What are adhoc agents

what are ad hoc agents

Hii Kittu,
You can define an ad hoc agent assignment for a workflow. This enables the user who starts the workflow to assign a recipient to all relevant steps at the start of execution. This user can also change the assignment of recipients for steps that have not yet been completed at any time during execution of the workflow.
For assigning ad-hoc agent,first of all delete the responsible agents(if any) in the respective step(to whom u r gonna assign ad-hoc agent) definition.
Path is Choose Extras --> Ad hoc functions ---> Enable ad hoc agent assignment
The system adds container elements required for the ad hoc agent assignment to the workflow container. An expression is assigned automatically to the input fields for the responsible agents of a step as well.
If you want to deactivate ad hoc agent assignment for particular steps, replace the expression for the responsible agents with an entry.
For more details, you can check sap.help.com and search for ad-hoc agents and get more documentation.
Also u can check these links....
http://help.sap.com/saphelp_erp2005/helpdata/en/13/57a038d14a2571e10000009b38f8cf/frameset.htm
http://help.sap.com/saphelp_erp2005/helpdata/en/f4/9f9138d380f50fe10000009b38f8cf/frameset.htm
Hope it helps you......
<b>"Dont forget to reward points if helpful"</b>
Regards,
Ashish
Message was edited by:
        Ashish Ranjan

Similar Messages

  • What are Adhoc reports

    Hi all,
    What are Adhoc reports in HR?
    Best Regards
    Akshay
    Moderator Message: Interview questions are not allowed.
    Edited by: kishan P on Nov 10, 2010 7:05 PM

    Hi,
    It may be difficult to provide a list of business scenarios across an enterprise where adhoc reports are used. However, In generic terms, adhoc reporting is used when your business users are not just information consumers, but are more of analysts having special reporting needs which are non-generic in nature, that BI teams can not provide pre-configured reports. (Typical scenarios where you have a global BW system and you want to let the local users create their local adhoc reports)
    This, of course means, business users should have the requisite know-how to create reports and should be equipped with all relevant info( like authorizaions, rules for information dissemination etc.).
    I always preferred creating queries at the most generic level and let the users create query views (instead of letting business users create adhoc reports).
    Hope this helps.

  • Adhoc Agent

    hI,
    Could any one explain me of what is Adhoc-Agent and the role and when we use it in workflow, if possible with examples.
    <removed_by_moderator>
    Read the Rules of Engagemet
    Thanks.
    Venkat.
    Edited by: Juan Reyes on Nov 18, 2008 9:09 PM

    Hi Venkat,
                      Ad Hoc agent is at run time of the workflow you can choose a agent for the task. For this use the Ag Hock agent wizard and assign say 5 agents so when you execute the workflow the previous agent before the adhoc step has the previlage to choose any one among the five at runtime.
    Please go through this blog to understand better
    https://www.sdn.sap.com/irj/sdn/go/portal/prtroot/docs/library/uuid/5023ddbd-de8d-2a10-d7a2-c9910d1ed6ad
    Regards,
    Dheepak

  • What are the steps needed to make the field in the DFF Additional Information for Agent only take numbers, commas & hyphens?

    Hello All,
    What are the steps needed to make the field in the DFF Additional Information for Agent only take numbers, commas & hyphens?
    Navigation
    Bob Sales manager<Ebiz form<service request tab<SR type<DFF<additional information for agents <cheque number
    The field Cheque number Character allowed (, -) in the DFF Additional Information for Agent should only take numbers
    Thanks & Regards
    Ayesha

    Thanks Sridar
    If we use Number we cannot separate the cheque numbers with , or -
    We need to enter numbers along with comma and '_' in cheque number field.
    Thanks & Regards
    Ayesha

  • What SQL Server Agent jobs are currently running and for how long

    Is there a way to tell what SQL Server Agent jobs are currently running and for how long?  View history isn't working in my case because it's only showing completed jobs.  John Schroeder

     You can use the "Job Activity Monitor" for doing this.  Do the following steps. It will open up the Job Activity Monitor.
    1.    In Object Explorer, connect to an instance of the SQL Server Database Engine, and then expand that instance.
    2.    Expand SQL Server Agent.
    3.    Right-click Job Activity Monitor and click View Job Activity.
    4.    In the Job Activity Monitor, you can view details about each job that is defined for this server.
    In Job Activity Monitor page, we have column called Status. It will indicate whether job is executing or idle. Last Run column will give you the last invocation time of this job.
    Use the following link for further reference.
    http://msdn.microsoft.com/en-us/library/ms187449.aspx
    Thanks,
    Sateesh.
    Mark Post as helpful if it provides any help.Otherwise,leave it as it is.

  • What are the blob files on the agents?

    Question:
    In /opt/local/aduva/director_agent/blobs/
    There are multiple files with the suffix .blob
    What are they?
    Answer
    The blob files are the actual software packages downloaded by the UCE server from the Universal Software Component Repository. This occurs once you have approved the installation of a component and are not downloaded again if they are present in the appropriate directory.
    This may be Solaris patches or RPM files depending on the managed channel of that host.

    To see what the file is type on the command line
    file xxxxx.blob where xxxx is the name of the blob. the file command will return the name of the rpm or that the file is a script.

  • In import PO - what are the g/l accounts updated.

    hi
    in import PO what are the g/l accounts updated.
    example:
    1.Miro(bill of entry) - 7 conditions if freight and clearing n forwarding
       Charges extra 2 conditions
    2.Migo
    3.Excise - J1iex_p
    4.Miro(for freight and clearing n forwarding)
    5.Miro(for main vendor)
    just tell me
    Regards
    Manju

    Hi,
    There are following 7 Import Duties;
    JCDB     IN:Basic Custom Duty
    JCV1     IN : CVD
    JECV     IN : Ed Cess on CVD
    J1CV     IN : H&SECess on CVD
    JEDB     IN : Ed Cess on BCD
    JSDB     IN : H&SECess on BCD
    JADC     Addnl Duty of Custom
    1. MIRO (Customs Office)
    Customs Office Vendor - Cr
    CVD Clearing A/c - Dr
    CVD Clearing A/c - Dr
    CVD Clearing A/c - Dr
    CVD Clearing A/c - Dr
    Customs Clearing A/c - Dr
    Customs Clearing A/c - Dr
    Customs Clearing A/c - Dr
    2. J1IEX (Capture BOE)
    No FI Entry
    3. MIGO (GR)
    Stock A/c - Dr
    GR/IR Clearing A/c - Cr
    Customs Clearing A/c - Cr
    Clearing & Forwarding Charges A/c - Cr
    4. J1IEX (Post BOE)
    CENVAT Input BED - Dr
    CENVAT Input ECS - Dr
    CENVAT Input SECess - Dr
    CENVAT Input ADC - Dr
    CVD Clearing A/c - Cr
    5. MIRO (Import Vendor)
    Import Vendor - Cr
    GR/IR Clearing A/c - Dr
    6. MIRO (Clearing Agent)
    Clearing Agent Vendor - Cr
    Clearing & Forwarding Charges A/c - Dr

  • What are the major scenarios to customize DAF pipeline ?

    Hi,
    In which purpose DAF pipeline need to be customized.
    Please tell me what are scenarios to customize the DAF pipeline.
    Thanks In Advance.

    Some of the probable scenarios where we might want to customize the DAF pipeline: autologin based on a custom logic; implementing SSO; to set some request attributes based on request URI and/or parameters which can be used by the subsequent servlets/filters or other components; detect device type based on user-agent and other parameters/attributes; trigger a custom event on some action like page view etc.

  • What are the announcements for renting VPS?

    What are the announcements for renting VPS? For details, understand VPS and make the choice of rental; for Taiwan VPS and Hong Kong VPS, without records, unlimited contents, wider range, and more efficient experience. Your server will show its excellence with the advantages.
    Most station agents become less inclined to virtual hosting, for national space, domain name records are needed, which waste the time; for overseas hosting such as Korea hosting, US hosting, no records, but slower speed than national space; therefore, more and more station agents prefer servers, but because the price of servers are too high, they turn their focus on VPS.
    The following are the announcements:
    1.Open remote desktop lander:
    Start-run-mstsc or start-procedure-nearby-remote desktop connect
    2.Several conditions for account halt:
    First, client side login cause account halt
    Second, certain account quits the remote control in midway when it runs routine
    Third, certain routine is restricted by synchronous operation of system administrator.
    3. Not install the third party firewall
    If you need firewall, please use windows firewall, the third party firewall in VPS will cause system collapse and data loss, the system automatically obtains the newest windows patches and install itself, which do not require human operation. Installing system patches in VPS sometimes will heavily lead to VPS collapse and data loss.
    Do not modify remote desktop port.
    Because of the specialty of VPS system, default remote desktop port is 3389, do not modify randomly, or the remote connection will be out of work.
    4. Except some special conditions that user registration is needed for certain procedure, when the remote connection has been close down, do not forget logout user to save memory resource, and prevent the loading connection next time, if it happens, reboot VPS.
    5. VPS has been set with relative security when it was paid, with high security. It suggests that do not open firewall randomly, if you open it by your own, the following ports should be opened: 21(FTP), 3389(remote connection), 80(website http), 3306(MySQL), 1433(SQL Server). Timely check whether there is suspicious account or system log, download 360 safety guard to avoid these files and process.
    6. Try not to modify registry hand-actuated, ensure the reboot of VPS. Modify remote ports please add the modified port in firewall first, and then reboot.
    7.Modify IIS installation files, backup these files, and then modify them with the software that can keep the file layout, prevent these files from destroying IIS.
    8.Website service of VPS and FTP service of IIS are default to open hand-actuated, set Web Publishing Service as automatically if you are station agent. If you often use FTP service of IIS, please set FTP Publishing Service as automatically, i.e. reboot it automatically. If you use serv-u, tick all the system service terms. In the terms of security and resource consumption , it suggests that those users who seldom use FTP do not set it as automatically.

    Hi there
    "So for ALL the apps, the annual monthly fee is £46.88, but you can rent occasionally for £70.32 pm.... ?" Correct
    £17.58 single app plan requires an annual commit - it's £27.34 for the month-to-month plan without annual commit.
    Thanks
    Bev

  • Internet explorer is required to access some of my financial accounts; what are the risks?  I am running Mac OS X 10.7.2 on a Mac Pro

    Internet explorer is required to access some of my financial accounts; what are the risks?  I am running Mac OS X 10.7.2 on a Mac Pro
    Message was edited by: 74683msn

    Advisable is irrelevant...  It is not possible.  There has not been a version of IE for Mac for a long time.  You will have to load Windows on your Mac in order to run IE, or try making your browser mimic IE.  (In Safari, go to Safari -> Preferences, click the Advanced tab and check the box to show the Develop menu.  Then, in that menu, choose User Agent -> Internet Explorer x.0.)  Note that doing that will not work if the site relies on some weird non-standard feature of IE that no other browser on the planet has.

  • What are  the roles & responsibilities  of GRC/SECURTIY CONSULTANT IN IMPLE

    HELLO EXPERTS,
                                  CAN U PLS TELL WHAT ARE THE ROLES & RESPONSIBILITIES OF GRC/SECURITY CONSULTANT IN IMPLEMENTATION OF GRC TOOL.
    REGARDS,
    SANJAY

    Hi Sanjay,
    The role of GRC & Securtiy Consultant is basicly the implementation of GRC Application in Customor envoriment. In most of cases he gives technical support for installation and configuration. What we are really do is following..
    1. Preperation of System Landscape Concept --> Provide Hardware and Software spesifications to customer
    2. Installation of Software Components --> This contains the installation of NW and GRC Components and also the installation of SAP Backend Components like Real Time Agents and the post-Installation configurations
    3. Post-Installation and Basic Configuration --> Create Connectors and additional basic configurations
    4. Hosting of Workshops for Risk Creation and Ruleset customizing
    5. Implementation of Custom defined Rules in the Application
    6. Test of Applications
    7. Hostin of Workshops for Approval Methodology and Workflow Use Cases
    8. Hostin of Workshops for Superuser Role Usage and Management of Superuser
    9. Role Change and Creation Workshops in GRC ERM.
    10 Documentation and Deliver of Custom Concepts for Compliant User & Role Administration
    11. Handling of Error and Trobles.
    this are my daily business...
    Best Regards.

  • How to identify what are all the errors appears in process chain,

    Hi all,
    i have a process chain running, but i want to find out what are all the errors that the process chain has thrown
    thanks
    pooja

    Hi Pooja,
    Errors in monitoring:
    SID error
    Reason: If the corresponding master data is missing for the particular transaction data.
             1. Check for the load timing for the respective master data, if it less than an hour  then make the request red and repeat the ip.
             2. If the data is loaded to PSA then you have to delete the request from target and manually push the data to from PSA.
             3. If we are required for selective update then note down the info source from header and find it in RSA1,select the one with ‘Single as postfix’.
             4. Goto ‘data selection’ tab and change the range.
    Tip: change the last 4 digits for from to ‘0000’and the last 4 digit for to     ‘9999’.
            5. Repeat the ip.
             6. In case only of failure in one target goto RSA1 find the PSA, put he request no. and reschedule it.
    Note: IF PSA is present never make the request red rather delete it.
    Replication error
    Reason: Data source replication Failed.
             1. In order to handle this error you should be known to IP, info source and source system.
             2. Goto RSA1, find the data source in the source sys tab.
             3. Right click on the data source and replicate it.
             4. Since all the transformation rules pertaining to this data source need to be reactivated so go to SE38 and execute rs_transtru_activat_all, data source and sys name.
             5. Delete the ‘red’ request from the target.
    Update R not supported
    Reason: The corresponding initialization flag for the ip is lost.
             1. Goto header click on the ip and goto schedule tab and click initialize in the source system, whatever screen appears delete the only request present(the initialization flag).
             2. Goto RSA1, find the ip in the info source (one with the Adhoc initialize flag).
             3. Goto update tab and select ‘Initialize delta process’ try going for ‘with data transfer’.
             4. Reschedule the IP.
    Duplicate Record Error
    Reason: Duplicate error records for the loaded master data.
             1. Goto info package via header or via RSA1.
             2. Goto ‘processing tab’ and change the ip setting, selecting only PSA and ignore duplicate records and re run the ip.
             3. Do remember to change the ip settings back to the original once after the second step.
    ODS activation failure
    Reason: Prerequisites for ODs activation not satisfied i.e. unique key.
             1. Goto ‘maintain variant’.
             2. Check for the ‘QM’ status of the requests in the target they should be green.
             3. Then click the ODS activation tab.
             4. In the screen which appears put the requests for which ODS activation failed.
             5. Activate these and keep on refreshing them until status reverts from green,
    Remember to refresh these requests one at a time.
             6. If requests are red then delete them from target.
             7. Reschedule the IP.
    Note: Never Try activating ODS manually if it is Y1.
    Aggregate Rollup error
    Reason: No aggregate found for the respective rollup.
             1. Click on the variant in which the error occurred.
             2. Goto chain tab and copy the variant and instance.
             3. Run the nestle provided program YBW05.
             4. Put in info in there and put the status as g – ‘green’.
             5. Execute and refresh the status.
    Lock issue
    Reason: The same ip is been locked by other user or may be used by other process chain.
             1. We can see the locked entries and in the transaction SM12.
             2. Wait for the other process to get complete once the ip loads to target in that process then there is no need for running it for the process.
             3. In other case make the request red, when PSA is present then goto environment tab ->schedule->initiate update.
             4. In the box appears select update in the background.
             5. And the manually update the failed IP’s by selecting manual update in the context menu.
    Alfa confirming value error, Time conversion error, Chain didn’t start, Delay due to long running job, Poor system performance,Heirarchy node exist in duplicate.
    Reasons:
      Alfa confirming error: Data format mismatch.
      Time conversion error: Date, time format mismatch.
      Chain didn’t start: A scheduled chain didn’t triggered at the prescribed timing.
    -For all the above error we have to raise a ticket.
    Idoc or TRFC error
    Reason: An Idoc is been stuck somewhere.
             1. Reload the Master Data manually again from Info-package at RSA1.
             2. Release the Idoc.
             3. In the source system level got environment->transaction->Transaction RFC or Data ware housing level.
             4. In the Screen if the status is ‘Transaction Recorded’ it means its stuck goto edit and click Execute LUW or press F6.
             5. If status is ‘Transaction executing’ then it means its fine wait.
             6. Or raise ticket.
    Error Due to short Dump
    Reason: Error due to Short dump could be due to many reasons i.e. memory, table space, lock, error record, page allocation, failed change run.
    Process terminated in the Source system.
               Reason: Sometimes we face that a load has failed due to job Termination at Source System.             
          This happens due to unavailability of the source system or some connectivity problem between source and target systems.
    1.      Make the request red.
    2.      Delete the request from the data target.
    3.      Reschedule the ip.
    4.      If still the job fails raise the ticket.
    And also check in following links:
    Process Chain Errors
    /people/mona.kapur/blog/2008/01/14/process-chain-errors
    Common Process chain errors
    For Data Load Errors check this blog:
    /people/siegfried.szameitat/blog/2005/07/28/data-load-errors--basic-checks
    Pls assign points if it helps u,
    Thanks & Regards,
    Madhu

  • What is workflow ? What are the advantages of using workflow? What are the

    what is workflow ? What are the advantages of using workflow? What are the steps for building a workflow ?

    Hi Leela,
    Your question is very straight question.
    Better u can follow these links.
    http://www.esnips.com/doc/90b7763b-f9d9-4861-a273-04674b9fe3f2/Workflow
    http://www.esnips.com/doc/991843e0-8686-4949-94b9-f45d90081b22/workflow
    And i'll give some theory answer for ur questions
    i.e.,SAP Business Workflow can be used to define business processes that are not yet mapped in the R/3 System. These may be simple release or approval procedures, or more complex business processes such as creating a material master and the associated coordination of the departments involved. SAP Business Workflow is particularly suitable for situations in which work processes have to be run through repeatedly, or situations in which the business process requires the involvement of a large number of agents in a specific sequence.
    You can also use SAP Business Workflow to respond to errors and exceptions in other, existing business processes. You can start a workflow when predefined events occur, for example an event can be triggered if particular errors are found during an automatic check.
    SAP provides several workflows that map predefined business processes. These workflows do not require much implementation. For an overview of these SAP workflows, refer to Workflow Scenarios in Applications.
    Integration
    SAP Business Workflow uses the existing transactions and functions of the R/3 System and does not change the functions. You can combine the existing functions of the R/3 System to form new business processes with SAP Business Workflow. The workflow system takes over control of the business processes. If you are already using SAP Organizational Management, you can use the organizational structure created there to have the relevant agents carry out the individual activities. It is possible to have an activity carried out by a position. This ensures that the respective occupiers of the position can carry out the individual activities during execution of the workflow. This means that personnel changes in your organization are taken into account immediately in the execution of a workflow.
    Features
    SAP Business Workflow provides a number of tools for defining and analyzing workflows as well as for monitoring operation.
    The Workflow Builder is for displaying and making changes to workflows. You can make small extensions directly to the original workflows supplied by SAP, such as carrying out your own agent assignments or changing deadline monitoring.
    There are several Workflow Wizards to support you in the definition of workflows, with which you can create specific parts of a workflow. The Workflow Wizard Explorer gives you an overview of the existing Workflow Wizards.
    In order to make the functions of the R/3 Systems available to a workflow, you use business objects, which you can define and analyze in the Business Object Builder. These business objects are made available to the workflow in reusable tasks. The Business Wizard Explorer gives you an overview of all existing tasks.
    The end user receives information about the activities they are to carry out in their Business Workplace. This provides them with a central overview of all the activities that they are authorized to carry out. They can commence the activities from here.
    Several tools are available to the workflow system administrator, with which they can control and analyze the current workflows. The workflow system administrator is notified of problems automatically by the system.
    Workflow tutorials with step-by-step and with screenshots are available at http://www.****************/Tutorials/Workflow/Workflow.htm
    This has a step by step procedure :
    http://fuller.mit.edu/workflow/debugging.pdf
    www.erpgenie.com/sap/workflow/debugging.htm
    http://www.erpgenie.com/workflow/debugging.htm?2b5de440
    Rewards if it is useful.

  • Service/Database Accounts - NT SERVICE\MSSQLSERVER & NT SERVICE\SQLSERVERAGENT - what are they for?

    Hi Guys,
    I’ve done a fair amount of research for this question but just cannot seem to find the answer to my question in simple, non-DBA, terms.
    Server 2008 R2
    SQL 2008 R2
    There are 2 users in the system database logins (NT SERVICE\MSSQLSERVER, NT SERVICE\SQLSERVERAGENT) … what are they for? It appears that they
    are accounts to run the corresponding Windows services but yet they cannot be selected from the list of available built-in accounts, local accounts or domain accounts.
    Also, I am using a couple of domain user accounts to run the services, do I need to add them to the database? I changed the service accounts from NETWORK
    SERVICE to the domain user accounts using the SQL Configuration Manger which is supposed to take care of managing the user group membership and registry changes but the domain accounts are not in the database …. The services appear to be running fine.
    Thanks

    In basic terms:
    As you say, in the SQL Server Database Engine there are two logins;
    NT SERVICE\MSSQLSERVER and NT SERVICE\SQLSERVERAGENT. The Database Engine runs in Windows as a Windows service named
    MSSQLSERVER. The NT SERVICE\MSSQLSERVER login is used by the service to connect to the Database Engine. Basically, this is how it connects to itself. The SQL Server Agent runs as a Windows service named
    NT SERVICE\SQLSERVERAGENT. The NT SERVICE\SQLSERVERAGENT
    login is how the Windows process that is SQL Server Agent connects to the Database Engine to read the
    msdb database to find out what it should do; and then do it. Both of these logins are members of the
    sysadmin fixed server role, so they can do anything in the Database Engine. And they need to stay that way.
    No, they can't be selected in the list of available built-in accounts, local accounts or domain accounts. This is because they are services, not accounts. They have a security identifier (SID) in Windows,
    but Windows knows they aren't real users. Windows can authenticate them, but they don't have passwords that any human can use. If you run
    lusrmgr.msc and look at the groups, you will see groups like
    SQLServerMSSQLUser$computername$MSSQLSERVER and NT SERVICE\MSSQLSERVER
    is a member of the group.
    As for the account that you used to run the services, this is complicated and has changed from SQL Server 2005 to SQL Server 2008 and now again in SQL Server Code Named 'Denali'. The short answer is that
    the account you specify will be used when a process tries to reach outside of the current Windows environment. But within the computer, there is a mix of authorization granted to the domain user, the service, and the Windows group
    SQLServerMSSQLUser$computername$MSSQLSERVER.
    The good news is that SQL Server Configuration Manager figures out all the stuff you need when you change the accounts. If you are a glutton for punishment, you can get an idea for how complicated this
    is by looking at the Denali documentation where I have tried to provide more specific information. (Note this is not the same as SQL Server 2008.) You can see it at:
    Configure Windows Service Accounts and Permissions
    http://msdn.microsoft.com/en-us/library/ms143504(SQL.110).aspx
    Rick Byham, Microsoft, SQL Server Books Online, Implies no warranty

  • What are the seeburger adapters needed?

    hi,
    what are the seeburger adapters neded to implement EDI integration with XI?I mean what we need to install on XI?
    And also please explain me the end to end process while implementing EDI using Seeburger and XI?I know Converison agent part.
    thank you,

    Hi,
    Apart from the above ans explained by Michal,
    See the below links , you will get an idea about Seeburger ..
    https://www.sdn.sap.com/irj/servlet/prt/portal/prtroot/docs/library/uuid/135b0b94-0701-0010-f6a9-86a14057544a
    /people/bla.suranyi/blog/2006/06/08/sap-xi-supports-edifact
    /people/william.li/blog/2006/03/17/how-to-get-started-using-conversion-agent-from-itemfield
    /people/paul.medaille/blog/2005/11/17/more-on-the-sap-conversion-agent-by-itemfield
    http://www.stylusstudio.com/edi/XML_to_X12.html
    https://www.sdn.sap.com/irj/servlet/prt/portal/prtroot/docs/library/uuid/b0b355ae-0501-0010-3b83-8f2bb566fa47
    Details on XI EDI adapter from seeburger
    Check this for Conversions-
    /people/bla.suranyi/blog/2006/06/08/sap-xi-supports-edifact
    http://www.seeburger.it/fileadmin/it/pdf/2005_04_sapphire_Ferrero_transcript.pdf
    http://www.seeburger.com/fileadmin/com/pdf/Butler_Group_SEEBURGER_Technology_Audit.pdf
    http://www.seeburger.com/fileadmin/com/pdf/AS2_General_Overview.pdf
    SAP Adapters
    EDI with XI
    http://www.seeburger.com
    http://www.seeburger.com/fileadmin/com/pdf/SEEBURGER_SAP_Adapter_engl.pdf
    http://www.sap.com/france/company/events/2006/02-01-Automotive-Seeburger.pdf
    http://h41123.www4.hp.com/presentations/ISUG/XISeeBurger.ppt
    http://www.sap.com/asia/company/events/nwtechdays/presentation/australia-slides/Pre-Built_Integration.pdf
    seeburger adapter configuration
    Regards
    Chilla

Maybe you are looking for

  • Packages are NOT transferring to new DP after adding it to a DP group - WHY!!!?

    I am in the midst of trying to put together a Windows 8.1 DP and when I check the Distmgr.log, everything looks fine. Then when I add it to a DP group that my primary DP is a member of for the simple purpose of having those packages transferred over

  • Problem with chart data

    I've created a chart in Crystal Reports 2008 using the last name of clients as the 'Change On' value and their desired home size as the 'Show Value(s)'. It spits out a chart with values of 2000, 2001, and 2002 along the bottom (instead of the home si

  • Vertical centering in Spark/Flex

    I am horizontally dividing my panel between two elements. To acheive that I am using the following layout controls      <s:layout>                     <s:HorizontalLayout>              <s:paddingBottom>20</s:paddingBottom>                   <s:paddin

  • How do I import a saved Iphoto Library into Iphoto

    Hi All, Apologies if this is a simple question but I just cant figure out the best way to do this... I exported my Iphoto Library onto an external hard drive when I reimaged my mac. I now want to import them back into Iphoto but when I hit import the

  • Keynote, protection against modification when needing to share it

    hi you folks, I just try to find if there 's anything to protect your keynote from any (easy) modification. I need to share some of my keynote but I don't want those people to change name and robe my work so easily. Thanks for your help.