What are the risks when doing a Delete / Re-load of Data in InfoCube?

Hi,
What are the risks/issues when doing a complete Delete / Re-load of Data in InfoCube?
Rgds,
Mark.

We are introducing a new Key Figure to the InfoCube and this KF needs historical data.
The only way I thought this could be achieved was by deleting the data from the InfoCube and re-loading it (It gets loaded from R/3 with no ODS used).
Is this the only way or are there other options in a BW 3.5 environment?

Similar Messages

  • What are the Settings when doing Green Screen?

    I had the green screen settings saved on my computer and somehow they've disappeared. I have been in the meantime just making an educated guess by using these settings:
    Ultra Key Output Composite
    Setting Custom
    Key Color (eyedropper) the green just above the shoulder
    Matte Generation
    Transparency: 50
    Highlight: 0
    Shadow: 50
    Tolerence: 100
    Pedestal: 100
    Matte Cleanup
    choke: 0.0
    Soften: 0.0
    Contrast: 0.0
    Mid Point: 50
    Spill Suppression
    Desaturate: 50
    Range: 25
    Spill: 50
    Luma: 50
    Color Correction
    Saturation: 100
    Hue: 0
    Luminance: 100
    This is my result so far, but I used to have different settings and these were just ones I had to experiment with as I couldn't find the original ones. Here is my upload to YouTube using these settings, I realize I need to invest in more lights which would probably make this process easier:
    link here: http://www.youtube.com/watch?v=n7mGYyQofOg&feature=share&list=UUxdGY8nhB7waymVljxwuEsA
    and this is the green screen only, although this was done in Adobe Premiere Elements 11 and I can't figure out why it's got that black frame:  http://www.youtube.com/watch?v=9zEAOXB5lSQ&feature=share&list=UUxdGY8nhB7waymVljxwuEsA
    This was the green screen shoot that I used the settings that I lost that was given to me from the Adobe Forum some time ago (again I'd have a better result if I had more lighting):
    http://www.youtube.com/watch?v=Y9_VNk8v0ks&feature=share&list=UUxdGY8nhB7waymVljxwuEsA

    No one can tell you what settings to use, it is unique to every single scene (and sometimes changes during the scene as well!). Start with the eydropper, then tweak settings until it looks as good as possible. Move sliders and watch results. I'm sure you can Google up some tutorials on setting the keyer controls.
    As a constructive criticism, I viewed the YouTube videos (keyed and original) and forgetting about keying for a moment, the quality of the clip itself as just a video is very sub-par. I would never even make any attempt to key such a poor quality of source clip. Sorry. And close the shade, the light coming in from the left on the subjects arm is apparently also glaring into the lens and causing the washed out area in middle of image.
    One does not need to spend big bucks on pro lighting. Go down to the hardware store and get some of the those shiny metal bowl type of light fixtures that have a spring clamp on them, less than $10. And get "GE Reveal" bulbs, which create a nice clean light (standard incansdescent bulbs have a reddish cast).
    Get your subject farther from the green background, and light the background separately. Throw some light at the background, as even as possible, such as one light angled in from each side, and then put another light or two on the subject. That is a good starting point. Use manual white balance on camera and get a good focus and you should be in business.
    Good luck
    Jeff

  • I accidentally deleted "empty cache" from safari drop down, what are the keystokes for doing it manually?

    What are the keystokes for doing it manually? or how do you reload it to the drop down menu?

    "Empty cache"  is not available in Safari 6.  (It's not possilble to delete that option from the Safari menu).
    Several workarounds.
    One. From your Safari menu bar click Safari > Preferences then select the Advanced tab.
    Select:  Show Develop menu in menu bar. 
    Now from the Safari menu bar click Develop > Empty Caches
    Or, from the menu bar click Safari > Reset Safari.
    Select:  Clear History  (that empties the cache as well as deleting history. Deselect all the other boxes, then click Reset.
    Unfortunately, Safar 6 omitted the empty cache keyboard shortcut.

  • Internet explorer is required to access some of my financial accounts; what are the risks?  I am running Mac OS X 10.7.2 on a Mac Pro

    Internet explorer is required to access some of my financial accounts; what are the risks?  I am running Mac OS X 10.7.2 on a Mac Pro
    Message was edited by: 74683msn

    Advisable is irrelevant...  It is not possible.  There has not been a version of IE for Mac for a long time.  You will have to load Windows on your Mac in order to run IE, or try making your browser mimic IE.  (In Safari, go to Safari -> Preferences, click the Advanced tab and check the box to show the Develop menu.  Then, in that menu, choose User Agent -> Internet Explorer x.0.)  Note that doing that will not work if the site relies on some weird non-standard feature of IE that no other browser on the planet has.

  • What are the steps to restore all deleted data and settings by remote wipe? Thanks.

    What are the steps to restore all deleted data and settings by Remote wipe?

    Go to me.com, logon and go to the FindMyiPhone. If it does not appear then there is not much you can do.
    Next step would be to appleid.apple.com and change your password to cut off access to your iDisk.

  • What are the risks of jailbreaking?

    What are the risks of jailbreaking?

    Voiding your warranty.  Losing Apple support and support of this form.  Both are guarantees, not risks.
    Bricking your iPad or catching viruses.
    Not beain able to recover to factory default.

  • I want to airplay from macbook pro to apple tv. What are the possibilities? Does it allow me to play movies or videos I access through the browser as well?

    I want to airplay from macbook pro to apple tv. What are the possibilities? Does it allow me to play movies or videos I access through the browser as well?

    Welcome to the Apple Community.
    Only content in your iTunes library can currently be sent via AirPlay from your mac.

  • What are the following entries doing in the following configuration file?

    What are the following entries doing in the following configuration file?
    Thank you
    <include>coherence-pof-config.xml</include>
    <allow-interfaces>true</allow-interfaces>
    <allow-subclasses>true</allow-subclasses>
    <?xml version="1.0"?>
    <!DOCTYPE pof-config SYSTEM "pof-config.dtd">
    <pof-config>
    <user-type-list>
    <!-- coherence POF user types -->
    <include>coherence-pof-config.xml</include>
    <!-- com.tangosol.examples package -->
    <allow-interfaces>true</allow-interfaces>
    <allow-subclasses>true</allow-subclasses>
    </pof-config>

    <allow-interfaces> - The allow-interfaces element indicates whether the user-type class-name can specify Java interface types in addition to Java class types. Valid values are "true" or "false". Default value is false.
    <allow-subclasses> - The allow-subclasses element indicates whether the user-type class-name can specify a Java class type that is abstract, and whether sub-classes of any specified user-type class-name will be permitted at runtime and automatically mapped to the specified super-class for purposes of obtaining a serializer. Valid values are "true" or "false". Default value is false.
    <user-type-list> - The user-type-list element contains zero or more user-type elements. Each POF user type that will be used must be listed in the user-type-list. The user-type-list element may also contain zero or more include elements. Each include element is used to add user-type elements defined in another pof-config file.
    <include> The include element specifies the location of a pof-config file to load user-type elements from. The value is a locator string (either a valid path or URL) that identifies the location of the target pof-config file.
    http://wiki.tangosol.com/display/COH35UG/user-type-list
    http://wiki.tangosol.com/display/COH35UG/pof-config
    Thanks,
    Everett Williams
    Coherence Team

  • What are the following script doing?

    What are the following script doing? What does symbol *<* stand for?
    protected Map<Member, List<String>> divideWork(Set members, List<String>
    fileNames)
    Thank you

    su_penguin wrote:
    Side note: http://en.wikipedia.org/wiki/Operator_overloading
    Extra credit: What trick does Java's syntax use to allow Generics to compile with or without whitespace between the angle brackets? Ex: Map< Member, List< String > >
    Why doesn't it work in C++?Does this have something to do with the comment "Note that it is not an LL(1) grammar"? [http://java.sun.com/docs/books/jls/third_edition/html/syntax.html]

  • What are the advantages of idoc compare to flat file. how data is secure

    what are the advantages of idoc compare to flat file. how data is secure in idocs compare to flat file

    Hi Ramana,
    In simple words, Main advantage with idoc over flat file is security....
    I will explain you some scenario here U got a flat file with all the data...Now u r having the flat file if you want u can modify the data in it, or somehow any one can modify the data in it  if they were able to access this file. That means u maintained the file in the presentation server
    One level of higher security to the above level is maintaining the flat file in application server, at point also even though lot of people r not having the access to that file, super user who is  having  the access may modify the data or delete the data from it rite....
    so in both of those levels u don't have 100% security...
    So there come to the picture of idocs, Idocs simply data carriers, those r generated by a program but not manually...data will be divided into number of segments based upon ur program. So manually its not so easy to modify the data in these idocs. If any changes to be made in the data then u have to modify the data in the application and then u have to update the idoc or you have to generate the new idoc with that corresponding data. so in this case not even super user can manipulate the data directly in the idoc....
    I think u got my point what I mean to say.....
    If you find it useful mark the points
    ~~Guduri

  • What are the steps need to be taken care  for MM data sources  while extrac

    what are the steps need to be taken care  for MM data sources  while extracting  from R/3 tables
    and please provide the Steps involved in R/3 side
    thnaks
    Racha

    Hi,
    For Inventory Management, you can have a look at the following link.
    [https://www.sdn.sap.com/irj/sdn/go/portal/prtroot/docs/library/uuid/f83be790-0201-0010-4fb0-98bd7c01e328]

  • What are the steps  needs to be perform to define a data model

    What are the steps  needs to be perform to define a data model
    a.     Information Gathering 
    b.     Hardware & Software
    c.     Structure the Information – MDM
    d.     Transfer into a Physical Model – BW data model
    e.     Explore use of existing model – Business Content

    Hi Siva,
         Very first activity is Proof of concept (POC), here we have to show How BW works for clients Reporting requirement during POC we as BW consultants need to creat some sample BW back end objects and also some reports based on business requirement. This is very crucial stage as Client Judge wethere BW would meet his demands. If every thing is fine then next step is Bidding.
    After Bidding the contract then actual Project intiates. from here we follow ASAP methodology.
    <u><b>
    Project Preparation</b></u>
    Here Senior Consultant would go to Client place for Business Process Transistion and to know in what way the Architectue should be set up so here Basis People will come into picture.
    <u><b>Blue Print</b></u>
    Transistion could be understood by BRD (Business Requirement Documents) BRD states what is exact requirement and it is given by End users.
               By seeeing thr BRD's we as BW consultants must prepare APPlication Design Documents . The Application Design Documents states all the Technical aspects that needs to be performed as BW backend and also as well as Frontend.
    <u><b>Realization Phase</b></u>
      Here as BW consultants we must start confuguring as mentioned in ADD's by taking care of all performance aspects, once all the configuration are done we do Unit testing. unit testing is an activity where we check all the design process wether it running correct or not. After unit testing we move the design objects to Qulaity for Integration Testing.
    <u><b>Testing</b></u>
        Here end user will check all the objects, reports on end to end basis. after integration testing is done then UAT ( User acceptance Testing) would come into picture where user check each process and sign off.
    <u><b>Go live</b></u>
    Here all the object will be moved to Production where end users and power users can start working on the system. intially for some days Development team would be taking care of all support activites there after  it will be transitoned to support team.
    Hope It helps you.
    Assign Points if it usefull
    Regards
    Sujan

  • What are the Pre-requisite to set Deletion Flag for Maintenance Order ?

    Hi Gurus,
                  Pls give me what are the pre- requisite to set the deletion flag.
                  I want to set deletion flag to some Maintenance Orders which are with notification, but deletion flag - SET,RESET Indiacaors are inactive.    
                  Following are my observations-
                  1) Order is not yet released.
                  2) No actual Cost is with the order.
                  3) No PR and POs are with the Order.
    Pls guide me.
    With best regards,
    narendra

    hi
    you can put the deletion flag only when the order has the status CLSD or the balance of the order must be Zero
    you can refer the following link
    http://help.sap.com/saphelp_47x200/helpdata/en/8d/3e65a0462a11d189000000e8323d3a/content.htm
    regards
    thyagarajan

  • What are the risk involved in Database Migration from Oracle 7 to oracle10G

    HI,
    As a business requirement me are need to migrate our current production database (Oracle 7.3.4) to Oracle 10G R2.
    I need to understand the Risk involved in doing so and corrective action required.
    Your small input is greatly appreciated.
    Thanks in advance.
    Regards,
    Vijay

    As a business requirement me are need to migrate our current production database (Oracle 7.3.4) to Oracle 10G R2.
    There is no risk.
    but you can't upgrade directly from 7 to 10g.
    you need to upgrade first 7 to 9 then 9 to 10g ( i would recommend to go with 11g)
    Or
    If database size is small the best is EXPORT /IMPORT. easy fast safe.
    http://tahiti.oracle.com ===check the upgrade guide for more details.
    You need to test the completely upgrade process on TEST eviourment before doing anything in production.
    becuase a lots of changes between two database version.
    1. You may be face "Performance" issue after upgrade. so need to check properly.
    Regards,
    Taj

  • App Specific Passwords - What Are The Risks?

    Hi,
    I'm quite clear on what app specific passwords are, how they are generated and how to use them with my apps but I have a general query re their potential misuse before I actually go live.
    For instance if I want to use iOS Outlook on my iPhone I need an app specific password to login to get iCloud emails.  Job done.
    But what happens if that app specific password were to get into the wrong hands?
    I understand from other systems using app specific passwords that there could be the loophole potential for this to be used to basically bypass 2 step authentication and login to my Apple ID via say, the iCloud website.  Is this true of the Apple system?
    I assume that if I name the app specific password Outlook then the Apple system isn't going to restrict the use just to the iOS Outlook app on my one specific iPhone and to only the email system in iCloud,  I mean, how can it?
    So if my app specific Outlook password should fall into the wrong hands I assume it can be used by any app on any device to gain access to my iCloud account and data.
    Surely this can't be right and I'm misinterpreting things?  I'd hope that as a minimum it could only be used to gain access to my data and not account details and security specific areas.  Ideally I'd like a way for the password to be limited for use on specific devices and only have access to specific areas of iCloud data.
    It would be nice to try apps that don't yet support the iCloud 2 step authentication without compromising security to the degree where the 2 step authentication is basically a farce.  I assume that 2 step authentication for apps is not available outside the Apple eco system and Apple apps yet.
    Any help greatly appreciated.
    Radar

    Voiding your warranty.  Losing Apple support and support of this form.  Both are guarantees, not risks.
    Bricking your iPad or catching viruses.
    Not beain able to recover to factory default.

Maybe you are looking for

  • Regarding joins in  OBIEE tutorial in Oracle website " COSTS " no key

    OBIEE training material in oracle website ..while . Build Sample Oracle BI Enterprise Edition Reports and Dashboards http://www.oracle.com/technology/obe/obe_bi/bi_ee_1013/bi_admin/biadmin.html#t5 in the documenatation while " *** Load a Prebuilt Rep

  • Skype doesn't work correctly with my IP

    I have a problem with Skype during last month with my IP address. (Of course, I use last version on all of my platforms). One of my account which I use on Windows 8.1, after connecting shows my status like "Offline" (icon rolling "Connectiong..."), a

  • Did Apple send me the wrong RAM??? Doesn't fit!

    I bought 2GB of RAM. I selected MacPro (early 2009) and it told me this is what I need: 2GB 1066MHZ DDR3 ECC 1X2GB-GEN I bought it and it DOESN'T FIT! Did I buy the wrong one? What the ****?!

  • Invoice Plan with ECS

    Hi, Has anyone got a possible solution to using invoice plans with ECS? I am aware that this is not standard functionality - but there may be an add-on in public sector procurement? Many thanks

  • Itunes won't work after upgrading to Mac os x 10.7

    How can i fix itunes, it won't open after upgrading to Mac OX lion??