How to check effectiveness of Equipment

How to check effectiveness of equipment

It depends upon  how we define  'Effectiveness'  in terms of the Input parameters we are giving to the system in relation to this Equipment.
1.One key factor is MTBR which in other words can be termed as Reliability also. This % should be as high as possible for an effective equipment if you define the effectiveness as minimum breakdowns .
2. If technical availability is the effectiveness then it is calculated through formula [ MTBR / (MTTR + MTBR) ]* 100
3. If you want to incorporate other business parameters into the definition of Effectiveness, then these parameters need to be recorded and the effectiveness needs to be calculated as per your formula.
Related topics
Equipment Availability - Concept & Issues
MTTR, MTBR, Failure Rate, Availability and Reliability
Hierarchical Equipment Availability Caluclations (on Functional Locations)
KPI's reports
Standard KPI in SAP PM
Plant Maintenance KPIS and Reports

Similar Messages

  • How to check where a apraticulr key figure has currency translations?

    Hi,
    i need to check the currency translations for a key figure!
    where i can find those translations? i mean i am not sure whether this has been wrdefined in update rules or transfer rules!
    how to check this?
    Thanks,
    Ravi

    Hi Sankar,
    i did not find any currency translations in URs nor in TRs nor in report KF properties!
    where else can be possible?
    i guess it is in extract structure? are there any still methods available to define currency translations.
    while running the report it is asking for currency variable in the selection screen!
    but really no idea what does this variable will have the effect on translation!
    any inputs?
    Thanks,
    Ravi

  • How to check if the user has only the display authority of a message

    hi,
    How to check if the user has only the display authority of a message but does not have the change authority for a certain message?
    Best regards,

    hi blake
    though i am an application consultant and for authorisation u need to have help of BASIS person if u r not the one but still i can guide u regarding the same,
    Basically Authorization Management 
    Use
    You can use the following authorization objects to control the authorizations for maintaining business partner data:
    •        Authorization objects for the Business Partner:
    •             B_BUPA_GRP
    •             B_BUPA_ATT
    •             B_BUPA_FDG
    •             B_BUPA_RLT•       
    Authorization objects for relationships:
    •             B_BUPR_BZT
    •             B_BUPR_FDG
    In addition, you can assign an authorization group to a business partner in the dialog. The authorization group controls which users may maintain data for this business partner.
    You can also define authorizations for fields and field groups using the Business Data Toolset (BDT). Depending on the settings you have made, the system carries out the relevant authorization checks.
    In the dialog in the SAP GUI, you can display an overview of the authorizations assigned to you by pressing the button Settings.
    For more information on authorization management, see the Implementation Guide (IMG) of the Business Partner, as well as in the Developer’s Handbook for the BDT under  Authorizations.
    IntegrationAuthorization management for the Business Partner forms part of the  SAP authorization concept.
    Prerequisites
    You have made the necessary settings in Customizing of the Business Partner under Basic Settings--> -Address Management.
    Moving over
    AS ABAP Authorization Concept 
    The ABAP authorization concept protects transactions, programs, and services in SAP systems from unauthorized access. On the basis of the authorization concept, the administrator assigns authorizations to the users that determine which actions a user can execute in the SAP system, after he or she has logged on to the system and authenticated himself or herself.
    To access business objects or execute SAP transactions, a user requires corresponding authorizations, as business objects or transactions are protected by authorization objects. The authorizations represent instances of generic authorization objects and are defined depending on the activity and responsibilities of the employee. The authorizations are combined in an authorization profile that is associated with a role. The user administrators then assign the corresponding roles using the user master record, so that the user can use the appropriate transactions for his or her tasks.
    Authorization Checks 
    To ensure that a user has the appropriate authorizations when he or she performs an action, users are subject to authorization checks.
    The following actions are subject to authorization checks that are performed before the start of a program or table maintenance and which the SAP applications cannot avoid:
    •        Starting SAP transactions (authorization object S_TCODE)
    •        Starting reports (authorization object S_PROGRAM)
    •        Calling RFC function modules (authorization object S_RFC)
    •        Table maintenance with generic tools (S_TABU_DIS)
    Checking at Program Level with AUTHORITY-CHECK
    Applications use the ABAP statement AUTHORITY-CHECK, which is inserted in the source code of the program, to check whether users have the appropriate authorization and whether these authorizations are suitably defined; that is, whether the user administrator has assigned the values required for the fields by the programmer. In this way, you can also protect transactions that are called indirectly by other programs.
    AUTHORITY-CHECK searches profiles specified in the user master record to see whether the user has authorization for the authorization object specified in the AUTHORITY-CHECK. If one of the authorizations found matches the required values, the check is successful.
    Starting SAP Transactions
    When a user starts a transaction, the system performs the following checks:
    •        The system checks in table TSTC whether the transaction code is valid and whether the system administrator has locked the transaction.
    •        The system then checks whether the user has authorization to start the transaction.
    The SAP system performs the authorization checks every time a user starts a transaction from the menu or by entering a command. Indirectly called transactions are not included in this authorization check. For more complex transactions, which call other transactions, there are additional authorization checks.
    •             The authorization object S_TCODE (transaction start) contains the field TCD (transaction code). The user must have an authorization with a value for the selected transaction code.
    •             If an additional authorization is entered using transaction SE93 for the transaction to be started, the user also requires the suitable defined authorization object (TSTA, table TSTCA).
    If you create a transaction in transaction SE93, you can assign an additional authorization to this transaction. This is useful, if you want to be able to protect a transaction with a separate authorization. If this is not the case, you should consider using other methods to protect the transaction (such as AUTHORITY-CHECK at program level).
    •        The system checks whether the transaction code is assigned an authorization object. If so, a check is made that the user has authorization for this authorization object.
    The check is not performed in the following cases:
    You have deactivated the check of the authorization objects for the transaction (with transaction SU24) using check indicators, that is, you have removed an authorization object entered using transaction SE93. You cannot deactivate the check for objects from the SAP NetWeaver and HR areas.
    This can be useful, as a large number of authorization objects are often checked when transactions are executed, since the transaction calls other work areas in the background. In order for these checks to be executed successfully, the user in question must have the appropriate authorizations. This results in some users having more authorization than they strictly need. It also leads to an increased maintenance workload. You can therefore deactivate authorization checks of this type in a targeted manner using transaction SU24.
    •             You have globally deactivated authorization objects for all transactions with transaction SU24 or transaction SU25.
    •             So that the entries that you have made with transactions SU24 and SU25 become effective, you must set the profile parameter AUTH/NO_CHECK_IN_SOME_CASES to “Y” (using transaction RZ10).
    All of the above checks must be successful so that the user can start the transaction. Otherwise, the transaction is not called and the system displays an appropriate message.
    Starting Report Classes
    You can perform additional authorization checks by assigning reports to authorization classes (using report RSCSAUTH). You can, for example, assign all PA* reports to an authorization class for PA (such as PAxxx). If a user wants to start a PA report, he or she requires the appropriate authorization to execute reports in this class.
    We do not deliver any predefined report classes. You must decide yourself which reports you want to protect in this way. You can also enter the authorization classes for reports with the maintenance functions for report trees. This method provides a hierarchical approach for assigning authorizations for reports. You can, for example, assign an authorization class to a report node, meaning that all reports at this node automatically belong to this class. This means that you have a more transparent overview of the authorization classes to which the various reports are transported.
    You must consider the following:
    •     •         After you have assigned reports to authorization classes or have changed assignments, you may have to adjust objects in your authorization concept (such as roles (activity groups), profiles, or user master records).
    •     •         There are certain system reports that you cannot assign to any authorization class. These include:
    •     •         RSRZLLG0
    •     •         STARTMEN (as of SAP R/3 4.0)
    •     •         Reports that are called using SUBMIT in a customer exit at logon (such as SUSR0001, ZXUSRU01).
    •     •         Authorization assignments for reports are overwritten during an upgrade. After an upgrade, you must therefore restore your customer-specific report authorizations.
    Calling RFC Function Modules
    When RFC function modules are called by an RFC client program or another system, an authorization check is performed for the authorization object S_RFC in the called system. This check uses the name of the function group to which the function module belongs. You can deactivate this check with parameter auth/rfc_authority_check.
    Checking Assignment of Authorization Groups to Tables
    You can also assign authorization groups to tables to avoid users accessing tables using general access tools (such as transaction SE16). A user requires not only authorization to execute the tool, but must also have authorization to be permitted to access tables with the relevant group assignments. For this case, we deliver tables with predefined assignments to authorization groups. The assignments are defined in table TDDAT; the checked authorization object is S_TABU_DIS.
    You can assign a table to authorization group Z000. (Use transaction SM30 for table TDDAT) A user that wants to access this table must have authorization object S_TABU_DIS in his or her profile with the value Z000 in the field DICBERCLS (authorization group for ABAP Dictionary objects).
    please See also:
    •        SAP Notes 7642, 20534, 23342, 33154, and 67766
    guess this info will help you,there is one graphic which actually explain the hierarchy of authorisation,i will find some time out to let u know more info about the authorisation
    but if u sit with ur BASIS guy then u can learn lot of things in PFCG
    i guess u r a basis guy,then its not a problem
    best regards
    ashish

  • How to check if remote phone locking in E5 is work...

    how to check if remote phone locking in E5 is working

    If the phone is off nothing can be done about it.
    As is evident in the thread that aspergerguy linked you can check by sending the required sms to your phone but that guy was reporting what sounds like a bug if you do just send the message to test.
    Honestly you have very little time to actually do something about a stolen phone. It's not like tracking a car which itself is not 100% effective. I don't bother with such software it's actually for the stupid thieves.
    Show your appreciation. Hit that kudos button real hard

  • How can i effect a change in many forms simultaniously...?

    How can i effect a change in many forms simultaniously.......?

    I have done something with C API. I Got the following example from Oracle.com. I can compile this file But while Linking this there is a linking error. The error occurs while linking ifd2f60.LIB.
    #include <stdio.h>
    #include <iostream.h>
    #include <dir.h>
    #include <stdlib.h>
    #include <malloc.h>
    #include <math.h>
    #include <d2fctx.h> /* Forms API context */
    #include <d2ffmd.h> /* Form module header file */
    int main (int argc,unsigned char *argv[])
    d2fctxa ctx_attr;
    d2fctx *ctx;
    d2ffmd *form;
    text *form_name;
    /* Check arguments */
    if ( argc != 2 )
    fprintf(stderr, "USAGE: %s <filename>\n", argv[0]);
    exit(1);
    /* Create Forms API context */
    ctx_attr.mask_d2fctxa = (ub4)0;
    if ( d2fctxcr_Create(&ctx, &ctx_attr) != D2FS_SUCCESS )
    fprintf(stderr, "Error creating Forms API context\n");
    exit(1);
    /* Load the form module into memory */
    if ( d2ffmdld_Load(ctx,&form, argv[1], FALSE) != D2FS_SUCCESS )
    fprintf(stderr, "Failed to load form module: %s\n", argv[1]);
    exit(1);
    /* Get the name of the form module */
    if ( d2ffmdg_name(ctx, form, &form_name) != D2FS_SUCCESS )
    fprintf(stderr, "Error getting the name of the form module\n");
    else
    /* Print the name of the form, then free it */
    printf ("The name of the form is %s\n", form_name);
    free(form_name);
    /* Destroy the in-memory form */
    /*if ( d2ffmdde_Destroy(ctx, form) != D2FS_SUCCESS )
    fprintf(stderr, "Error destroying form module\n");
    /* Close the API and destroy context */
    d2fctxde_Destroy(ctx);
    return 0;
    }

  • How is the effect done here?

    hey
    check out this
    link.
    on the site if you click "contact" at the top right, you can
    see that all text and email form that fly from left and right have
    a blur effect.
    heres a jpg
    snapshot of what i mean
    how is this effect done?

    vortons wrote:
    > hey
    >
    > check out this
    >
    http://www.templatehelp.com/preset/pr_preview.php?i=13916&pr_code=3Q2P7g93F4eju9
    > 3em4J52LUq1hYM59.
    > on the site if you click "contact" at the top right, you
    can see that all text
    > and email form that fly from left and right have a blur
    effect.
    >
    http://www.adrima.ee/files/flash/blurr.JPG
    >
    > how is this effect done?
    convert text to movie clip or graphic, set motion tween from
    one place to another and
    on first frame of the tween, select the text and apply blur
    filter. Pretty much it :)
    Best Regards
    Urami
    Beauty is in the eye of the beer holder...
    <urami>
    If you want to mail me - DO NOT LAUGH AT MY ADDRESS
    </urami>

  • HT201209 How to check a balance on a iTunes card

    How to check a balance on a iTunes card?

    Once a card has been redeemed then its amount will be on your account, the card itself is then effectively empty. My account's balance shows at the top left of the store's page on my computer's iTunes, and by logging in to view my account on it (via the Store > View Account menu option). On my iPad it shows at the bottom of, for example, the Featured tab in the App Store app under my account id (or you can view your account by tapping on your account in Settings > iTunes & App Stores and selecting 'view account' and it should show on the screen that you are taken to).

  • The database structure has been modified - how to check if it happend?

    Hello,
    I have a question. How to check if the database structure has been modified? I know that there is shown a messagebox after creating table and adding some fields, but sometimes this message appear after some seconds. The problem is that I want to create table and UDO for this table, and until database structure is not modified I got an error message. If I wait and DB strucuture modifies then UDO is creating correctly.
    My question is - does anyone know how to check if database structure has been modified?
    Regards,
    Hmg

    Hi Szymon,
    I guess you are stuck up in a kinda scenario, where in, you will be populating a form with values, before the structure modifies, if this is going to be your problem, I can help you out with a work around.
    In the beginning of the process, before the creation of the UDO or tables, set a boolean value to false, and once all UDO's and Tables are created, only then, should you make it true and only after the boolean becomes true, you should proceed with populating the values from the screen.
    I really ament sure what your problem is, but one of my guys faced this problem, I then, thought even you might have a similar problem.
    Satish.

  • How to check connection from SAP to reservation system?

    Dear Experts,
    May I know how to check whether the connection between SAP and the reservation system has been set up and ready to use?
    Thanks.

    Hi
    You need to check the identification code issued to the enterprise by AMADEUS must be entered in the R/3 Customizing for Travel Planning under Master Data u2192 Control Parameters for Travel Planning u2192 Define sales offices and Define API access parameters.
    External reservation system In the Travel Planning subcomponent Travel Management accesses an external reservation system connected to R/3 to carry out the queries on available travel services and to book the selected services. The reservation system currently available is the AMADEUS Global Travel Distribution system.
    For more information, see Technical Prerequisites for Travel Planning--
    Technical Prerequisites for Travel Planning
    Before you can use Travel Planning fully, a number of internal R/3 and external prerequisites or settings must be fulfilled.
    Connection to an External Reservation System
    The online booking function in Travel Planning is based on the cooperation with external reservation systems that are used to communicate with the service providers. The R/3 user has access to the following functions via the connection to an external reservation system:
    u2022 Availability query of travel services
    u2022 Transfer of additional information about selected travel services
    u2022 Price information
    u2022 Processing of reservation by the respective provider
    u2022 Synchronization of the data in SAP Travel Planning if external booking changes have been made
    In the current release the external reservation system in use is AMADEUS Global Travel Distribution. AMADEUS is a subsidiary of Lufthansa, Air France, Continental Airlines and Iberia. The reservation system it provides is in worldwide use and 160,000 terminals in 37,000 travel agencies and ticket sales centers in over 130 countries are connected to it.
    In order to carry out online booking via AMADEUS the following must have been carried out:
    u2022 Your enterprise must have signed an agreement with AMADEUS for the use of the interface and be registered at AMADEUS with a user ID
    u2022 A network connection to the AMADEUS computer center must have been opened
    u2022 The identification code issued to the enterprise by AMADEUS must be entered in the R/3 Customizing for Travel Planning under Master Data u2192 Control Parameters for Travel Planning u2192 Define sales offices and Define API access parameters.
    For questions about registration, contact the SAP & AMADEUS Competence Center:
    SAP & AMADEUS Competence Center ACC 02 Neurottstrasse 16 69185 Walldorf Germany
    Cheers
    Mukta

  • How to check SSO user from database?

    Hi:
    I've posted this topic in Forms forum:
    How to check SSO user from database?
    then as I've been told, it's better to post it here, so ...... here is the question:
    I'm writing a "before delete trigger" to insert into log table before delete. Is there a way that I know from database the current SSO user when SSO users share one database user?
    Just like in Oracle Application Express there is v('APP_USER') to know the current user.
    Saad,

    End users are manipulating data through Oracle Forms(and SSO through portal) and the thing I need is to trace the SSO username from database without modifying forms, I mean purely from database taking into consideration that SSO users are sharing one database user. Is it possible?
    Saad,

  • How to check  if all values from a dataset  has come to  an internal table

    How to check  if all values from a dataset  has come to  an internal table ?

    Hi,
    After OPEN DATASET statement check if sy-subrc = 0 if its success then proceed with split statement and save the dataset values into a internal table and while debugging the internal table you will find that whether all values get into internal table.
    Checking sy-subrc after OPEN DATASET statement is must to fill up the values in the internal table.
    For e.g.
    OPEN DATASET p_inpfile FOR INPUT IN TEXT MODE ENCODING DEFAULT.
      IF sy-subrc NE 0.
        WRITE :/ 'No such input file' .
        EXIT.
      ELSE.
    READ DATASET p_inpfile INTO loc_string.
          IF sy-subrc NE 0.
            EXIT.
          ELSE.
            CLEAR loc2.
    *Spliting fields in the file-
            REPLACE ALL OCCURRENCES OF '#' IN wa_string WITH ' '.
           SPLIT wa_string AT const INTO loc2-pernr
                                           loc2-werks
                                           loc2-persk 
                                           loc2-vdsk1.
    Hope you get some idea.
    Thanks,
    Sakthi C

  • How to check vendor payment

    Hi gurus,
    how to check vendor payment is done are not in purchase order
    Regards
    murali

    Check through FBL1N vendor line item display, here you can check for the vendor libality generated during invoice (MIRO) posting once you get into the t-code FBL1N select the radio button open items only in line item selection give your vendor account, company code date (Key day at which the line items are open till now), and execute.
    In the report screen to help your self you can search using crtl + F and put reference as serach criteria.
    You will see the non cleared item the Status indicator tells you the line item is not yet cleared.
    BR

  • Open Slaes Order-How to check and close ?

    Hi,
    We have an open sales order which looks like the delivery is closed and 100% completed, but the sales order is still open!
    Now i know this is an ongoing issue which has several possible reasons for and i have used a script to see what is returned but nothing.
      Can you let me know how to check if there were any changes made in any particular Sales orders ?
    eg comparing open items list of sales orders with something ?
    Thank you in advance,

    Hi,
    Yes we ran the query in note 948670 and it came back zero for all?! See below for details.
    This is what has thrown us so what is the simplest way to check why a SO remains open i.e how to check if there were any changes made?
    Rdr u2013 0 Rows
    Dln - 0 Rows
    Rdn - 0 Rows
    Por - 0 Rows
    Pdn - 0 Rows
    Rpd - 0 Rows

  • How to check RG1 Opening and Closing balance

    Dear All,
    Kindly let me know how to check the opening balance and closing balance in RG1 register.
    Regards,
    Mullairaja

    Dear J Prakash,
    Do we need to check the balance based on Excise Transaction Type?
    I assumed that, we need to check as per the Registers.
    Similary, please clarify another doubt also.
    On what basis we need to check Excise balances?
    1. Based on Excise Registers
    2. Based on Excise Transaction Types
    3. Based on G/L accounts.
    Regards,
    Mullairaja

  • How to check Mobile Balance

    Hii
    how to check mobile credit  balance...?
    my ios version is 7.1.1
    my network in INDIA
    while enter the *123# ...it will going a call...
    no balance ll comeing
    so please find the solution for this

    Ask your carrier.

Maybe you are looking for

  • How can I select folders to add to my iTunes all at once?

    I have all of my music based in a separate folder from my iTunes, and it is also backed up on an external hard drive in the iTunes library because I have my preferences set to "Copy Files to iTunes Media folder when adding to." The problem is, when I

  • Exchange Cal does not appear in iTunes list

    I have setup an Exchange Calendar on my iPhone 3GS (iOS 5.1.1.) and it works fine. When I try and use iTunes (10.6.1) to synch calendars between iPhone and iCal (on my Mac Lion 10.7.4) I found that all my iCal calendars are listed (under "selected ca

  • How to implement Custom Authentication and Authorization in Oracle SOA 11g

    Can anyone please tell me, how to implement Custom Authentication in Oracle SOA 11g ? Because in Oracle SOA 10.1.3.4 , i have implemented this custom authentication and authorization by implementing BPMAuthenticationService, BPMAuthorizationService,

  • If SCCM 2012 in different box and Sql in different box

    what permission sccm installation account will require in SQL box at the time of installtion of SCCM if both are in different box

  • Using non-HP ink cartridges

    I have a Photosmart C6180 that uses HP 02 cartridges - black and five colors.  My local Walgreen's has a cartridge refill program.  I have always used HP cartridges, but what would I give up if I went the non-HP route?  Is the ink status gauge about