Look up Key

Hi All,
I am having a issue one of the Look up keys while i am looking to populate a date key into my fact table using a day_dt = calender_date lookup join for lot of records i am getting gud results except for some of the records i am getting NULL value populated into my fact table but i a have day_dt in my source table for that column . i am thinking the problem might be i am getting a warning saying calender_date date look up does not contain a unique Key.
Can you guys what i have to do to populate my fact table with date key instead of null.
Thanks

You use the key lookup operator to do an outer join the sql code. For example,you have the customer code (in sales tables) and want to look for his name in another table (customer table). It's not necessary to add the customer table into the mapping, but the sales table must be on the mapping.
You drag the key lookup operator and select the customer code as the source column. In the next screen you have to choose the table you want to search. In this case you have to choose the customer table. In that table you should select a key that matches the customer code. You can use a PK or UK to have a validating succesfull. Also, you can use an attribute of customer table that is not a key, but in this case you will got a warning when validating the mapping.
After doing the match, the next screen let you specify an action to be taken if the customer code isn't founded in customer table. Then you can return null value for the customer name or specify a fixed text, like "Name Unknown".

Similar Messages

  • Looking for keys of print a diamond

    ladies and gentlman:I'm new to java,When I doing my homework,there is a easy but hard-to-be-understand question really bothers me,so I come to looking for help.I will be appricatied your coming and answering.
    Print a Diamond ----easy and old question!
    here are my two keys,but i dont belive any of them is OOP,i mean,there is no object -oriented in the code and progamming,maybe just progressing.if there any brief key to the question or any explanation to a new java learner,I will really be thanks.
    1st
    public class LingXing{
         public static void main(String args[]){
              for (int i=0;i<=6;i++){
              for (int j=0;j<=6;j++){
                   if (j>6-i)     
              System.out.print("*");
                   else
              System.out.print(" ");
              for (int j=6-i;j<=6;j++){     
              System.out.print("*");
              System.out.println();
              for (int i=1;i<=6;i++){
              for (int j=1;j<=7;j++){
                   if (j-1>i)     
              System.out.print("*");
                   else
              System.out.print(" ");
              for (int j=i;j<=6;j++){     
              System.out.print("*");
              System.out.println();
    2nd
    public class Ling{
         public static void main(String args[]){
         for(int i=1;i<=7;i++){
              for(int j=1;j<=7;j++){
              if((i>7-j)&&(i>=j)){
                             System.out.print("*");
              else{
                             System.out.print(" ");          
         System.out.println();
         for(int i=1;i<=7;i++){
              for(int j=1;j<=7;j++){
              if((i<j)&&(8-i>j)){
                             System.out.print("*");
         else{
                             System.out.print(" ");                    
              System.out.println();
    }

    how about this????
    this is object oriented approach......
    public class Ling{
    void alpha()
    for(int i=1;i<=7;i++){
    for(int j=1;j<=7;j++){
    if((i>7-j)&&(i>=j)){
    System.out.print("*");
    else{
    System.out.print(" ");
    System.out.println();
    for(int i=1;i<=7;i++){
    for(int j=1;j<=7;j++){
    if((i<j)&&(8-i>j)){
    System.out.print("*");
    else{
    System.out.print(" ");
    System.out.println();
    public static void main(String as[])
    Ling l = new Ling();
    l.alpha();
    }

  • [SOLVED] Pacman is unable to look up keys?

    Hi there,
    I'm using Arch Linux for a while, and I'm using pacman 4.0 as well as key signing. It works without any problems, and I run system upgrades every 3 days or so.
    Today i just want to initiate the upgrade with "pacman -Syu" as usual, but pacman refuses it because it is unable to check the keys. Since it did work perfectly before, I - of course - did pacman key initialization and configured the pacman.conf properly.
    :: Synchronizing package databases...
    core is up to date
    extra is up to date
    community is up to date
    :: Starting full system upgrade...
    resolving dependencies...
    warning: dependency cycle detected:
    warning: udev will be installed before its util-linux dependency
    looking for inter-conflicts...
    Targets (25): binutils-2.22-5 coreutils-8.16-2 dhcpcd-5.5.6-1 expat-2.1.0-1
    filesystem-2012.2-4 gcc-4.7.0-3 gcc-libs-4.7.0-3 glibc-2.15-10
    gnutls-3.0.18-1 kmod-7-2 krb5-1.10.1-2 libarchive-3.0.4-1
    libltdl-2.4.2-5 libpng-1.5.10-1 libtool-2.4.2-5 linux-3.2.14-1
    linux-api-headers-3.3-1 mkinitcpio-0.8.6-2 pcmciautils-018-4
    perl-net-ssleay-1.46-1 syslinux-4.05-4 syslog-ng-3.3.4-5
    tzdata-2012c-1 udev-181-9 util-linux-2.21.1-2
    Total Installed Size: 245.35 MiB
    Net Upgrade Size: 5.96 MiB
    Proceed with installation? [Y/n] y
    (25/25) checking package integrity [######################] 100%
    error: libarchive: key "5C2E46A0F53A76ED" is unknown
    error: key "5C2E46A0F53A76ED" could not be looked up remotely
    error: failed to commit transaction (invalid or corrupted package)
    Errors occurred, no packages were upgraded.
    My pacman.conf looks like this (important parts)
    # PGP signature checking
    # NOTE: None of this will work without running `pacman-key --init` first.
    # The compiled in default is equivalent to the following line. This requires
    # you to locally sign and trust packager keys using `pacman-key` for them to be
    # considered valid.
    #SigLevel = Optional TrustedOnly
    # If you wish to check signatures but avoid local sign and trust issues, use
    # the following line. This will treat any key imported into pacman's keyring as
    # trusted.
    SigLevel = Optional TrustAll
    # For now, off by default unless you read the above.
    #SigLevel = Never
    [core]
    SigLevel = PackageRequired
    Include = /etc/pacman.d/mirrorlist
    [extra]
    SigLevel = PackageOptional
    Include = /etc/pacman.d/mirrorlist
    [community]
    SigLevel = PackageOptional
    Include = /etc/pacman.d/mirrorlist
    gpg.conf
    no-greeting
    no-permission-warning
    lock-never
    keyserver hkp://keys.gnupg.net
    keyserver-options timeout=10
    I also tried increasing the timeout and changing the keyserver to hkp://pgp.mit.edu:11371, as adviced in other threads, but no help.
    Cleaning the caches with pacman -Sc didn't help ether. I also restarted the system several times, but no success.
    Any help? Thanks!
    Last edited by silentsnake (2012-04-07 14:56:24)

    Cleaning the cache with pacman -Sc will leave the most recent downloaded version there, so delete the package manually from the cache and run pacman -Syu again.

  • [Solved] Pacman unable to look up keys remotely

    My [testing] install has been running pacman 4 ever since Allan put a provisional package up for testing (outside the [testing] repo). The key verification worked okay.
    However, I am not able to upgrade any more packages it seems, due to pacman being unable to look up the keys online. I don't know if the gnupg 2 move has anything to do with it. I already tried changing the key server in /etc/pacman.d/gnupg/gpg.conf from the default one to the MIT one (which seems to be a lot more responsive). That doesn't help any.
    This is what pacman spits out:
    error: libnfs: key "DB323392796CA067" is unknown
    error: key "DB323392796CA067" could not be looked up remotely
    error: afpfs-ng: key "DB323392796CA067" is unknown
    error: key "DB323392796CA067" could not be looked up remotely
    error: libshairport: key "DB323392796CA067" is unknown
    error: key "DB323392796CA067" could not be looked up remotely
    error: xbmc: key "DB323392796CA067" is unknown
    error: key "DB323392796CA067" could not be looked up remotely
    error: failed to commit transaction (invalid or corrupted package (PGP signature))
    Errors occurred, no packages were upgraded.
    Curiously, all those packages are xbmc 11.0 and its new dependencies. It's just one key. I ran pacman-key -u and it says there is no need for updating (I may be misled about the purpose of the -u option though ).
    Any pointers?
    Last edited by .:B:. (2012-03-28 14:16:38)

    Thanks.
    Too bad there was nothing about that on the general dev ML, or I must have overlooked it. I have followed the discussion about dropping the gnupg 1.4 branch, but no mention whatsoever of this breakage that the patch mentioned in the dev ML will fix.
    Last edited by .:B:. (2012-03-28 14:21:46)

  • Looking for Key-logger App

    HOW DARE YOU!!!!
    What the user types onto their keyboard is their right, and they should totally have privacy! OMG you're horrible!!!....
    Now back to reality, just make sure the client has a strong "right to monitor clause" and then use Spector. Does a good enough job, and stores to a local share. 

    I would not agree to install malware on your client's network, it's too much of a risk for your business. Rather, ask them what problem they are trying to solve and find an appropriate way to solve it. What they probably need is an Employee Monitoring Solution.
    http://www.pcworld.com/article/222169/how_to_monitor_your_employees_without_going_too_far.html

  • [SOLVED] Pacman won't look up gpg keys

    Ever since I upgraded gnupg/gpgme today, pacman won't look up (or rather fail looking up) any missing GPG keys. Relevant part of pacman's output:
    debug: checking signature for /var/cache/pacman/pkg/privoxy-3.0.19-2-i686.pkg.tar.xz
    debug: 1 signatures returned
    debug: fingerprint: C06086337C50773E
    debug: summary: key missing
    debug: status: No public key
    debug: timestamp: 1328647189
    debug: exp_timestamp: 0
    debug: validity: unknown; reason: Success
    debug: key lookup failed, unknown key
    debug: signature is not valid
    debug: looking up key C06086337C50773E locally
    debug: key lookup failed, unknown key
    error: privoxy: key "C06086337C50773E" is unknown
    debug: looking up key C06086337C50773E remotely
    debug: key lookup failed, unknown key
    debug: looking up key 7C50773E remotely
    debug: key lookup failed, unknown key
    debug: gpg error: End of file
    error: key "C06086337C50773E" could not be looked up remotely
    error: failed to commit transaction (invalid or corrupted package (PGP signature))
    Errors occurred, no packages were upgraded.
    Failing to import the key directly through pacman, I tried
    pacman-key --recv-key C06086337C50773E
    which successfully added the key to my keyring.
    I could then install the package. I also tried switching to different keyserves, but without success.
    Everything pacman{, -key} related worked fine until the update, but I can't say for certain that it was the gnupg/gpgme update that broke something.
    Does anyone else have this issue or is there something wrong with my setup? I already thought of opening a bug report, but I want to make sure it's not my fault.
    btw: Hi, everyone :)
    Last edited by vehk (2012-03-28 07:54:28)

    This wasn't explicitly stated above, but to do the manual import with pacman-key, I had to prefix the fingerprint with 0x, as so:
    $ sudo pacman-key -r 0x5C2E46A0F53A76ED
    However, the default keyserver is giving me problems currently:
    $ sudo pacman-key -r 0x5C2E46A0F53A76ED
    Password:
    gpg: requesting key F53A76ED from hkp server keys.gnupg.net
    gpgkeys: HTTP fetch error 7: couldn't connect: End of file
    gpg: no valid OpenPGP data found.
    gpg: Total number processed: 0
    ==> ERROR: Remote key not fetched correctly from keyserver.
    So in the end, I used a different keyserver:
    sudo pacman-key -r 0x5C2E46A0F53A76ED --keyserver hkp://subkeys.pgp.net
    Hope that helps anyone else.

  • The "write key" configurat​ion file vi use of "trim string" prior to writing the data can modify any string data written.

    I tried to use the config VIs to record some front-panel settings for later restoration, one of which could be a single space character (part of a string parsing system).
    I soon discovered that whenever I tried to save that single-space value to an INI file, only a null string was saved.
    After doing some digging I discovered that buried in the Write Key vi is a worker vi called Config Data Modify that uses Trim String on the string data before it is written to the file and that's what was eating my string character. I don't know whether this is a bug or a feature but there are at least three ways to fix it.
    1) Assuming you want to leave the library VIs alone, you can pre-process any stings sent to "write key" to replace all spaces with "\20" and then post-process all strings read using "read key" to replace all instances of \20 with spaces.
      and if you don't mind modifying the library VIs, either to save/use under a different name or to stick back into the library in a modified state (caution - can cause problems when you move code to another machine with an un-modified library) then...
    2) You can yank the trim-string out of the Config Data Modify vi and hope that it does not have any undesirable side effects with regards to the other routines that use Config Data Modify (so far I have not found any in my limited testing)
    or
    3)  You can modify the string pre-processing vi, Remove Unprintable Chars, to add the space character to the list of characters that get swapped out automatically.
    Note that both option #1 (as suggested above) and option #3 will produce an INI file data entry that looks like    key="\20Hello\20World\20"   while option #2 produces an entry that looks like   key=" Hello World "
    The attached PDF contains screenshots of all this.
    Attachments:
    Binder1.pdf ‏2507 KB

    Hi Warren,
    there's a 4th option:
    Simply set the "write raw string" input of the write key function to TRUE
    This option only appears when a string is wired to that function!
    Just re-checked:
    I think it's a limitation of the config file format. It's text based and (leading) spaces in the value are "overseen" as whitespaces. So your next option would be to use quotes around your string with spaces...
    Message Edited by GerdW on 05-02-2009 08:32 PM
    Best regards,
    GerdW
    CLAD, using 2009SP1 + LV2011SP1 + LV2014SP1 on WinXP+Win7+cRIO
    Kudos are welcome

  • How to view the key mapping when viewing Hierarchy in Data Manager

    Hi! I previously posted a question on doing value mapping using the hierarchy code rather than the name. I have got that working now using concept of remote key. When I first loaded the hierarchy with remote key and check in Data Manager, I can see the hierarchy structure with the key mappings. However, when I subsequently went back to the hierarchy to have a second look, the keys are gone. Does anyone know how I can view hierarchy in Data Manager with the key mappings?
    Cheers!
    SF

    Hi,
    Go to Record mode, and open Hierarchy table. Now to select click on any hierarchy node record and then right click and select "Edit Key Mappings". This will show you existing keys as well as allow you to manually modify keys. You can only Check Remote keys on hierarchy in Record mode and in Hierarchy Mode "Edit Key Mappings" option will be disabled.
    Please revert if you face any issue.
    Regards,
    Shiv

  • Post key value

    how to decide posting key for negative valuies and for positive values
    and who will decide this
    i have to assign minus sign to value for posting key say 21.
    how can i do that. is it like this ?
    if itab-BSCHL = '22'.
    concatenate '(-)' amount into itab-amount .
    condense itab-amount no-gaps .
    itab-WRBTR = itab-WRBTR * -1 . but not worki
    endif.
    please reply

    Hi,
    I dont think you can assign the sign to the amount for the posting key...
    Posting keys are divided into Debit and Credit Indicator...
    So system automaically take the sign of the amount from the Posting key you have selected.
    You can try Txn FB01...there you cannot give the amount in negative...it should be positive but after posting u can see the differnece...
    it depends on the posting key ....
    exactly for what purpose you r looking posting key...
    Thnx
    Rahul
    Edited by: Rahul Keshav on Aug 26, 2009 5:36 PM

  • How to search for Key Figures in Query Designer 7.0?

    Hi,
    in BEx Query Designer 3.5 there was a search function to look after key figures or characteristics. Is there a search function in Query Designer 7.0?
    Thanks.

    Hi,
    QD 3.x version has "Find" option to identify the KF and Characteristics,but the same is not available with QD 7.x.
    Reason could be:
    With QD 7.x,just by typing the starting letters of KF or Characteristics by Keyboard itself,it will highlight you the entries.Hence there is no explicit Find option provided.But in case of QD 3.x,they gave it explicitely.
    Rgds,
    Murali

  • Focus problem using key event

    Hi!
    There is an application I've created uses key event that needs your help.
    As you know, that setting 'Mnemonic' to a JButton object makes the button accessible by a key mentioned in the parameter as the following ->
                   OkButton.setMnemonic(KeyEvent.VK_O);Now, pressing 'Alt' and 'O' keys together will do the same action as the 'OKButton' does.
    But as of me, I think pressing two keys together is not a complete handy job.
    So, is there any code that will do the same, by pressing only the 'O' key ?
    Ok! I know that there is something to be taken care of; that is, if I want the button to react by pressing only the 'O' key the button must be in focus [value returned by the method [code]isFocusable() for the button must return true.]
    Then how the 'Mnemonic' works ?!! When 'Mnemonic' do something, button does not have any focus.
    Only, I press the Alt+O and the work done successfully! No need to take care wherever the focus is. So, is there any way to do alike, where I don't have to manage the focus subsystem?? I would only press the 'O' key and the task will be done.
    Please send a sample code. Thanks!

    I suggest you look into Key Bindings:
    "How to Use Key Bindings"
    http://java.sun.com/docs/books/tutorial/uiswing/misc/keybinding.html
    Here is a short demo program that uses Key Bindings to do what you describe:
    import java.awt.event.ActionEvent;
    import java.awt.event.KeyEvent;
    import javax.swing.*;
    public class PressOTest extends JFrame {
        public PressOTest() {
            super("Press O or C");
            setDefaultCloseOperation(EXIT_ON_CLOSE);
            // Action that will be associated with the OK button and with
            // the 'O' key event
            Action okAction = new AbstractAction("Ok") {
                public void actionPerformed(ActionEvent e) {
                    JOptionPane.showMessageDialog(PressOTest.this, "Ok!");
            // Action that will be associated with the Cancel button and with
            // the 'C' key event
            Action cancelAction = new AbstractAction("Cancel") {
                public void actionPerformed(ActionEvent e) {
                    JOptionPane.showMessageDialog(PressOTest.this, "Cancel!");
            // Register Key Bindings for the 'O' and 'C' keys:
            InputMap im = getRootPane().getInputMap(
                    JComponent.WHEN_IN_FOCUSED_WINDOW);
            ActionMap am = getRootPane().getActionMap();
            im.put(KeyStroke.getKeyStroke( KeyEvent.VK_O, 0 ), "ok");
            am.put( "ok", okAction );
            im.put(KeyStroke.getKeyStroke( KeyEvent.VK_C, 0 ), "cancel");
            am.put( "cancel", cancelAction );
            // Create and add OK & Cancel buttons:
            JButton okButton = new JButton(okAction);
            JButton cancelButton = new JButton(cancelAction);
            Box box = Box.createHorizontalBox();
            box.add( Box.createHorizontalGlue() );
            box.add( okButton );
            box.add( Box.createHorizontalStrut(10) );
            box.add( cancelButton );
            box.add( Box.createHorizontalGlue() );
            getContentPane().add( box );
            setSize(300, 300);
            setLocationRelativeTo(null);
        public static void main(String[] args) {
            new PressOTest().setVisible(true);
    }

  • Call for participation: OASIS Enterprise Key Management Infrastructure TC

    We would welcome your participation in this process. Thank you.
    Arshad Noor
    StrongAuth, Inc.
    To: OASIS members & interested parties
    A new OASIS technical committee is being formed. The OASIS Enterprise Key
    Management Infrastructure (EKMI) Technical Committee has been proposed by the
    members of OASIS listed below. The proposal, below, meets the requirements of
    the OASIS TC Process [a]. The TC name, statement of purpose, scope, list of
    deliverables, audience, and language specified in the proposal will constitute
    the TC's official charter. Submissions of technology for consideration by the
    TC, and the beginning of technical discussions, may occur no sooner than the
    TC's first meeting.
    This TC will operate under our 2005 IPR Policy. The eligibility
    requirements for becoming a participant in the TC at the first meeting (see
    details below) are that:
    (a) you must be an employee of an OASIS member organization or an individual
    member of OASIS;
    (b) the OASIS member must sign the OASIS membership agreement [c];
    (c) you must notify the TC chair of your intent to participate at least 15
    days prior to the first meeting, which members may do by using the "Join this
    TC" button on the TC's public page at [d]; and
    (d) you must attend the first meeting of the TC, at the time and date fixed
    below.
    Of course, participants also may join the TC at a later time. OASIS and the TC
    welcomes all interested parties.
    Non-OASIS members who wish to participate may contact us about joining OASIS
    [c]. In addition, the public may access the information resources maintained for
    each TC: a mail list archive, document repository and public comments facility,
    which will be linked from the TC's public home page at [d].
    Please feel free to forward this announcement to any other appropriate lists.
    OASIS is an open standards organization; we encourage your feedback.
    Regards,
    Mary
    Mary P McRae
    Manager of TC Administration, OASIS
    email: mary.mcrae(AT)oasis-open.org
    web: www.oasis-open.org
    a) http://www.oasis-open.org/committees/process.php
    b) http://www.oasis-open.org/who/intellectualproperty.php
    c) See http://www.oasis-open.org/join/
    d) http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=ekmi
    CALL FOR PARTICIPATION
    OASIS Enterprise Key Management Infrastructure (EKMI) TC
    Name
    OASIS Enterprise Key Management Infrastructure (EKMI) TC
    Statement of Purpose
    Public Key Infrastructure (PKI) technology has been around for more than a
    decade, and many companies have adopted it to solve specific problems in the
    area of public-key cryptography. Public-key cryptography has been embedded in
    some of the most popular tools -- web clients and servers, VPN clients and
    servers, mail user agents, office productivity tools and many industry-specific
    applications -- and underlies many mission-critical environments today.
    Additionally, there are many commercial and open-source implementations of PKI
    software products available in the market today. However, many companies across
    the world have recognized that PKI by itself, is not a solution.
    There is also the perception that most standards in PKI have already been
    established by ISO and the PKIX (IETF), and most companies are in
    operations-mode with their PKIs -- just using it, and adopting it to other
    business uses within their organizations. Consequently, there is not much left
    to architect and design in the PKI community.
    Simultaneously, there is a new interest on the part of many companies in the
    management of symmetric keys used for encrypting sensitive data in their
    computing infrastructure. While symmetric keys have been traditionally managed
    by applications doing their own encryption and decryption, there is no
    architecture or protocol that provides for symmetric key management services
    across applications, operating systems, databases, etc. While there are many
    industry standards around protocols for the life-cycle management of asymmetric
    (or public/private) keys -- PKCS10, PKCS7, CRMF, CMS, etc. -- however, there is
    no standard that describes how applications may request similar life-cycle
    services for symmetric keys, from a server and how public-key cryptography may
    be used to provide such services.
    Key management needs to be addressed by enterprises in its entirety -- for both
    symmetric and asymmetric keys. While each type of technology will require
    specific protocols, controls and management disciplines, there is sufficient
    common ground in the discipline justifying the approach to look at
    key-management as a whole, rather than in parts. Therefore, this TC will
    address the following:
    Scope
    A) The TC will create use-case(s) that describe how and where
    the protocols it intends to create, will be used;
    B) The TC will define symmetric key management protocols,
    including those for:
    1. Requesting a new or existing symmetric key from a server;
    2. Requesting policy information from a server related to caching of keys on the
    client;
    3. Sending a symmetric key to a requestor, based on a request;
    4. Sending policy information to a requestor, based on a request;
    5. Other protocol pairs as deemed necessary.
    C) To ensure cross-implementation interoperability, the TC will create a test
    suite (as described under 'Deliverables' below) that will allow different
    implementations of this protocol to be certified against the OASIS standard
    (when ratified);
    D) The TC will provide guidance on how a symmetric key-management infrastructure
    may be secured using asymmetric keys, using secure and generally accepted
    practices;
    E) Where appropriate, and in conjunction with other standards organizations that
    focus on disciplines outside the purview of OASIS, the TC will provide input on
    how such enterprise key-management infrastructures may be managed, operated and
    audited;
    F) The TC may conduct other activities that educate users about, and promote,
    securing sensitive data with appropriate cryptography, and the use of proper
    key-management techniques and disciplines to ensure appropriate protection of
    the infrastructure.
    List of Deliverables
    1. XSchema Definitions (XSD) of the request and response protocols (by August
    2007) 2. A Test Suite of conformance clauses and sample transmitted keys and
    content that allows for clients and servers to be tested for conformance to the
    defined protocol (by December 2007)
    3. Documentation that explains the communication protocol (by August 2007)
    4. Documentation that provides guidelines for how an EKMI may be built,
    operated, secured and audited (by December 2007)
    5. Resources that promote enterprise-level key-management: white papers,
    seminars, samples, and information for developer and public use. (beginning
    August 2007, continuing at least through 2008)
    Anticipated Audiences:
    Any company or organization that has a need for managing cryptographic keys
    across applications, databases, operating systems and devices, yet desires
    centralized policy-driven management of all cryptographic keys in the
    enterprise. Retail, health-care, government, education, finance - every industry
    has a need to protect the confidentiality of sensitive data. The TC's
    deliverables will provide an industry standard for protecting sensitive
    information across these, and other, industries.
    Security services vendors and integrators should be able to fulfill their use
    cases with the TC's key management methodologies.
    Members of the OASIS PKI TC should be very interested in this new TC, since the
    goals of this TC potentially may fulfill some of the goals in the charter of the
    PKI TC.
    Language:
    English
    IPR Policy:
    Royalty Free on Limited Terms under the OASIS IPR Policy
    Additional Non-normative information regarding the start-up of the TC:
    a. Identification of similar or applicable work:
    The proposers are unaware of any similar work being carried on in this exact
    area. However, this TC intends to leverage the products of, and seek liaison
    with, a number of other existing projects that may interoperate with or provide
    functionality to the EKMI TC's planned outputs, including:
    OASIS Web Services Security TC
    OASIS Web Services Trust TC
    W3C XMLSignature and XMLEncryption protocols and working group
    OASIS Digital Signature Services TC
    OASIS Public Key Infrastructure TC
    OASIS XACML TC (and other methods for providing granular access-control
    permissions that may be consumed or enforced by symmetic key management)
    b. Anticipated contributions:
    StrongAuth, Inc. anticipates providing a draft proposal for the EKMI protocol,
    at the inception of the TC. The current draft can be viewed at:
    http://www.strongkey.org/resources/documentation/misc/skcl-sks-protocol.html
    and a working implementation of this protocol is available at:
    http://sourceforge.net/projects/strongkey for interested parties.
    c. Proposed working title and acronym for specification:
    Symmetric Key Services Markup Language (SKSML), subject to TC's approval or
    change.
    d. Date, time, and location of the first meeting:
    First meeting will be by teleconference at:
    Date: January 16, 2007
    Time: 10 AM PST, 1PM EST
    Call in details: to be posted to TC list
    StrongAuth has agreed to host this meeting.
    e. Projected meeting schedule:
    Subject to TC's approval, we anticipate monthly telephone meetings for the first
    year. First version of the protocol to be voted on by Summer 2007. StrongAuth is
    willing to assist by arranging for the teleconferences; we anticipate using
    readily available free teleconference services.
    f. Names, electronic mail addresses, of supporters:
    Ken Adler, ken(AT)adler.net
    June Leung,June.Leung(AT)FundServ.com
    John Messing, jmessing(AT)law-on-line.com
    Arshad Noor, arshad.noor(AT)strongauth.com
    Davi Ottenheimer, davi(AT)poetry.org
    Ann Terwilliger, aterwil(AT)isa.com
    g. TC Convener:
    Arshad Noor, arshad.noor(AT)strongauth.com

    Hi Bilge,
    did you put your text in a blender before sending it?
    I understood everything works fine except the miscellaneous menu item in the configuration tab of ERM?
    Have you already tried to clear all browser cache, close all browsers and try it again?
    Best,
    Frank

  • Control key used to bring up the zoom tool but now...

    you have to use control+option. I really really want to change this back so that
    just shift brings zoom up temporarily. Looked in key commands, cant find it
    anywhere. Please please help. Pleasey please

    This functionality has changed in LP8 to become more standard across applications, it is not optional.
    But the keys are right next to each other, so it shouldn't be that much of a chore to relearn in practice.

  • Change Applescript Actions Based On Key?

    I'm writing an Applescript, and distributing it to many different people. What I want it to do is go through the actions normally, but if the "C" key is held down, it goes to the config window. I'm running Mac Os 10.7.5, normal Applescript. What I have so far is:
    tell application "System Events"
                        try
                                  if keystroke "C" is down then
                                            beep 5
                                  end if
                        on error
                        end try
              end tell
    It compiles and runs, but doesn't react when I press the "C" key, even when I set it to endlessly repeat. Is there a working version of this?

    The System Events keystroke command is for sending keystrokes, not receiving or looking for key presses.  Regular AppleScript is not really designed for things like this, so you will need to use other tools.  There is a shell script to check for modifier keys (for example, look for the option key instead of the C key) - take a look at this MacScripter post.

  • Key differencess bet'n Altrnative condtion base value and Alternative calcu

    Hi All
    I read many times even though I have dought in pricing where in, differentating Altrnative condtion base value and Alternative calculation type.
    I know these two are forumalas.
    I am looking for key differencess bet'n Altrnative condtion base value and Alternative calculation type
    Where & which senario I can make out  the differnces bet'n Altrnative condtion base value and Alternative calculation type.
    Please explain in details which can keep in mind for long run...
    Thanks in advance.
    Regards,
    Ramkrishna.

    Hi Rama krishna
    go thru this....u can make difference and will have idea too
    AltCty - Condition formula for alternative calculation type:
    It is again a Routine that is written by ABAP Consultant.
    It is an alternative formula for the condition type that can be used instead of standard
    formulas.
    For example, let us take the Profit Margin which can be both + / - , so here this
    routine will help us in generating the value which can be either + or -. Profit margin is
    not a condition type so it cannot be classified as +ve or -ve in the V/06.
    Ex.: 950 0 Profit Margin 11.
    So we assign 11 - Profit Margin.
    If new routines are to be defined we follow the procedure given below.
    Go to T.Code: VOFM. - Maintain Requirements & Formulas
    Click on the "Formulas" and then on the "Condition Values".
    We have a list of routines, we can ask ABAP consultant to create new routines
    based on the client requests. And we assign the application type.
    AltCBV - Alternative formula for condition base value:
    Formula for determining the condition basis as an alternative to the standard.
    It is again a Routine that is written by ABAP Consultant.
    It is used as a basis to calculate value of the condition type instead of using it from the
    "FROM" column.· Ex.: Freight - KF00.
    Freight is calculated based on weight, volume etc. and not on the base price. In pricing
    there is no entry of weight from which the value can be referred like we do for
    discounts using base price. We have to get the value from the Material master.
    In this column we can mention the value as 12 - Gross Weight or 13 - Net Weight.
    During pricing, the system will consider the value that is mentioned in this column and
    determine the freight based on this value.
    Suppose we have Net weight: 100 kgs and Gross Weight: 150 kgs. And if we mention
    13 in this column then the Freight condition KF00 will be calculated using the weight
    as 100 kgs.
    Thanks and regards
    Chandra

Maybe you are looking for

  • How do I restrict access so users can only visit certain sites?

    At work we are setting up a laptop in order to do only one thing - use one particular website. I'd like to make sure nobody can visit any other sites.

  • AE CS6 trial to full version problem

    I have a problem with my After Effects CS6; at first I downloaded and installed a trial version of it, but after a while I decided to get the full package. So I upgraded my CS5.5 Master Collection to CS6 Production Premium, but After Effects CS6 cont

  • 30GB iPod stops in middle of songs shows apple on screen

    I have a brand new 30GB iPod I'm running on Windows xp. In the middle or at anytime during a song the ipod with stop playing, show an apple against a black screen for about 5 seconds then return to the main menu. I have latest iTunes, I've updated it

  • Cost Estimate Currency Display

    Hi, When I run cost estimate with 2 different currency settings in the system, how do I permanently make the display to always show cost estimate in USD (controlling area currency ) and not EURO (company code currency)?

  • Modify the message type for the Message no. CK239

    Hi, I would like to change the message type E to W for the message CK239. Is it possible? Thanks. Jean-Marc