Questions for client

Hi,
Can anyone provide me with questions I need to ask the client for configuration purposes in the blueprint phase for FI and CO modules? or how can I access such questions?
Thanks

Hi Gov,
I have seen many threads, where consultants bang the thread asking send the file to me at my personal ID etc., in most of the cases they won't get, moreover sending to each id is also a tiresum job. To avoid this, i have upload the file in the site http://www.4shared.com (this is a good site where 1GB will be given free, and u will be given a link to each file u upload. Just put the link here.) so that this is available to all those who visit this thread.
there are many other site which give free space to share files like http:rapidshared.com http//megaupload.com etc many more, but i prefer 4shared as we can organize our files very easy.
My advice to all the members not to send to personal id rather upload at anyother place and post the link here so that it is available to all who visit this thread.
Satish

Similar Messages

  • For the ones that use Muse as their main tool to build websites for clients, how do you win them over? (+bonus question)

    Couple times a year I always get insanely interested in Adobe Muse. I've used it before, then I got even more interested when all the new in browser editing features rolled out. The idea seemed nice, but I was very disappointed when I noticed it was really only text and images that you can edit. I hope this is not an actual argument when talking things over with a client, but how do you win your client over if he asks "can I edit the videos on the site? can I edit x?, etc" Which would probably then lead to "Why should I use you when I can just use a website builder like squarespace, wix, etc and actually have control over my website?"  What is your response?
    I REALLY want to get into Muse, and I want to be convinced! It seems like a dream for designers like myself. That, what I wrote above, is the only thing that holds me back.
    Bonus question:
    Say, the answer is "it's just not possible" to change the videos, etc.. What is the alternative? A bunch of iframes with say, tumblr blogs made specifically to just hold a video? Sized specifically for it, etc.
    I'd just like to build websites for clients and really end it there. Move onto the next project! Even if paid, I'm just not interested in managing websites after I build them. I wouldn't really be able to convince a client to pay me every time he wants a change too.

    Couple times a year I always get insanely interested in Adobe Muse. I've used it before, then I got even more interested when all the new in browser editing features rolled out. The idea seemed nice, but I was very disappointed when I noticed it was really only text and images that you can edit. I hope this is not an actual argument when talking things over with a client, but how do you win your client over if he asks "can I edit the videos on the site? can I edit x?, etc" Which would probably then lead to "Why should I use you when I can just use a website builder like squarespace, wix, etc and actually have control over my website?"  What is your response?
    I REALLY want to get into Muse, and I want to be convinced! It seems like a dream for designers like myself. That, what I wrote above, is the only thing that holds me back.
    Bonus question:
    Say, the answer is "it's just not possible" to change the videos, etc.. What is the alternative? A bunch of iframes with say, tumblr blogs made specifically to just hold a video? Sized specifically for it, etc.
    I'd just like to build websites for clients and really end it there. Move onto the next project! Even if paid, I'm just not interested in managing websites after I build them. I wouldn't really be able to convince a client to pay me every time he wants a change too.

  • Why not keep Forms Central as a separate product to stand and sell on its own. I use it for client information to process their data-ptocessing in my mailing business; do not need or want electronic tabulation. I would be happy to pay several hundred doll

    I use a Forms Central form to ask questions of clients to return with their mailing database; tabulation is not wanted or required. From the answers and boxes marked, I have most or all the information to process data in accordance with the United States Postal Service. After, I return the data and paperwork including eDoc worked so that my company wins, the US Postal Service and my client (and possibly their client) wins! If Forms central was simply an interactive forms builder used for direct B2B or B2C information, it would be a winner. If I wanted SurveyMonkey, then would get it but I and others like me do not need or want tabulation services as I assume Adobe looked at Forms Central as a cash cow; it isn't that at all for me.

    I use a Forms Central form to ask questions of clients to return with their mailing database; tabulation is not wanted or required. From the answers and boxes marked, I have most or all the information to process data in accordance with the United States Postal Service. After, I return the data and paperwork including eDoc worked so that my company wins, the US Postal Service and my client (and possibly their client) wins! If Forms central was simply an interactive forms builder used for direct B2B or B2C information, it would be a winner. If I wanted SurveyMonkey, then would get it but I and others like me do not need or want tabulation services as I assume Adobe looked at Forms Central as a cash cow; it isn't that at all for me.

  • Questions on Client Failver and Fast Failover

    've few questions regarding Client Failover and Fast Faiolver of Oracle Database HA. Before I ask those questions I would like to explain my environment. Below are the details.
    - We have two physical locations called 'ABC' and 'PQR'
    - ABC is the primary site.
    - PQR is the standby site.
    - In ABC, we have Oracle RAC database (11.2.0.2) with two nodes.
    - In PQR, we have a single server standalone database (11.2.0.2) with ASM. This is not a RAC.
    - Data Guard has been configured between ABC and PQR and it is working as expected.
    - Please note that we have a licence for Active Data Guard.
    - We have Oracle Identity Management products at both ABC and PQR and they are going to use RAC database as a primary database which is in ABC.
    - We did not configure Data Guard broker yet.
    We want to achieve below goals:
    Goal 1:
    Whenever RAC primary goes down completely, standby database should become primary database AUTOMATICALLY and it should allow read/write operation.
    I guess this is called 'Fast Failover'. Please let me know if I am wrong.
    Questions :
    - To make this happen, Do I need to configure Data Guard Broker so that standy database becomes primary when RAC goes down completely with planned or unplanned outage.
    - Let's say RAC goes down completely, how long does Data Guard broker take to make standby db as Primary.
    - What about the client/application who already connected to RAC.
    - Let's standby DB has become as primary and after sometime if RAC comes back , Does data guard automatically changes the role of RAC to primary ?
    Goal 2:
    As I explained above, all Oracle IDM products and applications speak to RAC database they only know about RAC database which is primary.They are not aware of standby database.
    - Whenever a client session is in progress with RAC primary database, if RAC goes down completely , we would like to expect client session should get transferred standby datbase without loosing session information . However before this happens, standby database should become primary becuase client session may perform write operations.
    - Whenever a client is trying to connect to RAC prmary and assume RAC is completely down, we would like to expect client connections should get transferred to standby database.
    However before this happens, standby database should become primary becuase client session may perform write operations.
    As per my knowledge, above scenarios are called 'client failver'. Please let me know if I am wrong.
    Questions:
    1. Please throw some light to achieve above features.
    2. As per my understanding, before client failover happens, fast failover should have already occured and standby should get switch to primary role. I guess all this happens through TIMEOUT parameters. What are those.
    Could you please help ?
    Thanks

    859875 wrote:
    Goal 1:
    Whenever RAC primary goes down completely, standby database should become primary database AUTOMATICALLY and it should allow read/write operation.
    I guess this is called 'Fast Failover'. Please let me know if I am wrong.You are correct.
    >
    Questions :
    - To make this happen, Do I need to configure Data Guard Broker so that standy database becomes primary when RAC goes down completely with planned or unplanned outage.Yes (you can also use Grid Control that will use Data Guard Broker).
    >
    Goal 2:
    As I explained above, all Oracle IDM products and applications speak to RAC database they only know about RAC database which is primary.They are not aware of standby database.
    - Whenever a client session is in progress with RAC primary database, if RAC goes down completely , we would like to expect client session should get transferred standby datbase without loosing session information:This is not possible: it is possible only for SELECT statement and only in a single RAC database.
    You can find some interesting documents on MAA home page (best pratices, case studies...):
    http://www.oracle.com/technetwork/database/features/availability/maa-090890.html

  • Using second wireless network for client Hyper-V VMs

    Hello all,
    I have a question concerning client Hyper-V on Win8.1 Pro Preview and wirelessly connecting only the VMs. I'm a student at a university and the university wired Ethernet network only allows 2 devices to be registered per student. So for me, those 2 would
    be the host OS and my Xbox, which leaves no room for any of my VMs. I need a way to connect my VMs to the wireless network (which has no such limitations) mostly for programming assignments using Linux.
    I'm thinking of buying a wireless NIC for my desktop and using that as a second external switch that the VMs will use for connectivity. The host will use the first external switch that currently exists. However, I'm not sure how I can keep the host on the
    wired LAN while also installing a wireless NIC only for the VMs. Do I install the NIC, make it an external switch without host access, then join the network? Or do I join the network first then set it up as a virtual switch? Can client versions of Windows
    handle multiple simultaneous NICs?
    Also, would the host even need an external switch in this case? I have one since I set up the VMs at home where all machines can use the wired NIC.

    Ahh, that's right. check out this post.  This should explain the problem and offer a workable solution.
    Hi,
    I remember some articles mentioned Windows Hyper-V does not allow you to bind a wireless network adapter to a virtual machine.
    Since the virtual switch in Hyper-V is a “layer-2 switch,” which means that it switches (i.e. determines the route a certain Ethernet packet takes) using the MAC addresses that uniquely identify each (physical and virtual) network adapter card. The MAC address
    of the source and destination machines are sent in each Ethernet packet and a layer-2 switch uses this to determine where it should send the incoming packet. An external virtual switch is connected to the external world through the physical NIC. Ethernet packets
    from a VM destined for a machine in the external world are sent out through this physical NIC. This means that the physical NIC must be able to carry the traffic from all the VMs connected to this virtual switch, thus implying that the packets flowing through
    the physical NIC will contain multiple MAC addresses (one for each VM’s virtual NIC). This is supported on wired physical NICs (by putting the NIC in promiscuous mode), but not supported on wireless NICs since the wireless channel established by the WiFi NIC
    and its access point only allows Ethernet packets with the WiFi NIC’s MAC address and nothing else. In other words, Hyper-V couldn’t use WiFi NICs for an external switch if we continued to use the current virtual switch architecture.
    To work around this limitation, you can use Microsoft Bridging solution. Create an Internal network, name it “External”, system will create a Virtual Network adapter for it. Create Network Bridge between your WiFi NIC and the Virtual External Network adapter.
    Assign External network for your VMs, so they have internet connection.
    For more information please refer to following MS articles:
    Bringing Hyper-V to “Windows 8”
    http://blogs.msdn.com/b/b8/archive/2011/09/07/bringing-hyper-v-to-windows-8.aspx
    Hyper-V: How to Run Hyper-V on a Laptop
    http://social.technet.microsoft.com/wiki/contents/articles/185.hyper-v-how-to-run-hyper-v-on-a-laptop-en-us.aspx
    Configuring Virtual Networks
    http://technet.microsoft.com/en-us/library/cc816585(v=WS.10).aspx
    Hope this helps!
    TechNet Subscriber Support
    If you are
    TechNet Subscription user and have any feedback on our support quality, please send your feedback
    here.
    Lawrence
    TechNet Community Support
    source: 
    http://social.technet.microsoft.com/Forums/windowsserver/en-US/d9fb7866-0fbc-4c06-b8ea-df3c35c75c74/windows-8-hyperv-bridged-wifi-issues-when-creating-virtual-machines
    Remember to select 'Mark as Answer' for any reply that provided a solution

  • Max EAPOL-key M1 retransmissions exceeded for client

    WISMS on ver 6.0.196
    Receiving several hundred messages:
    *Jul 06 16:51:58.943: %DOT1X-3-MAX_EAPOL_KEY_RETRANS: 1x_ptsm.c:407 Max EAPOL-key M1 retransmissions exceeded for client 00:19:88:05:2d:53
    *Jul 06 16:51:57.792: %DOT1X-3-MAX_EAPOL_KEY_RETRANS: 1x_ptsm.c:407 Max EAPOL-key M5 retransmissions exceeded for client 00:40:9d:3a:c9:8f
    *Jul 06 16:51:56.991: %DOT1X-3-MAX_EAPOL_KEY_RETRANS: 1x_ptsm.c:407 Max EAPOL-key M1 retransmissions exceeded for client 00:19:88:06:64:82
    Any thoughts? Wireless users are experiencing random disconnects.

    In looking at the radius configuration again I notice that we have two servers defined. I looked through the logs and didn't see anything alarming, until I checked the secondary radius server. I was just told that the second radius server has been shutdown without notice.
    I will remove that from the WLAN config later tonight.
    Obvious question, but will ask it anyway, will this cause these errors?

  • Question for Cardinality

    hi
    I am Korean. so I'm not good at English.
    this is question about oracle Execution Plan?
    Index information is as below.
    INDEX_OWNER
    INDEX_NAME
    TABLE_OWNER
    TABLE_NAME
    COLUMN_NAME
    COLUMN_POSITION
    COLUMN_LENGTH
    CHAR_LENGTH
    DESCEND
    OPS$RKTIBG2
    IDX_FTIOIR_02
    OPS$RKTIBG2
    FTIOIR
    REMT_PROC_DATE
    1
    8
    8
    ASC
    OPS$RKTIBG2
    IDX_FTIOIR_02
    OPS$RKTIBG2
    FTIOIR
    BRN_NO
    2
    3
    3
    ASC
    OPS$RKTIBG2
    IDX_FTIOIR_02
    OPS$RKTIBG2
    FTIOIR
    INST_NO
    3
    3
    3
    ASC
    total count of FTIOIR table is as below.
    SQL> select count(*) from FTIOIR  ;
      COUNT(*)
        384853
    Elapsed: 00:00:00.03
    This is Question for a total of 4 cases query
    SQL> SELECT
      2        ID_NO,
      3  CUST_NAME,
      4          STA_TYPE,
      5        USD_AMT,
      6        REF_NO,
      7    REMT_PROC_DATE VALUE_DATE,
      8      REMT_CCY,
      9        TO_CHAR(REMT_AMT,'99,999,999,990.99'),
    10        TO_CHAR(USD_AMT, '99,999,999,990.99'),
    11        RSN_CODE1,
    12        DESIG_BANK_CODE,
    13        DECODE(REMT_TYPE, 'O', DECODE(STA_TYPE,'1','취결','3','등록','5','정리','6','퇴결','8','진행','9','취소',' '),
    14                          'I', DECODE(STA_TYPE,'1','등록','3','진행','5','정리','7','거절','8','진행','9','취소',' ')),
    15        TO_CHAR(REMT_CHRG,'9,999,999,999,999'),
    16  TO_CHAR(BANK_CHRG,'9,999,999,999,999'),
    17  TO_CHAR(CABL_CHRG,'9,999,999,999,999'),
    18        DECODE(REMT_TYPE,'I',APCT_DETL1,BENE_DETL1),
    19        ACCT_NO1,
    20        DECODE(NVL(CERT_ISSUE_FLAG,0),0,'미발급','발급'),
    21        REMT_CANC_DATE,
    22  REMT_SETL_DATE,
    23  TRIM(TO_CHAR(REMT_AMT, '00000000000000.99')),
    24        TRIM(TO_CHAR(REMT_CHRG,'00000000000000000')),
    25        TRIM(TO_CHAR(BANK_CHRG,'00000000000000000')),
    26        TRIM(TO_CHAR(CABL_CHRG,'00000000000000000'))
    27    FROM FTIOIR
    28    WHERE REMT_PROC_DATE BETWEEN '20120101' AND '20130101'
    29    ORDER BY VALUE_DATE, REF_NO;
    77652 rows selected.
    Elapsed: 00:00:09.81
    Execution Plan
    Plan hash value: 1710270931
    | Id  | Operation          | Name  | Rows  | Bytes |TempSpc| Cost (%CPU)| Time    |
    |  0 | SELECT STATEMENT  |        | 77060 |    17M|      | 10815  (4)| 00:03:15 |
    |  1 |  SORT ORDER BY    |        | 77060 |    17M|    20M| 10815  (4)| 00:03:15 |
    |*  2 |  TABLE ACCESS FULL| FTIOIR | 77060 |    17M|      |  9246  (4)| 00:02:47 |
    Predicate Information (identified by operation id):
      2 - filter("REMT_PROC_DATE">='20120101' AND "REMT_PROC_DATE"<='20130101')
    Statistics
            29  recursive calls
              6  db block gets
          19616  consistent gets
          20515  physical reads
          3736  redo size
      15218140  bytes sent via SQL*Net to client
          57456  bytes received via SQL*Net from client
          5178  SQL*Net roundtrips to/from client
              0  sorts (memory)
              1  sorts (disk)
          77652  rows processed
    Case 1) 1 year data was derived by using ‘between’ keyword with ‘REMT_PROC_DATA’ field in where clause.
      We notice that optimizer uses ‘full scan’ since number of records searched was as much as 77652.
    SQL> SELECT /*+ INDEX(FTIOIR IDX_FTIOIR_02) */
      2        ID_NO,
      3  CUST_NAME,
      4          STA_TYPE,
      5        USD_AMT,
      6        REF_NO,
      7    REMT_PROC_DATE VALUE_DATE,
      8      REMT_CCY,
      9        TO_CHAR(REMT_AMT,'99,999,999,990.99'),
    10        TO_CHAR(USD_AMT, '99,999,999,990.99'),
    11        RSN_CODE1,
    12        DESIG_BANK_CODE,
    13        DECODE(REMT_TYPE, 'O', DECODE(STA_TYPE,'1','취결','3','등록','5','정리','6','퇴결','8','진행','9','취소',' '),
    14                          'I', DECODE(STA_TYPE,'1','등록','3','진행','5','정리','7','거절','8','진행','9','취소',' ')),
    15        TO_CHAR(REMT_CHRG,'9,999,999,999,999'),
    16  TO_CHAR(BANK_CHRG,'9,999,999,999,999'),
    17  TO_CHAR(CABL_CHRG,'9,999,999,999,999'),
    18        DECODE(REMT_TYPE,'I',APCT_DETL1,BENE_DETL1),
    19        ACCT_NO1,
    20        DECODE(NVL(CERT_ISSUE_FLAG,0),0,'미발급','발급'),
    21        REMT_CANC_DATE,
    22  REMT_SETL_DATE,
    23  TRIM(TO_CHAR(REMT_AMT, '00000000000000.99')),
    24        TRIM(TO_CHAR(REMT_CHRG,'00000000000000000')),
    25        TRIM(TO_CHAR(BANK_CHRG,'00000000000000000')),
    26        TRIM(TO_CHAR(CABL_CHRG,'00000000000000000'))
    27    FROM FTIOIR
    28    WHERE REMT_PROC_DATE BETWEEN '20120101' AND '20130101'
    29    ORDER BY VALUE_DATE, REF_NO;
    77652 rows selected.
    Elapsed: 00:00:08.37
    Execution Plan
    Plan hash value: 465296239
    | Id  | Operation                    | Name          | Rows  | Bytes |TempSpc| Cost (%CPU)| Time    |
    |  0 | SELECT STATEMENT            |              | 77060 |    17M|      | 41035  (1)| 00:12:19 |
    |  1 |  SORT ORDER BY              |              | 77060 |    17M|    20M| 41035  (1)| 00:12:19 |
    |  2 |  TABLE ACCESS BY INDEX ROWID| FTIOIR        | 77060 |    17M|      | 39466  (1)| 00:11:51 |
    |*  3 |    INDEX RANGE SCAN          | IDX_FTIOIR_02 | 77060 |      |      |  150  (4)| 00:00:03 |
    Predicate Information (identified by operation id):
      3 - access("REMT_PROC_DATE">='20120101' AND "REMT_PROC_DATE"<='20130101')
    Statistics
            30  recursive calls
              6  db block gets
          51411  consistent gets
          4880  physical reads
              0  redo size
      15218140  bytes sent via SQL*Net to client
          57456  bytes received via SQL*Net from client
          5178  SQL*Net roundtrips to/from client
              0  sorts (memory)
              1  sorts (disk)
          77652  rows processed
    Case 2)   It’s confirmed that query is done with ‘index rage scan’ and it takes more time than ‘full scan’ when we give ‘index hint(/*+ INDEX(FTIOIR IDX_FTIOIR_02) */)’ hint using same where clause used in 1).
    SQL> SELECT
      2        ID_NO,
          CUST_NAME,
      3    4        STA_TYPE,
      5        USD_AMT,
      6        REF_NO,
      7    REMT_PROC_DATE VALUE_DATE,
      8      REMT_CCY,
      9        TO_CHAR(REMT_AMT,'99,999,999,990.99'),
    10        TO_CHAR(USD_AMT, '99,999,999,990.99'),
    11        RSN_CODE1,
    12        DESIG_BANK_CODE,
    13        DECODE(REMT_TYPE, 'O', DECODE(STA_TYPE,'1','취결','3','등록','5','정리','6','퇴결','8','진행','9','취소',' '),
    14                          'I', DECODE(STA_TYPE,'1','등록','3','진행','5','정리','7','거절','8','진행','9','취소',' ')),
    15        TO_CHAR(REMT_CHRG,'9,999,999,999,999'),
    16  TO_CHAR(BANK_CHRG,'9,999,999,999,999'),
    17  TO_CHAR(CABL_CHRG,'9,999,999,999,999'),
    18        DECODE(REMT_TYPE,'I',APCT_DETL1,BENE_DETL1),
    19        ACCT_NO1,
    20        DECODE(NVL(CERT_ISSUE_FLAG,0),0,'미발급','발급'),
    21        REMT_CANC_DATE,
    22  REMT_SETL_DATE,
    23  TRIM(TO_CHAR(REMT_AMT, '00000000000000.99')),
    24        TRIM(TO_CHAR(REMT_CHRG,'00000000000000000')),
    25        TRIM(TO_CHAR(BANK_CHRG,'00000000000000000')),
    26        TRIM(TO_CHAR(CABL_CHRG,'00000000000000000'))
    27    FROM FTIOIR
    28    WHERE REMT_PROC_DATE BETWEEN '20120101' AND '20130101'
    29      AND (REMT_PROC_DATE LIKE '2012%' OR REMT_PROC_DATE LIKE '2013%')
    30    ORDER BY VALUE_DATE, REF_NO
      ; 31
    77652 rows selected.
    Elapsed: 00:00:09.23
    Execution Plan
    Plan hash value: 465296239
    | Id  | Operation                    | Name          | Rows  | Bytes | Cost (%CPU)| Time    |
    |  0 | SELECT STATEMENT            |              |  391 | 90712 |  355  (4)| 00:00:07 |
    |  1 |  SORT ORDER BY              |              |  391 | 90712 |  355  (4)| 00:00:07 |
    |  2 |  TABLE ACCESS BY INDEX ROWID| FTIOIR        |  391 | 90712 |  354  (3)| 00:00:07 |
    |*  3 |    INDEX RANGE SCAN          | IDX_FTIOIR_02 |  391 |      |  154  (6)| 00:00:03 |
    Predicate Information (identified by operation id):
      3 - access("REMT_PROC_DATE">='20120101' AND "REMT_PROC_DATE"<='20130101')
          filter("REMT_PROC_DATE" LIKE '2012%' OR "REMT_PROC_DATE" LIKE '2013%')
    Statistics
            29  recursive calls
              5  db block gets
          51411  consistent gets
          4311  physical reads
              0  redo size
      15218140  bytes sent via SQL*Net to client
          57456  bytes received via SQL*Net from client
          5178  SQL*Net roundtrips to/from client
              0  sorts (memory)
              1  sorts (disk)
          77652  rows processed
    Case 3)   In this particular case, even though index column is used in where clause, we think that query should be done by ‘full scan’ considering number of records returned.
      But ‘index range scan was used and value of row in Execution plan was just 391.
    SQL> SELECT
      2        ID_NO,
      3  CUST_NAME,
      4          STA_TYPE,
      5        USD_AMT,
      6        REF_NO,
      7    REMT_PROC_DATE VALUE_DATE,
      8      REMT_CCY,
      9        TO_CHAR(REMT_AMT,'99,999,999,990.99'),
    10        TO_CHAR(USD_AMT, '99,999,999,990.99'),
    11        RSN_CODE1,
    12        DESIG_BANK_CODE,
    13        DECODE(REMT_TYPE, 'O', DECODE(STA_TYPE,'1','취결','3','등록','5','정리','6','퇴결','8','진행','9','취소',' '),
    14                          'I', DECODE(STA_TYPE,'1','등록','3','진행','5','정리','7','거절','8','진행','9','취소',' ')),
    15        TO_CHAR(REMT_CHRG,'9,999,999,999,999'),
    16  TO_CHAR(BANK_CHRG,'9,999,999,999,999'),
    17  TO_CHAR(CABL_CHRG,'9,999,999,999,999'),
    18        DECODE(REMT_TYPE,'I',APCT_DETL1,BENE_DETL1),
    19        ACCT_NO1,
    20        DECODE(NVL(CERT_ISSUE_FLAG,0),0,'미발급','발급'),
    21        REMT_CANC_DATE,
    22  REMT_SETL_DATE,
    23  TRIM(TO_CHAR(REMT_AMT, '00000000000000.99')),
    24        TRIM(TO_CHAR(REMT_CHRG,'00000000000000000')),
    25        TRIM(TO_CHAR(BANK_CHRG,'00000000000000000')),
    26        TRIM(TO_CHAR(CABL_CHRG,'00000000000000000'))
    27    FROM FTIOIR
    28    WHERE REMT_PROC_DATE BETWEEN '20121231' AND '20130101'
    29    ORDER BY VALUE_DATE, REF_NO;
    423 rows selected.
    Elapsed: 00:00:00.93
    Execution Plan
    Plan hash value: 1710270931
    | Id  | Operation          | Name  | Rows  | Bytes |TempSpc| Cost (%CPU)| Time    |
    |  0 | SELECT STATEMENT  |        | 68425 |    15M|      | 10634  (4)| 00:03:12 |
    |  1 |  SORT ORDER BY    |        | 68425 |    15M|    18M| 10634  (4)| 00:03:12 |
    |*  2 |  TABLE ACCESS FULL| FTIOIR | 68425 |    15M|      |  9244  (4)| 00:02:47 |
    Predicate Information (identified by operation id):
      2 - filter("REMT_PROC_DATE">='20121231' AND "REMT_PROC_DATE"<='20130101')
    Statistics
              0  recursive calls
              1  db block gets
          19616  consistent gets
          19608  physical reads
              0  redo size
          83234  bytes sent via SQL*Net to client
            828  bytes received via SQL*Net from client
            30  SQL*Net roundtrips to/from client
              1  sorts (memory)
              0  sorts (disk)
            423  rows processed
    Case 4)    ‘Index rage scan’ is expected to be used when just two days’ data is derived since derived data would be small portion of whole table.
      But it’s done with ‘full scan’
      Here’s my questions.
    1. What could be the reason of decrease in value of rows in Execution Plan(Case 3) ?
      I would like know what rows is. Does it mean Cardinality ?
    2. Why ‘full scan’ is used when ‘Index rage scan’ is more efficient to query two days’ data ? (Case 4)

    myueongyun wrote:
    What is the selectivity of  formula in LIKE clause?
    Selectivity of a column: it's basically the number of distinct values divided by the number of all values (rows) - a primary key column has selectivity 1.
    Selectivities near 1 are considered good ones vs. poor selectivities having values near 0.
    and let me know good reference site about oracle selectivity(or cardinality) you know, if you have enough time
    Hoek already did it
    maybe adding two Jonathan's book titles:
    Cost-Based Oracle Fundamentals
    Oracle Core - Essential Internals for DBAs and Developers
    Regards
    Etbin

  • Question for doubt

    1. when u save the ck11n either systme issue the messsage  OR  directly save? if give the message what is that message.... plz this my client question for my interview......( I am not working this one)......

    Hi
    When u save ck11n, the system gives a popup box which has 2 options.
    1.cost comp split(which willbe ticked by default is not editable)
    2.itemizatio( which will also be ticked by default) but this we can edit it by removing the tick.
    hit an enter here and the cost estimate will be saved.
    Hope this would help u.
    Pls assign points if useful.
    Vishnu.

  • Question for SD

    Hello expert,
         I have some question for SD consultant:
         (1) what kind of reporting skill a consultant should have?
         (2) except for application configuration skill , what other tools we have to use for a project?
    Many Thanks,

    Hi,
    (1) what kind of reporting skill a consultant should have?
    On top of what has already been proposed, one should also have the skills to build complex ABAP reports by being able to join multiple tables with various logics to arrive at a comprehensive report for the client. In the case of a functional consultant, you must be able to translate a good functional specification for the ABAP programmer to write the program.  This is usually required by the client. Simple reporting would commonly not fit the client's requirement, or at least the Management's requirement where they want to see all company's figures summarized in one page.
    (2) except for application configuration skill , what other tools we have to use for a project?
    Preferbly you should have integration knowledge and skills with various 3rd Party and Partner products used (not only cross-modules integration), i.e. external Pricing tool (for complex pricing calculations), external WM tool, external Transportation Planning tool, mobile application integration tools (currently a trend) etc etc. and how these tools can be integrated to SAP to achieve end-to-end order to cash design.  On top of all that, having knowledge and skills in various project management tools is also a plus, i.e. SAP Solution Manager, MS Project, Primavera, Visio tool, ARIS etc.  Having these knowledge is important for overall project success too.
    Hope the above helps. 
    Thanks.

  • How can you change your security question for I tunes?

    How can you change your security question for I tunes?

    If you have a rescue email address (which is not the same thing as an alternate email address) set up on your account then the steps half-way down this page give you a reset link on your account : http://support.apple.com/kb/HT5312
    If you don't have a rescue email address (you won't be able to add one until you can answer 2 of your questions) then you will need to contact iTunes Support / Apple to get the questions reset.
    Contacting Apple about account security : http://support.apple.com/kb/HT5699
    When they've been reset (and if you don't already have a rescue email address) you can then use the steps half-way down the HT5312 link above to add a rescue email address for potential future use

  • When converting over to HTTPS and PKI for clients, not all actions are available in configuration manager cpl

    I'm not exactly sure which forum heading this should go under so if this isn't correct please let me know or move it on my behalf.  
    So I am trying to setup Internet Based Client Management in SCCM 2012 R2 and have come across a few articles on how to do so.   I think I have mostly gotten it to work but I seem to be having a client issue when deploying new machines.  My already
    deployed servers seem to have picked up the PKI setting no problem.  In the past when I would deploy a new windows client everything would be fine.  When i converted over to PKI in my test environment I am now having issues when I go to deploy a
    new windows client. I don't get all of the Actions listed in the Configuration Manager control panel.  All I have are Discovery Data Collection, Machine Policy Retrieval and Eval, User Policy Retrieval and Eval, and Windows Installer Source list Update
    Cycles, before all of them would populate no problem.  I have let this machine sit here for several hours and nothing has changed yet.  It does say PKI for client certificate.  Sometimes when I would deploy new machines it would say NONE for
    Client certificate.  In my production environment it says self-signed.  I have found if i uninstall the client and re-install the client it does populate all of the cycles but I don't understand why it is not working on deployment.
    Ok so maybe not all the time that when i reinstall the client it fixes it.  I just did an uninstall and reinstall on a test client and all it has under actions are machine and user policy cycles.
    Does anyone have any ideas?

    Hi,
    I think SCCM client installed before the GPO applied, so you don't a certificate available when it is required.
    You can export and import the certificate by using MDT integration, try this blog for PKI part:
    How To: Build and Capture in Configuration Manager 2012 using HTTPS
    And in addition, you can upload the log to your onedrive so you can share with us.
    Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Subscriber Support, contact [email protected]

  • I have a new email address and my old email keeps coming up on icloud when trying to update apps and i don't know the password or security questions for the old email. I can sign in with my apple id which is tied to another email but not itunes how to fix

    I have an apple id and it has my current email attached to it. however when i go to update apps it's asking for the password for an old email. I no longer have the old email and can't use it. when I go to icloud on my ipad it asks for the password for old email. it doesn't allow me to change the old email to current. when i go to reset it i can't remember the password or security questions for the old email so it doesn't let me go any further. How do I fix this? Do i need to call apple support?

    I have the same problem - it is maddening. I rely on this iPad for work so this is not just an annoyance! The above solutions of changing the appleid on the device or on the website do not work.
    The old email address no longer exists - I haven't used it in a year probably and I no longer have the account.  I logged into the appleid website and there is no trace of the old email address so there is nothing that can be deleted or changed there.  On the iPad there is no trace of the old email address so nothing can be deleted there either. I have updated the iPad software and the same problem comes right back.  Every 2 seconds I am asked to log in using the old non-existent email.  The device is currently useless.
    The only recent change to anything was the addition of an Apple TV device, which was set up using the correct login and password.
    Does anyone have any ideas? The iPad has been backed up to the iCloud so presumably it now won't recognize the current iCloud account? So restoring may notbe an option?

  • I am having trouble answering my old security questions for my itunes account and it is creating a problem because I am not able to purchase apps/songs on my new IPAD. What phone number/email adress should I call to get a quick response to my issue?

    I have recently bought an IPAD 2 for my girlfriend and have encountered a problem with purchasing apps through my itunes account. It is requesting that I not only enter my pasword (which I know) but answer my old account questions, which I have forgotten the answers to. It had since locked me out of changing my questions for eight hours. Is there any number I can call to prove that I am the real owner of my itunes account so my girlfriend will be able to use her ipad to purchase new apps without having to go through the trouble of using one of my other apple devices? Random information: I believe my questions were set back in 2007 when I purchased my first ipod nano, since then I have used this same itunes account for my own ipod touch and ipad 2 and my girlfriends iphone 1st generation. I have never run into a problem regarding my questions before on any of these devices

    http://www.apple.com/support/itunes/contact/

  • Can somebody give some real time questions for alv report

    hi guru
    can somebody give some real time questions for alv report.
    answers also.
    regards
    subhasis.

    hi,
    The ALV is a set of function modules and classes and their methods which are added to program code. Developers can use the functionality of the ALV in creating new reports,  saving time which might otherwise have been spent on report enhancement
    The common features of report are column    alignment, sorting, filtering, subtotals, totals etc. <b>To implement these, a lot of coding and logic is to be put. To avoid that we can use a concept called ABAP List Viewer (ALV).</b>
    Using ALV, we can have three types of reports:
       1. Simple Report
       2. Block Report
       3. Hierarchical Sequential Report
    <b>Reward useful points</b>
    Siva

  • Please read my question carefully, this is, I think, a question for the experts. It's not the usual name change question.   When I setup my new MacBook Pro, something slipped by me and my computer was named First-Lasts-MacBook-Pro (using my real first and

    Please read my question carefully, this is, I think, a question for the experts. It's not the usual name change question.
    When I setup my new MacBook Pro, something slipped by me and my computer was named First-Lasts-MacBook-Pro (using my real first and last name).
    I changed the computer name in Preferences/Sharing to a new name and Preferences/Accounts to just be Mike. I can right click on my account name, choose advanced, and see that everything looks right.
    However, If I do a scan of my network with my iPhone using the free version of IP Scanner, it lists my computer as First-Lasts-MacBook-Pro! And it lists the user as First-Last.
    So even though another Mac just sees my new computer name, and my home folder is Mike, somewhere in the system the original setup with my full name is still stored. And it's available on a network scan. So my full name might show up at a coffee shop.
    Can I fully change the name without doing a complete re-install of Lion and all my apps?

    One thought... you said the iPhone displayed your computer's old name? I think that you must have used the iPhone with this computer before you changed the name. So no one else's iPhone should display your full name unless that iPhone had previously connected to your Mac. For example, I did this exact same change, and I use the Keynote Remote app to connect with my MacBook Pro. It would no longer link with my MacBook Pro under the old name, and I found that I had to unlink and then create a new link under the new name. So the answer to your question is, there is nothing you need to do on the Mac, but rather the phone, and no other phone will display your full name.

Maybe you are looking for

  • Create Billing document automatically from the outbound delivery

    Hi experts, I'm not sure my client's requirement can be implemented but i'm posting this thread just in case someone have a suitable solution. My client wloud like that billing documents (VF01) are created automatically when the outbound document (VL

  • PXI-6515

    I have a failure on Port 6 of my PXI-6515 caused, I believe, by pins 49 & 50 on the cable lead from my SBC-100 being out of line.  They therefore did not engage with the PXI card properly shorting themselves together and maybe connecting with one of

  • RMAN Backups with retention policy to redundancy 1 doesn't work fine.

    Hi experts, I have a Oracle database with the following system backups: Monday:       ArchiveLog Backup Tuesday:      Full Backup Wednesday:  ArchiveLog Backup Thursday:     ArchiveLog Backup Friday :         Full Backup Saturday:      ArchiveLog Bac

  • Addressbook and Calendar lost upon upgrading to

    In upgrading to Yosemite from Maverick on my Macbook late 2009 (2.26 GHz Intel Core 2 Duo, 4 GB 1067 MHz DDR3, Storage available: 242.73 GB, Capacity: 319.21 GB) I have lost all my AB contacts as well as my calendar. I have looked in my home folder>l

  • Persistent Spinning Beach Ball

    I have a spinning beach ball problem that I can't resolve. The computer will boot up to the login menu then when I login as a user (it happens with all users) the screen flips to my background then the beach ball starts. I can hear the drive working