Search for ABAP Webdynpro Best practice or/and Evaluation grid

Hi Gurus,
Managers or Team Leaders are facing of the development of SAP application on the web. Functional people propose to business people Web applications.  I'm searching for Best practice for Web Dynpro ABAP Development. We use SAP Netweaver 7.0 and an SAP ECC 6.0 SP4.
We are facing of claims about Webdynpro response time. The business wants to have 3 sec response time and we have 20 or  25 sec.
I want to communicate to functional people a kind of recommendation document explaining that in certain case the usage of Webdynpro will not be a benefit for the business.
I know that the transfer of data, the complexity of the screen and also the hardware are one of the keys but I expect some advices from the SDN community.
Thanks for your answers.
Rgds,
Christophe

Hi,
25s is a lot. I wouldn't like to use an application with response time that big. Anyway, Thomas Jung has just recently published a series of video blogs about WDA performance tools. It may help you analyzing why your web dynpro application is so slow. Here is the link to the [first part|http://enterprisegeeks.com/blog/2010/03/03/abap-freakshow-u2013-march-3-2010-wda-performance-tools-part-1/]. There is also a [dedicated forum|Web Dynpro ABAP; to WDA here on SDN. I would search there for some tips and tricks.
Cheers

Similar Messages

  • SAP SCM and SAP APO: Best practices, tips and recommendations

    Hi,
    I have been gathering useful information about SAP SCM and SAP APO (e.g., advanced supply chain planning, master data and transaction data for advanced planning, demand planning, cross-plant planning, production planning and detailed scheduling, deployment, global available-to-promise (global ATP), CIF (core interface), SAP APO DP planning tools (macros, statistical forecasting, lifecycle planning, data realignment, data upload into the planning area, mass processing u2013 background jobs, process chains, aggregation and disaggregation), and PP/DS heuristics for production planning).
    I am especially interested about best practices, tips and recommendations for using and developing SAP SCM and SAP APO. For example, [CIF Tips and Tricks Version 3.1.1|https://service.sap.com/form/sapnet?_FRAME=CONTAINER&_OBJECT=011000358700006480652001E] and [CIF Tips and Tricks Version 4.0|https://service.sap.com/form/sapnet?_FRAME=CONTAINER&_OBJECT=011000358700000596412005E] contain pretty useful knowledge about CIF.
    If you know any useful best practices, tips and recommendations for using and developing SAP SCM and SAP APO, I would appreciate if you could share those assets with me.
    Thanks in advance of your help.
    Regards,
    Jarmo Tuominen

    Hi Jarmo,
    Apart from what DB has suggested. you should give a good reading on the following.
    -Consulting Notes (use the application component filters in search notes)
    -Collective Notes (similar to the one above)
    -Release Notes
    -Release Restrictions
    -If $$ permit subscribe to www.scmexpertonline.com. Good perspective on concepts around SAP SCM.
    -There are a couple of blogs (e.g. www.apolemia.com) .. but all lack breadth.. some topics in depth.
    -"Articles" section on this site (not all are classified well.. see in ECCops, mfg, SCM, Logistics etc)
    -Serivce.sap.com- check the solution details overview in knowledge exchange tab. There are product presentations and collaterals for every release. Good breadth but no depth.
    -Building Blocks - available for all application areas. This is limited to vanilla configuration of just making a process work and nothing more than that.
    -Get the book "Sales and Operations Planning with SAP APO" by SAP Press. Its got plenty of  easy to follow stuff, good perspective and lots of screen shots to make life easier.
    -help.sap.com the last thing that most refer after all "handy" options (incl. this forum) are exhausted. Nevertheless, this is the superset of all "secondary" documents. But the maze of hyperlinks that start at APO might lead you to something like xml schema.
    Key Tip: Appreciate that SAP SCM is largely driven by connected execution systems (SAP ECC/ERP). So the best place to start with should be a good overview of ERP OPS solution overview, at least at the significant level of depth.). Check this document at sdn wiki "ERP ops architecture overview".
    I have some good collection of documents though many i havent read myself. If you need them let me know.
    Regards,
    Loknath

  • How to Search for text in a word document and replace it

    Hey All ,
    I am able to open up a word document present locally using OLE2 Automation. Now i need to search for a text in that document
    and replace it with another text. How do i achieve this?
    And another issue is when i search for the particular pattern i need to store the pattern that comes after the pattern as i need it for further use before i replace it.
    Thanks And Warm Regards,
    Nischal

    Hey Chen,
    Well before i do the search and edit , I am actually opening a .mts file in word which is happening successfully.
    The issue that i am facing now is I am unable to save it as .doc file through the 'SaveAs' method.
    Here is my code. Can u please tell me what i need to do in order to correct this.
    After i do this conversion i intend to pass the data from the .doc file to an internal table and then do the required change.
    But First i need to save it to .doc type.
    REPORT  MAIN_PROGRAM_2.
    INCLUDE OLE2INCL.
    *Declaration Of OLE2_Object Variables.
    DATA: WORD            TYPE OLE2_OBJECT,
          DOCUMENTS       TYPE OLE2_OBJECT,
          ACT_DOCUMENTS   TYPE OLE2_OBJECT.
    *Declaration of variables
    PARAMETERS PATH       TYPE string.
    DATA:Relative_Path    TYPE string,
         Relative_Path_Save    TYPE string.
    *Declaration of an internal table
    CONCATENATE PATH '\Script.mts' INTO RELATIVE_PATH.
    *Object Creation in order for us to open word
    CREATE OBJECT WORD 'WORD.APPLICATION'.
    PERFORM ERROR_HANDLE.
    *Set visibility property of MS word.
    SET property of WORD 'VISIBLE' = 1.
    *Open A document
    CALL METHOD OF WORD 'Documents' = DOCUMENTS.
    PERFORM ERROR_HANDLE.
    *CALL METHOD OF DOCUMENTS 'ADD' = ACT_DOCUMENTS.
    CALL METHOD OF DOCUMENTS 'OPEN' EXPORTING #1 = RELATIVE_PATH.
    PERFORM ERROR_HANDLE.
    *GET PROPERTY OF WORD 'ActiveDocument' = ACT_DOCUMENTS.
    *PERFORM ERROR_HANDLE.
    **To save the script.mts to script .doc file in order to put it into an internal table
    CONCATENATE PATH '\Script.doc' INTO RELATIVE_PATH_SAVE.
    CALL METHOD OF WORD 'SaveAs' EXPORTING #1 = RELATIVE_PATH_SAVE.
    PERFORM ERROR_HANDLE.
    FREE OBJECT WORD.
    The Save part of the code is giving me an OLE error = 2
    Thanks And Kind Regards,
    Nischal
    Edited by: Nischal HP on Apr 28, 2011 1:53 PM

  • How do I search for lines with a particular pattern and delete them when a match occurs

    How do I search for lines with a particular patter and delete them when a match occurs? For example delete lines containing SUB_NAME = "?" where ? is any string. 

    How do I search for lines with a particular patter and delete them when a match occurs? For example delete lines containing SUB_NAME = "?" where ? is any string. 
    Lines in what? And what language are you using to develop with?
    Are the lines in a text file? A RichTextBox? A TextBox? Some other control? A List(Of String)?
    Is there some expectation by you that by providing what you wrote in your question post that the knowledge in your mind about what you are thinking about will mysteriously emanate to anybody reading your post so all of the sudden your knowledge will
    become their knowledge and they will be able to provide you with an answer as they will suddenly understand what you are trying to do? Because that's probably impossible. Most people try providing enough information in a question so anybody, even stupid people
    like me, can understand what they want. Maybe you should try that. As well as selecting an appropriate forum for your question in the future. Usually a question like this is related to programming in a particular language therefore a language forum may be
    a good choice. Or not.
    La vida loca

  • Best Practices Methodologies and Implementation training courses

    Does anybody know regarding Best Practices Methodologies and Implementation training courses available?
    Kind regards,
    Adi
    [email protected]

    hi Adi,
    please do gothrough this pdf
    https://www.sdn.sap.com/irj/servlet/prt/portal/prtroot/docs/library/uuid/519d369b-0401-0010-0186-ff7a2b5d2bc0
    https://www.sdn.sap.com/irj/servlet/prt/portal/prtroot/docs/library/uuid/e5b7bb90-0201-0010-ee89-fc008080b21e
    hope this helps you please don,t forget to give points
    with regards.
    Vinoth

  • Best Practices Methodologies and Implementation

    Does anybody know regarding Best Practices Methodologies and Implementation training courses available?

    Hi dear,
    please don't post the same question several times...
    Look at Best Practice Course
    Bye,
    Roberto

  • SU24 proposals and defaults for ABAP webdynpros

    I am keen to hear from forum members on the best approach for adding SU24 proposals / defaults to custom and/or SAP standard ABAP webdynpros ? I have seen 3 options used:
    1. manually inserted auth objects i.e. don't rely on SU24
    2. use dummy Z t-codes to propose auth objects via SU24
    3. generate a hash table entry for the webdynpro (function module AUTH_TRACE_WRITE_USOBHASH) so that it can then be found as a TADIR service in SU24 and auth objects added
    Does anyone know the SAP recommendation for this ?

    Hi,
    there is 4th option. Activate temporally parameter auth/authorization_trace and run all you web dynpro applications. This will create a record for each authorization check performed in you application in transaction SU22. Then maintain default values and move them to SU24. It's better than using AUTH_TRACE_WRITE_USOBHASH because you don't need to enter manually all related authorization objects.
    Option 1 - really bad option
    Option 2 - this was my first workaround until I found FM AUTH_TRACE_WRITE_USOBHASH
    Option 2 - this was my second workaround until I learned about auth/authorization_trace. BTW my assumption is that kernel directly calls FM AUTH_TRACE_WRITE_USOBHASH which is reason why I couldn't find any usage of this FM.
    Cheers

  • Looking for Some Examples / Best Practices on User Profile Customization in RDS 2012 R2

    We're currently running RDS on Windows 2008 R2. We're controlling user's Desktops largely with Group Policy. We're using Folder Redirection to configure their Start Menus as well.
    We've installed a Server 2012 R2 RDS box and all the applications that users will need. Should we follow the same customization steps for 2012 R2 that we used in 2012 R2? I would love to see some articles on someone who has customized a user profile/Desktop
    in 2012 R2 to see what's possible.
    Orange County District Attorney

    Hi Sandy,
    Here are some related articles below for you:
    Easier User Data Management with User Profile Disks in Windows Server 2012
    http://blogs.msdn.com/b/rds/archive/2012/11/13/easier-user-data-management-with-user-profile-disks-in-windows-server-2012.aspx
    User Profile Best Practices
    http://social.technet.microsoft.com/wiki/contents/articles/15871.user-profile-best-practices.aspx
    Since you want to customize user profile, here is another blog for you:
    Customizing Default users profile using CopyProfile
    http://blogs.technet.com/b/askcore/archive/2010/07/28/customizing-default-users-profile-using-copyprofile.aspx
    Best Regards,
    Amy
    Please remember to mark the replies as answers if they help and un-mark them if they provide no help. If you have feedback for TechNet Subscriber Support, contact
    [email protected]

  • Bandwidth Utilization Avg or Max for capacity Planning best practice

    Hello All - This is a conceptual or Non-Cisco product question. Hope you can help me to get this best industry practice
    I am doing a Capacity planning for the WAN Link Bandwidth. To study the last month bandwidth utilization in the MRTG graph, i am seeing  two values
    Average
    Maximum.
    To measure how much bandwidth my remote location is using which value i have to use. Average or Max?
    Average is always low eg. 20% to 30%
    Maximum is continuous 100% for 3 hour in 3 different intervals in a day and become 60% in rest of the day
    What is the best practice followed in the networking industry to derive the upgrade size of the bandwidth by using the Utilization graph
    regards,
    SAIRAM

    Hello.
    It makes no sense to use average during whole day (or a month), as you do the capacity management to avoid business impact due to link utilization; and average does not help you to catch is the end-users experience any performance issues.
    Typically your capacity management algorithm/thresholds are dependent on traffic patterns. As theses are really different cases if you run SAP+VoIP vs. youtube+Outlook. If you have any business critical traffic, you need to deploy QoS (unless you are allowed to increase link bandwidth infinitely).
    So, I would recommend to use 95-percentile of maximum values on 5-15 minutes interval (your algorithm/thresholds will be really sensitive to pooling interval, so choose it carefully). After to collect baseline (for a month or so)  - go and ask users about their experience and try to correlate poor experience with traffic bursts. This would help you to define thresholds for link upgrade triggers.
    PS: proactive capacity management includes link planning for new sites and their impact on existing links (in HQ and other spoke).
    PS2: also I would recommend to separately track utilization during business hours (business traffic) and non-business (service or backup traffic).

  • Logon for ABAP WebDynpro Application

    Hi All,
    To run an ABAP webdynpro application, do the users need sepearate login for R/3 and SAP WAS, for which SSO can be configured. or is it just one login required?
    Thanks
    Hardik

    Thanks Thomas. I am creating a flow diagram for user logon process. Does below steps make sense?
    1. Enter URL of webdynpro application
    2. Enter User Name and Password
    3. SAPlogon.exe and SAPLOGON.INI provides user Data and server information to Work Processor in WAS
    4. Check User Name and Password information agains SAP User Directory
    5. Give Authentication if successful.
    Thanks
    Hardik

  • Exchange Best Practices Analyzer and Event 10009 - DCOM

    We have two Exchange 2010 SP3 RU7 servers on Windows 2008 R2
    In general, they seem to function correctly.
    ExBPA (Best Practices Analyzer) results are fine. Just some entries about drivers being more than two years old (vendor has not supplied newer drivers so we use what we have). Anything else has been verified to be something that can "safely be ignored".
    Test-ServiceHealth, Test-ReplicationHealth and other tests indicate no problems.
    However, when I run the ExBPA, it seems like the server on which I run ExBPA attempts to contact the other using DCOM and this fails.
    Some notes:
    1. Windows Firewall is disabled on both.
    2. Pings in both directions are successful.
    3. DTCPing would not even run so I was not able to test with this.
    4. Connectivity works perfectly otherwise. I can see/manage either server from the other using the EMC or EMS. DAG works fine as far as I can see.
    What's the error message?
    Event 10009, DistributedCOM
    "DCOM was unable to communiate with the computer --- opposite Exchange server of the pair of Exchange servers---  using any of the configured protocols."
    This is in the System Log.
    This happens on both servers and only when I run the ExBPA.
    I understand that ExBPA uses DCOM but cannot see what would be blocking communications.
    I can access the opposite server in MS Management Consoles (MMC).
    Note: the error is NOT in the ExBPA results - but rather in the Event Viewer System Log.
    Yes, it is consistent. Have noticed it for some time now.
    Does anyone have any idea what could be causing this? Since normal Exchange operations are not affected, I'm tempted to ignore it, but I have to do my "due diligence" and inquire. 
    Please mark as helpful if you find my contribution useful or as an answer if it does answer your question. That will encourage me - and others - to take time out to help you.

    Hi David,
    I recommend you refer the following article to troubleshoot this event:
    How to troubleshoot DCOM 10009 error logged in system event
    Why this happens:
    Totally speaking, the reason why DCOM 10009 is logged is that: local RPCSS service can’t reach the remote RPCSS service of remote target server. There are many possibilities which can cause this issue.
    Scenario 1:
     The remote target server happens to be offline for a short time, for example, just for maintenance.
    Scenario 2:
    Both servers are online. However, there RPC communication issue exists between these two servers, for example:  server name resolvation failure, port resources for RPC communication exhaustion, firewall configuration.
    Scenario 3:
    Even though the TCP connection to remote server has no any problem, but if the communication of RPC authentication gets problem, we may get the error status code like 0x80070721 which means “A security package specific
    error occurred” during the communication of RPC authentication, DCOM 10009 will also be logged on the client side.
    Scenario 4:
    The target DCOM |COM+ service failed to be activated due to permission issue. Under this kind of situation, DCOM 10027 will be logged on the server side at the same time.
    Event ID 10009 — COM Remote Service Availability
    Resolve
    Ensure that the remote computer is available
    There is a problem accessing the COM Service on a remote computer. To resolve this problem:
    Ensure that the remote computer is online.
    This problem may be the result of a firewall blocking the connection. For security, COM+ network access is not enabled by default. Check the system to determine whether the firewall is blocking the remote connection.
    Other reasons for the problem might be found in the Extended Remote Procedure Call (RPC) Error information that is available in Event Viewer.
    To perform these procedures, you must have membership in Administrators, or you must have been delegated the appropriate authority.
    Ensure that the remote computer is online
    To verify that the remote computer is online and the computers are communicating over the network:
    Open an elevated Command Prompt window. Click Start, point to
    All Programs, click Accessories, right-click
    Command Prompt, and then click Run as administrator. If the
    User Account Control dialog box appears, confirm that the action it displays is what you want, and then click
    Continue.
    At the command prompt, type ping, followed by a space and the remote computer name, and then press ENTER. For example, to check that your server can communicate over the network with a computer named ContosoWS2008, type
    ping ContosoWS2008, and then press ENTER.
    A successful connection results in a set of replies from the other computer and a set of
    ping statistics.
    Check the firewall settings and enable the firewall exception rule
    To check the firewall settings and enable the firewall exception rule:
    Click Start, and then click Run.
    Type wf.msc, and then click OK. If the
    User Account Control dialog box appears, confirm that the action it displays is what you want, and then click
    Continue.
    In the console tree, click Inbound rules.
    In the list of firewall exception rules, look for COM+ Network Access (DCOM In).
    If the firewall exception rule is not enabled, in the details pane click
    Enable rule, and then scroll horizontally to confirm that the protocol is
    TCP and the LocalPort is 135. Close Windows Firewall with Advanced Security.
    Review available Extended RPC Error information for this event in Event Viewer
    To review available Extended RPC Error information for this event in Event Viewer:
    Click Start, and then click Run.
    Type comexp.msc, and then click OK. If the
    User Account Control dialog box appears, confirm that the action it displays is what you want, and then click
    Continue.
    Under Console Root, expand Event Viewer (Local).
    In the details pane, look for your event in the Summary of Administrative Events, and then double-click the event to open it.
    The Extended RPC Error information that is available for this event is located on the
    Details tab. Expand the available items on the Details tab to review all available information. 
    For more information about Extended RPC Error information and how to interpret it, see Obtaining Extended RPC Error Information (http://go.microsoft.com/fwlink/?LinkId=105593).
    Best regards,
    Niko Cheng
    TechNet Community Support

  • Additional instalation for ABAP Webdynpro

    Dear Collegues, I'm on the way to decide which technology should I choose for company developing web application. I was wondering about PDK for .NET as the company has invested a lot in .NET technology so far. But I realized that it is possible to use Web Dynpro ABAP, as far as I know I have ECC 6.0 version of SAP on WAS 7.0 just installed, but as far as I know I can access Webdynpro for ABAP on SE80 level, but when I go there I do not see any possiblity to create Webdynpro components. Could you please guide me what should be additionally installed within ABAP Workbench enviroment. I know that for Webdynpro for Java I need Webdynpro Developer Studio (I was programing some time ago in it) but what about Webdynpro ABAP? Do I need any additional isntallation? Do I need any additional licence? Or maybe some components should be attached in installation of SAP Netweaver 2004s?
    Thank you in advance for your help.
    Best regards Bogumiila

    Hi,
    for Web Dynpro ABAP you need <a href="http://help.sap.com/saphelp_nw70/helpdata/en/43/e86de5008b4d9ae10000000a155369/frameset.htm">this</a>
    Regards, Heidi

  • Authorizations for tasks (R_UC_TASK) / Best Practice SEM-BCS authorization

    Dear Experts,
    I am quite new to authorizations and in particular to SEM-BCS authorization. So I would be happy if you could help me with the following requirement:
    We have to setup an authorization concepts for SEM-BCS. Among others we want to setup authorizations for consolidations tasks using authorization object R_UC_TASK. With this authorization object certain tasks can be restricted to certain characteristic values u2013 e.g. for a certain consolidation group or a certain consolidation unit. We have defined a role each for certain consolidation tasks. These roles are not restricted to any characteristic value yet. We have for instance a role u201Cregional controlleru201D who is allowed to perform certain BCS tasks on a regional level (consolidation unit level). This would mean that we would have to create the role u201Cregional controlleru201D for all consolidation units u2013 see example below:
    Role 1: Regional Controller u2013 Cons. Unit 1000
    Role 2: Regional Controller u2013 Cons. Unit 1100
    Role 3: Regional Controller u2013 Cons. Unit 1200
    Role n: Regional Controller u2013 Cons. Unit n
    We have more than 400 consolidation units. So this would require a high effort. Is there instead a possibility of creating one role based on authorization object R_UC_TASK which just defines which activities can be performed (without restricting access to a certain consolidation unit). , and using second role which defines the consolidation unit access? u2013 see example below:
    A
    Role: Regional Controller
    Role: Cons Unit 1000
    B
    Role: Regional Controller
    Role: Cons Unit 1100
    C
    Role: Regional Controller
    Role: Cons Unit 1200
    In this case we only would have to maintain one role u201CRegional Controlleru201D and we only would have to assign the restriction for the consolidation unit. How could this be realized?  Or do you have any other ideas to solve this requirement in a simple way?
    Moreover I would be happy if you could tell me where I could find best practice scenarios for SEM-BCS authorizations.
    Thanks a lot in advance!
    Best regards
    Marco

    Hello Marco,
    you can enter a master role in the description tab of a role. All fields populated via program PFCG_ORGFIELD_CREATE can be maintained in the role. All other fields will be taken from the master role. So you only need to populate the field for unit with the program.
    Good luck
    Harry

  • NSM Event Agent for AD location - Best practice

    Hello,
    We are currently designing our NSM 3.1 for AD implementation and would like some guidance with regard to installing the NSM Event Agent. We have come up with two options:
    The first option is to install the NSM Event Agent on a Domain Controller where new user accounts are provisioned.
    The second option is to install the NSM Event Agent on a server with the other NSM components.
    The argument for option 1 is that NSM will be notified as soon as an account is created.
    The argument for option 2 is that MS best practice is that no other software should be installed on a DC and that the NSM Event Agent will perform a network request to talk to the nearest domain controller to obtain a list of changes since it last connected.
    Is there any preferred option, or does it not matter?
    Regards,
    Jonathan

    On 10/28/2013 7:16 AM, JonathanCox wrote:
    >
    > Hello,
    >
    > We are currently designing our NSM 3.1 for AD implementation and would
    > like some guidance with regard to installing the NSM Event Agent. We
    > have come up with two options:
    >
    >
    > - The first option is to install the NSM Event Agent on a Domain
    > Controller where new user accounts are provisioned.
    > - The second option is to install the NSM Event Agent on a server with
    > the other NSM components.
    >
    >
    >
    > The argument for option 1 is that NSM will be notified as soon as an
    > account is created.
    > The argument for option 2 is that MS best practice is that no other
    > software should be installed on a DC and that the NSM Event Agent will
    > perform a network request to talk to the nearest domain controller to
    > obtain a list of changes since it last connected.
    >
    > Is there any preferred option, or does it not matter?
    >
    > Regards,
    >
    > Jonathan
    >
    >
    Jonathan,
    Unlike eDirectory event monitoring, Active Directory event monitoring is
    accomplished with a polling mechanism. Therefore putting your Event
    Monitor on the domain controller will not significantly increase
    performance. As long as the Event Monitor is in a site with a domain
    controller, it should pick up events as quickly as it can.
    For further reading on AD sites and domain/forest topology we recommend
    reviewing http://technet.microsoft.com/en-us/l.../cc755294.aspx.
    Remember that for AD, NSM requires only one Event Monitor per domain
    (and in fact you'll only be able to authorize one Event Monitor per
    domain through the NSM Admin client.) However, deploying a second Event
    Monitor as a backup may be helpful. When the AD Event Monitor is
    installed and configured for the first time, it first has to build a
    locally-cached replica of the domain it resides in. In a large domain
    this can take a long time, so having a second EM already running, which
    can be authorized immediately if the primary EM goes down, will ensure
    that you catch up with events in AD more quickly.
    -- NFMS Support Team

  • Resources for from design - best practices for layout?

    Hi,
    I have made a number of forms fo the past few years.  I feel like they look dated and are somewhat stale...   I have found a few resources out there on Javascript best practices and more mechanical focused articles, but nothing really specific design as it relates to usability and "feel".  I realized some of this is subjective and varies depending on the form's purpose, but I am just looking for some new ideas.
    Does anyone have a resource or listing of froms they think are outstanidng from a design perspective?
    Is anyone willing to share forms they think are outstanding? Just that baisics like information collection?
    How much color and line type objects become to much?
    What are some design elements used in "web 2.0" (whatver that really means) that we sould be using in our forms.  tempered with what can be done.
    I am looking for this to be an open disucssion and am curious to hear what works for others.  I hope others will find this interesting and helpful.
    Cheers,
    Tom

    And the second snippet code validates any form to check every fields if values are not null, if a value is null it will setFocus on the first null field
    2. Validate Form and Focus on First Field that Fails Validation
         2.1 Create a script Object with two small methods to return a table of fields that have null values
    Script Object :
    form1.#variables[0].myForm - (JavaScript, client)
    //Tab for field's expressions and field's exceptions
    var tabExpression;
    var tabException;
    function validateAllFields(rootObject){
              //If a field is null, stop everything
              if (tabExpression.length > 0)
                             return;
              //If the 'presence' property is by default 'visible' in the form and the object value is 'visible', the 'presence' property doesn't exist
              //If its default value is "hidden", the property always exist
                   if (!rootObject.isPropertySpecified("presence") || rootObject.presence == "visible"){
                                  //Verify if the object contains an interface 'button'
                                  //The button is considered as a 'field', so if it's not a button the statement is true
                                  if (!(rootObject.isPropertySpecified("ui") && rootObject.ui.nodes.item(0).className == "button")){
                                                 //If the object contains nodes and if it's not a 'field' or a RadioButtonList
                                                 if (rootObject.nodes.length > 0 && (rootObject.className != "field" && rootObject.className != "exclGroup")){
                                                                //Recall this method for each nodes in the object to find every fields (Recursive Method)
                                                          for (var i = 0; i < rootObject.nodes.length; i++){
                                                                                    validateAllFields(rootObject.nodes.item(i));
                                                 //Verify to add the object in the list if the object is a field and if it contains a value
                                                 if (rootObject.className == "field" || rootObject.className == "exclGroup"){
                                                                if (rootObject.rawValue == null || rootObject.rawValue == 0){
                                                                               //Variable to determines if the object is an exception field
                                                                               var boValidate = true;
                                                                               //If there's exception fields
                                                                               if (tabException.length > 0){
                                                                                              //Verify if the field is in the exception list
                                                                                              if (tabException.indexOf(rootObject.name) != -1){
                                                                                                       boValidate = false;
                                                      //Add if the object is not in the exception table
                                                      if (boValidate)
                                                                tabExpression[tabExpression.length] = rootObject.somExpression;
         2.2 Create this method in your object as well, and will be called on a click_event
    function getValExpressions(rootObject, tabExcption){
         //Create new table
         tabExpression = new Array();
         //Put the exceptions fields value in the exception table
         tabException = tabExcption
         //Validation
         validateAllFields(rootObject);
         //Return a null field
         return tabExpression;
         2.3 The click event is where you write the special validation for different forms
    //Create a table with exception fields, can be used for special validation fields or no validation
    var tabExceptionFields = new Array("dateField1", "txtComments", "txtTotal");
    //Call the validation
    var tab = myForm.getValExpressions(Main, tabExceptionFields);
    if (tab.length > ){
         xfa.host.setFocus(tab[0]);
    } else{
         var boValidate = false;
         var strExpression;
         //write your validation according to the fields you need special validation.
         if (statement == false){
              strExpression = Reference_Syntax.Field.somExpression;
              boValidate = false;
          if (boValidate){
              xfa.host.print(1, "0", (xfa.host.numPages -1).toString(), 0, 0, 0, 0, 0);
         } else{
              xfa.host.setFocus(strExpression);
    I will post a form template as an exemple for these function
    Enjoy!
    Message was edited by: Magus069

Maybe you are looking for

  • HH4 - can't connect to it via ethernet or wireless

    I'm struggling with intermittent fault - it happened on a HH3, but same problem is now beginning to repeat on a replacement HH4 I was sent. When fault manifests itself (lets call it "faulty mode") I cannot connect wired or wirelessly to HH - I cannot

  • How to normalize audio (streaming .mov output)

    We are trying to figure out how to normalize audio. We're using v. 3.0.5. Tried Peak Limiter, and tried the highest setting, and the highest amplitude samples of the waveform did indeed reach 100%, however the noise floor was raised significantly mor

  • Document crash

    Dear all, I have created a numbers document which crashes the program every time I try an action. It won't open, it won't export to excel or PDF, it won,t be sent as a numbers file to Dropbox, iWork.com, etc. Must be corrupted! Is there any way to fi

  • EDI 830/860 problem

    Hi My scenario from EDI  Files to IDOC and we are sending some value to the TXT01 field in IDOC DELFOR01. We are mapping an UDF with TXT01 field. The UDF have code: if (txtTwo.equals(""))     result.addValue(result.SUPPRESS); else    result.addValue(

  • Trying to connect JConsole to JBOSS with exception

    Hy, I am trying to connect JConsole with jboss 4.0.3. So I go the bin folder of jboss instalation directory and I execute run.bat and everything is ok but when I open JConsole and I try to connect to jboss process in local processes section I get the