IS-Utilities implementation
Dear All,
We are implementing IS-Utilities for electricity billing. Currently there are device managment, billing Invoicing, finance contract accounts and CRM in scope.
We have landscape for builing seprate IS-Utilities and CRM server. Do we require servers like PI, SCM and BI as we could find them in master guide of SAP installation. Please advice
Best Regards,
Hi
Not mandatory. But if you send information via IDOC you must have PI.
// Luis Jesus
Similar Messages
-
TCRMBP_REFCUST --- Replication of BPs from CRM to ECC
Hi -
We have a CRM - ECC (SD / ISU) environment.
I have a question about TCRMBP_REFCUST table.
1. How exactly is this table used? Is this table used when replicating the CRM BP into ECC?
2. This table seems to give me a better control over the sales area I want for the replicated partner in SD? But, I am confused about using this table and using the PIDE table (CRM -> R3) as they both control the Account Group for the SD Customer.
3. So, can somebody please give more explanation on how the TCRMBP_REFCUST & the PIDE table (CRM -> R3) play together in this replication process?
Thanks in advance for your help.
Regards,
Pradhip.SHi Pradhip,
Perfect, lets visit SAP documentation again - [Business Partner Replication|http://help.sap.com/saphelp_crmscen70/helpdata/en/60/85b5d333f4174b8e982c1c15db35f3/frameset.htm].
In 1st few paragraphs, it describes about "concept of the business partner or SD customer in SAP ERP" - which is as follows:
When creating or changing a business partner with the role Sales Prospect or Contract Partner, you can specify a sample customer (SD customer) in SAP ERP. This creates an SD customer for the business partner with the same number as the business partner. Data is copied from the sample customer (tables KNA1, KNB1, KNVV, KNVP, KNVA, KNVI, KNVD, KNEX, KNVS and KNVL). Name and address data, as well as some additional fields, are transferred from the business partner. If the SD customer already exists, the system only transfers part of the data from the sample customer (only the sales and distribution areas that do not yet exist).
Above settings is maintained at SAP Utilities->Master Data->Business Partner->Settings for Creating Standard Customers->Maintain Parameter (Table - TEKND).
(*Back to SAP documentation*)
If you now connect a CRM system, the central data from the CRM business partner is exchanged with the business partner in SAP ERP, and the CRM-specific data is exchanged with the SD customer. The CRM business partner has the same number as the business partner in SAP ERP and the SD customer.
You work mainly with the BUPA_MAIN queue. You only work with the CUSTOMER_MAIN queue when you are changing SD customer data, such as sales area data.
To execute the business partner concept specific to the utilities industry, you must convert the following control tables....
So, since CRM is in place which will act as central data management, we need to maintain reference customer values in CRM specific tables in ECC.. where table TCRMBP_REFCUST will be useful. This table is accessed by function module - COM_BUPA_MWX_MAP_ISU (Mapping - Proxy-BAPI Business Partner Main-BDOC).
Now if we read following statments on table TCRMBP_REFCUST, it will make sense:
(*Back to SAP documentation*)
Sample Customers in the Delta Upload
You can store sample customers in the ERP table TCRMBP_REFCUST (transaction SE16). These sample customers are used when creating a business partner in SAP CRM. This means that less data is transferred than when creating an R/3 business partner (ERP tables KNVD, KNB1, KNEX, KNVS and KNVL; transaction SE16).
In table TCRMBP_REFCUST, the system searches generically for a sample customer:
First it searches by Category, Grouping, and Type, then by Category and Grouping (with Type = SPACE), then only by Category (with Grouping and Type = SPACE), and finally with all three key fields as SPACE.
Initial Download
Before performing the initial download, check whether an SD customer has been created for all business partners in SAP ERP, for which this is desired or necessary. (For example, to an SD customer is necessary to use the billing engine in SAP CRM).
You should also check whether business partners already exist for all SD customers. Business partner creation for SD customers is supported by tools (for example, during the SAP for Utilities implementation). In the scenario described, you must not directly create any SD customers (except sample customers), as you are not replicating anything in SAP CRM.
Please let me know if this was helpful.
Regards,
Avinash -
ISS Security Advisory
May 6, 1999
Multiple File System Vulnerabilities in Oracle 8
Synopsis:
Internet Security Systems (ISS) X-Force has discovered that
multiple vulnerabilities exist in Oracle 8 that may allow local
attackers to exploit weaknesses in Oracle administrative tools.
Oracle is the market leader in enterprise database solutions.
Attackers may use these vulnerabilities to amplify their
privilege to that of the foracleF user. By default, the oracle
user controls the entire Oracle database system. Attackers may
launch local denial of service attacks against the database as
well as alter or manipulate data.
Affected Versions:
ISS X-Force has determined that most current versions of Oracle
8 for Unix are vulnerable. These versions include 8.03, 8.04,
8.05, and 8.15. Oracle 8 for Windows NT is not affected by
these vulnerabilities.
Description:
The Oracle 8 distribution is shipped with many administrative
utilities that are owned by the oracle user with the setuid bit
enabled. Several of these utilities implement insecure file
creation and manipulation. These utilities also trust Oracle-
related environment variables. The combined effect of these
vulnerabilities may allow local attackers to create, append to,
or overwrite privileged oracle files. Certain vulnerabilities
exist that may allow local attackers to execute arbitrary
commands as the oracle user. Attackers may also be able to
permanently elevate their privilege to that of the oracle user.
Temporary files that follow symbolic links are a common source
of vulnerabilities in setuid executables. Administrators should
remove or restrict access to setuid executables if possible.
Developers of setuid programs need to take special precautions
to prevent
the introduction of vulnerabilities of this nature. ISS X-Force
recommends
that all Unix developers become familiar with Matt BishopFs
secure
programming guide, available at
http://olympus.cs.ucdavis.edu/~bishop/secprog.html
Fix Information:
ISS X-Force has worked with Oracle to provide a patch for the
vulnerabilities described in this advisory. Oracle has provided
the following FAQ to answer any questions concerning these
vulnerabilities.
Q: IFve heard about a setuid security issue with the Oracle
database? What is this all about?
A: On Unix platforms, some executable files have the setuid bit
on. It may be possible for a very knowledgeable user to use
these executables to bypass your system security by elevating
their operating system privileges to that of the Oracle user.
Q: Which releases are affected by this problem?
A: This problem affects Oracle data server releases 8.03, 8.0.4,
8.0.5, and 8.1.5 on Unix platforms only.
Q: Can I correct this problem or do I need a patch?
A: This problem can easily be corrected. The customer can
download the patch from the Oracle MetaLink webpages at
http://www.oracle.com/support/elec_sup. The patch is a Unix
shell script. This shell script should be run immediately, and
also run after each relink of Oracle.
Q: What is Oracle doing to fix this problem?
A: Effective immediately, Oracle will provide the patch on
OracleFs Worldwide Support Web pages. Oracle will ensure the
patches are incorporated into future releases of Oracle8i
(8.1.6) and Oracle8.0 (8.0.6)
Q: What is Oracle doing to notify users about this problem now?
A: Oracle is notifying all supported customers, via the Oracle
Worldwide Support Web pages, of this issue so they can address
it as required.
ISS X-Force also recommends that all administrators complete a
proactive survey on the use or potential misuse of setuid bits
on privileged executables on their systems.
Credits:
These vulnerabilities were primarily researched by Dan
Ingevaldson of the ISS X-Force.
Copyright ( 1999 by Internet Security Systems, Inc. Permission
is hereby granted for the electronic redistribution of this
Security Alert. It is not to be edited in any way without
express consent of the X-Force. If you wish to reprint the
whole or any part of this Alert Summary in any other medium
excluding electronic medium, please e-mail [email protected] for
permission.
About ISS
ISS is the pioneer and leading provider of adaptive network
security software delivering enterprise-wide information
protection solutions. ISSF award-winning SAFEsuite family of
products enables information risk management within intranet,
extranet and electronic commerce environments. By combining
proactive vulnerability detection with real-time intrusion
detection and response, ISSF adaptive security approach creates
a flexible cycle of continuous security improvement, including
security policy implementation and enforcement. ISS SAFEsuite
solutions strengthen the security of existing systems and have
dramatically improved the security posture for organizations
worldwide, making ISS a trusted security advisor for firms in
the Global 2000, 21 of the 25 largest U.S. commercial banks and
over 35 governmental agencies. For more information, call ISS at
678-443-6000 or 800-776-2362 or visit the ISS Web site at
www.iss.net.
Disclaimer
The information within this paper may change without notice. Use
of this information constitutes acceptance for use in an AS IS
condition. There are NO warranties with regard to this
information. In no event shall the author be liable for any
damages whatsoever arising out of or in connection with the use
or spread of this information. Any use of this information is at
the userFs own risk.
X-Force PGP Key available at:
http://www.iss.net/xforce/sensitive.html as well as on MITFs PGP
key server and PGP.comFs key server.
Please send suggestions, updates, and comments to:
X-Force <[email protected] <mailto:[email protected]>> of Internet
Security Systems, Inc.
nullhttp://metalink.oracle.com has all the Oracle documentation online. If you search for Security, you'll get plenty of documents. The Oracle Administrator's Guide has a Security Checklist that it probably a good starting point.
This is a huge topic, though.
Justin -
Hi all,
I'm currently analysing the implications of IS-U BILLDOC historical data conversion for a Utilities implementation project. Has anyone had any experience on it or have any documentation to share on the topic? Appreciate your help and advice. Thank you.
If you have any presentation slides or documentation to share, please send them to my email at [email protected]
regards,
JoQuentin,
The FM NO_DATA_INITIALIZE is applicable for all migration objects that change a business object where the implementation is BDT (Business data Toolset) based. SAP delivers two such migration objects: PARTNERCHA and ACCOUNTCHA. The FM NO_DATA_INITIALIZE should be implemented as a structure preprocessing code with the parameter E_DATA = $S$, I_NODATA = '?' whereas '?' must correspond to the X_NODATA parameter as set on the PARAMETER screen of the related service function module. The FM NO_DATA_INITIALIZE populates character fields of the target structure with the NODATA character. The NODATA character is meant as a signal to the BDT application not to change the content of that field but to keep going with the value as saved on the database. Mind that a SPACE may be a valid character hence will be clearing the field on the database.
The FM NO_DATA_INITIALIZE does not work for structure INIT due to the fact that some of the fields of that structure are setup with an ABAP field rule whose implementation ignores the NODATA sign. In addition, some of the fields must be populated with the correct value (even it remains unchanged compared to the saved value) because the application has been developed that way. In case the NODATA sign does not work you may want to implement a select to that relatewd database table to fill the required fields.
Cheers,
Fritz -
CRM 5.0 Interaction Center Error "More Complex Error Msg"
Hi All,
We have CRM 5.0 and IS Utilities implemented for a huge customer.
We are facing a typical problem "More complex error messages determined for this document".
This error though has a very simple solution but owing to huge number of transactions that are carried out daily, it turns out to be a very big problem.
For a particular ID in CIC0 there are several contracts each belonging to different consumers.
The error is created in CIC0 whenever the agent confirms a BP from a contract against another contract and save it. This activity actually attaches a new SP in another contract to the already existing one.
The solution however is to just open the contract in which the error is displayed and delete the duplicate SP from it and save it.
My issue is how to prevent this error from being generated?
Is it something related to configuration.
Regards,
KansalLook at this OSS note:
Note 928649 - Need to press End button twice to clear the contact
Note 1028561 - Error "Severe error occurred..." when ending contact
Thirumal. -
U201CEnergy Theft Controlu201D, monitoring and posting?
Hi Fellow SAPpers
I am due to work on a large Utilities implementation in the East. There they have a very high focus on energy theft as an issue, and I know of the entire general consumption validations. Are you aware of known procedures in Device management or Energy data management, which can improve u201CEnergy Theft Controlu201D, monitoring and posting?
Hope you are able to assist me, any help would be greatly appreciated.
Regards
Per Engholtwell ... a chronic problem in such countries is theft ... one of the projects i am working on ... same issues ... and on top of it ... accountability and control ...
for monitoring ... we have control meters in the field (on transformers) and mapped in the system. We map the consumer meters (billable meters) to those control meters.
This way ... we reconcile the lost units on each transformer and identify the areas of potential theft.
You could use EDM if those meters are interval meters or develop a custom report if those are non-interval meters ...
for theft units, if the customer is identified, we use "Manual Bill" with some level of control ...
I hope this helps -
SAP implementation in Utilities Industry
Hi,
What is the major difference while implementing SAP CO for a utilities industry? How does it differ with other industries?
Any help is appreciated.
ThanksHi,
What is the major difference while implementing SAP CO for a utilities industry? How does it differ with other industries?
Any help is appreciated.
Thanks -
Implementation of .TIFF format to SAP IS-Utilities
Hi All,
We are in Power Distribution. We have implemented SAP IS-Utility in 2005 and we would like to implement the physical document to .TIFF file format and would like to have the screen through SAP IS-Utility TCode is CIC0.
Thanks
Kuntal Guha RoyHi,
Just to give you some idea:
various SAP ECC system application used in ISU are:
>Plant Maintenance (PM)
>Customer Service (CS)
>Sales and Distribution (SD)
>Contract Accounts Receivable and Payable (FI-CA)
>SAP Business Workflow
You can use the Plant Maintenance (PM), Customer Service (CS) and Sales and Distribution (SD) SAP ECC application components to bill service orders, service contracts, services, and the sale of goods. Due to the large number of postings from billing and budget billing requests, these are posted in a subledger in Contract Accounts Receivable and Payable (FI-CA).
SAP Utilities uses SAP Business Workflow to automate the processing of its many business processes. Common workflows include initial creation of a service connection and the disconnection of devices.
For any details about ISU go to this link:
http://help.sap.com/saphelp_erp60/helpdata/en/c6/4dce68eafc11d18a030000e829fbbd/frameset.htm
It will be very helpful for you.
Mark thread as answered if you get satisfactory reply.
Thanks,
Abhishek -
Implemented CO-PA for IS-Utilities
I would like to know if anyone has implemented Controlling - Profitability Analysis for a IS-Uitilities customer? I have some specific questions on this topic and would appreciate if someone could answer them.
RajHi,
what "partner" are you talking about exactly? In our SAP R/3 COPA table I can see a "trading partner" but not "partner"
perhaps it is the business partner; in this case use 0BPARTNER but I am not quite sure...
Can you tell me the exact field name and type of this partner in your COPA table?
Your COPA table in R/3 should be name CE1<operating concern/controllong area>
(SE11, CE1* and press F4)
hope this helps,
Olivier. -
Error in Import phase DISASSEMBLE when implementing KB70022
I'm trying to implement XI/PI netweaver 7.00 SAPKB70022 patch:
Always stays in the 'DISASSEMBLE' phase, the following log shows:
Saving the current Queue OCS (17.09.2010, 13: 34: 16)
001: SAPKB70022 - Support Package for SAP_BASIS Release 700
Import of the current Queue OCS (17.09.2010, 13: 34: 24)
The import is done with the standard scenario
The current OCS Queue consists of:
001: SAPKB70022
Import phase 'PROLOGUE' (17.09.2010, 13: 34: 26)
Import phase 'PROLOGUE' was successfully finished (17.09.2010, 13: 34: 26)
Import phase 'CHECK_REQUIREMENTS' (17.09.2010, 13: 34: 26)
Import phase 'CHECK_REQUIREMENTS' was successfully finished (17.09.2010, 13: 34: 28)
Import phase 'DISASSEMBLE' (17.09.2010, 13: 34: 28)
Ever happens here so if done in dialogue in bakcground.
In dialogue always appears in message bar 'tp user check1 and so remains indefinitely until I have to kill the process.
As background, BGD process runs on hold indefinitely...
I also tried to make 'Disassemble support Package' from the menu the SPAM Utilities also runs in the same State and must kill the process.
Decompressing support Package with single sapcar you extract the file:
CSR0120031469_0044188.PAT and never extracts the file .ATT
I several times what I downloaded SAP downloads site and never brings me the file. ATT.
I can not continue with the deployment of patches.
Thank you in advanced for your help.Hi Fernando,
What SPAM/SAINT version do you have installed ?
Ensure it is the latest one.
If you are moving the files, check which method you are using.
Usually the transfer of files should be done with binary mode.
If you do get the data file and then get errors:
Please run the following command to check the datafiles consistency:
R3trans -l <datafile>
If you receive any return code different than 0, the datafile is indeed
corrupted, as the error message suggests (check-sum error in datafile).
Regards,
Paul -
Implementing SQL Server Reporting Services with a Java EE Application
Hi All,
I need to find some tutorial on
"Implementing SQL Server Reporting Services with a Java EE Application"
for my j2EE application.
Until now i have searched a lot of sites but have not any thing related to this topic.
I am using apache axis along with SQL Server Report Manager for creating the sql server reports.
I have done upto :
Creating the webservice with the help of report manager.
Now i want to connect it through my j2EE application and want to retrieve some data from that web service.
I have got stuck on the following BOLD lines in my code .
code:
public CatalogItem[] getData(String res, String searchStr) throws RemoteException {
ReportingService2005Soap port = null;
ReportingService2005Locator loc = new ReportingService2005Locator();
// Retrieve a port from the service locator
try {
port = loc.getReportingService2005Soap(new java.net.URL(res));
} catch (MalformedURLException e) {
// TODO Auto-generated catch block
e.printStackTrace();
} catch (ServiceException e) {
// TODO Auto-generated catch block
e.printStackTrace();
org.apache.axis.client.Stub stub = (org.apache.axis.client.Stub) port;
stub.setUsername("localhost\\Administrator");
stub.setPassword("servWIN@2007");
// Retrieve a port from the service locator
SearchCondition condition = new SearchCondition();
condition.setCondition(ConditionEnum.Contains);
condition.setName("Name");
if (searchStr != null)
condition.setValue(searchStr);
else
condition.setValue("");
// Create an array of SearchConditions which will contain our single search condition
SearchCondition[] conditions;
conditions = new SearchCondition[1];
conditions[0] = condition;
// Call the Web service with the appropriate CatalogItem[] returnedItems;
CatalogItem[] returnedItems = null;
port.findItems("foldername",BooleanOperatorEnum.Or, conditions);
return returnedItems;
}i.e. while executing the findItems() method i got the following exception :
System.Web.Services.Protocols.SoapException: The item '/reportingservices' cannot be found. ---> Microsoft.ReportingServices.Diagnostics.Utilities.ItemNotFoundException: The item '/reportingservices' cannot be found.
at Microsoft.ReportingServices.Library.RSService.FindItems(String folder, String operation, SearchCondition[] properties)
at Microsoft.ReportingServices.WebServer.ReportingService2005Impl.FindItems(String Folder, BooleanOperatorEnum BooleanOperator, SearchCondition[] Conditions, CatalogItem[]& Items)
Any any body has any idea please help me.
I need it urgently.
Regards.The above example is mentioned in msdn virtual lab that teaches how to connect to reporting services from a j2ee application.
I have done the same thing .. but i am not able to render the report programmatically .. if anybody knows pls let me know the solution. -
Dear All
I am getting the below error while activating the sap Fiori applications
Task Facade not implemented for provider. [/IWBEP/CX_MGW_TECH_EXCEPTION] (error).
I have applied all suggestions in my new fiori system from Masayuki Sekihara posted on his post.
but still I am getting same error message.
I got below error message.
1) If I selected a EC6FIORI system alias to ZTASKPROCESSING services then i got below error message.
Task Facade not implemented for provider.
Task Facade not implemented for provider. [/IWBEP/CX_MGW_TECH_EXCEPTION] (error).
2) some time I got different error message if I selected FIORI system alias to ZTASKPROCESSING.
I have shared below my system Support Package level and all configurations.
Component
Release
SP-Level
Support Package
Short description of comment
SAP_BASIS
740
4
SAPKB74004
SAP Basis Component
SAP_ABA
740
4
SAPKA74004
Cross-Application Component
SAP_GWFND
740
6
SAPK-74006INSAPGWFND
SAP Gateway Foundation
SAP_UI
740
7
SAPK-74007INSAPUI
User Interface Technology
PI_BASIS
740
4
SAPK-74004INPIBASIS
Basis Plug-In
ST-PI
2008_1_700
8
SAPKITLRD8
SAP Solution Tools Plug-In
SAP_BW
740
4
SAPKW74004
SAP Business Warehouse
IW_PGW
100
5
SAPK-10005INIWPGW
Process Gateway
MDG_FND
747
2
SAPK-74702INMDGFND
MDG Foundation
SAP_AP
700
30
SAPKNA7030
SAP Application Platform
SAP_BS_FND
747
2
SAPK-74702INSAPBSFND
SAP Business Suite Foundation
WEBCUIF
747
2
SAPK-74702INWEBCUIF
SAP Web UI Framework
MDG_APPL
617
2
SAPK-61702INMDGAPPL
MDG Applications
SAP_APPL
617
2
SAPKH61702
Logistics and Accounting
SAP_FIN
617
2
SAPK-61702INSAPFIN
SAP_FIN
SAP_HR
604
66
SAPKE60466
Human Resources
SAP_HRCAR
604
66
SAPK-60466INSAPHRCAR
Sub component SAP_HRCAR of SAP_HR
SAP_HRCAT
604
66
SAPK-60466INSAPHRCAT
Sub component SAP_HRCAT of SAP_HR
SAP_HRCAU
604
66
SAPK-60466INSAPHRCAU
Sub component SAP_HRCAU of SAP_HR
SAP_HRCBE
604
66
SAPK-60466INSAPHRCBE
Sub component SAP_HRCBE of SAP_HR
SAP_HRCBR
604
66
SAPK-60466INSAPHRCBR
Sub component SAP_HRCBR of SAP_HR
SAP_HRCCA
604
66
SAPK-60466INSAPHRCCA
Sub component SAP_HRCCA of SAP_HR
SAP_HRCCH
604
66
SAPK-60466INSAPHRCCH
Sub component SAP_HRCCH of SAP_HR
SAP_HRCCL
604
66
SAPK-60466INSAPHRCCL
Sub component SAP_HRCCL of SAP_HR
SAP_HRCCN
604
66
SAPK-60466INSAPHRCCN
Sub component SAP_HRCCN of SAP_HR
SAP_HRCDE
604
66
SAPK-60466INSAPHRCDE
Sub component SAP_HRCDE of SAP_HR
SAP_HRCDK
604
66
SAPK-60466INSAPHRCDK
Sub component SAP_HRCDK of SAP_HR
SAP_HRCES
604
66
SAPK-60466INSAPHRCES
Sub component SAP_HRCES of SAP_HR
SAP_HRCFI
604
66
SAPK-60466INSAPHRCFI
Sub component SAP_HRCFI of SAP_HR
SAP_HRCFR
604
66
SAPK-60466INSAPHRCFR
Sub component SAP_HRCFR of SAP_HR
SAP_HRCGB
604
66
SAPK-60466INSAPHRCGB
Sub component SAP_HRCGB of SAP_HR
SAP_HRCHK
604
66
SAPK-60466INSAPHRCHK
Sub component SAP_HRCHK of SAP_HR
SAP_HRCID
604
66
SAPK-60466INSAPHRCID
Sub component SAP_HRCID of SAP_HR
SAP_HRCIE
604
66
SAPK-60466INSAPHRCIE
Sub component SAP_HRCIE of SAP_HR
SAP_HRCIN
604
66
SAPK-60466INSAPHRCIN
Sub component SAP_HRCIN of SAP_HR
SAP_HRCIT
604
66
SAPK-60466INSAPHRCIT
Sub component SAP_HRCIT of SAP_HR
SAP_HRCJP
604
66
SAPK-60466INSAPHRCJP
Sub component SAP_HRCJP of SAP_HR
SAP_HRCKR
604
66
SAPK-60466INSAPHRCKR
Sub component SAP_HRCKR of SAP_HR
SAP_HRCKW
604
66
SAPK-60466INSAPHRCKW
Sub component SAP_HRCKW of SAP_HR
SAP_HRCMX
604
66
SAPK-60466INSAPHRCMX
Sub component SAP_HRCMX of SAP_HR
SAP_HRCMY
604
66
SAPK-60466INSAPHRCMY
Sub component SAP_HRCMY of SAP_HR
SAP_HRCNL
604
66
SAPK-60466INSAPHRCNL
Sub component SAP_HRCNL of SAP_HR
SAP_HRCNO
604
66
SAPK-60466INSAPHRCNO
Sub component SAP_HRCNO of SAP_HR
SAP_HRCNZ
604
66
SAPK-60466INSAPHRCNZ
Sub component SAP_HRCNZ of SAP_HR
SAP_HRCPH
604
66
SAPK-60466INSAPHRCPH
Sub component SAP_HRCPH of SAP_HR
SAP_HRCPT
604
66
SAPK-60466INSAPHRCPT
Sub component SAP_HRCPT of SAP_HR
SAP_HRCQA
604
66
SAPK-60466INSAPHRCQA
Sub component SAP_HRCQA of SAP_HR
SAP_HRCRU
604
66
SAPK-60466INSAPHRCRU
Sub component SAP_HRCRU of SAP_HR
SAP_HRCSE
604
66
SAPK-60466INSAPHRCSE
Sub component SAP_HRCSE of SAP_HR
SAP_HRCSG
604
66
SAPK-60466INSAPHRCSG
Sub component SAP_HRCSG of SAP_HR
SAP_HRCTH
604
66
SAPK-60466INSAPHRCTH
Sub component SAP_HRCTH of SAP_HR
SAP_HRCTW
604
66
SAPK-60466INSAPHRCTW
Sub component SAP_HRCTW of SAP_HR
SAP_HRCUN
604
66
SAPK-60466INSAPHRCUN
Sub component SAP_HRCUN of SAP_HR
SAP_HRCUS
604
66
SAPK-60466INSAPHRCUS
Sub component SAP_HRCUS of SAP_HR
SAP_HRCVE
604
66
SAPK-60466INSAPHRCVE
Sub component SAP_HRCVE of SAP_HR
SAP_HRCZA
604
66
SAPK-60466INSAPHRCZA
Sub component SAP_HRCZA of SAP_HR
SAP_HRGXX
604
66
SAPK-60466INSAPHRGXX
Sub component SAP_HRGXX of SAP_HR
SAP_HRRXX
604
66
SAPK-60466INSAPHRRXX
Sub component SAP_HRRXX of SAP_HR
EA-IPPE
400
24
SAPKGPID24
SAP iPPE
EA-APPL
617
2
SAPK-61702INEAAPPL
SAP Enterprise Extension PLM, SCM, Financials
EA-DFPS
600
24
SAPKGPDD24
SAP Enterprise Extension Defense Forces & Public Security
EA-FIN
617
2
SAPK-61702INEAFIN
EA-FIN
EA-FINSERV
600
25
SAPKGPFD25
SAP Enterprise Extension Financial Services
EA-GLTRADE
600
24
SAPKGPGD24
SAP Enterprise Extension Global Trade
EA-HR
607
17
SAPK-60717INEAHR
SAP Enterprise Extension HR
EA-HRCAR
607
17
SAPK-60717INEAHRCAR
Sub component EA-HRCAR of EA-HR
EA-HRCAT
607
17
SAPK-60717INEAHRCAT
Sub component EA-HRCAT of EA-HR
EA-HRCAU
607
17
SAPK-60717INEAHRCAU
Sub component EA-HRCAU of EA-HR
EA-HRCBE
607
17
SAPK-60717INEAHRCBE
Sub component EA-HRCBE of EA-HR
EA-HRCBR
607
17
SAPK-60717INEAHRCBR
Sub component EA-HRCBR of EA-HR
EA-HRCCA
607
17
SAPK-60717INEAHRCCA
Sub component EA-HRCCA of EA-HR
EA-HRCCH
607
17
SAPK-60717INEAHRCCH
Sub component EA-HRCCH of EA-HR
EA-HRCCL
607
17
SAPK-60717INEAHRCCL
Sub component EA-HRCCL of EA-HR
EA-HRCCN
607
17
SAPK-60717INEAHRCCN
Sub component EA-HRCCN of EA-HR
EA-HRCDE
607
17
SAPK-60717INEAHRCDE
Sub component EA-HRCDE of EA-HR
EA-HRCDK
607
17
SAPK-60717INEAHRCDK
Sub component EA-HRCDK of EA-HR
EA-HRCES
607
17
SAPK-60717INEAHRCES
Sub component EA-HRCES of EA-HR
EA-HRCFI
607
17
SAPK-60717INEAHRCFI
Sub component EA-HRCFI of EA-HR
EA-HRCFR
607
17
SAPK-60717INEAHRCFR
Sub component EA-HRCFR of EA-HR
EA-HRCGB
607
17
SAPK-60717INEAHRCGB
Sub component EA-HRCGB of EA-HR
EA-HRCHK
607
17
SAPK-60717INEAHRCHK
Sub component EA-HRCHK of EA-HR
EA-HRCID
607
17
SAPK-60717INEAHRCID
Sub component EA-HRCID of EA-HR
EA-HRCIE
607
17
SAPK-60717INEAHRCIE
Sub component EA-HRCIE of EA-HR
EA-HRCIN
607
17
SAPK-60717INEAHRCIN
Sub component EA-HRCIN of EA-HR
EA-HRCIT
607
17
SAPK-60717INEAHRCIT
Sub component EA-HRCIT of EA-HR
EA-HRCJP
607
17
SAPK-60717INEAHRCJP
Sub component EA-HRCJP of EA-HR
EA-HRCKR
607
17
SAPK-60717INEAHRCKR
Sub component EA-HRCKR of EA-HR
EA-HRCKW
607
17
SAPK-60717INEAHRCKW
Sub component EA-HRCKW of EA-HR
EA-HRCMX
607
17
SAPK-60717INEAHRCMX
Sub component EA-HRCMX of EA-HR
EA-HRCMY
607
17
SAPK-60717INEAHRCMY
Sub component EA-HRCMY of EA-HR
EA-HRCNL
607
17
SAPK-60717INEAHRCNL
Sub component EA-HRCNL of EA-HR
EA-HRCNO
607
17
SAPK-60717INEAHRCNO
Sub component EA-HRCNO of EA-HR
EA-HRCNZ
607
17
SAPK-60717INEAHRCNZ
Sub component EA-HRCNZ of EA-HR
EA-HRCPH
607
17
SAPK-60717INEAHRCPH
Sub component EA-HRCPH of EA-HR
EA-HRCPT
607
17
SAPK-60717INEAHRCPT
Sub component EA-HRCPT of EA-HR
EA-HRCQA
607
17
SAPK-60717INEAHRCQA
Sub component EA-HRCQA of EA-HR
EA-HRCRU
607
17
SAPK-60717INEAHRCRU
Sub component EA-HRCRU of EA-HR
EA-HRCSE
607
17
SAPK-60717INEAHRCSE
Sub component EA-HRCSE of EA-HR
EA-HRCSG
607
17
SAPK-60717INEAHRCSG
Sub component EA-HRCSG of EA-HR
EA-HRCTH
607
17
SAPK-60717INEAHRCTH
Sub component EA-HRCTH of EA-HR
EA-HRCTW
607
17
SAPK-60717INEAHRCTW
Sub component EA-HRCTW of EA-HR
EA-HRCUN
607
17
SAPK-60717INEAHRCUN
Sub component EA-HRCUN of EA-HR
EA-HRCUS
607
17
SAPK-60717INEAHRCUS
Sub component EA-HRCUS of EA-HR
EA-HRCVE
607
17
SAPK-60717INEAHRCVE
Sub component EA-HRCVE of EA-HR
EA-HRCZA
607
17
SAPK-60717INEAHRCZA
Sub component EA-HRCZA of EA-HR
EA-HRGXX
607
17
SAPK-60717INEAHRGXX
Sub component EA-HRGXX of EA-HR
EA-HRRXX
607
17
SAPK-60717INEAHRRXX
Sub component EA-HRRXX of EA-HR
EA-PS
600
24
SAPKGPPD24
SAP Enterprise Extension Public Services
EA-RETAIL
600
24
SAPKGPRD24
SAP Enterprise Extension Retail
FINBASIS
600
24
SAPK-60024INFINBASIS
Fin. Basis
ECC-DIMP
600
23
SAPK-60023INECCDIMP
DIMP
ERECRUIT
600
24
SAPK-60024INERECRUIT
E-Recruiting
FI-CA
600
23
SAPK-60023INFICA
FI-CA
FI-CAX
600
23
SAPK-60023INFICAX
FI-CA Extended
HR-CEE
110_604
52
SAPK-60452INHRCEE
HR country version for CEE countries
HR-CEECBG
110_604
52
SAPK-60452INHRCEECBG
Sub component HR-CEECBG of HR-CEE
HR-CEECCO
110_604
52
SAPK-60452INHRCEECCO
Sub component HR-CEECCO of HR-CEE
HR-CEECCZ
110_604
52
SAPK-60452INHRCEECCZ
Sub component HR-CEECCZ of HR-CEE
HR-CEECGR
110_604
52
SAPK-60452INHRCEECGR
Sub component HR-CEECGR of HR-CEE
HR-CEECHR
110_604
52
SAPK-60452INHRCEECHR
Sub component HR-CEECHR of HR-CEE
HR-CEECHU
110_604
52
SAPK-60452INHRCEECHU
Sub component HR-CEECHU of HR-CEE
HR-CEECPL
110_604
52
SAPK-60452INHRCEECPL
Sub component HR-CEECPL of HR-CEE
HR-CEECRO
110_604
52
SAPK-60452INHRCEECRO
Sub component HR-CEECRO of HR-CEE
HR-CEECSI
110_604
52
SAPK-60452INHRCEECSI
Sub component HR-CEECSI of HR-CEE
HR-CEECSK
110_604
52
SAPK-60452INHRCEECSK
Sub component HR-CEECSK of HR-CEE
HR-CEECTR
110_604
52
SAPK-60452INHRCEECTR
Sub component HR-CEECTR of HR-CEE
HR-CEECUA
110_604
52
SAPK-60452INHRCEECUA
Sub component HR-CEECUA of HR-CEE
HR-CEEGXX
110_604
0
Sub component HR-CEEGXX of HR-CEE
HR-CEERXX
110_604
0
Sub component HR-CEERXX of HR-CEE
INSURANCE
600
23
SAPK-60023ININSURANC
SAP Insurance
IS-CWM
600
23
SAPK-60023INISCWM
Industry Solution Catch Weight Management
IS-H
600
34
SAPK-60034INISH
SAP Healthcare
IS-M
600
23
SAPK-60023INISM
SAP MEDIA
IS-OIL
600
23
SAPK-60023INISOIL
IS-OIL
IS-PS-CA
600
23
SAPK-60023INISPSCA
IS-PUBLIC SECTOR CONTRACT ACCOUNTING
IS-UT
600
23
SAPK-60023INISUT
SAP Utilities/Telecommunication
LSOFE
600
24
SAPK-60024INLSOFE
SAP Learning Solution Front-End
SEM-BW
600
24
SAPKGS6024
SEM-BW: Strategic Enterprise Management
GBAPP002
600
4
SAPK-60004INGBAPP002
GBAPP002
GBHCM002
600
11
SAPK-60011INGBHCM002
HCM Employee Requests (Leave)
GBHCM003
600
9
SAPK-60009INGBHCM003
HCM Manager Approvals (Time, Training, L
SRA002
600
3
SAPK-60003INSRA002
Time Recording OData Integration Compone
SRA010
600
3
SAPK-60003INSRA010
Staffing List OData Integration Componen
SRA017
600
3
SAPK-60003INSRA017
Create Purchase Order OData Integration
SRA018
600
3
SAPK-60003INSRA018
Purchase Order Status Tracking OData Int
UIAPP001
100
4
SAPK-10004INUIAPP001
UIAPP001 100: Add-On Installation
UIAPP002
100
3
SAPK-10003INUIAPP002
UIAPP002 100: Add-On Installation
UIGIB001
100
4
SAPK-10004INUIGIB001
UIGIB001 100: Add-On Installation
UIHCM002
100
4
SAPK-10004INUIHCM002
UIHCM002 100: Add-On Installation
UIHCM003
100
4
SAPK-10004INUIHCM003
UIHCM003 100: Add-On Installation
UISRA002
100
3
SAPK-10003INUISRA002
HTML5 Time Recording
UISRA010
100
3
SAPK-10003INUISRA010
HTML5 Staffing List
UISRA017
100
3
SAPK-10003INUISRA017
HTML5 Create Order
UISRA018
100
3
SAPK-10003INUISRA018
HTML5 Order Status Tracking
please help me to resolve that issue
Regards
Pankaj KambleHi Team,
i have created new post.
SAP Fiori getting error message Check the URL parameters and the scenario definition. To check the scenario definition.
Scenario definition configuration screen short.
2) Also getting bellow error message
Property TaskDefinitionID not found in type WorkflowTask
Did not find error details
{"error":{"code":"005056A509B11EE1B9A8FEA8DE87F78E","message":{"lang":"en","value":"Property TaskDefinitionID not found in type WorkflowTask"},"innererror":{"transactionid":"E6A9CEE388D3F1EC940400155DC8D41B","timestamp":"20140428075136.7780000","Error_Resolution":{"SAP_Transaction":"Run transaction /IWFND/ERROR_LOG on SAP NW Gateway hub system and search for entries with the timestamp above for more details","SAP_Note":"See SAP Note 1797736 for error analysis (https://service.sap.com/sap/support/notes/1797736)"}}}}
Regards
Pankaj Kamble -
A java List that implements the Stream interface?
Hello,
I just took some time to start looking into the java-8 buzz about streams and lambdas.
And have a couple of questions...
The first thing that surprised me is that you cannot apply the streams operations,
like .map(), .filter() directly on a java.util.List.
First question:
Is there a technical reason why the java.util.List interface was not extended with
default-implementations of these streams operations? (I guess there is...?)
Googling a bit, I see lots of examples of people coding along the pattern of:
List<String> list = someExpression;
List<String> anotherList = list.stream().map(x -> f(x)).collect(Collectors.toList());
which becomes very clumsy, if you have a lot of these stream-operations in your code.
Since .stream() and .collect() are completely irrelevant to what you want to express,
you would rather like to say:
List<String> list = someExpression;
List<String> anotherList = list.map(x -> f(x));
What I first did as a workaround, was to implement (see code below)
a utility interface FList, and a utility class FArrayList (extending ArrayList with .map() and .filter()).
(The "F" prefixes stand for "functional")
Using these utilities, you now have two options to create less clumsy code:
List<String> list = someExpression;
List<String> anotherList = FList.map(list, x -> f(x));
List<String> thirdList = FList.filter(list, somePredicate);
or better:
FList<String> list = new FArrayList<String>(someExpression);
FList<String> anotherList = list.map(x -> someFunction(x));
FList<String> thirdList = list.filter(somePredicate);
My second question:
What I would really like to do is to have FArrayList implement the
java.util.stream.Stream interface, to fully support the java-8 functional model.
Since that involves implementing some 40 different methods, I would just like to know,
if you know somebody has already done this kind of work, and the code is
available somewhere as a public jar-file or open-source?
public interface FList<T> extends List<T> {
public static <A, B> List<B> map(List<A> list, Function<A, B> f) {
return list.stream().map(f).collect(Collectors.toList());
public static <A> List<A> filter(List<A> list, Predicate<A> f) {
return list.stream().filter(f).collect(Collectors.toList());
default <R> FList<R> map(Function<T, R> f) {
FList<R> result = new FArrayList<R>();
for (T item : this) {
result.add(f.apply(item));
return result;
default FList<T> filter(Predicate<T> p) {
FList<T> result = new FArrayList<T>();
for (T item : this) {
if (p.test(item)) {
result.add(item);
return result;
public class FArrayList<T> extends ArrayList<T> implements List<T>, FList<T> {
private static final long serialVersionUID = 1L;
public FArrayList() {
super();
public FArrayList(List<T> list) {
super();
this.addAll(list);I believe SSH and telnet are used for interactive command line sessions, don't know how you want to use them in a program.
-
CRM 4; Utilities Add On; Service Ticket; SLA
Hello Experts,
We are implementing CRM4, service industry with utilities add-on.
We are using the service ticket for service request creation, applying the four tier classification of call types.
Each call type has an SLA timeframe for completion.
The SLAs are not product nor contract dependant - and only relate the the type of service stipulated in the service ticket.
I have set up the date profile etc.
I would assume that a dummy product and dummy contract will have to be created to invoke the SLAs but I am not managing to get the Service Ticket to see the response times.
Please could you point me in the right direction? i.e. How can I create an SLA against each code (category; code group; subject profile)? (without using service contracts?)
Much appreciated!Hi Tanya,
We have got the escaltion time picking in the ticket via BADI.
This BADI is called on Saving the ticket, which checks the code and then brings the code related SLa time form the response profile (which is also assigned to the product -Dummy one) and then checks for the Date profile date type date rule if any calculation is to be done it does that and then populates the times.
I think the need for contract is arising only because in the dummy product master of contract type only we can attach the reponse profiles ...you can actually add the set type to your service product(Dummy) and then try this .I'm sure it will work .
Works for us.
Regards
Raj -
From-scratch minimalist backup implementation?
I have done backups since I first used a linux distro, and I've been using a self-designed python script that leverages rsync and LUKS to perform serial encrypted backups to several external drives. I derived the python code from a BASH script I wrote several years previous, and it seemed to work pretty well after initial testing. However, upon recent inspection, it appears it isn't doing its job properly; also, looking back at the code I've realized that it's sloppy, inefficient, and fails to meet my standards of minimalism.
That said, my problem is this: I need to design an effective backup solution within the following parameters:
- it must be encrypted
- it must support multiple disks
- it must be rsync-based
- it should preferably use file compression, both for transfer (which I already do using the --compress option for rsync), and on the actual storage medium, and that if so:
- the compression algorithm should preferably be space efficient over CPU-efficient
- it must be minimalist, ideally using separate, simple, standard-issue and widely available Linux utilities united by a simple script (ideally BASH)
I have some idea as to where to begin, but I'd like the input of the smart masses on this. I'm by no means a newbie to arch linux or linux in general, but I'd rather not overlook and/or bungle anything.
Also, if this is the wrong category for this thread, I apologize and request that someone more educated in forum topography move it to a more appropriate location. It seemed a good fit, but the various fine distinctions between some forum categories continue to elude me.
UPDATE:
This is what I have so far, though it does seem inefficient:
compression algorithm:
- tar.xz (are there any methods of compressing a tar archive with better compression rate? this was the best my research gave me.)
rsync to transfer files
GPG to encrypt compressed archives
my question now is how to make these work together. I thought of compressing the folders to be backed up using tar + xz, then rsyncing them to a backup drive connected over USB.
I have 3 external drives I plan to use: one 1TB (to host full system mirror), one 500GB (also for full system mirror), one 64GB (home folder mirror), and one 2GB (documents mirror). This is the general disk scheme my old setup used.
the main problem I forsee is that my complete system mirror and my home folder mirror would both be very, very large (~13GB and ~10GB, respectively), and I don't see how rsync would be a practical solution to copying such large archives to an external disks. Correct me if I'm wrong, but doesn't rsync copy files that have changed, instead of the delta of that file? Wouldn't that mean that rsync would just copy the whole archive over again if it changed even in the slightest? Even if that wasn't the case, where would I fit the archived files before they are transferred? I have an SSD as my main drive, so space is limited and so are R/W-cycles, so holding the archives temporarily on disk before they are copied makes no sense.
If my interpretation of rsync's functioning is correct, is there any way to make the archive once, transfer it to the external disk, and then simply sync the changes to the files on my main drive to the archive on the external ones? Or is there a way to tar-xz-encrypt the folders being copied (/, /home, and /home/me/docs) during the transfer without storing the archives on disk, and while maintaining rsync's ability to copy only altered files?
if that scheme seems inefficient (as it does to me), does anyone have a better idea? My old system rsync'd the files on my main drive to encrypted partitions on my external drives, and while this solved the problem I mention above it also forwent the portability and space-saving nature of compressed tar archives.
Last edited by ParanoidAndroid (2014-01-23 01:58:55)@firecat53:
Woah! I didn't see that post for some reason. I haven't checked out the script yet, but I've heard of duplicity and even used it previously (in the form of deja-dup). However, I remember having issues with it and it never worked quite the way I wanted.
I've been thinking about this, and as you all have suggested I have concluded that with the paradigm I proposed rsync-style snapshots aren't a good fit. So, here is my modified proposal:
and rdiff-type backup to a compressed tar archive. for a whole system backup, for example:
= initial backup =
/ is tarred, encrypted, compressed, then transferred to the backup disk all in one piece with something like
tar - / | <GPG> | lrzip -b > /mnt/my_disk/orig.bak
= future backups =
a diff file is generated against /, which is then appended to the original tar archive. To restore a point in time, one would simply reverse the first step and apply the diff for that point.
The problem with this setup is that I don't know if you can append data to an encrypted tar archive and have that data encrypted in the process. If not, I suppose one could encrypt the diffs with the same key as the original tar and append them that way. Also, I don't know if compression works that way, either. That is, I'm not sure if one can append to a compressed tar archive and have that data compressed. If not, I suppose one could individually compress each diff; or one could leave the original tarball uncompressed and only compress the diffs. Encryption still poses a problem as postulated above.
EDIT:
Looking back, this is something like duplicity, the only difference being that this setup would create a single archive, instead of a folder with regular files and a bunch of diffs. Also, my idea would store the files future as diffs, instead of its past (which, as I understand it, is what duplicity does).
Since I don't really need true diff-style backup behavior (the "back in time" functionality), would it be possible to overwrite the last diff appended to the original archive file, so that only the most recent diff would be added?
EDIT2:
After a little more research on the thrice-blessed ArchWiki, I found System Tar & Restore, btar, and rdup. The latter two look great, but ideally I'd like to implement this myself. These programs still don't do quite what I'm asking for.
The biggest problem I can forsee (even if the abovementioned issues are solved), is how to do this while the system is running. As I understand it, tarring a whole system while it runs is a recipe for data corruption. Instead of using diffs, I notice that rsync can create delta files, and rsync can run safely on a system while it is running. With both diffs and rsync delta files, the question remains, though: if they work by calculating the changes between two data sets.... how does one calculate the difference between a system's / and the same / that is compressed and tarred?
Last edited by ParanoidAndroid (2014-01-23 23:31:31)
Maybe you are looking for
-
Ever since upgrading to iTunes 11.0, I can no longer sync Contacts and Calendar from my iMac (10.7.5) To my iPad2 (6.0.1) via Wi-Fi. I believe All my settings are correct. Device is recognized and sync From iPad is possible. Tablet is past warrant
-
Dear all, By putting action=Insert in the Receiver Structure ,I could able to insert the data. When I am Trying Delete or Update in the Same way I could not see the data modified in the table. Please Let me know how to achieve the same. Thanks, Srini
-
See attachment. This is really bad if it is happening to other people. Although I am an HP employee, I am speaking for myself and not for HP. Attachments: ePC_error.png 296 KB
-
Setting cursor theme [solved]
How do I manually set the cursor theme (either system wide or in fvwm config) ? All of fvwm and gtk apps use the standard Xorg cursor, whereas kde applications use the default kde cursor, so it is a bit annoying that the cursor changes shape all the
-
Invoice Match to be set as PO in Purchase Orders
In Purchase orders, I need the Invoice Match level to be set as 'PO' for the items defined with 'Receipt Required' as 'NO'. Is it possible? If so, please guide. Thanks, Kaveri