Should SE03 be given to developers or consultant ?

hi,
should SE03 be given to developers or consultant ? because i find that they can actually access to "client setting" (SCC4) from SE03.
SE03 --> Set System Change Option --> Client setting
comment and advice will be highly appreciated.
thanks.
regards,
kent

SCC4 is nothing else than a parameterized version if SM30. The client settings have more backdoors like SE03. Especially in dev systems I wouldn't worry too much as developers often have sufficient options to change this data. Taking transactions way from developers in dev systems only creates fake security.
To actually change client settings the user also needs S_TABU_DIS with ACTVT '02' and DICBERCLS 'SS'.

Similar Messages

  • I think we should have been given the option to move books from iTunes to iBooks. All mine were downloaded CD booklets and inserts which were in their right place in iTunes. What do others think?

    I think we should have been given the option to have our books moved from iTunes to iBooks. All mine were CD booklets and inserts downloaded with the CDs, and the obvious place for them was in iTunes. As it is now, I can no longer use my own convention for naming, sorting etc. The sort facility in iBooks does not work. What do others think?

    I think we should have been given the option to have our books moved from iTunes to iBooks. All mine were CD booklets and inserts downloaded with the CDs, and the obvious place for them was in iTunes. As it is now, I can no longer use my own convention for naming, sorting etc. The sort facility in iBooks does not work. What do others think?

  • What roles should be assigned to HR and SD peoples.

    Hi all,
       I have a doubt in security. what roles should be assigned to HR and  SD,MM people instead of assigning SAP_ALL and SAP_NEW. I want to restrict all the people giving SAP_ALL and SAP_NEW. How to assign the roles to them and how to authorize them. Plz can anybody tell me clearly the steps for this.
    Thanks & Regards
    Karunakar Reddy

    Basically what you're asking is a step by step guide to role design and implementation. This is an often asked and seldom answered question on this forum (and other forums) because it is not a simple question and not a light task.
    Best start by asking your functional teams' members which transactions they need and start from there.
    You can also have a look at the standard roles delivered by SAP. Maybe some could suit your needs.Try to find out which ones do, copy those and work from there.
    If you want more information from us please tell us:
    1 What have you done so far to acquire knowledge on the SAP authorization concept?
    2 For who do you want to build roles? Developers, functional consultants, key-users, endusers?
    3 Is this on a development environment or a complete landscape?
    4 What is your job role in the project/company?
    Jurjen

  • This should be very simple...

    using the usb 9171 chassis and a ni-9411 module and Labview 2012
    I have one reflective optical reader wired to the 9411.
    this is mounted to the side of a conveyor bed to detect boxes passing by
    I've been trying to setup a VI to count the number of boxes that pass by the optical reader (that part is the easy part) but to also give me a gage that tells me boxes per minute (which could be as low as 1 box passes by per minute or up to 60 boxes per minute)
    any help??

    You could set up a frequency measurement task to do this.
    The tricky part is that the read is a blocking call--it waits until you have a sample available which only happens when a box passes by (starting with the 2nd box, the frequency measurement is computed by inverting the time between consecutive boxes).  You don't want to be stuck inside the DAQmx Read call for up to 1 minute.  A few ways to go about this:
    You can set the read timeout to some low value and discard the timeout error (-200284).  If you're using too much CPU you might need to add a wait to your loop in the timeout case (or maybe this is one of the rare times that setting the DAQmx Read Wait Mode to "Sleep" might actually help).
    You could poll the available samples per channel property to see when to read, but unfortunately polling available samples per channel does not query the onboard FIFO or initiate a transfer back to the software buffer (last I checked), so you'll be reading "0" for quite some time until the on-board FIFO starts filling up, at which point a large chunk of data will be transferred back to the DAQmx buffer in PC memory at once.  Note that this does not apply to PCI/PCIe DAQ devices which transfer data to the PC buffer pretty much as soon as possible--USB and Ethernet devices try to minimize the overhead of unnecessary data transfers but in this case it is a hindrance.
    Using the DAQmx Every N Samples event has the same problem as #2.
    Reading -1 samples returns whatever is in the DAQmx buffer in PC memory, so it also has the same problem as #2 (the read will return 0 samples until the hardware decides to transfer the data over to the PC).
    In your case, you might have luck with #2, #3, or #4 by setting the CI.DataXferReqCond to "Onboard Memory not Empty", but without being able to validate any of these workarounds I think I'm just going to recommend you use suggestion #1:
    You can either run this task in addition to your current edge count task (there are 4 counters on the 9171 which should be plenty given you can only have 1 module), or you can run it instead of it (poll back the Total Samples per Channel and add 1 to determine the count of boxes, however you wouldn't be able to distinguish between 0 and 1 boxes this way since the first sample is returned after the 2nd box passes).
    Best Regards,
    John Passiak

  • Please bring whatsapp to apple store for free please? It should be a great innovative for the apple users..

    Whatsapp is the useful messenger for all the mobile users in the recent years. So please try to put the whatsapp in your appstore as a free purchase. It would
    be a great increase in your products while you put this messaging software on your ios devices and on mac app store. 
    With regards,
    Me...

    1. Apple is not here. This is a user to user forum.
    2. Apple has nothing to do with Whatsapp. Its up to the developers of the Apps to set the prices. If the Developers of Whatsapp want to charge for it, then Apple cannot stop them. However Whatsapp is free: https://itunes.apple.com/us/app/whatsapp-messenger/id310633997?mt=8
    3. Whatever versions of an App are available also depends on the developers. And The Whatsapp developer have only released an iPhone version. No iPad or Mac versions yet.
    Perhaps you should direct this at the Developers on their support site.
    https://www.whatsapp.com/contact/

  • SAP MM - Functional Consultant

    Respected Members,
    I need advice on pursuing SAP MM to progress as a Functional Consultant.
    Just to give you the exact proportion of my experience so that your advices are spot on.
    Profile: Electrical Engineer / PRINCE2 Practitioner / ITIL / CLSSBB
    Education: M.Tech EPS / B.E. EEE
    Experience: 6+
    Detailed Experience:4 Years - Electrical Site Engineer (Consultant/Supervision) - Technical Consultant
                                  2 Years - Sr. Electrical Engineer - Technical Advisor - Specifications Analyst
    Please let me know should I even pursue SAP MM?
    Would it be a career Shift?
    Or is there another Module?
    How should I go about becoming a Functional Consultant?
    Looking forward for your advices. Would really appreciate the help and concern.
    All I can say is Thank You in advance, but, it is more than that in emotions.
    Message was edited by: M S

    No no, its not about feeling bad. I need to know everything in and out. It might be a career swipe for me.
    Its "pursue" not purchase - I meant should I begin training for SAP MM.
    From your response Mr. Dev, seems like your acknowledging to the idea that I should start SAP MM.
    Could you however evaluate it on the basis of my qualification and experience? Would appreciate it immensely.

  • Not given credit for all iCloud storage paid for.

    I purchased extra storage for my iPad. Should have been given 20GB. After purchase only 15GB available. Should have been 20+.where do I address conc
    ern?

    When you purchase the 20 GB plan, that is not on top of the free 5 GB, your total online storage will be 20 GB.
    In Settings->General->Usage->iCloud->Manage Storage.  There you can see how much is used by each app, other devices & how much space is available.
    FYI: There has been some strange behaviour on certain devices that are reporting iCloud Total Storage incorrectly.  Not every device is affected but older devices such as the iPad 2, are having the issue.  My iPad shows I have 0 bytes of Storage but my plan is 20 GB.  This appears to be a bug.  If you're seeing a similar issue, report it to Apple feedback.

  • What does a DPS consultant (reseller) make?

    Hi,
    My company is about to begin selling the Adobe Digital Publishing Suite. They are forming the position (as it has not existed within the company yet). They want me to be the DPS consultant.
    The job definition is that once our sales reps sell a DPS enterprise edition, I would assist the institution in setting up the iOS/Android app, setup the admins/users, integrate DPS into existing workflows, create the commercial developer accounts, configure in-app purchasing, etc. (I wouldn't do actual sales)
    The minimum consulting length is 3 days, the maximum would be 3 months. I've heard that the average cost for a 3 day consulting job is $4,000. However, I'm not sure what the annual salary of a DPS consultant should be...
    What should be charged for a 1 month consulting job? Two months? Three months? How does that work?
    What should the annual salary be, and should the consultant get commissions? What % of consulting sales commissions should they get?
    Is there a lot of travel required for a consultant? Or can they do all this work remotely, via Adobe Connect, workstation share, admin access to the system, etc....
    I've considered reaching out to existing consulting companies, but I'm not sure they would just give this information to someone who will be a compeditor in the future...
    Please help!

    Way too broad a question to answer here.
    There’s too much dependent on the geographic area and level of expertise. If you were in NYC you’d be making a lot more money than you would be in rural Georgia for instance.
    Bob

  • PS3 trade in and wasn't given $10 credit for controller​, said it was "part of the console"

    Went to best buy in North Haven, CT today to trade in my PS3 slim + 2 controllers + games and was told that one of the controllers had to be included to be part of the "console", to which I argued no, that online and in their system only asks for cables (which I included).
    They also refused my second controller trade in saying it wouldn't sync because the batteries were dead, they plugged it in and the lights flashed but quickly unplugged it.
    I would like to know why I wasn't granted the $10 for the controller when that should have been the case.
    Please help.
    Thank you

    Hello higgs1,
    I'm disappointed to read about your experience at the North Haven store. Certainly creating a disappointing situation for you was not our goal.
    According to the Terms & Conditions, this promotion is "Not available in all locations and some stores may have additional limitations." You should have been given an explanation if your controllers didn't qualify for this promotion.  Did you speak to a store manager during your visit about the reason you were given for having your trade-in declined?
    I'm grateful that you wrote to us about your concerns.
    Sincerely,
    John|Social Media Specialist | Best Buy® Corporate
     Private Message

  • Would you furnish address to send compliment about sales consultant

      Would you please email me giving me a name and address where I should send my letter complimenting a sales consultant????
    I upgraded my Samsung phone to a Galaxy S5 today in your Anderson, SC facility.  I had the MOST pleasant experience with your Consultants, Tony (removed) and Kevin (removed).  They were so patient with all my questions; actually talked me into buying the S5 rather than the S4 I had intended to buy. They made the experience, which can be daunting, a walk in the park....with new friends!!  I want to write a letter to their Manager / Supervisor to let them know what great representatives they have and express my sincere appreciation.  It is so delightful to meet such nice, informed representatives.Thanks so much, and I might add, I have been a Verizon customer for 20 years, and have NEVER changed carriers.  I convinced my family members (6) to utilize Verizon Wireless as well. Nita (removed) Thanks for your assistance.
    << Personal information removed to comply with Verizon Wireless Terms of Service >>
    Message was edited by: Verizon Moderator

        Reading your post certainly put a smile on my face dylanpat12. We love to read the posts from our happy customers. I want to make sure that Tony and Kevin get the proper acknowledgement for their efforts. If you can send me a private message with your feedback then I can have this lifted up internally.
    Thank you…
    ArnettH_VZW
    Follow us on Twitter @VZWSupport

  • Why does apple phone support suck when a simple coreaudiod problem should be a simple answer?

    I have a problem with a 4 month old iMac that has a problem with coreaudiod.  When coreaudiod is in the correct directory the computer is unuseable so I called Apple support.  Once I explained they told me that I would have to pay #35 for support to get help.  I didn't just call first thing I tried as many solutions that I found on the web and nothing has worked.  Currently I use the iMac with coreaudiod moved so I can acutally use the machine but of course I have no audio or video at all.  I would understand if it was older than a year or more but this machine is still brand new and shouldn't have this problem and I should just be given the help needed.  It looks like the only option I have is to return it to where I bought it and get a refund which is of course a massive pain.
    I will attempt to resolve for a short time more but it doesn't look good for this computer.  This is my fifth Mac and the first time I have had a serious problem so have not had the issue of a lack of support.
    If anyone can add anything to help resolving this I would appreciate it but even that won't help my thoughts on apple support.

    Greetings,
    If the issue was occuring the first day you owned your computer then that is worth noting.  However if it started over time that means that something added to / done to the computer modified the Mac OS.  It is worth thinking about what may have led to the issue as if you got a new computer and install / do the same thing again it may cause the issue again.
    Coreaudio is integral to OS X.  If it is not functioning then reinstalling the OS would be the first step: http://docs.info.apple.com/article.html?path=Mac/10.7/en/mchlp1599.html
    If that does not resolve the issue then an Erase and Install will remove whatever changes were made and take your system back to the way Apple made it (and working): http://docs.info.apple.com/article.html?path=Mac/10.7/en/mh27903.html
    As you've owned 5 macs and are an experienced computer user I'm sure you keep backups but for anyone else who might read this post, make sure you have backups of your data before you reinstall your OS or erase your system: http://support.apple.com/kb/HT1553
    Once you've completed your erase, only migrate your User accounts back, not the entire system, otherwise you'll get the same issue back again: http://support.apple.com/kb/HT4889
    Cheers.

  • Associate vs Consultant

    Hi,
    I wonder how new certification level "associate" applies to "SAP system installations should only be performed by SAP Technical Consultants who are certified for your operating system, your database, and the SAP system that you are installing." statement in installation guide? Associate = "old" Consultant? What about "Professional" and "Expert"?
    Regs,
    FS

    Hi Kash
    To gain Professional level will require many years of project experience.
    Rather aim for the Associate Certificate, this is still very highly regarded in the industry and your odds of passing based purely on the reading material will be much higher.
    Regards
    Arden

  • Java Security Model: Java Protection Domains

    1.     Policy Configuration
    Until now, security policy was hard-coded in the security manager used by Java applications. This gives us the effective but rigid Java sandbox for applets.A major enhancement to the Java sandbox is the separation of policy from mechanism. Policy is now expressed in a separate, persistent format. The policy is represented in simple ascii, and can be modified and displayed by any tools that support the policy syntax specification. This allows:
    o     Configurable policies -- no longer is the security policy hard-coded into the application.
    o     Flexible policies -- Since the policy is configurable, system administrators can enforce global polices for the enterprise. If permitted by the enterprise's global policy, end-users can refine the policy for their desktop.
    o     Fine-grain policies -- The policy configuration file uses a simple, extensible syntax that allows you to specify access on specific files or to particular network hosts. Access to resources can be granted only to code signed by trusted principals.
    o     Application policies -- The sandbox is generalized so that applications of any stripe can use the policy mechanism. Previously, to establish a security policy for an application, an developer needed to implement a subclass of the SecurityManager, and hard-code the application's policies in that subclass. Now, the application can make use of the policy file and the extensible Permission object to build an application whose policy is separate from the implementation of the application.
    o     Extensible policies -- Application developers can choose to define new resource types that require fine-grain access control. They need only define a new Permission object and a method that the system invokes to make access decisions. The policy configuration file and policy tools automatically support application-defined permissions. For example, an application could define a CheckBook object and a CheckBookPermission.
    2.     X.509v3 Certificate APIs
    Public-key cryptography is an effective tool for associating an identity with a piece of code. JavaSoft is introducing API support in the core APIs for X.509v3 certificates. This allows system administrators to use certificates from enterprise Certificate Authorities (CAs), as well as trusted third-party CAs, to cryptographically establish identities.
    3.     Protection Domains
    The central architectural feature of the Java security model is its concept of a Protection Domain. The Java sandbox is an example of a Protection Domain that places tight controls around the execution of downloaded code. This concept is generalized so that each Java class executes within one and only one Protection Domain, with associated permissions.
    When code is loaded, its Protection Domain comes into existence. The Protection Domain has two attributes - a signer and a location. The signer could be null if the code is not signed by anyone. The location is the URL where the Java classes reside. The system consults the global policy on behalf of the new Protection Domain. It derives the set of permissions for the Protection Domain based on its signer/location attributes. Those permissions are put into the Protection Domain's bag of permissions.
    4.     Access Decisions
    Access decisions are straightforward. When code tries to access a protected resource, it creates an access request. If the request matches a permission contained in the bag of permissions, then access is granted. Otherwise, access is denied. This simple way of making access decisions extends easily to application-defined resources and access control. For example, the banking application allows access to the CheckBook only when the executing code holds the appropriate CheckBookPermission.
    Sandbox model for Security
    Java is supported in applications and applets, small programs that spurred Java's early growth and are executable in a browser environment. The applet code is downloaded at runtime and executes in the context of a JVM hosted by the browser. An applet's code can be downloaded from anywhere in the network, so Java's early designers thought such code should not be given unlimited access to the target system. That led to the sandbox model -- the security model introduced with JDK 1.0.
    The sandbox model deems all code downloaded from the network untrustworthy, and confines the code to a limited area of the browser -- the sandbox. For instance, code downloaded from the network could not update the local file system. It's probably more accurate to call this a "fenced-in" model, since a sandbox does not connote strict confinement.
    While this may seem a very secure approach, there are inherent problems. First, it dictates a rigid policy that is closely tied to the implementation. Second, it's seldom a good idea to put all one's eggs in one basket -- that is, it's unwise to rely entirely on one approach to provide overall system security.
    Security needs to be layered for depth of defense and flexible enough to accommodate different policies -- the sandbox model is neither.
    java.security.ProtectionDomain
    This class represents a unit of protection within the Java application environment, and is typically associated with a concept of "principal," where a principal is an entity in the computer system to which permissions (and as a result, accountability) are granted.
    A domain conceptually encloses a set of classes whose instances are granted the same set of permissions. Currently, a domain is uniquely identified by a CodeSource, which encapsulates two characteristics of the code running inside the domain: the codebase (java.net.URL), and a set of certificates (of type java.security.cert.Certificate) for public keys that correspond to the private keys that signed all code in this domain. Thus, classes signed by the same keys and from the same URL are placed in the same domain.
    A domain also encompasses the permissions granted to code in the domain, as determined by the security policy currently in effect.
    Classes that have the same permissions but are from different code sources belong to different domains.
    A class belongs to one and only one ProtectionDomain.
    Note that currently in Java 2 SDK, v 1.2, protection domains are created "on demand" as a result of class loading. The getProtectionDomain method in java.lang.Class can be used to look up the protection domain that is associated with a given class. Note that one must have the appropriate permission (the RuntimePermission "getProtectionDomain") to successfully invoke this method.
    Today all code shipped as part of the Java 2 SDK is considered system code and run inside the unique system domain. Each applet or application runs in its appropriate domain, determined by its code source.
    It is possible to ensure that objects in any non-system domain cannot automatically discover objects in another non-system domain. This partition can be achieved by careful class resolution and loading, for example, using different classloaders for different domains. However, SecureClassLoader (or its subclasses) can, at its choice, load classes from different domains, thus allowing these classes to co-exist within the same name space (as partitioned by a classloader).
    jarsigner and keytool
    example : cd D:\EicherProject\EicherWEB\Web Content jarsigner -keystore eicher.store source.jar eichercert
    The javakey tool from JDK 1.1 has been replaced by two tools in Java 2.
    One tool manages keys and certificates in a database. The other is responsible for signing and verifying JAR files. Both tools require access to a keystore that contains certificate and key information to operate. The keystore replaces the identitydb.obj from JDK 1.1. New to Java 2 is the notion of policy, which controls what resources applets are granted access to outside of the sandbox (see Chapter 3).
    The javakey replacement tools are both command-line driven, and neither requires the use of the awkward directive files required in JDK 1.1.x. Management of keystores, and the generation of keys and certificates, is carried out by keytool. jarsigner uses certificates to sign JAR files and to verify the signatures found on signed JAR files.
    Here we list simple steps of doing the signing. We assume that JDK 1.3 is installed and the tools jarsigner and keytool that are part of JDK are in the execution PATH. Following are Unix commands, however with proper changes, these could be used in Windows as well.
    1. First generate a key pair for our Certificate:
    keytool -genkey -keyalg rsa -alias AppletCert
    2. Generate a certification-signing request.
    keytool -certreq -alias AppletCert > CertReq.pem
    3. Send this CertReq.pem to VeriSign/Thawte webform. Let the signed reply from them be SignedCert.pem.
    4. Import the chain into keystore:
    keytool -import -alias AppletCert -file SignedCert.pem
    5. Sign the CyberVote archive �TeleVote.jar�:
    jarsigner TeleVote.jar AppletCert
    This signed applet TeleVote.jar can now be made available to the web server. For testing purpose we can have our own test root CA. Following are the steps to generate a root CA by using openssl.
    1. Generate a key pair for root CA:
    openssl genrsa -des3 -out CyberVoteCA.key 1024
    2. Generate an x509 certificate using the above keypair:
    openssl req -new -x509 -days key CyberVoteCA.key -out CyberVoteCA.crt
    3. Import the Certificate to keystore.
    keytool -import -alias CyberVoteRoot -file CyberVoteCA.crt
    Now, in the step 3 of jar signing above, instead of sending the request certificate to VeriSign/Thawte webform for signing, we 365 - can sign using our newly created root CA using this command:
    openssl x509 -req -CA CyberVoteCA.crt -CAkey CyberVoteCA.key -days 365 -in CertReq.pem -out SignedCert.pem �Cacreateserial
    However, our test root CA has to be imported to the keystore of voter�s web browser in some way. [This was not investigated. We used some manual importing procedure which is not recommended way]
    The Important Classes
    The MessageDigest class, which is used in current CyberVote mockup system (see section 2), is an engine class designed to provide the functionality of cryptographically secure message digests such as SHA-1 or MD5. A cryptographically secure message digest takes arbitrary-sized input (a byte array), and generates a fixed-size output, called a digest or hash. A digest has the following properties:
    � It should be computationally infeasible to find two messages that hashed to the same value.
    � The digest does not reveal anything about the input that was used to generate it.
    Message digests are used to produce unique and reliable identifiers of data. They are sometimes called the "digital fingerprints" of data.
    The (Digital)Signature class is an engine class designed to provide the functionality of a cryptographic digital signature algorithm such as DSA or RSA with MD5. A cryptographically secure signature algorithm takes arbitrary-sized input and a private key and generates a relatively short (often fixed-size) string of bytes, called the signature, with the following properties:
    � Given the public key corresponding to the private key used to generate the signature, it should be possible to verify the authenticity and integrity of the input.
    � The signature and the public key do not reveal anything about the private key.
    A Signature object can be used to sign data. It can also be used to verify whether or not an alleged signature is in fact the authentic signature of the data associated with it.
    ----Cheers
    ---- Dinesh Vishwakarma

    Hi,
    these concepts are used and implemented in jGuard(www.jguard.net) which enable easy JAAS integration into j2ee webapps across application servers.
    cheers,
    Charles(jGuard team).

  • Where I have to give the host string name of oracle server in WSAD?

    hi,
    I setup the oracle in my WSAD.But,Its giving below error.
    [3/16/06 13:25:41:332 SGT] 3e75fec4 WsServer A WSVR0001I: Server server1 open for e-business
    [3/16/06 13:25:42:535 SGT] 68bb7ec6 WebGroup I SRVE0180I: [Sample] [Sample] [Servlet.LOG]: ResultData: init
    [3/16/06 13:25:42:551 SGT] 68bb7ec6 SystemOut O the connection started
    [3/16/06 13:25:42:551 SGT] 68bb7ec6 SystemOut O no connection
    [3/16/06 13:25:43:535 SGT] 68bb7ec6 ConnectionFac I J2CA0122I: Resource reference jdbc/MyDataSource could not be located, so default values of the following are used: [Resource-ref settings]
         res-auth: 1 (APPLICATION)
         res-isolation-level: 0 (TRANSACTION_NONE)
         res-sharing-scope: true (SHAREABLE)
         res-resolution-control: 999 (undefined)
    [Other attributes]
    isCMP1_x: false (not CMP1.x)
    isJMS: false (not JMS)
    [3/16/06 13:25:44:285 SGT] 68bb7ec6 FreePool E J2CA0046E: Method createManagedConnctionWithMCWrapper caught an exception during creation of the ManagedConnection for resource jdbc/MyDataSource, throwing ResourceAllocationException. Original exception: com.ibm.ws.exception.WsException: DSRA8100E: Unable to get a PooledConnection from the DataSource.
         at com.ibm.ws.rsadapter.exceptions.DataStoreAdapterException.<init>(DataStoreAdapterException.java:244)
         at com.ibm.ws.rsadapter.exceptions.Dat
    [3/16/06 13:25:44:426 SGT] 68bb7ec6 SystemErr R      at oracle.jdbc.pool.OracleConnectionPoolDataSource.getPhysicalConnection(OracleConnectionPoolDataSource.java:109)
    [3/16/06 13:25:44:426 SGT] 68bb7ec6 SystemErr R      at oracle.jdbc.pool.OracleConnectionPoolDataSource.getPooledConnection(OracleConnectionPoolDataSource.java:77)
    [3/16/06 13:25:44:426 SGT] 68bb7ec6 SystemErr R [3/16/06 13:25:44:426 SGT] 68bb7ec6 SystemOut O Error on find the database() : java.sql.SQLException: Listener refused the connection with the following error:
    ORA-12505, TNS:listener does not currently know of SID given in connect descriptor
    The Connection descriptor used by the client was:
    SGGSGPTP31DT197.code1.emi.philips.com:1521:CESS
         at oracle.jdbc.pool.OracleConnectionPoolDataSource.getPooledConnection(OracleConnectionPoolDataSource.java:59)
    [3/16/06 13:25:44:426 SGT] 68bb7ec6 SystemErr R      at com.ibm.ws.rsadapter.DSConfigurationHelper$1.run(DSConfigurationHelper.java:759)
    [3/16/
    But,I given correct URL.The URL I given is
    jdbc:oracle:thin:@sggsgptp31dt197.code1.emi.philips.com:1521:CESS
    sggsgptp31dt197.code1.emi.philips.com -- this is my host machine.
    I think the problem with host string.
    actually when we are trying to enter into the oracle sql,it asking the username,password and host string.I mentioned the username and password in variables tab.I don't know where I have to mention the host string name.
    Please any one help on this.
    Thank you,
    D.Nagireddy.

    I would say that, since the OP has so little info, there are no policies in use.  It there were then this question would never be asked the way it is being asked.
    I had a client call with a letter from their insurance company; an accountant with malpractice insurance.  THey asked the same question inmuch the same way.  "What computer can you users access?"  The question should be more like
    "Do you have a policy that restricts access to computers and do you audit for compliance?"
    I have had other clients whose insurance asked the question in that way.  It produces a better view of what should be happening and how to show compliance.
    I recommend that companies being asked these questions by their legal departments or insurance companies should contract with a god computer security consultant to assist with answering these very tricky questions.  Of course if it is just you boss's
    curiosity  then you may need to discuss his requirements with him in more depth.
    ¯\_(ツ)_/¯

  • FIX on a UDA

    I am trying to FIX on a UDA for the 'Period' dimension. The UDA is defined as either 'open' or 'closed'. The dimension is re-built dynamically each night. When some periods are 'open' and others 'closed', this MAXL works. However, when all periods are 'open' - and there are not any 'closed' periods, the FIX statement doesn't operate as expected and the MaxL runs everything under the FIX. Very odd. Can anyone shed any light on this and offer their best work-a-round? Thxs.
    FIX (@UDA("Period", "closed"))
         CLEARDATA "Forecast";
         DATACOPY "Actual" TO "Forecast";
    ENDFIX;

    Hello There.
    Cameron:
    I should have been more clear in my original posting.
    The intent of the suggestion/alternative was from an "ease" of maintenance (and avoiding the "global fix" problem) perspective rather than a speed/performance one.
    Regarding the FIX on the sub vars you are absolutely correct -- it will not make it any faster -- but you could prevent the script from executing the statements within the FIX by using sub vars rather than UDAS (actually you could also create an "opposite" UDA like "open" and use AND/OR/NOT logic within the FIX signature itself if you didn't want to go down the sub var path for whatever reason). As you know the problem the user is having is when there are no UDAs on the members of the period dimension the statements within the FIX execute (older version of essbase and setting option not being available). I was simply stating that you could use sub vars to specify only those months (assuming months are the base level members of the period dimension) that you want the enclosed fix code to operate on -- of course you could/would need another sub var to specify the months to specifically exclude (e.g. &ActMonths, &FcstMonths) and possiibly AND/OR operator within the FIX statement itself if you like. The bottom line is you would make certain each member was always tagged with one of the two sub vars (again - could be done with udas) thereby allowing the script to only operate on those periods that it should. I just looked at the users second entry and it appears the second UDA and conditional route was taken.
    In my opinion, a single substitution variable that evaluates to 1 - 12 months (modified in one place - the sub var value-string itself) seems easier than manually or via load rule changing (potentially) up to 12 different period base level members -- once again assuming the base level members are indeed months.
    And yes you are correct - datacopy does not work within a conditional -- it would have to be accomplished through another means which I now see the user chose -- and yes you are also correct in that datacopy is very fast and would likely be the hands-down most efficient means.
    Gary:
    With regard to the "Golden Rule" statement -- it was not my intention to imply that it is a "always do this or perish" rule (although - admittedly - using the term "golden" probably made it appear quite the contrary) -- given the fact that rarely is anything always black/white when it comes to hyperion essbase, particularly in the realm of database calculation optimization. Nevertheless, someone should tell the numerous hyperion instructors/technical consultants (including Ed Roske as he has it clearly stated in his Look Smarter book) that I have worked with in the past. Thanks for the food for thought -- I sincerely appreciate it.
    Look Smarter excerpt: "...It is a good rule that can be used even more effectively..."
    Outdated/misguided logic below? You decide sports fans...
    In general, you should try and only use "FIX" statements on SPARSE dimensions.
    FIX statements allow you to take a slice of the database and only perform an action on that slice. If you fix on a SPARSE dimension, then you are limiting the amount of blocks that you are performing the action upon. If you FIX on a DENSE dimension, you are not limiting the number of blocks, but rather just a portion within each block. Using the FIX statement on a dense dimension can cause multiple passes through the same blocks which is very inefficient. On the other hand, the IF statement is well suited to DENSE dimensions because it performs IF logic while the block is in memory.
    Example: If JUL then ..., else .... will all be performed in one pass without the need of multiple passes through the blocks. In general, try and use FIX on sparse dimensions and IF on dense dimensions.
    Thank you both once again for your comments.
    Regards,
    todd rebner
    http://www.advancedepm.com/
    Edited by: todd rebner on Jun 7, 2009 10:32 AM

Maybe you are looking for