Is there a flag that indicates a special request item?

Hi,
We are running SRM 5.0, classic scenario.
I want to find all special request items in shopping carts that have been made in the system including those that were assigned to a vendor from a vendor list or a contract. Is there a flag that indicates that an item is a special request?
I could seperate the items by checking if an item comes from an external catalog but since there are also internal products to take into account the perfect solution would be if there was an actual flag for special requests.
Cheers,
Kristoffer
Message was edited by:
        Kristoffer Kronhamn

Hi Kristoffer,
Here's a piece of code:
if wa_item-catalogid is not initial.
select single business_type into  h_BUSINESS_TYPE from  BBP_CAT_ENTITY  where CATALOGID eq wa_item-catalogid.
endif.
Business_type:
- '03': E-form (we have some special request forms) --> Preq
- '01': Product catalogue (CCM-catalogue and all vendor catalogues) --> PO
You define the catalog-bus.type in IMG: Supplier Rel.Mgmnt--> SRM-server --> Master Data --> Define External Webservices. Double-click on an entry --> Bus.type of a Webserver.
Regards,
Hendrik-Jan

Similar Messages

  • Is there a BAPI that displays Scheduling Agreement line items?

    Hi,
    If a PO number is passed to BAPI_PO_GETITEMS, all line items are returned.
    Is there a BAPI that will do the same thing for a scheduling agreement?
    Thx.
    Andy

    Hi,
    try BAPI_PO_GETDETAIL
    Regards.
    David

  • Is there any app that indicates how each app consumes battery or any way of knowing?

    downloaded a lot of apps and I think decreased battery performance, I want to know what to remove to improve

    Generally to save battery you can do any of the following:
    Reduce the screen brightness
    Turn off bluetooth when not using it
    Turn off wifi when not using it
    Turn off LTE when not using it (if it's an LTE enabled device)
    Close any apps that are running in the background
    Disable any use of current location based services
    Set fetch notifications to a wider timeframe of manual
    All of these actions consume battery life and if they are all enabled it can drain your battery pretty quickly. Hope this helps.

  • Is there a Flag indicate if the seq is called from other one or run independ

    Is there a Flag that indicate if the seq I am running is called from other seq. or it is running independently?

    Hi FMB,
    There is not really a flag but there is a property call RunState.CallStackDepth you can check.
    If this is greater than 0 then there is a caller sequence. Therefore to find the name of the caller sequence you would use NameOf("RunState.Caller.RunState.Sequence").
    For every increment in value of the CallStackDepth you would add "RunState.Caller." to the beginning of the lookup string.
    Hope this helps
    Regards
    Ray Farmer
    Regards
    Ray Farmer

  • Is there any Malware that affects Macs?

    Hi everyone,
    I recently bought a macbook pro and i wonder if i need a security app? I read something about Kaspersky for Mac, did anyone have an idea about this app?

    1. This is a comment on what you should and should not do to protect yourself from malicious software ("malware") that circulates on the Internet. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to your computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
       3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandboxing security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some red flags that indicate danger.
    Software from an untrustworthy source
    Software of any kind is distributed via BitTorrent or Usenet.
    Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website.
    Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    The software is advertised by means of spam or intrusive web popups.
    Software that is plainly illegal or does something illegal
    Software that you would otherwise have to pay for is "cracked" or "free."
    An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    A web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    You win a prize in a contest you never entered.
    Someone on a message board such as this one is eager to help you, but only if you install an application of his choosing.
    A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    Unexpected events
    You open what looks like a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file or message.
    An application does something inexplicable, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
       6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. New threats are emerging on a daily basis. Research has shown that most successful attacks are "zero-day" — that is, previously unknown. Recognition-based malware scanners do not defend against such attacks.
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware, and even for that use it's not completely effective. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular trojan it is, but do you really care? In practice, there's seldom a reason to use the software unless an institutional policy requires it. Windows malware is so widespread that you should assume it's in every unknown email attachment until proven otherwise.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither should you assume that you will always be safe from exploitation, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. "Hmmmm, this torrent is a crack of that new game I want. I think I'll download it. It could be a trojan, but the antivirus will warn me if it is." Then they wonder why their Mac is so slow all of a sudden. It's slow because it's running flat out mining bitcoins for a hacker who has already sold their credit card number and banking passwords to a criminal gang. Maybe a week later the antivirus does warn them, but what good does that do?
    Nothing can lessen the need for safe computing practices.

  • I have installled PE12,I have registrated it (serie number) and I have made an Adobe- ID. (I can find there my registrated product). Still, when I want to start the program, there is a screen that indicates that i have "to registrate PE within 7 days" , W

    I have installled PE12,I have registrated it (serie number) and I have made an Adobe- ID. (I can find there my registrated product). Still, when I want to start the program, there is a screen that indicates that i have "to registrate PE within 7 days" , When iI continuer (next sceen) there is a message that the proces can not proceed for "I need  an internet commection" which I have!!!! When this problem does not disappear  I have to contact Adobe ??.......  So please can you help me. I am already many hours trying to get started :-(

    CS2 is very old and reached its "end of life" a while back.  So probably won't run on modern operating systems.  If you can still run it, you'll need to uninstall what you have and re-install with the download link below to activate it.
    Error: Activation Server Unavailable | CS2, Acrobat 7, Audition 3
    Nancy O.

  • Is there a way to indicate that an event has additional notes?

    I have appointments with additional notes in my calendar. I do not seem to see a way to know that there are additional notes unless I double-click on the event and it opens up the new window.
    Is there a way to indicate that an event has additional notes?
    Thanks.

    Sorry for joining this thread so late, but I just was searching for an answer to the missing icons (notes, recurring event, etc.) and have already submitted feedback, but I noticed that it might be better to give feedback in the specific iCal area: http://www.apple.com/feedback/ical.html
    I gave feedback in both areas, Mac OS X and iCal.

  • Yes; I see that I can add words to the dictionary so that firefox no longer flags them as wrong, but is there any way that Firefox will actually suggest the added words, so that if I do misspell them, they are pressented as suggestions?

    Spell check not only underlines words that are not in its dictionary, but suggests words when the flagged words are right clicked. However, if words have been added to the dictionary by a user, it does not appear that spell check incorporates the new words into to the suggestions for proper spelling. As a result, if I misspell a word that I have added to the dictionary, I have to manually correct it, because the correct spelling that was added to the dictionary is not offered in the drop down list when the word is right clicked.

    ''is there any way that Firefox will actually suggest correct spelling''
    Right click on the indicated word, and choose, the spelling, add to dictionary,
    or close the right-click context menu to allow without changing anything.
    You probably have other dictionary lists on your computer of words that you've already verified and added, open that list or a copy of it in Firefox and add the ones that show up as invalid using your better judgement that you have now than in the past.
    *http://dmcritchie.mvps.org/firefox/tab_capacity/001_with_underscore.htm#spellcheck

  • Is there any event that triggers when you switch between components?

    is there any event that triggers when you switch between components?
    like for example... when i switch between components, i need a function to fire everytime i switch...
    ive tried show, hide, and initialize... and none of them work...
    any ideas or help is greately appretiated!!

    Depends on what you are trying to do,
    you have mouseover and mouseout and mouseclick events which you can use on the component and write code to deal with what you want to happen when you change focus. You have keypress event which would allow you to monitor tabbing between components, remember that in most events the currentTarget and target values will give you the information you need to handle component interaction.
    so
    [Bindable] private var CurrentObject: Object; <-------  use this as a pointer to what ever object you are currently focused on or just to indicate things have changed
    addeventListener(MouseEvent.CLICK,myCompponentSwap);
    protected function myComponentSwap(e:event): void
        if (CurrentObject !=e.currentTarget && CurrentObject != null)
             do what you want becuase a component switch just happened
        CurrentObject = e.currentTarget;
    Hope this gets you started.
    David

  • Is there a package that includes photoshop and premire pro?

    Is there a package that includes photoshop and premier pro? As i only need these two products. Thanks!

    No... you may buy the photography package and Premiere Pro as a single subscription
    Special Photography Plan (includes Photoshop & Lightroom & Bridge & Mobile Lightroom)
    http://helpx.adobe.com/creative-cloud/faq/mobileapps.html
    http://helpx.adobe.com/photoshop/kb/differences-photoshop-creative-cloud-photography.html
    Cloud Plans https://creative.adobe.com/plans
    -and subscription terms http://www.adobe.com/misc/subscription_terms.html
    -what is in the entire Cloud http://www.adobe.com/creativecloud/catalog/desktop.html
    -http://www.adobe.com/products/catalog/mobile._sl_id-contentfilter_sl_catalog_sl_mobiledevi ces.html

  • HT201541 Our Mac-Mini has gotten slower and slower. Is there a utility that would help speed it up?

    Our 4 plus year old Mac-Mini has gotten slower and slower.  Is there a utility that would help speed it up or is there another?

    Hello! I’ve offered the steps below to similar posts in the past and they helped out getting to the solution (or at least find the cause). I suggest them to you too in this case. It will take you about 30 minutes or less to do these, depending on how bad the problem on your Mac is.
    The goal here is to boot your Mac to the so-called Recovery partition where you’ll have a chance to repair the disk and the disk permissions using the Disk Utility and Password Utility. This might solve your issue and even if it doesn’t- it’s still a decent maintenance step to perform. These steps won’t erase your data or reinstall your Mac in any way if you follow instructions carefully.
    Here’s how:
    1/ Make sure your computer is completely shut down.
    2/ You’ll have to be quick next: Press the Mac’s power button. As soon as you either hear the loud chime, or see the display light up - usually after a second or 2 - on your keyboard press [cmd] + [r] Keep these keys on your keyboard pressed until you either see an Apple Logo with a loading bar or a spinning gear.
    After a few minutes, you’ll be presented with a Utilities screen. This is the Recovery partition. If this step is already giving you problems, try using a USB-keyboard. It doesn’t have to be an Apple-keyboard. If you have a Windows-tailored keyboard laying around, use the “Windows-flag” key in stead of the [cmd]-key and it should also work.
    3/ Choose Disk Utility and click [continue]
    Disk Utility will display your computer’s harddrive in the left column. The default name for it is “Macintosh HD” and is usually the second one from the top. Click on it and click on the [verify disk] button. This will check your “Macintosh HD” harddrive partition for errors. If found, click [repair disk]  unless you have a Fusion drive in your Mac and it says [fix] instead of [repair disk] please tell us before you continue! For a screenshot of what I mean, check this article from Apple: http://support.apple.com/en-us/HT202574
    4/ Once done with the verifying or repairing of your “Macintosh HD” click [repair disk permissions]
    This will check your partition for permissions errors. A common myth about this feature is that it will fix all permissions issues on your Mac, which is not true, but it will fix most systemwide issues. Also, here is a list of error messages that you can safely ignore if they pop up:
    http://support.apple.com/en-us/HT203172
    5/ Lastly we shall do a permissions/Access Control List repair on specifically your user’s home folder with a somewhat hidden tool in the Recovery partition. Close Disk Utility and find the menu called “utilities” in the top left corner of your computer’s display. It’s in between the menus “edit” and “window” Don’t be confused with the menu called “os x utilities” 
    Choose Terminal. A somewhat old-fashioned looking window will pop up, waiting for a text command from you. This is the Terminal.
    After the # type: resetpassword and press return. Note that there is no space between ‘reset’ and ‘password’ 
    What you’ll see next is an rectangular window that gives you the option to reset passwords. We are not going to that, however. Instead, click on “Macintosh HD” at the top. In the pull-down menu below that, choose your user's accountname. Skip all the rest and at the very bottom click the [reset]-button.
    A spinning gear will appear and may stay on for a second or several minutes. It’s hard to predict exactly how long.
    If you have multiple users on your Mac, I advise you to repeat this step for all your users.
    We’re ready to reboot your Mac now. Click on the Apple Menu and choose “startup disk” Choose to boot from “Macintosh HD” Please let us know if this solved your issue, or if the steps above did not work, or could not be performed for some reason.
    If they worked I suggest you do these steps everytime your Mac becomes slow.

  • Flag to indicate if a call is a transferred call

    Hi all,
    I have a UCCE deployment with CAD.
    The UCCE system will be integrated with Microsoft CRM.
    When an agent gets a call, I have to send to CRM: the callerID, CallID and a flag to indicate if this is a transferred call or not, in order for a popup to appear on the agent screen.
    I know that I can send the CallerID and CallID from the ICM script to CAD, but what I don't know is how to send from the ICM script a value that indicates if this is a transferred call.
    Can someone help me with this issue? the help would be greatly appreciated.
    Thank you in advance.
    Lara

    so this is how i would do it:
    take any free peripheral variable, [from 1 to 10]. e.g lets take Peripheral variable 5.
    on your script which is handling new calls and assigning them to an agents_SG:
    set Peripheral variable 5 to "new-call" before queue or SG node.
    and in CAD desktop admin change layout accordingly to accommodate PV5 in CAD layout.
    and
    on the Transfer calls on CTI route point and transferring them to an expert_SG :
    set Peripheral variable 5 to "transferred-call" before queue or SG node.
    and in CAD desktop admin change layout accordingly to accommodate PV5 in CAD layout.
    i hope you got the logic i am explaining?
    regards,
    Chintan
    ~please rate all helpful post

  • When I open my sleeping mac, it makes the noises that indicate mail is being sent.  I am not sending mail.  Is someone somehow using my mail?

    When I open my sleeping mac, it makes the noises that indicate mail is being sent.  I am not sending mail.  Is someone somehow using my mail?

    go to https://appleid.apple.com/ and try to reset it there. when updating to ios 7 it does have activation lock so you have to know the apple id and password. contact apple and they make be able to assist you with apple id password.

  • Is there any function that output address by inputing the address no.?

    Is there any function that accept an address number as input paramenter and return an address so that I don't need to build it myself?
    Thanks!

    FU ADDRESS_INTO_PRINTFORM        ADDRESS_TYPE
    Text
    Address type: 1,2,3 or ' '(default)
    Description
    There are three address types:
    Address type '1': 'Normal' address (company or organization); the address structure used in most SAP applications as 'Address'.
    Address type '2': Address of a person
    Address type '3': Work address, usually the address of a contact person in a company
    The default address type SPACE is treated as type '1' and is required for the upwards compatibility of the function module.
    The interface parameters ADRSWA_IN and ADRSWA_OUT are only used in address type SPACE.
    The other address types use:
    ADDRESS_1 or ADDRESS_2 or ADDRESS_3 for the attributes, and
    SENDER_COUNTRY, RECEIVER_LANGUAGE, NUMBER_OF_LINES, STREET_HAS_PRIORITY and LINE_PRIORITY for control.
    The parameters COUNTRY_NAME_IN_RECEIVER_LANGU, LANGUAGE_FOR_COUNTRY_NAME and NO_UPPER_CASE_FOR_CITY are address type-independent.
    The address attributes can be read directly instead of being passed in the structures ADDRESS1/2/3, if the address is in the Central Address Management tables.
    The Business Address Services keys must be passed instead of the structures ADDRESS1/2/3:
    Address type 1: ADDRESS_NUMBER
    Address type 2: ADDRESS_NUMBER and PERSON_NUMBER
    Address type 3: ADDRESS_NUMBER and PERSON_NUMBER
    The following parameters are used (Import) or filled (Export):
    Address type 1
    Import parameters:
    ADDRESS_1
    ADDRESS_TYPE
    ADDRESS_NUMBER
    SENDER_COUNTRY
    RECEIVER_LANGUAGE
    NUMBER_OF_LINES
    STREET_HAS_PRIORITY
    LINE_PRIORITY
    COUNTRY_NAME_IN_RECEIVER_LANGU
    LANGUAGE_FOR_COUNTRY_NAME
    NO_UPPER_CASE_FOR_CITY
    Export parameters:
    ADDRESS_PRINTFORM
    ADDRESS_SHORT_FORM
    ADDRESS_SHORT_FORM_S
    ADDRESS_DATA_CARRIER
    ADDRESS_DATA_CARRIER_0
    NUMBER_OF_USED_LINES
    NAME_IS_EMPTY
    ADDRESS_NOT_FOUND
    ADDRESS_PRINTFORM_TABLE
    Address type 2
    Import parameters:
    ADDRESS_2
    ADDRESS_TYPE
    ADDRESS_NUMBER und PERSON_NUMBER
    SENDER_COUNTRY
    RECEIVER_LANGUAGE
    NUMBER_OF_LINES
    STREET_HAS_PRIORITY
    LINE_PRIORITY
    COUNTRY_NAME_IN_RECEIVER_LANGU
    LANGUAGE_FOR_COUNTRY_NAME
    NO_UPPER_CASE_FOR_CITY
    Export parameters:
    ADDRESS_PRINTFORM
    ADDRESS_SHORT_FORM
    ADDRESS_SHORT_FORM_S
    ADDRESS_DATA_CARRIER
    ADDRESS_DATA_CARRIER_0
    NUMBER_OF_USED_LINES
    NAME_IS_EMPTY
    ADDRESS_NOT_FOUND
    ADDRESS_PRINTFORM_TABLE
    Address type 3
    Import parameters:
    ADDRESS_3
    ADDRESS_TYPE
    ADDRESS_NUMBER und PERSON_NUMBER
    SENDER_COUNTRY
    RECEIVER_LANGUAGE
    NUMBER_OF_LINES
    STREET_HAS_PRIORITY
    LINE_PRIORITY
    COUNTRY_NAME_IN_RECEIVER_LANGU
    LANGUAGE_FOR_COUNTRY_NAME
    NO_UPPER_CASE_FOR_CITY
    Export parameters:
    ADDRESS_PRINTFORM
    ADDRESS_SHORT_FORM
    ADDRESS_SHORT_FORM_S
    ADDRESS_DATA_CARRIER
    ADDRESS_DATA_CARRIER_0
    NUMBER_OF_USED_LINES
    NAME_IS_EMPTY
    ADDRESS_NOT_FOUND
    ADDRESS_PRINTFORM_TABLE
    Address type SPACE (default value; the previous interface up to Release 3.0B):
    Import parameters:
    ADRSWA_IN
    ADDRESS_TYPE
    ADDRESS_NUMBER (only for special cases such as Japan)
    COUNTRY_NAME_IN_RECEIVER_LANGU
    LANGUAGE_FOR_COUNTRY_NAME
    NO_UPPER_CASE_FOR_CITY
    Export parameters:
    ADRSWA_OUT
    NAME_IS_EMPTY
    ADDRESS_PRINTFORM_TABLE
    The following parameters correspond to each other (on the left the individual parameter - on the right the fields in the old interface structures ADRSWA_IN and ADRSWA_OUT):
    ADDRESS_NUMBER                   -   no equivalent
    PERSON_NUMBER                    -   no equivalent
    SENDER_COUNTRY                   -   ADRSWA_IN-INLND
    RECEIVER_LANGUAGE               -   ADRSWA_IN-SPRAS
    NUMBER_OF_LINES                 -   ADRSWA_IN-ANZZL
    STREET_HAS_PRIORITY             -   ADRSWA_IN-WAREN
    LINE_PRIORITY                    -   ADRSWA_IN-PRIOR
    COUNTRY_NAME_IN_RECEIVER_LANGU  -   no equivalent
    LANGUAGE_FOR_COUNTRY_NAME       -   no equivalent
    NO_UPPER_CASE_FOR_CITY          -   no equivalent
    ADDRESS_SHORT_FORM              -   ADRSWA_OUT-LINEK
    ADDRESS_SHORT_FORM_S            -   no equivalent
    ADDRESS_DATA_CARRIER            -   ADRSWA_OUT-LINED
    ADDRESS_DATA_CARRIER_0          -   ADRSWA_OUT-LINED0
    NUMBER_OF_USED_LINES            -   ADRSWA_OUT-ANZZL
    NAME_IS_EMPTY                    -   no equivalent
    ADDRESS_NOT_FOUND               -   no equivalent
    ADDRESS_PRINTFORM_TABLE         -   no equivalent
    The parameters are described in the parameter documentation.

  • Is there a chance that Captivate will be bundled into the Creative Cloud Suite?

    Is there a chance that Captivate will be bundled into the Creative Cloud Suite?

    When I'm asking about this in some webinars, I get mostly two answers: that is another business unit (Captivate and Presenter), or those applications are not considered for 'creative' people. The last reason always makes me laughing but is typical of the way 'big' Adobe is looking down on 'small' Adobe.
    Rod, Framemaker and RoboHelp are not in the Creative Cloud neither. Both have a bit limited, but very specialized user base. And really, Framemaker has features that InDesign (which is much more promoted by Adobe) has not yet. It does publish directly to different ebook formats, which is still a very cumbersome work flow in InDesign who is the 'flagship', and where defenders mostly tell that FM is EOL. RH has even more formats available as output. Maybe Captiv8r, respected RH expert, can offer more info. Technical Communication Suite is the only suite that remains for the moment, version 5 was released two weeks ago.
    Another possible reason, which doesn't apply to Captivate: Presenter, RoboHelp, Framemaker are not available for Mac (Presenter Express is only a small part of Presenter).
    It is also my opinion, that at least Captivate belongs in the CC and that it 'could' extend the user base, but I'm a very bad marketing person, other people do know better.
    Lieve

Maybe you are looking for