What are REQUEST_NO and PAGENO parameters in WebAD url commands?
Hi,
I cannot find any documentation on what are <b>REQUEST_NO</b> and <b>PAGENO</b> parameters in WebAD url commands and how to use them.
Like in this case:
http://..../sap/bw/BEx?SAP-LANGUAGE=E&PAGENO=1&REQUEST_NO=0&CMD=PROCESS_VARIABLES&SUBCMD=VAR_SUBMIT&...
Will appreciate any hints!
Vitalik
This is a pretty normal thing to have to do, even on a form you can't guarantee all the values will be returned (unchecked checkboxes for instance won't ever send a value).
In my code I am checking to see if these params are in
the url or not:
arg1 = request.getParameter("arg1");
if(arg1 == null)
do something1;
arg2 = request.getParameter("arg2");
if(arg2 == null)
do something2;
Just change your logic a little:
// If the param is passed, get the value ...
if (request.getParameter("arg1") != null)
arg1 = request.getParameter("arg1");
else // No parameter "arg1" passed ...
// do something
Similar Messages
-
Hi friends,
I'm trying to find more information about pass encryption process. (Specially in Applications Environment)
What I don't know is the meaning of two parameters...OUT_E_USER_PWD and OUT_E_ORCL_PWD.
I have the following sentence to encrypt a user password:
User_Exit('FND PWD TYPE="USER" '||
'USERNAME=":USER.USER_NAME" '||
'PASSWORD=":USER.USER_PASSWORD" '||
'OUT_E_USER_PWD=":USER.ENCRYPTED_USER_PASSWORD" '||
'OUT_E_ORCL_PWD=":USER.ENCRYPTED_FOUNDATION_PASSWORD" '||
'DECRYPT="N"');
How do this exactly works?
I suppose it's the same as type in our spl*plus:
sql> pwd user myuser password mypassword
and...after we would add the new parameters... but apparently withput value.
USER is a block in the applications form, but AFAIK ENCRYPTED_USER_PASSWORD and ENCRYPTED_FOUNDATION_PASSWORD have no values when we call this sentence...
so.. what is the effect ?
Any help will be appreciate about this tip. Thanks.
Jose.USER.ENCRYPTED_USER_PASSWORD is carrying encrypted APPLSYS password
have a look at Note:332577.1
Regards
Prashant Pathak -
Hi All,
I would like to know what are the minimum required parameters to pass in BAPI BAPI_SHIPMENT_COST_ESTIMATE. And from which tables I can pull out that information to pass to this BAPI.
Does this BAPI creates a shipment cost document in the system or just shows the estimate of the shipment cost.
If it creates a shipment cost document then its good for me. but if it shows us just the estimate does it shows estimate for each delivery (total Qty, Unit Price & Total Price).
What will be the item category it will pick. I like to see it picks basic price related item category.
Does any body has used this bapi ?
Appreciate your fast reply.
Regards,
LeonaHello, I´ll try to answer your question:
1. is it possible to run the bapi without actual shipment number and the shipment ( & cost ) will be created in simulation mode ?
I think that the bapi only run with external shipment number and only run in simulation mode, that´s mean the bapi can not create any shipment and cost document, if you want to create a shipment use BAPI_SHIPMENT_CREATE, to create a cost document I don´t know if there is a bapi but you can create easily with transaction VI01 (batch-input)
The shipment number that you use to call the bapi is a ficticious number always between external range indicated in field V_TVTK-NUMKE with the shipment type that you use.
2. is it possible to perform estimation to inbound shipments ?
Yes it´s depend on the shipment type. In standard system 0010 is used
In the example that I have I use an inbound delivery
3. does the bapi creates shipment and scd in simulate mode like transaction VICI ( from sales order ) ?
I think that the bapi only run in simulation mode and it can not create any document
4. is there any problem if i customized my scd item categories to open manualy ?
I think that the bapi needs to work properly automatic iten categories
can you please post sample code ( or any other doc's ) for this bapi ?
I send you a document with an example if you give me an e-mail because I don´t know how to attach a word document
Best regards, -
What are the content conversion parameters for this structure
Hi All,
The below file is the text file. what are the content conversion parameters are required and what is the structure to create in the IR to convert into xml.
Schedule D - District/Port List (by District Code) [Produced13APR11]
District | Port | Name
Code | Code |
01 | | PORTLAND, ME
| 0101 | PORTLAND, ME
| 0102 | BANGOR, ME
| 0103 | EASTPORT, ME
| 0104 | JACKMAN, ME
| 0105 | VANCEBORO, ME
| 0106 | HOULTON, ME
| 0107 | FORT FAIRFIELD, ME
| 0108 | VAN BUREN, ME
| 0109 | MADAWASKA, ME
| 0110 | FORT KENT, ME
| 0111 | BATH, ME
| 0112 | BAR HARBOR, ME
| 0115 | CALAIS, ME
| 0118 | LIMESTONE, ME
| 0121 | ROCKLAND, ME
| 0122 | JONESPORT, ME
| 0127 | BRIDGEWATER, ME
| 0131 | PORTSMOUTH, NH
| 0132 | BELFAST, ME
| 0152 | SEARSPORT, ME
| 0181 | LEBANON AIRPORT
| 0182 | MANCHESTER USER FEE AIRPORT, NH
02 | | ST. ALBANS, VT
| 0201 | ST. ALBANS, VT
| 0203 | RICHFORD, VT
| 0206 | BEECHER FALLS, VT
| 0207 | BURLINGTON, VT
| 0209 | DERBY LINE, VT
| 0211 | NORTON, VT
| 0212 | HIGHGATE SPRINGS/ALBURGsince in this case you dont seem to have a key value to figure out what your header is, it is better to go for a two level mapping. i.e first read all the data - each line as an xml tag. and in the first mapping group it as required and then use it for your original mapping.
Regards,
Ninu -
What are the AM Tuning parameters need to be set for 500 concurrent users
Hi All,
We are using JDEVADF_11.1.1.5.0.
What are the exact AM parameters(Pooling and Scalability tab) to be set when we planned for 500+ concurrent users?
Along with this do we need to set any parameters at weblogic server level, if any please give inputs.
Any input's would be appreciated.
Thanks in advance.
Regards,
DineshWe can?t give you exact numbers as there are many factors influencing the performance. In hte end you have to make a load test to find the right set of parameters. A good starting point is Andrejus's blog Andrejus Baranovskis's Blog: Stress Testing Oracle ADF BC Applications - Internal Connections and Andrejus Baranovskis's Blog: Stress Testing Oracle ADF BC Applications - Do Connection Pooling and TXN Disconnect Level
Timo -
What are Conversions and Extensions
Hey ,
I want to know what are Conversions and Extensions. Can i get any material where i can get information on these.
Thanks in advanceThe conversion programs were used to take the extract data from the legacy system and re-format for SAP and load the data into SAP.
Conversions are one-time programs used to transfer data from the legacy system into SAP. For example, you can transfer master data like vendors, customers etc.
SAP provides enhancement to BAPIs thru EXTENSION IN AND EXTENSION OUT .these are structure parameters.suppose example: one BAPI released to update the mara table.then u modified the table mara thru append structure.this changes will not be reflected in BAPIs.So thats why in that case we have to use EXTENSION IN AND EXTENSION OUT structures to fill and work. -
0.41GB of my iPod Touch 4G's capacity is taken up by something callked 'Others'. What are 'Others' and will it be o.k to delete them? If so how do I go about doing it as there is no trace of a file on either iTunes or my iPod?
Other content is typically miscellaneous data used by applications you have installed - could be save data (e.g. for games), or documents you've created. There's no easy way to determine precisely what it is, but the only way to clear it is to either delete it from within the respective application, or remove the associated application altogether - neither of which are typically practical.
-
What are the content conversion parameters
Hi All
This link contains the text file.
http://www.census.gov/foreign-trade/schedules/d/dist.txt
what are the content conversion parameters are required to convert that text to xml.<sen_dt>
<prefix>
<heads>
<dc>
<pc>
<name>
<main>
<dcno>
<pcno>
<name1>
<rec_dt>
<prefix>
<District_code> District code optional
<port_code> port code 1
<name> name
<main>
<District_code_no>
<port_code_no>
<name1>
content conversion
document name:<sen_dt>
document namespace:http::----
document offset:--
recordset name:input
recordset structure:heads,1,main,*
recordset sequence:Ascending
recordset per message:----
keyfield name:---
prefix.fieldfixedlengths:---
prefix.endSeparator:---
prefix.fieldNames;---
prefix.keyFieldvalue:--
prefix.keyFieldlnStructure:---
main.fieldFixedLengths:9,
main.fieldSeparator:|
main.endSeparator:'nl'
main.fieldNames:district code,port code,name
main.keyFieldValue:
main.keyFieldlnStructure: -
What are ROWID and ROWNUM? Are they stored in database and where?
Hi All,
can anybody please answer this question
What are ROWID and ROWNUM? Are they stored in database and where?
Thanks,
SriniROWID can be thought of as a pointer to the physical location (on disk) of the (table) row.
From a ROWID value, Oracle can extract the file, block-within-that-file and offset-of-the-row-within-that-block. Using these, Oracle can directly access a disk block to retrieve a row.
ROWNUM is a just sequence number of a row within a result set of a query.
As said by other repliers, both are not stored. They are 'constructed' when you reference them inside a query. -
What are high and low values in sharepoint 2013 user permissions?
So I hit this api:
http://win-a3q7ml82p8f/sharepoint_site/_api/web/roledefinitions/
And got the different high and low values. But I am not clear with what they mean:
For eg:
High: 176, Low: 138612833
and
High: 176, Low: 138612801
So for different values of Low how does it change the permissions?
For 176 its binary is 10110000. So looking at this table here: http://www.dctmcontent.com/sharepoint/Articles/Permissions%20and%20Mask%20Values.aspx
I can understand that 176 would mean the following set of permissions:
DeleteVersions
OpenItems
ApproveItems
But what's confusing me is, that user has OpenItems permissions but not ViewListItems permission? Am I wrong in understanding this?
Also how does the value of Low change the overall user permissions?
Note: I looked at this answer: http://social.msdn.microsoft.com/Forums/sharepoint/en-US/9d6df168-e8f5-4323-8c34-0646c03eff68/rest-api-what-are-high-and-low-in-effectivebasepermissions-and-getusereffectivepermissions?forum=sharepointdevelopment
But honestly I cant understand what that means. Can someone help please?check this blog may explain you...
http://jamestsai.net/Blog/post/Understand-SharePoint-Permissions---Part-1-SPBasePermissions-in-Hex2c-Decimal-and-Binary---The-Basics.aspx
Please remember to mark your question as answered &Vote helpful,if this solves/helps your problem. ****************************************************************************************** Thanks -WS MCITP(SharePoint 2010, 2013) Blog: http://wscheema.com/blog -
Satellite A100-153: What are verical and horizontal refresh rates for my display
How can I found out what are verical and horizontal refresh rates for my display?
Hi
Do you mean the vertical and horizontal display resolution???
Anyway all informations should be listed in the user manual.
I dont know exactly what appendix is it but it must be placed somewhere at the end of the user manual.
Such infos are listed also in my user manual which was delivered and preinstalled on my Satellite notebook. -
What are valid and invalid email address characters
What are valid and invalid email address characters in Exchange 2010, for example can you have Conan.O'[email protected] is there a document that shows the valid and invalid sysmbols?
Hi
The format of email addresses is
local-part@domain where the local-part may be up to 64 characters long and the
domain name may have a
maximum of 253 characters - but the maximum 256 characters length of a forward or reverse path restricts the entire email address to be no more than 254 characters.<sup id="cite_ref-0">[1]</sup>
The formal definitions are in RFC 5322 (sections 3.2.3
and 3.4.1) and RFC 5321 - with a more readable form given in
the informational RFC 3696<sup id="cite_ref-1">[2]</sup>
and the associated errata.
Local part
The local-part of the email address may use any of these
ASCII characters
RFC 5322 Section
3.2.3:
Uppercase and lowercase English letters (a–z, A–Z) (ASCII: 65-90, 97-122)
Digits
0 to
9 (ASCII: 48-57)
Characters
!#$%&'*+-/=?^_`{|}~ (ASCII: 33, 35-39, 42, 43, 45, 47, 61, 63, 94-96, 123-126)
Character
. (dot, period, full stop) (ASCII: 46) provided that it is not the first or last character, and
provided also that it does not appear two or more times consecutively (e.g. [email protected] is not allowed.).
Special characters are allowed with restrictions. They are:
o
Space and
"(),:;<>@[\] (ASCII: 32, 34, 40, 41, 44, 58, 59, 60, 62, 64, 91-93)
The restrictions for special characters are that they must only be used when contained between quotation marks, and that 3 of them (The
space, backslash \ and
quotation mark " (ASCII: 32, 92, 34)) must also be preceded by a backslash
\ (e.g.
A quoted string may exist as a dot separated entity within the local-part, or it may exist when the outermost quotes are the outermost characters of the local-part
(e.g. abc."defghi"[email protected] or
"abcdefghixyz"@example.com are allowed. Conversely,
abc"defghi"[email protected] is not; neither is
abc\"def\"[email protected]). Quoted strings and characters however, are not commonly used.
RFC 5321 also
warns that "a host that expects to receive mail SHOULD avoid defining mailboxes where the Local-part requires (or uses) the Quoted-string form".
The local-part "postmaster" is treated specially - it is case-insensitive, and should be forwarded to the server's administrator. Technically all other local-parts
are case sensitive, therefore [email protected] and [email protected] specify different mailboxes. However most organizations treat uppercase and lowercase letters as equivalent, and also do not allow use of the technically valid characters
(space, ? and ^). Organizations are free to restrict the forms of their own email addresses as desired, e.g.,
Windows Live Hotmail,
for example, only allows creation of email addresses using alphanumerics, dot (.), underscore (_)
and hyphen (-).<sup id="cite_ref-2">[3]</sup>
Systems that send mail must be capable of handling outgoing mail for all valid addresses. Contrary to the relevant standards, some defective systems treat certain
legitimate addresses as invalid and fail to handle mail to these addresses. Hotmail, for example, refuses to send mail to any address containing any of the following standards-permissible characters:
!#$%*/?^`{|}~
Domain part
The domain name part of an email address has to conform to strict guidelines: it must match the requirements for a
hostname,
consisting of letters, digits, hyphens and dots. In addition, the domain part may be an
IP address
literal, surrounded by square braces, such as jsmith@[192.168.2.1], although this is rarely seen except
in email spam.
Examples
Valid email addresses
<tt>[email protected]</tt>
<tt>[email protected]</tt>
<tt>[email protected]</tt>
<tt>much."more\ unusual"@example.com</tt>
<tt>very.unusual."@"[email protected]</tt>
<tt>very."(),:;<>[]".VERY."very@\\\ \"very"[email protected]</tt>
Invalid email addresses
<tt>Abc.example.com</tt> (an @ character must separate the local and domain parts)
<tt>[email protected]</tt> (character dot(.) is last in local part)
<tt>[email protected]</tt> (character dot(.) is double)
<tt>A@b@[email protected]</tt> (only one @ is allowed outside quotation marks)
<tt>a"b(c)d,e:f;g<h>i[j\k][email protected]</tt> (none of the special characters in this local part
is allowed outside quotation marks)
<tt>just"not"[email protected]</tt> (quoted strings must be dot separated, or the only element making
up the local-part)
<tt>this is"not\[email protected]</tt> (spaces, quotes, and backslashes may only exist when within
quoted strings and preceded by a slash)
<tt>this\ still\"not\\[email protected]</tt> (even if escaped (preceded by a backslash), spaces, quotes,
and backslashes must still be contained by quotes)
Terence Yu
TechNet Community Support -
What are advantage and disadvantage for Physical Standy and Logical Standby
HI,
What are advantage and disadvantage for Physical Standy and Logical Standby configuration?
Thanks
KenLogical standby database
The key advantage for logical standby databases is that they're opened read/write, even while they're in
applied mode. That is, they can be used to generate reports and the like. It is indeed a fully functional
database. Also, additional indexes, materialized views and so on can be created.
However (this being a disadvantage) not all datatypes are supported.
Oracle (or more exactly the log apply services) uses the primary database's redo log, transforms them into
SQL statements and replays them on the logical standby database.
Physical standby database
A physical standby database is a byte for byte exact copy of the primary database. This also means that
rowids stay the same in a physical standby database environment.
Oracle (or more exactly the log apply services) uses the primary database's redo log to recover the
physical database.
A physical standby database might be opened read only; however, the received logs are in this case not
applied. When the logs are applied, the database is not accessible (it is then in a managed recovery state).
Regards, -
What are Before and After Images ?
Hello Masters,
Best wishes to all.
For the past one week I've learnt many concepts from SDN, got all my doubts clarified.
On the same roll, I have one more question
What are Before and After Images ?
Where do we come across these terms ?
Could you please explain with an example ?
I always thank my replies in points
Thanks in advance...<b>Hai</b>....
<u><b>Before and After Images:</b></u>
This Term is Used in the " Change Log "....
Change Log is one of the Table used in ODS....
That means the Changes in Running Request in ODS....
Example:
If you Enter the Request to " New Table" after activation the Request will be Deleted From the Table, You can see that in Change log......
<i><b>Assign Points If It Halps</b></i>....
<u><b>BalajeeKannan</b></u> -
What are Validation and simulator
can any one explain what are Validation and Simulators are ???
what is there importance and how they work in SAP ??
Regards,
MilindkumarAre you referring to validation rules and simulations? Whereby validations allow the checking of values and combinations of data as they are being entered in SAP. Because the data is validated before it is posted, only correct information enters the system. For example if you have a cost center X that should not post to account Y. You create a validation that checks to see if cost center X is entered whether the account is Y. If the account is Y the validation will stop the entry from being made.
Simulations normally are when data is checked for accuracy or verfied before posting. Simulations usually allow the verification of data by displaying that entries that will post or will be created only after the post button or process occurs.
Maybe you are looking for
-
IPod Touch with Composite AV Cable: Issues
I purchased the new $50 composite AV cable when it was released a few months back. I've been using it frequently with no real issues (whenever I play a video, my iPod recognizes that it is connected to a TV and prompts me to choose whether or not to
-
IPhoto will not open due to lack of application memory
I am trying to open iPhoto to move some photos to an external drive. iPhoto is not opening as it appears I am running out of Application Memory. I have run the disk utilities and everything is fine. I have closed all other applications so that is the
-
In the documentation for DMM 5.2.X, there doesn't seem to be any information on what rights need to be given to the Administrator for the LDAP integration. The environment that I am configuring for is very security conscience and will want to give t
-
How bad is the recent hacking problem?
Should I wait for a fix before using my iMac?
-
HOW DO I REMOVE FROM THE CONTACT A GROUP?
HOW DO YOU REMOVE A GROUP NAME FROM CONTACTS?