Queries about Enterprise Comp.Management

Hi Experts,
1/ Client system is on EHP-7 but when i check the Enterprise Compensation Management Section under Performance Management i could not find the Nod.
How to activate the ECM component in EHP-7, somewhere i read it is standard functionality as of EHP-6.
Is there any patch upgrade to be done, please guide.

Hi Experts,
Can anybody please put some light on the same.
Thanks.

Similar Messages

  • Enterprise Comp Management

    Hi guys,
    I have been trying to figure out the place where the ECM resides in ECC 5.0. As far as I see, only PA - CM is available under PM. Do I need to have something additional(like extn 2.0) or something like that ? If it is related to the extn, can you tell me where to look at in the system which extn I am working on ?
    Thanks in advance
    Regards
    Srivathsan

    >
    Bala Duvvuri wrote:
    > ECM is a part of MSS business package
    NO.. MSS only provides the (WebDynpro) frontend to the ECM functionality but ECM as such is very much part of ECC.. You have to turn it on, in the IMG.. there is a switch Activate ECM under Global Settings..
    ~Suresh

  • Solution Manager vs Enterprise Solution Manager

    Dear All,
    We already have solution manager installed in our SAP System landscape.
    But a visiting consultant give a new word to managers about enterprise solution manager with following benefits.
    1-If we have enterprise solution manager then SAP AG can access our system and inform us about system health.
    2-If we have enterprise solution manager then SAP AG will react on our ticket not on what we send but on the the actual actual condition of system.
    3-We can only utilize our support services in a right way if we have enterprise solution manager.
    1- Now first where I can check that the installed solution manager is standard or enterprise?
    2- The benefit which is listed above is really available in enterprise solution manager?
    3- Any tutorial or link defining how to install and configure enterprise solution manager.
    Any response will be highly appreciated
    regards,
    Syed Saifuddin
    SAP BASIS Administrator

    Dear Paul
    Following is the current Status of our Solution Manager
    S / W Comp / Rels           / Level           / Highest support Package / Short Desc of Software Component
    SAP_BASIS     700     0011     SAPKB70011     SAP Basis Component
    SAP_ABA     700     0011     SAPKA70011     Cross-Application Component
    PI_BASIS     2005_1_700     0011     SAPKIPYJ7B     PI_BASIS 2005_1_700
    ST-PI     2005_1_700     0006     SAPKITLQI6     SAP Solution Tools Plug-In
    SAP_BW     700     0011     SAPKW70011     SAP NetWeaver BI 7.0
    SAP_AP     700     0007     SAPKNA7007     SAP Application Platform
    BBPCRM     500     0007     SAPKU50007     BBPCRM
    CPRXRPM     400     0007     SAPK-40007INCPRXRPM     SAP xRPM/cProjects/cFolders 4.00 (ABAP)
    ST     400     0010     SAPKITL420     SAP Solution Manager Tool
    ST-A/PI     01J_CRM500     0000          -     Application Servicetools for CRM 500 / 5
    ST-ICO     150_700     0005     SAPK-15075INSTPL     SAP Solution Manager Implementation Cont
    ST-SER     700_2006_1     0003     SAPKITLOG3     SAP Solution Manager Service Tools
    Bachup Solution I will manage with Tivoli Storage Manager.
    But give me a path to upgrade my Solution Manager to EHP1 or Solution Manager Enterprise Edition.
    regards
    Syed Saifuddin

  • Enterprise Asset Management(EAM)

    Hello Friends
    I want to know about Enterprise Asset Management(EAM) ,whether it is an SAP process ,under SAP which module it covers .plz guide me in this.
    Regards,
    Kiran

    Hello
    yes it is an SAP process and is integrated package but mainly comes under product life cycle management
    http://www50.sap.com/businessmaps/32C13E8009BB4598B2A499A6554E0E67.htm
    http://www.sap.com/solutions/business-suite/plm/featuresfunctions/asset.epx
    thanks
    Bhudev

  • Enterprise Compensation Management Info Cube

    SAP BI contains a special enterprise compensation management InfoCube and queries that can be used to analyze all compensation data in detail. Now, if one has to use R/3 4.6C for the backend compensation management, can this InfoCube (using BW 3.5 on NW '04) be leveraged?...or, does the back-end have to be upgraded to the '04 Business Suite level?
    Quick response from someone who has done it or from SAP will be highly appreciated!!!

    Bryan,
    Great response. One last question: The comment you have made about what we get with "BI Content 3.5.1 (same as BI Content 3.3 Add-on)" in terms of the "1 InfoCube, enabling the evaluation of LTI awards" is of particular interest to us. To leverage this BI content, what should be in the back end? In other words, can I leverage this BI business content using R/3 4.6C in the backend or will I need to upgrade to mySAP ERP (NW '04) and mySAP HCM?
    Thanks and regards,
    Puneet
    > Puneet,
    >
    > Yes, you can still use those in BW 3.5.  If you go to
    > the Business Content tab in the Administrator
    > Workbench you'll see them.  You can also check
    > help.sap.com and the Service Marketplace alias /bw
    > for more details on the content delivered with each
    > release.
    >
    > With BI Content 3.5.1 (same as BI Content 3.3 Add-on)
    > there is additional content delivered:
    >
    > The BW Business Content for mySAP HR Enterprise
    > Compensation Management comprises:
    >
    > <u><b>Extractors</b></u> for transferring data from
    > mySAP HR Enterprise Compensation Management (PA-EC)
    > to SAP Business Information Warehouse
    >
    > Predefined Data Models, including:
    >
    > 8 ODS objects, collecting data about compensation
    > processes, compensation budgets, employee pay
    > categories, composite market data, raw market data,
    > job matching, salary structure of jobs as well as
    > active and planned salary structures
    >
    > 5 InfoSets, providing data on compensation processes,
    > compensation budgets, Comparison of Market Data and
    > Employee Payment, Salary Survey Market Data and Job
    > Matching as well as Comparison of Salary Structure
    > Against Market
    >
    > 1 InfoCube, enabling the evaluation of LTI awards
    >
    > 24 predefined standard queries
    >
    > Increased visibility of all information around the
    > compensation management process at your enterprise.
    >
    > Thanks,
    > Bryan
    >
    >
    > Message was edited by: Bryan Katis

  • Ask the Experts: Single Sign-On with Cisco WebEx Meetings Server, Internet Reverse Proxy, and Enterprise License Manager Solutions

    With Arun Kumar
    Welcome to the Cisco Support Community Ask the Expert conversation. This is an opportunity to learn and ask questions about Single Sign-On (SSO) with Cisco WebEx Meetings Server (Cisco WMS), Internet Reverse Proxy (IRP), and Enterprise License Manager (ELM) solutions.
    SSO standards such as Security Assertion Markup Language (SAML) 2.0 provide secure mechanisms for passing credentials and related information between different websites that have their own authorization and authentication systems. SSO enables simplified user authentication and management.
    IRP provides public access, enabling users to host or attend meetings from the Internet and mobile devices. Although IRP is optional, Cisco encourages its use because it provides a better user experience for your mobile workforce.
    Example question topics include:
    SSO profiles and SAML 2.0 Identity providers (IdPs) supported in Cisco WMS
    Basic configuration of IdPs
    Interaction between IdPs and Cisco WMS
    Difference between the cloud client implementation and Cisco WMS
    Meeting access behavior in a split-horizon network topology with SSO
    How to enable public access to Cisco WMS
    Cisco WMS ELM operations
    Cisco WMS ELM compared to other unified communications ELM or standalone ELM and compatibility/inoperability between them
    Arun Kumar is a team lead in the San Jose Conferencing Technical Assistance Center. He has over eight years of experience in conferencing technology and specializes in Cisco Unified Meeting Place Express and Cisco WebEx Meeting Server. He joined Cisco in 2010 as an escalation engineer for the Cisco Telepresence group. Before joining Cisco he worked for the UK's third-largest internet service provider Supanet on VoIP technology and the *Nix domain. Kumar holds a master of science degree in computer science from Sikkim Manipal University in India, and he holds CCIE (Voice) and VMware Certified Professional certifications.
    Remember to use the rating system to let Arun know if you have received an adequate response.
    Arun might not be able to answer each question because of the volume expected during this event. Remember that you can continue the conversation on the Collaboration, Voice, and Video community Other Subjects subcommunity shortly after the event. This event lasts through Monday May 17, 2013. Visit this forum often to view responses to your questions and the questions of other Cisco Support Community members.

    Hello Mobile Service,
    CWMS and Jabber integrations:
    http://www.cisco.com/en/US/docs/voice_ip_comm/jabber/Windows/9_1/JABW_BK_E4CC9599_00_environment-configuration-guide_chapter_01.html#JABW_TK_SF2ED5E1_00
    In above link start from section: Set Up Cisco WebEx Meetings Server on Cisco Unified Presence
    then move to section: Add Cisco WebEx Meetings Server to a Profile
    Once done, move to section: Specify Conferencing Credentials in the Client side. You will see above server already listed there, just go ahead and enter your username and password (pleae make sure this user already exists on your CWMS) and accept any certificate/s if presented. Jabber Integration is done and you can start testing the same.
    Attached CWMS - AFDS integration doc.
    Please let me know if any furhter question.
    Thanks, Arun

  • Call for participation: OASIS Enterprise Key Management Infrastructure TC

    We would welcome your participation in this process. Thank you.
    Arshad Noor
    StrongAuth, Inc.
    To: OASIS members & interested parties
    A new OASIS technical committee is being formed. The OASIS Enterprise Key
    Management Infrastructure (EKMI) Technical Committee has been proposed by the
    members of OASIS listed below. The proposal, below, meets the requirements of
    the OASIS TC Process [a]. The TC name, statement of purpose, scope, list of
    deliverables, audience, and language specified in the proposal will constitute
    the TC's official charter. Submissions of technology for consideration by the
    TC, and the beginning of technical discussions, may occur no sooner than the
    TC's first meeting.
    This TC will operate under our 2005 IPR Policy. The eligibility
    requirements for becoming a participant in the TC at the first meeting (see
    details below) are that:
    (a) you must be an employee of an OASIS member organization or an individual
    member of OASIS;
    (b) the OASIS member must sign the OASIS membership agreement [c];
    (c) you must notify the TC chair of your intent to participate at least 15
    days prior to the first meeting, which members may do by using the "Join this
    TC" button on the TC's public page at [d]; and
    (d) you must attend the first meeting of the TC, at the time and date fixed
    below.
    Of course, participants also may join the TC at a later time. OASIS and the TC
    welcomes all interested parties.
    Non-OASIS members who wish to participate may contact us about joining OASIS
    [c]. In addition, the public may access the information resources maintained for
    each TC: a mail list archive, document repository and public comments facility,
    which will be linked from the TC's public home page at [d].
    Please feel free to forward this announcement to any other appropriate lists.
    OASIS is an open standards organization; we encourage your feedback.
    Regards,
    Mary
    Mary P McRae
    Manager of TC Administration, OASIS
    email: mary.mcrae(AT)oasis-open.org
    web: www.oasis-open.org
    a) http://www.oasis-open.org/committees/process.php
    b) http://www.oasis-open.org/who/intellectualproperty.php
    c) See http://www.oasis-open.org/join/
    d) http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=ekmi
    CALL FOR PARTICIPATION
    OASIS Enterprise Key Management Infrastructure (EKMI) TC
    Name
    OASIS Enterprise Key Management Infrastructure (EKMI) TC
    Statement of Purpose
    Public Key Infrastructure (PKI) technology has been around for more than a
    decade, and many companies have adopted it to solve specific problems in the
    area of public-key cryptography. Public-key cryptography has been embedded in
    some of the most popular tools -- web clients and servers, VPN clients and
    servers, mail user agents, office productivity tools and many industry-specific
    applications -- and underlies many mission-critical environments today.
    Additionally, there are many commercial and open-source implementations of PKI
    software products available in the market today. However, many companies across
    the world have recognized that PKI by itself, is not a solution.
    There is also the perception that most standards in PKI have already been
    established by ISO and the PKIX (IETF), and most companies are in
    operations-mode with their PKIs -- just using it, and adopting it to other
    business uses within their organizations. Consequently, there is not much left
    to architect and design in the PKI community.
    Simultaneously, there is a new interest on the part of many companies in the
    management of symmetric keys used for encrypting sensitive data in their
    computing infrastructure. While symmetric keys have been traditionally managed
    by applications doing their own encryption and decryption, there is no
    architecture or protocol that provides for symmetric key management services
    across applications, operating systems, databases, etc. While there are many
    industry standards around protocols for the life-cycle management of asymmetric
    (or public/private) keys -- PKCS10, PKCS7, CRMF, CMS, etc. -- however, there is
    no standard that describes how applications may request similar life-cycle
    services for symmetric keys, from a server and how public-key cryptography may
    be used to provide such services.
    Key management needs to be addressed by enterprises in its entirety -- for both
    symmetric and asymmetric keys. While each type of technology will require
    specific protocols, controls and management disciplines, there is sufficient
    common ground in the discipline justifying the approach to look at
    key-management as a whole, rather than in parts. Therefore, this TC will
    address the following:
    Scope
    A) The TC will create use-case(s) that describe how and where
    the protocols it intends to create, will be used;
    B) The TC will define symmetric key management protocols,
    including those for:
    1. Requesting a new or existing symmetric key from a server;
    2. Requesting policy information from a server related to caching of keys on the
    client;
    3. Sending a symmetric key to a requestor, based on a request;
    4. Sending policy information to a requestor, based on a request;
    5. Other protocol pairs as deemed necessary.
    C) To ensure cross-implementation interoperability, the TC will create a test
    suite (as described under 'Deliverables' below) that will allow different
    implementations of this protocol to be certified against the OASIS standard
    (when ratified);
    D) The TC will provide guidance on how a symmetric key-management infrastructure
    may be secured using asymmetric keys, using secure and generally accepted
    practices;
    E) Where appropriate, and in conjunction with other standards organizations that
    focus on disciplines outside the purview of OASIS, the TC will provide input on
    how such enterprise key-management infrastructures may be managed, operated and
    audited;
    F) The TC may conduct other activities that educate users about, and promote,
    securing sensitive data with appropriate cryptography, and the use of proper
    key-management techniques and disciplines to ensure appropriate protection of
    the infrastructure.
    List of Deliverables
    1. XSchema Definitions (XSD) of the request and response protocols (by August
    2007) 2. A Test Suite of conformance clauses and sample transmitted keys and
    content that allows for clients and servers to be tested for conformance to the
    defined protocol (by December 2007)
    3. Documentation that explains the communication protocol (by August 2007)
    4. Documentation that provides guidelines for how an EKMI may be built,
    operated, secured and audited (by December 2007)
    5. Resources that promote enterprise-level key-management: white papers,
    seminars, samples, and information for developer and public use. (beginning
    August 2007, continuing at least through 2008)
    Anticipated Audiences:
    Any company or organization that has a need for managing cryptographic keys
    across applications, databases, operating systems and devices, yet desires
    centralized policy-driven management of all cryptographic keys in the
    enterprise. Retail, health-care, government, education, finance - every industry
    has a need to protect the confidentiality of sensitive data. The TC's
    deliverables will provide an industry standard for protecting sensitive
    information across these, and other, industries.
    Security services vendors and integrators should be able to fulfill their use
    cases with the TC's key management methodologies.
    Members of the OASIS PKI TC should be very interested in this new TC, since the
    goals of this TC potentially may fulfill some of the goals in the charter of the
    PKI TC.
    Language:
    English
    IPR Policy:
    Royalty Free on Limited Terms under the OASIS IPR Policy
    Additional Non-normative information regarding the start-up of the TC:
    a. Identification of similar or applicable work:
    The proposers are unaware of any similar work being carried on in this exact
    area. However, this TC intends to leverage the products of, and seek liaison
    with, a number of other existing projects that may interoperate with or provide
    functionality to the EKMI TC's planned outputs, including:
    OASIS Web Services Security TC
    OASIS Web Services Trust TC
    W3C XMLSignature and XMLEncryption protocols and working group
    OASIS Digital Signature Services TC
    OASIS Public Key Infrastructure TC
    OASIS XACML TC (and other methods for providing granular access-control
    permissions that may be consumed or enforced by symmetic key management)
    b. Anticipated contributions:
    StrongAuth, Inc. anticipates providing a draft proposal for the EKMI protocol,
    at the inception of the TC. The current draft can be viewed at:
    http://www.strongkey.org/resources/documentation/misc/skcl-sks-protocol.html
    and a working implementation of this protocol is available at:
    http://sourceforge.net/projects/strongkey for interested parties.
    c. Proposed working title and acronym for specification:
    Symmetric Key Services Markup Language (SKSML), subject to TC's approval or
    change.
    d. Date, time, and location of the first meeting:
    First meeting will be by teleconference at:
    Date: January 16, 2007
    Time: 10 AM PST, 1PM EST
    Call in details: to be posted to TC list
    StrongAuth has agreed to host this meeting.
    e. Projected meeting schedule:
    Subject to TC's approval, we anticipate monthly telephone meetings for the first
    year. First version of the protocol to be voted on by Summer 2007. StrongAuth is
    willing to assist by arranging for the teleconferences; we anticipate using
    readily available free teleconference services.
    f. Names, electronic mail addresses, of supporters:
    Ken Adler, ken(AT)adler.net
    June Leung,June.Leung(AT)FundServ.com
    John Messing, jmessing(AT)law-on-line.com
    Arshad Noor, arshad.noor(AT)strongauth.com
    Davi Ottenheimer, davi(AT)poetry.org
    Ann Terwilliger, aterwil(AT)isa.com
    g. TC Convener:
    Arshad Noor, arshad.noor(AT)strongauth.com

    Hi Bilge,
    did you put your text in a blender before sending it?
    I understood everything works fine except the miscellaneous menu item in the configuration tab of ERM?
    Have you already tried to clear all browser cache, close all browsers and try it again?
    Best,
    Frank

  • Most Important Conference for Enterprise Content Management (ECM) marketplace in India

    Enterprise Content Management (ECM) is no longer just about
    technology, or just about content. It is about content, community,
    and context. The deluge of data and information, coupled with the
    ever-increasing need for compliance is forcing enterprises to take
    a strategic look at ECM and its associated disciplines. To stack up
    to competition, enterprises are looking up to faster, flexible, and
    efficient business processes that can channelise copious,
    unstructured information into meaningfully optimised, governed, and
    digitally delivered data that is available to the right
    stakeholders at the right time.
    C-level executives, senior IT process management personnel,
    marketing and content managers are looking to find the precise
    solution that will fit the needs of their organization. What are
    these available solutions, and how do they stack up to the needs of
    a specific enterprise? What roles do strategic topics such as
    Governance, Collaboration, Enterprise 2.0 play in the evaluation of
    these solutions? What is a promising approach, and how do I find
    the correct partners? The ECM track at Business Technology Summit
    2008 offers strategic, technical, and business insights into all
    aspects of ECM, including Business Process Management (BPM),
    Business Rules Management (BRM), Master Data Management (MDM), Data
    Warehousing & Knowledge Management, and Enterprise 2.0. The
    summit will be held 22-26 September 2008 in Mumbai and Bangalore.
    Summit website:
    http://www.btsummit.com

    * Ismael Ghalimi is the father of Office 2.0. He is also
    credited with creating the first standards-based BPMS?
    * Nitin Borwankar is the father of Data 2.0?
    * Alan Pelz Sharpe is an expert guest on BBC, CNN and ABC
    Television
    * Robert Marcus has been at the helm of technology at General
    Motors, Boeing, Rogue Wave Software, MCC and HP?
    * Peter Coffee, formerly technology editor at eWeek, has
    appeared on CBS, NBC, CNN, Fox, and PBS newscasts.
    * Kiran Datar co-introduced the concept of conferencing
    services in India
    * THAT YOU CAN REACH OUT TO ALL THESE CELEBRITY SPEAKERS AT
    BT SUMMIT 2008?
    VIEW THE COMPLETE SCHEDULE:
    http://www.btsummit.com/summitSchedule.html
    REGISTER NOW FOR AS LOW AS INR 2999/-:
    http://www.btsummit.com/registration.html

  • The Most Compelling Enterprise Content Management (ECM) Workshops in India

    Enterprise Content Management (ECM) is no longer just about
    technology, or just about content. It is about content, community,
    and context. The deluge of data and information, coupled with the
    ever-increasing need for compliance is forcing enterprises to take
    a strategic look at ECM and its associated disciplines. To stack up
    to competition, enterprises are looking up to faster, flexible, and
    efficient business processes that can channelise copious,
    unstructured information into meaningfully optimised, governed, and
    digitally delivered data that is available to the right
    stakeholders at the right time.
    C-level executives, senior IT process management personnel,
    marketing and content managers are looking to find the precise
    solution that will fit the needs of their organization. What are
    these available solutions, and how do they stack up to the needs of
    a specific enterprise? What roles do strategic topics such as
    Governance, Collaboration, Enterprise 2.0 play in the evaluation of
    these solutions? What is a promising approach, and how do I find
    the correct partners? The ECM track at Business Technology Summit
    2008 offers strategic, technical, and business insights into all
    aspects of ECM, including Business Process Management (BPM),
    Business Rules Management (BRM), Master Data Management (MDM), Data
    Warehousing & Knowledge Management, and Enterprise 2.0. The
    summit will be held 22-26 September 2008 in Mumbai and Bangalore.
    Summit website:
    http://www.btsummit.com

    ECM is one of the fastest growing areas in the industry - Sun has not embraced this but Oracle, IBM, EMC and Microsoft are seeing huge growth and expect it to continue for years to come. Bottom line unstructured data is difficult to manage = opportunity.
    ECM specialists are very hard to come by these days, I know of many organizations who just cannot recruit high quality staff (both vendors and end users).
    Frankly if you had skills in any of the above today you would have your pick of job's and a good rate to go with it.
    Check out CMS Watch and AIIM for more information and insight into the sector.
    Best
    Alan

  • The Most Compelling Enterprise Content Management (ECM) Summit in India

    Enterprise Content Management (ECM) is no longer just about
    technology, or just about content. It is about content, community,
    and context. The deluge of data and information, coupled with the
    ever-increasing need for compliance is forcing enterprises to take
    a strategic look at ECM and its associated disciplines. To stack up
    to competition, enterprises are looking up to faster, flexible, and
    efficient business processes that can channelise copious,
    unstructured information into meaningfully optimised, governed, and
    digitally delivered data that is available to the right
    stakeholders at the right time.
    C-level executives, senior IT process management personnel,
    marketing and content managers are looking to find the precise
    solution that will fit the needs of their organization. What are
    these available solutions, and how do they stack up to the needs of
    a specific enterprise? What roles do strategic topics such as
    Governance, Collaboration, Enterprise 2.0 play in the evaluation of
    these solutions? What is a promising approach, and how do I find
    the correct partners? The ECM track at Business Technology Summit
    2008 offers strategic, technical, and business insights into all
    aspects of ECM, including Business Process Management (BPM),
    Business Rules Management (BRM), Master Data Management (MDM), Data
    Warehousing & Knowledge Management, and Enterprise 2.0. The
    summit will be held 22-26 September 2008 in Mumbai and Bangalore.
    Summit website:
    http://www.btsummit.com

    ECM is one of the fastest growing areas in the industry - Sun has not embraced this but Oracle, IBM, EMC and Microsoft are seeing huge growth and expect it to continue for years to come. Bottom line unstructured data is difficult to manage = opportunity.
    ECM specialists are very hard to come by these days, I know of many organizations who just cannot recruit high quality staff (both vendors and end users).
    Frankly if you had skills in any of the above today you would have your pick of job's and a good rate to go with it.
    Check out CMS Watch and AIIM for more information and insight into the sector.
    Best
    Alan

  • Compensation management & Enterprise Compensation Management

    Hi Experts,
    My client is planning to go for Compensation Management module.
    Now with Talent Management EHP-6/7 Compensation is falling under Talent Management which is a built in functionality.
    Client does not have any Compensation Management in Play.
    They have only 2 components of:
    Incentive given to emplopyee per year,Bonus per year & salary survey, in this situation which would be a better solution to follwo.
    My question here is whether we should go for conventional Compensation managent or Enterprise Compensation Management.
    Plz guide.

    Yury thanks for the info,
    Can i use the infotypes
    LTI grant: LTI Grant Infotype (0761)
    Eligibility Override Infotype (0760)
    I think these used be in Comp.Mgmt
    & client doesnt have any budgeting,how to
    by pass that.
    plz guide.

  • Enterprise Services & Managing Quality of Service

    Hello,
    the documents published recently regarding ESA are pretty much aligned with the general idea to follow the idea of SOA. We talk a lot about enterprise level functionality and the reuse of high-level patterns being developed. However there is not much talking (yet) about the managing and monitoring of those enterprise services. Eg. Enterprise Services without well defined service-level-agreements attached to them and a platform supporting to manage&monitor (quality of service) these services tend to be applied just like any other application-service.
    The question raising here: Where (based on what technology/platform) does SAP want to manage such SLAs allowing also business managers to understand what quality of service is being provided to their business functions. So far I haven´t spotted anything supporting that layer...(in the sense of "Click on an enterprise service, eg. define alert if response is greater than x sec or n service call failed, category of enterprise service...)
    Regards
    Rudi

    Rudi,
    It is never any fun to say "It depends".  But that is the way I feel I have to start this response.  I think your question does hit the next level of required detail in an ESA beyond the exposure of services to the enterprise.  Immediately after exposing services, basic SLA's and monitoring becomes critical. 
    There are in fact monitoring capabilities in XI 3.0 that should give us the first round of basic "Service Management".  XI also offers a reasonable way to conduct service failover and redundancy by providing a both routing and queueing.  I do think the issue is Service Management (encompassing SLA's, monitoring, alerting, failover, etc.).  XI is where I think it could be done most consistently, but we are not all the way there.  I will do some digging and get back to you on this with an update.
    Each of these tasks could be done as Infrastructure Services supported out of WebAS 6.40.  This might not be a bad move for the next 6-12 months.  If these services are modeled after the standards, then a simple form of SLA monitoring, logging, and alerting should be pretty easy to create and maintain.  It is pretty straight forward to say that all your service calls go through a set of basic infrastructure services to provide the visability you are requesting.
    Excellent question, that deserves a better answer.  I will see what I can find out.
    -- David

  • Oracle Enterprise Asset Management User Guide??

    I'm interested in Oracle Enterprise Management new module, included in 11i. I have found no info about this new module, apart from a brief data sheet and some advertising presentations.
    Does user guide exist for this module yet?
    Is this module really available at this time?

    Required the latest Enterprise Asset Management User Guide.

  • Enterprise Risk Management Approach in SAP GRC

    Hi All,
    Can you please let me know  as to what is the approach followed for implementation of  Enterprise Risk Management (ERM) in SAP GRC.  Also please tell me how the internal control frameworks like COSO, COBIT is mapped to ERM in SAP GRC.
    Regards
    Vivek

    Dear Vivek,
    While assigning roles to users, you will be displayed the risks that are identified with those roles, if any. You can either mitigate or remove the roles.
    The process covered by GRC Risk management includes the following steps:
    -Risk Planning: Determines the approach to risk management in each business area or project. This includes setting up the risk management organization and defining risk thresholds . This phase is partially supported by a software application.
    -Risk Identification and Analysis: Identifies the risks in order to analyze and prioritize them along different attributes, such as probability of occurrence and potential total loss associated to the risk.
    -Risk Response: Decides on actions needed to respond to a risk. One action could be to actively mitigate the risk to reduce probability of occurrence and/or potential impact.
    -Risk Monitoring: Includes the regular update of risk information and the risk reporting to monitor progress along the risk management process.
    The Risk Management application provides a set of different reporting capabilities based on the individual needs of the target groups:
    -A set of built-in reports that are delivered with the application. These reports allow risk managers to review the current risk state.
    -Visual Composer based dashboards that provide information about the current risk status on an aggregated basis. The dashboards fulfill the risk reporting needs of senior managers and line managers.
    Step 1: You maintain the Risk structure
    1. You set up the organizational hierarchy
    2. You set up the Activity Hierarchy
    3. You set up the Risk Hierarchy
    Step 2: You perform the Risk Assessment
    1. You identify the risks
    2. You analyze the risks
    3. You respond to risks
    4. You document the Incidents
    Step 3: You analyze risk reports
    1. You generate risk reports
    2. You report the incidents
    Step 4: You analyze the dashboards
    Refer SAP documentation on GRC for more information.
    Regards,
    Naveen.

  • Enterprise Compensation Management - Mass date change of IT 0759

    We run ECC 5.0 SP45 (for HR)
    We currently use the Enterprise Compensation Management (ECM) process for our Merit Increases and Bonus assignments. 
    This year, at the end of the process (meaning that everyone is in Approved status on IT 0759), Management decided to change the effective date of the Merit Increases. 
    Does anyone have a suggestion (other than create a bdc session) that would allow me to mass change the effective date of this particular comp. review item on IT 0759, without impacting the bonus review item?

    Hi Laural,
    Instead of BDC, you can use the ECM function modules.
    Get the infotype data through HR_ECM_READ_INFOTYPE
    and change the data through HR_ECM_MODIFY_INFOTYPE.
    And the BEGDA and ENDDA in 759 would be the same as of the payment date. So you would be changing both dates here to the new payment date.
    I cannot think of any other alternative solution.
    Hope this helps.
    Cheers,
    Subbu

Maybe you are looking for