Sandbox system

Wht exactly the sandbox system?
whts the difference between dev and sandbox?

Hi
Sand box is for new R&D and trails.
Once U confident in trails then
customize application in Development server.
Ramana P

Similar Messages

  • Manually delete Transport system - Sandbox system

    Hi All
    I am have a problem with our transport system on or sandbox system and basically what I want to do it get rid of it and set it up locally.
    As our system is a copy of our PRD it still has all the old config, what I would like to do is remove it in the database. Does any one know how to do this?
    It is a bit of a 'fudge' but seems the easiest way to do it.
    Many Thanks in advance
    Phil

    hello,
    Just delete (if necessary) the STMS configuration and describe your transport planning so that we can help you.
    Manoj

  • ChaRM Action 'Transport into Sandbox System'

    Hi,
    How the action 'Transport into Sandbox System' works.
    Wanted to know how this action works & in TMS do we need to map sandbox client.
    From sand

    Hi PK,
    answer is Yes for the STMS and also you need to have a system defined as single type within maintenance cycle you re working in. Solman will be using your tasklist structure to understand which system is supposed to receive the import
    Since a couple of stacks it became possible to actually define the role type of system that is supposed to receive the import of TR. I mean by role type the kind of system like you define in STMS when declaring a logical component
    Regards
    Khalil

  • Which problems transporting a kernel of functionalities from sandbox system

    Hi All,
    we are developing a kernel of functionalities on a ECC 6.0 sandbox system. Now we want to transport this kernel from sandobox system (AD0) to our development system (EPD). So all the new developments will be made from EPD. We have read the oss note 130906 about the copy of the complete version history of all AD0 repository objects. Which could be other kind of problems?
    Regards,
    Bob

    Anthony,
    Yes. Your interpretation is correct. Objects which are trying to import are already in change mode of some other XI change request.
    Just check if you / any other person has imported any other object before using differnt User ID and not activated yet.
    Solution:
    What you need to do is goto ID and select "Change List". Under change list select User ="ALL" and click on display..it will show you all change request( which are not activated) for all users.
    Right click on "Standard change list" under "change request name" and click on transfer...it will tranfer rrequest on your name..and you can activate them.
    Once you activate this you shall be able to import your objects again.
    Always remember to import one IB objecs file and activate it before importing new one...also import using same user id so that you will not get this kind of conflict.
    Note : When you import IR object ...they get imported in Active status where as you have to manually activate IB objects after importing.
    Hope this will solve your problem..
    Let us know if you need more details.
    Nilesh

  • Sandbox system- Test data

    Hi,
    I am not sure which section to post this thread.
    Can anybody provide me with a document, that gives the basic steps to be configured in a sandbox system to create test data.
    We have a sandbox system installed and we have the test data in text files related to SD,MM,FI and IS-Retail modules around 280 tables.
    I need to know the basic configuration that has to be made for an IDES system to import all this test data and what is the easiest method for importing all these flat files and prepare it as a test system. The client wants this to be done in 2 or 3 days. I am not sure if that is possible.
    Could anybody please advice
    Regards,

    > Source System(Production): Solaris 10/Oracle (NW SP17 and ECC 6.0 with Ehp3(DIMP, SAP-APPL and EA-APPL)
    > Target System(Sandbox)   : Windows 2K3/Oracle
    > 1. Since we are having Ehp3 in source system, is there any impact while doing the system copy?
    > 2. How to prepare the target system with same patch level of SAP software components as our source system
    You can't do the system copy as "I install a new system and overwrite the database".
    There are a few points to consider:
    a) a heterogeneous system copy requires a certified migration consultant on-site, otherwise you'll loose support for problems during the migration and for the target system (see http://service.sap.com/osdbmigration and Hinweis 82478 - SAP System OS/DB Migration).
    b) the only supported way of doing such a migration is using R3load as the tool of choice. You'll have to start sapinst on the source system, export your database and import it into the target system
    c) direct database copies are not possible (Solaris SPARC is a BigEndian platform, Windows is LIttleEndian, Windows won't be able to open the files created by Solaris)
    Markus

  • Question: How to add a Sandbox system as a second Quality System?

    Dear experts,
    I am kindly asking for your help and asking you to write me exact procedure on how to do this.
    We have a 3 system landscape - DEV, QAS and PRD. There are 2 routes from DEV and QAS:
    ZDEV and the SAP standard route and a delivery route from QAS to PRD.
    We also have built a Sandbox system, which we temporarily need to include in TMS, in order
    to perform a few transports from our DEV system to the Sandbox. When doing a transport
    (not sure exactly at which step), the system has to offer a choice, whether the transport to be
    imported in the QAS or in the sandbox.
    For sure I know that we will need to make /usr/sap/trans shared to the sandbox as well.
    Then I am kindly asking you to explain exactly how to setup this configuration.
    I am relying very much on your help, as I made quite bad experience with OSS messages, which
    are hanging for weeks without any answer... And I believe that this forum is faster and more precisely
    answered, than OSS messages. And we have 4 non-working days ahead, and right on tuesday in the
    morning I need to implement this configuration!
    Many many thanks in advance!!

    Hi Symon,
    You're right, the first step is to ensure that the SAPService<SID> user for your sandbox (let's call it SAPServiceSBX) must have the same level of access to /usr/sap/trans on your transport domain controller (usually, but not always, your DEV system) as the other systems in the transport domain.  If you are in a Windows Active Directory environment, this is most easily accomplished by adding the SAP_SBX_GlobalAdmin Active Directory group to the SAP_LocalAdmin local group on the DEV system.  Your SAPServiceSBX user should have already been a member of SAP_SBX_GlobalAdmin as part of the normal installation process when you created the SBX system.  If you are on another OS, I can't really help you there, but it must achieve the same effect of granting that file system access.
    Next, you need to tell SBX how to find the domain controller.  Log on to SBX as an administrative user and start transaction RZ10.  Open your DEFAULT profile and, if it's not already there or has something different, put in an entry with Parameter Name = SAPTRANSHOST and Parameter Value = the host name of your domain controller, i.e. your DEV system, where the /usr/sap/trans directory resides.  Save and activate the profile.  If you made a change here, you will probably need to restart the SBX system for it to take effect.  In the old days, you would have to add a SAPTRANSHOST entry to your hosts file on the operating system level and/or add it as an environment variable for your sidadm OS user, but I don't think that's necessary anymore, if you put it in the profile.
    After the restart, logon to SBX again, this time to client 000, as an administrative user and start transaction STMS.  Most likely, if SBX isn't a member of a transport domain already, you will get a popup asking you to add it to one (or to create one).  If so, put in the name of the transport domain (probably DOMAIN_DEV, but you can find it out by going into STMS on the DEV system), and any other details about the DEV system that it asks for.  If you don't get a popup, then select Extras... Delete TMS Configuration to reset it so that you are starting over fresh (you may have created a standalone transport domain just for SBX when you installed it, and if so you need to delete that so it can join your DEV domain).  You should get a message then that the system is waiting to be approved for inclusion in the domain.
    Now go logon to your DEV system and start STMS, then call up the System Overview.  If necessary, refresh the list.  You should see your SBX system there with a status indicating it's waiting for inclusion.  Click on the symbol, or select SBX and click in the menu SAP System... Approve, and now it should be in.  Once that's done, highlight all the systems in the list, then click SAP System... Update Configuration to distribute the information about the new system to all systems in the domain.  Now select SAP System... Check... and go through the three tests respectively to ensure everything is working.
    Back out of the system overview and go into Transport Routes.  Refresh if necessary.  You should see your ZDEV and SAP transport routes you mentioned earlier, and SBX should now show up as a Single System.  It's fine to leave it this way, and if this is temporary, I recommend leaving it this way.  Check the configuration for consistency, then select Configuration... Distribute and Activate (you can also do this from SBX with Adjust with Controller).
    That should be all you have to do to set it up.  You can do some further tests to ensure the Transport Groups configuration is good (from the System Overview screen).
    Because you have configured SBX as a Single System, transports released from DEV won't automatically show up in the SBX import queue.  However, you can forward transports there easily.  From the SBX system, in STMS, in the Import Overview, select the import queue (or import history) of your QAS system and highlight the transports you want in SBX.  Choose Request... Forward... System and select your SBX system.  They should now show up in the SBX import queue ready for import as normal.
    I hope this helps.
    Best regards,
    Matt

  • Sandbox system in NWDI landscape

    We are implementing a three tier NWDI landscape.  There is also some development in the sandbox as well.  Would it be a good idea to create a seperate NWDI for the sandbox environment so that none of the changes are included in the NWDI landscape of DEV --> TEST --> PROD?  Otherwise will it make a difference if our developers are coding on their local machines?

    Hi ftoobe ,
    welcome to SDN,
    to be honest - I don't see any reason to have a 3 tier NWDi landscape at all... even 2 tier is for me pure luxury.
    Why to you want to have such a landscape?
    The NWDI is a infrastructure server. One NWDI server can handle several multi tiered development landscapes. We are running one porduction NWDI here as shared service witch almost 30 tracks 70 developers and maybe 30 or 40 runtimesystems connected. No problems. A nwdi test system would be nice but its to expensive in the long term for me...
    So long
    Jan

  • How to Export the files to the Sandbox system

    Hello Experts,
    I'm new to HANA and started using the HANA sandbox.
    As per the instructions in the document "SAP HANADatabase u2013 Development Guide Beta Preview"  page 26, I have downloaded the file in my LAPTOP but I dont know how to load those files in the sandbox desktop!
    I have tried saving the file using the URL In the HANA sandbox and saved the same in the desktop but not sure as to how to proceed
    "Please download the file into a directory on the SAP HANA appliance, e. g. /home/guest/sflight and unzip it using the command" as stated in the document.
    Can you please guide this step to understand the same better?
    Many thanks in advance
    Raman

    I have got the help from the other files.. hence closing this thread.

  • Getting Runtime Error while Activating Characteristics in BW sandbox system

    Hi, i m getting  runtime error while activating Characteristics. Error as All InfoObjects Already Saved(locked)
    Short Text
    SQL error 1691 occurred when accessing program "GP4H8Z73D1WOGH7XBIZ54N5GXEG "
       Runtime Errors         DBIF_REPO_SQL_ERROR
    even if creating a new Characteristics same error is comming.
    Key Figures are getting created successfully but problems is comming only with Characteristics. Please Help...
    Edited by: kush kumar on Mar 23, 2010 11:56 AM

    Hi,
    Follow bellow steps:
    a) Once check the Lock entries by useing SM13.
    Goto SM13--> Select your object lock entries --> Select delete.
    b). Acitvate the Infoobject.
    Regards.

  • New Development System

    Hi, just wanted to bounce some ideas off you guys.
    We are about to create a new ECC 6 system initially a sandbox system for blue print then a Dev system.
    My organisation as a global finance SAP template that we will use.  So the steps would be a fresh install, then install the global finace templete, not sure how but will probably a system copy.
    We also have another stream of work being undertaken in another part of the organisation which is all being done in its own landscape.  We need to split out some of this functionality to use on our system (about 2000 transports). 
    I don't want to copy all of this work over to the Dev system probably from their QA system as it has a load of master / transaction data, but it will give everything we require OK we would need to some clean up work.
    The other option would be to selct the transports that we require and apply them, sequencing will be a issue,
    Ideally I guess the best solution is for all the work to be performed again in the new Dev system
    Its a tricky one, I need the fucntionality but want to keep the system as clean as possible.  The QA system will be built on the transports from Dev.
    Any thoughts appreciated,
    Thanks

    Ideally I guess the best solution is for all the work to be performed again in the new Dev system
    You will be right on this.  Problem w/ a "easy" solution via transport is that you may run into cross development with the same object fighting eachother.  This could result in unexpected behavior in the system, which would turn into a diagnostics nightmare.
    We are currently in middle of upgrading to ECC 6.0.  The plan here inhouse is to actually freeze all modifications for period of 1 quarter, allowing only production fixes only.  This would minimize the number of transports that we have to manually consolidate.

  • I am having a slow system. Running Yosemite on Macbook Pro.

    EtreCheck version: 2.0.11 (98)
    Report generated November 19, 2014 at 19:26:11 GMT
    Hardware Information: ℹ️
      MacBook Pro (13-inch, Early 2011) (Verified)
      MacBook Pro - model: MacBookPro8,1
      1 2.7 GHz Intel Core i7 CPU: 2-core
      4 GB RAM Upgradeable
      BANK 0/DIMM0
      2 GB DDR3 1333 MHz ok
      BANK 1/DIMM0
      2 GB DDR3 1333 MHz ok
      Bluetooth: Old - Handoff/Airdrop2 not supported
      Wireless:  en1: 802.11 a/b/g/n
    Video Information: ℹ️
      Intel HD Graphics 3000 - VRAM: 384 MB
      Color LCD 1280 x 800
    System Software: ℹ️
      OS X 10.10.1 (14B25) - Uptime: 0:41:3
    Disk Information: ℹ️
      TOSHIBA MK5065GSXF disk0 : (500.11 GB)
      S.M.A.R.T. Status: Verified
      EFI (disk0s1) <not mounted> : 210 MB
      Recovery HD (disk0s3) <not mounted>  [Recovery]: 650 MB
      Macintosh HD (disk1) /  [Startup]: 498.88 GB (148.10 GB free)
      Encrypted AES-XTS Unlocked
      Core Storage: disk0s2 499.25 GB Online
      MATSHITADVD-R   UJ-8A8 
    USB Information: ℹ️
      Apple Inc. FaceTime HD Camera (Built-in)
      Apple Inc. Apple Internal Keyboard / Trackpad
      Apple Inc. BRCM2070 Hub
      Apple Inc. Bluetooth USB Host Controller
      Apple Computer, Inc. IR Receiver
    Thunderbolt Information: ℹ️
      Apple Inc. thunderbolt_bus
    Gatekeeper: ℹ️
      Mac App Store and identified developers
    Kernel Extensions: ℹ️
      /Applications/WiTopia.app
      [loaded] com.viscosityvpn.Viscosity.tap (1.0) Support
      [loaded] com.viscosityvpn.Viscosity.tun (1.0) Support
      /Library/Application Support/Kaspersky Lab/KAV/Bases
      [loaded] com.kaspersky.kext.kimul.44 (44) Support
      /Library/Extensions
      [loaded] com.kaspersky.kext.klif (3.0.3a23) Support
      [loaded] com.kaspersky.nke (1.6.3a13) Support
      [not loaded] foo.tap (1.0) Support
      [not loaded] foo.tun (1.0) Support
      /System/Library/Extensions
      [loaded] com.Cycling74.driver.Soundflower (1.6.6 - SDK 10.6) Support
      [not loaded] com.NovatelWireless.driver.NovatelWirelessUSBCDCECMControl (3.0.13) Support
      [not loaded] com.NovatelWireless.driver.NovatelWirelessUSBCDCECMData (3.0.13) Support
      [not loaded] com.ZTE.driver.ZTEUSBCDCACMData (1.3.35) Support
      [not loaded] com.ZTE.driver.ZTEUSBMassStorageFilter (1.3.35) Support
      [not loaded] com.devguru.driver.SamsungComposite (1.4.20 - SDK 10.6) Support
      [not loaded] com.driver.JRDMassStorageDriver32 (1.0.1) Support
      [not loaded] com.driver.JRDMassStorageDriver64 (1.0.1) Support
      [not loaded] com.driver.JRDUSBModemData32 (1.0.1) Support
      [not loaded] com.driver.JRDUSBModemData64 (4.0.8) Support
      [not loaded] com.eltima.ElmediaPlayer.kext (1.58 - SDK 10.4) Support
      [loaded] com.epson.driver.EPSONProjectorUDAudio (1.30 - SDK 10.4) Support
      [not loaded] com.jrdcom.driver.JRDECMControlDriver32 (1) Support
      [not loaded] com.jrdcom.driver.JRDECMControlDriver64 (1) Support
      [not loaded] com.jrdcom.driver.JRDECMDataDriver32 (1) Support
      [not loaded] com.jrdcom.driver.JRDECMDataDriver64 (1) Support
      [not loaded] com.jrdcom.driver.JRDUSBCDC32 (1) Support
      [not loaded] com.jrdcom.driver.JRDUSBCDC64 (1) Support
      [not loaded] com.novamedia.driver.IceraUSB_MSD_Bypass (1.3.0) Support
      [not loaded] com.novatelwireless.driver.3G (3.0.13) Support
      [not loaded] com.novatelwireless.driver.DisableAutoInstall (3.0.13) Support
      [not loaded] com.option.driver.Option72 (2.15.0) Support
      [not loaded] com.option.driver.OptionHS (3.26.0) Support
      [not loaded] com.option.driver.OptionMSD (1.21.0) Support
      [not loaded] com.option.driver.OptionQC (1.11.0) Support
      [not loaded] com.quark.driver.Tether (1.1.0d3 - SDK 10.4) Support
      [loaded] com.quark.driver.Tether64 (1.1.0d3 - SDK 10.6) Support
      [loaded] com.rim.driver.BlackBerryUSBDriverInt (0.0.67) Support
      [not loaded] com.rim.driver.BlackBerryUSBDriverVSP (0.0.67) Support
      [not loaded] com.splashtop.driver.SRXDisplayCard (1.6 - SDK 10.7) Support
      [not loaded] com.splashtop.driver.SRXFrameBufferConnector (1.6 - SDK 10.7) Support
      [not loaded] com.vodafone.driver (3.0.9) Support
      [not loaded] com.zte.driver.cdc_ecm_qmi (1.0.26) Support
      [not loaded] com.zte.driver.cdc_usb_bus (1.0.26) Support
      [not loaded] de.novamedia.driver.NMSamsung (0.0.2) Support
      [not loaded] de.novamedia.driver.NMSmartplugSCSIDevice (1.0.1) Support
      [not loaded] de.novamedia.oem.vodafone.vtp.huawei.cdc (0.0.2) Support
      [not loaded] net.pocketmac.driver.BlackberryUSB (3.2.0) Support
      [not loaded] net.pocketmac.driver.BlackberryUSBDev (3.2.0) Support
      /System/Library/Extensions/NMHuaweiPhonesVTPCDC_106.kext/Contents/PlugIns
      [not loaded] de.novamedia.driver.NMUSBCDCACMControl (3.2.12) Support
      /System/Library/Extensions/NMSamsungDriver_106.kext/Contents/PlugIns
      [not loaded] de.novamedia.driver.NMUSBCDCACMData (3.2.12) Support
      /System/Library/Extensions/NovatelWireless3G.kext/Contents/PlugIns
      [not loaded] com.novatelwireless.driver.3GData (3.0.13) Support
      /System/Library/Extensions/Vodafone.kext/Contents/PlugIns
      [not loaded] com.vodafone.driver.Data (3.0.9) Support
      /System/Library/Extensions/ssuddrv.kext/Contents/PlugIns
      [not loaded] com.devguru.driver.SamsungACMControl (1.4.20 - SDK 10.6) Support
      [not loaded] com.devguru.driver.SamsungACMData (1.4.20 - SDK 10.6) Support
      [not loaded] com.devguru.driver.SamsungMTP (1.4.20 - SDK 10.5) Support
      [not loaded] com.devguru.driver.SamsungSerial (1.4.20 - SDK 10.6) Support
    Startup Items: ℹ️
      HW_CreateNetwork: Path: /Library/StartupItems/HW_CreateNetwork
      HWNetMgr: Path: /Library/StartupItems/HWNetMgr
      HWPortDetect_driver: Path: /Library/StartupItems/HWPortDetect_driver
      SMC: Path: /Library/StartupItems/SMC
      StartOuc: Path: /Library/StartupItems/StartOuc
      tap: Path: /Library/StartupItems/tap
      tun: Path: /Library/StartupItems/tun
      Startup items are obsolete and will not work in future versions of OS X
    Launch Agents: ℹ️
      [not loaded] com.adobe.AAM.Updater-1.0.plist Support
      [running] com.amazon.sendtokindle.launcher.plist Support
      [running] com.babylon.activation.plist Support
      [not loaded] com.google.keystone.agent.plist Support
      [not loaded] com.hp.help.tocgenerator.plist Support
      [invalid?] com.kaspersky.kav.gui.plist Support
      [running] com.localphone.postlogon.VoIP.plist Support
      [loaded] com.oracle.java.Java-Updater.plist Support
      [invalid?] com.splashtop.streamer-for-root.plist Support
      [invalid?] com.splashtop.streamer-for-user.plist Support
      [running] de.novamedia.VodafoneDeviceObserver.plist Support
      [running] HWPortCfg.plist Support
      [loaded] org.gpgtools.Libmacgpg.xpc.plist Support
    Launch Daemons: ℹ️
      [loaded] com.adobe.fpsaud.plist Support
      [loaded] com.creativebe.MainMenuHelper.plist Support
      [running] com.eltima.ElmediaPlayer.daemon.plist Support
      [loaded] com.google.keystone.daemon.plist Support
      [running] com.kaspersky.kav.plist Support
      [running] com.localphone.daemon.VoIP.plist Support
      [loaded] com.microsoft.office.licensing.helper.plist Support
      [loaded] com.oracle.java.Helper-Tool.plist Support
      [loaded] com.oracle.java.JavaUpdateHelper.plist Support
      [loaded] com.prosofteng.DriveGenius.locum.plist Support
      [loaded] com.regularrateandrhythm.rowmotehelperaide.plist Support
      [invalid?] com.splashtop.streamer-daemon.plist Support
      [invalid?] com.splashtop.streamer-srioframebuffer.plist Support
      [running] com.wyse.PocketCloud.plist Support
      [running] net.witopia.WiTopiaHelper.plist Support
    User Launch Agents: ℹ️
      [loaded] com.adobe.AAM.Updater-1.0.plist Support
      [loaded] com.adobe.ARM.[...].plist Support
      [invalid?] com.citrixonline.GoToMeeting.G2MUpdate.plist Support
      [not loaded] com.logos.LogosIndexer.plist Support
      [running] com.microsoft.LaunchAgent.SyncServicesAgent.plist Support
      [running] com.pia.pia_manager.plist Support
      [invalid?] com.splashtop.streamer-for-user.plist Support
      [invalid?] com.wrike.plugin.enable-bundles.plist Support
      [invalid?] com.wrike.plugin.mail-monitor.plist Support
      [invalid?] com.wrike.plugin.patch-uuid.plist Support
      [invalid?] com.yourcompany.HSPA_USB_MODEM.plist Support
      [running] com.yourcompany.uninstall.plist Support
    User Login Items: ℹ️
      WiTopia Application (/Applications/WiTopia.app)
      TotalFinder Application (/Incompatible Software/TotalFinder.app)
      Google Chrome ApplicationHidden (/Users/[redacted]/.Trash/Google Chrome.app)
      RoboFormIcon Application (/Users/[redacted]/Library/Application Support/RoboForm/RoboFormIcon.app)
      KiesAgent ApplicationHidden (/Applications/Kies.app/Contents/MacOS/KiesAgent.app)
      fuspredownloader ApplicationHidden (/Users/[redacted]/Library/Application Support/.FUS/fuspredownloader.app)
      USB Display Agent Application (/Applications/USB Display/USB Display.app/Contents/Resources/USB Display Agent.app)
      Microsoft Database Daemon Application (/Applications/Microsoft Office 2011/Office/Microsoft Database Daemon.app)
      Dropbox Application (/Applications/Dropbox.app)
      HPEventHandler UNKNOWN (missing value)
    Internet Plug-ins: ℹ️
      o1dbrowserplugin: Version: 3.15.2.12038 Support
      Default Browser: Version: 600 - SDK 10.10
      AdobeAAMDetect: Version: AdobeAAMDetect 2.0.0.0 - SDK 10.7 Support
      FlashPlayer-10.6: Version: 15.0.0.223 - SDK 10.6 Support
      AdobePDFViewerNPAPI: Version: 11.0.09 - SDK 10.6 Support
      Silverlight: Version: 5.1.30514.0 - SDK 10.6 Support
      Flash Player: Version: 15.0.0.223 - SDK 10.6 Support
      QuickTime Plugin: Version: 7.7.3
      googletalkbrowserplugin: Version: 3.15.2.12038 Support
      npgtpo3dautoplugin: Version: 0.1.44.24 - SDK 10.5 Support
      AdobePDFViewer: Version: 11.0.09 - SDK 10.6 Support
      SharePointBrowserPlugin: Version: 14.4.5 - SDK 10.6 Support
      RL Secure Plug-In Layer: Version: (null) - SDK 10.5 Support
      JavaAppletPlugin: Version: Java 7 Update 71 Check version
    User Internet Plug-ins: ℹ️
      VSeeDetection_x86_64: Version: Unknown
      UploadManager: Version: (null) - SDK 10.5 Support
      WbeTools64_14: Version: 1.0.22.49 © 2012 - SDK 10.6 Support
      RocketEngine: Version: (null) - SDK 10.5 Support
      fileEditTool64_15: Version: 1.0.33.62 © 2012 - SDK 10.6 Support
      ContentManager: Version: (null) - SDK 10.5 Support
      CitrixOnlineWebDeploymentPlugin: Version: 1.0.105 Support
    Safari Extensions: ℹ️
      RoboForm
      Add To Amazon Wish List
      TypePad Blog It
      Evernote Web Clipper
      ScribeFire
      Clip to DEVONthink
      Pearltrees Extension
    Audio Plug-ins: ℹ️
      EcammAudioLoader: Version: 1.0.3 - SDK 10.8 Support
      CallRecorder: Version: v2.5.12 - SDK 10.8 Support
    3rd Party Preference Panes: ℹ️
      BlueHarvest  Support
      Flash Player  Support
      GPGPreferences  Support
      Java  Support
      MacFUSE  Support
    Time Machine: ℹ️
      Auto backup: YES
      Volumes being backed up:
      Macintosh HD: Disk size: 498.88 GB Disk used: 350.78 GB
      Destinations:
      My Passport [Local]
      Total size: 2.00 TB
      Total number of backups: 0
      Oldest backup: -
      Last backup: -
      Size of backup disk: Excellent
      Backup size 2.00 TB > (Disk size 498.88 GB X 3)
    Top Processes by CPU: ℹ️
          6% WindowServer
          1% pia_tray
          0% kav
          0% LpPjPhoneDaemon
          0% Dropbox
    Top Processes by Memory: ℹ️
      172 MB kav
      116 MB WiTopia
      90 MB Dropbox
      86 MB mds_stores
      77 MB WindowServer
    Virtual Memory Information: ℹ️
      327 MB Free RAM
      1.65 GB Active RAM
      1.19 GB Inactive RAM
      1.13 GB Wired RAM
      4.12 GB Page-ins
      5 MB Page-outs

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to take control of it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has taken far too long to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. Those lapses don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, not machine behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It can be as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Connecting multiple ECC Clients on same ECC system to BW system(s)

    Hello.
    We are considering connecting our Dev BW system to multiple clients on the same Dev ECC system. This connection would be for a limited time.  We are wondering what the effect would be on the ECC system after we 'disconnect' our BW system from one of the clients.
    Another thing we are considering is to create a seperate BW sandbox system and to connect that to a client on our Dev ECC system.  The Dev ECC system will, at the same time, have a connection to a client on our existing Dev BW system. For example, having DEVBWcnlt100 -> DEVECCclnt100 and SNDBWclnt200 -> DEVECCclnt200 where DEVECC is a system and DEVBW and SNDBW are systems of their own. Our Sandbox BW system will have a limited life and at some point be taken down and no longer be a valid source system for the DEVECC system. We are concerned about what the impact would be to the DEV ECC system's client independent data once the Sandbox BW system is disconnected and taken down permenantly. Is 'residual' client independent data something we need to be concerned about? Is having two different BW systems connected to ECC clients on the same ECC systems a 'bad practice'? Any and all comments are welcome as we have not yet acted on our ideas yet.
    Thanks very much for whatever comments you might provide,
    Geoff.

    We are considering connecting our Dev BW system to multiple clients on the same Dev ECC system. This connection would be for a limited time. We are wondering what the effect would be on the ECC system after we 'disconnect' our BW system from one of the clients.
    No impact on the BW system. The only thing that you will have to take care of is that any process chains which fetch data from this DEV ECC system should not be put on periodic cycle because after disconnecting the ECC system, these would start failing.
    Another thing we are considering is to create a seperate BW sandbox system and to connect that to a client on our Dev ECC system. The Dev ECC system will, at the same time, have a connection to a client on our existing Dev BW system. For example, having DEVBWcnlt100 -> DEVECCclnt100 and SNDBWclnt200 -> DEVECCclnt200 where DEVECC is a system and DEVBW and SNDBW are systems of their own. Our Sandbox BW system will have a limited life and at some point be taken down and no longer be a valid source system for the DEVECC system. We are concerned about what the impact would be to the DEV ECC system's client independent data once the Sandbox BW system is disconnected and taken down permenantly. Is 'residual' client independent data something we need to be concerned about?
    Again no impact on ECC system. As for the client connected earlier to sandbox system, just clear all the queues in RSA7, LBWQ
    Is having two different BW systems connected to ECC clients on the same ECC systems a 'bad practice'?
    No its not at all a bad practice

  • Problem Deploying Custom Transformation Provider to Remote System

    Hello Experts,
    I have successfully created a custom XML Transformation Provider/transformer and deployed it to my local development system and to a remote sandbox system. We are using NWDI and the transformation provider is within the context of a DC.  However, I am deploying to both my local dev and the remote sandbox systems using the u201CQuick PAR Uploadu201D in NWDS.
    After deploying the same PAR to both my local portal and the remote sandbox systems I can see the new service is deployed in both portals (System Administation -> Support -> Runtime -> etc..).  I can also see the service registered successfully in the portal registryu2014again, in both systems.
    Everything works fine on my local dev when I run code to retrieve and apply the custom transformer to source XML.  The new transformer is also available when creating an XML iView.   However, I cannot retrieve or use the new transformer (u201Cno such transformeru201D errors) using the same code on the remote sandbox system.  Also, the new transformer is not available when using the XML iView wizard.
    It seems the custom transformation provider is deploying successfully on the remote system, but the transformer is not.
    Both systems are ostensibly identical, NW 7.0 EP SPS14.  The credentials Iu2019m using when performing the Quick PAR Upload have Administrator/Super Admin Role privileges.  (I even tried uploading the PAR directly into the portal using the Admin Console to see if that made a differenceu2026it did not).
    Any ideas why a transformer would not be available after a custom transformation provider deploys without any apparent errors to the remote system?
    Thanks for your time!

    Hi,
    I presume this issue is not that common.
    Any ideas on where to look (logs) for results after a PAR is deployed to the server?  I do not see any errors in the defaultTrace related to the deployment and I've looked through other logs, too.  In any case, the "custom" transformation provider service appears in the portal, but I still don't see the tranformer itself.
    Thanks again,
    Dave

  • Loading failed from ECC to BW due to sharing port with XI system

    Hi,
    I need some help here, currently my company has 2 sandbox systems, one for ECC(R/3) and another one is for XI/BI netweaver 2004s. Since the BI box is shared with XI, we have problem everytime we load the data to the BI master data/ods/cube .
    It seems there is something wrong with the data port setting/configuration.
    The error message that was given in RSMO transaction always showed:
    "Errors while sending packages from OLTP to BI
    Diagnosis
    No IDocs could be sent to BI using RFC.
    System Response
    There are IDocs in the source system ALE outbox that did not arrive in the ALE inbox of BI.
    Further analysis:
    Check the TRFC log.
    You can access this log using the wizard or the menu path "Environment -> Transact. RFC -> In source system".
    Error handling:
    If the TRFC is incorrect, check whether the source system is fully connected to BI. In particular, check the authorizations of the background user in the source system."
    Now after checking this in TRFC in source system and BI system, there was nothing wrong, no IDOCs was listed there or got hold up. We have checked the user authorization with our basis here, we use id called PIREMOTE that has same setting as SAP ALEREMOTE id. So we are not sure what went wrong since the connection in SM59 seemed to be working fine.
    When we checked into Details tab at the RSMO screen for detail explanation, we got the following message under Transfer (IDOCs and TRFC) section:
    "Request IDoc : Application document not posted
    Info IDoc 1 : sent, not arrived ; Data passed to port OK
    Data Package 1 : arrived in BW ; Processing : Selected number does not agree with transferred n "
    We believed that the error could be related to the partner profile and data port setting in WE20/WE21 in source system (DEVCLNT150) and BI system (NWDCLNT001). It seems that the data is pointed to XI port rather than BI port since the ECC-XI work demo worked fine and ECC-BI work demo ended up in trouble.
    The R/3 system partner profile (DEVCLNT150) and BI system partner profile (NWDCLNT001) has setting as following
    in outbound parameters:
    with Message type RSINFO (IDOC basic type RSINFO) and RSSEND (IDOC basic type ZSNB004),
    both message types are pointing to BI data port (NWDCLNT001)
    The inbound parameters cointains message type RSRQST (process code RSRQ).
    I have been trying to search the solution for weeks, but i couldn't find the right solution.
    I tried to change the partner profile setting but instead it didn't work for XI and BI so i set the setting back to original after complaint raised by XI team.
    We don't want to lose the current connection that we have for XI system since they use it for XI demo, but in the same time we need to send data to BI system for our demo purposes.
    Please advice any steps or solutions that work. Do we need to clean up some SAP tables that setup the port or do we need to run some transactions?
    Any opinions are welcomed.
    Thanks,
    Hendy

    For - planning , please take a look at SAP Extended Financial Planning rapid-deployment solution:  G/L Financial Planning module.   This RDS captures best practice integration from BPC 10 NW to SAP G/L.  This RDS (including content and documentation) is free to licensed customers of SAP BPC.   This RDS leverages the 0FIGL_C10 cube mentioned above.
      https://service.sap.com/public/rds-epm-planning
    For consolidation, please take a look at SAP Financial Close & Disclosure Management rapid-deployment solution.   This RDS captures best practice integration from BPC 10 NW to SAP G/L.  This RDS (including content and documentation) is also free to licensed customers of SAP BPC.
    https://service.sap.com/public/rds-epm-fcdm
    Note:  You will require an SAP ServiceMarketplace ID (S-ID) to download the underlying SAP RDS content and documentation.
    The documentation of RDS will discuss the how/why of best practice integration.  You can also contact me direct at [email protected] for consultation.
    We are also in the process of rolling out the updated 2015 free training on these two RDS.  Please register at this link and you will be sent an invite.
    https://www.surveymonkey.com/s/878J92K
    If the link is inactive at some point after this post, please contact [email protected]

  • How to handle the CRM Middleware after system refresh?

    Guys,
    We are using CRM 5.0 & R/3 4.6C. We have the middleware configured and set up. We finished all inital loads & delta loads are activated as well. The system works perfectly.
    Now for some reason the client wants to refresh the R/3 system. (Basically they are copying over the R/3 Dev system to refresh the R/3 Sandbox system. Our connection is currently between the 2 sand box systems) What impact will this have on the CRM system? Will it cause mass delta downloads? I have already referred to notes 588701 & 765018. Any additional information or watch outs will be appreciated.
    Secondly what's the best practice do a refresh in the future? Is there a SAP recomendation on how to go about with system refresh when CRM & R/3 are connected?
    ARP

    Hello ARP,
    as always: It depends what to do:
    a) do you have a CRM DEV System available? If possible you should get the connection working over there and then do a Landscape Copy of the R/3 DEV + CRM DEV to the Sandbox Landscape.
    b) Let them copy the R/3 DEV to the R/3 Sandbox. Then use the Data Integrety Manager (Transaction SDIMA) to get the missing Customers, Transactions exchanged.
    In the future they normally have to do a Landscape Copy.
    Regards
    Gregor

Maybe you are looking for

  • Please Help!!! - How do I Permanently Save iPhone Messages to a Mac?

    Hello,      I currently have an iPhone 4s 16 GB and am quickly running out of storage space.  I only have about 700 MB of space remaining and my "Other" category is taking up 6.27 GB of space!  I believe that most of this is because of my text messag

  • Royalty free music is not syncing with FCP? HELP!!!

    Hey Everyone, So this is an odd one. I've stepped in to help a friend who can't get the audio to line up from Royalty Free Music to sync with the video timeline of his project. It's a ballroom workout dvd where it's all one take. They used the mp3's

  • Will Captivate 4 run on a Mac using Parallels?

    I'm on a Mac system and I really need a tool like Captivate to generate presentations for the web, not so much quizzes and full blown e-learning just yet.... Microsoft has eaten enough time and money of mine, so I've got Parallels already that came w

  • Asset not in Asset History Sheet

    When I run that asset history sheet tcode S_ALR_87011990 for a particular asset with a correct key date, the report produces no results.  When I look at at the asset in AW01N, there are values in the same fiscal year as the key date I ran the AHS for

  • Choosing a port for Client/Server applications

    Just going through the Sun tutorials and trying to establish a connection. In the KnockKnockClient example program they have initiated a new Socket with a server name and port number as follows: kkSocket = new Socket("taranis", 4444);I've changed the