Export-filter/renditions argument - what is the 'plugin' field for?

For example:
local renditionsOptions = {
    pluginId = ...
for sourceRendition, renditionToSatisfy in filterContext:renditions( renditionOptions ) do
Doc says it'll be provided automatically if left nil, but can one provide another plugin Id or anything?
Or is it just some kinda "do nothing" leftover...?
Reserved for future maybe?
Any ideas??
R

Aubry,
why don't you send your sequences straight to Compressor first, encode your movies as MPEG 2 and AC3 audio and import all assets in DVD studio PRO?
G.

Similar Messages

  • What is the plugin used for jsp/servlet development , deployment in eclipse

    what is the plugin used for jsp/servlet development , deployment in eclipse?
    can some body tell me what are the other plugins to be used in enterprise java developement
    is eclipse would be a best choice j2ee application development?
    thanks

    what is the plugin used for jsp/servlet development ,
    deployment in eclipse?There are several J2EE plugins I think. One is Lomboz.
    can some body tell me what are the other plugins to
    be used in enterprise java developementPfft...
    1) Might depend on what you're doing. J2EE is not just JSP, you know?
    2) Why do you ask about Eclipse IDE at Sun's Java Programming forum?
    3) Do you really want me to list the 5000 plug-ins someone might use for J2EE-related development?
    4) Open fucking Google and search yourself
    is eclipse would be a best choice j2ee application
    development?IMO: no. Simply because you have to look for J2EE plugins. I'm too lazy for that. Though it has other benefits that might outweigh the plug-in-searching issue.

  • What is the Category field for and how do I edit it?

    In the iTunes music list, there is a category field. However, I do not see it in the get info window. Not surprisingly, although the category field shows in my iTunes music list, none of my songs have anything entered for the category. What is this field for and how do I edit it? Thanks.

    The only items I have that show a category are some iTunes U downloads.
    You can see a list of iTunes U category and subcategory codes and associated names here: http://deimos.apple.com/rsrc/doc/iTunesUAdministrationGuide/iTunesUintheiTunesSt ore/chapter13_section3.html

  • What is the table field for PO releaser in R/3 (4.7 Enterprise)?

    Hi Gurus out there:
    Do you know if there is a table field for PO releaser in R/3 (4.7 Enterprise)?
    We use for e.g. the transaction ME29N to release a PO and I haven't been able to find a DB table where the PO releaser is stored.
    In DB table EKKO I can find the fields FRGGR (Release group), FRGSX (Release strategy), FRGKE (Release Indicator), FRGZU (Release status) and FRGRL (Release Not Yet Completely Effected) but no information of the user who released the PO.
    Many thanks in advance.
    /hw

    Hi
    <b>Have you tried reading the details of the PO Releaser using the BAPIs ?</b>
    BAPI_PO_GETRELINFO
    BAPI_PO_GETITEMSREL
    BAPI_PO_GETITEMSREL            List Purchase Orders for Release (Approval): New as of 4.0A     
    BAPI_PO_GETRELINFO             Display Detailed Release (Approval) Information on Purchase Order
    BAPI_PO_RELEASE                Release Purchase Orders            
    BAPI_PO_RESET_RELEASE          Cancel Release of Purchase Orders  
    <u>Related link -></u>
    Re: How to fetch data from back end for PO?
    Hope this will help.
    Do let me know.
    Regards
    - Atul

  • What are the Scope Fields for in PageContext??

    There are 4 fields in javax.servlet.jsp.PageContext, what is there functionality and purpose?

    The page context is a facade pattern for all the namespaces associated with a JSP page - page, request, application, session. It unifies access to these objects (so you don't have to query all 4 to find what you're looking for). The attribute scope fields are used to indicate which namespace a particular attribute is associated with (and implicity, what the lifespan of that attribute is).

  • What is the url field for?

    That's it.
    the iCal Help is non-existent, so I'm asking here.
    I filled it in, but the alarm email didn't mention it. What's supposed to happen?
    Thanks

    Hi Johney..
    Check this link..
    SLD configuration and JCO connection
    <a href="http://help.sap.com/saphelp_nw04/helpdata/en/43/783c00eabd1ad0e10000000a114cbd/content.htm">Configuring and activating SLD</a>
    <a href="http://127.0.0.1:3597/help/index.jsp?topic=/com.sap.devmanual.doc.user/43/e98e76e1582d53e10000000a422035/content.htm">Configuring SLD Step by step Process</a>
    Urs GS

  • What are the best settings for exporting video in Premiere Pro Cs5.5 in HD MP4 format?

    What are the best settings for exporting video in Premiere Pro Cs5.5 in HD MP4 format?
    Any help would be greatly appreciated! Thanks

    function(){return A.apply(null,[this].concat($A(arguments)))}
    bmiller0525 wrote:
    What are the best settings for exporting video in Premiere Pro Cs5.5 in HD MP4 format?
    Any help would be greatly appreciated! Thanks
    thats way too vague of a question... best what?  quality? size? playback?
    best quality then use high bitrate, small size use low bitrate.

  • What is the Plugin that puts checkboxes next to links so that all cheked links are opened?

    I can't remember what was the plugin or maybe it was a plugin with Maxthon but the feature is somewhat like this:
    In a webpage there are several links of interest, and this plugin toggled checkboxes next to the links for ticking. Then only those selected links would be opened. This is similar to Snap Links or Multi-Links, but a different way of handling multiple links which may be spread across the page.
    With the checkboxes, one only needs to keep putting ticks next to the interesting links as one reads a page and later open all the selected/checked links.
    Update1: Yes, it was a Maxthon plugin called OpenCheckedLinks. This is a much needed feature for Firefox.
    Update2: Ok, found Firefox Plugin called Linky, which does solve this problem partially by listing the urls to select, but it does not carry the anchor text. Maybe the developer will include that feature.

    >$result=mysql_query("SHOW TABLES FROM sand2 LIKE '%$find%'")
    >
    >Should it be SELECT * FROM TABLENAME ?
    The OP is searhing the system tables for a user table in a database. With most dbms's you would select from the system table for the object. MySql has the Show command.
    http://dev.mysql.com/doc/refman/5.0/en/show-tables.html

  • What is the plugin-container.exe file? How do I get rid of it?I keep getting a 70% usage message about this plugin. I tried to delete it but then Firefox won't work.

    What is the plugin-container.exe file? It seems to be using 70% of usage of my computer's memory. How do I get rid of it?

    Plugin-container is an "out-of-process plugins" crash protection, see for more info the link, and if you want to disable try the analytical info :
    [http://kb.mozillazine.org/Plugin-container_and_out-of-process_plugins Plugin-container and out-of-process plugins]
    thank you
    Please mark "Solved" the answer that really solve the problem, to help others with a similar problem.

  • What is the best setting for export movie in widescreen format?

    Please tell me what is the best setting for exporting movie in Widescreen format?

    Like in After effect we use "NTSC D1 Widescreen Square Pixel".,
    Carefully examine the codec and pixel dimensions of that output file. That's certainly easy for an experienced VFX person like yourself.
    Then carefully look over the presets in FCP to find the same attibutes. You can also use the online help system for FCP and search for "D1"
    However, your question remains unanswerable because we don't know how you're getting to the monitor. What are you playing back you AE sequences on that displays them on your LCD? You're assuming we know what you're doing and, I assure you, we do not.
    bogiesan

  • How to find out what are the interfaces used for Job and Job Codes

    HI All,
    I just wanted to know how do we find out what are the interfaces used for Job and Job codes .
    Thanks In Advance
    Sunny

    Hi,
    Here is an idea for your request.
    Basically you can create a simple query on multiprovider 0TCT_MC01.
    Filter: you can use a variable for restriction of time ( calday, or calmonth) since you should be interested for a time period.
    Choose following characters into your objects:
    InfoProvider ( 0TCTIFPROV )  - you can create a variable for choosing infoprovider before query runs.
    *Tp.[Type of BI Application Object] 0TCTBISOTYP  = filter this with 'QUERY' or whatever your need is.
    *BI Application Object 0TCTBISBOBJ,  ( this will give you the name of the queries)
    In key figures choose,  Count for BI Appl. (0TCTWTCOUNT).
    (number for query run)
    Create a condition , for top 20.
    Hope this helps.
    Derya

  • What is the best antivirus for MacBook Pro?

    What is the best antivirus for MacBook Pro?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • What is the best replacement for iDVD

    I just bought a new iMac and found out that iDVD has vanished. What's the best approch for making slide shows from iPhoto and burning to a  DVD?

    Sorry, but I haven't found a way to burn a movie directly from iMovie since iMovie HD (6) (note: burn project to disk):
    Whereas, there are no options to burn in the current iMovie version:
    You can share it to online sites and you can export it, but you can't burn it.

  • What is the best replacement for iWeb?

    I have been using iWeb for a very long time. I need to move on to something that is being updated. What is the best replacement for iWeb? I see Wordpress needs special software to work on a Mac.
    Thanks!
    Pat

    I have used HostExcellence in the past and they support all the CMS's including WordPress, so you should have no problems there.
    The top CMS's that most have heard about and use are Drupal, Joomla and WordPress.
    There is probably no best one, but you need to look at them all and use the one that best fits your needs.
    I have used all of them in the past, but most recently Joomla and Drupal.  Drupal has a reputation for being quite hard and Drupal 6 was, but with the advent of Drupal 7, things got a lot easier.  There are a lot more themes that you can use and if you want increased functionality in Drupal, then you can download Modules and install them.  You can have a membership site if you want it and this is easy to do - people can sign up for an account and you can restrict their access to certain parts of the site and then limit what they can do.  You can allow people to complete forms on the site itself and the results to be sent to you.  There is a Blog module that you can enable and that comes in Drupal Core with no need to download an extra module.
    Joomla is good also and you can have a Blog with it too and there are lots of themes to choose from, but sometimes you have to pay for extras with Joomla - you can download Extensions and Plugins, but they may not always be free.
    WordPress was always just thought of as a blogging platform, but it has evolved in to much more than that and you can now create stunning looking websites with blogs - there are a good range of free templates to choose from and if you want your blog on the front page of your site you can have this, or you can change it to another part of your site if you want a static front page.  To extend functionality you can download plugins from inside WordPress itself, most of which are free.  This might be the easiest one for you to use if you just want a website with a built in blog that is relatively easy.
    Check out the others though at Drupal.org, Joomla.org and then WordPress.org.

  • What is the bdc program for vendor master?

    what is the bdc program for vendor master?

    Hi,
    Find the code here.
    And do create your text file data in the order of itab structure.
    {report ZBDC_XK01
           no standard page heading line-size 255.
    data: bdcdata like bdcdata occurs 0 with header line.
    data: begin of itab occurs 0,
    lifnr like lfa1-lifnr,
    bukrs like RF02K-bukrs,
    ekorg like RF02K-ekorg,
    ktokk like RF02K-ktokk,
    anred like lfa1-anred,
    name1 like lfa1-name1,
    sortl like lfa1-sortl,
    land1 like lfa1-land1,
    spras like lfa1-spras,
    waers like lfm1-waers,
    end of itab.
    selection-screen begin of block blk1 with frame.
      parameters: p_file like rlgrap-filename OBLIGATORY.
    selection-screen end of block blk1.
    AT SELECTION-SCREEN ON VALUE-REQUEST FOR p_file.
      perform f4_help_p_file.
    start-of-selection.
      perform get_data.
      perform upload.
    END-OF-SELECTION.
    *&      Form  f4_help_p_file
          text
    -->  p1        text
    <--  p2        text
    form f4_help_p_file .
    data: v_file like p_file.
      CALL FUNCTION 'F4_FILENAME'
        IMPORTING
          file_name = v_file.
      CHECK sy-subrc EQ 0.
      p_file = v_file.
    endform.                    " f4_help_p_file
    *&      Form  get_data
          text
    -->  p1        text
    <--  p2        text
    form get_data .
    data: s_file type string.
      s_file = p_file.
    CALL FUNCTION 'GUI_UPLOAD'
      EXPORTING
        filename                      = s_file
        FILETYPE                      = 'ASC'
        HAS_FIELD_SEPARATOR           = 'X'
      HEADER_LENGTH                 = 0
      READ_BY_LINE                  = 'X'
       DAT_MODE                      = 'D'
      CODEPAGE                      = ' '
      IGNORE_CERR                   = ABAP_TRUE
      REPLACEMENT                   = '#'
      CHECK_BOM                     = ' '
    IMPORTING
      FILELENGTH                    =
      HEADER                        =
      tables
        data_tab                      = itab
    EXCEPTIONS
      FILE_OPEN_ERROR               = 1
      FILE_READ_ERROR               = 2
      NO_BATCH                      = 3
      GUI_REFUSE_FILETRANSFER       = 4
      INVALID_TYPE                  = 5
      NO_AUTHORITY                  = 6
      UNKNOWN_ERROR                 = 7
      BAD_DATA_FORMAT               = 8
      HEADER_NOT_ALLOWED            = 9
      SEPARATOR_NOT_ALLOWED         = 10
      HEADER_TOO_LONG               = 11
      UNKNOWN_DP_ERROR              = 12
      ACCESS_DENIED                 = 13
      DP_OUT_OF_MEMORY              = 14
      DISK_FULL                     = 15
      DP_TIMEOUT                    = 16
      OTHERS                        = 17
    IF sy-subrc <> 0.
    MESSAGE ID SY-MSGID TYPE SY-MSGTY NUMBER SY-MSGNO
            WITH SY-MSGV1 SY-MSGV2 SY-MSGV3 SY-MSGV4.
    stop.
    ENDIF.
    endform.                    " get_data
    *&      Form  upload
          text
    -->  p1        text
    <--  p2        text
    form upload .
    loop at itab.
    perform bdc_dynpro      using 'SAPMF02K' '0100'.
    perform bdc_field       using 'BDC_CURSOR'
                                  'RF02K-KTOKK'.
    perform bdc_field       using 'BDC_OKCODE'
                                  '/00'.
    perform bdc_field       using 'RF02K-LIFNR'  itab-lifnr.
    perform bdc_field       using 'RF02K-BUKRS' '0001'.
    perform bdc_field       using 'RF02K-EKORG'  '1000'.
    perform bdc_field       using 'RF02K-KTOKK' '0001'.
    perform bdc_dynpro      using 'SAPMF02K' '0110'.
    perform bdc_field       using 'BDC_CURSOR'
                                  'LFA1-SPRAS'.
    perform bdc_field       using 'BDC_OKCODE'
                                  '/00'.
    perform bdc_field       using 'LFA1-ANRED' itab-anred.
    perform bdc_field       using 'LFA1-NAME1' itab-name1.
    perform bdc_field       using 'LFA1-SORTL' itab-sortl.
    perform bdc_field       using 'LFA1-LAND1' itab-land1.
    perform bdc_field       using 'LFA1-SPRAS' itab-spras.
    perform bdc_dynpro      using 'SAPMF02K' '0120'.
    perform bdc_field       using 'BDC_CURSOR'
                                  'LFA1-KUNNR'.
    perform bdc_field       using 'BDC_OKCODE'
                                  '/00'.
    perform bdc_dynpro      using 'SAPMF02K' '0130'.
    perform bdc_field       using 'BDC_CURSOR'
                                  'LFBK-BANKS(01)'.
    perform bdc_field       using 'BDC_OKCODE'
                                  '=ENTR'.
    perform bdc_dynpro      using 'SAPMF02K' '0210'.
    perform bdc_field       using 'BDC_CURSOR'
                                  'LFB1-AKONT'.
    perform bdc_field       using 'BDC_OKCODE'
                                  '/00'.
    perform bdc_dynpro      using 'SAPMF02K' '0215'.
    perform bdc_field       using 'BDC_CURSOR'
                                  'LFB1-ZTERM'.
    perform bdc_field       using 'BDC_OKCODE'
                                  '/00'.
    perform bdc_dynpro      using 'SAPMF02K' '0220'.
    perform bdc_field       using 'BDC_CURSOR'
                                  'LFB5-MAHNA'.
    perform bdc_field       using 'BDC_OKCODE'
                                  '/00'.
    perform bdc_dynpro      using 'SAPMF02K' '0310'.
    perform bdc_field       using 'BDC_CURSOR'
                                  'LFM1-WAERS'.
    perform bdc_field       using 'BDC_OKCODE'
                                  '/00'.
    perform bdc_field       using 'LFM1-WAERS' itab-waers.
    perform bdc_dynpro      using 'SAPMF02K' '0320'.
    perform bdc_field       using 'BDC_CURSOR'
                                  'RF02K-LIFNR'.
    perform bdc_field       using 'BDC_OKCODE'
                                  '=ENTR'.
    perform bdc_dynpro      using 'SAPLSPO1' '0300'.
    perform bdc_field       using 'BDC_OKCODE'
                                  '=YES'.
    call transaction 'XK01' using bdcdata mode 'A'.
    refresh bdcdata.
    clear itab.
    endloop.
    endform.                    " upload
    *&      Form  bdc_dynpro
          text
         -->P_0126   text
         -->P_0127   text
    form bdc_dynpro  using   program dynpro.
    clear bdcdata.
      bdcdata-program  = program.
      bdcdata-dynpro   = dynpro.
      bdcdata-dynbegin = 'X'.
      append bdcdata.
    endform.                    " bdc_dynpro
    *&      Form  bdc_field
          text
         -->P_0316   text
         -->P_0317   text
    form bdc_field  using    fnam fval.
    clear bdcdata.
      bdcdata-fnam = fnam.
      bdcdata-fval = fval.
      append bdcdata.
    endform.                    " bdc_field}
    Reward points if you find it helpful
    Thanks,
    Prasanna

Maybe you are looking for

  • Can no longer drag MP3 from PC to iTunes on Mac

    I've previously purchased/downloaded hundreds of songs in MP3 format on my PC and have not had a problem dragging them into iTunes over the network. Yesterday I upgraded Firefox to 3.0.1 on both computers and the songs I subsequently downloaded will

  • ADF-Master detail-Foreign key generated By Trigger won't propaget to Detail

    Hi All, We have Master-Detail Table where Master table key is generated by DB. And this key act as Foreign key in detail table.When we Creates Master Table records and commit it .It gets saved correctly But when we navigate to Create Detail record (C

  • Playbook force safe search or block content for kids

    I just picked up a Playbook on sale aqnd am pretty happy with it. It's pretty lame on being able to adjust anything though. I have an 11 year old that sometimes likes to play with it, but of course Google and YouTube provide ALL SORTS of links and su

  • Business document execution request interface

    Hi experts,                   business document execution request interface is a predeined interface in XI. Can anybody explain how can we make use of it or in which scenarios we can use it. Reyaz Hussain.G

  • Image of the Escape and Control key.

    Hey, I couldnt find anywhere better to put this :P. I recorded a video on 10.5.7 and it shows the ^ key for control, and the escape icon for when I pushed the ESC key. Does anyone know where I can find images like this. But with Control key and Esc?