ESP vs. Hana (...) - Differences

Hi guys,
i am working on my thesis at the moment and comparing streaming technologies with hana, hadoop and so on. ESP is a part of my work.
I want to ask you guys, are there some camparisons between hana and esp? What are the differences between them, for example, I/O behaviour? I want to ask: Do i need ESP if i have Hana, and why? Where are the limitations of hana, when do i need a CEP system like ESP? Are streaming technologies, like ESP or Apache Storm, really nessesary and when, when do we need them?
I hope you can help me with some useful information, links or something, especially about SAP ESP and HANA.
Thank you!

ESP is a technology that complements SAP HANA.  As they are fundamentally different technologies, it really makes more sense to talk about how they complement each other rather than how they are different.  SAP HANA is a database and an application platform, while ESP is - well, an event stream processor.  So let's start with the fact that ESP is not a database and is not built on a database. It's a real-time event processing engine that operates on an entirely event-driven model.  Data streams into the ESP engine in real-time, flows through continuous queries that have been defined, and results are published - i.e. streamed out from the ESP engine - in real-time, in response to those  incoming events. ESP is does not provide permanent or even long-term data persistence and is not designed to support ad-hoc queries (yes, there is some very limited ability to query windows...but let's not let that complicate things.
Generally, SAP ESP is used with SAP HANA in either/both of the following ways:
1. To capture streaming data in SAP HANA, providing the ability to receive live data streams, apply any desired filters, transformations,  aggregations, correlations, etc and then capturing the desired data  in HANA (in the desired form)
2. Real-time response:  monitor data as it streams in to generate alerts, notifications, or initiate a response as fast as the information is received.
For an overview of what SAP ESP is, how it works, and how it can be used, I suggest this paper.  You might also find this video showing how ESP can be used with SAP HANA to be helpful. And there are a number of example use cases for ESP described in the Event Processing community on SCN.

Similar Messages

  • SAP HANA : differences and costs

    Dear All,
    HANA is designed to enable faster ways to process data from business applications in real time, without impacting the underlying source system. I believe HANA will bring new and interesting opportunities to SAP. Which are the most important technical differences between HANA, BWA and BOEA? Which are the cost differences?
    Regards,
    Bob

    Bob,
    Here are my thoughts:
    HANA: Here's my recommendation for the best in-class next-generation BI solution. Deploy HANA as a standlone server with two logical system partitions. 1st partition for standalone HANA modeling and 2nd partition to host HANA DB for BW 7.3. This way you get to exploit HANA performance for both SAP BW system as a database and also use the HANA power for standalone non-BW (ECC and flat-file) application that need good performance.
      BWA: I would not recommend a BWA solution for a new BW implementation. Given the fact that SAP has announced recently that BWA 7.3 will be the last release for BWA. However, if there is a critical BW application in production that needs better performance, then BWA will be a quick fix solution. The cost difference between an SAP HANA solution and a BWA solution is narrowing down quickly. I do not want to go into details of cost.
    BOEA (aka BOE Accelerator Version): Guys, there is some confusion here. BOEA does not support BWA acceleration for non-BW data source data. Meaning that if you are using BOEA (accelerated version) - you can load non-SAP and Non-BW data but can not accelerate the data using BWA unless the data is put in an SAP BW info provider (cubes,etc..). Only BW info providers in a BOEA solution can exploit BWA acceleration. Other data (non-SAP and Non-BW ) can only exploit on indexing capability of BOE internally but not the BWA. BWA portion of BOEA is specific to BW in the backend.
    Also, please read my executive summary on SAP HANA @ http://www.sendspace.com/filegroup/u1AO5NidaMTYSD49JoHsjg
    Regards,
    Rama

  • SAP HANA: Differences in functionality concering side by side and ERP on HANA scenario

    Dear all,
    There are two ways to use HANA - on the one hand, I could use it as a main database (ERP on HANA) or, on the other hand, I use it as a secondary database next to a non-HANA database (side by side or "sidecar" solution) for selected matters.
    Where are the limitations if I use the side by side solution only? Are there functionalities which I can not use in comparison to the ERP on HANA solution? Or offer both solutions the same functionality but only the way to use HANA is different?
    Do you have any clue or any links concerning documentation - till now I wasn't able to find some..
    Sincerely Yours
    Zapp

    Hi Zapp,
    You can check the below thread for limitations in SideCar Scenario:
    What are the limitations/challenges in HANA sidecar
    In addition to these, you will not be able to use ABAP Proxies, ABAP managed database procedures and many other new functionalities that are being added to ECC on HANA.
    If you use HANA as a sidecar, you would use it to accelerate only few transactions while with ECC on HANA, many standard transactions have been optimized to use the power of hana
    Additionally, you can register for free Suite on HANA course at openSAP and learn more about it:
    Course: SAP Business Suite powered by SAP HANA
    Regards,
    Vivek

  • Setting up site to site vpn with cisco asa 5505

    I have a cisco asa 5505 that needs to be set up for site to site vpn to a cisco asa 5500. The 5505 is the remote office and the 5500 is the main office.
    IP of remote office router is 71.37.178.142
    IP of the main office firewall is 209.117.141.82
    Can someone tell me if my config is correct, this is the first time I am setting this up and it can not be tested until I set it up at the remote office. I would rather know its correct before I go.
    ciscoasa# show run
    : Saved
    ASA Version 7.2(4)
    hostname ciscoasa
    domain-name default.domain.invalid
    enable password TMACBloMlcBsq1kp encrypted
    passwd 2KFQnbNIdI.2KYOU encrypted
    names
    interface Vlan1
    nameif inside
    security-level 100
    ip address 192.168.1.1 255.255.255.0
    interface Vlan2
    nameif outside
    security-level 0
    ip address dhcp setroute
    interface Ethernet0/0
    switchport access vlan 2
    interface Ethernet0/1
    interface Ethernet0/2
    interface Ethernet0/3
    interface Ethernet0/4
    interface Ethernet0/5
    interface Ethernet0/6
    interface Ethernet0/7
    ftp mode passive
    dns server-group DefaultDNS
    domain-name default.domain.invalid
    access-list outside_1_cryptomap extended permit ip host 71.37.178.142 host 209.117.141.82
    access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 host 209.117.141.82
    access-list inside_nat0_outbound extended permit ip host 71.37.178.142 host 209.117.141.82
    pager lines 24
    logging asdm informational
    mtu inside 1500
    mtu outside 1500
    icmp unreachable rate-limit 1 burst-size 1
    asdm image disk0:/asdm-524.bin
    no asdm history enable
    arp timeout 14400
    global (outside) 1 interface
    nat (inside) 0 access-list inside_nat0_outbound
    nat (inside) 1 0.0.0.0 0.0.0.0
    timeout xlate 3:00:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    http server enable
    http 192.168.1.0 255.255.255.0 inside
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart
    crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    crypto map outside_map 1 match address outside_1_cryptomap
    crypto map outside_map 1 set pfs group5
    crypto map outside_map 1 set peer 209.117.141.82
    crypto map outside_map 1 set transform-set ESP-AES-256-SHA
    crypto map outside_map interface outside
    crypto isakmp enable outside
    crypto isakmp policy 10
    authentication pre-share
    encryption aes-256
    hash sha
    group 5
    lifetime 86400
    telnet timeout 5
    ssh timeout 5
    console timeout 0
    vpdn username [email protected] password ********* store-local
    dhcpd auto_config outside
    dhcpd address 192.168.1.2-192.168.1.129 inside
    dhcpd enable inside
    class-map inspection_default
    match default-inspection-traffic
    policy-map type inspect dns preset_dns_map
    parameters
      message-length maximum 512
    policy-map global_policy
    class inspection_default
      inspect dns preset_dns_map
      inspect ftp
      inspect h323 h225
      inspect h323 ras
      inspect rsh
      inspect rtsp
      inspect esmtp
      inspect sqlnet
      inspect skinny
      inspect sunrpc
      inspect xdmcp
      inspect sip
      inspect netbios
      inspect tftp
    service-policy global_policy global
    prompt hostname context
    Cryptochecksum:7e338fb2bf32a9ceb89560b314a5ef6c
    : end
    ciscoasa#
    Thanks!

    Hi Mandy,
    By using following access list define Peer IP as source and destination
    access-list outside_1_cryptomap extended permit ip host 71.37.178.142 host 209.117.141.82
    you are not defining the interesting traffic / subnets from both ends.
    Make some number ACL 101 as you do not have to write the extended keyword then if you like as follows, or else NAME aCL will also work:
    access-list outside_1_cryptomap extended ip 192.168.200.0 0.0.0.255 192.168.100.0 0.0.0.255
    access-list outside_1_cryptomap extended ip 192.168.200.0 0.0.0.255 192.168.100.0 0.0.0.255
    access-list 101 remark CCP_ACL Category=4 access-list 101 remark IPSEC Rule
    !.1..source subnet(called local encryption domain) at your end  192.168.200.0
    !..2.and destination subnet(called remote encryption domain)at other end 192.168.100.0 !.3..I mean you have to define what subnets you need to communicate between which are behind these firewalls
    !..4...Local Subnets behind IP of the main office firewall is 209.117.141.82 say
    !...at your end  192.168.200.0
    !..5.Remote Subnets behind IP of remote office router is 71.37.178.142 say
    !...at other end 192.168.100.0
    Please use Baisc Steps as follows:
    A. Configuration in your MAIN office  having IP = 209.117.141.82  (follow step 1 to 6)
    Step 1.
    Define Crypto ACL/ mirror ACL for other end (change source to destination and destination to source in other side router or VPN device and thats why they are called mirror ACL/ or also called Proxy ID or also called Proxy ACL, your interesting traffic , that you want to encrypt / trave/enter in the tunnel)
    access-list outside_1_cryptomap extended ip 192.168.200.0 0.0.0.255 192.168.100.0 0.0.0.255
    Step 2.
    Config ISAKMP Policy with minimum 4 parameters are to be config for
    crypto isakmp policy 10
    authentication pre-share  ---> Ist parameter of setting Authentication type ISAKMP Policy is OK
    encryption aes-256   --->2nd parameter of ISAKMP Policy is OK
    hash sha   --->  3rd parameter of ISAKMP Policy is OK
    group 5  --->  4th parameter of ISAKMP Policy is OK
    lifetime 86400  ------ >  this 5th parameter is optional , and will negotiate for the less value at either end or by default is will be taken 86400
    Step 3.
    Define Preshared key or PKI which you will use with other side Peer address 71.37.178.142, either key type 0 is Plain text anyone can see it over internet, or use key type 6 for encrypted key , say your password is CISCO123
    Here in your case in step 2 Authentication is using PSK, looks you have not defines Password
    Use following command:
    crypto isakmp key 0 CISCO123 address 71.37.178.142
    or , but not both
    crypto isakmp key 6 CISCO123 address71.37.178.142
    step 4.
    Define Transform set , which will be used for phase 2 tunnel parameters, if you use ESP it can have to sets one cor encryption and other for Authentication.
    Here is yours one:
    crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    this is correct but give name somthing easier to remember /distinguish it is a transform set , like TSET1 instead of ESP-AES-256-SHA ,try following (here you are using ESP so for encryption we use first set as esp-des and for authentication we use second set esp-sha-hmac)
    crypto ipsec transform-set TSET1 esp-des esp-sha-hmac
    or
    crypto ipsec transform-set TSET1 esp-aes-256 esp-sha-hmac
    Suppose you are using only AH then as AH does not support encryption or confidentiality hence it always use onle one set not 2 sets like ESP(remember the difference) say for example only one set for auth etc but no set for encryption hence AH have no such sets like ah-des or ah-3des or ah-aes, it has only second set for authentication like
    ah-sha-hmac or  ah-md5-hmac
    crypto ipsec transform-set TSET1 ah-sha-hmac
    or
    crypto ipsec transform-set TSET1 ah-md5-hmac
    Step 5.
    Now configure Crypto MAP as follows and only one CMPA can be applied to OUTSIDE Interface as VPN tunnel is alsways applied for traffic from inside subnets to outside subnets and only once Cryptomap can be applied to OUTSIDE Interface and hence for several VPN peers from different vendors we use seq no 10, 2 30 for different tunnels in one single CMAP:
    crypto map ipsec-isakmp
    1. Define peer -- called WHO to set tunnel with
    2. Define or call WHICH - Transform Set
    3. Define WHAT to call interesting traffic define in your ACL or Proxy ID or Proxy ACL in step 1 using match address
    Like in your case it is but ipsec-isakmp keyword missing in the ;ast
    crypto map outside_map 10 ipsec-isakmp
    1. set peer 209.117.141.82  -----> is correct as this is your other side peer called WHO in my step
    2. set transform-set TSET1  -----> is correct as this is WHICH, and only one transform set can be called
    !..In you case it is correct
    !...set transform-set ESP-AES-256-SHA (also correct)
    3.  match address outside_1_cryptomap  ---->Name of the extended ACL define as WHAT to pass through this tunnel
    4. set pfs group5 (this is optional but if config at one end same has to be config at other side peer as well)
    Step 6.
    Now apply this one crypto MAP to your OUTSIDE interface always
    interface outside
    crypto map outside_map
    Configure the same but just change ACL on other end in step one  by reversing source and destination
    and also set the peer IP of this router in other end.
    So other side config should look as follows:
    B.  Configuration in oyur Remote PEER IP having IP = 71.37.178.142 (follow step 7 to 12)
    Step 7.
    Define Crypto ACL/ mirror ACL for other end (change source to destination and destination to source in other side router or VPN device and thats why they are called mirror ACL/ or also called Proxy ID or also called Proxy ACL, your interesting traffic , that you want to encrypt / trave/enter in the tunnel)
    access-list outside_1_cryptomap extended ip 192.168.100.0 0.0.0.255 192.168.200.0 0.0.0.255
    Step 8.
    Config ISAKMP Policy with minimum 4 parameters are to be config for
    crypto isakmp policy 10
    authentication pre-share  ---> Ist parameter of setting Authentication type ISAKMP Policy is OK
    encryption aes-256   --->2nd parameter of ISAKMP Policy is OK
    hash sha   --->  3rd parameter of ISAKMP Policy is OK
    group 5  --->  4th parameter of ISAKMP Policy is OK
    lifetime 86400  ------ >  this 5th parameter is optional , and will negotiate for the less value at either end or by default is will be taken 86400
    Step 9.
    Define Preshared key or PKI which you will use with other side Peer address key type 0 is Plain text anyone can see it over internet, or use key type 6 for encrypted key , say your password is CISCO123
    Here in your case in step 8 Authentication is using PSK, looks you have not defines Password
    Use following command:
    crypto isakmp key 0 CISCO123 address 209.117.141.82
    or , but not both
    crypto isakmp key 6 CISCO123 address 209.117.141.82
    step 10.
    Define Transform set , which will be used for phase 2 tunnel parameters, if you use ESP it can have to sets one cor encryption and other for Authentication.
    Here is yours one:
    crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    this is correct but give name somthing easier to remember /distinguish it is a transform set , like TSET1 instead of ESP-AES-256-SHA ,try following (here you are using ESP so for encryption we use first set as esp-des and for authentication we use second set esp-sha-hmac)
    crypto ipsec transform-set TSET1 esp-des esp-sha-hmac
    or
    crypto ipsec transform-set TSET1 esp-aes-256 esp-sha-hmac
    Suppose you are using only AH then as AH does not support encryption or confidentiality hence it always use onle one set not 2 sets like ESP(remember the difference) say for example only one set for auth etc but no set for encryption hence AH have no such sets like ah-des or ah-3des or ah-aes, it has only second set for authentication like
    ah-sha-hmac or  ah-md5-hmac
    crypto ipsec transform-set TSET1 ah-sha-hmac
    or
    crypto ipsec transform-set TSET1 ah-md5-hmac
    Step 11.
    Now configure Crypto MAP as follows and only one CMPA can be applied to OUTSIDE Interface as VPN tunnel is alsways applied for traffic from inside subnets to outside subnets and only once Cryptomap can be applied to OUTSIDE Interface and hence for several VPN peers from different vendors we use seq no 10, 2 30 for different tunnels in one single CMAP:
    crypto map    ipsec-isakmp
    1. Define peer -- called WHO to set tunnel with
    2. Define or call WHICH - Transform Set, only one is permissible
    3. Define WHAT to call interesting traffic define in your ACL or Proxy ID or Proxy ACL in step 1 using match address
    Like in your case it is but ipsec-isakmp keyword missing in the ;ast
    crypto map outside_map 10 ipsec-isakmp
    1. set peer 209.117.141.82  -----> is correct as this is your other side peer called WHO in my step
    2. set transform-set TSET1  -----> is correct as this is WHICH, and only one transform set can be called
    !..In you case it is correct
    !...set transform-set ESP-AES-256-SHA (also correct)
    3.  match address outside_1_cryptomap  ---->Name of the extended ACL define as WHAT to pass through this tunnel
    4. set pfs group5 (this is optional but if config at one end same has to be config at other side peer as well)
    Step 12.
    Now apply this one crypto MAP to your OUTSIDE interface always
    interface outside
    crypto map outside_map
    Now initite a ping
    Here is for your summary:
    IPSec: Site to Site - Routers
    Configuration Steps
    Phase 1
    Step 1: Configure Mirrored ACL/Crypto ACL       for Interesting Traffic
    Step 2: Configure ISAKMP Policy
    Step 3: Configure ISAKMP Key
    Phase 2
    Step 4: Configure Transform Set
    Step 5: Configure Crypto Map
    Step 6: Apply Crypto Map to an Interface
    To debug for Phase 1 and Phase 2. Store it in buffer without displaying logs on terminal.
    Router#debug crpyto isakmp
    Router#debug crpyto ipsec
    Router(config)# logging buffer 7
    Router(config)# logging buffer 99999
    Router(config)# logging console 6
    Router# clear logging
    Configuration
    In R1:
    (config)# access-list 101 permit ipo host 10.1.1.1 host      10.1.2.1
    (config)# crypto isakmp policy 10
    (config-policy)# encryption 3des
    (config-policy)# authentication pre-share
    (config-policy)# group 2
    (config-policy)# hash sha1
    (config)# crypto isakmp key 0 cisco address 2.2.2.1
    (config)# crypto ipsec transform-set TSET esp-3des      sha-aes-hmac
    (config)# crypto map CMAP 10 ipsec-isakmp
    (config-crypto-map)# set peer 2.2.2.1
    (config-crypto-map)# match address 101
    (config-crypto-map)# set transform-set TSET
    (config)# int f0/0
    (config-if)# crypto map CMAP
    Similarly in R2
    Verification Commands
    #show crypto isakmp SA
    #show crypto ipsec SA
    Change to Transport Mode, add the following command in Step 4:
    (config-tranform-set)# mode transport
    Even after  doing this change, the ipsec negotiation will still be done through  tunnel mode if pinged from Loopback to Loopback. To overcome this we  make changes to ACL.
    Change to Aggressive Mode, replace the Step 3 command with these commands in R1:
    (config)# crypto isakmp peer address 2.2.2.1
    (config-peer)# set aggressive-mode password cisco
    (config-peer)# set aggressive-mode clien-endpoint       ipv4-address 2.2.2.1
    Similarly on R2.
    The below process is for the negotiation using RSA-SIG (PKI) as authentication type
    Debug Process:
    After  we debug, we can see the negotiation between the two peers. The first  packet of the interesting traffic triggers the ISAKMP (Phase1)  negotiation. Important messages are marked in BOLD and explanation in  RED
    R2(config)#do ping 10.1.1.1 so lo0 // Interesting Traffic
    Type escape sequence to abort.
    Sending 5, 100-byte ICMP Echos to 1.1.1.1, timeout is 2 seconds:
    Packet sent with a source address of 2.2.2.2
    Mar  2 16:18:42.939: ISAKMP:(0): SA request profile is (NULL) //  Router tried to find any IPSec SA matching the outgoing connection but  no valid SA has been found in Security Association Database (SADB)
    Mar  2 16:18:42.939: ISAKMP: Created a peer struct for 20.1.1.10, peer port 500
    Mar  2 16:18:42.939: ISAKMP: New peer created peer = 0x46519678 peer_handle = 0x8000000D
    Mar  2 16:18:42.939: ISAKMP: Locking peer struct 0x46519678, refcount 1 for isakmp_initiator
    Mar  2 16:18:42.939: ISAKMP: local port 500, remote port 500
    Mar  2 16:18:42.939: ISAKMP: set new node 0 to QM_IDLE    
    Mar  2 16:18:42.939: ISAKMP:(0):insert sa successfully sa = 4542B818
    Mar  2 16:18:42.939: ISAKMP:(0):Can not start Aggressive mode, trying Main mode. // Not an error. By default it is configured for Main Mode
    Mar  2 16:18:42.939: ISAKMP:(0):No pre-shared key with 20.1.1.10! // Since we are using RSA Signature, this message. If we use pre-share, this is where it would indicate so!
    Mar  2 16:18:42.939: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID
    Mar  2 16:18:42.939: ISAKMP:(0): constructed NAT-T vendor-07 ID
    Mar  2 16:18:42.939: ISAKMP:(0): constructed NAT-T vendor-03 ID
    Mar  2 16:18:42.939: ISAKMP:(0): constructed NAT-T vendor-02 ID
    Mar  2 16:18:42.939: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
    Mar  2 16:18:42.939: ISAKMP:(0):Old State = IKE_READY  New State = IKE_I_MM1
    Mar  2 16:18:42.943: ISAKMP:(0): beginning Main Mode exchange
    Mar  2 16:18:42.943: ISAKMP:(0): sending packet to 20.1.1.10 my_port 500 peer_port 500 (I) MM_NO_STATE // Sending ISAKMP Policy to peer
    Mar  2 16:18:42.943: ISAKMP:(0):Sending an IKE IPv4 Packet.
    Mar  2 16:18:42.943: ISAKMP (0): received packet from 20.1.1.10 dport 500 sport 500 Global (I) MM_NO_STATE // Sending ISAKMP Policy to peer
    Mar  2 16:18:42.947: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
    Mar  2 16:18:42.947: ISAKMP:(0):Old State = IKE_I_MM1  New State = IKE_I_MM2
    Mar  2 16:18:42.947: ISAKMP:(0): processing SA payload. message ID = 0
    Mar  2 16:18:42.947: ISAKMP:(0): processing vendor id payload
    Mar  2 16:18:42.947: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch // Do not worry about this! Not an ERROR!
    Mar  2 16:18:42.947: ISAKMP:(0): vendor ID is NAT-T v2
    Mar  2 16:18:42.947:.!!!!
    Success rate is 80 percent (4/5), round-trip min/avg/max = 1/2/4 ms
    R2(config)# ISAKMP:(0): processing vendor id payload
    Mar  2 16:18:42.947: ISAKMP:(0): processing IKE frag vendor id payload
    Mar  2 16:18:42.947: ISAKMP:(0):Support for IKE Fragmentation not enabled
    Mar  2 16:18:42.947: ISAKMP : Scanning profiles for xauth ...
    Mar  2 16:18:42.947: ISAKMP:(0):Checking ISAKMP transform 1 against priority 10 policy
    Mar  2 16:18:42.947: ISAKMP:      encryption 3DES-CBC
    Mar  2 16:18:42.947: ISAKMP:      hash SHA
    Mar  2 16:18:42.947: ISAKMP:      default group 2
    Mar  2 16:18:42.947: ISAKMP:      auth RSA sig
    Mar  2 16:18:42.947: ISAKMP:      life type in seconds
    Mar  2 16:18:42.947: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80
    Mar  2 16:18:42.947: ISAKMP:(0):atts are acceptable. Next payload is 0
    Mar  2 16:18:42.947: ISAKMP:(0):Acceptable atts:actual life: 0
    Mar  2 16:18:42.947: ISAKMP:(0):Acceptable atts:life: 0
    Mar  2 16:18:42.947: ISAKMP:(0):Fill atts in sa vpi_length:4
    Mar  2 16:18:42.947: ISAKMP:(0):Fill atts in sa life_in_seconds:86400
    Mar  2 16:18:42.947: ISAKMP:(0):Returning Actual lifetime: 86400
    Mar  2 16:18:42.947: ISAKMP:(0)::Started lifetime timer: 86400.
    Mar  2 16:18:42.947: ISAKMP:(0): processing vendor id payload
    Mar  2 16:18:42.947: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch
    Mar  2 16:18:42.947: ISAKMP:(0): vendor ID is NAT-T v2
    Mar  2 16:18:42.947: ISAKMP:(0): processing vendor id payload
    Mar  2 16:18:42.951: ISAKMP:(0): processing IKE frag vendor id payload
    Mar  2 16:18:42.951: ISAKMP:(0):Support for IKE Fragmentation not enabled
    Mar  2 16:18:42.951: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
    Mar  2 16:18:42.951: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM2
    Mar  2 16:18:42.951: ISAKMP (0): constructing CERT_REQ for issuer cn=ca_server OU=cisco C=India S=Karnataka L=Bangalore
    Mar  2 16:18:42.951: ISAKMP:(0): sending packet to 20.1.1.10 my_port 500 peer_port 500 (I) MM_SA_SETUP // Sending Key Exchange Information to peer
    Mar  2 16:18:42.951: ISAKMP:(0):Sending an IKE IPv4 Packet.
    Mar  2 16:18:42.951: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
    Mar  2 16:18:42.951: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM3
    Mar  2 16:18:42.955: ISAKMP (0): received packet from 20.1.1.10 dport 500 sport 500 Global (I) MM_SA_SETUP // Receive key exchange information from peer
    Mar  2 16:18:42.955: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
    Mar  2 16:18:42.955: ISAKMP:(0):Old State = IKE_I_MM3  New State = IKE_I_MM4
    Mar  2 16:18:42.959: ISAKMP:(0): processing KE payload. message ID = 0
    Mar  2 16:18:43.003: ISAKMP:(0): processing NONCE payload. message ID = 0
    Mar  2 16:18:43.007: ISAKMP:(1008): processing CERT_REQ payload. message ID = 0
    Mar  2 16:18:43.007: ISAKMP:(1008): peer wants a CT_X509_SIGNATURE cert
    Mar  2 16:18:43.007: ISAKMP:(1008): peer wants cert issued by cn=ca_server OU=cisco C=India S=Karnataka L=Bangalore
    Mar  2 16:18:43.007:  Choosing trustpoint CA_Server as issuer
    Mar  2 16:18:43.007: ISAKMP:(1008): processing vendor id payload
    Mar  2 16:18:43.007: ISAKMP:(1008): vendor ID is Unity
    Mar  2 16:18:43.007: ISAKMP:(1008): processing vendor id payload
    Mar  2 16:18:43.007: ISAKMP:(1008): vendor ID seems Unity/DPD but major 180 mismatch
    Mar  2 16:18:43.007: ISAKMP:(1008): vendor ID is XAUTH
    Mar  2 16:18:43.007: ISAKMP:(1008): processing vendor id payload
    Mar  2 16:18:43.007: ISAKMP:(1008): speaking to another IOS box!
    Mar  2 16:18:43.007: ISAKMP:(1008): processing vendor id payload
    Mar  2 16:18:43.007: ISAKMP:(1008):vendor ID seems Unity/DPD but hash mismatch
    Mar  2 16:18:43.007: ISAKMP:received payload type 20
    Mar  2 16:18:43.007: ISAKMP (1008): His hash no match - this node outside NAT
    Mar  2 16:18:43.007: ISAKMP:received payload type 20
    Mar  2 16:18:43.007: ISAKMP (1008): No NAT Found for self or peer
    Mar  2 16:18:43.007: ISAKMP:(1008):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
    Mar  2 16:18:43.007: ISAKMP:(1008):Old State = IKE_I_MM4  New State = IKE_I_MM4
    Mar  2 16:18:43.011: ISAKMP:(1008):Send initial contact
    Mar  2 16:18:43.011: ISAKMP:(1008):My ID configured as IPv4 Addr, but Addr not in Cert!
    Mar  2 16:18:43.011: ISAKMP:(1008):Using FQDN as My ID
    Mar  2 16:18:43.011: ISAKMP:(1008):SA is doing RSA signature authentication using id type ID_FQDN
    Mar  2 16:18:43.011: ISAKMP (1008): ID payload
              next-payload : 6
              type         : 2
              FQDN name    : R2
              protocol     : 17
              port         : 500
              length       : 10
    Mar  2 16:18:43.011: ISAKMP:(1008):Total payload length: 10
    Mar  2 16:18:43.019: ISAKMP (1008): constructing CERT payload for hostname=R2+serialNumber=FHK1502F2H8
    Mar  2 16:18:43.019: ISAKMP:(1008): using the CA_Server trustpoint's keypair to sign
    Mar  2 16:18:43.035: ISAKMP:(1008): sending packet to 20.1.1.10 my_port 500 peer_port 500 (I) MM_KEY_EXCH
    Mar  2 16:18:43.035: ISAKMP:(1008):Sending an IKE IPv4 Packet.
    Mar  2 16:18:43.035: ISAKMP:(1008):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
    Mar  2 16:18:43.035: ISAKMP:(1008):Old State = IKE_I_MM4  New State = IKE_I_MM5
    Mar  2 16:18:43.047: ISAKMP (1008): received packet from 20.1.1.10 dport 500 sport 500 Global (I) MM_KEY_EXCH
    // "MM_KEY_EXCH" indicates that the peers have exchanged DH Public keys and generated a shared secret!
    Mar  2 16:18:43.047: ISAKMP:(1008): processing ID payload. message ID = 0
    Mar  2 16:18:43.047: ISAKMP (1008): ID payload
              next-payload : 6
              type         : 2
              FQDN name    : ASA1
              protocol     : 0
              port         : 0
              length       : 12
    Mar  2 16:18:43.047: ISAKMP:(0):: peer matches *none* of the profiles // Normal Message! Not an error!
    Mar  2 16:18:43.047: ISAKMP:(1008): processing CERT payload. message ID = 0
    Mar  2 16:18:43.047: ISAKMP:(1008): processing a CT_X509_SIGNATURE cert
    Mar  2 16:18:43.051: ISAKMP:(1008): peer's pubkey isn't cached
    Mar  2 16:18:43.059: ISAKMP:(1008): Unable to get DN from certificate!
    Mar  2 16:18:43.059: ISAKMP:(1008): Cert presented by peer contains no OU field.
    Mar  2 16:18:43.059: ISAKMP:(0):: peer matches *none* of the profiles
    Mar  2 16:18:43.063: ISAKMP:(1008): processing SIG payload. message ID = 0
    Mar  2 16:18:43.067: ISAKMP:received payload type 17
    Mar  2 16:18:43.067: ISAKMP:(1008): processing vendor id payload
    Mar  2 16:18:43.067: ISAKMP:(1008): vendor ID is DPD
    Mar  2 16:18:43.067: ISAKMP:(1008):SA authentication status:
              authenticated
    Mar  2 16:18:43.067: ISAKMP:(1008):SA has been authenticated with 20.1.1.10
    Mar  2 16:18:43.067: ISAKMP: Trying to insert a peer 40.1.1.1/20.1.1.10/500/,  and inserted successfully 46519678. // SA inserted into SADB
    Mar  2 16:18:43.067: ISAKMP:(1008):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
    Mar  2 16:18:43.067: ISAKMP:(1008):Old State = IKE_I_MM5  New State = IKE_I_MM6
    Mar  2 16:18:43.067: ISAKMP:(1008):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
    Mar  2 16:18:43.067: ISAKMP:(1008):Old State = IKE_I_MM6  New State = IKE_I_MM6
    Mar  2 16:18:43.071: ISAKMP:(1008):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
    Mar  2 16:18:43.071: ISAKMP:(1008):Old State = IKE_I_MM6  New State = IKE_P1_COMPLETE
    Mar  2 16:18:43.071: ISAKMP:(1008):beginning Quick Mode exchange, M-ID of -1523793378
    Mar  2 16:18:43.071: ISAKMP:(1008):QM Initiator gets spi
    Mar  2 16:18:43.075: ISAKMP:(1008): sending packet to 20.1.1.10 my_port 500 peer_port 500 (I) QM_IDLE    
    Mar  2 16:18:43.075: ISAKMP:(1008):Sending an IKE IPv4 Packet.
    Mar  2 16:18:43.075: ISAKMP:(1008):Node -1523793378, Input = IKE_MESG_INTERNAL, IKE_INIT_QM
    Mar  2 16:18:43.075: ISAKMP:(1008):Old State = IKE_QM_READY  New State = IKE_QM_I_QM1
    Mar  2 16:18:43.075: ISAKMP:(1008):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
    Mar  2 16:18:43.075: ISAKMP:(1008):Old State = IKE_P1_COMPLETE  New State = IKE_P1_COMPLETE
    Mar  2 16:18:43.079: ISAKMP (1008): received packet from 20.1.1.10 dport 500 sport 500 Global (I) QM_IDLE // IPSec Policies
    Mar  2 16:18:43.079: ISAKMP:(1008): processing HASH payload. message ID = -1523793378
    Mar  2 16:18:43.079: ISAKMP:(1008): processing SA payload. message ID = -1523793378
    Mar  2 16:18:43.079: ISAKMP:(1008):Checking IPSec proposal 1
    Mar  2 16:18:43.079: ISAKMP: transform 1, ESP_3DES
    Mar  2 16:18:43.079: ISAKMP:   attributes in transform:
    Mar  2 16:18:43.079: ISAKMP:      SA life type in seconds
    Mar  2 16:18:43.079: ISAKMP:      SA life duration (basic) of 3600
    Mar  2 16:18:43.079: ISAKMP:      SA life type in kilobytes
    Mar  2 16:18:43.079: ISAKMP:      SA life duration (VPI) of  0x0 0x46 0x50 0x0
    Mar  2 16:18:43.079: ISAKMP:      encaps is 1 (Tunnel)
    Mar  2 16:18:43.079: ISAKMP:      authenticator is HMAC-SHA
    Mar  2 16:18:43.079: ISAKMP:(1008):atts are acceptable. // IPSec attributes are acceptable!
    Mar  2 16:18:43.079: ISAKMP:(1008): processing NONCE payload. message ID = -1523793378
    Mar  2 16:18:43.079: ISAKMP:(1008): processing ID payload. message ID = -1523793378
    Mar  2 16:18:43.079: ISAKMP:(1008): processing ID payload. message ID = -1523793378
    Mar  2 16:18:43.083: ISAKMP:(1008): Creating IPSec SAs
    Mar  2 16:18:43.083:         inbound SA from 20.1.1.10 to 40.1.1.1 (f/i)  0/ 0
              (proxy 1.1.1.1 to 2.2.2.2)
    Mar  2 16:18:43.083:         has spi 0xA9A66D46 and conn_id 0
    Mar  2 16:18:43.083:         lifetime of 3600 seconds
    Mar  2 16:18:43.083:         lifetime of 4608000 kilobytes
    Mar  2 16:18:43.083:         outbound SA from 40.1.1.1 to 20.1.1.10 (f/i) 0/0
              (proxy 2.2.2.2 to 1.1.1.1)
    Mar  2 16:18:43.083:         has spi  0x2B367FB4 and conn_id 0
    Mar  2 16:18:43.083:         lifetime of 3600 seconds
    Mar  2 16:18:43.083:         lifetime of 4608000 kilobytes
    Mar  2 16:18:43.083: ISAKMP:(1008): sending packet to 20.1.1.10 my_port 500 peer_port 500 (I) QM_IDLE    
    Mar  2 16:18:43.083: ISAKMP:(1008):Sending an IKE IPv4 Packet.
    Mar  2 16:18:43.083: ISAKMP:(1008):deleting node -1523793378 error FALSE reason "No Error"
    Mar  2 16:18:43.083: ISAKMP:(1008):Node -1523793378, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH
    Mar  2 16:18:43.083: ISAKMP:(1008):Old State = IKE_QM_I_QM1  New State = IKE_QM_PHASE2_COMPLETE // At this point tunnels are up and ready to pass traffic!
    Verification Commands
    #show crypto isakmp SA
    #show crypto ipsec SA
    Kindly rate if you find the explanation useful !!
    Best Regards
    Sachin Garg

  • Difference between BW on HANA, Native HANA and HANA Enterprise..?

    Hi Experts,
    I am learning SAP HANA modeling.
    I am not able understand why there are three terminologies i.e., BW on HANA, NAtive HANA and HANA enterprise..
    Could you please tell me the "Difference between BW on HANA, Native HANA and HANA Enterprise..?"""
    I searched in sdn but not getting required info.
    Please share the links if you have.
    Thanks
    Asha

    Asha,
    BW is a SAP Business Application, which can run on many traditional relational databases and on the SAP HANA database, BW on HANA is the BW application running on the HANA database, for details please see http://scn.sap.com/community/bw-hana/faq
    Native HANA means in general that the code has been developed on HANA and specifically for HANA. For example BW has coding which can run on all databases which are certified for BW, and new code developed specifically for HANA = HANA native.  Or another example, HANA studio is a native HANA application.
    HANA enterprise is a license version of HANA. You can buy runtime licenses to run BW on HANA for example, and you can buy the enterprise license, which is a very comprehensive license to use many HANA capabilities. Please see your SAP account executive or SAP partner for details.
    thank you
    erich

  • Differences between Classic BW and HANA on BW?

    Dear Friends,
    can we discuss here what are main difference between classic BW and HANA on BW?
    Please share your thoughts who was involved in RAMPup.
    already know some differences IMDB DSO, Cube, still some gaps are not clarify till i install BW on HAN
    thanks
    rao

    First of all , HANA Enterprise Extend edition DOES NOT Meets all  BW features.
    There are no best scenario, it is dependent on scenarios.HANA SPS3 scenarios would be great fit  for Agile Data mart however BW on HANA would be great fit for EDW scenarios.
    For users who already have BW with BWA, BW on HANA bring performance improvement on the other side of equation (ETL side)  along with query improvement.
    At high level, following are some of techinal issues with using HANA SPS 3 as "One fit for all" :
    1. Currently, there is no reporting tool available which can recogonize variable functionality of HANA. One may use universe variable functionality however the functionality will not provide all exhaustive options.
    2. Currently Hierarchies cannot be recogonized by any of reporting tools.
    3. Currently Data Level security options in HANA is limited.
    Another dimension to consider is if you have planning application,Integrated Planning is currently supported and BPC will be supported soon (the scenario is only possible BW on HANA).
    Hope this is helpful.
    PS:
    Regarding HANA 1.0 SPS3, for your below scenario:
    SAP & non SAP  -  BODS 4.0 -- HANA 1.0 SPS3 -- BI 4.0( Any front end ODBC support )
    you will need BODS 4.1 version.

  • Difference between BI content and HANA optimized BI content ?

    Hi to all,
    Is BW is already have HANA database, what is difference between BI content and HANA optimized BI content.
    Can any one explain in general term, I have already gone with SAP HELP but, cant grab more of it.
    Does we have HANA optimized BI Content only for DS and FI only.
    Regards
    Pavneet Rana

    Hi Pavanet,
    you can find more info on the SAP HANA-optimized BI Content and the supported areas following this link:
    http://help.sap.com/saphelp_nw74/helpdata/en/28/a1065182d3c557e10000000a44176d/frameset.htm
    The SAP HANA-optimized content does contain physical InfoProviders and adheres to the LSA++ architecture paradigm as to reduce persistencies where possible and if it makes sense. One purpose is to provide a guidance of data modelling in the SAP BW on HANA case making use of recent SAP BW features.
    For the near future a switch to the recent BW Infoproviders (advanced) DSO and CompositeProvider is planned.
    best regards,
    Simon

  • Can SAP ESP share SAP HANA sever hardware for installation

    Hi All,
    To install SAP ESP do we need separate hardware server or can it share SAP HANA server?
    And will CEP engine be integrated within sap hana? If yes then what is the roadmap?

    Hello,
    Please for the future, use separate posts for your separate subject questions, so that others can easily search and find the questions/answers.
    To answer your first question of:
    To install SAP ESP do we need separate hardware server or can it share SAP HANA server?
    - For performance reasons, SAP does not support installing both servers on the same machine, as mentioned in ESP Documentation here: SyBooks Online. (SAP Sybase Event Stream Processor 5.1 SP04 > Adapters Guide > Adapters Currently Available from SAP > SAP HANA Output Adapter >  Performance and Tuning Tips for the SAP HANA Adapter)
    To answer your second question of:
    And will CEP engine be integrated within sap hana? If yes then what is the roadmap?
    - Please see this post: http://scn.sap.com/community/developer-center/esp/blog/2014/04/14/esp-roadmap-webinar-this-thursday
    Thank you,
    Alice

  • What are the major differences between hana 2013 and 2014 release

    Hi Guys,
    I am planning to learn sap hana and write certification exam. As sap release new platform 2014, may I know what are the major deference between 2013 and 2014 release or its just enhancement pack on top of 2013.
    Please help me....thank you in advance.
    Regards,
    Tapas

    Hi,
    Good morning and greetings,
    Please use the following link
    http://solutionbrowser.erp.sap.fmpmedia.com
    Please reward points if found useful
    Thanking you
    With kindest regards
    Ramesh Padmanabhan

  • Why SAP HANA ? what made it difference from Data ware housing concept ?

    Hi,
    Greetings Guys !! I am wondering and kind of lost with giant SAP newly introduced database SAP HANA. I have been informed that HANA is developed for fast query processing mainly.The older method of query processing involves lot of time ,i.e . the request should go to database and will retrieve information . If HANA have shown IMDB ( In- Memory database ) technology , Dataware house concept also solves waiting time of query processing .
    Could some one explain me why HANA is introduced if Dateware house concept was already born ??
    Message was edited by: Tom Flanagan

    Hi Venkatesh Garlapat,
    SAP HANA is/was not only about reinventing the DW concepts again, but its a lot more than that.
    Probably Google would have helped you, but let me point you to the right content which can clarify your doubts: Please refer:
    http://www.saphana.com/welcome
    About HANA | SAP HANA
    Features | SAP HANA
    SAP HANA Outperforms | SAP HANA
    SAP HANA Cloud Platform | SAP HANA
    Data Compatibility | SAP HANA
    I hope above links helps.
    Happy Learning.
    Regards
    Kumar

  • Difference between the Matlab and LabVIEW Hann (Hanning) functions

    Hi All,
    I'm hoping someone out there can satisfy my curiosity. I have been porting over some code from Matlab to LabVIEW and came accross a difference in the two implementations of the Hann function. Essentially:
    LabVIEW has array length = n
    http://zone.ni.com/reference/en-XX/help/371361J-01​/lvanls/hanning_window/
    Matlab has array length -1 = N.
    http://www.mathworks.co.uk/help/signal/ref/hann.ht​ml
    (where n= N in the two implementations)
    As I'm not very clued up on signal processing I was hoping someone could explain why there is a difference in implementation and why array length was chosen for the LabVIEW implementation. According to wolfram the parameter a is full width at half maximum:
    http://mathworld.wolfram.com/HanningFunction.html
    http://mathworld.wolfram.com/FullWidthatHalfMaximu​m.html
    Is the difference just due to the interpretation of what this value should be?
    I've attached a modified version of the window comparison example to illustrate the diference.
    Thanks,
    Attachments:
    Window Comparison from example.vi ‏32 KB

    ^N wrote:
    LabVIEW has array length = n
    Matlab has array length -1 = N.
    Could part o the confusion be due to the fact that LabVIEW arrays start with index zero and matlab arrays start with index one?
    I'll look at your code later...
    LabVIEW Champion . Do more with less code and in less time .

  • How to Perform Java Vector Difference?

    Hello All,
    I need some help for Difference Between 2 Vectors Implementation
    I have written a short program to explain what I exactly one.. BasicallY I am looking for a method that returns a Vector containing the elements of vect1 minus the elements of vect2
    I tried using 2 for loops but its not possible. Is there a built in or a easier way to achieve this difference between 2 Vectors?
    import java.util.Vector;
    public class VectorDifference {
         static Student stud1 = new Student("Test1", 15);
         static Student stud2 = new Student("Test2", 15);
         static Student stud3 = new Student("Test3", 15);
         static Student stud4 = new Student("Test1", 15);
         static Student stud5 = new Student("Test3", 15);
         static Student stud6 = new Student("Test7", 15);
         static Vector vect1 = new Vector();
         static Vector vect2 = new Vector();
         public static void main(String[] args) {
              vect1.add(stud1);
              vect1.add(stud2);
              vect1.add(stud3);
              vect1.add(stud4);
              vect1.add(stud5);
              vect1.add(stud6);
              System.out.println("Vector 1 - Vector 2");
    class Student{
         String name;
         int age;
         public int getAge() {
              return age;
         public void setAge(int age) {
              this.age = age;
         public String getName() {
              return name;
         public void setName(String name) {
              this.name = name;
         public boolean equals(Object obj){
                   if(!(obj instanceof Student)){
                        return false;
                   Student student2 = (Student)obj;
                   if(name.equals(student2.getName()) && age == student2.getAge()){
                        return true;
                   return false;
         public Student(String name, int age) {
              this.name = name;
              this.age = age;
    }

    Brynjar wrote:
    Btw, vectors went out of fashion many many years ago. Use ArrayList instead.Around '98 with the introduction of ArrayList.
    The OP could also consider using generics, and using a local variable instead of a field, esp a static field, when ever possible.
    Edited by: Peter__Lawrey on 04-Jul-2009 14:44

  • How do you get your experts with negative stance for new things / innovations to HANA

    We have over 50 ABAP developer (senior experts). Primarily we develop in the old core module (SD, MM, FI, CO, HR, PP, CS, IH, PS) on ERP systems / business suite.
    We have three groups of developer:
    Group 1: They can’t await to work on new architectures – they’re open for all and have fun to work as a pioneer and dig in the deep of the system
    Group 2: For this developer it’s all the same – for this people it’s not a problem to go to a other architectures
    Group 3: They have no interest
    to work in new architectures
    to spend time to learn new things
    they are very closed for new things
    they have for all topics bad statements
    I am part of the group 1. In my opinion in the IT it’s normal to spend much time at new topics in free time to keep up to date. New topics / innovative things make the developer job very exciting. For me it’s regular process – and that’s my own passion .
    Since two month we have our own HANA system in our data centre as play field :-) (business suite on SAP HANA). I’ve some colleagues who made the HANA certification – and we made the first steps in our system. For group 1 and group 2 everything is okay and they’ve fun .
    We have problems with the group 3. They find every hair in the soup – they spend very much time to search arguments against HANA. That’s our “negative group” . We copied our SAP System to a new system and made a technical migration. Now they compare the SAP System, which is based on an oracle datebase, with the new SAP System which is based on a HANA System. They go through the standard ERP process (offer / order / purchase order / goods movements / delivery / MM invoice / SD invoice / material master data / customer master data / vendor master data / conditions / financial bookings / etc.). They main argument is, that they can’t see a grow up of the performance / the added value of the invest / etc. Our other problem is that the group of this people have experience over 20 years in ABAP developing – and their opinion have a high weight. The other arguments: IBM and oracle are working on similar architectures – and we can hold on on the open sqlsyntax / on the present coding.
    Have you similar problems to get the acceptance of group 3?
    Have you tips / tricks for us?
    Have you ideas for catching the group 3?
    What standard components are really optimized for HANA?
    In which standard components can we see a really performance grow up?
    There are standard use cases to see the differences?
    Which data volume do we need in the data model to see the differences?
    What can we do to take the group 3 with us?
    How can we open the group 3 for innovations?

    Hi,
    Please find my reply below.
    1. Have you similar problems to get the acceptance of group 3?
    In IT world we have similar groups. Only results help this group3. I would suggest showcasing on results.
    2. Have you tips / tricks for us?
    As you mentioned in your email, you already have HANA System to play with. So I would suggest looking at high performance transactions like MRP run and FICO Month-end Close.
    3. Have you ideas for catching the group 3?
    SAP has few use cases. Take-up these use cases build data models and use in ERP.
    4. What standard components are really optimized for HANA?
    Recently in our organization we replaced database from DB2 with HANA. Now our SAP ECC is running on HANA. Straight away we have seen 30% of performance improvement in all the transactions. SAP is providing optimized SAP Transactions and there is significant performance improvement and SAP Road Map clearly talks about providing more optimized SAP Transactions on top of HANA to its customers.
    We tried to push some of our high performance code to DB layer by creating the Data Models and using those views in SAP ABAP Programs or Transactions. This gave us significant performance improvement.
    Please refer to below document. This has list of standard optimized transactions.
    Link
    5. In which standard components can we see a really performance grow up?
    This blog throws light on following high performance transactions.
    Link
    6. There are standard use cases to see the differences?
    Use Case
    7. Which data volume do we need in the data model to see the differences?
    MRP run transaction has huge performance issue you can work on MRP Run data model.
    8. What can we do to take the group 3 with us?
    Only Proof of Concepts (POC) results will help to take this group.
    9. How can we open the group 3 for innovations?
    As per your email, I feel group 3 is most demotivated group. I would suggest to talk to each individual and understand there areas of interest and try to put them in their areas of interest. As per my experience this will give good results.
    -VJ.

  • SAP Business One 9 on HANA - AddOn "AddOnName" Installation Failed

    Hi,
    I'm trying to install an add-on in a SAP Business One 9 on HANA (64 bits) but i'm facing a problem:
    - The add-on installation (from the add-on Manager Form) on windows finish correctly, but after a few seconds the system shows a Message box with "Please wait for add-on installation to finish .....Select Yes if installation finished succesfully, otherwise select No" . After that (YES option selection) the system shows "AddOn [AddOnName]: Installation Failed"
    The making of the .ard file (AddOn registration file) was the same that the generation of .ard file for the SAP Business One 9 for SQL Server (here the addon works correctly). The only difference was the replacement of the DI API dll, UI API dll, AddOnRegGenerator and the AddOnInstalAPI.
    Please Help!..
    Thanks...

    Hi,
    When generating the ard file for the installer, there is a property that defines whether the addon is a 64bit addon.
    https://websmp202.sap-ag.de/~sapidb/011000358700000247582013E/SDK_CompGuide_90.pdf
    Create Add On for 32 bit and 64 bit computer SAP Business One 9.0
    The above link may helpful to you.
    Regards,
    Silambu

  • Running really s l o o o o w  ...esp. MS Office apps

    My machine runs pretty darn slow, esp. if I run, say, Word & Excel and Firefox, iChat and a few other small apps. I will say this, I'm running with only the 512Ram it came with and it's a 2Ghz machine. I know RAM can be a factor here. I know Office is still Rosetta, but this is painful, waaay too many spinning colored balls.
    BUT...I had two crashes early on that required a complete reinstall of the OS. Each reinstall I didn't completely wipe it clean and left the previous install in (or whatever they call that...you have the old ID on the drive as "previous..." and after the reinstall a lot of settings are still there, etc.) Lastly, I have an 80G HD, with about 40 used, so it shouldn't be the drive.
    Questions are:
    - Should I just do a complete clean reinstall?
    - Is it just a more RAM sitch?
    - Should the machine go back to Apple or the Genius Bar or call AppleCare about it. This is the first time I've had AppleCare and don't feel like running to them everytime the machine sneezes.
    B&W G3, 2Ghz G5, MacBook Pro, lots of boxes with wires and lights and things Mac OS X (10.4.8) used PCs plenty...but born & raised on a mac....

    yes, ram will make a big difference, I run office 2004 on my macbook and it runs fine - with 2 gig of ram.(never get spinning beach ball)
    rosetta apps, by nature, will run slower than native apps.
    max out your ram, you will not regret it. 512 is just enough to run the OS.
    this is the ram I bought - lifetime warranty: (read the reviews)
    http://www.newegg.com/Product/Product.asp?item=N82E16820231069

Maybe you are looking for

  • Error while doing GR against PO

    Hi I am doing a third party scenario. I created a sales order with item category as TAS. I created PO against the PR. When I am doing GR against PO, I am getting a error " Purchase order 4500018781 has no items" . What could be the reason ? Is this p

  • How to access remotely to a PXI card with Visual C++ through an Ethernet TCP/IP link?

    I read that it was impossible to use RDA with C++, however, we must use Visual C++, and we must use TCP/IP to access to the PXI (MXI3 solution is not convenient due to its optic fiber). How can we do, which tools should be used and how to use them ?

  • Nokia belle fp2 700 i hop renew update soft

    the last version 1130101506 it,s bad there is a problems in the version i request nokia renew update to version 1130101507 and fix all problems no exit in camera and the camera pic is bad the photo editor is not good and we want mark pic to gallary t

  • Inventory collection fails for ACE module (RME 4.3.1)

    I am trying to collect the inventory and ultimately the configurations for my ace modules.  When i try to do an inventory collection I get the error Device sensed, but collection failed Anybody have any ideas? Chris

  • How to shrink vertical photo for slide show

    I am in aperture 3 and cannot shrink vertical photos for slideshow. The tops get cut off when I play the slideshow...help!