How to check a single method is overriden in how many subclasses in ABAP.

Hi Experts,
I have a global superclass which had benn inherited by many other global subclasses. Is there any way to find out quickly (may be in a table ) in how many subclasses a particular method of the superclass is overriden?

Hi Manuish,
You can use the class CL_OO_CLASS to achieve the above, below is a sample code.
DATA: lcl_oo_class TYPE REF TO cl_oo_class,
      lw_seoredef  TYPE seoredef.
TRY.
    CREATE OBJECT lcl_oo_class
      EXPORTING
        clsname = 'Y_TEST_CHEN_CLASS_SUB1'.
  CATCH cx_class_not_existent .
ENDTRY.
WRITE: 'Class', '                              ', 'Refclass', '                         ', 'Over written method', /.
LOOP AT lcl_oo_class->redefinitions INTO lw_seoredef.
  WRITE: lw_seoredef-clsname,'         ',
         lw_seoredef-refclsname,'         ',
         lw_seoredef-mtdname,'         ', /.
ENDLOOP.
Alternatively you can look up the table "SEOREDEF" directly.
Regards,
Chen
Edited by: Chen K V on May 4, 2011 12:37 PM

Similar Messages

  • How to encrypt column of some table with the single method ?

    How to encrypt column of some table with the single method ?

    How to encrypt column of some table with the single
    method ?How to encrypt column of some table with the single
    method ?
    using dbms_crypto package
    Assumption: TE is a user in oracle 10g
    we have a table need encrypt a column, this column SYSDBA can not look at, it's credit card number.
    tha table is
    SQL> desc TE.temp_sales
    Name Null? Type
    CUST_CREDIT_ID NOT NULL NUMBER
    CARD_TYPE VARCHAR2(10)
    CARD_NUMBER NUMBER
    EXPIRY_DATE DATE
    CUST_ID NUMBER
    1. grant execute on dbms_crypto to te;
    2. Create a table with a encrypted columns
    SQL> CREATE TABLE te.customer_credit_info(
    2 cust_credit_id number
    3      CONSTRAINT pk_te_cust_cred PRIMARY KEY
    4      USING INDEX TABLESPACE indx
    5      enable validate,
    6 card_type varchar2(10)
    7      constraint te_cust_cred_type_chk check ( upper(card_type) in ('DINERS','AMEX','VISA','MC') ),
    8 card_number blob,
    9 expiry_date date,
    10 cust_id number
    11      constraint fk_te_cust_credit_to_cust references te.customer(cust_id) deferrable
    12 )
    13 storage (initial 50k next 50k pctincrease 0 minextents 1 maxextents 50)
    14 tablespace userdata_Lm;
    Table created.
    SQL> CREATE SEQUENCE te.customers_cred_info_id
    2 START WITH 1
    3 INCREMENT BY 1
    4 NOCACHE
    5 NOCYCLE;
    Sequence created.
    Note: Credit card number is blob data type. It will be encrypted.
    3. Loading data encrypt the credit card number
    truncate table TE.customer_credit_info;
    DECLARE
    input_string VARCHAR2(16) := '';
    raw_input RAW(128) := UTL_RAW.CAST_TO_RAW(CONVERT(input_string,'AL32UTF8','US7ASCII'));
    key_string VARCHAR2(8) := 'AsDf!2#4';
    raw_key RAW(128) := UTL_RAW.CAST_TO_RAW(CONVERT(key_string,'AL32UTF8','US7ASCII'));
    encrypted_raw RAW(2048);
    encrypted_string VARCHAR2(2048);
    BEGIN
    for cred_record in (select upper(CREDIT_CARD) as CREDIT_CARD,
    CREDIT_CARD_EXP_DATE,
    to_char(CREDIT_CARD_NUMBER) as CREDIT_CARD_NUMBER,
    CUST_ID
    from TE.temp_sales) loop
    dbms_output.put_line('type:' || cred_record.credit_card || 'exp_date:' || cred_record.CREDIT_CARD_EXP_DATE);
    dbms_output.put_line('number:' || cred_record.CREDIT_CARD_NUMBER);
    input_string := cred_record.CREDIT_CARD_NUMBER;
    raw_input := UTL_RAW.CAST_TO_RAW(CONVERT(input_string,'AL32UTF8','US7ASCII'));
    dbms_output.put_line('> Input String: ' || CONVERT(UTL_RAW.CAST_TO_VARCHAR2(raw_input),'US7ASCII','AL32UTF8'));
    encrypted_raw := dbms_crypto.Encrypt(
    src => raw_input,
    typ => DBMS_CRYPTO.DES_CBC_PKCS5,
    key => raw_key);
    encrypted_string := rawtohex(UTL_RAW.CAST_TO_RAW(encrypted_raw)) ;
    dbms_output.put_line('> Encrypted hex value : ' || encrypted_string );
    insert into TE.customer_credit_info values
    (TE.customers_cred_info_id.nextval,
    cred_record.credit_card,
    encrypted_raw,
    cred_record.CREDIT_CARD_EXP_DATE,
    cred_record.CUST_ID);
    end loop;
    commit;
    end;
    4. Check credit card number script
    DECLARE
    input_string VARCHAR2(16) := '';
    raw_input RAW(128) := UTL_RAW.CAST_TO_RAW(CONVERT(input_string,'AL32UTF8','US7ASCII'));
    key_string VARCHAR2(8) := 'AsDf!2#4';
    raw_key RAW(128) := UTL_RAW.CAST_TO_RAW(CONVERT(key_string,'AL32UTF8','US7ASCII'));
    encrypted_raw RAW(2048);
    encrypted_string VARCHAR2(2048);
    decrypted_raw RAW(2048);
    decrypted_string VARCHAR2(2048);
    cursor cursor_cust_cred is select CUST_CREDIT_ID, CARD_TYPE, CARD_NUMBER, EXPIRY_DATE, CUST_ID
    from TE.customer_credit_info order by CUST_CREDIT_ID;
    v_id customer_credit_info.CUST_CREDIT_ID%type;
    v_type customer_credit_info.CARD_TYPE%type;
    v_EXPIRY_DATE customer_credit_info.EXPIRY_DATE%type;
    v_CUST_ID customer_credit_info.CUST_ID%type;
    BEGIN
    dbms_output.put_line('ID Type Number Expiry_date cust_id');
    dbms_output.put_line('-----------------------------------------------------');
    open cursor_cust_cred;
    loop
         fetch cursor_cust_cred into v_id, v_type, encrypted_raw, v_expiry_date, v_cust_id;
    exit when cursor_cust_cred%notfound;
    decrypted_raw := dbms_crypto.Decrypt(
    src => encrypted_raw,
    typ => DBMS_CRYPTO.DES_CBC_PKCS5,
    key => raw_key);
    decrypted_string := CONVERT(UTL_RAW.CAST_TO_VARCHAR2(decrypted_raw),'US7ASCII','AL32UTF8');
    dbms_output.put_line(V_ID ||' ' ||
    V_TYPE ||' ' ||
    decrypted_string || ' ' ||
    v_EXPIRY_DATE || ' ' ||
    v_CUST_ID);
    end loop;
    close cursor_cust_cred;
    commit;
    end;
    /

  • How to encrypt column of some table with the single method  on oracle7/814?

    How to encrypt column of some table with the single method on oracle7/814?

    How to encrypt column of some table with the single method on oracle7/814?

  • How to use Smartform to print check as payment method?

    Actually I'm using Sapscript to print checks as payment method.
    The configuration is at OBVS transaction, but at detail of payment method in "form data" option I can only choice Sapscripts.
    How can I to migrate Sapscript existing to new Smartform to print check as payment method?

    Hi,
    Please check this path :
    Financial Accounting (New) > A/R A/P > Business Transactions > Outgoing Payments > Automatic Outgoing Payments >
    Payment Media > Make settings for classic payment medium programs.
    Here you assign your smart form and the relative program.
    Regards,
    Sadashivan

  • How many implimentations can be done for a single BADI definition?

    How many implimentations can be done for a single BADI definition?
    Is there any restriction to impliment a single BADI definition?
    Plz answer with proper explanation....
    Thank you in advance
    REgards,
    Chaitanya

    hi Krishna Chaitanya,
    In a badi if the "Multiple Use" Checkbox is checked then You can have any number of Implementations for the BADI
    Say I have defined a BADI "BADI1"
    and I have 3 implementations
    IMP1
    IMP2
    IMP3
    The order of execution will be IMP1, IMP2 and IMP3
    In a badi if the  "Multiple Use" Checkbox is not checked then You can have ONLY ONE  Implementation for the BADI
    Say I have defined a BADI "BADI1"
    and I have 3 implementations
    IMP1
    IMP2
    IMP3
    Only one Implementation can be active at a time and only that will get executed
    Hope this helps a bit
    Reward if Useful
    Cheers
    Kripa Rangachari.

  • I see people from different ages at my work and every month I need to count how many people from each age I've seen that month. How can I do to give the entries to numbers in a single cell and make numbers count them for me?

    I see people from different ages at my work and every month I need to count how many people from each age I've seen that month. How can I do to give the entries to numbers in a single cell and make numbers count them for me? The final result would be a spreadsheet telling there were 8 people from 20 to 39 years old, 14 peolple from 40 to 59 and so on...

    jpqcampos wrote:
    This appears to be an 'input form' using 'Radio Buttons' to select the category. Neither of these features are supported in Numbers '09.
    You can input the data on one table and summarize it on a second table, but the input table will continue to hold data for each event.
    And by using the Reorganize button, you can hide all but two rows of that table to approximate the appearance and performance of an input form.
    Here are the two tables, Data on the left and Summary on the right. Notes below.
    The grey-filled columns in both tables are 'working' columns, and may be hidden (as shown in the image below).
    Data table:
    D1 contains the word "TRUE" (in capital letters). (This row is always shown.)
    D2 is empty, or may contain any value except "TRUE" (This row is always hidden under the Reorganize rule.)The rest of Row 2 of this table requires the data shown: a number outside the range to be counted (999), and two checkboxes, both checked.
    D3 (and filled down the rest of column D):   =AND(OR(B2,C2),NOT(OR(B3,C3)))
    The formula returns TRUE only for the first unused row in the table (ie. the first row for which neither checkbox has been checked)
    Summary table:
    Column A contains labels for the age ranges to be counted.
    Column B contains the same information in the form necessary for the formulas in columns C and D. They need a numeric value, and that value must be the largest acceptable value in the range to be counted.
    C2 (and filled right to column D, then both filled down to row 5):
        =COUNTIFS(Data :: $A,"<="&$B,Data :: B,TRUE)-SUM(C$1:C1)
    Two changes from the previous example:
    COUNTIFS is used to separate the Native and Foreign counts as well as the age range to be counted.
    The amount subtracted from each result is the SUM of the earlier results, and includes the text value in the first cell of the column (which is interpreted by SUM as a zero).
    See note below regarding my earlier formula.
    When the greyed columns are hidden and the checkbox in the Reorganize pane is checked, the two tables will appear as shown below:
    Close the reorganize pane, and the 'data entry form' is ready to use.
    To use, enter the age first, then check one of the boxes.
    As soon as one box is checked, the row will be hidden, and the next (unused) row will be shown.
    Regards,
    Barry
    Note regarding formula in my earlier post:
    The earlier formula will give erroneous results as it subtracts only the count directly above it from its count of persons in the age range 0-n.
    In E2 of that table, replace "-E1" with "-SUM(E1:E$1)
    Fill down to E8.
    Ignore the instructions (in that post) following "Fill down to E8."
    B

  • How many bytes does a refresh check on the DDLOG table cost?

    Hello,
    each application server checks after "rdisp/bufrefreshtime" in the DDLOG table on the database whether one of it's tables or entries of tables are invalid.
    Only tables or entries of tables that are invalid appear in the DDLOG table. If an application servers gets to know which of his tables are invalid, he can synchronize with the next read access.
    Does anybody know how many bytes such a check cost?
    The whole DDLOG must be read by each application server, so it depends on the number of entries in the DDLOG.
    Does anybody know?
    thx, holger

    Hi,
    except of system and some timestamps, everything is stored in a raw field.
    Checking FM SBUF_SEL_DDLOG_RECS I found some additional info:
    - There are several synchronization classes
    - Classes 8 and 16 don't contain table or key info -> complete buffer refresh
    - Other classes should have a table name
    - In this case is an option for a key definition
    -> I guess, generic and single buffers are handled with corresponding key fields, full buffered is probably handled without key fields.
    An entry in DDLOG itself is the flag / mark for: this buffer is invalid.
    It's obviously single/generic key specific - otherwise the whole concept of single/generic key would be obsolete.
    Christian

  • Print 3 checks in single page Thru F110

    Hi
    I have a req to print 3 checks in a single page from Tcode F110..
    Do i need to look for any User-exit to do this? OR
    Do i need to copy the standard Prog RFFOUS_C and modify according to the req..Which is the best option?
    If the modifying the Std prog is the only option Could you please let me know where exactly i need to modify the change
    Please let me know
    Govi

    I forgot to mention this
    Which form should i use? is it F110_PRENUM_CHCK  or F110_MX_CHEQUE?
    I only want to print name amount date on this form ...coz we wil use the pre printed checks so only name amount date will be printed on that paper..Iam not sure how can we print 3 checks in single page using the standard program and Custom script..
    Please advise
    Govi

  • How many databases can be opened simultaneously in a single file?

    To all:
    I don't known how many databases can be opened simultaneously in a single file. After my application open 499 databases in a single file simultaneously, DB->open return error 12.(can not allocate memory ?).
    How can i do ? Thanks.

    I found it:
    Berkeley DB Reference Guide:
    Locking Subsystem
         PrevRefNext
    Configuring locking: sizing the system
    The lock system is sized using the following three methods:
    DB_ENV->set_lk_max_locks
    DB_ENV->set_lk_max_lockers
    DB_ENV->set_lk_max_objects
    The DB_ENV->set_lk_max_locks, DB_ENV->set_lk_max_lockers, and DB_ENV->set_lk_max_objects methods specify the maximum number of locks, lockers, and locked objects supported by the lock subsystem, respectively. The maximum number of locks is the number of locks that can be simultaneously requested in the system. The maximum number of lockers is the number of lockers that can simultaneously request locks in the system. The maximum number of lock objects is the number of objects that can simultaneously be locked in the system. Selecting appropriate values requires an understanding of your application and its databases. If the values are too small, requests for locks in an application will fail. If the values are too large, the locking subsystem will consume more resources than is necessary. It is better to err in the direction of allocating too many locks, lockers, and objects because increasing the number of locks does not require large amounts of additional resources. The default values are 1000 of each type of object.
    When configuring a Berkeley DB Concurrent Data Store application, the number of lock objects needed is two per open database (one for the database lock, and one for the cursor lock when the DB_CDB_ALLDB option is not specified). The number of locks needed is one per open database handle plus one per simultaneous cursor or non-cursor operation.
    Configuring a Berkeley DB Transactional Data Store application is more complicated. The recommended algorithm for selecting the maximum number of locks, lockers, and lock objects is to run the application under stressful conditions and then review the lock system's statistics to determine the maximum number of locks, lockers, and lock objects that were used. Then, double these values for safety. However, in some large applications, finer granularity of control is necessary in order to minimize the size of the Lock subsystem.
    The maximum number of lockers can be estimated as follows:
    * If the database environment is using transactions, the maximum number of lockers can be estimated by adding the number of simultaneously active non-transactional cursors open database handles to the number of simultaneously active transactions and child transactions (where a child transaction is active until it commits or aborts, not until its parent commits or aborts).
    * If the database environment is not using transactions, the maximum number of lockers can be estimated by adding the number of simultaneously active non-transactional cursors and open database handles to the number of simultaneous non-cursor operations.
    The maximum number of lock objects needed for a single database operation can be estimated as follows:
    * For Btree and Recno access methods, you will need one lock object per level of the database tree, at a minimum. (Unless keys are quite large with respect to the page size, neither Recno nor Btree database trees should ever be deeper than five levels.) Then, you will need one lock object for each leaf page of the database tree that will be simultaneously accessed.
    * For the Queue access method, you will need one lock object per record that is simultaneously accessed. To this, add one lock object per page that will be simultaneously accessed. (Because the Queue access method uses fixed-length records and the database page size is known, it is possible to calculate the number of pages -- and, therefore, the lock objects -- required.) Deleted records skipped by a DB_NEXT or DB_PREV operation do not require a separate lock object. Further, if your application is using transactions, no database operation will ever use more than three lock objects at any time.
    * For the Hash access method, you only need a single lock object.
    For all access methods, you should then add an additional lock object per database for the database's metadata page.
    Note that transactions accumulate locks over the transaction lifetime, and the lock objects required by a single transaction is the total lock objects required by all of the database operations in the transaction. However, a database page (or record, in the case of the Queue access method), that is accessed multiple times within a transaction only requires a single lock object for the entire transaction.
    The maximum number of locks required by an application cannot be easily estimated. It is possible to calculate a maximum number of locks by multiplying the maximum number of lockers, times the maximum number of lock objects, times two (two for the two possible lock modes for each object, read and write). However, this is a pessimal value, and real applications are unlikely to actually need that many locks. Reviewing the Lock subsystem statistics is the best way to determine this value.
    I created DB_CONFIG file, and add three lines:
    set_lk_max_locks 20000
    set_lk_max_lockers 20000
    set_lk_max_objects 20000
    As the default values are 1000 of each type of object, my applicaton open 499 database(except internal database) simultaneously(CDB modal) . After changed parameters, my application opend above 6000 database.

  • Problem passing multiple array lists to a single method

    Hi, all:
    I have written a generic averaging method that takes an array list full of doubles, adds them all up, divides by the size of the array list, and spits out a double variable. I want to pass it several array lists from another method, and I can't quite figure out how to do it. Here's the averager method:
         public double averagerMethod (ArrayList <Double> arrayList) {
              ArrayList <Double> x = new ArrayList <Double> (arrayList); //the array list of integers being fed into this method.
              double total = 0;//the total of the integers in that array list.
              for (int i = 0; i < x.size(); i++) {//for every element in the array list,
                   double addition = x.get(i);//get each element,
                   total = total + addition; //add it to the total,
              double arrayListSize = x.size();//get the total number of elements in that array list,
              double average = total/arrayListSize;//divide the sum of the elements by the number of elements,
              return average;//return the average.
         }And here's the method that sends several array lists to that method:
         public boolean sameParameterSweep (ArrayList <Double> arrayList) {
              sameParameterSweep = false;//automatically sets the boolean to false.
              arrayList = new ArrayList <Double> (checker);//instantiate an array list that's the same as checker.
              double same = arrayList.get(2); //gets the third value from the array list and casts it to double.
              if (same == before) {//if the third value is the same as the previous row's third value,
                   processARowIntoArrayLists(checker);//send this row to the parseAParameterSweep method.
                   sameParameterSweep = true;//set the parameter sweep to true.
              if (same != before) {//if the third value is NOT the same,
                   averagerMethod(totalTicks);//go average the values in the array lists that have been stored.
                   averagerMethod(totalNumGreens);
                   averagerMethod(totalNumMagentas);
                   sameParameterSweep = false;
              before = same; //problematic!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
         return sameParameterSweep;
         }Obviously, the problem is that I'm not passing the array lists from this method to the averager method the right way. What am I doing wrong?

    Encephalopathic wrote:
    There are several issues that I see, but the main one is that you are calculating average results but then just discarding them. You never assign the result to a variable.
    In other words you're doing this:
    averagerMethod(myArrayList);  // this discards the resultinstead of this:
    someDoubleVariable = averagerMethod(myArrayList); // this stores the resultAlso, do you wish to check for zero-sized array lists before calculating? And what would you return if the array list size were zero?So in solving that problem, I've come up with another one that I can't figure out, and I can't fix this problem until I fix that.
    I have several thousand lines of data. They consist of parameter sweeps of given variables. What I'm trying to do is to store pieces of
    data in array lists until the next parameter adjustment happens. When that parameter adjustment happens, I want to take the arraylists
    I've been storing data in, do my averaging thing, and clear the arraylists for the next set of runs under a given parameter set.
    Here's the issue: I'm having the devil of a time telling my application that a given parameter run is over. Imagine me doing stuff to several variables (number of solders, number of greens, number of magentas) and getting columns of output. My data will hold constant the number of soldiers, and for, say, ten runs at 100 soldiers, I'll get varying numbers of greens and magentas at the end of each of those ten runs. When I switch to 150 soldiers to generate data for ten more runs, and so forth, I need to average the number of greens and magentas at the end of the previous set of ten runs. My problem is that I can't figure out how to tell my app that a given parameter run is over.
    I have it set up so that I take my data file of, say, ten thousand lines, and read each line into a scanner to do stuff with. I need to check a given line's third value, and compare it to the previous line's third value (that's the number of soldiers). If this line has a third value that is the same as the previous line's third value, send this line to the other methods that break it up and store it. If this line has a third value that is NOT the same as the previous line's third value, go calculate the averages, clear those array lists, and begin a new chunk of data by sending this line to the other methods that break it up and store it.
    This is not as trivial a problem as it would seem at first: I can't figure out how to check the previous line's third value. I've written a lot of torturous code, but I just deleted it because I kept getting myself in deeper and deeper with added methods. How can I check the previous value of an array list that's NOT the one I'm fiddling with right now? Here's the method I use to create the array lists of lines of doubles:
         public void parseMyFileLineByLine() {
              totalNumGreens = new ArrayList <Double>();//the total number of greens for a given parameter sweep
              totalNumMagentas = new ArrayList <Double>();//the total number of magentas for a given parameter sweep.
              totalTicks = new ArrayList <Double>();//the total number of ticks it took to settle for a given parameter sweep.
              for (int i = 8; i < rowStorer.size() - 2; i++) {//for each line,
                   checker = new ArrayList <Double>();//instantiates an array list to store each piece in that row.
                   String nextLine = rowStorer.get(i); //instantiate a string that contains all the information in that line.
                   try {
                        Scanner rowScanner = new Scanner (nextLine); //instantiates a scanner for the row under analysis.
                        rowScanner.useDelimiter(",\\s*");//that scanner can use whitespace or commas as the delimiter between information.
                        while (rowScanner.hasNext()) {//while there's still information in that scanner,
                             String piece = rowScanner.next(); //gets each piece of information from the row scanner.
                             double x = Double.valueOf(piece);//casts that stringed piece to a double.
                             checker.add(x);//adds those doubles to the array list checker.
                   catch (NoSuchElementException nsee) {
                        nsee.printStackTrace();
                   //System.out.println("checker contains: " + checker);
                   processARowIntoArrayLists(checker);//sends checker to the method that splits it up into its columns.
         }

  • How many bytes i get when i run some method through soap

    Hi everyone,
    I have a small problem. I have some web service. From wsdl file i create java classes (wsimport was used) and add them to my program. All works very good but i don't understand how to get information about how many bytes i get when i run some method.
    For example i have a method:
    service.getNewData(); How to check how many data i get BEFORE this method will complete.
    I know that i can check Content-Length but how i can do it?
    Thanks.

    * Download a new copy of the Firefox program: http://www.mozilla.com/firefox/all.html
    * Trash the current Firefox application to do a clean (re-)install.
    * Install the new version that you have downloaded.
    Your profile data is stored elsewhere in the [http://kb.mozillazine.org/Profile_folder_-_Firefox Firefox Profile Folder], so you won't lose your bookmarks and other personal data.

  • How many Ship-To-Parties are allowed for a single Sold-To-Party ?

    Hello Gurus,
    1) Could anyone tell how many Ship-To-Parties are allowed to be attached to a single Sold-To-Party ?
    2) Is there any system restriction from the side of SAP on how many could be attached ?
    3) If yes, then, please let me know what is the upper limit.
    Thanks,
    SR

    Hi,
    You can attach as many as you can.There is no limit for this.
    But we can control the number of ship-to-party's to 1.Not only "SH" but also any partner function can be controlled to 1 only.
    If you want to maintain more than one an error message will be displayed.
    The path for this is:
    SPRO>Sales and Distribution>Basic functions>Partner determination>Set up Partner determination-->Set Up Partner Determination for Customer Master.
    Double click on this.
    Check the Partner dertermination procedure assigned to your acount group.Select that one and click on Partner functions.Search for SH,there is a check box called as "Unique".Check this one.
    Save.
    In this case it will allow only once.
    Coming to your question we can maintain unlimited number of SH's.
    From SAP there is a restriction for one only but not more than that.
    The upper limit is unlimited.
    Regards,
    Krishna.

  • How many single role we can attach to single user?

    Dear Friends,
    How many single role we can attach to single user?
    Sachin

    Hi Sachin,
    The below parameter can be checked for this topic. Infact the limit is about 9000 for this parameter and typically i have seen ID's in 4.7 environment with around 150 roles or more...
    <b>Auth/auth_number_in_userbuffer</b>
    When a user logs onto SAP, the authorizations contained in the user’s profiles are copied to a user buffer in memory.  The maximum number of authorizations copied is set by this parameter.  The size of the buffer must always exceed the maximum number of authorizations as authorization checks are made only against those in the buffer.
    Refer to OSS notes 84209 and 75908 for more detailed information regarding changes to the size of the user buffer.
    Transaction SU56 shows the contents of the user’s user buffer and a total for all the authorizations in a user master record.
    Hope this info helps
    Br,
    Sri
    Award points for helpful answers

  • Checking Javadoc and Method Signature ?

    Hi All,
    Once i used Intellij IDEA. Now i am using eclipse for the past 1 year. In IntelliJ if the javadoc and method signature parameters were different it will automatically show a red color mark. so that we will correct it by seeing that.
    In eclipse i don't know that option...can anybody please let me know whether that option is avaiable in eclipse.
    How to check javadoc and method signature in other normal circumstances programmatically ?
    Thanks,
    J.Kathir

    That information is only available in the source code. I'm using Eclipse and it has the ability to link a jar to it's source (either another jar/zip or another project, or a directory on your disk). I imagine IntelliJ has a similar feature.
    Another option is to put the source code inside the jar that also contains the class files.

  • How many different iPods can I sync with my single iMac user/iTunes account?

    Good Day to All,
    Can anyone tell me how many different iPods &amp; iPhones can I successfully consistently sync/integrate using my one "user account" in iTunes on my iMac? This ist situation:
    I have always (and only) synced etc. my iPhone with my one iTunes UID which is under my ONE "User Account" on my  iMac. Recently, my elderly folks gave me 2 iPods they have never used. One is a little silver 4GB shuffle (the little guy with a built on "belt clip" &amp; it verbally tells you what song and artist is playing. The other is also an iPod shuffle ( only 1GB), also has the metal "pinch to open; belt clip"; also no display, however it came with a little USB Dock and THIS ONE has all of the user controls on the face of it in a circular patter of course..
    To have COMPLETE successful "interaction/integration/syncing" etc (with no issues/complications etc) with my iTunes currently and previously only used with my iPhone, do I have to create two new additional "User Login/accounts" on my iMac (one for each iPod) to have all three if my devices work perfectly fine, or can I just use my same iMac login (UID) &amp; iTunes that I use with my iPhone and have no worries?
    (ie: I created my girlfriend her own iMac login UID which she has always used for backing up/syncing etc her iPhone with HER iTunes library etc)
    In short, does iTunes have the ability to have multiple iPods &amp; my iPhone under my one existing iTunes account AND using the same single iMac login/UID I've always used with my iPhone?
    Obviously, I know I could create an iMac login for my mom's, another for my dad's &amp; create them both their individual iTunes accounts, but they really don't want to have to worry about dealing with all that. I'm teetering between just treating them as my iPods and mixing/adding their limited CD's into my library (again, if iTunes allows multiple iPods etc as explained above..
    OR; my other thought would be (again, if one iTunes account can integrate the two iPods as seperate devices and to just create ONE iMac UID login and ONE iTunes account under my dad's name, and use that one account for both of their music, both of their iPods, importing their CD's into the same iTunes library, then when syncing etc. just doing selective transfers/sync's of the specific music for each iPod... Even then, will iTunes be able to differentiate the two as far as backups/restored etc? I think  answering my own question as I type due to the cloud... For completely individual cloud interaction/integration, I would def need to create each of them their own iTunes accounts, otherwise they will have all of each other's songs on their devices.. (ie: And my dad def doesn't want to worry about skipping over my mom's Journey or Aerosmith tunes to get to his Willie Nelson and vice versa for example.
    (Sorry sooooo drawn out; thinking outloud) I guess it seems obvious that since all their digital music has to be on my iMac, I really should create them each their own iMac UID login as well as their own individual iTunes Acounts to insure cloud services work easily for restores/backups etc...
    Thanks for stumbling thru my thought processes here (if I didn't lose ya long ago); I'm exhausted and throwing thoughts at the classroom board to see what sticks.... The best easiest way that is.. (The two aren't always the same obviously!)
    Thank you all for your precious time and consideration and most if all; YOUR PATIENCE!! Any confirmation if the options and suggestions are greatly appreciated. You know, gotta take care of the folks &amp; what is the simplest for them as just end users is the most important or they'll NEVER bother with them in the end...
    Respectfully appreciative,
    DB

    You can use as many iPods with one iTunes library as you want.
    (108420)

Maybe you are looking for