What info should we maintain in 0014,0015 infotypes...

Hi,
what information and details should we need to put in additional payments and 0015 infotypes..
thanks in advance.
vikram

wagetype,date & amount
~Suresh

Similar Messages

  • MacBook Pro Getting hot... what temperature should it maintain?

    Hi all,
    My MacBook Pro seems to be getting hot lately, the fans seem to 'idle' at around 2,200rpm, but the CPUA temperature is 65*C. This seems a little high to me. The temperature also seems to oscillate quite a bit. As i sit and type this, the fans have maintained 2,200rpm, but the temperature is starting to creep up to 68*C. It then goes above 70*C and the fans whiz up to 4,500 rpm or more until the CPU cools down again. Is this a firmware issue?
    Thanks,
    Glyn

    I have tried some tests, I could not beleive that I've never noticed the fans beforelast week and now they come on almost instantly. So I unplugged everything and turned the MBP on. This time, the fans were settled at below 2,000rpm, and the CPU temperature was 55*C. No fan noise, and noticably cooler chassis.
    So I then started to plug things back in to see if they made any difference... power cable - no problem. iPhone - no problem. Firewire audio interface... ah ha!!! Temperature immediately starts to rise... reaching 65*C within minutes, with nothing else happening.
    I did a few searches and found others with similar issues, however they were claiming it was an issue with the Firewire chip in the MBP. The people on such forums were complaining of an Agere chip.
    So I restarted my MBP and hit COMMAND-S, the Firewire device mentioned in the text list was a Lucent ID 5901. So this appears to be a problem independant of the Firewire chip. Could it be an issue with the software? I have the latest drivers for my Firewire device (Presonus Firebox)
    Thanks
    Glyn

  • What views of Vendor should be maintained in MDM

    Hi Experts,
    During vendor data model what views should be maintained in MDM and what views should be extended in the respective systems.for egs:- vendor has  views such as basic,purchasing ,finance etc.So as per SAP guidelines can anyone recommend me what all views should reside in MDM keeping performance factor in mind.Basically I need some SAP doc to advocate the fact.
    Thanks
    Vinay

    Hi Vinay,
    During vendor data model what views should be maintained in MDM and what views should be extended in the respective systems.for egs:- vendor has views such as basic,purchasing ,finance etc.So as per SAP guidelines can anyone recommend me what all views should reside in MDM keeping performance factor in mind.Basically I need some SAP doc to advocate the fact.
    If you want to get the Vendor data in MDM from R3, the ideal thing you can do is use the business content that has been provided by SAP for Vendor Master.
    Please follow the link below to get the same;
    MDM 5.5 SP06 - Business Content: Vendor (ZIP File)-
    https://websmp102.sap-ag.de/~sapidb/011000358700001119682007E
    It will automatically cover all the fields pertaining to Vendor Master Data which should be taken into MDM.
    If you still want to make any modifications, you can make the changes in the standard business repository for Vendor.
    Take the repository from the zip fiel and keep in the Archive folder of the MDM server and Unarchive the repository.
    Hope it helps.
    Thanks and Regards
    Nitin Jain

  • When to use Infotype 0014 & 0015? what is the differences between them?

    When to use Infotype 0014 & 0015? what is the differences between them?

    Hello
    Infotype 14 is used for recuring payment and deductions
    The wagetype to be used for IT0014 is maintained in VV_52D7_B_0014_AL0 ,against the country grouping.
    IT0014 is always entered with a start date and end date along with the wagetype and amount /unit relevent for payment/deduction
    Say you want to make a special allowance payment to some employee for a period of 6 months only.
    So in IT0014,you will enter the wagetype that is maintained for special allowance  with a start date of say 01.10.2011 to 31.03.2012 with amont as Rs.1000.
    So when you run payroll for the period october 2011 until march 2012,this amount of Rs.1000 will be paid to the employee
    Infotype 15 is used for one time payment or deductions.
    The wagetype to be used for IT0015 is maintained in VV_52D7_B_0015_AL0,against the country grouping
    IT0015 is always entered with an effective date along with the wagetype and amount/unit relevent for payment deduction.
    You want to make performance award pay to employees in the month of march 2012.
    You will enter the amount in IT0015 with the effective date as 31.03.2012 for the wagetype as maintained for performance award ,amount say rs.50000.This amount will be caluclated and paid to the employee as a one time payment in march 2012 payroll
    Thanks and Kind Regards
    Ramana

  • Confused about what I should do about my PC's declining performanc​e.

    I'm very confused on what I should about my PC's declining performance. My desktop computer is a HP Pavilion 20 All-in-one. The original OS was WIN 8, current OS WIN 8.1. I received my computer 11/8/13 and upgraded to WIN 8.1 just a few weeks later due to annoyance of it's pop-ups. The first installation of it failed but the very next day it installed on it's own and was successful. Not to long after that I began to have problems with performance. Lagging, freezes, blank or black screens, poor graphics and choppy audio and app crashes (which were solved under my HP warranty). A few months after the 8.1 upgrade I received a message in HP Support Assistant stating that my computer model was never tested with 8.1 and that could be the cause of my performance issues. The message also came with a compatibility scan which was of no use since 8.1 was already installed, and was recommended to either wait for drivers to become available or uninstall.  I got tired of waiting so Dec. 2014 I did a refresh back to 8 and didn't reinstall the 8.1. I got back my computers excellent performance. Unfortunately that was short lived due to 8.1 automatically reinstalled it's self without an option to decline it, just a warning that in 2 days it'll restart my computer to finish the installation. That happened last week and now my computer is back to poor performance again. The audio is choppy (esp. when playing games), and after a few hours of use a humming sound starts, at first it's choppy (on & off), then it becomes constant. Also sluggish loading and lagging esp. of the mouse curser which happens on and off. I checked the task manager one day while that was happening and the Disk and CPU were turning red and going up to 100% and the Memory also spikes high but not up to 100 (in between spikes MEM stays around 30% maybe that's due to recent install of The Sims 4.  Today I had a critical event happen with the Kernal Power and my computer restarted it's self. Those are the issues that I need help fixing but I also have questions that I hope can be answered here or get pointed in the right direction to an answer. 1) How or where can I get a straight forward answer to the compatibility of my computer with 8.1. When I had HP tech support I asked about the message I received from them and I was told to disregard the message because they are compatible. But after I refreshed back to WIN 8 the message came back and there was a note at the bottom of the page stating that the message could be old and possibly there are drivers available now. So I'm perplexed, if the two are compatible then why am I having the same problems that the message has listed as signs of incompatibility? 2) When I use HP Support Assistant to check for updates no downloads are available but when I use HP's website page software and driver downloads by product. It shows 10 downloads available for driver audio, driver chipset, driver grapics, driver network, BIOS, diagnostic, and software multi-media.  Should I download all of them or do I need to check them out one by one to identify if they're old or new. 3)  When my computer is idle why are background tasks performing scans that show on my action center icon but the stop as soon as the cursor is moved? and how can I identify which background processes & services can be ended or suspended to improve performance while playing high resource using games like The Sims 4? Here is some more info about my PC and thank you for taking out the time to help me.
     20-b313w
     Windows 8.1 64-bit
    AMD E1-2500 APU with Radeon(TM) HD Graphics
    4GB  Micron 1600MHz   
    AMD Radeon HD 8240
    Current resolution 1600 x 900
    Refresh rate 60
    Sys. Board 2AFD 1.02
    Sys. BIOS 80.04
    Hard drive C: ST500DM002-1BD142,  445.78 GB (405.48 GB free)
    D: 17.71 GB (2.16 GB free)
    Audio device Realtek High Definition Audio

    I would suggest that you update your Windows 8 drivers to the Windows 8.1 version drivers.
    I had a look and the Windows 8.1 drivers are all newer versions.
    Start with the Chipset, then Video, then the others, but not BIOS [yet].
    Reboot after each install.
    If performance doesn't seem better after updating your drivers to the Windows 8.1 versions then I suggest you also perform the BIOS update that is also available.
    Pavilion 20-B313W Windows 8.1 Driver Downloads
    If you found my answer helpful please say thanks by clicking on the Thumb's Up icon. Thanks!

  • Equium A210 171 What info do i need before i use the recovery disk?

    Hi,
    I have 1 recovery disk that came with my equium, haven't used it before.
    On the back of the recovery disk envelope it says "insert the first disk"
    I'm assuming there should be a second?
    Also what info will i need to provide during the install process? like serial number?
    All i have is a black and white sticker that's on the side of the box it came in, but that was so long ago.
    I'm having lots of issues with windows installer not running and many others,
    Windows updates won't work either and i've tried to fix those but a clean reinstall of the os was recommended.
    Now at this point nothing will install because windows installer won't work.
    So i think i wil lhave to attempt a clean install, but i'm not even sure the cd drive will work.
    I have gotten a great run out of this laptop, bit slow for my needs today but over all great product, bought in 2007.
    With a clean os and 4 gigs of ram this thing could last for years more, can't afford a new one right now.
    I have really tried to avoid using a recovery disk in the past, as i've never had any serious issues till now.
    Thanks
    Message was edited by: sounds

    > I have 1 recovery disk that came with my equium, haven't used it before.
    >On the back of the recovery disk envelope it says "insert the first disk"
    >I'm assuming there should be a second?
    Im wondering why you get such disk together with your notebook why? Because I did not get the recovery disk but I had to create one using the Toshiba Recovery disk creator software
    But my notebook is newer than your A210 this might be the reason why you got such disk
    I created a recovery disk and I needed two DVD disks I think these depends on the image file size
    > Also what info will i need to provide during the install process? like serial number?
    This is not needed because your system was already activated.
    But I recommend to backup your personal data because the recovery disk would format the whole HDD and you would lose the files.
    PS: recommend reading the other threads in the Product recovery forum!

  • Security!.... What program should I use?

    Suddenly we realize that the bad guys are now targeting the more-n-more popular Apple products.... As I always predicted, it's a matter of when, not if, they start attacking us with malicious stuff.
    So what's the best way to protect our Mac?  I've been using the free ClamXav for a couple years now... I don't see I have Java (but I have some Java Scripts), and my Adobe FlashPlayer is uptodate.
    I use Safari and have a WOT plug in that warns me of dubious websites.
    Am I missing anything? Anything else I should be doing?

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is foremost a problem of human behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • What application should I set to open the Data_Viz Carbon Translator files?

    I was looking over the files in my AW application folder. Quite a few say (in Get Info) that they should be opened with a very old OS 9 game application I happen to have. And also the "Kind" is listed as a document for that same game. That's not right. What Application should I select instead? The path to these files is: AppleWorks 6, AppleWorks Essentials, Translators, Data_Viz Carbon, Translators, and then the files. Some examples of these files are AppleWorks SS 5.0, Excel 97, and Word 5.0-Mac Win.
    Thanks! I have no idea how long this has been this way.

    You do not need to open these files directly. They are used by AppleWorks to translate documents from and to other applications, and you can't do anything with them directly. The claim that they can be opened with some game application is simply the Finder not recognizing them and making a wild guess.

  • How do i reset safari and what items should I check or delete?

    How do I reset safari and what items should I check or delete

    Reset Safari. OS X 10.8 Mountain Lion/ Safari 6
    Click Safari in the menu bar.
    From the drop down select "Reset Safari".
    Check the box beside each item you want to reset.
    No need to check the box beside "Remove saved names and passwords".
    Click "Reset".
    For more info:  http://support.apple.com/kb/PH11914
    Best.

  • What backend should be used?

    well i m developing a card game in java.
    i would like to know for saving the game settings like the cards and variables of the game what backend should i use. i want the application to be fully platform independent and also dont want to use any proprietory s/w like ms access.
    should i store it in a txt/dat file or is there any such compatible db; not talking abt full fledged server kinda dbms like oracle or sql server. just a basic dbms s/w for a small need like this.
    thanx

    It really depends on the scope of the game. Will this be played on the web by many people at a time? Or is this more of a single player desktop app?
    For a dbms MySQL is a free, easy to install and light weight solution. This is my usual go-to light weight dbms.
    Outside of a database, one option is to serialize the objects that contain the states in which you want to save such as player info, card in players hand, and cards in the deck. You just need to make sure those classes implement the Serializable Interface. When the player saves or exits the game, the objects will be serialized saving their state. When the player is ready to start the game again you can deserialize those objects back into java objects on the stack with the same state they had when they were serialized.
    Take a look at the "Serializable" class on the documentation page here [url http://download.oracle.com/javase/6/docs/api/index.html]http://download.oracle.com/javase/6/docs/api/index.html. It is in the Java.io package.
    If you want a Java based DB that is super light wait (very little functionality), can be distributed with your game app, and completely platform independent you can take a look at SmallSQL [url http://www.smallsql.de/]http://www.smallsql.de/. I have not used this one myself but it might do the job you are looking for as well.
    Again, choosing between a DB and data file/serialized objects as well as choosing which DB you should use will depend on the scope of the game. If you are hosting the game, a DB like MySQL will work great. If it is a desktop app than serialization of object or distributing the SmallSQL java DB with you app might be the better choice.
    Edited by: JDScoot on May 15, 2011 12:05 PM

  • What query should be created for this case

    Here are those classes:
    Folder{
        String name;
        @ManyToOne
        Subject owner;
    Subject {
        String name;
    }What query should I create in order to: find out if there is an actual Folder for a Subject with the name X in the database ?
    Actually, the question is kinda stupid, but im not experienced with queries....

    javaUserMuser wrote:
    Here are those classes:
    Folder{
    String name;
    @ManyToOne
    Subject owner;
    Subject {
    String name;
    }What query should I create in order to: find out if there is an actual Folder for a Subject with the name X in the database ?Can't tell based on the info you posted. These are Java objects, and queries deal with relational tables.
    Your naming is confusing. Subject and owner are two very different things.
    If I had two tables like this:
    CREATE TABLE IF NOT EXISTS owners
        owner_id bigint not null auto_increment,
        name varchar(80),
        primary key(owner_id)
    CREATE TABLE IF NOT EXISTS folders
        folder_id bigint not null auto_increment,
        name varchar(80),
        owner_id bigint   
        primary key(folder_id),
        foreign key(owner_id) references(owners)
    );I'd write the JOIN query this way:
    SELECT f.name, o.name
    FROM folders as f, owners as o
    WHERE o.owner_id = ?
    AND o.owner_id = f.owner_idYou realize, of course, that if you're using EJB3 as the annotations suggest, that you don't write any SQL. EJB3 generates it dynamically for you.
    %

  • If I want to keep the quality of the original captured footage(from the tapes),what format should I?

    I captured canon hv20 by firewire to my computer with adobe premiere elements 11. After capture, I have cutted clip three times. Then I want to export my computer because of I watch on my 46 inches full hd lcd television. If I want to keep the quality of the original captured footage (from the tapes), what format should I? I choosen mpeg 1440x1080i 24, it alerts error. Or i chosee avchd 1920x1080p, then it is too larger than captured scenes. I think it is 20000MB but captured scened (without cut) only 11.2 gb. Please help me. Thanks very much.

    YCLCS
    File size and Bitrate and Quality are interrelated. From what I have read, the bitrate for your HDV footage from the PAL Canon HV20 camcorder should be about 25 Mbps (megabits per second). If you did a HDV data capture firewire into Premiere Elements, you should MPEG2.mpg file on the Timeline.
    When you did your export
    Publish+Share
    Computer
    MPEG
    using Presets = MPEG2 1440 x 1080i25, did you make any changes in the settings under the Advanced Button/Video Tab of the preset?
    When you look at the settings in the Export Settings dialog for the MPEG 1440 x 1080i25 preset, you will see the default bitrate settings
    Minimum = 18 Mbps
    Target = 25 Mbps
    Maximum = 30 Mbps
    The program's export bitrate may be higher than that of your source media, resulting in the increased file size. You can check out the bitrate, using the properties readout from a free program such a MediaInfo
    http://mediainfo.sourceforge.net/en
    You could experiment with different bitrate, trying to maintain the quality as you decrease the maximum bitrate from 30 Mbps downward to reduce the file size.
    The file extension of your export should be .m2t, .mpg. So, your export is MPEG2.m2t. I find that that type of file will playback in Windows Media Player, but not QuickTime (latest version). This particular export would be the closest to the source media properties.
    But, right now I would try to perfect the MPEG2 1440 x 1080i25, experimenting with the bitrate to bring the file size into line with the source file and still maintain video quality. The AVCHD.mp4 suggested by Ann Bens is a prime candidate quality wise. If size becomes a factor, you might want to explore a 1920 x 1080i25 or 1440 x 1080i25 Windows Media Video 9.wmv file which we can discuss in more detail depending on how things are going.
    Please review the above and then let us know how we can help.
    Thanks.
    ATR

  • I rec'd a CD with audio files. The suffix is .v09, and they won't play on iTunes. Any idea what I should do?

    I rec'd a CD with audio files. The suffix is .v09, and they won't play on iTunes. Any idea what I should do?
    I have a MacBook, OS X.

    No helpful information seems to be available about this, except that on Windows .v09 indicates an unknown extension - in other words they could be anything. What do you get if you highlight the file and hit command-i - does the info pane give you any file type?
    The best thing would be to ask the person who sent you the CD what they are; if you can't do this you can only try opening it in various programs. Audacity is a free audio editor which can open a number of formats. You could try dragging it to a browser icon in case it's Flash, or try the Windows Media Player. However there's a good chance that it's one of the obscure audio formats, in which case you very likely won't be able to play it.

  • I think someone might be hacking into my account. I changed my password a few times, but I am not entirely sure what I should do next...

    Does anyone know what I can do next and what I should do in the future?
    Thank you so much!

    Turn off any option to 'auto' save or enter you password. Remove your billing info from iTunes.
    Follow the rules as 1 capital letter, lower case letters, numbers, and symbols for your password. Generate a good solid password using those suggestions.
    ie: I am a tree hugger can be  - Imatr33hu66er! - an no - do not use this suggestion as a password.
    MJ

  • What info do I need when I buy an Iphone 4

    What info will I need with me when I go to buy an Iphone. And do I have to have to AT&T account holder with me in order to buy an iPhone and activate it in the store? I might go to best buy or the apple store

    If you go to the Apple Store they will require that the account holder be present to do the upgrade. At least that's the problem I ran into when I tried to get my iPhone 3G. Technically, AT&T does allow Authorized Users to perform upgrades without the account holder present but I do not believe that whatever system Apple has in place allows them to do that (that's the impression I got when I was trying for my iPhone 3G). Best Buy should be able to do it for you if the account holder makes you an Authorized User on the account.

Maybe you are looking for

  • How move file with space in the name to another foler on Linux from ABAP?

    Hi experts, My requirement is to move the file on Linux to another folder via ABAP program. IN SM49 is defined ZMOVE command for "mv" operating system command. In ABAP, fm: SXPG_COMMAND_EXECUTE calls ZMOVE external command to move the file to another

  • Pass a varaible (Place holder) in the Long text of message class

    Hi Gurus, My requirement is to display an error messages using message class for better understanding I am using Long text will it possible to pass a variable (place holder) in the long text if possible means suggest how to pass the variable (we need

  • How can I connect the ipad2 to an Epson Stylus SX445W wifi printer?

    How can I connect the ipad2 to an Epson Stylus SX445W wifi printer? Any help appreciated. Obviously I'm not technically minded so simple... Sorry... Very simple instructions would be great. Thanks

  • Bridge thumbnails, PSCS3

    I just converted 2 NEF files to compressed DNG with raw embedded. At first, the thumbnails never came up, only DNG icons with the correct filename. I purged the folder cache and was able to see a thumbnail for one of the files. Regardless of what I d

  • Photoshop CS 6 is freezing frequently

    PS CS6 has been freezing a lot. I tried uninstalling it and reinstalling it. It started after I installed the plug-in Portrait Professional, however I don't have be using that plug-in for it to happen. I'm using a Mac Pro (not a MacBook Pro), with OS