Upon editing the budget the system is calculating wrong rates

Hi all..
Upon editing the budget the system is calculating wrong rates, for instance i had to modify the budget for a perticular project for reduction in working months for our co -investigators.
Many thanx..

Hi
What budget method are you using? are you editing budget on forms or on the HTML self service page?
If you are using Forms, the cost amount could be entered in addition to entering the hours. For calculating the cost amount based on quantity entered, there is a need to develop the budget client extension. In such case you have to check the logic of that client extension.
If you are using the HTML pages, when you generate budget costs, the system would use the rate schedule you have setup as planning rates. Verify the values on that schedule.
Dina

Similar Messages

  • Budget and budget control system

    what is the differnce between budget and budget control system. is it possible in sap each po (purchase order) wise budget.if its possible in sap please provide config steps.

    Hi, guy
    In SAP, we can use IO, PS, FM to make the budget. The budget control system is a sub-module of FM. If you want to get some config step, please kindly refer SAP Best Practises.

  • Forecast calculated wrongly

    Hello Team,
    The problem is that movement types 631/632 (deliveries to customer consignment stock) were not taken into consideration.
    I added them manually, but the figures in MC94 after this transaction is not relevant to MB51. And that is the reason that forecast was calculated wrongly.
    Could you please help me in this. Help will be appriciated.

    It may be you aquire the assets in Mid year and calculating the depreciation from that month,but system is  posting total depreciation in that particular month by taking in to account all the previous month depreciation
    Have check the depreciation by changing the depreciation start date to start of your Asset accounting year
    Thanks
    Ansuman
    Edited by: Ansuman mohanty on Mar 31, 2008 1:10 PM

  • How the availability of a system is calculated?

    Hello all,
    Could you please let me know how the availability of a system is calculted? I have generated the EWA report for one of my production system and the report says that my systems availability is 40%. But my system wasn't down for the whole week. Could you please help me to understand how this calcuatiion is done? Any document existing for this?
    Thanks and Regards,
    Rajeev

    Hello Rajeev,
    Are you using CCMSPING for accurate for accurate reporting of        
    System Availability?                                                 
    The "Avg. availibility per week" (as an example of how early watch    
    checks the system availability) is derived from the logs of the SAP   
    Performance Collector (report RSCOLL00).
    If the logs are available for the whole day, it is assumed also that the system
    (with at least one application instance) was available for the whole day.
    So it may be that if the log were not available at some point in time or the sapcol didn't run on  
    occassion, despite the system being up 100% of the time, the avail-   
    ability will not report as >99%. And this will not generate an error. 
    The ST03 Collectors tries to aggregate certain checks on the server   
    and instance, and really isn't measuring system availability.         
    This is why SAP's recommendation is to use CCMSPING for accurate         
    reporting of system avaiolability. If you are not using CCMSPING,        
    please reference SAP note 1332677.
    Regards,
    Paul

  • KP06 Cost Center Budget Planning System error when locking the data records

    Hi,
    While updating Cost Center Planning system(KP06) its giving the below error:
    System error when locking the data records.
    Message no. KI502
    Diagnosis
    The lock to protect the data records being processed could not be set. The
    probable reason for this is that the SAP locking table is full and no more
    entries can be added.
    Procedure
    Inform your system administrator immediately
    No planning data has been changed
    Message no. K8038
    Diagnosis
    You used Post. While preparing the data for posting, the SAP System
    determined that no changes were made in the available databank values.
    System Response
    A posting activity price is not necessary
    Please help me how can we rectify the above error..
    Thanks
    VS Rao

    Hi,
    check the locking entries (t-code SM12).
    http://help.sap.com/saphelp_erp2004/helpdata/en/37/a2e3ae344411d3acb00000e83539c3/frameset.htm
    Best regards, Christian

  • How deploy the EJB in security on the Sun Java System Application Server 9?

    I hava deploied a simple Hello EJB Object on PE 9(Sun Java System Application Server Platform Edition 9). I can use this EJB object without user name an password On any client. See the following code section:
         public static void main(String[] args) {
              try{
                   Properties props = System.getProperties();
                   props.put(Context.INITIAL_CONTEXT_FACTORY,"com.sun.enterprise.naming.SerialInitContextFactory");
                   props.put(Context.PROVIDER_URL,"iiop://localhost:3700");
                   Context ctx = new InitialContext(props);
                   Hello h = (Hello) ctx.lookup("ejb/test/Hello");
                   System.out.println(h.sayHello());
              }catch(Exception e){
                   e.printStackTrace();
    Please tell me how deploy the EJB in security on the Sun Java System Application Server 9? So that, The client must set the user name and password when lookup the ejb object. Like the following:
    props.put(Context.SECURITY_PRINCIPAL,"admin")
    props.put(Context.SECURITY_CREDENTIALS,"1234");

    Guys,
    I too have the same issue. If anyone has an answer, please let me know.
    Is this GlassFish problem? or Prgram issue?
    Find below the source code
    package TransactionSecurity.bean;
    import javax.annotation.Resource;
    import javax.annotation.security.DeclareRoles;
    import javax.annotation.security.PermitAll;
    import javax.annotation.security.RolesAllowed;
    import javax.ejb.Remote;
    import javax.ejb.SessionContext;
    import javax.ejb.Stateless;
    import javax.ejb.TransactionAttribute;
    import javax.ejb.TransactionAttributeType;
    @Stateless
    @Remote(TSCalculator.class)
    @DeclareRoles({"student", "teacher"})
    public class TSCalculatorBean implements TSCalculator {
         private @Resource SessionContext ctx;
         @PermitAll
    //     @TransactionAttribute(TransactionAttributeType.REQUIRES_NEW)
         public int add(int x, int y) {
              System.out.println("CalculatorBean.add  Caller Principal:" + ctx.getCallerPrincipal().getName());
              return x + y;
         @RolesAllowed( { "student" })
         public int subtract(int x, int y) {
              System.out.println("CalculatorBean.subtract  Caller Principal:" + ctx.getCallerPrincipal().getName());
              System.out.println("CalculatorBean.subtract  isCallerInRole:" + ctx.isCallerInRole("student"));
              return x - y;
         @RolesAllowed( { "teacher" })
         public int divide(int x, int y) {
              System.out.println("CalculatorBean.divide  Caller Principal:" + ctx.getCallerPrincipal().getName());
              System.out.println("CalculatorBean.divide  isCallerInRole:" + ctx.isCallerInRole("teacher"));
              return x / y;
    package TransactionSecurity.bean;
    import javax.ejb.Remote;
    @Remote
    public interface TSCalculator {
            public int add(int x, int y);
            public int subtract(int x, int y);
            public int divide(int x, int y);
    package TransactionSecurity.client;
    import java.util.Properties;
    import javax.ejb.EJBAccessException;
    import javax.naming.Context;
    import javax.naming.InitialContext;
    import TransactionSecurity.bean.TSCalculator;
    public class TSCalculatorClient {
         public static void main(String[] args) throws Exception {
              // Establish the proxy with an incorrect security identity
              Properties env = new Properties();
              env.setProperty(Context.SECURITY_PRINCIPAL, "kabir");
              env.setProperty(Context.SECURITY_CREDENTIALS, "validpassword");
            env.setProperty(Context.INITIAL_CONTEXT_FACTORY,"com.sun.appserv.naming.S1ASCtxFactory");
            env.setProperty(Context.PROVIDER_URL,"iiop://127.0.0.1:3700");
            env.setProperty("java.naming.factory.initial","com.sun.enterprise.naming.SerialInitContextFactory");
            env.setProperty("java.naming.factory.url.pkgs","com.sun.enterprise.naming");
            env.setProperty("java.naming.factory.state","com.sun.corba.ee.impl.presentation.rmi.JNDIStateFactoryImpl");
            env.setProperty("org.omg.CORBA.ORBInitialHost", "127.0.0.1");
            env.setProperty("org.omg.CORBA.ORBInitialPort", "3700");
              InitialContext ctx = new InitialContext(env);
              TSCalculator calculator = null;
              try {
                   calculator = (TSCalculator) ctx.lookup(TSCalculator.class.getName());
              } catch (Exception e) {
                   System.out.println ("Error in Lookup");
                   e.printStackTrace();
                   System.exit(1);
              System.out.println("Kabir is a student.");
              System.out.println("Kabir types in the wrong password");
              try {
                   System.out.println("1 + 1 = " + calculator.add(1, 1));
              } catch (EJBAccessException ex) {
                   System.out.println("Saw expected SecurityException: "
                             + ex.getMessage());
              System.out.println("Kabir types in correct password.");
              System.out.println("Kabir does unchecked addition.");
              // Re-establish the proxy with the correct security identity
              env.setProperty(Context.SECURITY_CREDENTIALS, "validpassword");
              ctx = new InitialContext(env);
              calculator = (TSCalculator) ctx.lookup(TSCalculator.class.getName());
              System.out.println("1 + 1 = " + calculator.add(1, 1));
              System.out.println("Kabir is not a teacher so he cannot do division");
              try {
                   calculator.divide(16, 4);
              } catch (javax.ejb.EJBAccessException ex) {
                   System.out.println(ex.getMessage());
              System.out.println("Students are allowed to do subtraction");
              System.out.println("1 - 1 = " + calculator.subtract(1, 1));
    }The user kabir is created in the server and this user belongs to the group student.
    Also, I have enabled the "Default Principal To Role Mapping"
    BTW, I'm able to run other EJB3 examples [that does'nt involve any
    security features] without any problems.
    Below is the ERROR
    Error in Lookupjavax.naming.NamingException: ejb ref resolution error for remote business interfaceTransactionSecurity.bean.TSCalculator [Root exception is java.rmi.AccessException: CORBA NO_PERMISSION 0 No; nested exception is:
         org.omg.CORBA.NO_PERMISSION: ----------BEGIN server-side stack trace----------
    org.omg.CORBA.NO_PERMISSION:   vmcid: 0x0  minor code: 0  completed: No
         at com.sun.enterprise.iiop.security.SecServerRequestInterceptor.handle_null_service_context(SecServerRequestInterceptor.java:407)
         at com.sun.enterprise.iiop.security.SecServerRequestInterceptor.receive_request(SecServerRequestInterceptor.java:429)
         at com.sun.corba.ee.impl.interceptors.InterceptorInvoker.invokeServerInterceptorIntermediatePoint(InterceptorInvoker.java:627)
         at com.sun.corba.ee.impl.interceptors.PIHandlerImpl.invokeServerPIIntermediatePoint(PIHandlerImpl.java:530)
         at com.sun.corba.ee.impl.protocol.CorbaServerRequestDispatcherImpl.getServantWithPI(CorbaServerRequestDispatcherImpl.java:406)
         at com.sun.corba.ee.impl.protocol.CorbaServerRequestDispatcherImpl.dispatch(CorbaServerRequestDispatcherImpl.java:224)
         at com.sun.corba.ee.impl.protocol.CorbaMessageMediatorImpl.handleRequestRequest(CorbaMessageMediatorImpl.java:1846)
         at com.sun.corba.ee.impl.protocol.CorbaMessageMediatorImpl.handleRequest(CorbaMessageMediatorImpl.java:1706)
         at com.sun.corba.ee.impl.protocol.CorbaMessageMediatorImpl.handleInput(CorbaMessageMediatorImpl.java:1088)
         at com.sun.corba.ee.impl.protocol.giopmsgheaders.RequestMessage_1_2.callback(RequestMessage_1_2.java:223)
         at com.sun.corba.ee.impl.protocol.CorbaMessageMediatorImpl.handleRequest(CorbaMessageMediatorImpl.java:806)
         at com.sun.corba.ee.impl.protocol.CorbaMessageMediatorImpl.dispatch(CorbaMessageMediatorImpl.java:563)
         at com.sun.corba.ee.impl.protocol.CorbaMessageMediatorImpl.doWork(CorbaMessageMediatorImpl.java:2567)
         at com.sun.corba.ee.impl.orbutil.threadpool.ThreadPoolImpl$WorkerThread.run(ThreadPoolImpl.java:555)
    ----------END server-side stack trace----------  vmcid: 0x0  minor code: 0  completed: No]
         at com.sun.ejb.EJBUtils.lookupRemote30BusinessObject(EJBUtils.java:425)
         at com.sun.ejb.containers.RemoteBusinessObjectFactory.getObjectInstance(RemoteBusinessObjectFactory.java:74)
         at javax.naming.spi.NamingManager.getObjectInstance(NamingManager.java:304)
         at com.sun.enterprise.naming.SerialContext.lookup(SerialContext.java:403)
         at javax.naming.InitialContext.lookup(InitialContext.java:351)
         at TransactionSecurity.client.TSCalculatorClient.main(TSCalculatorClient.java:35)
    Caused by: java.rmi.AccessException: CORBA NO_PERMISSION 0 No; nested exception is:
         org.omg.CORBA.NO_PERMISSION: ----------BEGIN server-side stack trace----------
    org.omg.CORBA.NO_PERMISSION:   vmcid: 0x0  minor code: 0  completed: No
         at com.sun.enterprise.iiop.security.SecServerRequestInterceptor.handle_null_service_context(SecServerRequestInterceptor.java:407)
         at com.sun.enterprise.iiop.security.SecServerRequestInterceptor.receive_request(SecServerRequestInterceptor.java:429)
         at com.sun.corba.ee.impl.interceptors.InterceptorInvoker.invokeServerInterceptorIntermediatePoint(InterceptorInvoker.java:627)
         at com.sun.corba.ee.impl.interceptors.PIHandlerImpl.invokeServerPIIntermediatePoint(PIHandlerImpl.java:530)
         at com.sun.corba.ee.impl.protocol.CorbaServerRequestDispatcherImpl.getServantWithPI(CorbaServerRequestDispatcherImpl.java:406)
         at com.sun.corba.ee.impl.protocol.CorbaServerRequestDispatcherImpl.dispatch(CorbaServerRequestDispatcherImpl.java:224)
         at com.sun.corba.ee.impl.protocol.CorbaMessageMediatorImpl.handleRequestRequest(CorbaMessageMediatorImpl.java:1846)
         at com.sun.corba.ee.impl.protocol.CorbaMessageMediatorImpl.handleRequest(CorbaMessageMediatorImpl.java:1706)
         at com.sun.corba.ee.impl.protocol.CorbaMessageMediatorImpl.handleInput(CorbaMessageMediatorImpl.java:1088)
         at com.sun.corba.ee.impl.protocol.giopmsgheaders.RequestMessage_1_2.callback(RequestMessage_1_2.java:223)
         at com.sun.corba.ee.impl.protocol.CorbaMessageMediatorImpl.handleRequest(CorbaMessageMediatorImpl.java:806)
         at com.sun.corba.ee.impl.protocol.CorbaMessageMediatorImpl.dispatch(CorbaMessageMediatorImpl.java:563)
         at com.sun.corba.ee.impl.protocol.CorbaMessageMediatorImpl.doWork(CorbaMessageMediatorImpl.java:2567)
         at com.sun.corba.ee.impl.orbutil.threadpool.ThreadPoolImpl$WorkerThread.run(ThreadPoolImpl.java:555)
    ----------END server-side stack trace----------  vmcid: 0x0  minor code: 0  completed: No
         at com.sun.corba.ee.impl.javax.rmi.CORBA.Util.mapSystemException(Util.java:277)
         at com.sun.corba.ee.impl.presentation.rmi.StubInvocationHandlerImpl.privateInvoke(StubInvocationHandlerImpl.java:205)
         at com.sun.corba.ee.impl.presentation.rmi.StubInvocationHandlerImpl.invoke(StubInvocationHandlerImpl.java:152)
         at com.sun.corba.ee.impl.presentation.rmi.bcel.BCELStubBase.invoke(BCELStubBase.java:225)
         at com.sun.ejb.codegen._GenericEJBHome_Generated_DynamicStub.create(com/sun/ejb/codegen/_GenericEJBHome_Generated_DynamicStub.java)
         at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
         at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
         at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
         at java.lang.reflect.Method.invoke(Method.java:585)
         at com.sun.ejb.EJBUtils.lookupRemote30BusinessObject(EJBUtils.java:372)
         ... 5 more
    Caused by: org.omg.CORBA.NO_PERMISSION: ----------BEGIN server-side stack trace----------
    org.omg.CORBA.NO_PERMISSION:   vmcid: 0x0  minor code: 0  completed: No
         at com.sun.enterprise.iiop.security.SecServerRequestInterceptor.handle_null_service_context(SecServerRequestInterceptor.java:407)
         at com.sun.enterprise.iiop.security.SecServerRequestInterceptor.receive_request(SecServerRequestInterceptor.java:429)
         at com.sun.corba.ee.impl.interceptors.InterceptorInvoker.invokeServerInterceptorIntermediatePoint(InterceptorInvoker.java:627)
         at com.sun.corba.ee.impl.interceptors.PIHandlerImpl.invokeServerPIIntermediatePoint(PIHandlerImpl.java:530)
         at com.sun.corba.ee.impl.protocol.CorbaServerRequestDispatcherImpl.getServantWithPI(CorbaServerRequestDispatcherImpl.java:406)
         at com.sun.corba.ee.impl.protocol.CorbaServerRequestDispatcherImpl.dispatch(CorbaServerRequestDispatcherImpl.java:224)
         at com.sun.corba.ee.impl.protocol.CorbaMessageMediatorImpl.handleRequestRequest(CorbaMessageMediatorImpl.java:1846)
         at com.sun.corba.ee.impl.protocol.CorbaMessageMediatorImpl.handleRequest(CorbaMessageMediatorImpl.java:1706)
         at com.sun.corba.ee.impl.protocol.CorbaMessageMediatorImpl.handleInput(CorbaMessageMediatorImpl.java:1088)
         at com.sun.corba.ee.impl.protocol.giopmsgheaders.RequestMessage_1_2.callback(RequestMessage_1_2.java:223)
         at com.sun.corba.ee.impl.protocol.CorbaMessageMediatorImpl.handleRequest(CorbaMessageMediatorImpl.java:806)
         at com.sun.corba.ee.impl.protocol.CorbaMessageMediatorImpl.dispatch(CorbaMessageMediatorImpl.java:563)
         at com.sun.corba.ee.impl.protocol.CorbaMessageMediatorImpl.doWork(CorbaMessageMediatorImpl.java:2567)
         at com.sun.corba.ee.impl.orbutil.threadpool.ThreadPoolImpl$WorkerThread.run(ThreadPoolImpl.java:555)
    ----------END server-side stack trace----------  vmcid: 0x0  minor code: 0  completed: No
         at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
         at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
         at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
         at java.lang.reflect.Constructor.newInstance(Constructor.java:494)
         at com.sun.corba.ee.impl.protocol.giopmsgheaders.MessageBase.getSystemException(MessageBase.java:913)
         at com.sun.corba.ee.impl.protocol.giopmsgheaders.ReplyMessage_1_2.getSystemException(ReplyMessage_1_2.java:131)
         at com.sun.corba.ee.impl.protocol.CorbaMessageMediatorImpl.getSystemExceptionReply(CorbaMessageMediatorImpl.java:685)
         at com.sun.corba.ee.impl.protocol.CorbaClientRequestDispatcherImpl.processResponse(CorbaClientRequestDispatcherImpl.java:472)
         at com.sun.corba.ee.impl.protocol.CorbaClientRequestDispatcherImpl.marshalingComplete(CorbaClientRequestDispatcherImpl.java:363)
         at com.sun.corba.ee.impl.protocol.CorbaClientDelegateImpl.invoke(CorbaClientDelegateImpl.java:219)
         at com.sun.corba.ee.impl.presentation.rmi.StubInvocationHandlerImpl.privateInvoke(StubInvocationHandlerImpl.java:192)
         ... 13 moreAny help is appreciated.
    Regards!
    Nithi.
    Edited by: EJB3 on Aug 17, 2008 8:17 PM

  • Btrfs May Be The Default File-System For Fedora 16

    Having a somewhat odd interest in different types of filesystems, I'd thought I'd share this snippet I wondered across.
    Brought up on the Fedora development list are the plans for Btrfs in Fedora, which provides a target of Fedora 16 when EXT4 will be replaced by Btrfs as the default Linux file-system on new installations.
    Fedora was one of the first distributions to deploy support for installing the Linux distribution to a Btrfs root file-system, while the Moblin/MeeGo camp has already turned to it as the default file-system, and now Fedora may finally have everything ready and are comfortable with the state of this Oracle-sponsored file-system.
    With the intended Fedora deployment of Btrfs, they will also switch from using LVM as the disk's volume manager to instead relying upon the volume management abilities built into Fedora itself. Fedora / Red Hat developers have previously already worked on taking advantage of other Btrfs features, like snapshots, to provide system roll-back support by creating a copy-on-write snapshot prior to each yum/RPM package transaction.
    In order to meet the Fedora 16 Btrfs target, Btrfs support needs to be merged into Fedora's GRUB package (or a separate non-Btrfs /boot file-system must be used), Red Hat's Anaconda must be hooked in to properly utilize Btrfs and its volume management features, and the Fedora LiveCD must be re-worked a bit to handle Btrfs. Additionally, the fsck support for Btrfs must be completed. Oracle's Chris Mason is nearly (circa 90%) complete with this task.
    Before Fedora 16 arrives we still have Fedora 15 to worry about, which will continue to offer Btrfs as a file-system option while EXT4 remains the default.
    Canonical is also evaluating when to switch to the Btrfs file-system and we may see that move similarly happen for Ubuntu 11.10.
    This would seem to imply that fedora is giving btrfs the big thumbs up! They currently release twice a year, and  fedora 15 is (I believe) Due out this May, so it wouldnt be too wrong to surmise that come Christmas btrfs would be the standard install option. However, I have always thought of fedora as being a little bit of a testing bed for red hat enterprise, so reading between the lines, I am thinking they want to release btrfs to the wild, and get the bugs sqwished so it can be incorporated into red hat, which is a good thing all round, for all concerned.
    Quote blatantly ripped from phoronix.
    wikipedia btrfs
    kernel.org btrfs

    There are, as I understand it, three big issues keeping Btrfs from hitting its final "stable" release:
    1) No true fsck (as of November, a fix is due "any time now")
    2) The logic used for subvolumes (a sort of "virtual LVM" setup) in Btrfs is wholly different from that used in Ext*, JFS, NTFS, HFS, etc; because of this, there isn't yet a single script/program that will accurately display space consumption.  Instead, the user needs to run a couple different commands and extrapolate.  A little annoying, but it doesn't affect stability.
    3) A bug in the COW aspect of the defrag command which, if run with an incorrect flag, can cause a doubling in the amount of metadata on the filesystem (and thus the amount of space it consumes).  Again, it won't wreck anything, but would make management tedious if one needs to restore a snapshot to get rid of extra cruft.
    These are all mentioned in the FAQ's on the Btrfs wiki, though the wiki doesn't give priority to any of them.  I'm guessing that, if Fedora 16 will be using this later in the year, the Oracle folks have told the Red Hat folks that they're planning on plowing through these issues very soon.
    Last edited by ANOKNUSA (2011-03-01 14:55:46)

  • CJ88 - Balance the budget back after settlement

    I got out the following structure:
    WBSE
    --- WBSE1
    --- WBSE1-2 -> AUC Settlement to
    --- WBSE2
            | --- WBSE2-2 -> Settlement to WBSE1-2
    When the Execute CJ88 to liquidate the project, the following problem is occurring.
    The WBSE2-2 is the value to the liquidating WBSE1-2 and turn the whole WBSE1-2 net value for the AUC.
    Upon conclusion of the budget process that had been consumed in WBSE2-2 and released novamentepara be consumed.
    Therefore necessary that the amount realized on WBSE2-2 is settled in the AUC of WBSE1-2, more than the budget is consumed in dayValue WBSE2-2 instead of being available again.
    All are WBSE account assignment.
    Edited by: André Luis Pereira Santos on Mar 18, 2011 3:01 AM

    just I want to know what could be the reason for dfference for target cost debit and target cost credit in process order. As both are from standard cost estimation.
    in reality our header material cost is nothing but BOM components + operational cost which are used in standard cost estimattion.
    there by there should not be any difference.
    regs,
    ramesh

  • Incredibly slow rendering when editing raws from the new Nikon D800

    I would be happy to hear from users of the D800 and Apple's "Aperture" 3.2.3. My own experience is that the rendering of f.inst. a "burned" file/picture (Raw-file) is incredibly SLOW....what is your experience. Any knowledge of whether Apple will come forward with an upgrade of Aperture?

    mamster37 wrote:
    I am fully aware of all about the file size, and that one should expect a slow down in the rendering, but this is really a significant slow down, and unless Apple come up with a solution I am afraid that one is obliged to find other solutions for the editing of Nikon D800 raw files. My details are:
    MacBook Pro Intel
    OS: Mac OSX, 10.7.3 Lion
    Installed memory: 8GB
    You have not described which MBP CPU/GPU, drives SSD/HDD, how full any HDDs are. That is essential information.
    As all the photo sites have discussed, the D800 files are huge and will require more horsepower to handle. With a new D800 you are the experimenter here on the bleeding edge of technology, so all of us will learn from your observations.
    I would guess that only the strongest Sandy Bridge MBPs with 8-16 GB RAM will do well. I was doing fine with 8 GB RAM (zero page-outs) and then recently I did some very aggressive Photoshop/Aperture work and page outs skyrocketed: I need more RAM, and I don't have a D800 yet so my NEF files run only ~20 MB each. How large (MB) are your NEF files?
    You can evaluate whether or not you have adequate RAM by looking at the Page Outs number under System Memory on the Activity Monitor app before starting a typical work session; recheck after working and if the page outs change (manual calculation of ending page outs number minus starting page outs number) is not zero your workflow is RAM-starved. Ignore page ins, the pie charts and other info in Activity Monitor.
    If your test shows that page outs increase at all during operation it is affecting performance. You can
    • add RAM as feasible
    • restart with some frequency if you suspect memory leaks (common especially with less-than-top-quality applications)
    • and/or simply try to run only one app at a time, for sure diligently closing unneeded apps like browsers
    • and/or switch 64-bit operation to 32-bit operation (which will make some additional RAM space available). Note that your Mac may already default to 32-bit. See Switching Kernels:
    http://support.apple.com/kb/HT4287
    Note that RAM is cheap and heavy apps' usage of more RAM is a good thing. Photoshop for instance has been able to under OS X take advantage of up to at least 32 GB RAM for years.
    Thanks for sharing your experiences.
    -Allen
    EDIT: Note my focus on discussing RAM above is because that is all we know about your MBP. It does not mean that I necessarily suggest that RAM may be your primary issue.

  • How to assign the budget to maintenance order

    Dear PM Guru's,
    I like to know the how to assign the budget for a maintenance order. how we control the expenses from a maintenance order. suppose for a small work manangement assigns budget as 2lacs. now i like to restrict if any thing purchased once budget reached to 2lacs system should populates the error message to restrict the creation of Purchase orders / material requisitions and some other issues. Please suggest me how i can map in SAP? if any one have full documentatioin regard this please send through mail.
    thanks in advance to all of PM Guru's.
    regards
    Jalu

    Hi,
    There are different approaches for budget control in PM orders.
    1) Option1: In koab transaction maintain commitment managemen active and in budget profile (oioa) you must tick total values ,annual values,activation type should be 1-automatic activated when budget allocation done. Then distribute budget in PM order through KO22.
    2) Option2:You can also opt for Investment management approach but it is mainly done in case of capital work/projects/internal orders. In this approach you need to activate IM for orders(done by CO people). Investment programs are created and budget distributed through IM52. For details you may consult your FICO consulatnt.
    3) Option3: Fund Management approach enables you to monitor budget-relevant plant maintenance processes. enables you to monitor budget-relevant plant maintenance processes in FM.
    The link between the plant maintenance process and FM is established by entering an FM account assignment (commitment item, funds center, and fund) when you create a plant maintenance order.
    You have to enter the FM account assignment manually. If, however, you have maintained the assignments of FM account assignments to CO account assignments, the system determines the FM account assignment from the cost center of the technical object (functional location, equipment) which is assigned to the plant maintenance order.
    FM takes care of budget related processes from creation of maintenance order till settlement.
    Hope this helps you to decide an appropiate approach.
    Regards,
    S.Basu
    Edited by: S Basu on Nov 10, 2011 5:34 PM
    Edited by: S Basu on Nov 10, 2011 5:34 PM

  • Trace back the budget status of each PM posting

    Dear all,
    is there any way to trace back the budget status at the time of each PM order posting? By budget status, I mean the available budget for the WBS element to which these PM orders were assigned.
    Regards,
    Michael

    Michael,
    The output of program BPFCTRA0 gives a complete explanation how the  'active' assigned value is calculated. It shows a hierarchical list of all objects which belong to a budget carrier (if you expand the list) and an overview of all postings which are included in the calculation of the active assigned value.
    Budget carriers are highlighted in blue colour. This way, you can quickly recognize for which WBS elements an availability control does not take place.
    Postings highlighted in red colour do not contribute to the assigned value.                                   
    The assigned value from BPFCTRA0 should correspond with the CJ31 assigned value.                                                        
    The sum of the postings in a budget carrier (WBS element) should be equal to the WBS assigned value.                                                                       
    There is a 'hidden' OK-code which can be used in report BPFCTRA0 ('=SUM'). If you enter this ok-code in the result list of BPFCTRA0,  the system recalculates the assigned value and compares it with the result list. If there is an inconsistency, you will get a popup. These can be fixed with CJBN. If no popup is issued everything is consistent.   
    Once you are sure your assigned value is consistent, you can compare the postings with the contents in tables in RKACSHOW and further analyze which posting made the budget overrun.
    Note 196149 provides more info on the report.
    Rgds
    Martina

  • How do I install all my old programs and data from an old system folder after I have reinstalled the same OSX system after a crash?

    The system is OSX10.5.8 Leopard on a 2009 imac. A new system was installed from the installation disks and the original system saved to a folder.
    I need to use my Adobe programs, rescue my email, i-tunes and iphoto data.  The disk utility indicates that my Time Machine back-up disk is damaged and I don't want to take a risk of having Time Machine erase my hard drive and try to reinstall the exact system existing at the time of the crash.  There was over 650 gb of stored files that I was copying and removing from the drive at the time it crashed. The total size of the original system file is still about 650 Gb.
    I would prefer to go back in Time Machine and only rescue the programs as most of the files have been copied to external hard drives, but I can't access the back-up hard drive from the new version of the Time Machine.  Or by I don't want the Time Mchine to start copying the new operating system which would include all the data in the old system file. Time Machine was working fine at the time of the crash.

    No, the disk was backed up with time machine a few hours prior to the crash.  I was unable to open the computer when I tried to restart it- got a grey screen with the spinning disk- after a few minutes the screen would go black and would reboot continuously, but not load any images or programs. I started the computer from the 10.5.4 installation disks and checked both the time machine external hard drive and the Imac internal drive with the disk utilities. Both showed as damaged --the internal drive and permissions were repaired, but the external drive (time machine back-up)  was damaged and not repairable by disk utilities. I don't believe that the external drive for Time Machine was connected to the computer at the time of the crash as I was copying files to a different hard drive drive. And I was not having any problems with the TM back-up drive prior to the crash.
    I accessed the Imac internal disk by firewire (as a target disk) and copied as many data files as I had room for on my external hard drives available.  And I deleted quite a few files from the imac internal drive (mostly just jpegs, duplicate tifs, etc--nothing that was used by i-photos, i-tunes or the Mail program).
    Then I installed a new OSX10.5.4 system from the installation disk and the old system was moved to a folder on the hard drive.  I previousy had had the option to reinstall the complete system from Time Machine when I connected that drive and booted with the installation disks with the C key depressed.  But it didn't seem like a good option because I was unsure of the condition of that external disk and whether it would be able to reinstall my data correctly, once it had erased my internal hard drive. 
    I'm considering buying some new external hard drives and backing up the present system to time Machine (so I'll still have my old data in the old system folder).  And then I would try using the old Time Machine back-up to try to reinstall the sytem previous to the crash.  That back-up would reinstall about 700gb of data and operating software and programs which sounds like a lengthy back-up.  Since I have never used Time Machine to do a full reinstallation (I've only used it for individual files), I'm reluctant to do anything rash.
    I'm a professional designer (with a deadline) but I can still use my Illustrator and Photoshop by opening them from the old system folder and saving the files to an external drive.  So it's not neccessary to do anything hasty except to delete some of the excess art and document files that were causing the computer to run slowly and the  Adobe programs to crash when I tried to save my work. I have quite a few books on tape in the i-tumes folder which is probably talking up tons of space but I don't where the i-tunes files live.
    Thanks for any help. Peggy
    Message was edited by: peggy toole

  • How do I clone a fully operational system that relies on Windows 7 for the underlying operating system?

    I'm a retired IT professional desiring to assist a friend who owns a small business who recently experienced very malicious attacks on her computers from unknown parties operating anonymously on the Internet. Because
    of her lack of preparation for such events, her future ability to continue to conduct her business was seriously threatened. The incident revealed, to my friend, the need to be prepared to deal with spontaneously occurring problems that create suspicious conditions
    that arise with modern computer software before they can be analyzed in a sufficiently comprehensive manner to have an opinion regarding the appropriate course of action for obtaining a permanent remedy. In that, the ability to quickly react on the basis of
    only suspicion is the goal.
    I want to recommend an approach that involves maintaining an offline image of an operational system that is capable of running any of her computers. This image needs to include all of the software required to run
    her business. In that, it is not limited to the operating system. This single image could then be used to restore any computer to a known reliable state should the need arise. This technique will also insure that each computer has sufficiently similar capability
    to allow them to substitute for each other. Insofar as image restoration is itself an operation susceptible to causing unacceptable business delay I'm also recommending that each of the identical computers (i.e., from a hardware perspective) operate in a multi-boot
    environment where a virtually offline backup can be instantiated via a simple reboot (i.e., an operation that all users of the Windows operating systems turn to when strange behavior is first observed). My intention is to limit the cloned system (i.e., partition
    or C: drive) to the operational software. The business data along with storage for temporary data will be isolated on other partitions (i.e, mounted with other drive letters) accessible by each instance of the software eligible for multi-boot operation.
    This kind of operation is something that I know how to setup on older versions of the Windows operating system. However, Microsoft has now dropped support for all of those operating systems and my much more limited
    experience with the currently supported operating systems reveals that changes to the boot process will necessitate making changes to the specific preparations needed to build such an environment.
    Before recommending that my friend replace all of her computers with new ones, that includes paying for new operating system (i.e., Windows) licenses, I need some assurance that the new operating systems are as
    good as the old ones in this respect. These need to be relatively inexpensive desktop computers and we're only talking about a few of them. Let's say fewer than half a dozen. My friend is a sole proprietor and even though her business has become completely
    dependent on what was once called personal computers she must operate on a fairly tight budget. This especially includes the budget for technology.
    The articles I've been able to find on the Microsoft support websites seem to treat multi-boot as a situation where someone is running different versions of possibly difference operating systems whereas my need
    to produce a single image that will both run on multiple computers as well as multiple partitions on the same computer. I'd appreciate finding some technical advice that applies to building such a system using a supported version of Windows.

    I tried the image creation/restoration described by Jared.  I don't think it makes much sense to rely on an operational system to do such a restoration therefore I opted for method 3 which involves using a "System Repair Disk".  My first
    reaction is what a crude tool.  The image creation process had no trouble putting the image on a simple network share.  However, it appeared as though the restoration couldn't even connect with the device.  I then copied the files to a USB drive. 
    In this case the repair disk said it couldn't find the files even though they were there.  It offered no mechanism to even look and see what was there.  It appears as though it will only find the image if it is located in a folder by the certain
    name used on creation and it is in root directory.  Not very handy.
    As ugly as all that was when we finally come to the point of making the restore it looks like the only option is to restore the entire disk, which in my case would mean also restoring both the windows partition and the recovery partition.  This just
    isn't what I want to do.  It is also something I wouldn't even consider doing unless it was the only possible way to recover from a failed hard drive.
    In summary, unless I've completely failed to notice how it works that just isn't going to work.
    I hope there is something better than this.  What about WinPE and ImageX?
    Absent anything useful from Microsoft it will be necessary to try using other software.  Time to try Acronis!  I guess.

  • What is the deal with System Reset/Refresh in Windows 8.1?

    Either this is a serious defect with the Windows Store-provided update for Windows 8.1 or Microsoft has done this intentionally but doing an update to Windows 8.1 from the Windows Store-provided service nukes your ability to use System Reset/Refresh.
    It claims files are missing which means that the update erased the necessary reset files from the HDD but didn't replace them during the update with Windows 8.1 compatible equivalents.
    I had to do a System Reset on one of my computers and I ended up having to get a Windows 8.1 ISO from a less than reputable source just to get my hands around the necessary missing file and now I can't even activate it with my Windows 8 Pro upgrade
    key. None of this would have been a problem if I could just perform the System Reset in place on Windows 8.1 and reset it back to a neutral, clean Windows 8.1 installation.
    I've since managed to find a way to do the install the way I needed to but can someone please give me some clarity on this subject so I don't have to go through all this again (as I've got two other computers that run a Windows Store-updated Windows 8.1
    installation and at least one of them is probably due for its own System Refresh)? What can I do to refresh a valid Windows 8.1 installation if I need to?
    EDIT: Oh, and one more thing: one of those computers is an OEM-installed Windows 8 copy that was subsequently upgraded to 8.1 yet it too suffers from the "missing files" error when a System Refresh/Reset is requested. What
    am I supposed to do here if I want to do a System Refresh to this computer? Will the OEM key inside it activate if I go outside the operating system to install it anew?

    C:\Program Files (x86)\NeoSmart Technologies\EasyBCD\bin>net start sppsvc
    The Software Protection service is starting.
    The Software Protection service could not be started.
    A system error has occurred.
    System error 5 has occurred.
    Access is denied.
    This is the error from running net start sppsvc in an elevated command prompt.  Software Protection Service (sppsvc.exe) is getting an "access denied" error and code 0xC0000022.  Ok, let me break it down for you...  And this is with a fully
    legit VL key that works on several PC in our school that are
    First, you perform a System Refresh for what ever reason.  After the Refresh, within a few minutes get the Windows version watermark in the lower left corner of your desktop that shows the windows version and build.  Then after that
    you get another watermark above the first watermark that says you need to activate by going to **Change PC Settings***.  From there you are on the activation screen and its state with out doing anything...**Activation Error Description Not Found.** 
    When you click "Activate Now" nothing happens.  You briefly see "checking this key" and then nothing.
    This is where the above mentioned Software Protection service  is failing. <---  Needs to be fixed.
    Now at this point I cannot attempt to do an online activation because the sppsvc.exe is producing the 0xC0000022 error
    I cannot do a phone activation because there is no installation ID...all the boxes are blank...because the sppsvc.exe is producing the 0xC0000022 error.
    Oh, and I cannot re-type my product key because...you got it...because the sppsvc.exe is producing the 0xC0000022 error.....
    The Software Protection service runs when I activate my PCs that are getting a "Clean" installs, Just to test the theory I did a refresh install on the "clean" installed pc and **VOILA** SAME ERROR....
    Let me clarify that one of the PCs has a dual partition and a complete re-install of the OS will mean some extensive work fixing the bootloader as well.  I have 150 PCs to refresh and this is what happened on the first one, then the 2nd.  I am
    running these on a TechNet VL and have never had these issues in the last 3 years.
    Listen to these people. ALL are having the same issue.  There has to be a process to fix it.  As difficult as it may seem, some of us don't mind spending a few extra minutes running administrative tasks to fix this instead of re-installing. 
    That's the novice way to fix the issues and the most painstaking for those of us who work 12-to 14 hrs a day and don't have the time.  We need this fixed.  PLEASE PLEASE
    Pretty please.  Please take the time to take ownership of this issue and pioneer a real fix for the hundreds maybe thousands that are having or have had (broke down and did a "clean" install) this EXACT issue.  Thank you so much for your help!!!!!

  • Cannot find the Recv Logical system in Distribution Model

    HI experts,
    Im triying a Idoc to file scenario, the logical system for PI and R3 has been already created and assinged for the appropriate clients.
    and i ve created the port from r3 using tcode we21 and in PI using idx1 and Idx2. The RFC destination also created for PI and R3 system.. when i created the distribution model using BD64 in R2. when i assigning message type i can give the source logical system and i cant find the Receiver logical system...  Also in WE19 i cant find the receiver port (which i created in IDX1 and IDX2)..
    Could u tell me how to solve this prob???
    Regards
    Balaji

    Hii Ravi,
    Thanks for your reply,
    Yes i have created the port (RFC800) idx1 and give RFC destination which points the R3 system.
    I have assigned the meta data to that port using tcode idx2.
    And I have created port with port name "PORT800"  in R3 using we21 and give the RFC destination which points the PI system
    when im using the WE19... i gave source logical system as R3 Logical system and receiver logical system as PI Logical system.
    now im getting error like  "PORT RFC800 DOESNT EXIT IN THE THE TABLE OF PORT DISCRIPTIONS".
    Regards,
    Balaji
    Edited by: Balaji Pichaimuthu on Jul 25, 2009 9:32 AM
    Edited by: Balaji Pichaimuthu on Jul 25, 2009 9:32 AM

Maybe you are looking for