Has anyone used bex to query their BPC multicubes?

Hello Experts,
We are not satisfied with the BPC reporting and are looking at setting up security on the BPC multicubes to report off of.  Has anyone else done this and are there any gotchas to watch out for?
thanks,
Peter

Hi Peter,
BPC does not guarantee that the name of the infoprovider stay constant if they are transported. If the name of the infoprovider is changed during the transport or when you perform a "full optimze" your BEx Wuery does not work anymore. Furthermore the sign in BPC depends on characteristic and attribute values. You can see this for example in function module UJQ_RUN_RSDRI_QUERY which is a BPC function module to read data from the cubes. There you can find code which manipulates the data after reading it from the cube.
It is not recommend to use BExQueries to read BPC data.
Regards Matthias Nutt
SAP Consulting Switzerland

Similar Messages

  • HT204387 Has anyone used their ip4 or higher with the text messaging sync system in the new ford cars it is call map

    Has anyone used their ip4 or higher with the text messaging sync system in the new ford cars it is call map

    Send this to:
    newsgroups.bea.com / security-group.

  • HT3275 Has anyone encountered this message on their time capsule/machine? Time Machine couldn't complete the backup because the backup disk image"/Volumes/Patti's Time Capsule/Patti's MacBook Pro.sparsebundle" is already in use"?

    Has anyone encountered this message on their time capsule/machine? Time Machine couldn't complete the backup because the backup disk image"/Volumes/Patti's Time Capsule/Patti's MacBook Pro.sparsebundle" is already in use"?

    If you reboot the computer it should fix the problem. Also see the first link under More Like This to the right of this page:
    I am received an error on my Time Capsule   which states the backup disk image  "Volumes/Data/MacBook Pro. sparse bundle? is already in use.  so time machine couldn't complete the backup to time capsule - any suggestion

  • Has anyone used MC Helper to reset hotmail on their Mac?

    Has anyone used MC Helper to reset hotmail on their Mac. I just did and I'm am worried as I gave them access to my computer over the phone. They have solved access to my hotmail account though, but they charged $200 for it plus a years free support. I was very suspicious but in the end went ahead. I now fear that they may be a scam of sorts. They could have implanted or encrypted something on my mac. Is this likely? Does anyone know? I'd be most grateful.

    LogMeIn Rescue is for one time support. This is a common tool used to support users. Microsoft uses it when they do support. I use one of the LogMeIn products myself when working with clients.
    In the future if you need help with a Microsoft product you can get free help on the Microsoft forums.
    Answers -Office for Mac
    Getting Started: http://answers.microsoft.com/en-us/mac/forum/macstart
    Word: http://answers.microsoft.com/en-us/mac/forum/macword
    Excel: http://answers.microsoft.com/en-us/mac/forum/macexcel
    PPT: http://answers.microsoft.com/en-us/mac/forum/macpowerpoint
    Outlook: http://answers.microsoft.com/en-us/mac/forum/macoutlook
    Entourage: http://answers.microsoft.com/en-us/mac/forum/macother
    Skydrive: http://answers.microsoft.com/en-us/windowslive/forum/skydrive?tab=QnA
    Lync: http://social.technet.microsoft.com/Forums/en-US/exchangesvrclients/threads
    Forum for Hotmail, Live, Outlook.com accounts
    http://answers.microsoft.com/en-us/windowslive/forum/mail
    O365
    http://community.office365.com/en-us/forums/default.aspx
    Hope this helps!

  • Has anyone used a boxware keyboard buddy with their iphone?

    has anyone used a boxware keyboard buddy with their iphone?

    kj6tk wrote:
    I guess if you travel the iPhone is not the device to buy.
    And which device to buy for travel? As far as I know other smartphone platforms even don't have an update facility like AppStore. And by the way what are your criteria for the perfect travel phone? I would place being able to use it in other countries (world phone), having easy access to internet and email and ability to remotely sync Contacts and Calendar on top of my list. All of which iPhone is capable like few other phones.
    I'm sorry, John, but your statement seems like utter nonsense and is misleading for others. First being able to update apps doesn't cross my mind as a main functionality for travel. Second I was just travelling to SC and easily installed a new app from iPhone and updated an existing one. In your case I believe there's a mishap with AppStore. Probably you have a false update notification. Just compare versions of the apps you have with the versions of the same apps AppStore shows. I bet version are same. That's why it doesn't let you install.
    If you want to sync your iPhone Contacts and Calendar (which seems more like a genuine travel requirement) you can do it via MobileMe or Yahoo and few other similar web services.

  • Has anyone used BootStrap Tour or PageGuide.js with their SAPUI5?

    Hello,
    Has anyone used any of these guide frameworks or something similar on their web applications across multiple views?
    Regards,

    This is a menu that has been created using Fireworks as can be verified by the following statement
    <!--Fireworks CS3 Dreamweaver CS3 target.  Created Wed Mar 24 11:44:39 GMT-0400 (Eastern Daylight Time) 2010-->
    The creation date tells me that the menu was created just on a week ago.
    So you are now having a problem with the newly created non-Spry menu! What better place to drop in then our trusty Spry Forum that deals with Spry related issues.
    We will help you though.
    http://www.greatermichiganpmc.org/ looks for a style sheet that it cannot find unlike http://www.greatermichiganpmc.org/pmc.htm where it has been found. Change the URL (in red) to reflect where the style sheet resides.
    <script language="JavaScript1.2" type="text/javascript" src="mm_css_menu.js"></script>
    <style type="text/css" media="screen">
         @import url("./pmc.css");
    </style>
    I hope the above helps our mates using Fireworks.
    Ben

  • Has anyone used JAAS with WebLogic?

    Has anyone used JAAS with Weblogic? I was looking at their example, and I have a bunch of questions about it. Here goes:
    Basically the problem is this: the plug-in LoginModule model of JAAS used in WebLogic (with EJB Servers) seems to allow clients to falsely authenticate.
    Let me give you a little background on what brought me to this. You can find the WebLogic JAAS example (to which I refer below) in the pdf: http://e-docs.bea.com/wls/docs61/pdf/security.pdf . (I believe you want pages 64-74) WebLogic, I believe goes about this all wrong. They allow the client to use their own LoginModules, as well as CallBackHandlers. This is dangerous, as it allows them to get a reference (in the module) to the LoginContext's Subject and authenticate themselves (i.e. associate a Principal with the subject). As we know from JAAS, the way AccessController checks permissions is by looking at the Principal in the Subject and seeing if that Principal is granted the permission in the "policy" file (or by checking with the Policy class). What it does NOT do, is see if that Subject
    has the right to hold that Principal. Rather, it assumes the Subject is authenticated.
    So a user who is allowed to use their own Module (as WebLogic's example shows) could do something like:
    //THEIR LOGIN MODULE (SOME CODE CUT-OUT FOR BREVITY)
    public class BasicModule implements LoginModule
    private NameCallback strName;
    private PasswordCallback strPass;
    private CallbackHandler myCB;
    private Subject subj;
             //INITIALIZE THIS MODULE
               public void initialize(Subject subject, CallbackHandler callbackHandler, Map sharedState, Map options)
                      try
                           //SET SUBJECT
                             subj = subject;  //NOTE: THIS GIVES YOU REFERENCE
    TO LOGIN CONTEXT'S SUBJECT
                                                     // AND ALLOWS YOU TO PASS
    IT BACK TO THE LOGIN CONTEXT
                           //SET CALLBACKHANDLERS
                             strName = new NameCallback("Your Name: ");
                             strPass = new PasswordCallback("Password:", false);
                             Callback[] cb = { strName, strPass };
                           //HANDLE THE CALLBACKS
                             callbackHandler.handle(cb);
                      } catch (Exception e) { System.out.println(e); }
         //LOG THE USER IN
           public boolean login() throws LoginException
              //TEST TO SEE IF SUBJECT HOLDS ANYTHING YET
              System.out.println( "PRIOR TO AUTHENTICATION, SUBJECT HOLDS: " +
    subj.getPrincipals().size() + " Principals");
              //SUBJECT AUTHENTICATED - BECAUSE SUBJECT NOW HOLDS THE PRINCIPAL
               MyPrincipal m = new MyPrincipal("Admin");
               subj.getPrincipals().add(m);
               return true;
             public boolean commit() throws LoginException
                   return true;
        }(Sorry for all that code)
    I tested the above code, and it fully associates the Subject (and its principal) with the LoginContext. So my question is, where in the process (and code) can we put the LoginContext and Modules so that a client cannot
    do this? With the above example, there is no Security. (a call to: myLoginContext.getSubject().doAs(...) will work)
    I think the key here is to understand JAAS's plug-in security model to mean:
    (Below are my words)
    The point of JAAS is to allow an application to use different ways of authenticating without changing the application's code, but NOT to allow the user to authenticate however they want.
    In WebLogic's example, they unfortunately seem to have used the latter understanding, i.e. "allow the user to authenticate however they want."
    That, as I think I've shown, is not security. So how do we solve this? We need to put JAAS on the server side (with no direct JAAS client-side), and that includes the LoginModules as well as LoginContext. So for an EJB Server this means that the same internal permission
    checking code can be used regardless of whether a client connects through
    RMI/RMI-IIOP/JEREMIE (etc). It does NOT mean that the client gets to choose
    how they authenticate (except by choosing YOUR set ways).
    Before we even deal with a serialized subject, we need to see how JAAS can
    even be used on the back-end of an RMI (RMI-IIOP/JEREMIE) application.
    I think what needs to be done, is the client needs to have the stubs for our
    LoginModule, LoginContext, CallBackHandler, CallBacks. Then they can put
    their info into those, and everything is handled server-side. So they may
    not even need to send a Subject across anyways (but they may want to as
    well).
    Please let me know if anyone sees this problem too, or if I am just completely
    off track with this one. I think figuring out how to do JAAS as though
    everything were local, and then putting RMI (or whatever) on top is the
    first thing to tackle.

    Send this to:
    newsgroups.bea.com / security-group.

  • Has anyone seen the following on their WP? Message from webpage WARNING: Time Warner Cable Customer – Your Internet Explorer browser and  computer may be compromised by security threats. Call 844-600-6224 now for IMMEDIATE assistance.  OK

    Has anyone seen the following on their WP?
    Message from webpage
    WARNING: Time Warner Cable Customer –
    Your Internet Explorer browser and
    computer may be compromised by
    security threats. Call 844-600-6224 now for
    IMMEDIATE assistance.
    OK

    This sounds like a virus or malware program that has made its way onto your computer.  I would ensure you have the latest virus definitions on your computer and run a thorough (complete) scan of your system.  If this doesn't work, I would suggest  you use Microsoft's Malware Removal Tool.  You can download it at the link below.   Hope this helps.
    http://www.microsoft.com/security/pc-security/malware-removal.aspx

  • Has anyone been unable to restore their iPad after attempting to upgrade to ios5? error 1

    Has anyone been unable to restore their iPad after attempting to upgrade to ios5? I get an unknown error 1 message. Thanks.

    I have the same problem. Something happened during the download and froze iTunes. After spending three days searching these forums with the dead iPad, the only thing I got to work was to try downloading iOS 5 using my sons computer. This worked. However I cannot now get my computer's iTunes to sync with my iPad.. It contains the same error message (1602) and has the same problem as before. It is not an antivirus problem. I need some help too

  • Has anyone had any problems with their charger blowing out?

    Has anyone had any problems with their charger blowing out? mine blew, there's now a charred pin on the charger and in the socket of the macbook. The plastic around the charge socket is also cracked & distorted from the blow-out. It wasn't a power surge as no other electrical items were affected. It wasn't liquid or dust, as I'm the only person who uses it & I'm very careful. I'm concerned that the consequences could have been terrible. I wasn't present when it happened though, I can just see the evidence after the event.
    I have a mid 2010 13" Macbook running the latest software & use the original magsafe charger that came with it.
    Will I have to fork out for a costly repair or is there a safety issue that Apple will sort out for me?
    Any advice would be much appreciated.

    Everything in the box with iPhone is covered by the iPhone warranty ,go  to Apple genius bar before warranty expires

  • Has anyone used Malwarebytes or anything similar to protect Mac from virus etc

    Has anyone used Malwarebytes or something similar to scan Mac for virus and other security and effiency problems?

    I should have been more specific, I wasn't given a Mac to keep, I was given a Mac to clean up. I have almost 20 years experience working with personal computers and I've worked on every major OS that's been released during that time (OS/2, every version of Windows since 3.1, Linux, Mac OS, Unix). I no longer work in a shop specifically fixing computers but my family still gives me their computers to look at whenever they have issues. My cousin just gave me her laptop since she was unable to fill out any web forms that would try to verify her e-mail address, plus she kept getting pop ups to run some MacKeeper software. Had this been a computer I received second hand I would have re-installed the OS regardless of the state it was on, but since she needs the files on her computer for school I figured it'd be much easier to run a Mac OS equivalent of Malwarebytes than to backup everything and re-install the OS.
    Unfortunately when you search the internet for a Malwarebytes alternative for Mac OS, the majority of the time you just get posts from people saying "Macs are super secure, don't worry about it you won't get infected", which is a completely useless response for someone whose computer is infected. The rest of the posts responding to people who ARE infected are much like your response "Just re-install the OS" but that doesn't address the underlying issue of what's infecting the computer for those people who can't afford to lose everything. I was eventually able to Google the symptoms of this issue and determine that it was a trojan known as DownLite or VSearch. Once I found where it was located I opened up a terminal, ran sudo su to elevate myself to root, deleted the VSearch folder and files from the terminal, ran ps ax | grep VSearch to find the running application and did a kill -9 [pid] to terminate the app (rather than rebooting.)
    Once that was all done I was able to use Chrome and Safari without all of the popups and hijacks. It took all of 5 minutes once I knew what the underlying issue was but I was really hoping to find a program like Malwarebytes so I could just let it scan the computer and tell me "These applications are malicious..." especially since my cousin installed a lot of stuff I would consider junk on her laptop and I didn't want to delete things that are just harmless junk (since she might use them.) Since I ended up having to do this all manually I'm just hoping there's nothing else lingering on the computer that didn't have visible symptoms.

  • Has anyone used infin to assist in troubleshooting ?

    I had a security problem when my firewall was temporarily turned off.  A tech company named "infin" assisted me with the problem and with a printer problem.  Since assisting me, the tech said that the company will no longer be in business.  Has anyone used "infin" for assistance because the tech said his company does a lot of work on Apple products. I am trying to find out more on the company.

    How did you find that company?
    Did you allow them remote access to your computer?
    Did you give them credit card details?
    If you google their name, you'll find several entries. I've never heard of them. And no, I've never used them - nor would I ever. Why deal with an unknown company when I can call Apple tech support or visit a Genius Bar in the Apple store free of charge?

  • Has anyone tried Kensington RAM in their Mac Pro?

    Has anyone tried Kensington RAM in their Mac Pro? I found this ram and that is far cheaper than OWC or apple.
    http://www.newegg.com/Product/Product.aspx?Item=N82E16820139940
    Please let me know what your experience has been with 3rd party ram.
    Lester

    NewEgg: " Memory returns allowed for 30 days, subject to 15 percent re-stocking fee. "
    So YOU are the expert about which are the correct modules. a mistake costs you 15 percent plus shipping.
    I prefer to do business with mac-centric vendor who lend me their expertise and tell me what memories work in my Mac, "Guaranteed or your money back."
    OWC is one that does business that way.
    Data Memory Systems does as well, and that is the outfit I use.
    The last 1333 8GB module like these I bought from them came with a large flat heatsink installed. I put it in my Server. The price has fallen a bit since then, and now they are asking US$78, but "Guaranteed."
    http://www.datamemorysystems.com/_apple_info/Apple_Mac_Pro_12-Core_Xeon_Westmere _2.93GHz_Memory_1632.asp

  • Has anyone used a Dell 1908FPb with a MacBook Pro OSX 10.6.8?  What do I need to get/do?  thanks

    Has anyone used a Dell 1908FPb with a MacBook Pro OSX 10.6.8?  What do I need to get/do?  thanks

    Hi 4judy,
    If you are looking to use an external display with your MacBook Pro, you may find the following articles helpful:
    Apple Mini DisplayPort adapters: Frequently asked questions (FAQ)
    http://support.apple.com/kb/ht3382
    OS X: How to use multiple displays with your Mac in Mountain Lion and earlier
    http://support.apple.com/kb/ht5019
    Regards,
    - Brenden

  • Has anyone used reMIDI as a plug-in for GarageBand. I downloaded a trial version of reMIDI, which enables MIDI instruments to be strummed or arpegiated, but can't get it to work in Garageband.  How do I set it up?

    Has anyone used reMIDI as a plug-in for Garageband ('08)? The program allows MIDI instruments to be strummed or arpegiated. I have a trial version, but can't get it to work in Garageband. Wonder how to set it up.
    Thanks, Doctor Mark

    Port Forwarding.....or Port Mapping....as Apple calls it is a difficult and complex configuration method for most users. Because there are so many variables involved in this type of setup, it is not possible to provide a step by step guide that will work for everyone with all devices.
    It is possible that a setup guide exists for the the WD drive and AirPort Extreme, but you will have to go looking for it on the Internet. Even if you find one, it may not be tailored to your specific situation or needs.
    Sometimes, you can do everything right....at least according to someone's article or "how to" guide, and things still will not work correctly.
    In situations like this, when you really don't know what to do, you need to enlist the aid of an IT pro, who will know what to do based on your particular products and unique circumstances. Sometimes....they won't be able to get things working either due to particular circumstances.
    But, before you do this, I would strongly recommend that you use a Static IP address for your Internet connection with your ISP. If you do not have this now, contact them to ask them if they offer this type of connection. Expect to pay more for this type of service, of course.

Maybe you are looking for

  • Drag and Drop in CSS Styles Panel

    So, I am going through Dreamweaver CS5 Classroom in a Book. In lesson 6, pages 106 through109, it tells you to drag and drop rules in the CSS Styles Panel into a certain order.  I can't seem to get it to work for me.  Am I missing something?

  • h:selectOneMenu and "value" attribute

    I have an issue with the <h:selectOneMenu> tag. On a page I've written, the select items are populated with a <f:selectItems> tag that is bound to a managed bean property with session scope which queries from a database table for the select items. Th

  • How to get a view with database relate with certificate ?

    After I encrypt a database, like execute following script: USE master; GO CREATE MASTER KEY ENCRYPTION BY PASSWORD = '<UseStrongPasswordHere>'; go CREATE CERTIFICATE MyServerCert WITH SUBJECT = 'My DEK Certificate'; go USE AdventureWorks2012; GO CREA

  • Saving so that windows user can have access?

    I have my project all ready and those with quick time...loads up perfectly. However those who have windows have a long wait or pile will not come up. Do you know how i can save my final cut express project so that window users can have access to it?

  • Flash shell into Dreamweaver (CS3) HELP!

    Alright, I have been struggling with this for hours now. I have created a fully working site completely in Flash. I used a shell to access each of my different pages within Flash, everything works perfectly. Buttons navigate, rollover images appear,