Implementation content for MTS for consumer products in SCM

Dear friends,
  I am trying to find business scenario in business process repository (BPR) for consumer products for MTS  from SCM 5.0 (Supply chain mgmt) .
I could not find that option in solution manager 4.0. My scenario is very narrow to consumer products for MTS scenario. How to get it?
If any latest implementation content CD needs to be downloaded from service market place.
My i check system status my implementation content level is :
ST_ICO:
Release 150_700
Level:0006
Highest support package:SAPK-15076INSTPL
Please guide me.
Thanks
Senthil

Hi Dolores,
    In Solar01, In "structure"tab, under secnario name, if i press F4, i am getting
SAP for consumer products. Under this i am having the following:
1.Brand management
2.DSD paperbased
3.Global data synchronization
4.Mobile DSD order to cash
5.Mobile DSD Van sales
<b>6.Responsive replenishment</b>--- Under this node i am having SAP ECC 6.0 & SCM 5.0, R/3 47 X 200 & SCM 4.1
7. Trade promotion management
My support pack level are:
ST-ICO-150_700-<b>0006</b>-SAPK-15076INSTPL
But what u told as latest is level 0007. What we have is 0006. How to upgrade the patch level?
Senthil

Similar Messages

  • Extended rebate processing for INDIRECT sales (Consumer products solution)

    Hello All,
    Does anyone of you configured extended rebate processing for indirect sales?
    If yes i would need some help on steps which needs to be carried out.
    Please advise
    Thanks in  advance
    Mike

    You can find the building blocks at http://help.sap.com/bp_cp1600/CP_US/HTML/bb_scen_list.htm
    If you want to activate the functionality, then you can refer OSS 1520390 - Activation of Enhanced Rebate Functionalities - IMG Customizing Transactions - SAP Menu
    Regards,

  • Content Server config for production system - oac0

    Hi all
    We are setting up content server for our ERP 2005 system, and I am wondering what best practice is for our scenario.
    We have one content server (CST) for development and test systems on host A, and one content server (CSP) for production system on host B. The Archive link configuration in dev and test points to CST. When this is transported to production, it will point to the wrong content server and I will have to reconfigure the archivelink in production to point to the correct content server (CSP).
    What is the best way to set up the production system to point to the content server CSP on host B? Should I define a new content repository in t-code oac0 in dev, and transport this to production? Should I define the new repository directly in production system??
    Please advise.
    Best Regards,
    Thomas

    Hello,
    I had the same problem a few years ago with R/3 4.7.
    I don't think there is a perfect solution but here is what I did :
    In the DEV system, in OAC0, I created 2 content repositories, one for the test sytem and one for the production. I transported these 2 content repositories in the production system.
    In the DEV system, in OAC3, I created temporary links from my business objects to my production content repository. I released the request order.
    Then I deleted these links which are wrong in the DEV system. I transported the order in the R/3 production system where these links are right.
    In the DEV system, in OAC3, I then created  the links from my business objects to  my TEST content repository. I released the second request order.
    So my config is now OK in my test and my production system.
    When we refresh the DEV system by a database copy from the production system. We just have to reimport the test request order to switch the links to be OK on the DEV system. We don't have to recreate the test content repository as it was defined als oi nthe production system.
    I am not sure that this is clear but this works for us with no problems since 2002.
    I hope this helps.
    Olivier

  • Question about "SAP for Consumer Products"

    In our contract with SAP, I have license to "SAP Customer Service
    Management for Consumer Products" and "SAP Sales Execution for Consumer
    Products".
    I would like to Know, Where I can find in my SAP system that I realy
    have this solutions instaled ?
    Regards.
    Leandro Peron Meireles

    Hi,
         Check this link
    /people/manfred.lutz/blog/2007/03/16/new-blog-series-abap-trial-version-for-newbies
    Reward points if useful,
    Regards,
    Niyaz

  • Re: MTO & MTS for same product

    Hi Experts,
    How to configure both MTO & MTS for a same product.
    Regards,
    Vivek

    Hi Experts,
    I am having a requirment for MTO Subcontracting order.The customer issues raw material for the production for the FG product. Now I want that the system should do the Planning for the FG by MRP & also to calculate the the raw material required. The system should also be able to created purchase requisition for the deficit raw material. The raw material should not have any financial implication i.e. they are are only relevent for stock posting & not for any valuation purpose.
    Here my client is the subcontractor. So he does production for Other clients as well.
    Please advise.
    Regards,
    Vivek

  • What is the best virus protection for all my Apple products?

    I have seen ads for Norton 360, McAfee and others that offer virus protection for all your devices. I am looking for protection for:
    Mac Pro
    MacBook Pro
    Mac Mini
    iPads
    iPhones
    If you know what is the best for a smooth running system and providing protection please let me know. My system is acting flaky (Mac Pro) and Wanted to start with Virus protections.

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is foremost a problem of human behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • I can't start Oracle Services for MTS

    Hello there, Oracle users!
    I am new here, as new to the Oracle technology. We are developping a
    software which must be transaction compliant, and we're on microsoft
    platform, and thatswy we're using sql2000 and microsoft transaction
    server for our application server components.
    But one of our clients wants to use oracle 8i db as the resource manager. We had to make the proper work mts with oracle. I've red all of the oracle documentation within this topic, and i successfully installed
    the Oracle Services for MTS on our development machine at the workplace.
    (created the mts_proxy_info table, granted the specific roles to a specific db user, the specific privileges, and so on), and
    it is working nicely, the log says "accepting new enlistment requests",
    everything is wonderful.
    But at the client, i repeated all of the steps (the only difference is,
    that they have the server on a HP-UX machine instead of winnt and i had not access to the oracle server, i just gived the sql script to the oracle dba guy there (maybe he missed something?)), and when i wanted to start the oracle services for MTS on the Application server, the log says this: "incorrect password, or username". I really don't
    undestand it, because i can connect through the OLEDB driver with the
    specified username, password and Service name. (in a datalink (udl), for example)
    If anybody had an idea i would be very happy
    thanks in advance,
    daniel szabo
    ps: the app server config is:
    nt 4.0 server
    sp 6
    option pack 2
    iis 4
    mts 2
    script host 5.5
    ie5

    Daniel,
    In pre-8.1.7.4.0 beta implementations, your application server e.g. IIS or MTX.EXE hosts MTS transactional components. When such components acquire OLEDB or ODBC connections to Oracle and external service setup for that database i.e. OracleMTSService<id> joins the MTS transaction on behalf of the Oracle database which quite often runs on a non-Windows platform e.g. Solaris. We restrict each database to have one and only such service. This brings in scalability and availability issues. In 8.1.7.4.0 we have embedded the transaction join and commit logic in the clientside dll. There is no OracleMTSService<id> for a given database. The only service needed is a recovery service one per Windows machine on which Oracle Svcs For MTS is installed. This service is automatically created on installation of the product and doesn't connect to the databases. Instead the involved databases connect to the service via HTTP to resolve any MTS-related transactions that are in-doubt.

  • How to Assign Logical port for a standar Consumer proxy

    Hello,
    I'm working with a SAP application creating a WS Connector that ask me for the following data:
    - Class name:
    - Logical Port name:
    As far as I have read SAP delivers for this application an example implementation for the following web service: ProductionBillOfMaterialVariantBasicDataByMaterialAndPlantQueryResponse_In with the /BCV/CL_SIN_WS_BOM class.
    And the help also says that We can find the example implementation delivered by SAP for the Web service ProductionBillOfMaterialVariantBasicDataByMaterialAndPlantQueryResponse_In in the package /BCV/SIN_PRX, under Service Consumer /BCV/CO_PRODUCTION_BILL_OF_MAT
    In se80 transaction under /BCV/SIN_PRX package I can find /BCV/CO_PRODUCTION_BILL_OF_MATERIAL consumer proxy.
    As far as I know, I just need to assign a Logical port to this proxy.
    So, I go to soamanager transaction under "Service-Administration" --> "Single Service Configuration" and find this Consumer proxy. Then, under Configuration tab I select "Create logical port" option but I need to fill an URL for WSDL access.
    Where can I find this URL? I think that I need to provide de WSDL URL (end point) of the ProductionBillOfMaterialVariantBasicDataByMaterialAndPlantQueryResponse_In Web Service but I can't find it on the soa manager. Or maybe I need to implement a WS by my own WB using the /BCV/CL_SIN_WS_BOM class?
    I appreciate if someone could help me with these SOA concepts.
    Thanks in advance,
    Abigail.

    Hi Abigal,
    In  SOAMANAGER , u can configure the logical port in 3 ways first it by WSDL and second by manually and third by PI.
    1. WSDL based :   URL will automatically determined using WSDL file.
    2. MANUAlly :   in this , we have to provide the URL .
    Thanks
    jitendra

  • DRQ: Different default warehouse for Sales,Purchase and Production Process

    Hi Experts,
    In my recent Implementation Project I realised that there should be provision of capturing and using different default warehouse for Sales,Purchase and Production.
    For example in manufacturing company
    1. Default ware house for Purchase process should be QC ware house for raw material.
    2. Default ware house for Production process should be RM ware house for raw material (components).
    3. Default ware house for Production process should be QC ware house for Finished Good (Parent Item).
    4. Default ware house for Sales process should be FG ware house for Finished Good (Parent Item).
    I hope the idea is clear, I am looking for 3 different set as default warehouse for each item in Item master Inventory tab.
    Internally when a user create a document than default warehouse is to be picked up from this setting !
    Best Regards,
    Samir Gandhi

    Hi !
    I guess the indicator "Exclusive" in the accessess of the access sequence can meet the requirement if I have note misunderstood the issue.
    Press : F1 help on Exclusive Indicator -
    Indicator: Exclusive condition access
    Controls whether the system stops searching for a record after the first successful access for a condition type within an access sequence.
    Thanks & Regards

  • How to get "Oracle Services for MTS" working?

    I've implemented the microsoft code example (see at the bottom) for the use of distributed transactions (with system.transactions and MTS support). The code works fine as long as I use only MS sqlserver.
    Well, I tried one connection to an oracle database and one connection to the sqlserver - and here the trouble starts ;-)
    Oracle doesn't care about the transaction. After the command is executed the changes are made to the oracle database at once (no commit has occured at that point) even if the second command isn't successfull.
    I suppose at the moment that the problem must be something around the interaction between MTS and oracle database, more precisly the oracle Services for MTS.
    I've installed the odp.net client (ODAC1020221.exe).
    The installer tells me that oracle data access components 10.2.0.2.21 and within the Oracle Services for MTS are installed.
    But I cannot find a service with that name in the service list, OracleMTSRecoveryService is listed, but I'm not sure if that's the right one.
    So here are my questions:
    What's the name for 'Oracle Services for MTS' in the services list?
    Do I have to install more than the odp.net client to get the MTS support running?
    Is there a mistake in the code I'm running?
    any help is welcome ...
    thanx in advance!!!
    And here's the code I'm working with:
    [Transaction(TransactionOption.RequiresNew)]
    public class Worker : ServicedComponent
    [AutoComplete]
    public void Test()
    using (TransactionScope scope = new TransactionScope(TransactionScopeOption.RequiresNew, new TimeSpan(0, 5, 0)))
    DbProviderFactory theFactory = DbProviderFactories.GetFactory("Oracle.DataAccess.Client");
    using (DbConnection connection1 = theFactory.CreateConnection())
    try
    connection1.ConnectionString = ".........";
    connection1.Open();
    DbCommand command1 = theFactory.CreateCommand();
    command1.Connection = connection1;
    command1.CommandText = "Insert into user (name, surname,benoid) values ('hans','wurst','32315134512345')";
    object returnValue = command1.ExecuteNonQuery();
    using (SqlConnection connection2 = new SqlConnection("Data Source=localhost;Database=UserManagement;Trusted_Connection=true;"))
    try
    connection2.Open();
    //this command fails
    SqlCommand command2 = new SqlCommand("Insert into uuuu (name, vorname) values ('hans','wurst')", connection2);
    object retValue = command2.ExecuteNonQuery();
    catch (Exception ex)
    return;
    catch (Exception ex)
    return;
    scope.Complete();
    }

    hey what's up you figured out your problem with M$DTC/Oracle 11i with ODP.NET trying to do a TransactionScope?
    I saw your problem - and I ran into the same.
    Re: 10g Express + ODP.NET (version 2.111.6.20) > support TransactionScope?
    Trying to install "Oracle Services for MTS" not sure how but working on it now. Doc looks old however,
    http://www.oracle.com/technology/tech/windows/ora_mts/index.html
    Did you get pass this already?

  • Number range for serial Number in production order

    Hi all,
                I want to use the Serial Number in production Order ... It should be generated automatically ... when i try this system creating the serial number from 1.....i want the number to start from 2000000 , How to configure this number range ....
    Please advise me ...
    Regards,
    kumar

    Dear
    Following steps are required in Serial Number Management :
    1. OIS2 or Go to path SPRO > Plant Maintenance and Customer Service > Master Data in Plant Maintenance and Customer Service > Technical Objects > Serial Number Management > Define Serial Number Profiles. There enter "2" in Stkck column for your serial profile.
    2.SPRO->SAP Customizing Implementation Guide->Plant Maintenance and Customer Service->Master Data in Plant Maintenance and Customer Service->Technical Objects->Equipment->Equipment Categories->Define Number Ranges
    3. IQ01 Create Serial Number
    4. MM02 You need to add the above created Serial Number Profile in the Material Master ion the work scheduling view .
    5. CO02 Assigning the Serial Number through Production Order,
    Also Serial Number can be created automatically by clicking on u201CCreate Serial Number Automaticallyu201D , Release the Order
    6. MB31 Do the GR for the above created Production Order and Check in MMBE for serial Numbers
    Try and check
    Regards
    JH
    Edited by: Jiaul Haque on Nov 22, 2010 7:43 AM

  • For a target based production creation of Number of planned orders reg

    For a target based production, can anybody explain as to how the planned orders created/altered. The main question is the system generated planned orders can be altered, suppose the system generates 10 planned orders can we alter to 8 planned orders if so how?

    Vachanala,
    The way I understood "Target Based" production is that it is an MTS scenario and the Material is assigned with Planning strategy 11 in MRP3 view.
    For this you need to PIR(Target) using transaction MD61 with requuirement type "BSF". Once this is done, you can run MRP using MD02 if for single material or run in background using MDBT transaction. Planned orders are created based on the target(PIR).
    You can manually change the planned order dates or quantity in the change mode of the planned order, and system firms this planned order.
    Hope this information helps...
    Regards,
    Prasobh

  • Is there any constrain in using the same order type for MTS and MTO

    Hi,
    i have the constrain to use single production order type .
    Can i use single order type for MTO and MTS.
    is there any constrain in using the same order type for MTS and MTO.
    pls help me.

    Hi,
    There is no constraint or limitation in using the same production order type for MTS and MTO . Settings in requirement class and material master will mainly control whether the flow is MTS or MTO.
    Regards,
    Mrinal

  • How to Implement N-Level Approval for Bid,Live Auction,PO,Contract ?

    Hi Experts,
                  I am new to SRM 5.0. My requirement is how to implement N-Level Approval for Bid, Auction, PO and Contract? Which steps should I follow for        N-Level Approval? Can any one send me sample code and name of BADI where I have to implement the code.
    Abhijeet Panse

    Hi
    Please check for <b>BBP_WFL_APPROV_BADI</b> using SE18 transaction for relevant Code as well and standard SAP documentation.
    Related sample code and other useful pointers ->
    WS14500015 is not working for Multilevel approval
    Re: SRM / Shipping cart
    Re: N Step Approval BADI - BBP_WFL_APPROV_BADI
    Re: N-step BADI workflow
    http://help.sap.com/saphelp_srm50/helpdata/en/8b/4fa9585db211d2b404006094b92d37/content.htm
    http://help.sap.com/saphelp_srm50/helpdata/en/2c/e68d406b305537e10000000a1550b0/frameset.htm
    http://help.sap.com/saphelp_srm50/helpdata/en/17/40a86c773d6c41801d78af1a34b90f/frameset.htm
    Multiple Implementation For BBP_WFL_APPROV_BADI
    Re: Help needed on N-Step Approval WFL for SC
    Re: N-Step 14000109 workflow - Unable to identify Approvers
    Do let me know.
    Regards
    - Atul

  • Standard Business Content & Data Targets for Case Management & CRM Survey

    Dear Friends,
    We are implementing CRM2007 with BW3.5 for reports for CRM Analytics. We require to Identify the Standard Data Targets & Standard Business Content (Reports) available for the following:
    1. Case Management
    2. CRM Survey (We have already been able to identify Data targets in BW3.5 for Web Survey & in CRM 2007 we have been able to identify Data targets for CRM Survey, as well as Web Survey. Our requirement is identifying Data Target for CRM Survey)
    Please guide.
    Regards,
    Rajesh Banka

    hi,
    You can find the planning scenarios related to planning ifor CRM at this link http://help.sap.com/SAPHELP_SEM350BW/helpdata/EN/05/242537cedf2056e10000009b38f936/frameset.htm
    You can also find the details on demo content for the same at http://help.sap.com/SAPHELP_SEM350BW/helpdata/EN/05/242537cedf2056e10000009b38f936/frameset.htm
    Regards,
    Deepti

Maybe you are looking for