What are the expected implications in implentation of Fund Management.

Dear All,
We are in the live Environment of ECC 6.0, currently we have FICO and HR module Implemented. we have been gone live since January 2007.
In FI, we have GL, AR, AP, Fixed Assets. Banking, IM and PS.In treasury we have loan management and Time deposits. In controlling we have Cost Center Accounting, Cost Element Account, Internal orders and some parts of COPA.
Currently MM and PM Implementation is going on, now we are thinking to implement Fund Management to control the budget. (our objective is to control Operational budget)
Can any body guides us with respect to the followings:
what can be the impact of Implementing Fund Management in Live Enivornment? (Please be noted we are using New GL Functonality as well).
How it effects the cost cycles? (we have series of complex Cost Cycles)
Any other impact of Implementing Fund Management?
Regards,

Dear All,
We are in the live Environment of ECC 6.0, currently we have FICO and HR module Implemented. we have been gone live since January 2007.
In FI, we have GL, AR, AP, Fixed Assets. Banking, IM and PS.In treasury we have loan management and Time deposits. In controlling we have Cost Center Accounting, Cost Element Account, Internal orders and some parts of COPA.
Currently MM and PM Implementation is going on, now we are thinking to implement Fund Management to control the budget. (our objective is to control Operational budget)
Can any body guides us with respect to the followings:
what can be the impact of Implementing Fund Management in Live Enivornment? (Please be noted we are using New GL Functonality as well).
How it effects the cost cycles? (we have series of complex Cost Cycles)
Any other impact of Implementing Fund Management?
Regards,

Similar Messages

  • What are the security implications of having JAVA running on my Mac Book Pro?

    What are the security implications of having JAVA running on my Mac Book Pro?

    Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.

  • What Are the Security Implications of not Completely Signing Database?

    Hello everyone,
    What are the security implications of not completely signing the database?
    From http://www.archlinux.org/pacman/ ,
    The following quote implies that the database exists merely just in case hand tweaking is necessary:
    maintains a text-based package database (more of a hierarchy), just in case some hand tweaking is necessary.
    However, considering that there are cases that pacman's local database needs to be restored, there are implications that the database is essential for pacman to function properly.
    From https://wiki.archlinux.org/index.php/Ho … l_Database :
    Restore pacman's local database
    Signs that pacman needs a local database restoration:
    - pacman -Q gives absolutely no output, and pacman -Syu erroneously reports that the system is up to date.
    - When trying to install a package using pacman -S package, and it outputs a list of already satisfied dependencies.
    - When testdb (part of pacman) reports database inconsistency.
    Most likely, pacman's database of installed software, /var/lib/pacman/local, has been corrupted or deleted. While this is a serious problem, it can be restored by following the instructions below.
    I know that all official packages (from core, extra, community, etc.) are signed so that all files should be safe, but I'm just paranoid.
    What if the database was hacked?  Will this lead to installation of harmful software?
    Sincerely,
    Cylinder57
    Last edited by Cylinder57 (2012-10-15 03:42:31)

    Cylinder57 wrote:
    From this quote:
    Allan wrote:But, the OP (also?) talks about the local package database on his computer.  That is not signed at all as there is no point.  If someone can modify that, then they can regenerate the signature, or just modify any other piece of software on your computer.
    Is it going to be easy for anyone other than the authorized user to modify the local package database?
    Allan basically answered that with the quote above already as I understand it. Someone who has access to the installation, e.g. is able chrooting your PC via USB, is not held back by any ACLs. However, modifying the local database only makes limited sense because the packages are already installed. Pacman would only recheck, if you re-install a package. The only really relevant attack vector for the package database is
    (1) installing an older package with a vulnerability,
    (2) re-placing the up-to-date package sig in the local database with the older one and
    (3) modifying the system, e.g. via pacman.conf excludes, to not update that.
    then also re-installing would not create a sig-error and you get stuck with the bogus old package.
    With a signed database this would not be possible. However, as Allan wrote earlier also with a signed database that criminal can manually install (totally leaving pacman & package cache) whatever it needs in this scenario. So, if you are -really- paranoid about that, you probably want to spend (a lot of configuring) time with something like the "aide" package.
    Cylinder57 wrote:
    And, are the following statements correct:
    If the repository databases are modified, the hacker might be able to modify the packages on the server (Considering that if someone can modify the local package database, that person can modify any other piece of software on that particular computer.)
    However, pacman won't let users from installing the modified packages (due to package signing,) unless at one person with access is bribed (at least, for an individual package.)
    I don't know the intricacies of the server infrastructure - only saw they have great names :-), but I am pretty certain your statements assume that correctly. It is pretty unlikely that someone able to modify the central repository database fails at placing a bogus package for shipping with those access rights at this time. Yet it does no harm not to post any details of such a scenario here imo. In any case: A compromised mirror would be enough for that - and easier to achieve (hacked anywhere or e.g. in a non-democratic state). Plus you also answered it yourself. The keys are key for our safety there. Which keeps me hoping that no criminal lawnmover salesmen frequent the Brisbane area.
    As you put up a thread about this, one question you can ask yourself is:
    Have you always checked on updates new signatures keys which pacman asks about? If you ever pressed "accept/enter" without checking them out-of-band (e.g. the webserver), that compromised mirror database might have just created a "legitimate" key .. user error, but another attack vector the database signing would catch.
    edit: Re-thinking the last paragraph just after posting, I now believe it would not be that easy as implied - simply because the bogus key is not trusted by one of the master keys. The pacman pgp trust model should catch that without database signing. At least it would if only the official repositories are activated, but that's a pre-requisite to the whole thread.
    Last edited by Strike0 (2012-10-20 23:01:26)

  • What are the user exits available related to Credit Management?

    What are the user exits available related to Credit Management?
    <b>I have blocked users from releasing SO through Tciode VKM3 , now I want to block
    the same (releasing of SO through VKM4) ,I want VKM4 to be used only for releasing delivery orders. Can anyone help me in configuring the same?.</b>
    Thanx in advance,
    Regrds,
    Binayak

    Hi,
    User Exits For Credit Checks And Risk Management
    Credit Check
    If you want to carry out your own individual credit checks, that differ from those in the standard system, you must define them in the following user exits:
    LVKMPTZZ
    LVKMPFZ1: USER_CREDIT_CHECK1
    LVKMPFZ2: USER_CREDIT_CHECK2
    LVKMPFZ3: USER_CREDIT_CHECK3
    User exit for availability check
    User exit USEREXIT_AVAIL_CHECK_CREDIT exists in Include MV45AFZF.
    This user exit allows you to determine whether the system should or should not carry out an availability check after a blocked document has been released or after a new credit check.
    Risk Management for Receivables
    RVKMPUS2
    Using this user exit, you can define new forms of payment guarantee.
    Regards,
    Amrish Purohit

  • What are the prerequsite for installing and Configure  Knowledge management

    Hi All,
    what are the prerequsite for installing and Configure  Knowledge management in CE 7.1 eph1.
    Thanks
    AB

    Hi Michael,
    Thanks for yor quick response.......Can you please tell me whats the alternative for KMC in CE 7.1 in portal
    thanks
    AB

  • Is Firefox available for use in a Citrix environmet, what are the licensing implications

    Is Firefox available for use in a Citrix environmet, what are the licensing implications

    Licensing is easy: the [http://www.mozilla.org/MPL/2.0/ Mozilla Public License] is free and open. Naturally, it contains the customary disclaimers and limitations.
    Implementation might be more of a challenge because Firefox presumes certain things about the system.
    I suggest joining the Enterprise Working Group Mailing List to connect with an audience of corporate implementers on this issue and search the list archives.
    * http://www.mozilla.org/firefox/organizations/
    * https://mail.mozilla.org/listinfo/enterprise
    If you find other good resources, would you mind contributing them back to this thread? Thanks.

  • What are the services or commands contained under ASA-management-only policy ?

    If an interface is enabled of management-only policy under adaptive security appliance, what are the services comes under this would be allowed ?

    Thanks Obama for replying.
    Here is the comment from @jaiharidas of MSFT if anyone's interested:
    @Naziq, It is better to have multiple shares under single storage account and there is no perf implications. However, please ensure that your ingress/egress and request/sec is within
    the limits of a single storage account (seemsdn.microsoft.com/.../dn249410.aspx)
    and use multiple storage accounts if you need to scale beyond the limits.
    See the original comment  on Azure Storage Team here: http://ow.ly/ChPNf 
    @nazik_huq

  • What are the essentials needed before upgrading from call manager 9.1.1 to call manager 9.1.2?

    I recently tried to upgrade my call manager in a lab environment from 9.1.1 to 9.1.2 but failed. The error stated that connection had been lost after 2 hours into it. Connect using CLI. Any help would be greatly appreciated.
    Steve

    You mean via GUI??
    What does the upgrade status via CLI says??

  • Introducing a custom Password policy to expire passwords. odsee 11g - what are the expected results

    We have left the default Password Policy untouched. As a default password aging is off. Our DS compatibility mode is now DS6 so we can add Password Policies with max age!
    Some users need to have their passwords changed regularly due to political reasons.
    We have introduced a custom Password Policy which has a pwd_Max_age value of 180 days and allows the user to Change Password. Entry is cn=Custom Pwd Policy for ABC,dc=mycorp,dc=com
    Ok. Now we get confused by the behaviour of this ODSEE 11g server. Now, we are ADDING a new custom Password Policy to just a few selected users!
    1. When we add the Policy to the user by setting the passwordpolicysubentry attribute = "cn=Custom Pwd Policy for ABC,dc=mycorp,dc=com"
    - Nothing seems to happen.
    - WHEN IS THE PASSWORD EXPIRED?
    2. After we change a password for a user who has the passwordpolicysubentry attribute, he gains a new attribute pwdChangedTime
    - IS THIS THE ONLY TIME THE EXPIRY CLOCK STARTS TICKING? *AFTER* THE PASSWORD IS CHANGED?
    3. Is it true, that if a user never changes his password, even if he gets the new custom password policy applied, his password never automatically expires????
    I just cannot work out what is supposed to happen. I would have hoped that at the very least, the password begins to expires as soon as he gets a Password Policy with pwd_Max_age set.
    How is ODSEE 11g designed/supposed to function.
    Help!!!!!
    *HH

    Sylvain ,Many thanks for your reply and suggestions. Always good to have a choice!
    So it seems the only way to get the password aging clock to tick is for the password to be changed after having the password policy applied.
    Option1 is not really an option although it certainly would make the users change the password and set up the password aging...
    The main difficulty with odsee 11g  (Version 11.1.1.7.0) is that pwdChangedTime is a system read-only attribute linked to a modification to userPassword attribute, I cannot use ldapmodify to add/modify the pwdChangedTime attribute.
    I was amazed that I can read/store the userpassword as the base64 string and replace the userpassword attribute with this value using ldapmodify. This is very easy (and works!) but will cause the pwdChangedTime attribute to contain the same time for all users. I can imagine helpdesk loving it when everyone calls them in 6 months time.
    Using the LDIF backup/restore utility looks the best option, if it succeeds. At least we can randomize the actual value of pwdChangedTime with this approach.
    Mercy Buckets.

  • What are the performance implications moving apps using cloud drive to Azure File Services?

    I run a number of cloud services with 5 or more nodes in using cloud drives. Cloud drive is scheduled to be deprecated in 2015. So I am thinking of replacing the cloud drive with Azure Files service.
    For each cloud service I am using one storage account to create all the the VHD/cloud drives. Some people at the time when cloud drive first appeared, told me that to get better performance, I should create only one VHD/Cloud Drive
    under only one storage account. For example, if I have five instances under a worker role then I should create 5 storage accounts and create one VHD/Cloud Drive under each storage account to be used by each node. I didn't follow that route because I was satisfied
    with the performance of the apps under cloud services having all VHD/Cloud Drives under one storage account.
    My question is, if I replace cloud drive with Azure file services, will my apps perform well having all shares under one storage account or create one storage account for each share?
    Thanks,
    @nazik_huq

    Thanks Obama for replying.
    Here is the comment from @jaiharidas of MSFT if anyone's interested:
    @Naziq, It is better to have multiple shares under single storage account and there is no perf implications. However, please ensure that your ingress/egress and request/sec is within
    the limits of a single storage account (seemsdn.microsoft.com/.../dn249410.aspx)
    and use multiple storage accounts if you need to scale beyond the limits.
    See the original comment  on Azure Storage Team here: http://ow.ly/ChPNf 
    @nazik_huq

  • What are the SEO implications of personalization/teasers?

    It seems like the AJAX loading of personalized content would be potentially a problem for SEO. Are there any best practices around this? The client is using v5.4 but looking at upgrading to 5.6 - are there any changes in the newest versions that would affect this?
    Thanks

    Hi Joel,
        AFAIK with 5.5 onwards teaser component deliver default teaser without Javascript & with JavaScript enabled the target spot getting replaced with the personalized content.  With this search engine google indexes the page with rest of contents(heading) in your page & should not impact seo. There might be FP for this for 5.4 In case not you can request for the same through daycare.
    Thanks,
    Sham
    @adobe_sham
    http://aemfaq.blogspot.com/

  • What are the compatable web browsers for Oracle Enterprise Manager DB console 11.2?

    Database: Oracle Database 11g Enterprise Edition Release 11.2.0.3.0 - 64bit Production
    Web browser: IE 8
    C:\Users\x-msarwar3>emctl status agent
    Oracle Enterprise Manager 11g Database Control Release 11.2.0.3.0
    Copyright (c) 1996, 2011 Oracle Corporation.  All rights reserved.
    Agent Version     : 10.2.0.4.4
    OMS Version       : 10.2.0.4.4
    Protocol Version  : 10.2.0.4.4
    Agent Home        : E:\Oracle\product\11.2.0\dbhome_1\CSCCHN6DBS801.cscfed.roo
    ad_fas360nds
    Agent binaries    : E:\Oracle\product\11.2.0\dbhome_1
    Agent Process ID  : 21396
    Agent URL         : https://CSCCHN6DBS801.cscfed.root.ad:3938/emd/main
    Repository URL    : https://CSCCHN6DBS801.cscfed.root.ad:1158/em/upload/
    Started at        : 2014-11-17 18:13:30
    Started by user   : SYSTEM
    Last Reload       : 2014-11-17 18:20:21
    Last successful upload                       : (none)
    Last attempted upload                        : (none)
    Total Megabytes of XML files uploaded so far :     0.00
    Number of XML files pending upload           :     1827
    Size of XML files pending upload(MB)         :    51.60
    Available disk space on upload filesystem    :    46.44%
    Data channel upload directory                : E:/Oracle/product/11.2.0/dbhome
    /CSCCHN6DBS801.cscfed.root.ad_fas360nds/sysman/recv
    Collection Status                            : Disabled by Upload Manager
    Last attempted heartbeat to OMS              : 2014-11-18 12:21:42
    Last successful heartbeat to OMS             : unknown
    Agent is Running and Ready
    C:\Users\x-msarwar3>emctl status dbconsole
    Oracle Enterprise Manager 11g Database Control Release 11.2.0.3.0
    Copyright (c) 1996, 2011 Oracle Corporation.  All rights reserved.
    https://CSCCHN6DBS801.cscfed.root.ad:1158/em/console/aboutApplication
    Oracle Enterprise Manager 11g is running.
    Logs are generated in directory E:\Oracle\product\11.2.0\dbhome_1/CSCCHN6DBS80
    cscfed.root.ad_fas360nds/sysman/log
    C:\Users\x-msarwar3>
    When I try to enter https://CSCCHN6DBS801.cscfed.root.ad:1158/em enter in IE 8, I get CERTIFICATE ERROR.
    I appreciate your help on this!
    Sarwar

    Sarwar,
    the only help I can provide is suggesting to ask to the right community Enterprise Manager,
    since this one is for a different product (Enterprise Manager Ops Center).
    HTH
    ciao
    giorgio

  • What are the questions they will ask  in order management?

    hi, can anyone pls.. let me know the interview questions regarding order management?
    thanks
    arun teja vasan

    Hi arun,
    You need to be clear on :
    1) OR type controls that influence the sales order
    2) How to various blocks ( del, billing )
    3) Looking at the schedule lines  ( Delivery splits)
    4) Overall document status
    5) Partner information
    6) Credit release ( Vkm3)
    7) copy controls
    8) Order, delivery billing tables and fields ( Imp ones)
    to name few.
    <a href="http://www.sap-img.com/sap-sd.htm">order management</a>
    pl reward if helpful.
    Thanks
    Sadhu Kishore

  • What are the advantages and disadvantages

    Hi All,
                      What is the use of Master Data Management. And What are the advantages and disadvantages of Master Data Management.
    Thanks,
    Satish.

    Hi ,
    have a look on same thread :
    Re: MDM?
    - An
    Better search before posting .

  • What are the implications of using jquery version 1.10.2 rather than the version (1.7.1) that Adobe

    What are the implications of using jquery version 1.10.2 rather than the version (1.7.1) that Adobe uses? Thanks
    Bob

    I am having trouble when my Edge Animate composition (banner ad) appears on a web page that uses jquery version 1.8.23. Some of the functionality of the host page no longer works. This occurs only when my composition is present & the functionality returns when another ad is displayed (either a Flash ad or a gif). It happens in Chrome Version 31.0.1650.63 m, Chrome Version 33.0.1738.0 canary & IE 11.
    I had edited my Edge Animate files to use the Adobe CDN option & to point to another server (mine) so only the html file was needed to be placed in the ad rotator & on the host's server. I now have edited them again to include the Google CDN locations for version jquery 1.10.2 (http://ajax.googleapis.com/ajax/libs/jquery/1.10.2/jquery.min.js). I am waiting for the host site to try this updated html file. When I visit just this new page & the old one that pointed to 1.7.1 for that matter, it works fine.
    Thank you for taking the time to read and answer my message.
    Bob

Maybe you are looking for

  • Oracle RAC Question

    Question about oracle rac. lets say we have a 3 node RAC database and our tnsnames.ora file is configured to point to node 1. If an application is connected to the database using the database connection information that is on the tnsnames.ora file (p

  • CIN - stock transfer

    Hi All, Please let me know is it possible to update registers in case of stock transfer from one plant to another (same comp code) with one step or two step procedures. Here i am not creating any STO-PO and i would like to update RG23Part1 register a

  • ODI Objects Migration from Dev to Test and Prod Enviornments

    Hi , Can someone please advise the order of the steps that have to be followed for ODI code migration form Development to Test and Prod Environments ? Below are the Details , ODI Version : 11.1.1.6.0 Development Environment : 1 Master Repository (M1)

  • Counter in Toggle mode..

    Hello. I want to  count a digital edge using Counter on DAQ-6036E and generate a pulse every 10 edges. Thanksfor your help... Attachments: count.JPG ‏8 KB

  • What's with the Canadian iTunes Store?

    How come there is no blues genre in the Canadian iTunes store. It was easier to find Canadian blues acts in the American store when I lived in the States and was subscribed to that store.