Posting Error for Pensioner who are with some Third party Deductions

Dear all:
While posting Payroll result to FI, there is a issue that  "cost centre is not assigned" for the pensioners(Who are with some deductions like income Tax, bank Loan and so on) . The Cost Centre is assigned with Org Unit and Positon, but for pensioners, there is no position in the org unit.
how we could handle it?
Any tip is greatly appreciated,
Thank a lot in advance!

Hi Sathya,
This is how we have setup the retirees (pensioners).
If we speak about the pensioners from Business point of view, then there should be only pensioner department (or PA) and every retiree should be assign to it.
So we have created one position which is applicable to every retiree and only assigned to org unti (retiree) which has the cost center default on it.
Try presenting this structure to your client. This will surely simplify the business processes around pensioners.
Arti

Similar Messages

  • How can I make a bootable disk with some third party applications to use?

    My Macbook's performance has slowed WAY down and I want to try running a couple of different tools on it to optimize it.
    Thing is, some if not all of them require you to boot from a different disk, and since I got them online, I don't have bootable CDs for them.
    The OS X install disk doesn't allow you to access files on your HD and neither does DiskWarrior's DVD, so is there any way at all to make a bootable CD which will show me a finder window with the tools I need or anything like that?
    I KNOW that BootCD exists for older versions of mac, and frustratingly that's the only answer I have come across online despite the fact that it doesn't work for Tiger.
    Please help, any advice would be greatly appreciated.

    Argh, posted this in the wrong section, AND I figured out how to do it myself anyway...
    Could a mod please close this? Apologies to everyone for making a balls of this

  • Integration of Oracle Apps with the Third Party Label Printing Software(Bar

    Hi,
    I am integrating Oracle Apps R12 with the third party Label Printing Software(Bartender).
    For generating the Label, I have to create the XML file in Oracle Apps and with the help of Oracle WMS i have to transfer the XML file to the TCP/IP Port.
    Third Party Label Printing Software will pick the file from the TCP/IP Port.
    I am not able to find the way to send the XML file generated by the concurrent program to the TCP/IP Port using Oracle WMS.
    Below are the few links for Oracle WMS:
    http://docs.oracle.com/cd/B25284_01/current/acrobat/115wmsug.pdf
    http://docs.oracle.com/cd/E18727_01/doc.121/e13434/T210618T210847.htm#T210864
    Thanks In Advance..

    Pl do not post duplicates - Integration of Oracle Apps with the Third Party Label Printing Software

  • What antivirus is better for those who work with mac and windows?

    In my home I use an iMac, but in college I use Windows, and more than once I found an infected file. I know not affect iMac, but I prefer that viruses are removed. Right now I use ClamXv, but I don't know if it is effective.
    Am I to continue using ClamXv? or, do I use another?
    If there are others better AV for mac, what is most recommended?
    **I have also used Sophos, but it makes the iMac go very slow.
    Thanks for your attention.

    1. This is a comment on what you should and should not do to protect yourself from malicious software ("malware") that circulates on the Internet. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to your computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
       3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandboxing security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know what is safe?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one, is unsafe.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders," for example, are outside the safe harbor, though not all are malware.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe. For instance, if a web page warns you that Flash is out of date, do not follow an offered link to an update. Go to the Adobe website to download it, if you need it at all.
    There is an increasing tendency for rogue websites such as "Softonic" and "CNET Download" to distribute free applications that have been packaged in a superfluous installer that also installs malware or something else that you don't want. Never visit those sites, and get all freeware directly from the developer's own site whenever possible.
    Software attached to email that you didn't request is unsafe, even if it comes (or seems to come) from someone you trust.
    Software advertised by means of spam is unsafe.
    Unknown "free" software that a stranger on the Internet is eager for you to download is unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    "FREE WI-FI !!!" networks in public places are unsafe unless you can verify that the network is not a trap (which you probably can't.) Even then, do not download any software or transmit any private information while connected to such a network, regardless of where it seems to come from or go to.
    I don't say that leaving the safe harbor just once will inevitably result in disaster, but making a habit of it will weaken your defenses against malware attack. Doing any of the things alluded to above should make you uncomfortable.
       6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. New threats are emerging on a daily basis. Research has shown that most successful attacks are "zero-day" — that is, previously unknown. Recognition-based malware scanners do not defend against such attacks.
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware, and even for that use it's not completely effective. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular trojan it is, but do you really care? In practice, there's seldom a reason to use the software unless an institutional policy requires it. Windows malware is so widespread that you should assume it's in every unknown email attachment until proven otherwise.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither should you assume that you will always be safe from exploitation, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. "Hmmmm, this torrent is a crack of that new game I want. I think I'll download it. It could be a trojan, but the antivirus will warn me if it is." Then they wonder why their Mac is so slow all of a sudden. It's slow because it's running flat out mining bitcoins for a hacker who has already sold their credit card number and banking passwords to a criminal gang. Maybe a week later the antivirus does warn them, but what good does that do?
    Nothing can lessen the need for safe computing practices.

  • 'Missing select' error for update statement using WITH clause

    Hi,
    I am getting the below error for update statement using WITH clause
    SQL Error: ORA-00928: missing SELECT keyword
      UPDATE A
      set A.col1 = 'val1'
         where
      A.col2 IN (
      WITH D AS
      SELECT col2 FROM
      (SELECT col2, MIN(datecol) col3 FROM DS
      WHERE <conditions>
        GROUP BY PATIENT) D2
      WHERE
      <conditions on A.col4 and D2.col3>

    Hi,
    The format of a query using WITH is:
    WITH  d  AS
        SELECT  ...  -- sub_query
    SELECT  ...   -- main query
    You don't have a main query.  The keyword FROM has to come immediately after the right ')' that ends the last WITH clause sub-query.
    That explains the problem based on what you posted.  I can't tell if the real problem is in the conditions that you didn't post.
    I hope this answers your question.
    If not, post a complete test script that people can run to re-create the problem and test their ideas.  Include a little sample data (CREATE TABLE and INSERT statements, relevant columns only) for all the tables involved, and the results you want from that data.
    In the case of a DML operation (such as UPDATE) the sample data should show what the tables are like before the DML, and the results will be the contents of the changed table(s) after the DML.
    Explain, using specific examples, how you get those results from that data.
    Always say what version of Oracle you're using (e.g. 11.2.0.2.0).
    See the forum FAQ: https://forums.oracle.com/message/9362002

  • How to get the online user  who are browse some view?

    i want to get the current users who are browsing some view in EP6.additonal:which is developed as web dynpro project.

    Hi,
    Per my knowledge, we cannot get the SharePoint user context available in custom federated search connector with other methods.
    Here is a similar thread for your reference:
    https://answers.atlassian.com/questions/263735/atlassian-sharepoint-connector-federated-search-authentication-and-authorization
    Thanks,
    Linda Li                
    Forum Support
    Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Subscriber Support, contact
    [email protected]
    Linda Li
    TechNet Community Support

  • Task appearing for users who are not subordinates

    Hi All,
    I have an issue where user is getting approval messages for employees who are not his subordinates.
    I have checked the org structure, everything appears to be ok.
    Can anyone help.

    Dear Deepali,
    Kindly check the workflow settings for your approval process.
    Good Luck.
    Om.

  • Are there any third party pacakages for plant maintenance that can be interfaced with

    are there any third party plant maintenance packages that interface with OPM? does Oracle apps have a module for plant maintenance?

    I'm working for a leading Food Industry in Kuwait (The Kuwaiti Danish Dairy Co.) We have a massive implementation of OPM with 24 modules, BI tools (OSA, OFA) and Maximo (The only third party package) integrated with Oracle. OPM version is 11.0.3 on database 8.0.5. Now you have option of 11i (eAM) with POC (PM) or Maximo 5i integrated with 11i (and of course any other 3rd party solution which can be integrated with OPM).
    You can write to me on: [email protected] or call me on: +965-9650172 for details.
    All the best.

  • Grüße Fräulein, Sturm-Verbot-Führer, Hello, we are with some questions

    Grüße Fräulein, Sturm-Verbot-Führer, Hello, we are with some questions about the thought of GBP 77.336, apparently some of our local chapters of chicken producers in Mexico, should be changed, put a small bed of sand and tents in the city. One of the Mexicans, all connections Poncho sniffing glue every time you see him with a hatchet to cut the data cable with an ax. We called immigration and the nature of the problem and Poncho and his producer was a kind of rebellion, threw the chicken **bleep** on the government and is working like crazy NAP. Bryan and our engineers, it seems that the costs of these persons from Mexico, is excited because he said he misses his family in the Middle East, Verizon, I called our 1-800 number and were glad we had rotary phones , but said that someone would go to see these issues with Peter Nam and poncho, if you write an element upstream of the cut of radiation accelerate our DSLAM. Now, with all kinds of components, is accelerating as bowling, and then started kind of breakdown of carbon molecules locally is not always the Internet is like living in Mount St. Helens.

    I'm afraid I don't understand the question.
    If a forum member gives an answer you like, give them the Kudos they deserve. If a member gives you the answer to your question, mark the answer as Accepted Solution so others can see the solution to the problem.
    "All knowledge is worth having."

  • Looking for a SIP VOIP with some free trial credit

    Hi...
    Looking for a SIP VOIP with some free trial credit
    Can anyone suggest any ?
    Harry

    Hi...
    Looking for a SIP VOIP with some free trial credit
    Can anyone suggest any ?
    Harry

  • IOS 5 Notifications Not Working for Some Third Party Apps

    Recently updated my iPhone 4 to iOS5. Notification center worked perfectly for a week, but then I noticed that certain apps (Beluga) would not show up in the notification center despite receiving new messages. The home page didnt update with a badge either. It seems as if push notifications for some third party apps are not working correctly.
    I have already attempted all of these to correct the problem to no avail:
    1. Confirming notification settings for each application
    2. Turning notifications off and then on
    3. Removing and reinstalling app
    4. Restarting the iPhone
    5. Shutting down and powering up the iPhone
    6. Restoring the iPhone

    Having the same problem...  Ipad 2 running iOS 5 working fine.  My iPhone 4s gets the occasional Facebook notification but not much else.  Got home today and had about 5 notifications on the iPad that never came through to the iPhone.  Tried everything you tried and nothing....

  • My wireless earbuds work just fine, but some third-party apps play audio only through the iPod speaker even though the buds are properly connected.

    My wireless earbuds work just fine, but some third-party apps play audio only through the iPod and iPhone speaker even though the buds are properly connected. Does anyone know why and is there a solution?

    Assuming you are using Bluetooth headphones, do the apps have the option to use Bluetooth?
    The app should have an option to select the speaker (or wired earphones) or the Bluetooth headphones.
    You can also try:
    iOS: Troubleshooting applications purchased from the App Store
    Contact the developer/go to their support site if only one app.
    Restore from backup. See:
    iOS: How to back up              
    Restore to factory settings/new iPod

  • A "VZW free msg" says a phone on my account "made a charge with a third-party vendor ... ."

    This evening, I got a "VZW free msg" alerting me that a phone on my account had "made a charge with a third-party vendor." This is the second such message I've gotten this billing period. The messages are identical. My bill for the current billing period won't be ready till this weekend, so I have no way to track down any details. The phone belongs to my wife, and I am absolutely certain that she has not billed anything to her phone. The maddening thing about these messages is they give no details. Who's the third-party vendor? How much was the charge? What did my wife supposedly buy? No such details appear in the text message, and I can't find details anywhere on the My Verizon site.
    This text message does add: "For details or to block such charges: www.verizonwirel." (That's correct as written—I presume some of the message got truncated. That's how the message appeared both times.) However, I can't find any documentation about how to block these charges.
    After I got the first of these messages, I called Verizon's customer service number (800.922.0204). A very pleasant gentleman noted my concern and checked my account. He found no such third-party charges, and he advised me to look carefully at my next bill. I left it at that until I got the second message this evening.
    Speaking of customer service: This evening, I tried twice calling Verizon's customer service number. Both times, the call ended with a recorded voice telling me, "I'm sorry, but your call cannot be processed at this time. Please try your call later." Huh? Why not an offer to leave my number for a call-back? They as much as hung up on me. Not impressed. And, by the way, why doesn't Verizon post their customer service number on the Web site? I had to dig up the number by way of www.gethuman.com.

    Contact us on every page has the number.
    *611 from your device works as well.
    That third party stuff is probably "cramming" Verizon just got hit with this practice which is illegal.
    The law states you can call Verizon up and have them place a permenant block on third party services.
    They cannot refuse and you do not have to pay for them.
    Notify the FCC http://www.FCC.gov or the Federal Trade Commission http://www.FTC.gov
    Good Luck

  • Plz requesting kindly for screen shots of intercompany and third party sale

    Hi btothers,
    Am into new project where we have intercompany sales and third party sales ,can any one plz send me with step by step screen shots to my mail id [email protected]
    Thanks & regards,
    srinivas

    Hi Srinu,
    Please find below the complete Documentation on Third Party Sales and Intercompany Process.
    THIRD PARTY SCENARIO:
    In third-party order processing, your company does not deliver the items requested by a customer. Instead, you pass the order along to a third-party vendor who then ships the goods directly to the customer and bills you. A sales order may consist partly or wholly of third-party items. Occasionally, you may need to let a vendor deliver items you would normally deliver yourself.
    Process Flow
    The processing of third-party orders is controlled via material types. Material types define whether a material is produced only internally, can be ordered only from third-party vendors, or whether both are possible. For example, a material that is defined as a trading good can only be ordered from a third-party vendor. However, if you manufacture your own finished products, you may also want, from time to time, to be able to order the same type of product from other vendors.
    Processing Third-Party Orders in Sales
    Third-party items can be created automatically by the system, depending on how your system is set. However, you can also change a standard item to a third-party item during sales processing manually.
    Automatic third-party order processing
    If a material is always delivered from one or more third-party vendors, you can specify in the material master that the material is a third-party item. During subsequent sales order processing, the system automatically determines the appropriate item category for a third-party item: TAS. To specify a material as a third-party item, enter BANS in the Item category group field in the Sales 2 screen of the material master record.
    Manual third-party order processing
    In the case of a material that you normally deliver yourself but occasionally need to order from a third-party vendor, you can overwrite the item category during sales order processing. For a material that you normally deliver yourself, you specify the item category group NORM in the material master.
    If, as an exception, you use a third-party material, change the entry TAN to TAS in the ItCa field when processing the sales document. The item is then processed as third-party item.
    If address data for the ship-to party is changed in the sales order in third-party business transactions, the changed data will automatically be passed on to purchase requisition and also to the purchase order ,if one already exists. In the purchase order, you can display the address data for the ship-to party in the attributes for the item.
    You can only change the address data for the ship-to party in the sales order for third-party business transactions, and not in the purchase order.
    Processing Third-Party Orders in Purchasing
    When you save a sales order that contains one or more third-party items, the system automatically creates a purchase requisition in Purchasing. Each third-party item in a sales order automatically generates a corresponding purchase requisition item. During creation of the requisition, the system automatically determines a vendor for each requisition item. If a sales order item has more than one schedule line, the system creates a purchase requisition item for each schedule line.
    Purchase orders are created from purchase requisitions in the usual way. For more information about creating purchase orders, see the Purchasing documentation. During creation of the purchase order, the system automatically copies the delivery address of your customer from the corresponding sales order. In a sales order, you can enter purchase order texts for each third-party item. When you create the corresponding purchase order, the texts are automatically copied into the purchase order. The number of the purchase order appears in the document flow information of the sales order.
    All changes made in the purchase order are automatically made in the sales order as well. For example, if the vendor confirms quantities and delivery dates different from those you request and enters them in the purchase order, the revised data is automatically copied into the sales order
    You process third-party items by creating a normal sales order. In overview for the order, you can then overwrite the default item category (TAN in the standard system) with the special item category for third-party items: TAS
    Billing Third-Party Orders
    If relevance for billing indicator for the item category has been set to B (relevant for order-related billing on the basis of the order quantity) in Customizing, the system includes the order in the billing due list immediately. If, however, the indicator has been set to F (relevant to order-related billing on the basis of the invoice quantity), the system does not include the order in the billing due list until an invoice from the vendor has been received and processed by the purchasing department. In the standard system, item category TAS (third-party order processing) has been given billing-relevance indicator F.
    In the first case, the third-party order is considered to be completely billed only when the invoiced quantity equals the order quantity of the sales order item. In the second case, each time a vendor invoice is received, a customer invoice is created for the quantity in the vendor invoice and the order is considered to be fully invoiced until the next vendor invoice is received.
    If you have activated billing-relevance indicator F for item categories in Customizing, billing can refer to the goods receipt quantity instead of the incoming invoice quantity.
    You can control whether the invoice receipt quantity or the quantity of goods received is relevant for billing in Customizing for copying control for billing at item level.
    FOR YOUR PROCESS Individual Purchase Orders WELL GIVE THE RIGHT SOLUTION
    Individual purchase orders are used when your customer orders goods from you that are not in stock and must be ordered from one or more external vendors.
    Process Flow
    During sales order entry, the system automatically creates a purchase requisition item. The purchasing department creates a purchase order based on the requisition and the vendor ships the goods directly to you (unlike third party order processing, where the vendor ships directly to your customer). You then ship the goods to your customer. While the goods are part of your inventory, you manage them as part of the sales order stock. Sales order stock consists of stock that is assigned to specific sales orders and cannot be used for other purposes.
    Process Flow for 3rd Party Sales
    Customize the third party sales in summary:
    Prerequisites for 3rd party sales,
    Purchasing org,
    purchasing group,
    assign the Purchase org to company code
    assign Purchase org to plant,
    should not maintain the stock in material, it should be trading goods,
    1. Create Vendor XK01
    2. Create Material – Material Type as "Trading Goods". Item category group as "BANS".
    3. Assign Item Category TAS to Order type that you are going to use.
    4. A sale order is created and when saved a PR is generated at the background
    5. With reference to SO a PO is created (ME21N). The company raises PO to the vendor.
    6. Vendor delivers the goods and raises bill to company. MM receives the invoice MIRO
    7. Goods receipt MIGO
    8. Goods issue
    9. The item cat TAS or Schedule line cat CS is not relevant for delivery which is evident from the config and, therefore, there is no delivery process attached in the whole process of Third party sales.
    10. Billing *--
    SD - 3rd party sales order Create Sales Order
    VA01
    Order Type
    Sales org, distr chnl, div
    Enter
    Sold to
    PO #
    Material
    Quantity
    Enter
    Save
    SD - 3rd party sales order View the PR that is created with a third party sales order
    VA01
    Order Number
    Goto Item Overview
    Item ->Schedule Item
    SD - 3rd party sales order View the PR that is created
    ME52N
    Key in the PR number
    Save
    SD - 3rd party sales order Assign the PR to the vendor and create PO
    ME57
    Key in the PR number
    Toggle the "Assigned Purchase Requisition"
    Execute
    Check the box next to the material
    Assign Automatically button
    Click on "Assignments" button
    Click on "Process assignment"
    The "Process Assignment Create PO" box , enter
    Drag the PR and drop in the shopping basket
    Save
    SD - 3rd party sales order Receive Goods
    MIGO_GR
    PO Number
    DN Number
    Batch tab , click on classification
    Serial Numbers tab
    Date of Production
    Flag Item OK
    Check, just in case
    Post
    Save
    SD - 3rd party sales order Create Invoice
    MIRO
    Invoice Date
    Look for the PO , state the vendor and the Material
    Check the box
    Click on "Copy"
    Purchase Order Number (bottom half of the screen)
    Amount
    State the baseline date
    Simulate & Post
    Invoice Number
    *Invoice blocked due to date variance
    SD - 3rd party sales order Create a delivery order
    VL01N
    In the order screen , go to the menu Sales Document , select "Deliver"
    Go to "picking" tab
    State the qty and save
    SD - 3rd party sales order Create a billing document
    VF01
    Ensure that the delivery document is correct in the
    Enter
    Go to edit -> Log
    Save
    Third party order processing is as follows:
    Assume three companies X, Y and Z
    X - The company,
    y - The customer
    Z - Vendor
    When ever X gets a PO from Y to supply some goods, X has an option of either manufacturing those goods or procuring those goods.
    If he is procuring the goods, there are two methods that are generally followed:
    Method 1) After receiving the PO from Y, X creates a sales order against Y.
    Now at the same time he also creates a PO to a vendor Z to produce the goods
    Z produces the goods and supplies to X
    X receives the goods from Z
    Then X delivers the same goods to Y.
    After that X invoices Y and Z invoices X.
    Note : Here there is no direct/ Indirect relation between Z and Y.
    This process is known as Trading Process. and the Material here is created with Material type HAWA.
    The other method is a Third party order processing method:
    Here the glaring difference is that instead of Z supplying the material to X and X in turn supplying the same material to Y.
    X authorizes Z to supply the material to Y on his behalf and notify him once the delivery is complete.
    Now Z supplies the material to Y and acknowledges the same to X.
    Z will send a copy of delivery acknowledgement and invoice to X.
    After receiving the delivery confirmation and invoice from Z, X has to verify the invoice and this process is known as invoice verification and is done in SAP through Tcode MIRO.
    The next step for X is to create an invoice and submit to Y
    Only after the invoice verification document is posted then only X can create an invoice for Y.
    This is the business flow that is followed for third party order configuration.
    There are few steps that have to be configured to enable the system to function as mentioned above.
    Step1)
    If you are always following a third party process for a material then you have to create the material using item category group BANS.
    The procurement type should be marked as External procurement (F) in MRP 2 view of the material master record.
    if you are not always allowing third party order processing then u can create a material master record with item category group as NORM and the procurement type should be marked as ( X) meaning both types of procurement ( in house manufacturing and external procurement).
    Step 2)
    the item category in the order should be manually changed as TAS.
    For that you need to configure the item category determination
    Order type + item cat Group + Usage + High level = Item cat + Manual item cat
    OR + NORM + + = TAN + TAS
    OR + BANS + + = TAS
    Step 3)
    make sure that during the item category configuration for TAS you need to mark relevant for billing indicator as F
    step 4)
    The schedule line category for this type should be CS.
    make sure that you mark subsequent type as NB - purchase requisition in this schedule line category as this will trigger the purchase requisition order immediately after the creation of the sales order and the PO to vendor is created against this purchase requisition.
    Intercompany Process:
    Go through the explanation given below with test cases.
    Business case: -
    Customer orders goods to company code/Sales organization A (Eg.4211/4211).Sales org 4211 will accept and punch the order in the system with sold to party as end customer code in the system. Company code/sales org B (Eg.4436) will deliver the goods to end customer and raise an intercom any billing on 4211 with reference to delivery. This can happen only after 4211 raises invoice to his end customer to whom the material has been delivered by 4436.
    SPRO Customization required:-
    1. Assign plant of delivering company code (Eg.SI81) to sales org/distribution channel combination of ordering company code (Eg.4211/RT)
    2. Maintain intercom any billing type as IV for sales document type OR
    3. Assign Organizational Units By Plant (Eg.SI81/4211/RT/11)
    4.Define Internal Customer Number By Sales Organization (Eg.4436 will create customer master for 4211 company code and that number will be maintained in this relationship:-4211/231)
    5. Automatic posting to vendor account (Optional)
    6. Maintain pricing procedure determination for 4211/RT/A/1/RVAA01-For customer sales and billing
    Maintain pricing procedure determination for 4436/RT/A/1/ICAA01-For intercompony billing
    Master data to be maintained:-
    1. Create end customer master in company code/sales org 4211/RT/11
    2. Create customer master for 4211 company code/sales org in 4436/RT/11
    3. Maintain PR00 as price for end customer-Active in RVAA01
    4. Maintain PI01 as price which has to be paid to 4436-Statistical in RVAA01
    5. Maintain IV01 as inter-company Price-Active in ICAA01
    Process:-
    1. Create OR with sold to party as end customer.
    2. Plant to be selected is delivering plant belonging to different company code. With this selection system will treat this order as intercomany sales.
    3. Pricing procedure is RVAA01
    4. With reference to this order delivery will be created from the delivering plant and post the goods issue for this delivery.
    5. Ordering sales org will create billing document F2 with reference to delivery for end customer.
    6. Delivering sales org will create intercompany billing IV with reference to delivery document.
    Please Reward If Really Helpful,
    Thanks and Regards,
    Sateesh.Kandula

  • Home Monitoring and Control with a third party also monitoring and controllin​g?

    I was wondering if anyone has tried to install Home Monitoring and Control with a third party monitoring, and or controlling the same devices. I know many systems offer multiple control points such as auxilary control touch screens. Has anyone made this work? I have Z wave devices on my home security system (lighting), and would also like to monitor them via Verizon. Possibly also adding some energy monitoring and control, that is not available via my security company. My security monitoring company provide support through Alarm.com, but has limited energy monitoring to thermostat control and such.
    The only interactive control with my security company is for alarm monitoring and control, with limited lighting control. All of my devices are GE in the wall mounted lighting controls, and I would prefer to pay Verizon the few extra dollars for the additional features VIA the web, rather than pay Verizon. There used to be an energy package, that included the main power panel load and I thing Thermostat, but I believe some of the bundles have been split up.
    There are other options out there now, but I have neen exploring. My GE Switches are from the Lowes Iris system. Much less expensive, and can replace existing wall switches, not like the power cord switches. Plus the store is four miles from my house.

    I started with Verizon home monitoring, but if you read through the threads the service is extremely unreliable, still to this day. I am stillusing it, although I am waiting for a refund on the services that I have used since it is so bad but I bought a MiCasaVerde Vera3 system.  You pay appoximately $300 for the unit and there is no monthly charge and you get all the features plus pretty much unlimited types of z wave devices to use on it. I would seriously consider using that before Verizon.

Maybe you are looking for

  • Error when using Toplink Ant tasks - Several [3] SessionLoaderExceptions

    Hi, I'm trying to integrate toplink's session exports with my build process (Apache Ant). I've been working from the example here: http://download.oracle.com/docs/cd/E14571_01/web.1111/b32441/mw.htm My Ant init target and the session validation targe

  • Changing ipod over from Windows to Mac

    I've been using my ipod with my PC for the last 2 years and I now want to change it over to my powerbook. I have all the music on an external drive and will only be selecting some of the music to go on the ipod as the collection is larger than the po

  • Lightning to SD memory adapter

    I was told by a person in Radio Shack that the Lightning to sd memory card adapter will work on the iphone 5. I have had no luck, is there an app. or something I need, in order to use this?

  • Premiere Pro 1.5 -Gropping/Resize-

    Hallo zusammen, ich arbeite seit einiger Zeit mit APP 1.5 und suche bzw. hätte gerne gewußt ob es die Funktion "gropping" und "resize" - so wie bei VDUB - in dem Programm gibt bzw wo ich diese finde. Beim Support erhielt ich die Auskunft, dass es bei

  • Need help saving battery

    Hi, I'm using i phone 4 and recently after updating the software 6.1.3, my battery is draining fast. It is almost 20% in one hour. I've tried all the suggestion, clearing the calendars, clearing the mail account. None seems to be useful. Please help.