Renice-ing a range of processes

Hi guys,
I'm not sure if it's the right place to post this thread, but since I'm on SL and my query deals with SL processes...
I already know how to renice one or two processes in Terminal, but I'd like to learn how to renice a range or group of processes, for example processes 1 through 200 (it's just an example), leaving root process 0 out of the equation. What I lack is the proper syntax to enter that command in Terminal. I've tried with a dash, a lower dash, parentheses, etc... and got an error message.
What's the proper syntax to achieve my goal?

Hi
Post here:
http://discussions.apple.com/forum.jspa?forumID=735
Tony

Similar Messages

  • Cost Analysis Report - For a range of process orders

    Dear all,
    Is there a standard report available to get the cost analysis for a range of process order? COR3 --> Go to --> Cost --> Analysis. Here I can see the cost analysis for one report. But I wanted to get the cost analysis report for a range of process orders. Please help.
    Thanks
    Nagarajan

    Dear
    You can use cost analysis report like
    1.S_ALR_87099932 - Variances Between Costing Runs
    2.S_ALR_87099931 - Price vs Cost Estimate
    3.S_ALR_87099932 - Variances Between Costing Runs
    5.KOC4
    Regards
    JH

  • Tcode for O/H calaculation for range of process orders

    Dear Friends,
    We have  Tcode CO43 for Actual O/H calaculation -Collective Processing and KGI2 for Individual Processing.Other then this is there any Tcode to procees the O/H calaculation for range of procees Orders.
    Thanks in advance.
    Ram

    Hello, I'm not familiar with process orders, nevertheless try trx "KGI4" for collective order processing.

  • Number range for process order - Bulk and Filling.

    I was trying to configure the Process order number range based on order type. In the IDES/ development system, some of the number ranges are pre-configured and already in use. Even the '+' green sign at the top is missing.
    I tried with 'CORN' and then selected the order type and the Number Range General at the very bottom.
    Help is appreciated and will be rewarded.
    For example: The FG process order to have 1xxxxxxxxx, bulk: 2xxxxxxxxx.
    Thnx!
    Abhi.

    Number Ranges
    Assigning number range
    There are two types of number assignment:
    Internal
    When saving a data record, the SAP System assigns a sequential number that lies within the corresponding number range interval.
    External
    When saving a data record, either you or an external system assigns a number. You need to ensure that the number lies within the corresponding number range interval.
    Example
    Co82 let us say order number range maintenance
    let us say you have created a new order type oen for FG and one for bulk and you want to assign a new number range
    In CO82..
    Menu path  Group -->maintain
    In maintain number range group screen,
    Group --> insert
    Give text and from number and to number 
    say text = new order say For FG
    range - 1xxxxxxxxx to 1999999999999 (tick ext check box if the range is external number range-manual input)
    click on +
    You can see your group at the end of list
    In Not assigned group your new order type will be present
    Place the curser on that order type and fallow the menu path as below
    Edit -->select element
    Select NEW order number range group check box
    edit --> assign element group.
    Now the number range is assigned to the new order. Save it, You will get a pop up, just ignore it.
    I hope it will help you
    Same thing yoyu repeate for Bulk

  • SQL to idenfity gaps in ranges

    A friday SQL teaser! 11.2.03.
    I have a table with indicator and start, end ranges. I need an SQL to return ranges that are not excluded.
    create table k_test (indicator varchar2(10),start_val number, end_val number);
    insert into k_test values('INCLUDE',000,999);
    insert into k_test values('EXCLUDE',000,503);
    insert into k_test values('EXCLUDE',507,511);
    insert into k_test values('EXCLUDE',514,999);A select statement please to return the ranges that are "open", i.e. not excluded.
    504
    505
    506
    512
    513I can manage this in PL/SQL, keen to know a clever way in SQL.

    Ok, let's do some advertising, because i think this solution is simple to understand and readable and need less effort to solve the problem in my opinion. An all can be seen stepwise.
    First imaging an empty excel sheet.
    So we start from here and fill in the start data.
    --select r from (
    select r, rng, start_val, end_val, indicator from t
    model
    dimension by (r)
    measures(1 rng, start_val, end_val, indicator)
    rules iterate(0) until iteration_number > start_val[0] (
    rng[for r from start_val[iteration_number+1] to end_val[iteration_number+1] increment 1]=
    case
    when cv(r) >= start_val[iteration_number+1]
    and cv(r) <= end_val[iteration_number+1]
    and indicator[iteration_number+1]='EXCLUDE'
    then 0
    when indicator[iteration_number+1]='INCLUDE'
    then 1
    else nvl(rng[cv()],0)
    end
    --)where rng = 1
    R     RNG     START_VAL     END_VAL     INDICATOR
    2     1     0     503     EXCLUDE
    3     1     507     511     EXCLUDE
    4     1     514     999     EXCLUDE
    1     1     0     999     INCLUDE
    0     1     4     -      - The last "artificial" row is only used to hold the value for the max iterations needed, that's the number of rows in t. This cell (Excel!) is adressed with start_val[0].
    So now we look at the result of first iteration rules iterate(1):
    R     RNG     START_VAL     END_VAL     INDICATOR
    2     1     0     503     EXCLUDE
    3     1     507     511     EXCLUDE
    4     1     514     999     EXCLUDE
    1     1     0     999     INCLUDE
    0     1     4     -      -
    5     1     -      -      -
    6     1     -      -      -
    7     1     -      -      -
    8     1     -      -      -
    9     1     -      -      -
    10     1     -      -      -
    11     1     - just a snipplet. But we can see, that a INCLUDED-row was processed, because rng wa set to 1 on serveral cells. In fact in all rows from 0 to 999. The rows that were not there before, were created on that iteration.
    so what will happen in the next iteration rules iterate(2)?
    R     RNG     START_VAL     END_VAL     INDICATOR
    2     0     0     503     EXCLUDE
    3     0     507     511     EXCLUDE
    4     0     514     999     EXCLUDE
    1     0     0     999     INCLUDE
    0     0     4     -      -
    5     0     -      -      -
    6     0     -      -      -
    7     0     -      -      -
    8     0     -
    995     1     -      -      -
    996     1     -      -      -
    997     1     -      -      -
    998     1     -      -      -
    999     1     -      -      Obviously an excluded row was processed, the one with (0     503) and therefor rng was set to 0 in the rows from 0 to 503.
    So that row processing goes on until all rows form the origin table are processed, in this case 4, and everytime rng in the processed range will marked with 0 or 1 depend on the indicator and leaved untouched if the row is out of the range in process.
    rules iterate(9999999) until iteration_number > start_val[0] is just a construct not to hardcode the number of iterations.
    At the end, all we have to do is counting the rows with rng 1.
    So be honest, is this way too complicated ?-)

  • Two transactions, same program, processed in background task problem

    Y0 Team ABAP,
    i got something here that bugs me.
    I have done a report. Nothing special, simple selection screen, selection of data, and output via SALV.
    One of my selection screen fields (a parameter) is VKBUR and it is "obligatory".
    2 weeks ago i got the requirement to create a copy of this program, and adopt VKBUR as select option.
    Since i didnt want changeanomalies i decided not to duplicate the program, but just add a second transaction to my program.
    In a routine at event at-selection-screen output, i´m hiding either the parameter or the select option, depending on which tcode was used.
    In some routine which gets triggered at the event at-selection-screen i´m moving either what we got in our parameter to our local range we use for the select, or just assign the select option to our local range, or process an error message if according field is not filled. Yeah that obligatory condition is done by myself since i cant just set the obligatory addition to the statement.
    This all works quite fine so far.
    BUT:
    Today i hear that the end-users process that report in background task by pressing F9.
    Problem is now that when it is processed in background task, sy-tcode is initial, so i dont know which of the transactions the user picked, and so i dont know which of the two fields has to be filled.
    Sure i could do another report, containing just my second selection screen, and when this is checked, do a submit on my real report, tho i still believe there must be some more elegant way.
    Any ideas?

    Unfortunateley those subtotals cant be handeled by the layout, thats why i manually add them.
    But you got me back on track! right now i´m for your solution.
    right now i´m having just ONE selection screen with the select option on it.
    User can decide if he fills just one value or more.
    In the end i loop over my output table and look if there are records of different VKBUR´s.
    If there are i know he wants subtotals and process them. If its just data of one VKBUR i can spare myself the hassle as there is anyway just one records per VKBUR so subtotaling this wouldnt make sense.
    thanks. Thats what i will present my consultant now lets see if i can get him satisfied with it...

  • HTTP transport error: javax.xml.soap.SOAPException: java.security.PrivilegedActionException: javax.xml.soap.SOAPException: Message send failed: String index out of range: -7

    All -
    I'm new to consuming web services in JDeveloper. I'm using Oracle JDEV 10.1.3.3/OC4J.  I'm using this version since it is compatible with Oracle EBS 12.1.3.  My intent is to pull data from our third party recruitment app (Success Factors) and load that data into Oracle HRIS.  I'm already doing this through a .NET application.  I'm converting it to be a Java Concurrent Program in EBS.  The code listed below is a stub call to verify I'm on the right track. I created a JDeveloper Web Services proxy project.  I'm testing it locally on my windows desktop.  When I'm able to consume the service successfully, then I'll think about moving it to the EBS server.
    I'm getting the following error when I invoke the following service:
    HTTP transport error: javax.xml.soap.SOAPException: java.security.PrivilegedActionException: javax.xml.soap.SOAPException: Message send failed: String index out of range: -7
    End point is: https://api4.successfactors.com/sfapi/v1/soap?wsdl
    Any help/assistance would be much appreciated. 
    Below is my code and output of my test:
    package emsc.oracle.apps.emscper.sfapi.proxy;
    import HTTPClient.HTTPConnection;
    import emsc.oracle.apps.emscper.sfapi.proxy.types.sfobject_sfapi_successfactors_com.IsValidSession;
    import emsc.oracle.apps.emscper.sfapi.proxy.types.sfobject_sfapi_successfactors_com.IsValidSessionResponse;
    import emsc.oracle.apps.emscper.sfapi.proxy.types.sfobject_sfapi_successfactors_com.Login;
    import emsc.oracle.apps.emscper.sfapi.proxy.types.sfobject_sfapi_successfactors_com.LoginResponse;
    import emsc.oracle.apps.emscper.sfapi.proxy.types.sfobject_sfapi_successfactors_com.LoginResult;
    import emsc.oracle.apps.emscper.sfapi.proxy.types.sfobject_sfapi_successfactors_com.Logout;
    import emsc.oracle.apps.emscper.sfapi.proxy.types.sfobject_sfapi_successfactors_com.LogoutResponse;
    import emsc.oracle.apps.emscper.sfapi.proxy.types.sfobject_sfapi_successfactors_com.SFCredential;
    import emsc.oracle.apps.emscper.sfapi.proxy.types.sfobject_sfapi_successfactors_com.SFParameter;
    import emsc.oracle.apps.emscper.sfapi.proxy.types.sfobject_sfapi_successfactors_com.Error;
    import java.io.File;
    import javax.xml.rpc.ServiceFactory;
    import java.util.ArrayList;
    import java.util.List;
    import java.util.Date;
    import javax.xml.ws.BindingProvider;
    import javax.xml.soap.SOAPException;
    import java.util.Map;
    import oracle.security.ssl.OracleSSLCredential;
    public class SFAPITest {
        // Declare members:      
        private String companyId;
        private String userName;
        private String password;
        private String developerKey;
        private Date   effDt;
        private String greaterThanEffDt;
        private String lessThanEffDt;
        // Declare constants:      
        final static private String breakLine = "+---------------------------------------------------------------------------+";
        final static private String format    = "yyyy-mm-dd";      
        private enum ReqId {
            PrimaryReq(25),
            PrimaryReqCEO(26),
            EmCarePrimary(27),
            RTI(28),
            EmCareClinical(29);
            private int reqId; 
            private ReqId() {
            private ReqId(int value) {
                reqId = value;
            public int getReqId() {
                return reqId;
        // Getters and Setters:  
        protected String getCompanyId() {
           return this.companyId;
        protected void setCompanyId(String value) {
           this.companyId = value;                 
        protected String getUserName() {
           return this.userName;
        protected void setUserName(String value) {
           this.userName = value;                 
        protected String getPassword() {
           return this.password;
        protected void setPassword(String value) {
           this.password = value;                 
        protected String getDeveloperKey() {
           return this.developerKey;
        protected void setDeveloperKey(String value) {
           this.developerKey = value;                 
        protected Date getEffDt() {
            return this.effDt;
        protected void setEffDt(Date value) {
            this.effDt = value;                 
        protected String getGreaterThanEffDt() {
           return this.greaterThanEffDt;
        protected void setGreaterThanEffDt(String value) {
           this.greaterThanEffDt = value;                 
        protected String getLessThanEffDt() {
           return this.lessThanEffDt;
        protected void setLessThanEffDt(String value) {
           this.lessThanEffDt = value;                 
        public void runProgram()
            SFAPIService mySFAPIService;
            String CompletionText = "";
            String effDtStr2 = null;
        /* Code your program logic here.
        * Use getJDBCConnection method to get the connection object for any
        * JDBC operations.
        * Use CpContext provided commit,rollback methods to commit/rollback
        * data base transactions.
        * Don't forget to release the connection before returning from this
        * method.
        /* Call setCompletion method to set the request completion status and
        * completion text.
        * Status values are ReqCompletion.NORMAL,ReqCompletion.WARNING,
        * ReqCompletion.ERROR.
        * Use Completion text message of length 240 characters. If it is more
        * than 240 then full string will appear in log file and truncated 240
        * characters will be used as request completion text.
        try
            ServiceFactory factory = ServiceFactory.newInstance();
            mySFAPIService = (emsc.oracle.apps.emscper.sfapi.proxy.SFAPIService)factory.loadService(emsc.oracle.apps.emscper.sfapi.proxy.SFAPIService.class);      
            SFAPI api = mySFAPIService.getSFAPI();
           /// SFAPI api = new SFAPI();
            //Map<String, Object> requestContext = ((BindingProvider) api).getRequestContext();
            //requestContext.put(BindingProvider.SESSION_MAINTAIN_PROPERTY, true);
            System.out.println("ServiceName => " + mySFAPIService.getServiceName().toString());
            System.out.println("End Point   => " + mySFAPIService.getServiceName().toString());
            System.out.println(breakLine);
            // Authentication: Login to SFAPI:
            SFCredential credential = new SFCredential();
            // Fake credentials being passed in for this post:   
            credential.setCompanyId("XXX");
            credential.setUsername("XXX");
            credential.setPassword("XXX");
            credential.setDeveloperKey("XXX");
            HTTPConnection httpsConnection = null;       
            OracleSSLCredential _credential = new OracleSSLCredential();      
            _credential.setWallet("\\\\\\C:\\Program Files\\Java\\jdk1.6.0_33\\jre\\lib\\security", "ParkEstes3");
            /*System.setProperty("javax.net.ssl.trustStore","C:\\\\\OraHome_1\\jdev\\jdevbin\\jdk\\jre\\lib\\security\\keystore");
            System.setProperty("javax.net.ssl.trustStorePassword","changeit");  
            System.out.println(System.getProperty("javax.net.ssl.trustStore"));*/
            // SFParameter: Define a generic SFParameter List.  This is a necessary parameter
            // to invoking calls in SFAPI:      
             /*System.setProperty("javax.net.ssl.keyStore",
             "file:\\\C:\\jdk1.4.1\\jre\\lib\\security\\client.keystore");
             System.setProperty("javax.net.ssl.keyStorePassword","welcome");         */
            /*  System.setProperty("oracle.net.wallet_location",
                          "(SOURCE=(METHOD=file)(METHOD_DATA=(DIRECTORY=\\\C:\Users\dparrish\Oracle\WALLETS)))");  // (2)                     */
            File kstore = new File("C:\\OraHome_1\\jdev\\jdevbin\\jdk\\jre\\lib\\security\\jssecacerts");
            boolean exists = kstore.exists();
            if (!exists) {
                System.out.println("Keystore does not exist");
            else {
                System.out.println("Keystore does exist");
            System.setProperty("javax.net.ssl.trustStore", kstore.getAbsolutePath());
            System.setProperty("javax.net.ssl.trustStorePassword", "changeit");
            //System.setProperty("proxySet", "false");
            //System.setProperty("http.proxyHost", "127.0.0.1");
            //System.setProperty("http.proxyPort", "8080");
            System.out.println(kstore.getAbsolutePath());
            List<SFParameter> lst = new ArrayList<SFParameter>();
            SFParameter param = new SFParameter();
            param.setName("");
            param.setValue("");
            lst.add(param);      
            SFParameter[] sfParam = lst.toArray(new SFParameter[lst.size()]);
            Login login = new Login();
            try {
                login.setCredential(credential);
                System.out.println("1");
                login.setParam(sfParam);
                System.out.println("2");
                LoginResponse loginResponse = new  LoginResponse();
                LoginResult loginResult = new LoginResult();
                try {
                     loginResponse = api.login(login);               
                catch (Exception e ) {
                    System.out.println(e.getMessage());
                System.out.println("3");
                try {               
                     loginResult = loginResponse.getResult();
                catch (Exception e ) {
                    System.out.println(e.getMessage());
                System.out.println("4");
                IsValidSession vs = new IsValidSession();                  
                IsValidSessionResponse isValidSessionResponse = api.isValidSession(vs);
                System.out.println("5");
                if (isValidSessionResponse.isResult()) {
                     System.out.println("Session is valid");
                     System.out.println("Result => " + loginResult.getSessionId());
                     System.out.println(breakLine);              
                    Logout logout = new Logout();
                    LogoutResponse logoutResponse = api.logout(logout);
                    if (logoutResponse.isResult()) {
                         System.out.println("Logout of SFAPI Successful");
                    else {
                        System.out.println("Logout of SFAPI Unsuccessful");
                else {
                     System.out.println("Session is invalid");
                    List<Error> errors = new ArrayList<Error>();
                    for (int i = 0; i < loginResult.getError().length;  i++) {
                        errors.add(loginResult.getError()[i]);
                    for (int i = 0; i < errors.size(); i++) {
                         System.out.println("Error Indice   => " + i);
                         System.out.println("Error Code:    => " + errors.get(i).getErrorCode());
                         System.out.println("Error Message: => " + errors.get(i).getErrorMessage());
                         System.out.println(breakLine);                                                          
                    } // end for loop of SFObject errors
                } // end InvalidSession
            catch (Exception e)
                 System.out.println("Session Credential Exception");
                 System.out.println("Exception => " + e.getMessage());
                 System.out.println(breakLine);                   
        catch (Exception e)
            System.out.println("Parameter List Exception");
            System.out.println("Exception => " + e.getMessage());
            System.out.println(breakLine);
        }   // end runProgram
        // Constructor:
        public SFAPITest()  {
        } // end constructor
        public static void main (String args[]) {
            try
                SFAPITest test = new SFAPITest();        
                test.runProgram();
            catch (Exception e) {
                System.out.println("main exception => " + e.getMessage());
    } // SFAPITest
    Here is the output with trace:
    WARNING: Unable to connect to URL: https://api4.successfactors.com:443/sfapi/v1/soap due to java.security.PrivilegedActionException: javax.xml.soap.SOAPException: Message send failed: String index out of range: -7
    Session Credential Exception
    Exception => ; nested exception is:
        HTTP transport error: javax.xml.soap.SOAPException: java.security.PrivilegedActionException: javax.xml.soap.SOAPException: Message send failed: String index out of range: -7
    +---------------------------------------------------------------------------+
    Process exited with exit code 0.

    The other end is throwing back a programming error.
    That might be because you are sending incorrect data and the other end fails to validate it.
    You might be able to guess based on your C# code.  But, since you are using soap one generic solution is available to you.
    - Get an http proxy interceptor like wireshark.
    - Run it while your C# app runs, collect the http requests from that.
    - Run it while running your java code, collect the http requests from that.
    Compare the two.

  • Process Order Number

    Hello Friends,
    I have an issue which is when we create a process order and when we save it the process order number is not coming in continuous series and it is coming in randam numbers. Can any one give me solution for this issue.
    Thanks,
    KS

    Hi Niraj,
    Thanks for your response as per your suggestion i have checked the number range for Process Order and it is Internal only not external. Would you please hlep me out to close this issue
    Thanks,
    KS

  • External Number gneration for process order creation

    Hi,
       I need to generate external number range for process order creation and at the time of goods receipt.
       How can I do this in the include ZXVBZU02.
    Regards
    SAi

    You might want to try search first:
    http://www.google.com/search?hl=en&source=hp&q=externalnumberrangeforprocessordersite%3Asap.com

  • When using Add Tags, fonts get unembedded in the process

    I have to add accessiblity tags to existing PDFs. When doing this, some of my fonts become unembedded.
    I'm not sure if actual pre-existing fonts are unembedded or if during the add tags function, font are introduced to the PDF and not embedded (times-roman is the font). Can anyone help?
    My needs require tags and embedded fonts (absolute requirement).

    Hey itsRicky,
    You know, you are dealing with more than one variable when it comes to Tagged PDF output having embedded fonts?
    Acrobat (as you have observed) is one.
    Others are:
    The authoring application and its tag management facility (if any or PDFMaker if using MS Word).
    The Distiller job option used.
    Or, if not using Adobe processes, the third-party process used to create the PDF.
    Unfortunately, many of the lower to mid-range cost processes seem to not fully comply with the ISO Standard for PDF (currently 32000-1:2008).
    This can result in PDF that can be problematic in its behavior(s) when appling ISO 32000 compliant "agents" (aka Acrobat Pro).
    Hopefully, more of these software houses will begin to provide ISO compliant agents.
    fwiw -
    Tagged output PDF (having embedded fonts) that is post-processed (adding new tags at times) can result in a "final" PDF that has no issues with fonts or with the structure tree. I say this as it is the outcome of what I do with FrameMaker-Distiller-Acrobat Pro  & Word-PDFMaker-Distiller-Acrobat Pro.
    From that perspective/experience I have to disagree with you re: "a bug" in Acrobat.
    Regardless, a bug report can be initiated at:
    https://www.adobe.com/cfusion/mmform/index.cfm?name=wishform
    Be well...

  • Query date range modification

    Hi there, im new to BW and query designer. Im on BW 7.3. User has requested me to make modification to and existing BEX query. This query at present returns 1 month worth of data. the user now wants this query to return last year + current YTD data. How do I approach this modification, please suggest. thanks Regards

    Hi Samique,
    It is not clear why do you need the user to provide input for a report spanning from last year to YTD. I can only assume that it is either to decide the period till which YTD(year to date) values are to be calculated or to decide which of the last year periods will be considered.
    e.g. if user inputs 003.2015 then this will be the end period for YTD calculation or the last year data to be considered will be from 003.2014. Please provide clarification for this part.
    These both cases can be achieved using customer exit variable.
    Suppose you accept the user input in say variable Var1.
    Now, you need to create a new variable, VAR2, on 0FISCPER characteristics, with properties, select options range and processing as customer exit.
    In your query designer in the filter pane-> characteristics restriction, you must restrict 0FISCPER with Var2.
    Now in CMOD tcode you need to write a logic to fill the values for Var2.
    Logic could be as follows:
    Data: Curr_Period(7) TYPE C,
             Year (4)           TYPE C. 
    WHEN 'Var2'.
       IF i_step = 2.
         LOOP AT  i_t_var_range INTO  loc_var_range  WHERE  vnam = 'VAR1'.
          l_s_range-low = loc_var_range-low. (assuming the YTD end value is the user input)
    **OR ELSE if the YTD value is to be derived from system date then
         Curr_Period = get_period_from_date (sy-datum) . (pass system date to get current period )
         l_s_range-low = Curr_Period .
    Year =  loc_var_range-low(4) - 1 . (get last year value from Var1)
    CONCATENATE Year loc_var_range-low+4(3) INTO l_s_range-high.
    (Assuming the last year data is required from the period as entered by user).
    OR ELSE if entire last year data is required then
    CONCATENATE Year '001' INTO l_s_range-high.
           l_s_range-sign    = 'I'.
           l_s_range-opt      = 'EQ'.
        APPEND l_s_range  TO  e_t_range.
    EXIT.
    ENDLOOP.
    ENDIF.
    ENDCASE.
    Hope this helps.
    -Swati.

  • I wan to know complete process(business) in procurement area in SCM

    Hi,
    I want to know complete business process in procurement area in SCM.
    Thanks in advance,
    ravi.

    hi ravi,
    Food & Beverages Industry Business Processes
    Procurement & Supply Chain:
    Raw Materials Procurement
    Machinery Procurement
    Food / Beverages Manufacturing:
    Food Preparations Operations
    Quality Control
    Storage & Inventory Control:
    Specialised Storage for Perishable Items
    Inventory Management
    Distribution:
    Transportation
    Sales & Channel Management:
    Order Processing & Fulfilment
    Marketing Management
    Retail Sales Monitoring & Management
    In-store Exposure Management
    Strategy:
    Marketing & Competitor Intelligence Gathering
    Web & E-commerce Strategy
    Daily, Weekly & Monthly
    SAP for Retail supports the following business process categories for food retailers:
    Category and merchandise management-- Manage consumer-driven categories as strategic business units and gain efficiencies in areas such as category and assortment planning, allocations, and item management. Solutions support a full range of processes, including category strategy roll-out and scorecard review, key item planning, image items new product introduction, and SKU rationalization.
    Buying and vendor management -- Strengthen supplier relationship management and overall operational procurement to optimize supplier selection, compress cycle times, and devise sourcing and purchasing strategies. Solutions support a broad range of purchasing activities, including perishable management, private label management, vendor managed inventory, purchase order management, self service, forward and line buying, and invoice matching.
    Revenue management -- Execute the pricing strategies needed to achieve your profitability goals through cost management, optimization and demand creation, and price management. Solutions support base price optimization, demand forecasting, markdown optimization, retail price management and execution, promotions management, clearance management, and total landed cost, deal, and rebate management.
    Supply chain management -- Optimize supply chain planning, execution, and monitoring to streamline your merchandise flow, reduce out-of-stock situations, and balance out your inventory. Solutions enable private label production, perishable planning, collaborative planning forecast and replenishment, available to promise, warehouse and yard management, transportation planning, reverse logistics, global import management, and supply chain visibility and tracking.
    Store and channel management -- Enhance customer relationship management, store operations, workforce management, and point of sale to offer the best services through different channels. Solutions support key multi channel retail activities, including customer segmentation, market basket analysis, alternative store sourcing, custom order management, returns authorization, store level inventory management, mobile checkout, and labor scheduling.
    Enterprise management and support -- Solve business issues in real-time on both a strategic and an operational level -- and gain control of business processes and assets -- through functionality for finance, human capital management, and corporate services. Solutions support key processes, including financial and management accounting, corporate governance, real estate management, payroll and benefits administration, workforce management, life cycle data management, and enterprise asset management.
    Visit the followingl links:
    http://www.spesfeed.co.za/Supply%20Chain%20Management.htm
    http://www.ebpo.in/ind/food/food.html
    http://www.sap.com/usa/industries/retail/businessprocesses/food/index.epx
    Regards,
    partha

  • NAT traffic over a IPSec tunnel (ISR)

    Hi.
    I's suppose to setup i IPSec tunnel between an 1811 and some sort of CheckPoint firewall. The IPSec part isen't that big of a deal, but the system manager on the "CheckPoint side" want the traffic though the tunnel should originate from a public IP-address, and only one source IP-address.
    So, Let say that my ISP have given me 10.10.1.1 - 10.10.1.5, our inside clients have an IP-address from the range 192.168.10.0/24, and the remote application in the "Checkpoint site" has the IP-address 172.16.1.10. The result of this should be:
    IPSec tunnel is created using the 10.10.1.1 IP-address.
    The traffic from the 192.168.1.0/24 clients should access the application at 172.16.1.10 using 10.10.1.2 as source address OVER the IPSec tunnel.
    Is this possible? I guess that it would mean that I have to NAT the traffic going though the IPSec tunnel, but I'm having trouble getting this to work. I have googled all day long looking for something similar.
    Anyone who could shed some light? Any insight appreciated.
    Sheers!
    /Johan Christensson

    Thanks jjohnston1127!
    Well, i guess that it would work, and I wasen't that far off, but got stuck in the "ip nat inside" rule when I where to specify either a pool och an interface. It diden't accur to me that a pool chould just consist of 1 IP-address.
    How ever, this raised a new problem. The "match address" access-list that I use in the crypto map for the IPSec configuration currently looks something like this:
    access-list 150 permit ip host 10.10.1.2 host 172.16.1.10
    If i change it to something like this, the tunnel negotiation get triggerd.
    access-list 150 permit ip 192.168.1.0 0.0.0.255 host 172.16.1.10
    How ever i assume that the negotiation failes because the tunnel configuration in my router has a different "local network" than the "remote network" at the Checkpoint site.
    Is this because that the NAT'ing dosen't get processed before the IPSec configuration?
    Can this behavior be changed?
    Best regards,
    Johan Christensson

  • MVC model in Web systems and applications

    MVC model in Web systems and applications
    Object-oriented design model is experience, MVC idea is a user interface for the original. This article discusses how the major application areas in the new Web design patterns and the use of MVC framework. The article first introduced the concept of design patterns and characteristics, and MVC architecture design concepts and analysis of the MVC framework contains several key models. Based on the characteristics of Web applications on how to use patterns and MVC framework made some design ideas.??
    1. Introduction
    1.1 design model
    Object-oriented technology and the emergence of software applications has greatly enhanced the trusted and software quality. Object-oriented programming than previous models to various programming simple and efficient, but the object-oriented design methodology than the previous design methods to complex and much more skill, a good design should be both on the issue of gender, but also to take full account of the problems and needs sufficient interoperability. In the past 10 years, people in the object-oriented technology and the practical application of research to explore certain issues in relation to the creation of a number of good solutions, the so-called object-oriented design patterns. Object-oriented technology is one of the purposes of enhancing the software trusted, and to design model, design programmes in important positions from a deeper sense of meaning and essence embodies trusted. There are many people in the design model definition, which cited Christopher Alexander is the largest design model definition : Each design model is a tripartite rule, which expresses a contextual environment (Context), a problem and a solution. Design models generally following basic elements : model name, the purpose solution effect 1995-1998 code and related design models. There are several classifications design patterns can be divided into a model based on the purpose (Creational), structural type (Structural) and the type of behaviour (Behavioral) three. It is mainly used in the creation of a model-based object model-based structure to deal primarily with the category or combination of objects, used to describe behavior-based model is the main target for the category or how stress and how to allocate responsibilities. Design patterns can be divided into categories based on the scope and target mode model type model dealing with the relationship between the categories and sub-categories, these relations through the establishment of succession in Translation moment to be finalized, are static. Model is targeted at addressing the relationship between the moment of change these relations in the operation, more dynamic. Model features : through the experience acquired in a structured format to write down, avoid encountering the same problems on the first design, exist in different abstract level, in continuous improvement, can be trusted artificial product for the design and best practice in the world to be combined to address larger issues.
    1.2 MVC framework
    MVC was first used in a user interface Smalltalk-80 China. M representative models Model, representatives maps View V, C representatives controller Controller. MVC trusted code with the aim of increasing the rate of data reduction expressed, the data describing the operation and application coupled degrees. Also makes software Keweihuxing, restorative, expansionary, flexibility and packaging of greatly enhanced. Single-user applications are usually incident-driven user interface to the organizational structure. Staff development tool with an interface painting of a user interface interface code based on user input and then prepare to implement the corresponding moves, many interactive development environment encouraged to do so, because it emphasizes first and then a functional interface. Some software design model is the strategy that will be fixed before the code into the regular system of the final. Result is that the procedures and organizations around the user interface elements in the user interface elements of those moves, data storage, applications and functions of the code is used to indicate the way intertwined. In single-user system code structure can be so, because the system will not demand frequent changes. But for a large system such as large Web systems, or e-commerce systems to be applied. Model by incorporating data from a variety of access and control data can be separated to improve distributed system design. MVC design pattern is composed of three parts. Model is the application object, no user interface. Type in the screen showing that it represents the flow of data users. Controller user interface definition response to user input, the users responsible for the action against the Model into operation. Model View data updated to reflect the adoption of data changes.
    2. MVC design pattern,
    An MVC framework for the design of the system includes many models, but with MVC is most closely related to the following three models : Observer, Cambridge and Strategy.
    2.1 Observer models
    MVC through the use of purchase / notification form and the separation of the Model View. View to ensure that their content accurately reflected Model and state. Once Model content changes, there must be a mechanism to allow notification to the relevant Model View, View can be made relevant at the appropriate time updating of data. This design is also more general problems can be solved, the target separation, making a change to the target audience affect others, which targets those who do not know the details of the object being affected. This is described as Observer in the design model. Model type : Observer model is the object-oriented model, it is behaviour-based model. Model purposes : definition of hierarchical dependence relations between objects, or when a target value of the state change, all its dependent relationship with the object are notified and automatically updated. There are a variety of data may show a way, in different ways and may also show. When a way through a changed data, then the other should be able to show immediately that the data change and do accordingly.
    Effect :
    1. Abstract coupling. I only know that it has a target audience of some observers, the observers met each abstract Observer category simple interface, does not know their specific affiliation categories. This makes the coupling between goals and observers smallest and abstract.
    2. Support radio communications. Needless to notify designated observers goals, how to deal with the observer informed decisions.
    3. Possible accidents updated. We update logic, avoiding mistakes updated.
    2.2 Faculty model
    MVC is an important feature of View can nest. Nest can be used for any type of combination of local maps available, but also management of type nest. This thinking reflects the type and mix of components will be equal treatment design. This object-oriented design ideas in the area of Cambridge has been described as a design model. Model types : Cambridge model is the object-oriented model, it is also the structure type model. Model purpose : to target portfolio into tree structures to express "part-whole" level structure. Prepared for the use and combination of individual target audiences with the use of consistency.
    Effect :
    1. Definition of a target portfolio includes simple objects and the structure of the category level. Simple objects may be complex combinations of objects, and can be targeted portfolio mix. This customer-code used in the target areas can use simple combinations target.
    2. Simplify customer-code. Needless to know their customers - a mix of target audiences is a simple target or can use these items in a consistent manner.
    3. Easier to add new types of components. New components can easily be changed to a combination of customer-targeted codes.
    2.3 Strategy model
    Another important characteristic is the MVC can not change the View of changes View response to user input. This often requires a change in response to the logic of the system is very important. MVC to respond to the logic involved in the Controller. Controller of a category level structure could easily change to the original Controller appropriate, a new Controller. View Controller son used to achieve a specific example of such a response strategy. To achieve different response strategy, as long as examples of the use of different types of replacement will Controller. Also in the running time by changing the View Controller for users to change View of response strategies. This View-Controller relationship was described as an example of Strategy design pattern. Model types : Strategy model is the object-oriented model, it is behaviour-based model. Model purposes : definition of a series of algorithms, and their packaging, and ensure that they can replace each other, making algorithms can independently use its customer-change.
    Effect :
    1. Strategy category levels for Context definition of the relevant algorithms can be trusted or behaviour.
    2. Alternative methods of succession. If the direct successor Context, with different acts will be added Context act, the realization of which would algorithm mixed up with Context, Context hard to preserve and expand, but can not dynamically changing algorithms. Will be enclosed in a separate Strategy category algorithms to enable algorithm independent Context change easily cut over expansion.
    3. Can provide the same acts different date.
    4. Strategy-must understand what customers between different.
    5. Context and Strategy communications between costs.
    6. An increase in the number of targets.
    3. MVC in Web application system
    Now some of the distributed systems such as Web-based B2B e-commerce system, suitable for use MVC framework. Through analysis from the perspective of high-level applications can be a target divided into three categories. Category is shown for the target audience consists of a group of commercial rules and data, there is a category that is receiving requests to control commercial target to complete the request. These applications often need to change is shown, such as web style, color, but also need to demonstrate the contents of the display. And the business rules and data to be relatively stable. Therefore, said that the frequent need to change the View objects that the business rules and data model to be relatively stable target, and that the control of the Controller is the most stable. When the system is usually issued after the View objects by artists, designers or HTML/JSP system managers to manage. Controller target applications development personnel from the development and implementation of rules for commercial and business development personnel from the target data, database managers and experts in the field of common completed. Show in Web?? or customers - control logic can be Servlet or JSP, dynamically generated Html. Generally used Servlet better than using JSP. JSP will be better with the Html code of separate codes for page designers and developers of separation efficiency. Servlet and JSP can complete all complete functions, actually JSP eventually converted into a Servlet. And control of the target system exists in every level, the coordination of cross-layer moves. Contain business rules and data objects exist in the EJB layer (EJB-centred model) or Web?? (Web-centred model).
    3.1 View in the Web application system
    View of the system shows that it fully exist in Web??. General by JSP, Java Bean and Custom Tag. JSP can generate dynamic web content using Java Custom Tag easier Bean, but it can show the logic of packaging, and more conducive to modular trusted. Some well-designed in a number of JSP Custom Tag can even be used in different system duplication. Model for control of JSP and Java Bean objects. JSP through Java Bean objects to retrieve the data model, the Model and Controller object is responsible for updating the data on Java Bean. In general, can we devise all possible screen that users can see all the elements of the system. Based on these elements, to identify the public part of passive components and dynamics. Can consider the use of templates means to separate the content generated JSP public, also need to change their generation Html or JSP from a JSP templates to dynamically introduce these different parts (include methods). Another issue to consider is screen option, when dealing with End users request template automatically available to show that the concern that users must know what is the screen components. So can consider all screens on the definition of a centralized document, such as a document or text document java. Taking into account the possibility of changes in future document definition screens, the best use of text documents such as a XML document, so future changes to the recompilation. According to the URL and user input parameters to shine upon the results of a screen, of course, likely to be made on the basis of the outcome of the implementation of actions to choose different results screen. Therefore, the need for a request for matching resources with document (XML), if a URL request several different results, it must specify in the document need to control the flow (a controller object), as well as the corresponding screen different flows.
    3.2 Model in the Web application system
    Model objects represent business rules and business data exist in EJB layer and Web??. In J2EE norms, the system needs some data stored in the database, such as user account information (account model), the company's data (company model), some not recorded in the database. If a user browsing the current catalogue (catalog model), the contents of his shopping (shopping cart model). Which one of these models exist in the data according to their life cycle and scope to decide. In Web?? a HttpSession and ServletContext and Java Bean objects to store data in the EJB layer is a data storage and logic EJB to. Web?? the Java Bean objects stored in the model layer model of the EJB object data copy. Because there are many different EJB tier model targets, so Web?? through a ModelManager to control the EJB layer object model in ModelManger background model can be used for packaging methods. In the EJB layer and the rules have all the data into EJB model is inappropriate. If the database can visit the Dao object model into objects. Dao can be encapsulated and the specific details of the database in the world, if we can write a different table, a number of databases, or even multiple databases. If the orders can be a model for OrderDAO, it may have to deal with Order table, table and OrderItemLines OrderStatus table. Value can also consider the use of targets. Value can be a target of securing long-range targets, because every time the remote object attributes could be a long-range redeployment process will consume network resources. EJB objects in the distance can be used instead target. In the distance, one-time items to be targeted instead of the value of all attributes.
    3.3 Controller in Web application system
    Coordination with the Model View Controller object to the request of users into the system to identify incidents. In Web?? generally a MainServlet (or Main.jsp), and receiving all requests, it can use screen flow management devices (ScreenFlowManger) decided next screen. There is a general request processors RequestProcessor contains all requests are needed to be done to deal with logic, such as the request translated into system events (RequestToEvent). Acting processors usually also includes a request for ClientControlWebImpl, it is logical to deal with the EJB layer in Web?? Acting. In EJB layer, a layer for EJB tier Web ClientController provide the CD visit. Another StateMachine used to create and delete ejb handle Web?? sent to the incident. Controller Another important function is synchronous View and Model data. ModelManger contained in a ModelUpdateManger, it puts events into a Model System assembly that all the needs of synchronous Model, and then notify Listeners do synchronous operation.
    4. Concluding remarks
    In recent years, with the Internet technology development and the emergence of new business models, the Web is based on a large number of applications. On how to design these systems architecture, and gradually there has been some convergence of opinion, the most important point is that its structure should be rational in the open. Demand than ever faster development of technology and design concepts, systems for the future, the cost of upgrading the smallest, research software systems architecture still very useful and necessary.

    Bravo. And your point is?

  • Update was terminated error is coming?

    Hello experts,
      I got an error while creating a process order.System allowing to create a process order after saving througing an error
    " Express document "Update was terminated" received from author "GLP Developer"
    'Error Info... 00 671: ABAP/4 processor: SAPSQL_ARRAY_INSERT_DUPREC".
    I did changed the number ranges for a particular order type.Created one order and prcessed.But again getting the same error while processing second order.

    Hi max,
       Thanks for your immediate response.We removed all number ranges .related process order again assigned the new number ranges  000000200001 to 000000299999 are not used earlier.In this case while creating a process orders  it is getting updated randomly and showing present number in number range as 20011.If we see  5 process orders only able to see in system even I created 11 orders. For remaining orders it is showing not found tried continuously creating process orders in COR1 transactions and checking for updating in display mode.Same thing some orders or missing.FOr missing orders it is shoeing the above error.
    Please respond.
    Thanks in advance,
    Charan

Maybe you are looking for

  • Does the MacBook and iPad have the same type of common applications?

    I am new to the Apple environment but an advanced user of Windows.  I currently teach Senior Citizens how to use a computer with windows.  However, there are some seniors that have either a MacBook or iPad and would like to learn how to use them as w

  • How to limit no of rows in ADF table

    Hi all, i want to limit the number of rows displayed in ADf table. I tried using range size, but it didn't work. In the post Limiting ADF table number of rows is not working it was stated that it is a bug. Is it fixed now or is there any work around

  • Problems installing Windows8.1 on High Performance MBPr late 2013 running Mavericks.

    Hi, im currently new to MacOSX ( i made the jump from PCs) and although i think the overall experience on MacOSX is perfect i still need to run Windows natively on my mac ( i dont trust virtualisation programs.) and then i started to investigate how

  • 3rd Macbook Air ALREADY! PLEASE HELP APPLE FOLKS!

    so im watching some clips on my macbook air with my apple headphones plugged into the audio jack. I noticed that there was an annoying high pitch ringing noise and it wouldn't stop. I would mute the sound on the MBA and unmute it and it would stop. T

  • Can't open Ipod,DVD player,games. When I select something from my desktop

    when I select Ipod,DVD player or previously installed games from my desktop they appear in the dock for a second or two and then disappear. Followed by the " cancel, retry or report message. I have owned this eMAC for about four years with no problem