Queries about Enterprise Comp.Management
Hi Experts,
1/ Client system is on EHP-7 but when i check the Enterprise Compensation Management Section under Performance Management i could not find the Nod.
How to activate the ECM component in EHP-7, somewhere i read it is standard functionality as of EHP-6.
Is there any patch upgrade to be done, please guide.
Hi Experts,
Can anybody please put some light on the same.
Thanks.
Similar Messages
-
Hi guys,
I have been trying to figure out the place where the ECM resides in ECC 5.0. As far as I see, only PA - CM is available under PM. Do I need to have something additional(like extn 2.0) or something like that ? If it is related to the extn, can you tell me where to look at in the system which extn I am working on ?
Thanks in advance
Regards
Srivathsan>
Bala Duvvuri wrote:
> ECM is a part of MSS business package
NO.. MSS only provides the (WebDynpro) frontend to the ECM functionality but ECM as such is very much part of ECC.. You have to turn it on, in the IMG.. there is a switch Activate ECM under Global Settings..
~Suresh -
Solution Manager vs Enterprise Solution Manager
Dear All,
We already have solution manager installed in our SAP System landscape.
But a visiting consultant give a new word to managers about enterprise solution manager with following benefits.
1-If we have enterprise solution manager then SAP AG can access our system and inform us about system health.
2-If we have enterprise solution manager then SAP AG will react on our ticket not on what we send but on the the actual actual condition of system.
3-We can only utilize our support services in a right way if we have enterprise solution manager.
1- Now first where I can check that the installed solution manager is standard or enterprise?
2- The benefit which is listed above is really available in enterprise solution manager?
3- Any tutorial or link defining how to install and configure enterprise solution manager.
Any response will be highly appreciated
regards,
Syed Saifuddin
SAP BASIS AdministratorDear Paul
Following is the current Status of our Solution Manager
S / W Comp / Rels / Level / Highest support Package / Short Desc of Software Component
SAP_BASIS 700 0011 SAPKB70011 SAP Basis Component
SAP_ABA 700 0011 SAPKA70011 Cross-Application Component
PI_BASIS 2005_1_700 0011 SAPKIPYJ7B PI_BASIS 2005_1_700
ST-PI 2005_1_700 0006 SAPKITLQI6 SAP Solution Tools Plug-In
SAP_BW 700 0011 SAPKW70011 SAP NetWeaver BI 7.0
SAP_AP 700 0007 SAPKNA7007 SAP Application Platform
BBPCRM 500 0007 SAPKU50007 BBPCRM
CPRXRPM 400 0007 SAPK-40007INCPRXRPM SAP xRPM/cProjects/cFolders 4.00 (ABAP)
ST 400 0010 SAPKITL420 SAP Solution Manager Tool
ST-A/PI 01J_CRM500 0000 - Application Servicetools for CRM 500 / 5
ST-ICO 150_700 0005 SAPK-15075INSTPL SAP Solution Manager Implementation Cont
ST-SER 700_2006_1 0003 SAPKITLOG3 SAP Solution Manager Service Tools
Bachup Solution I will manage with Tivoli Storage Manager.
But give me a path to upgrade my Solution Manager to EHP1 or Solution Manager Enterprise Edition.
regards
Syed Saifuddin -
Enterprise Asset Management(EAM)
Hello Friends
I want to know about Enterprise Asset Management(EAM) ,whether it is an SAP process ,under SAP which module it covers .plz guide me in this.
Regards,
KiranHello
yes it is an SAP process and is integrated package but mainly comes under product life cycle management
http://www50.sap.com/businessmaps/32C13E8009BB4598B2A499A6554E0E67.htm
http://www.sap.com/solutions/business-suite/plm/featuresfunctions/asset.epx
thanks
Bhudev -
Enterprise Compensation Management Info Cube
SAP BI contains a special enterprise compensation management InfoCube and queries that can be used to analyze all compensation data in detail. Now, if one has to use R/3 4.6C for the backend compensation management, can this InfoCube (using BW 3.5 on NW '04) be leveraged?...or, does the back-end have to be upgraded to the '04 Business Suite level?
Quick response from someone who has done it or from SAP will be highly appreciated!!!Bryan,
Great response. One last question: The comment you have made about what we get with "BI Content 3.5.1 (same as BI Content 3.3 Add-on)" in terms of the "1 InfoCube, enabling the evaluation of LTI awards" is of particular interest to us. To leverage this BI content, what should be in the back end? In other words, can I leverage this BI business content using R/3 4.6C in the backend or will I need to upgrade to mySAP ERP (NW '04) and mySAP HCM?
Thanks and regards,
Puneet
> Puneet,
>
> Yes, you can still use those in BW 3.5. If you go to
> the Business Content tab in the Administrator
> Workbench you'll see them. You can also check
> help.sap.com and the Service Marketplace alias /bw
> for more details on the content delivered with each
> release.
>
> With BI Content 3.5.1 (same as BI Content 3.3 Add-on)
> there is additional content delivered:
>
> The BW Business Content for mySAP HR Enterprise
> Compensation Management comprises:
>
> <u><b>Extractors</b></u> for transferring data from
> mySAP HR Enterprise Compensation Management (PA-EC)
> to SAP Business Information Warehouse
>
> Predefined Data Models, including:
>
> 8 ODS objects, collecting data about compensation
> processes, compensation budgets, employee pay
> categories, composite market data, raw market data,
> job matching, salary structure of jobs as well as
> active and planned salary structures
>
> 5 InfoSets, providing data on compensation processes,
> compensation budgets, Comparison of Market Data and
> Employee Payment, Salary Survey Market Data and Job
> Matching as well as Comparison of Salary Structure
> Against Market
>
> 1 InfoCube, enabling the evaluation of LTI awards
>
> 24 predefined standard queries
>
> Increased visibility of all information around the
> compensation management process at your enterprise.
>
> Thanks,
> Bryan
>
>
> Message was edited by: Bryan Katis -
With Arun Kumar
Welcome to the Cisco Support Community Ask the Expert conversation. This is an opportunity to learn and ask questions about Single Sign-On (SSO) with Cisco WebEx Meetings Server (Cisco WMS), Internet Reverse Proxy (IRP), and Enterprise License Manager (ELM) solutions.
SSO standards such as Security Assertion Markup Language (SAML) 2.0 provide secure mechanisms for passing credentials and related information between different websites that have their own authorization and authentication systems. SSO enables simplified user authentication and management.
IRP provides public access, enabling users to host or attend meetings from the Internet and mobile devices. Although IRP is optional, Cisco encourages its use because it provides a better user experience for your mobile workforce.
Example question topics include:
SSO profiles and SAML 2.0 Identity providers (IdPs) supported in Cisco WMS
Basic configuration of IdPs
Interaction between IdPs and Cisco WMS
Difference between the cloud client implementation and Cisco WMS
Meeting access behavior in a split-horizon network topology with SSO
How to enable public access to Cisco WMS
Cisco WMS ELM operations
Cisco WMS ELM compared to other unified communications ELM or standalone ELM and compatibility/inoperability between them
Arun Kumar is a team lead in the San Jose Conferencing Technical Assistance Center. He has over eight years of experience in conferencing technology and specializes in Cisco Unified Meeting Place Express and Cisco WebEx Meeting Server. He joined Cisco in 2010 as an escalation engineer for the Cisco Telepresence group. Before joining Cisco he worked for the UK's third-largest internet service provider Supanet on VoIP technology and the *Nix domain. Kumar holds a master of science degree in computer science from Sikkim Manipal University in India, and he holds CCIE (Voice) and VMware Certified Professional certifications.
Remember to use the rating system to let Arun know if you have received an adequate response.
Arun might not be able to answer each question because of the volume expected during this event. Remember that you can continue the conversation on the Collaboration, Voice, and Video community Other Subjects subcommunity shortly after the event. This event lasts through Monday May 17, 2013. Visit this forum often to view responses to your questions and the questions of other Cisco Support Community members.Hello Mobile Service,
CWMS and Jabber integrations:
http://www.cisco.com/en/US/docs/voice_ip_comm/jabber/Windows/9_1/JABW_BK_E4CC9599_00_environment-configuration-guide_chapter_01.html#JABW_TK_SF2ED5E1_00
In above link start from section: Set Up Cisco WebEx Meetings Server on Cisco Unified Presence
then move to section: Add Cisco WebEx Meetings Server to a Profile
Once done, move to section: Specify Conferencing Credentials in the Client side. You will see above server already listed there, just go ahead and enter your username and password (pleae make sure this user already exists on your CWMS) and accept any certificate/s if presented. Jabber Integration is done and you can start testing the same.
Attached CWMS - AFDS integration doc.
Please let me know if any furhter question.
Thanks, Arun -
Call for participation: OASIS Enterprise Key Management Infrastructure TC
We would welcome your participation in this process. Thank you.
Arshad Noor
StrongAuth, Inc.
To: OASIS members & interested parties
A new OASIS technical committee is being formed. The OASIS Enterprise Key
Management Infrastructure (EKMI) Technical Committee has been proposed by the
members of OASIS listed below. The proposal, below, meets the requirements of
the OASIS TC Process [a]. The TC name, statement of purpose, scope, list of
deliverables, audience, and language specified in the proposal will constitute
the TC's official charter. Submissions of technology for consideration by the
TC, and the beginning of technical discussions, may occur no sooner than the
TC's first meeting.
This TC will operate under our 2005 IPR Policy. The eligibility
requirements for becoming a participant in the TC at the first meeting (see
details below) are that:
(a) you must be an employee of an OASIS member organization or an individual
member of OASIS;
(b) the OASIS member must sign the OASIS membership agreement [c];
(c) you must notify the TC chair of your intent to participate at least 15
days prior to the first meeting, which members may do by using the "Join this
TC" button on the TC's public page at [d]; and
(d) you must attend the first meeting of the TC, at the time and date fixed
below.
Of course, participants also may join the TC at a later time. OASIS and the TC
welcomes all interested parties.
Non-OASIS members who wish to participate may contact us about joining OASIS
[c]. In addition, the public may access the information resources maintained for
each TC: a mail list archive, document repository and public comments facility,
which will be linked from the TC's public home page at [d].
Please feel free to forward this announcement to any other appropriate lists.
OASIS is an open standards organization; we encourage your feedback.
Regards,
Mary
Mary P McRae
Manager of TC Administration, OASIS
email: mary.mcrae(AT)oasis-open.org
web: www.oasis-open.org
a) http://www.oasis-open.org/committees/process.php
b) http://www.oasis-open.org/who/intellectualproperty.php
c) See http://www.oasis-open.org/join/
d) http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=ekmi
CALL FOR PARTICIPATION
OASIS Enterprise Key Management Infrastructure (EKMI) TC
Name
OASIS Enterprise Key Management Infrastructure (EKMI) TC
Statement of Purpose
Public Key Infrastructure (PKI) technology has been around for more than a
decade, and many companies have adopted it to solve specific problems in the
area of public-key cryptography. Public-key cryptography has been embedded in
some of the most popular tools -- web clients and servers, VPN clients and
servers, mail user agents, office productivity tools and many industry-specific
applications -- and underlies many mission-critical environments today.
Additionally, there are many commercial and open-source implementations of PKI
software products available in the market today. However, many companies across
the world have recognized that PKI by itself, is not a solution.
There is also the perception that most standards in PKI have already been
established by ISO and the PKIX (IETF), and most companies are in
operations-mode with their PKIs -- just using it, and adopting it to other
business uses within their organizations. Consequently, there is not much left
to architect and design in the PKI community.
Simultaneously, there is a new interest on the part of many companies in the
management of symmetric keys used for encrypting sensitive data in their
computing infrastructure. While symmetric keys have been traditionally managed
by applications doing their own encryption and decryption, there is no
architecture or protocol that provides for symmetric key management services
across applications, operating systems, databases, etc. While there are many
industry standards around protocols for the life-cycle management of asymmetric
(or public/private) keys -- PKCS10, PKCS7, CRMF, CMS, etc. -- however, there is
no standard that describes how applications may request similar life-cycle
services for symmetric keys, from a server and how public-key cryptography may
be used to provide such services.
Key management needs to be addressed by enterprises in its entirety -- for both
symmetric and asymmetric keys. While each type of technology will require
specific protocols, controls and management disciplines, there is sufficient
common ground in the discipline justifying the approach to look at
key-management as a whole, rather than in parts. Therefore, this TC will
address the following:
Scope
A) The TC will create use-case(s) that describe how and where
the protocols it intends to create, will be used;
B) The TC will define symmetric key management protocols,
including those for:
1. Requesting a new or existing symmetric key from a server;
2. Requesting policy information from a server related to caching of keys on the
client;
3. Sending a symmetric key to a requestor, based on a request;
4. Sending policy information to a requestor, based on a request;
5. Other protocol pairs as deemed necessary.
C) To ensure cross-implementation interoperability, the TC will create a test
suite (as described under 'Deliverables' below) that will allow different
implementations of this protocol to be certified against the OASIS standard
(when ratified);
D) The TC will provide guidance on how a symmetric key-management infrastructure
may be secured using asymmetric keys, using secure and generally accepted
practices;
E) Where appropriate, and in conjunction with other standards organizations that
focus on disciplines outside the purview of OASIS, the TC will provide input on
how such enterprise key-management infrastructures may be managed, operated and
audited;
F) The TC may conduct other activities that educate users about, and promote,
securing sensitive data with appropriate cryptography, and the use of proper
key-management techniques and disciplines to ensure appropriate protection of
the infrastructure.
List of Deliverables
1. XSchema Definitions (XSD) of the request and response protocols (by August
2007) 2. A Test Suite of conformance clauses and sample transmitted keys and
content that allows for clients and servers to be tested for conformance to the
defined protocol (by December 2007)
3. Documentation that explains the communication protocol (by August 2007)
4. Documentation that provides guidelines for how an EKMI may be built,
operated, secured and audited (by December 2007)
5. Resources that promote enterprise-level key-management: white papers,
seminars, samples, and information for developer and public use. (beginning
August 2007, continuing at least through 2008)
Anticipated Audiences:
Any company or organization that has a need for managing cryptographic keys
across applications, databases, operating systems and devices, yet desires
centralized policy-driven management of all cryptographic keys in the
enterprise. Retail, health-care, government, education, finance - every industry
has a need to protect the confidentiality of sensitive data. The TC's
deliverables will provide an industry standard for protecting sensitive
information across these, and other, industries.
Security services vendors and integrators should be able to fulfill their use
cases with the TC's key management methodologies.
Members of the OASIS PKI TC should be very interested in this new TC, since the
goals of this TC potentially may fulfill some of the goals in the charter of the
PKI TC.
Language:
English
IPR Policy:
Royalty Free on Limited Terms under the OASIS IPR Policy
Additional Non-normative information regarding the start-up of the TC:
a. Identification of similar or applicable work:
The proposers are unaware of any similar work being carried on in this exact
area. However, this TC intends to leverage the products of, and seek liaison
with, a number of other existing projects that may interoperate with or provide
functionality to the EKMI TC's planned outputs, including:
OASIS Web Services Security TC
OASIS Web Services Trust TC
W3C XMLSignature and XMLEncryption protocols and working group
OASIS Digital Signature Services TC
OASIS Public Key Infrastructure TC
OASIS XACML TC (and other methods for providing granular access-control
permissions that may be consumed or enforced by symmetic key management)
b. Anticipated contributions:
StrongAuth, Inc. anticipates providing a draft proposal for the EKMI protocol,
at the inception of the TC. The current draft can be viewed at:
http://www.strongkey.org/resources/documentation/misc/skcl-sks-protocol.html
and a working implementation of this protocol is available at:
http://sourceforge.net/projects/strongkey for interested parties.
c. Proposed working title and acronym for specification:
Symmetric Key Services Markup Language (SKSML), subject to TC's approval or
change.
d. Date, time, and location of the first meeting:
First meeting will be by teleconference at:
Date: January 16, 2007
Time: 10 AM PST, 1PM EST
Call in details: to be posted to TC list
StrongAuth has agreed to host this meeting.
e. Projected meeting schedule:
Subject to TC's approval, we anticipate monthly telephone meetings for the first
year. First version of the protocol to be voted on by Summer 2007. StrongAuth is
willing to assist by arranging for the teleconferences; we anticipate using
readily available free teleconference services.
f. Names, electronic mail addresses, of supporters:
Ken Adler, ken(AT)adler.net
June Leung,June.Leung(AT)FundServ.com
John Messing, jmessing(AT)law-on-line.com
Arshad Noor, arshad.noor(AT)strongauth.com
Davi Ottenheimer, davi(AT)poetry.org
Ann Terwilliger, aterwil(AT)isa.com
g. TC Convener:
Arshad Noor, arshad.noor(AT)strongauth.comHi Bilge,
did you put your text in a blender before sending it?
I understood everything works fine except the miscellaneous menu item in the configuration tab of ERM?
Have you already tried to clear all browser cache, close all browsers and try it again?
Best,
Frank -
Most Important Conference for Enterprise Content Management (ECM) marketplace in India
Enterprise Content Management (ECM) is no longer just about
technology, or just about content. It is about content, community,
and context. The deluge of data and information, coupled with the
ever-increasing need for compliance is forcing enterprises to take
a strategic look at ECM and its associated disciplines. To stack up
to competition, enterprises are looking up to faster, flexible, and
efficient business processes that can channelise copious,
unstructured information into meaningfully optimised, governed, and
digitally delivered data that is available to the right
stakeholders at the right time.
C-level executives, senior IT process management personnel,
marketing and content managers are looking to find the precise
solution that will fit the needs of their organization. What are
these available solutions, and how do they stack up to the needs of
a specific enterprise? What roles do strategic topics such as
Governance, Collaboration, Enterprise 2.0 play in the evaluation of
these solutions? What is a promising approach, and how do I find
the correct partners? The ECM track at Business Technology Summit
2008 offers strategic, technical, and business insights into all
aspects of ECM, including Business Process Management (BPM),
Business Rules Management (BRM), Master Data Management (MDM), Data
Warehousing & Knowledge Management, and Enterprise 2.0. The
summit will be held 22-26 September 2008 in Mumbai and Bangalore.
Summit website:
http://www.btsummit.com* Ismael Ghalimi is the father of Office 2.0. He is also
credited with creating the first standards-based BPMS?
* Nitin Borwankar is the father of Data 2.0?
* Alan Pelz Sharpe is an expert guest on BBC, CNN and ABC
Television
* Robert Marcus has been at the helm of technology at General
Motors, Boeing, Rogue Wave Software, MCC and HP?
* Peter Coffee, formerly technology editor at eWeek, has
appeared on CBS, NBC, CNN, Fox, and PBS newscasts.
* Kiran Datar co-introduced the concept of conferencing
services in India
* THAT YOU CAN REACH OUT TO ALL THESE CELEBRITY SPEAKERS AT
BT SUMMIT 2008?
VIEW THE COMPLETE SCHEDULE:
http://www.btsummit.com/summitSchedule.html
REGISTER NOW FOR AS LOW AS INR 2999/-:
http://www.btsummit.com/registration.html -
The Most Compelling Enterprise Content Management (ECM) Workshops in India
Enterprise Content Management (ECM) is no longer just about
technology, or just about content. It is about content, community,
and context. The deluge of data and information, coupled with the
ever-increasing need for compliance is forcing enterprises to take
a strategic look at ECM and its associated disciplines. To stack up
to competition, enterprises are looking up to faster, flexible, and
efficient business processes that can channelise copious,
unstructured information into meaningfully optimised, governed, and
digitally delivered data that is available to the right
stakeholders at the right time.
C-level executives, senior IT process management personnel,
marketing and content managers are looking to find the precise
solution that will fit the needs of their organization. What are
these available solutions, and how do they stack up to the needs of
a specific enterprise? What roles do strategic topics such as
Governance, Collaboration, Enterprise 2.0 play in the evaluation of
these solutions? What is a promising approach, and how do I find
the correct partners? The ECM track at Business Technology Summit
2008 offers strategic, technical, and business insights into all
aspects of ECM, including Business Process Management (BPM),
Business Rules Management (BRM), Master Data Management (MDM), Data
Warehousing & Knowledge Management, and Enterprise 2.0. The
summit will be held 22-26 September 2008 in Mumbai and Bangalore.
Summit website:
http://www.btsummit.comECM is one of the fastest growing areas in the industry - Sun has not embraced this but Oracle, IBM, EMC and Microsoft are seeing huge growth and expect it to continue for years to come. Bottom line unstructured data is difficult to manage = opportunity.
ECM specialists are very hard to come by these days, I know of many organizations who just cannot recruit high quality staff (both vendors and end users).
Frankly if you had skills in any of the above today you would have your pick of job's and a good rate to go with it.
Check out CMS Watch and AIIM for more information and insight into the sector.
Best
Alan -
The Most Compelling Enterprise Content Management (ECM) Summit in India
Enterprise Content Management (ECM) is no longer just about
technology, or just about content. It is about content, community,
and context. The deluge of data and information, coupled with the
ever-increasing need for compliance is forcing enterprises to take
a strategic look at ECM and its associated disciplines. To stack up
to competition, enterprises are looking up to faster, flexible, and
efficient business processes that can channelise copious,
unstructured information into meaningfully optimised, governed, and
digitally delivered data that is available to the right
stakeholders at the right time.
C-level executives, senior IT process management personnel,
marketing and content managers are looking to find the precise
solution that will fit the needs of their organization. What are
these available solutions, and how do they stack up to the needs of
a specific enterprise? What roles do strategic topics such as
Governance, Collaboration, Enterprise 2.0 play in the evaluation of
these solutions? What is a promising approach, and how do I find
the correct partners? The ECM track at Business Technology Summit
2008 offers strategic, technical, and business insights into all
aspects of ECM, including Business Process Management (BPM),
Business Rules Management (BRM), Master Data Management (MDM), Data
Warehousing & Knowledge Management, and Enterprise 2.0. The
summit will be held 22-26 September 2008 in Mumbai and Bangalore.
Summit website:
http://www.btsummit.comECM is one of the fastest growing areas in the industry - Sun has not embraced this but Oracle, IBM, EMC and Microsoft are seeing huge growth and expect it to continue for years to come. Bottom line unstructured data is difficult to manage = opportunity.
ECM specialists are very hard to come by these days, I know of many organizations who just cannot recruit high quality staff (both vendors and end users).
Frankly if you had skills in any of the above today you would have your pick of job's and a good rate to go with it.
Check out CMS Watch and AIIM for more information and insight into the sector.
Best
Alan -
Compensation management & Enterprise Compensation Management
Hi Experts,
My client is planning to go for Compensation Management module.
Now with Talent Management EHP-6/7 Compensation is falling under Talent Management which is a built in functionality.
Client does not have any Compensation Management in Play.
They have only 2 components of:
Incentive given to emplopyee per year,Bonus per year & salary survey, in this situation which would be a better solution to follwo.
My question here is whether we should go for conventional Compensation managent or Enterprise Compensation Management.
Plz guide.Yury thanks for the info,
Can i use the infotypes
LTI grant: LTI Grant Infotype (0761)
Eligibility Override Infotype (0760)
I think these used be in Comp.Mgmt
& client doesnt have any budgeting,how to
by pass that.
plz guide. -
Enterprise Services & Managing Quality of Service
Hello,
the documents published recently regarding ESA are pretty much aligned with the general idea to follow the idea of SOA. We talk a lot about enterprise level functionality and the reuse of high-level patterns being developed. However there is not much talking (yet) about the managing and monitoring of those enterprise services. Eg. Enterprise Services without well defined service-level-agreements attached to them and a platform supporting to manage&monitor (quality of service) these services tend to be applied just like any other application-service.
The question raising here: Where (based on what technology/platform) does SAP want to manage such SLAs allowing also business managers to understand what quality of service is being provided to their business functions. So far I haven´t spotted anything supporting that layer...(in the sense of "Click on an enterprise service, eg. define alert if response is greater than x sec or n service call failed, category of enterprise service...)
Regards
RudiRudi,
It is never any fun to say "It depends". But that is the way I feel I have to start this response. I think your question does hit the next level of required detail in an ESA beyond the exposure of services to the enterprise. Immediately after exposing services, basic SLA's and monitoring becomes critical.
There are in fact monitoring capabilities in XI 3.0 that should give us the first round of basic "Service Management". XI also offers a reasonable way to conduct service failover and redundancy by providing a both routing and queueing. I do think the issue is Service Management (encompassing SLA's, monitoring, alerting, failover, etc.). XI is where I think it could be done most consistently, but we are not all the way there. I will do some digging and get back to you on this with an update.
Each of these tasks could be done as Infrastructure Services supported out of WebAS 6.40. This might not be a bad move for the next 6-12 months. If these services are modeled after the standards, then a simple form of SLA monitoring, logging, and alerting should be pretty easy to create and maintain. It is pretty straight forward to say that all your service calls go through a set of basic infrastructure services to provide the visability you are requesting.
Excellent question, that deserves a better answer. I will see what I can find out.
-- David -
Oracle Enterprise Asset Management User Guide??
I'm interested in Oracle Enterprise Management new module, included in 11i. I have found no info about this new module, apart from a brief data sheet and some advertising presentations.
Does user guide exist for this module yet?
Is this module really available at this time?Required the latest Enterprise Asset Management User Guide.
-
Enterprise Risk Management Approach in SAP GRC
Hi All,
Can you please let me know as to what is the approach followed for implementation of Enterprise Risk Management (ERM) in SAP GRC. Also please tell me how the internal control frameworks like COSO, COBIT is mapped to ERM in SAP GRC.
Regards
VivekDear Vivek,
While assigning roles to users, you will be displayed the risks that are identified with those roles, if any. You can either mitigate or remove the roles.
The process covered by GRC Risk management includes the following steps:
-Risk Planning: Determines the approach to risk management in each business area or project. This includes setting up the risk management organization and defining risk thresholds . This phase is partially supported by a software application.
-Risk Identification and Analysis: Identifies the risks in order to analyze and prioritize them along different attributes, such as probability of occurrence and potential total loss associated to the risk.
-Risk Response: Decides on actions needed to respond to a risk. One action could be to actively mitigate the risk to reduce probability of occurrence and/or potential impact.
-Risk Monitoring: Includes the regular update of risk information and the risk reporting to monitor progress along the risk management process.
The Risk Management application provides a set of different reporting capabilities based on the individual needs of the target groups:
-A set of built-in reports that are delivered with the application. These reports allow risk managers to review the current risk state.
-Visual Composer based dashboards that provide information about the current risk status on an aggregated basis. The dashboards fulfill the risk reporting needs of senior managers and line managers.
Step 1: You maintain the Risk structure
1. You set up the organizational hierarchy
2. You set up the Activity Hierarchy
3. You set up the Risk Hierarchy
Step 2: You perform the Risk Assessment
1. You identify the risks
2. You analyze the risks
3. You respond to risks
4. You document the Incidents
Step 3: You analyze risk reports
1. You generate risk reports
2. You report the incidents
Step 4: You analyze the dashboards
Refer SAP documentation on GRC for more information.
Regards,
Naveen. -
Enterprise Compensation Management - Mass date change of IT 0759
We run ECC 5.0 SP45 (for HR)
We currently use the Enterprise Compensation Management (ECM) process for our Merit Increases and Bonus assignments.
This year, at the end of the process (meaning that everyone is in Approved status on IT 0759), Management decided to change the effective date of the Merit Increases.
Does anyone have a suggestion (other than create a bdc session) that would allow me to mass change the effective date of this particular comp. review item on IT 0759, without impacting the bonus review item?Hi Laural,
Instead of BDC, you can use the ECM function modules.
Get the infotype data through HR_ECM_READ_INFOTYPE
and change the data through HR_ECM_MODIFY_INFOTYPE.
And the BEGDA and ENDDA in 759 would be the same as of the payment date. So you would be changing both dates here to the new payment date.
I cannot think of any other alternative solution.
Hope this helps.
Cheers,
Subbu
Maybe you are looking for
-
External monitor, how to switch of internal monitor
With a second, external monitor, how do I switch of or darken the internal iMac monitor? In particular together with a beamer the screen light is disturbing. (however it works seemless great with a 720p beamer!)
-
How do you import (or convert) XMP metadata into iPhoto '08?
Having recently made OS X my primary operating system, I switched from using Picasa/Windows Photo Gallery on Vista to catalogue my photos to iPhoto '08. However, the 7,000+ pictures I have all have XMP metadata tags. None of them show up in iPhoto '0
-
How to write date format in bdc
how to write date format in bdc report
-
Is it possible to connect to captivate a database?
i want my students to completa a course and register their personal details to keep in a database (access 2003)
-
Blending Modes-where are blending modes Darken and Lighten?
I understand that 2 new blending modes should come with PS CS3, darken and lighten. However, these do not appear in my blending mode panel. Can anyone tell me why?