Tables: CATSDB & AFRU - How are they filled and what are there purposes?

Hi,
In regards to tables CATSDB & AFRU, how are they filled (interfaces, programs) and what are the purposes of these tables?
I found the interface IF_EX_CATSBW_CUST_ISOURCE for table CATSDB but is this how CATSDB is filled? How about AFRU?
Please help.
Thanks,
John

<a href="http://help.sap.com/saphelp_erp2005/helpdata/en/19/8d38689bfd11d38ea50000e81de309/frameset.htm">CATSDB</a> is usually filled via Time Entry (CAT2) or a BAPI call.
Arya

Similar Messages

  • My iPhone was stolen and I have contacted the police who are using the meid number to locate.  How does this work and what are my chances of getting the phone back?

    My iPhone was stolen.  I used Find My iPhone app to lock it and display a message.  The phone has not connected to the internet to locate it.  I contacted the police and they have taken my meid number.  How does this work and what are my chances of getting the phone back?  Are there other ways the theif can use it.  I was told once they put in a new sim card and use it, whatever software the police have, it will show up.

    Honestly? In the US (I can't speak to other countries, though I doubt it works much differently in a lot of the world) The police took your report and filed it either in their computers or, on paper. They will now not think of this again. The only time it will cross anyones mind is if, in the course of entering information into evidence about items recovered or seized at a crime scene, the serial number of an iPhone that was found/seized happens to match yours, in which case you will be contacted.
    The police in the US can and will do nothing to 'blok' the phone and it's not worth their time to try and locate it unless you know for a fact that it was stolen by a big time drug lord, master criminal, or some other such prime target and they can get a court order to track the location of the phone in order to locate this individual for your own purposes.  If they do that, they'll probably keep him under surveilance for a year or so before they act.
    Basically, the police don't care about your phone. If they find it, they will give it back to you. They are not, however, going to go looking for it. They have better things to do.
    I'm sorry, but that's the way it is.

  • How To Handle Tickets and What are those

    Hi Everybody,
    Can anybody tell me, How to handle tickets and what are those.
    srinivas

    Hi,
    Tickets are basically assocaited with Production support type of work.
    Tickets are nothing but the medium through which problems reported either in the system or by users to the Production support team.
    There are certain problem management tools that every organization uses (tickets are created and worked on using those tools). There are tools like Vantive, Remedy, CASE, etc.
    Usually the helpdesk gets the first contact for any user problems and then they log a ticket with the appropriate support teams. The support teams then pick up those tickets and work on them till they are resolved. There are tickets created for user problems or any batch job failures, system failures, etc.
    Tickets are usually classified as Critical, High or Low and again they are categorized as High Severity, Medium Severity or Low Severity. All these types of tickets have SLAs (Service level agreements) for the Support teams to respond and the resolve the tickets in.
    Look at the threads below for similar posts :
    tickets
    Tickets
    tickets
    Cheers,
    Kedar

  • What are Crypto Cards, and what are they different from Java Cards?

    Hi,
    I just heard the name 'Crypto Card'. I thought Java Card is the only standard for smart card. Could anyone tell me what are Crypto Cards, and what are they different from Java Cards? Thanks in advance.
    Joey

    Probably any card that offers cryptographic capabilities (crypto coprocessor) could be called "Crypo Card", but likely the term was referred to cards offering a pkcs#11 interface.
    Pkcs#11 is the standard for accessing crypto devices, like tokens, cards, or accelerators. Such a device can be easily accessed for example from your browser to perform cryptographic and digital signature operations.
    A Javacard can operate as a pkcs#11 device in you install on it an applet dealing with the pkcs#11 requests.

  • What are Wrapper classes and what are they used for ?

    What are Wrappter classes and what are they used for ?..Also, any examples would be great to understand this concept

    Wrapper classes are used to enclose primitive data
    types so that they can be used in instances where an
    object is required. For example, if you want to add an
    integer to an ArrayList, you can't use this:java.util.List al = new ArrayList();
    int i=123;
    al.add(i);because the ArrayList expects data of type object. In
    order to all the integer to the ArrayList, you must wrap
    it in the Integer wrapper class. This works:java.util.List al = new ArrayList();
    int i=123;
    al.add(new Integer(i));Hope that helps.
    Mark

  • What are state objects, and what are they used for ?

    tried to find some information in the documentation and internet. but i couldn't find a good explanation with an example what that is and what it is used for.
    thanks for any good answer !

    Wrapper classes are used to enclose primitive data
    types so that they can be used in instances where an
    object is required. For example, if you want to add an
    integer to an ArrayList, you can't use this:java.util.List al = new ArrayList();
    int i=123;
    al.add(i);because the ArrayList expects data of type object. In
    order to all the integer to the ArrayList, you must wrap
    it in the Integer wrapper class. This works:java.util.List al = new ArrayList();
    int i=123;
    al.add(new Integer(i));Hope that helps.
    Mark

  • How to configure wccp and what are the commands of wccp used in ver:5.3.3 on WAE model#7341

    Dear all,
    Can any one suggest what are the commands required during configuration of wccp on a WAE device of model #7341 with version 5.3.3 of IOS .

    Mohammad,
    Here you have a link for 5.3.1 but essentially it should still be valid:
    http://www.cisco.com/c/en/us/td/docs/app_ntwk_services/waas/waas/v531/configuration/guide/cnfg/traffic.html#wp1041742
    Depending on the router, you may consider what options to use.
    Jorge

  • Privilege settings how to fix them and what are they

    trying to download itunes gives me a privilege error message

    Hi mariacrowe,
    Welcome to the Support Communities!
    The article below will help you with issues installing the latest version of iTunes for Windows:
    Issues installing iTunes or QuickTime for Windows
    http://support.apple.com/kb/HT1926
    What version of Windows are you using?  This article explains what file permissions are and gives instructions from Microsoft for changing permissions:
    Trouble adding music to iTunes library or importing audio CD
    http://support.apple.com/kb/ts1387
    Resolution
    These messages occur if permissions are incorrect on your designated music folder or on a folder inside your designated music folder. Permissions are settings that determine who can read, write to, or execute a file or folder on your computer. Every file and folder on your hard disk has an associated set of permissions.
    Example: If permissions are correct on your Music folder, but incorrect on the U2 folder inside your Music folder, you would be able to add other music to your iTunes library, but not that new U2 album.
    Look here for help in correcting the permissions on folders:
    Windows XP:
    How to set, view, change, or remove file and folder permissions in Windows XP
    Note: Permissions and privileges for files are different from authorization to play a song purchased from the iTunes Store. Click here for information on authorizing a purchased song to play.
    Additional Information
    To be able to add new music to iTunes, permissions must be correct on your Music folder and the folders in it.
    Cheers,
    - Judy

  • What are XI objetcs and What are XI components

    there are so many areas in XI. for eg. ...IR,ID,SLD,RWB,IS,BPM blah blah...
    anyone please explain.... what is the diffrence between object and component.please explain in words rather giving link...
    thanx in advance.

    hey sam,
    components of xi are what xi is made of... like ir, id , rwb, sld, AE...these components sit on abap or java stack.
    "objects" in xi is what "you develope" to send/receive msg in xi like data types, msg types, mappings etc.
    plz refer help.sap. everything is documented pretty well over there.
    http://help.sap.com/saphelp_nw04/helpdata/en/14/80243b4a66ae0ce10000000a11402f/frameset.htm
    happy learning!
    [reward if helpful]
    regards,
    latika.

  • How to use Smart cut and what are the restrictions to use this

    Hello,
    How to use Smartcut and what are the restrictions to use this.
    is it possible in version 9.
    and is it safer to use it in real iproject mplementation?
    Thanks in advance

    Hi
    read more about smartcuts here http://download.oracle.com/docs/cd/E12825_01/epm.111/bpmui_admin.pdf
    read "Managing smartcuts"
    Regards
    alexander

  • How many types of tables exists and what are they in data dictionary?

    hi,
    How many types of tables exists and what are they in data dictionary?
    regards.

    Hello Liu,
    Please search in forum before posting any question .
    anyhow check the below link :
    http://web.mit.edu/sapr3/dev/sap_table_types.htm
    Thanks
    Seshu

  • I'm having some difficulty with Time Machine.  It appears to be deleting backups from random dates on my external hard drive.  I am not deleting them.  Are they hidden and how do I prevent this from happening?  Can I retrieve them?

    I'm having some difficulty with Time Machine.  It appears to be deleting backups from random dates on my external hard drive.  I am not deleting them.  Are they hidden and how do I prevent this from happening?  Can I retrieve them?

    ... I didn't know that Time Machine was more a last resort back up instead of main back up.
    Don't rely upon Time Machine to the exclusion of all else. I compliment Time Machine with a periodic "clone". TM is much better than nothing, but it's a safety net, not a hammock
    Here is my understanding of Time Machine's file deletion algorithm, distilled from Pondini's FAQ, Apple's KB articles, and my own observations.
    Time Machine deletes ("thins") files from the backup disk as follows:
    Hourly backups over 24 hours old, except the first backup of the day
    Daily backups over 30 days old, except the first backup of the week
    Older backups get deleted when Time Machine requires space and you deleted them from the source disk.
    Therefore, assuming TM has been performing at least one backup per day, backup files will remain available:
    at least thirty days, if they existed on your Mac for at least a day
    until you run out of space, if they existed on your Mac for at least a week
    In addition to the above, Time Machine always keeps one complete copy of your source disk so that the entire volume could be restored if necessary. Any files that remain on your source volume will be present on the TM backup, no matter how old they are.
    If you are using 250 GB of space on your source disk, its Time Machine backups are likely to require at least twice that much. A good estimate of the minimum required backup volume size would be about three times the size of your source disk - 1.5 TB in your case.
    A more thorough explanation would require Pondini since he has plumbed Time Machine's mysteries far more than I have.
    http://support.apple.com/kb/HT1427

  • How the Payload Message and Logs are stored in the B1i Database Table: BZSTDOC

    I would appreciate it if someone could provide any documentation regarding B1i database further maintenance.
    for example:
    I want to know how the payload message and logs are stored in the table BZSTDOC, and how can we retrieve the payload message directly from the column DOCDATA.
    As described in the B1iSNGuide05 3.2 LogGarbageCollection:
    to avoid the overload of the B1i Database, I set the Backup Buffer to 90 days : so this means Message Logs from the last 90 days will always be available, but is there some way we can save those old messages to a disk so that I can retrieve the payload message anytime?
    in addition, let’s assume the worst, the B1iSN server or the B1i database damaged, Can we just simply restore the B1i database from a latest backup DB then it can work automatically after the B1iSN server is up and running again?
    BR/Jim

    Dear SAP,
    Two weeks passed, I still haven't received any feedback from you guys.
    Could you please have a look at my question?
    How is this Question going? Is it Untouched/Solving/Reassigned ?

  • I am freeing up some space and am using osx lion, but i have 12gb of back ups, how can i delete these and what are they?

    I am freeing up some space and am using osx lion, but i have 12gb of back ups, how can i delete these and what are they?

    Gotcha.
    Back-ups are what they are: a safety copy. If you feel you don't need them, you can trash them. They could be of a previous System if you upgraded, or something else. You wont get the full picture from looking at system profiler.
    You may want to look into getting an external drive and offloading some stuff to it.

  • Color Swatches in Toolbar for Fill and Stroke are not working properly.

    The color swatches in toolbar for fill and stroke are not functioning as they should.  When I select an object on the artboard, the swatches display fine in the toolbar for what they should be.  However, when I double-click on those swatches from within the toolbar to modify the color, the color which comes up is #000000 instead of the actual color it should be. 
    I am using 16.2.1 (cloud) for Mac OS 10.8.2
    I've submitted a bug report, but want to know if anyone else has had this issue and what they did to resolve the issue.
    Also, the eyedropper tool is buggy and occasionally places the #000000 into an object instead of the characteristics the eyedropper is selecting.  I don't have any hidden layers or weird groupings, it just randomly decides when it is going to work or not.
    I've never had these issues on previous versions of illustrator and have been proficient in all versions since 2007.

    Double click the eyedropper, and turn on appearance, is off by default.
    For your #000000 color problem that also likely is related to appearance setting. You may have for example have some with #000000 at the character level, and another color at the type level.

Maybe you are looking for

  • SQL Server Oracle If else differences

    I have a query in SQL Server 2008 that uses an if statement to determine how the SQL is returned. It is fairly complex but here it is in its basic form. declare @granularity varchar(20); begin set @granularity = 'Month'; if (@granularity = 'Month') b

  • PL/SQL Procedure does not return at end of routine

    Hi All, I am in the midst of migrating data for a client. To migrate the data I have written a PL/SQL Block which based on the logic has several loops in the same. As I got the new application DB design I introduced more code to capture the data for

  • TREX - Search Talent Management

    Hi All, I know that there are many threads on the TREX and have looked at all of them and tried some of the things but i still get the error search not available. We have created all search connector in the admin cockpit and have indexed all of them

  • Open Link In New Tab In Safari

    From a PC World article, http://www.pcworld.com/article/166903/ , "Safari now uses tabbed browsing, like big boys do on the desktops, and this new hidden feature is great. If you tap and hold on a hyperlink (hyperlinked text) on a Web site within Saf

  • Can anyone post an overview of the permissions of the server folder

    I saved the server data on an external drive. I accidently cut off the power source. All services had failures since then. So I thought I could repair it if I would just restore the whole system from the TM Backup from a time before the cut off. All