Look up Key
Hi All,
I am having a issue one of the Look up keys while i am looking to populate a date key into my fact table using a day_dt = calender_date lookup join for lot of records i am getting gud results except for some of the records i am getting NULL value populated into my fact table but i a have day_dt in my source table for that column . i am thinking the problem might be i am getting a warning saying calender_date date look up does not contain a unique Key.
Can you guys what i have to do to populate my fact table with date key instead of null.
Thanks
You use the key lookup operator to do an outer join the sql code. For example,you have the customer code (in sales tables) and want to look for his name in another table (customer table). It's not necessary to add the customer table into the mapping, but the sales table must be on the mapping.
You drag the key lookup operator and select the customer code as the source column. In the next screen you have to choose the table you want to search. In this case you have to choose the customer table. In that table you should select a key that matches the customer code. You can use a PK or UK to have a validating succesfull. Also, you can use an attribute of customer table that is not a key, but in this case you will got a warning when validating the mapping.
After doing the match, the next screen let you specify an action to be taken if the customer code isn't founded in customer table. Then you can return null value for the customer name or specify a fixed text, like "Name Unknown".
Similar Messages
-
Looking for keys of print a diamond
ladies and gentlman:I'm new to java,When I doing my homework,there is a easy but hard-to-be-understand question really bothers me,so I come to looking for help.I will be appricatied your coming and answering.
Print a Diamond ----easy and old question!
here are my two keys,but i dont belive any of them is OOP,i mean,there is no object -oriented in the code and progamming,maybe just progressing.if there any brief key to the question or any explanation to a new java learner,I will really be thanks.
1st
public class LingXing{
public static void main(String args[]){
for (int i=0;i<=6;i++){
for (int j=0;j<=6;j++){
if (j>6-i)
System.out.print("*");
else
System.out.print(" ");
for (int j=6-i;j<=6;j++){
System.out.print("*");
System.out.println();
for (int i=1;i<=6;i++){
for (int j=1;j<=7;j++){
if (j-1>i)
System.out.print("*");
else
System.out.print(" ");
for (int j=i;j<=6;j++){
System.out.print("*");
System.out.println();
2nd
public class Ling{
public static void main(String args[]){
for(int i=1;i<=7;i++){
for(int j=1;j<=7;j++){
if((i>7-j)&&(i>=j)){
System.out.print("*");
else{
System.out.print(" ");
System.out.println();
for(int i=1;i<=7;i++){
for(int j=1;j<=7;j++){
if((i<j)&&(8-i>j)){
System.out.print("*");
else{
System.out.print(" ");
System.out.println();
}how about this????
this is object oriented approach......
public class Ling{
void alpha()
for(int i=1;i<=7;i++){
for(int j=1;j<=7;j++){
if((i>7-j)&&(i>=j)){
System.out.print("*");
else{
System.out.print(" ");
System.out.println();
for(int i=1;i<=7;i++){
for(int j=1;j<=7;j++){
if((i<j)&&(8-i>j)){
System.out.print("*");
else{
System.out.print(" ");
System.out.println();
public static void main(String as[])
Ling l = new Ling();
l.alpha();
} -
[SOLVED] Pacman is unable to look up keys?
Hi there,
I'm using Arch Linux for a while, and I'm using pacman 4.0 as well as key signing. It works without any problems, and I run system upgrades every 3 days or so.
Today i just want to initiate the upgrade with "pacman -Syu" as usual, but pacman refuses it because it is unable to check the keys. Since it did work perfectly before, I - of course - did pacman key initialization and configured the pacman.conf properly.
:: Synchronizing package databases...
core is up to date
extra is up to date
community is up to date
:: Starting full system upgrade...
resolving dependencies...
warning: dependency cycle detected:
warning: udev will be installed before its util-linux dependency
looking for inter-conflicts...
Targets (25): binutils-2.22-5 coreutils-8.16-2 dhcpcd-5.5.6-1 expat-2.1.0-1
filesystem-2012.2-4 gcc-4.7.0-3 gcc-libs-4.7.0-3 glibc-2.15-10
gnutls-3.0.18-1 kmod-7-2 krb5-1.10.1-2 libarchive-3.0.4-1
libltdl-2.4.2-5 libpng-1.5.10-1 libtool-2.4.2-5 linux-3.2.14-1
linux-api-headers-3.3-1 mkinitcpio-0.8.6-2 pcmciautils-018-4
perl-net-ssleay-1.46-1 syslinux-4.05-4 syslog-ng-3.3.4-5
tzdata-2012c-1 udev-181-9 util-linux-2.21.1-2
Total Installed Size: 245.35 MiB
Net Upgrade Size: 5.96 MiB
Proceed with installation? [Y/n] y
(25/25) checking package integrity [######################] 100%
error: libarchive: key "5C2E46A0F53A76ED" is unknown
error: key "5C2E46A0F53A76ED" could not be looked up remotely
error: failed to commit transaction (invalid or corrupted package)
Errors occurred, no packages were upgraded.
My pacman.conf looks like this (important parts)
# PGP signature checking
# NOTE: None of this will work without running `pacman-key --init` first.
# The compiled in default is equivalent to the following line. This requires
# you to locally sign and trust packager keys using `pacman-key` for them to be
# considered valid.
#SigLevel = Optional TrustedOnly
# If you wish to check signatures but avoid local sign and trust issues, use
# the following line. This will treat any key imported into pacman's keyring as
# trusted.
SigLevel = Optional TrustAll
# For now, off by default unless you read the above.
#SigLevel = Never
[core]
SigLevel = PackageRequired
Include = /etc/pacman.d/mirrorlist
[extra]
SigLevel = PackageOptional
Include = /etc/pacman.d/mirrorlist
[community]
SigLevel = PackageOptional
Include = /etc/pacman.d/mirrorlist
gpg.conf
no-greeting
no-permission-warning
lock-never
keyserver hkp://keys.gnupg.net
keyserver-options timeout=10
I also tried increasing the timeout and changing the keyserver to hkp://pgp.mit.edu:11371, as adviced in other threads, but no help.
Cleaning the caches with pacman -Sc didn't help ether. I also restarted the system several times, but no success.
Any help? Thanks!
Last edited by silentsnake (2012-04-07 14:56:24)Cleaning the cache with pacman -Sc will leave the most recent downloaded version there, so delete the package manually from the cache and run pacman -Syu again.
-
[Solved] Pacman unable to look up keys remotely
My [testing] install has been running pacman 4 ever since Allan put a provisional package up for testing (outside the [testing] repo). The key verification worked okay.
However, I am not able to upgrade any more packages it seems, due to pacman being unable to look up the keys online. I don't know if the gnupg 2 move has anything to do with it. I already tried changing the key server in /etc/pacman.d/gnupg/gpg.conf from the default one to the MIT one (which seems to be a lot more responsive). That doesn't help any.
This is what pacman spits out:
error: libnfs: key "DB323392796CA067" is unknown
error: key "DB323392796CA067" could not be looked up remotely
error: afpfs-ng: key "DB323392796CA067" is unknown
error: key "DB323392796CA067" could not be looked up remotely
error: libshairport: key "DB323392796CA067" is unknown
error: key "DB323392796CA067" could not be looked up remotely
error: xbmc: key "DB323392796CA067" is unknown
error: key "DB323392796CA067" could not be looked up remotely
error: failed to commit transaction (invalid or corrupted package (PGP signature))
Errors occurred, no packages were upgraded.
Curiously, all those packages are xbmc 11.0 and its new dependencies. It's just one key. I ran pacman-key -u and it says there is no need for updating (I may be misled about the purpose of the -u option though ).
Any pointers?
Last edited by .:B:. (2012-03-28 14:16:38)Thanks.
Too bad there was nothing about that on the general dev ML, or I must have overlooked it. I have followed the discussion about dropping the gnupg 1.4 branch, but no mention whatsoever of this breakage that the patch mentioned in the dev ML will fix.
Last edited by .:B:. (2012-03-28 14:21:46) -
HOW DARE YOU!!!!
What the user types onto their keyboard is their right, and they should totally have privacy! OMG you're horrible!!!....
Now back to reality, just make sure the client has a strong "right to monitor clause" and then use Spector. Does a good enough job, and stores to a local share.I would not agree to install malware on your client's network, it's too much of a risk for your business. Rather, ask them what problem they are trying to solve and find an appropriate way to solve it. What they probably need is an Employee Monitoring Solution.
http://www.pcworld.com/article/222169/how_to_monitor_your_employees_without_going_too_far.html -
[SOLVED] Pacman won't look up gpg keys
Ever since I upgraded gnupg/gpgme today, pacman won't look up (or rather fail looking up) any missing GPG keys. Relevant part of pacman's output:
debug: checking signature for /var/cache/pacman/pkg/privoxy-3.0.19-2-i686.pkg.tar.xz
debug: 1 signatures returned
debug: fingerprint: C06086337C50773E
debug: summary: key missing
debug: status: No public key
debug: timestamp: 1328647189
debug: exp_timestamp: 0
debug: validity: unknown; reason: Success
debug: key lookup failed, unknown key
debug: signature is not valid
debug: looking up key C06086337C50773E locally
debug: key lookup failed, unknown key
error: privoxy: key "C06086337C50773E" is unknown
debug: looking up key C06086337C50773E remotely
debug: key lookup failed, unknown key
debug: looking up key 7C50773E remotely
debug: key lookup failed, unknown key
debug: gpg error: End of file
error: key "C06086337C50773E" could not be looked up remotely
error: failed to commit transaction (invalid or corrupted package (PGP signature))
Errors occurred, no packages were upgraded.
Failing to import the key directly through pacman, I tried
pacman-key --recv-key C06086337C50773E
which successfully added the key to my keyring.
I could then install the package. I also tried switching to different keyserves, but without success.
Everything pacman{, -key} related worked fine until the update, but I can't say for certain that it was the gnupg/gpgme update that broke something.
Does anyone else have this issue or is there something wrong with my setup? I already thought of opening a bug report, but I want to make sure it's not my fault.
btw: Hi, everyone :)
Last edited by vehk (2012-03-28 07:54:28)This wasn't explicitly stated above, but to do the manual import with pacman-key, I had to prefix the fingerprint with 0x, as so:
$ sudo pacman-key -r 0x5C2E46A0F53A76ED
However, the default keyserver is giving me problems currently:
$ sudo pacman-key -r 0x5C2E46A0F53A76ED
Password:
gpg: requesting key F53A76ED from hkp server keys.gnupg.net
gpgkeys: HTTP fetch error 7: couldn't connect: End of file
gpg: no valid OpenPGP data found.
gpg: Total number processed: 0
==> ERROR: Remote key not fetched correctly from keyserver.
So in the end, I used a different keyserver:
sudo pacman-key -r 0x5C2E46A0F53A76ED --keyserver hkp://subkeys.pgp.net
Hope that helps anyone else. -
I tried to use the config VIs to record some front-panel settings for later restoration, one of which could be a single space character (part of a string parsing system).
I soon discovered that whenever I tried to save that single-space value to an INI file, only a null string was saved.
After doing some digging I discovered that buried in the Write Key vi is a worker vi called Config Data Modify that uses Trim String on the string data before it is written to the file and that's what was eating my string character. I don't know whether this is a bug or a feature but there are at least three ways to fix it.
1) Assuming you want to leave the library VIs alone, you can pre-process any stings sent to "write key" to replace all spaces with "\20" and then post-process all strings read using "read key" to replace all instances of \20 with spaces.
and if you don't mind modifying the library VIs, either to save/use under a different name or to stick back into the library in a modified state (caution - can cause problems when you move code to another machine with an un-modified library) then...
2) You can yank the trim-string out of the Config Data Modify vi and hope that it does not have any undesirable side effects with regards to the other routines that use Config Data Modify (so far I have not found any in my limited testing)
or
3) You can modify the string pre-processing vi, Remove Unprintable Chars, to add the space character to the list of characters that get swapped out automatically.
Note that both option #1 (as suggested above) and option #3 will produce an INI file data entry that looks like key="\20Hello\20World\20" while option #2 produces an entry that looks like key=" Hello World "
The attached PDF contains screenshots of all this.
Attachments:
Binder1.pdf 2507 KBHi Warren,
there's a 4th option:
Simply set the "write raw string" input of the write key function to TRUE
This option only appears when a string is wired to that function!
Just re-checked:
I think it's a limitation of the config file format. It's text based and (leading) spaces in the value are "overseen" as whitespaces. So your next option would be to use quotes around your string with spaces...
Message Edited by GerdW on 05-02-2009 08:32 PM
Best regards,
GerdW
CLAD, using 2009SP1 + LV2011SP1 + LV2014SP1 on WinXP+Win7+cRIO
Kudos are welcome -
How to view the key mapping when viewing Hierarchy in Data Manager
Hi! I previously posted a question on doing value mapping using the hierarchy code rather than the name. I have got that working now using concept of remote key. When I first loaded the hierarchy with remote key and check in Data Manager, I can see the hierarchy structure with the key mappings. However, when I subsequently went back to the hierarchy to have a second look, the keys are gone. Does anyone know how I can view hierarchy in Data Manager with the key mappings?
Cheers!
SFHi,
Go to Record mode, and open Hierarchy table. Now to select click on any hierarchy node record and then right click and select "Edit Key Mappings". This will show you existing keys as well as allow you to manually modify keys. You can only Check Remote keys on hierarchy in Record mode and in Hierarchy Mode "Edit Key Mappings" option will be disabled.
Please revert if you face any issue.
Regards,
Shiv -
how to decide posting key for negative valuies and for positive values
and who will decide this
i have to assign minus sign to value for posting key say 21.
how can i do that. is it like this ?
if itab-BSCHL = '22'.
concatenate '(-)' amount into itab-amount .
condense itab-amount no-gaps .
itab-WRBTR = itab-WRBTR * -1 . but not worki
endif.
please replyHi,
I dont think you can assign the sign to the amount for the posting key...
Posting keys are divided into Debit and Credit Indicator...
So system automaically take the sign of the amount from the Posting key you have selected.
You can try Txn FB01...there you cannot give the amount in negative...it should be positive but after posting u can see the differnece...
it depends on the posting key ....
exactly for what purpose you r looking posting key...
Thnx
Rahul
Edited by: Rahul Keshav on Aug 26, 2009 5:36 PM -
How to search for Key Figures in Query Designer 7.0?
Hi,
in BEx Query Designer 3.5 there was a search function to look after key figures or characteristics. Is there a search function in Query Designer 7.0?
Thanks.Hi,
QD 3.x version has "Find" option to identify the KF and Characteristics,but the same is not available with QD 7.x.
Reason could be:
With QD 7.x,just by typing the starting letters of KF or Characteristics by Keyboard itself,it will highlight you the entries.Hence there is no explicit Find option provided.But in case of QD 3.x,they gave it explicitely.
Rgds,
Murali -
Hi!
There is an application I've created uses key event that needs your help.
As you know, that setting 'Mnemonic' to a JButton object makes the button accessible by a key mentioned in the parameter as the following ->
OkButton.setMnemonic(KeyEvent.VK_O);Now, pressing 'Alt' and 'O' keys together will do the same action as the 'OKButton' does.
But as of me, I think pressing two keys together is not a complete handy job.
So, is there any code that will do the same, by pressing only the 'O' key ?
Ok! I know that there is something to be taken care of; that is, if I want the button to react by pressing only the 'O' key the button must be in focus [value returned by the method [code]isFocusable() for the button must return true.]
Then how the 'Mnemonic' works ?!! When 'Mnemonic' do something, button does not have any focus.
Only, I press the Alt+O and the work done successfully! No need to take care wherever the focus is. So, is there any way to do alike, where I don't have to manage the focus subsystem?? I would only press the 'O' key and the task will be done.
Please send a sample code. Thanks!I suggest you look into Key Bindings:
"How to Use Key Bindings"
http://java.sun.com/docs/books/tutorial/uiswing/misc/keybinding.html
Here is a short demo program that uses Key Bindings to do what you describe:
import java.awt.event.ActionEvent;
import java.awt.event.KeyEvent;
import javax.swing.*;
public class PressOTest extends JFrame {
public PressOTest() {
super("Press O or C");
setDefaultCloseOperation(EXIT_ON_CLOSE);
// Action that will be associated with the OK button and with
// the 'O' key event
Action okAction = new AbstractAction("Ok") {
public void actionPerformed(ActionEvent e) {
JOptionPane.showMessageDialog(PressOTest.this, "Ok!");
// Action that will be associated with the Cancel button and with
// the 'C' key event
Action cancelAction = new AbstractAction("Cancel") {
public void actionPerformed(ActionEvent e) {
JOptionPane.showMessageDialog(PressOTest.this, "Cancel!");
// Register Key Bindings for the 'O' and 'C' keys:
InputMap im = getRootPane().getInputMap(
JComponent.WHEN_IN_FOCUSED_WINDOW);
ActionMap am = getRootPane().getActionMap();
im.put(KeyStroke.getKeyStroke( KeyEvent.VK_O, 0 ), "ok");
am.put( "ok", okAction );
im.put(KeyStroke.getKeyStroke( KeyEvent.VK_C, 0 ), "cancel");
am.put( "cancel", cancelAction );
// Create and add OK & Cancel buttons:
JButton okButton = new JButton(okAction);
JButton cancelButton = new JButton(cancelAction);
Box box = Box.createHorizontalBox();
box.add( Box.createHorizontalGlue() );
box.add( okButton );
box.add( Box.createHorizontalStrut(10) );
box.add( cancelButton );
box.add( Box.createHorizontalGlue() );
getContentPane().add( box );
setSize(300, 300);
setLocationRelativeTo(null);
public static void main(String[] args) {
new PressOTest().setVisible(true);
} -
Call for participation: OASIS Enterprise Key Management Infrastructure TC
We would welcome your participation in this process. Thank you.
Arshad Noor
StrongAuth, Inc.
To: OASIS members & interested parties
A new OASIS technical committee is being formed. The OASIS Enterprise Key
Management Infrastructure (EKMI) Technical Committee has been proposed by the
members of OASIS listed below. The proposal, below, meets the requirements of
the OASIS TC Process [a]. The TC name, statement of purpose, scope, list of
deliverables, audience, and language specified in the proposal will constitute
the TC's official charter. Submissions of technology for consideration by the
TC, and the beginning of technical discussions, may occur no sooner than the
TC's first meeting.
This TC will operate under our 2005 IPR Policy. The eligibility
requirements for becoming a participant in the TC at the first meeting (see
details below) are that:
(a) you must be an employee of an OASIS member organization or an individual
member of OASIS;
(b) the OASIS member must sign the OASIS membership agreement [c];
(c) you must notify the TC chair of your intent to participate at least 15
days prior to the first meeting, which members may do by using the "Join this
TC" button on the TC's public page at [d]; and
(d) you must attend the first meeting of the TC, at the time and date fixed
below.
Of course, participants also may join the TC at a later time. OASIS and the TC
welcomes all interested parties.
Non-OASIS members who wish to participate may contact us about joining OASIS
[c]. In addition, the public may access the information resources maintained for
each TC: a mail list archive, document repository and public comments facility,
which will be linked from the TC's public home page at [d].
Please feel free to forward this announcement to any other appropriate lists.
OASIS is an open standards organization; we encourage your feedback.
Regards,
Mary
Mary P McRae
Manager of TC Administration, OASIS
email: mary.mcrae(AT)oasis-open.org
web: www.oasis-open.org
a) http://www.oasis-open.org/committees/process.php
b) http://www.oasis-open.org/who/intellectualproperty.php
c) See http://www.oasis-open.org/join/
d) http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=ekmi
CALL FOR PARTICIPATION
OASIS Enterprise Key Management Infrastructure (EKMI) TC
Name
OASIS Enterprise Key Management Infrastructure (EKMI) TC
Statement of Purpose
Public Key Infrastructure (PKI) technology has been around for more than a
decade, and many companies have adopted it to solve specific problems in the
area of public-key cryptography. Public-key cryptography has been embedded in
some of the most popular tools -- web clients and servers, VPN clients and
servers, mail user agents, office productivity tools and many industry-specific
applications -- and underlies many mission-critical environments today.
Additionally, there are many commercial and open-source implementations of PKI
software products available in the market today. However, many companies across
the world have recognized that PKI by itself, is not a solution.
There is also the perception that most standards in PKI have already been
established by ISO and the PKIX (IETF), and most companies are in
operations-mode with their PKIs -- just using it, and adopting it to other
business uses within their organizations. Consequently, there is not much left
to architect and design in the PKI community.
Simultaneously, there is a new interest on the part of many companies in the
management of symmetric keys used for encrypting sensitive data in their
computing infrastructure. While symmetric keys have been traditionally managed
by applications doing their own encryption and decryption, there is no
architecture or protocol that provides for symmetric key management services
across applications, operating systems, databases, etc. While there are many
industry standards around protocols for the life-cycle management of asymmetric
(or public/private) keys -- PKCS10, PKCS7, CRMF, CMS, etc. -- however, there is
no standard that describes how applications may request similar life-cycle
services for symmetric keys, from a server and how public-key cryptography may
be used to provide such services.
Key management needs to be addressed by enterprises in its entirety -- for both
symmetric and asymmetric keys. While each type of technology will require
specific protocols, controls and management disciplines, there is sufficient
common ground in the discipline justifying the approach to look at
key-management as a whole, rather than in parts. Therefore, this TC will
address the following:
Scope
A) The TC will create use-case(s) that describe how and where
the protocols it intends to create, will be used;
B) The TC will define symmetric key management protocols,
including those for:
1. Requesting a new or existing symmetric key from a server;
2. Requesting policy information from a server related to caching of keys on the
client;
3. Sending a symmetric key to a requestor, based on a request;
4. Sending policy information to a requestor, based on a request;
5. Other protocol pairs as deemed necessary.
C) To ensure cross-implementation interoperability, the TC will create a test
suite (as described under 'Deliverables' below) that will allow different
implementations of this protocol to be certified against the OASIS standard
(when ratified);
D) The TC will provide guidance on how a symmetric key-management infrastructure
may be secured using asymmetric keys, using secure and generally accepted
practices;
E) Where appropriate, and in conjunction with other standards organizations that
focus on disciplines outside the purview of OASIS, the TC will provide input on
how such enterprise key-management infrastructures may be managed, operated and
audited;
F) The TC may conduct other activities that educate users about, and promote,
securing sensitive data with appropriate cryptography, and the use of proper
key-management techniques and disciplines to ensure appropriate protection of
the infrastructure.
List of Deliverables
1. XSchema Definitions (XSD) of the request and response protocols (by August
2007) 2. A Test Suite of conformance clauses and sample transmitted keys and
content that allows for clients and servers to be tested for conformance to the
defined protocol (by December 2007)
3. Documentation that explains the communication protocol (by August 2007)
4. Documentation that provides guidelines for how an EKMI may be built,
operated, secured and audited (by December 2007)
5. Resources that promote enterprise-level key-management: white papers,
seminars, samples, and information for developer and public use. (beginning
August 2007, continuing at least through 2008)
Anticipated Audiences:
Any company or organization that has a need for managing cryptographic keys
across applications, databases, operating systems and devices, yet desires
centralized policy-driven management of all cryptographic keys in the
enterprise. Retail, health-care, government, education, finance - every industry
has a need to protect the confidentiality of sensitive data. The TC's
deliverables will provide an industry standard for protecting sensitive
information across these, and other, industries.
Security services vendors and integrators should be able to fulfill their use
cases with the TC's key management methodologies.
Members of the OASIS PKI TC should be very interested in this new TC, since the
goals of this TC potentially may fulfill some of the goals in the charter of the
PKI TC.
Language:
English
IPR Policy:
Royalty Free on Limited Terms under the OASIS IPR Policy
Additional Non-normative information regarding the start-up of the TC:
a. Identification of similar or applicable work:
The proposers are unaware of any similar work being carried on in this exact
area. However, this TC intends to leverage the products of, and seek liaison
with, a number of other existing projects that may interoperate with or provide
functionality to the EKMI TC's planned outputs, including:
OASIS Web Services Security TC
OASIS Web Services Trust TC
W3C XMLSignature and XMLEncryption protocols and working group
OASIS Digital Signature Services TC
OASIS Public Key Infrastructure TC
OASIS XACML TC (and other methods for providing granular access-control
permissions that may be consumed or enforced by symmetic key management)
b. Anticipated contributions:
StrongAuth, Inc. anticipates providing a draft proposal for the EKMI protocol,
at the inception of the TC. The current draft can be viewed at:
http://www.strongkey.org/resources/documentation/misc/skcl-sks-protocol.html
and a working implementation of this protocol is available at:
http://sourceforge.net/projects/strongkey for interested parties.
c. Proposed working title and acronym for specification:
Symmetric Key Services Markup Language (SKSML), subject to TC's approval or
change.
d. Date, time, and location of the first meeting:
First meeting will be by teleconference at:
Date: January 16, 2007
Time: 10 AM PST, 1PM EST
Call in details: to be posted to TC list
StrongAuth has agreed to host this meeting.
e. Projected meeting schedule:
Subject to TC's approval, we anticipate monthly telephone meetings for the first
year. First version of the protocol to be voted on by Summer 2007. StrongAuth is
willing to assist by arranging for the teleconferences; we anticipate using
readily available free teleconference services.
f. Names, electronic mail addresses, of supporters:
Ken Adler, ken(AT)adler.net
June Leung,June.Leung(AT)FundServ.com
John Messing, jmessing(AT)law-on-line.com
Arshad Noor, arshad.noor(AT)strongauth.com
Davi Ottenheimer, davi(AT)poetry.org
Ann Terwilliger, aterwil(AT)isa.com
g. TC Convener:
Arshad Noor, arshad.noor(AT)strongauth.comHi Bilge,
did you put your text in a blender before sending it?
I understood everything works fine except the miscellaneous menu item in the configuration tab of ERM?
Have you already tried to clear all browser cache, close all browsers and try it again?
Best,
Frank -
Control key used to bring up the zoom tool but now...
you have to use control+option. I really really want to change this back so that
just shift brings zoom up temporarily. Looked in key commands, cant find it
anywhere. Please please help. Pleasey pleaseThis functionality has changed in LP8 to become more standard across applications, it is not optional.
But the keys are right next to each other, so it shouldn't be that much of a chore to relearn in practice. -
Change Applescript Actions Based On Key?
I'm writing an Applescript, and distributing it to many different people. What I want it to do is go through the actions normally, but if the "C" key is held down, it goes to the config window. I'm running Mac Os 10.7.5, normal Applescript. What I have so far is:
tell application "System Events"
try
if keystroke "C" is down then
beep 5
end if
on error
end try
end tell
It compiles and runs, but doesn't react when I press the "C" key, even when I set it to endlessly repeat. Is there a working version of this?The System Events keystroke command is for sending keystrokes, not receiving or looking for key presses. Regular AppleScript is not really designed for things like this, so you will need to use other tools. There is a shell script to check for modifier keys (for example, look for the option key instead of the C key) - take a look at this MacScripter post.
-
Key differencess bet'n Altrnative condtion base value and Alternative calcu
Hi All
I read many times even though I have dought in pricing where in, differentating Altrnative condtion base value and Alternative calculation type.
I know these two are forumalas.
I am looking for key differencess bet'n Altrnative condtion base value and Alternative calculation type
Where & which senario I can make out the differnces bet'n Altrnative condtion base value and Alternative calculation type.
Please explain in details which can keep in mind for long run...
Thanks in advance.
Regards,
Ramkrishna.Hi Rama krishna
go thru this....u can make difference and will have idea too
AltCty - Condition formula for alternative calculation type:
It is again a Routine that is written by ABAP Consultant.
It is an alternative formula for the condition type that can be used instead of standard
formulas.
For example, let us take the Profit Margin which can be both + / - , so here this
routine will help us in generating the value which can be either + or -. Profit margin is
not a condition type so it cannot be classified as +ve or -ve in the V/06.
Ex.: 950 0 Profit Margin 11.
So we assign 11 - Profit Margin.
If new routines are to be defined we follow the procedure given below.
Go to T.Code: VOFM. - Maintain Requirements & Formulas
Click on the "Formulas" and then on the "Condition Values".
We have a list of routines, we can ask ABAP consultant to create new routines
based on the client requests. And we assign the application type.
AltCBV - Alternative formula for condition base value:
Formula for determining the condition basis as an alternative to the standard.
It is again a Routine that is written by ABAP Consultant.
It is used as a basis to calculate value of the condition type instead of using it from the
"FROM" column.· Ex.: Freight - KF00.
Freight is calculated based on weight, volume etc. and not on the base price. In pricing
there is no entry of weight from which the value can be referred like we do for
discounts using base price. We have to get the value from the Material master.
In this column we can mention the value as 12 - Gross Weight or 13 - Net Weight.
During pricing, the system will consider the value that is mentioned in this column and
determine the freight based on this value.
Suppose we have Net weight: 100 kgs and Gross Weight: 150 kgs. And if we mention
13 in this column then the Freight condition KF00 will be calculated using the weight
as 100 kgs.
Thanks and regards
Chandra
Maybe you are looking for
-
How do I restrict access so users can only visit certain sites?
At work we are setting up a laptop in order to do only one thing - use one particular website. I'd like to make sure nobody can visit any other sites.
-
AE CS6 trial to full version problem
I have a problem with my After Effects CS6; at first I downloaded and installed a trial version of it, but after a while I decided to get the full package. So I upgraded my CS5.5 Master Collection to CS6 Production Premium, but After Effects CS6 cont
-
30GB iPod stops in middle of songs shows apple on screen
I have a brand new 30GB iPod I'm running on Windows xp. In the middle or at anytime during a song the ipod with stop playing, show an apple against a black screen for about 5 seconds then return to the main menu. I have latest iTunes, I've updated it
-
Cost Estimate Currency Display
Hi, When I run cost estimate with 2 different currency settings in the system, how do I permanently make the display to always show cost estimate in USD (controlling area currency ) and not EURO (company code currency)?
-
Modify the message type for the Message no. CK239
Hi, I would like to change the message type E to W for the message CK239. Is it possible? Thanks. Jean-Marc