4G and back.  I would not expect it to resolve a connection issue for anyone in a 3G only area.  Work through the firmware update instructions included in the link above and see if it helps. 
    There were no email notifications but the MiFi should have been redirecting you to the MiFi homepage every time you tried to browse the internet.  The firmware update is mandatory so if you have not already completed the update then there might be something wrong with your device. 

  • What about CMOD and SMOD

    hi
               I am satish, i want to know the user exits transactions what is SMOD and CMOD. What about the functionality of those.
    I will be thankfull to all

    Hi,
    CMOD is the Project Management of SAP Enhancements (i.e., SMOD Enhancements). SMOD contains the actual enhancements and CMOD is the grouping of those SMOD enhancements. 
    User exits (Function module exits) are exits developed by SAP. The exit is implementerd as a call to a function module. The code for the function module is written by the developer. You are not writing the code directly in the function module, but in the include that is implemented in the function module. 
    The naming standard of function modules for function module exits is: 
    EXIT_<program name><3 digit suffix> 
    The call to a functionmodule exit is implemented as: 
    CALL CUSTOMER.-FUNCTION <3 digit suffix> 
    For Example: 
    The program for transaction VA01 Create salesorder is SAPMV45A
    1. If you search for CALL CUSTOMER-FUNCTION program SAPMV45A you will find ( Among other user exits): 
    CALL CUSTOMER-FUNCTION '003'
      exporting
        xvbak   = vbak
        xvbuk   = vbuk
        xkomk   = tkomk
      importing
        lvf_subrc = lvf_subrc
      tables
        xvbfa = xvbfa
        xvbap = xvbap
        xvbup = xvbup. 
    The exit calls function module EXIT_SAPMV45A_003 
    2. How to find user exits 
    Display the program where you are searching for and exit and search for CALL CUSTOMER-EXIT 
    If you know the Exit name, go to transaction CMOD. Choose menu Utillities->SAP Enhancements. 
    Enter the exit name and press enter. 
    You will now come to a screen that shows the function module exits for the exit. 
    or use this ABAP program to search for user exits :-
    Finding the user-exits of a SAP transaction code
    3. Using Project management of SAP Enhancements 
    You want to create a project to enhance transaction VA01
    - Go to transaction CMOD
    - Create a project called ZVA01
    - Choose the Enhancement assign radio button and press the Change button
    In the first column enter V45A0002 Predefine sold-to party in sales document . Note that an enhancement can only be used for 1 project. If the enhancement is allready in use, and error message will be displayed
    - Press Save
    - Press Components. You can now see that enhancement uses user exit EXIT_SAPMV45A_002. 
    - Double Click on the exit.
    Now the function module is displayed. Double click on include ZXVVAU04 in the function module
    Insert the following code into the include: E_KUNNR = '2155'. 
    Activate the include program. Go back to CMOD and activate the project. 
    Goto transaction VA01 and create a salesorder. Note that Sold-to-party now automatically is "2155" 
    Kindly reward points by clicking the star on the left of reply,if it helps.

  • What is BI ? How we implement & what is the cost to implement ?

    What is BI ? How we implement & what is the cost to implement ?
    Thanks,
    Sumit.

    Hi Sumit,
                        Below is the description according to ur query
    Business Intelligence is a process for increasing the competitive advantage of a business by intelligent use of available data in decision making. This process is pictured below.
    The five key stages of Business Intelligence:
    1.     Data Sourcing
    2.     Data Analysis
    3.     Situation Awareness
    4.     Risk Assessment
    5.     Decision Support
    Data sourcing
    Business Intelligence is about extracting information from multiple sources of data. The data might be: text documents - e.g. memos or reports or email messages; photographs and images; sounds; formatted tables; web pages and URL lists. The key to data sourcing is to obtain the information in electronic form. So typical sources of data might include: scanners; digital cameras; database queries; web searches; computer file access; etcetera.
    Data analysis
    Business Intelligence is about synthesizing useful knowledge from collections of data. It is about estimating current trends, integrating and summarising disparate information, validating models of understanding, and predicting missing information or future trends. This process of data analysis is also called data mining or knowledge discovery. Typical analysis tools might use:-
    u2022     probability theory - e.g. classification, clustering and Bayesian networks; 
    u2022     statistical methods - e.g. regression; 
    u2022     operations research - e.g. queuing and scheduling; 
    u2022     artificial intelligence - e.g. neural networks and fuzzy logic.
    Situation awareness
    Business Intelligence is about filtering out irrelevant information, and setting the remaining information in the context of the business and its environment. The user needs the key items of information relevant to his or her needs, and summaries that are syntheses of all the relevant data (market forces, government policy etc.).  Situation awareness is the grasp of  the context in which to understand and make decisions.  Algorithms for situation assessment provide such syntheses automatically.
    Risk assessment
    Business Intelligence is about discovering what plausible actions might be taken, or decisions made, at different times. It is about helping you weigh up the current and future risk, cost or benefit of taking one action over another, or making one decision versus another. It is about inferring and summarising your best options or choices.
    Decision support
    Business Intelligence is about using information wisely.  It aims to provide warning you of important events, such as takeovers, market changes, and poor staff performance, so that you can take preventative steps. It seeks to help you analyse and make better business decisions, to improve sales or customer satisfaction or staff morale. It presents the information you need, when you need it.
    This section describes how we are using extraction, transformation and loading (ETL) processes and a data warehouse architecture to build our enterprise-wide data warehouse in incremental project steps. Before an enterprise-wide data warehouse could be delivered, an integrated architecture and a companion implementation methodology needed to be adopted. A productive and flexible tool set was also required to support ETL processes and the data warehouse architecture in a production service environment. The resulting data warehouse architecture has the following four principal components:
    u2022 Data Sources
    u2022 Data Warehouses
    u2022 Data Marts
    u2022 Publication Services
    ETL processing occurs between data sources and the data warehouse, between the data warehouse and data marts and may also be used within the data warehouse and data marts.
    Data Sources
    The university has a multitude of data sources residing in different Data Base Management System (DBMS) tables and non-DBMS data sets. To ensure that all relevant data source candidates were identified, a physical inventory and logical inventory was conducted. The compilation of these inventories ensures that we have an enterprise-wide view of the university data resource.
    The physical inventory was comprised of a review of DBMS cataloged tables as well as data sets used by business processes. These data sets had been identified through developing the enterprise-wide information needs model.
    3
    SUGI 30 Focus Session
    The logical inventory was constructed from u201Cbrain-stormingu201D sessions which focused on common key business terms which must be referenced when articulating the institutionu2019s vision and mission (strategic direction, goals, strategies, objectives and activities). Once the primary terms were identified, they were organized into directories such as u201CProjectu201D, u201CLocationu201D, u201CAcademic Entityu201D, u201CUniversity Personu201D, u201CBudget Envelopeu201D etc. Relationships were identified by recognizing u201Cnatural linkagesu201D within and among directories, and the u201Cdrill-downsu201D and u201Croll-upsu201D that were required to support u201Creport byu201D and u201Creport onu201D information hierarchies. This exercise allowed the directories to be sub-divided into hierarchies of business terms which were useful for presentation and validation purposes.
    We called this important deliverable the u201CConceptual Data Modelu201D (CDM) and it was used as the consolidated conceptual (paper) view of all of the Universityu2019s diverse data sources. The CDM was then subjected to a university-wide consultative process to solicit feedback and communicate to the university community that this model would be adopted by the Business Intelligence (BI) project as a governance model in managing the incremental development of its enterprise-wide data warehousing project.
    Data Warehouse
    This component of our data warehouse architecture (DWA) is used to supply quality data to the many different data marts in a flexible, consistent and cohesive manner. It is a u2018landing zoneu2019 for inbound data sources and an organizational and re-structuring area for implementing data, information and statistical modeling. This is where business rules which measure and enforce data quality standards for data collection in the source systems are tested and evaluated against appropriate data quality business rules/standards which are required to perform the data, information and statistical modeling described previously.
    Inbound data that does not meet data warehouse data quality business rules is not loaded into the data warehouse (for example, if a hierarchy is incomplete). While it is desirable for rejected and corrected records to occur in the operational system, if this is not possible then start dates for when the data can begin to be collected into the data warehouse may need to be adjusted in order to accommodate necessary source systems data entry u201Cre-worku201D. Existing systems and procedures may need modification in order to permanently accommodate required data warehouse data quality measures. Severe situations may occur in which new data entry collection transactions or entire systems will need to be either built or acquired.
    We have found that a powerful and flexible extraction, transformation and loading (ETL) process is to use Structured Query Language (SQL) views on host database management systems (DBMS) in conjunction with a good ETL tool such as SAS® ETL Studio. This tool enables you to perform the following tasks:
    u2022 The extraction of data from operational data stores
    u2022 The transformation of this data
    u2022 The loading of the extracted data into your data warehouse or data mart
    When the data source is a u201Cnon-DBMSu201D data set it may be advantageous to pre-convert this into a SAS® data set to standardize data warehouse metadata definitions. Then it may be captured by SAS® ETL Studio and included in the data warehouse along with any DBMS source tables using consistent metadata terms. SAS® data sets, non-SAS® data sets, and any DBMS table will provide the SAS® ETL tool with all of the necessary metadata required to facilitate productive extraction, transformation and loading (ETL) work.
    Having the ability to utilize standard structured query language (SQL) views on host DBMS systems and within SAS® is a great advantage for ETL processing. The views can serve as data quality filters without having to write any procedural code. The option exists to u201Cmaterializeu201D these views on the host systems or leave them u201Cun-materializedu201D on the hosts and u201Cmaterializeu201D them on the target data structure defined in the SAS® ETL process. These choices may be applied differentially depending upon whether you are working with u201Ccurrent onlyu201D or u201Ctime seriesu201D data. Different deployment configurations may be chosen based upon performance issues or cost considerations. The flexibility of choosing different deployment options based upon these factors is a considerable advantage.
    4
    SUGI 30 Focus Session
    Data Marts
    This component of the data warehouse architecture may manifest as the following:
    u2022 Customer u201Cvisibleu201D relational tables
    u2022 OLAP cubes
    u2022 Pre-determined parameterized and non-parameterized reports
    u2022 Ad-hoc reports
    u2022 Spreadsheet applications with pre-populated work sheets and pivot tables
    u2022 Data visualization graphics
    u2022 Dashboard/scorecards for performance indicator applications
    Typically a business intelligence (BI) project may be scoped to deliver an agreed upon set of data marts in a project. Once these have been well specified, the conceptual data model (CDM) is used to determine what parts need to be built or used as a reference to conform the inbound data from any new project. After the detailed data mart specifications (DDMS) have been verified and the conceptual data model (CDM) components determined, a source and target logical data model (LDM) can be designed to integrate the detailed data mart specification (DDMS) and conceptual data model (CMD). An extraction, transformation and loading (ETL) process can then be set up and scheduled to populate the logical data models (LDM) from the required data sources and assist with any time series and data audit change control requirements.
    Over time as more and more data marts and logical data models (LDMu2019s) are built the conceptual data model (CDM) becomes more complete. One very important advantage to this implementation methodology is that the order of the data marts and logical data models can be entirely driven by project priority, project budget allocation and time-to-completion constraints/requirements. This data warehouse architecture implementation methodology does not need to dictate project priorities or project scope as long as the conceptual data model (CDM) exercise has been successfully completed before the first project request is initiated.
    McMasteru2019s Data Warehouse design
    DevelopmentTestProductionWarehouseWarehouseWarehouseOtherDB2 OperationalOracle OperationalETLETLETLETLETLETLETLETLETLDataMartsETLETLETLDataMartsDataMartsDB2/Oracle BIToolBIToolBIToolNoNoUserUserAccessAccessUserUserAccessAccess(SAS (SAS Data sets)Data sets)Staging Area 5
    SUGI 30 Focus Session
    Publication Services
    This is the visible presentation environment that business intelligence (BI) customers will use to interact with the published data mart deliverables. The SAS® Information Delivery Portal will be utilized as a web delivery channel to deliver a u201Cone-stop information shoppingu201D solution. This software solution provides an interface to access enterprise data, applications and information. It is built on top of the SAS Business Intelligence Architecture, provides a single point of entry and provides a Portal API for application development. All of our canned reports generated through SAS® Enterprise Guide, along with a web-based query and reporting tool (SAS® Web Report Studio) will be accessed through this publication channel.
    Using the portalu2019s personalization features we have customized it for a McMaster u201Clook and feelu201D. Information is organized using pages and portlets and our stakeholders will have access to public pages along with private portlets based on role authorization rules. Stakeholders will also be able to access SAS® data sets from within Microsoft Word and Microsoft Excel using the SAS® Add-In for Microsoft Office. This tool will enable our stakeholders to execute stored processes (a SAS® program which is hosted on a server) and embed the results in their documents and spreadsheets. Within Excel, the SAS® Add-In can:
    u2022 Access and view SAS® data sources
    u2022 Access and view any other data source that is available from a SAS® server
    u2022 Analyze SAS® or Excel data using analytic tasks
    The SAS® Add-In for Microsoft Office will not be accessed through the SAS® Information Delivery Portal as this is a client component which will be installed on individual personal computers by members of our Client Services group. Future stages of the project will include interactive reports (drill-down through OLAP cubes) as well as balanced scorecards to measure performance indicators (through SAS® Strategic Performance Management software). This, along with event notification messages, will all be delivered through the SAS® Information Delivery Portal.
    Publication is also channeled according to audience with appropriate security and privacy rules.
    SECURITY u2013 AUTHENTICATION AND AUTHORIZATION
    The business value derived from using the SAS® Value Chain Analytics includes an authoritative and secure environment for data management and reporting. A data warehouse may be categorized as a u201Ccollection of integrated databases designed to support managerial decision making and problem solving functionsu201D and u201Ccontains both highly detailed and summarized historical data relating to various categories, subjects, or areasu201D. Implementation of the research funding data mart at McMaster has meant that our stakeholders now have electronic access to data which previously was not widely disseminated. Stakeholders are now able to gain timely access to this data in the form that best matches their current information needs. Security requirements are being addressed taking into consideration the following:
    u2022 Data identification
    u2022 Data classification
    u2022 Value of the data
    u2022 Identifying any data security vulnerabilities
    u2022 Identifying data protection measures and associated costs
    u2022 Selection of cost-effective security measures
    u2022 Evaluation of effectiveness of security measures
    At McMaster access to data involves both authentication and authorization. Authentication may be defined as the process of verifying the identity of a person or process within the guidelines of a specific
    6
    SUGI 30 Focus Session
    security policy (who you are). Authorization is the process of determining which permissions the user has for which resources (permissions). Authentication is also a prerequisite for authorization. At McMaster business intelligence (BI) services that are not public require a sign on with a single university-wide login identifier which is currently authenticated using the Microsoft Active Directory. After a successful authentication the SAS® university login identifier can be used by the SAS® Meta data server. No passwords are ever stored in SAS®. Future plans at the university call for this authentication to be done using Kerberos.
    At McMaster aggregate information will be open to all. Granular security is being implemented as required through a combination of SAS® Information Maps and stored processes. SAS® Information Maps consist of metadata that describe a data warehouse in business terms. Through using SAS® Information Map Studio which is an application used to create, edit and manage SAS® Information Maps, we will determine what data our stakeholders will be accessing through either SAS® Web Report Studio (ability to create reports) or SAS® Information Delivery Portal (ability to view only). Previously access to data residing in DB-2 tables was granted by creating views using structured query language (SQL). Information maps are much more powerful as they capture metadata about allowable usage and query generation rules. They also describe what can be done, are database independent and can cross databases and they hide the physical structure of the data from the business user. Since query code is generated in the background, the business user does not need to know structured query language (SQL). As well as using Information Maps, we will also be using SAS® stored processes to implement role based granular security.
    At the university some business intelligence (BI) services are targeted for particular roles such as researchers. The primary investigator role of a research project needs access to current and past research funding data at both the summary and detail levels for their research project. A SAS® stored process (a SAS® program which is hosted on a server) is used to determine the employee number of the login by checking a common university directory and then filtering the research data mart to selectively provide only the data that is relevant for the researcher who has signed onto the decision support portal.
    Other business intelligence (BI) services are targeted for particular roles such as Vice-Presidents, Deans, Chairs, Directors, Managers and their Staff. SAS® stored processes are used as described above with the exception that they filter data on the basis of positions and organizational affiliations. When individuals change jobs or new appointments occur the authorized business intelligence (BI) data will always be correctly presented.
    As the SAS® stored process can be executed from many environments (for example, SAS® Web Report Studio, SAS® Add-In for Microsoft Office, SAS® Enterprise Guide) authorization rules are consistently applied across all environments on a timely basis. There is also potential in the future to automatically customize web portals and event notifications based upon the particular role of the person who has signed onto the SAS® Information Delivery Portal.
    ARCHITECTURE (PRODUCTION ENVIRONMENT)
    We are currently in the planning stages for building a scalable, sustainable infrastructure which will support a scaled deployment of the SAS® Value Chain Analytics. We are considering implementing the following three-tier platform which will allow us to scale horizontally in the future:
    Our development environment consists of a server with 2 x Intel Xeon 2.8GHz Processors, 2GB of RAM and is running Windows 2000 u2013 Service Pack 4.
    We are considering the following for the scaled roll-out of our production environment.
    A. Hardware
    1. Server 1 - SAS® Data Server
    - 4 way 64 bit 1.5Ghz Itanium2 server
    7
    SUGI 30 Focus Session
    - 16 Gb RAM
    - 2 73 Gb Drives (RAID 1) for the OS
    - 1 10/100/1Gb Cu Ethernet card
    - 1 Windows 2003 Enterprise Edition for Itanium
    2 Mid-Tier (Web) Server
    - 2 way 32 bit 3Ghz Xeon Server
    - 4 Gb RAM
    - 1 10/100/1Gb Cu Ethernet card
    - 1 Windows 2003 Enterprise Edition for x86
    3. SAN Drive Array (modular and can grow with the warehouse)
    - 6 u2013 72GB Drives (RAID 5) total 360GB for SAS® and Data
    B. Software
    1. Server 1 - SAS® Data Server
    - SAS® 9.1.3
    - SAS® Metadata Server
    - SAS® WorkSpace Server
    - SAS® Stored Process Server
    - Platform JobScheduler
    2. Mid -Tier Server
    - SAS® Web Report Studio
    - SAS® Information Delivery Portal
    - BEA Web Logic for future SAS® SPM Platform
    - Xythos Web File System (WFS)
    3. Client u2013Tier Server
    - SAS® Enterprise Guide
    - SAS® Add-In for Microsoft Office
    REPORTING
    We have created a number of parameterized stored processes using SAS® Enterprise Guide, which our stakeholders will access as both static (HTML as well as PDF documents) and interactive reports (drill-down) through SAS® Web Report Studio and the SAS® Add-In for Microsoft Office. All canned reports along with SAS® Web Report Studio will be accessed through the SAS® Information Delivery Portal.
    NEXT STEPS
    Next steps of the project include development of a financial data mart along with appropriate data quality standards, monthly frozen snapshots and implementation of university-wide financial reporting standards. This will facilitate electronic access to integrated financial information necessary for the development and maintenance of an integrated, multi-year financial planning framework. Canned reports to include monthly web-based financial statements, with drill-down capability along with budget templates automatically populated with data values and saved in different workbooks for different subgroups (for example by Department). The later will be accomplished using Microsoft Direct Data Exchange (DDE).
    8
    SUGI 30 Focus Session
    As well, we will begin the implementation of SAS® Strategic Performance Management Software to support the performance measurement and monitoring initiative that is a fundamental component of McMasteru2019s strategic plan. This tool will assist in critically assessing and identifying meaningful and statistically relevant measures and indicators. This software can perform causal analyses among various measures within and across areas providing useful information on inter-relationships between factors and measures. As well as demonstrating how decisions in one area affect other areas, these cause-and-effect analyses can reveal both good performance drivers and also possible detractors and enable u2018evidenced-basedu2019 decision-making. Finally, the tool provides a balanced scorecard reporting format, designed to identify statistically significant trends and results that can be tailored to the specific goals, objectives and measures of the various operational areas of the University.
    LESSONS LEARNED
    Lessons learned include the importance of taking a consultative approach not only in assessing information needs, but also in building data hierarchies, understanding subject matter, and in prioritizing tasks to best support decision making and inform senior management. We found that a combination of training and mentoring (knowledge transfer) helped us accelerate learning the new tools. It was very important to ensure that time and resources were committed to complete the necessary planning and data quality initiatives prior to initiating the first project. When developing a project plan, it is important to

  • EDGE UP RETURNED MULTIPLE TIMES Don't know what to do now

    Hi ,
    I have been a loyal Verizon customer with an account in good standing for as long as I've owned a cell phone... I am looking for resolution to an ongoing problem from my EDGE agreement.   I upgraded to Iphone 6 plus in November.  I initially lost my shipping label and had to request another to return my Samsung Galaxy s4 to the Edge Program.  I had to request a new one which took weeks to arrive.  Once I received it I put the phone in the mail immediately and tracked it to arrival at it's destination, thinking everything was good.  On the 45th and last day I had to return the phone it showed back up on my doorstep.  It was rejected with the explanation that it was not the phone on the original edge up program and was not an authorized Verizon replacement...that was correct information, however the end of June or beginning of July 2014 my phone was replaced under warranty as the service was never up to par...After numerous troubleshooting calls a technician decided to replace the phone.  At that time I returned the original phone. Evidently after hour long chats and phone rep conversations it was determined that my information was in fact the truth.  The phone rep never returned my call as promised, but the chat person got help from her supervisor to correct the ESN number in the system with that of the replacement phone, ship out a new return label, and put a note on the account that the warehouse should accept the return even though arrival would be past the 45 day cut off.  So a second time I sent back the phone.  Thinking everything was corrected.  I tracked the phone to the warehouse.  After another period of time the phone arrived back to me a second time.  I placed a call that day.  So stressed about the now 300.00 charge showing up on my account.  The customer service rep again had to verify the complete story of what had happened.  After another hour plus conversation and consultation with supervision, the plan was:  Go to Verizon and do the trade-in, as Verizon, " has to get the phone back"  Once the phone is received I will get a 100.00 credit, when the representative confirms the phone is received she will credit my account an additional 200.00.  The padded envelope I received to return the phone was pitiful.  most of the bubble wrap was popped to begin with.  I have photos of the phone the day I shipped it.  I was also disappointed with no tracking number I could utilize....so I paid and extra fee to add it at the post office.  I have a receipt that I shipped the phone on 1/27/15 and that it should have arrived at destination on 1/30/15, but the phone has not been scanned again since leaving my local post office, so that is as far as I can track it.  I don't know what the answer is....but the ESN not being changed was obviously the root of the problem and not something I could control.  Now I am holding my breath that the phone arrives and is found to be at the 100 value and that the customer service rep holds up what she says she would do.....  I am looking for help and some type of resolution....I have sent the phone back and now have launched an inquiry with the post office since I can't track it any further.  Please give me some idea of how to rectify this situation.  I do not want to be bitter with Verizon, but this has truly been a night mare, and I have spent valuable time rehashing this story with multiple representatives to no avail.  What can I do?

    Have you seen this Apple article on troubleshooting launch problems?
    http://docs.info.apple.com/article.html?artnum=302856

  • How can i find my ipod touch 5th g that has been stole (it does have icloud but it says that it needs internet connection) i dont know what to do now plz help

    How can i find my ipod touch 5th g that has been stole (it does have icloud but it says that it needs internet connection) i dont know what to do now plz help

    What To Do If Your iDevice or Computer Is Lost Or Stolen
    If your Mac, iPhone, iPod, iPod Touch, or iPad is lost or stolen what do you do? There are things you should do in advance - before you lose it or it's stolen - and some things to do after the fact. Here are some suggestions:
      1. Reporting a lost or stolen Apple product
      2. Find my lost iPod Touch
      3. AT&T, Sprint, and Verizon can block stolen phones/tablets
      4. What-To-Do-When-Iphone-Is-Stolen
      5. Lost or Stolen iPhone? Here’s What to do
      6. 6 Ways to Track and Recover Your Lost/Stolen iPhone
      7. Find My iPhone
    It pays to be proactive by following the advice on using Find My Phone before you lose your device:
      1. Find My iPhone
      2. Setup your iDevice on MobileMe
      3. OS X Lion- About Find My Mac
      4. How To Set Up Free Find Your iPhone (Even on Unsupported Devices)
    Third-party solutions for computers:
      1. VUWER 1.5.4
      2. Sneaky ******* 0.2.0
      3. Undercover 4.7
      4. LoJack for Laptops Premium Mac
      5. STEM 2.1
      6. MacPhoneHome 3.5

  • What about session memory when using BEA Weblogic connection pooling?

    Hi,
    consider a web application, allowing database connections via a BEA Weblogic 8.1 application server. The app-server is pooling the oracle connections. The oracle database is running in dedicated server mode.
    How are the database requests from the web app served by the connection pool from BEA?
    1) Does one oracle session serve more than one request simultanously?
    2) Does BEA serialize the requests, which means, that a session from the pool is always serving only one request at a time?
    If (1) is true, than what about the session memory of Oracle sessions? I understand, that things like package global variables are beeing stored in this session private memory. If (1) is true, the PL/SQL programmer has the same situation, as with programming an Oracle databas in "shared server" mode, that is, he should not use package global variables etc.
    Thankful for any ideas...
    Message was edited by:
    Xenofon

    Xenofon Grigoriadis wrote:
    Hi,
    consider a web application, using BEA between client and an Oracle Database (v9i). BEA is pooling the oracle connections. The oracle database is running in dedicated server mode.
    How are the database requests from the web app beeing served by the connection pool from BEA?
    1) Does one oracle session serve more than one request simultanously?no.
    2) Or does BEA serialize the requests, which means, that a session from the pool is always serving only one request at a time?
    Reading "Configuring and Using WebLogic JDBC" from weblogic8.1 documentation, I read:
    "... Your application "borrows" a connection from the pool, uses it, then returns it to the pool by closing it...."
    What do you mean by returning the connection by closing it? Tbe server will either return the connection to the pool or close it...When application code does typical jdbc code, it obtains
    a connection via a WebLogic DataSource, which reserves an
    unused pooled connection and passes it (transparently wrapped)
    to the application. The application uses it, and then closes
    it. WebLogic intercepts the close() call via the wrapper, and
    puts the DBMS connection back into the WebLogic pool.
    The reason, why I as an Oracle programmer ask this is, because every session (=connection)
    in Oracle has its own dedicate, private memory for things like global PL/SQL variables.
    Now I want to figure out, if you have to careful in programming your databases, when
    one Oracle session (=connection) is serving many weblogic requests.It is serving many requests, but always serially. Do note however, that we
    also transparently cache/pool prepared and callable statements with the
    connection so repeat uses of the connection will be able to get already-made
    statements when they call prepareStatement() and prepareCall(). These
    long-lived statements will each require a DBMS-side cursor.
    >
    Thankful for any ideas or practical experience...
    Message was edited by:
    mk637Joe

  • TS1424 What about error -1202?

    What about error -1202?
    I've had problems with Win 7 64bit installations spanning iTunes 10 to now iTunes 11.
    Connecting to the store generates -1202 unexpected errors.
    I can't seem to find clear definition to what error code -1202 is...

    I run across the same problem upgrading to ios 5. I finnally took my phone to future shop (totally away from my server, wifi, laptop and its firewalls etc) and the upgrade is now installed. Last night I tried uploading ios 5 on my wifes phone (purchased at exactly the same place and time as mine and it worked perfect the first time, go figure. The only difference was i was running windows vista on my laptop and my wife has windows 7 on her laptop who knows if this has some effect on the upgrade.

  • ICloud Drive, what about sharing contacts with my older iOS devices?

    Hi folks, I have finally upgraded my Macbook Pro to Yosemite and my iPhone 5S to iOS 8 and Monday will be the promising iOS 8.1.
    During the process I have been offered to also update my iCloud account to iCloud Drive.
    Sounds cool and necessary to benefit from a few extra features however I still own and use a iPhone 3GS and another iPhone 4.
    It's clear that with iCloud Drive I won't be able to share documents among those devices; I can live with that but what about my contacts, calendars and Safari bookmarks not to mention Photos and iTunes Match, would that be the end of it or would those later services still be shared among older and newer devices?
    I can't see it clearly stated among iCloud Drive specs and now I am hesitating with the update..
    P

    Hi randers4, your explanation convinced me and I have made the plunge and upgraded to iCloud Drive.
    It works as you explained, all other services such as Safari Bookmarks, Reminders, Contacts and keep syncing data among them. Nice.
    It will be interesting however, how custom folders and files, will share among different users.
    Haven't found much documentation on that either but suspect the mechanism won't be as refined as in DropBox.
    For instance: as far as I can see, I can't create/copy a link to one specific folder I have created but have to use either Mail, Messages, or one of the SocialMedia I have registered on the Mac.
    But perhaps I should start a new topic on this
    Thanks and regards

Maybe you are looking for

  • Windows Vista, Itunes 11, and Itunes Store

    Running Windows Vista, and upgraded to Itunes 11.  I am trying to access the Itunes Store, but I am getting an error message (-50) when trying to get into the store.  Going through Windows updates, but still getting the same error message.  Any sugge

  • How to Query the Audit Tables

    Our Production system is suffering performance issues which we attribute to the large volume of records in the audit tables. We want to implement an archival solution to alleviate this, which would involve transferring older audit records to a separa

  • Importing titles from LiveType

    When I import a title generated from LiveType, it has to be rendered in Final Cut Express HD. After rendering, the type is pixelated both in the preview and the final DVD. Any ideas whey a .mov file from LiveType needs to be rendered in FCEHD and or

  • Opening .wps documents

    I have received an email with an attachment which is a text document with the .wps file attachment. Is there any way to open it other than downloading third party software from the internet? It won't open in Pages, Preview or Text Edit.

  • Flash and dream weaver

    I havnt tried it yet, but im just curious to get a head start for when I do. I will have roughly 5 flash buttons and a movie clip (with a rollover function for the buttons) all positioned around a page... When I import them to dream weaver, will I be