What is Quarter and Period

Hi Experts,
Can you please difine the below Time Chars
What is Quarter  and Period
Thanks

Quater actually is dependent upon the companies..
it may start from april ..it comprise of 3 months..
0CALDAY Calendar Day
0CALMONTH Calendar Year/Month
0CALMONTH2 Calendar month
0CALQUART1 Quarter
0CALQUARTER Calendar Year/Quarter
0CALWEEK Calendar Year/Week
0CALYEAR Calendar Year
0FISCPER Fiscal year / period
0FISCPER3 Posting period
0FISCVARNT Fiscal year variant
0FISCYEAR Fiscal year
0HALFYEAR1 Halfyear
0WEEKDAY1 Weekday
these are some of the SAP provided standard infoobjects--
0I_CUFQU - current quarter of fiscal year (SAP exit)
0I_P2FQU 0I_P3FQU - current quarter of fiscal year (SAP exit)
0I_PRFQU - Previous quarter of fiscal year(SAP exit).
Period is basically some time span ..
it may consist of 1 month..
basically companies may have 12 periods or 16 ..
hope it helps
Regards
gaurav

Similar Messages

  • What is the exact use of 'Day Balance' and 'Period Balance'??

    Hi All,
    Can any body give me a detail and exact description about 'Day Balance' and 'Period Balance' fields used under 'Base Emtitlement' subtree option of V_T559L.
    Thanks,
    Swapnil
    PS : Points will be rewarded for helpful answers...!

    1. First one has to understand that R3 is OLTP system purely used for transactin processing while BW is used for OLAP ie reporting purpose only. At a table level if we do not have  a redundant second table the R3 system will be over loaded when the OLTP & the OLAP systems access the same table for their respective purposes. So we have to take data from the document table with a time lag and put into the statistical tables so that BW will get the data as and when required.
    2. This question is related to 1 and the above answers both.
    3. V3 is a generic process and is used for data extraction from the R3 transaction tables and can be used for any system as such.
    4. Both the processes are independent of each other and there is no relationship.
    Hope this helps
    Cheers
    Viva
    Assign points if this helps.

  • My Mid 2007 24" iMac has been a bit laggy on Yosemite and getting worse every day, so I went to the Apple Support pages on Apples website looking for help and thought I'd found some. This is what I did and it made everything 100 times worse :(

    So here is what I found and what I did to try to alleviate the RAM eating upgrade named Yosemite. This guy has helped quite a few people, you can read all the comments and I gave it several tries this morning.
    Oct 23, 2014 10:59 AM
    I post this hoping to help those users who, like me, are experiencing high CPU usage and massive memory leaking with OS X core services and apps, leading to slow performance and battery drain.
    I've tried everything mentioned, but found the right combination of steps to follow. I've tried this with seven different Apple computers, including mine, and has worked well so far. I applied this method yesterday to give these process a 24 hour window to fail again, so far everything good.
    First step: disconnect any external or secondary monitors, if any is present. The video memory allocation leak can also happen if you have a system with an integrated card, like Intel, with no external monitors attached.
    Second step: Shut down your machine and enter Safe Mode (press shift once you turn on your computer again, more info below). Once you're there, fix your disk permissions.
    Guide of how to access Safe Mode: OS X: What is Safe Boot, Safe Mode?
    Third step: From Safe Mode turn off your machine again and reset your System Management Controller (SMC). There are different methods, depending on machine, to do this. To know what method applies to yours read the following guide.
    Intel-based Macs: Resetting the System Management Controller (SMC)
    Fourth step: Once your machine completes a full boot after resetting the SMC turn it off again and reset your PRAM (THIS IS THE MOST IMPORTANT STEP, BUT THE PREVIOUS ONES ARE ESSENTIAL FOR THIS ONE TO WORK). The PRAM stores small bits of data that indicate our Apple computer how to interact with the devices connected to it, including monitors and video cards. It also affects software.
    To reset it you should hold the OPTION, COMMAND, P and R keys in your keyboard immediately after turning on your machine again.You'll hear the start up chime, continue pressing the keys until the machine boots and the chime starts A SECOND TIME, then release. IF YOUR YOSEMITE INSTALLATION LOCKS UP AT A BLACK SCREEN AFTER THIS, DONT PANIC! It's normal, just turn off your computer and let it boot again.
    More info about PRAM: OS X Mavericks: Reset your computer’s PRAM
    Voila, reconnect your external displays and enjoy your system.
    Message was edited by: Luis_Mercado
    MacBook Air, OS X Yosemite (10.10)
    So here is my EtreCheck report that is a bit above my head but anything in red isn't good I'm sure. I'd really appreciate some friendly advice
    EtreCheck version: 2.0.11 (98)
    Report generated  at
    Hardware Information: ℹ️
      iMac (24-inch Mid 2007) (Verified)
      iMac - model: iMac7,1
      1 2.4 GHz Intel Core 2 Duo CPU: 2-core
      6 GB RAM Upgradeable
      BANK 0/DIMM0
      4 GB DDR2 SDRAM 667 MHz ok
      BANK 1/DIMM1
      2 GB DDR2 SDRAM 667 MHz ok
      Bluetooth: Old - Handoff/Airdrop2 not supported
      Wireless:  en1: 802.11 a/b/g/n
    Video Information: ℹ️
      ATI,RadeonHD2600 - VRAM: 256 MB
      iMac 1920 x 1200
    System Software: ℹ️
      OS X 10.10 (14A389) - Uptime: 2:34:25
    Disk Information: ℹ️
      WDC WD3200AAJS-40RYA0 disk0 : (320.07 GB)
      S.M.A.R.T. Status: Verified
      EFI (disk0s1) <not mounted> : 210 MB
      Data (disk0s2) /  [Startup]: 319.21 GB (230.04 GB free)
      Recovery HD (disk0s3) <not mounted>  [Recovery]: 650 MB
    USB Information: ℹ️
      VIA Labs, Inc. USB2.0 Hub
      Generic USB Storage
      Western Digital My Passport 0824 2 TB
      S.M.A.R.T. Status: Verified
      EFI (disk2s1) <not mounted> : 210 MB
      Passport Slim (disk2s2) /Volumes/Passport Slim : 2.00 TB (1.62 TB free)
      VIA Labs, Inc. USB2.0 Hub
      Apple Inc. Built-in iSight
      Apple Inc. Bluetooth USB Host Controller
      Logitech USB Receiver
      Apple Computer, Inc. IR Receiver
    Firewire Information: ℹ️
      WD Passport III 800mbit - 800mbit max
      S.M.A.R.T. Status: Verified
      EFI (disk1s1) <not mounted> : 210 MB
      Passport (disk1s2) /Volumes/Passport : 499.76 GB (370.05 GB free)
    Gatekeeper: ℹ️
      Anywhere
    Kernel Extensions: ℹ️
      /Library/Extensions
      [not loaded] com.lge.driver.LGAndroidmdmcontrol (4.15 - SDK 10.10) Support
      [not loaded] com.lge.driver.LGAndroidmdmdata (4.15 - SDK 10.10) Support
      [not loaded] com.lge.driver.LGAndroidndiscontrol (4.15 - SDK 10.10) Support
      [not loaded] com.lge.driver.LGAndroidndisdata (4.15 - SDK 10.10) Support
      [not loaded] com.lge.driver.LGAndroidrndis (4.15 - SDK 10.10) Support
      [not loaded] com.lge.driver.LGAndroidserial (4.15 - SDK 10.10) Support
      [not loaded] com.lge.driver.LGAndroidusbbus (4.15 - SDK 10.10) Support
      /System/Library/Extensions
      [not loaded] com.devguru.driver.SamsungComposite (1.4.26 - SDK 10.6) Support
      [not loaded] com.markspace.iokit.IOMissingSyncMassStorage (199) Support
      [not loaded] com.markspace.missingsync.palmos.classicseize (1) Support
      [not loaded] com.microsoft.driver.MicrosoftKeyboard (6.3) Support
      [not loaded] com.microsoft.driver.MicrosoftMouse (8.2) Support
      [not loaded] com.palm.ClassicNotSeizeDriver (3.2.1) Support
      [loaded] com.wdc.driver.1394.64.10.9 (1.0.1 - SDK 10.9) Support
      [not loaded] com.wdc.driver.1394HP (1.0.5) Support
      [loaded] com.wdc.driver.USB.64.10.9 (1.0.1 - SDK 10.9) Support
      [not loaded] com.wdc.driver.USBHP (1.0.1) Support
      /System/Library/Extensions/MicrosoftKeyboard.kext/Contents/PlugIns
      [not loaded] com.microsoft.driver.MicrosoftKeyboardBluetooth (6.3) Support
      [not loaded] com.microsoft.driver.MicrosoftKeyboardUSB (6.3) Support
      /System/Library/Extensions/MicrosoftMouse.kext/Contents/PlugIns
      [not loaded] com.microsoft.driver.MicrosoftMouseBluetooth (8.2) Support
      [not loaded] com.microsoft.driver.MicrosoftMouseUSB (8.2) Support
      /System/Library/Extensions/ssuddrv.kext/Contents/PlugIns
      [not loaded] com.devguru.driver.SamsungACMControl (1.4.26 - SDK 10.6) Support
      [not loaded] com.devguru.driver.SamsungACMData (1.4.26 - SDK 10.6) Support
      [not loaded] com.devguru.driver.SamsungMTP (1.4.26 - SDK 10.5) Support
      [not loaded] com.devguru.driver.SamsungSerial (1.4.26 - SDK 10.6) Support
    Startup Items: ℹ️
      Cocktail: Path: /Library/StartupItems/Cocktail
      Startup items are obsolete and will not work in future versions of OS X
    Problem System Launch Agents: ℹ️
      [failed] com.apple.security.cloudkeychainproxy.plist
    Problem System Launch Daemons: ℹ️
      [failed] com.apple.ctkd.plist
      [failed] com.apple.ifdreader.plist
      [failed] com.apple.nehelper.plist
      [failed] com.apple.nsurlsessiond.plist
      [failed] com.apple.softwareupdated.plist
      [failed] com.apple.wdhelper.plist
    Launch Agents: ℹ️
      [loaded] com.google.keystone.agent.plist Support
      [loaded] com.hp.help.tocgenerator.plist Support
      [not loaded] com.maintain.LogOut.plist Support
      [loaded] com.maintain.PurgeInactiveMemory.plist Support
      [not loaded] com.maintain.Restart.plist Support
      [not loaded] com.maintain.ShutDown.plist Support
      [not loaded] com.maintain.Sleep.plist Support
      [running] com.maintain.SystemEvents.plist Support
      [loaded] com.oracle.java.Java-Updater.plist Support
      [invalid?] com.tvmobili.artwork.plist Support
      [running] com.wdc.raidmanagerstatusmenu.plist Support
    Launch Daemons: ℹ️
      [loaded] com.adobe.fpsaud.plist Support
      [running] com.bjango.istatserver.plist Support
      [loaded] com.google.keystone.daemon.plist Support
      [loaded] com.hp.lightscribe.plist Support
      [loaded] com.maintain.CocktailScheduler.plist Support
      [loaded] com.maintain.HideSpotlightMenuBarIcon.plist Support
      [loaded] com.oracle.java.Helper-Tool.plist Support
      [loaded] com.oracle.java.JavaUpdateHelper.plist Support
      [invalid?] com.tvmobili.tvmobilisvcd.plist Support
      [running] com.wdc.WDRAIDDriveService.plist Support
      [loaded] com.westerndigital.WD-Drive-Manager-Installer.plist Support
      [loaded] net.freemacsoft.LiteIcon.LIHelperTool.plist Support
    User Launch Agents: ℹ️
      [loaded] com.adobe.ARM.[...].plist Support
      [loaded] com.maintain.ShowUserLibraryDirectory.plist Support
      [loaded] uk.co.markallan.clamxav.freshclam.plist Support
    User Login Items: ℹ️
      Macs Fan Control Application (/Applications/Macs Fan Control.app)
      Solar Service Application (/Users/[redacted]/Library/Application Support/Logitech/SolarService/Solar Service.app)
      Android File Transfer Agent Application (/Users/[redacted]/Library/Application Support/Google/Android File Transfer/Android File Transfer Agent.app)
      WDDriveUtilityHelper Application (/Applications/WD Drive Utilities.app/Contents/WDDriveUtilityHelper.app)
      WD Quick View UNKNOWN (missing value)
    Internet Plug-ins: ℹ️
      Unity Web Player: Version: UnityPlayer version 2.0.2f2 Support
      Default Browser: Version: 600 - SDK 10.10
      Flip4Mac WMV Plugin: Version: 2.4.2.4 Support
      OfficeLiveBrowserPlugin: Version: 12.3.6 Support
      RealPlayer Plugin: Version: Unknown
      Silverlight: Version: 5.1.30514.0 - SDK 10.6 Support
      FlashPlayer-10.6: Version: 15.0.0.223 - SDK 10.6 Support
      DivXBrowserPlugin: Version: 1.4 Support
      Flash Player: Version: 15.0.0.223 - SDK 10.6 Support
      QuickTime Plugin: Version: 7.7.3
      iPhotoPhotocast: Version: 7.0
      AdobePDFViewer: Version: 9.5.5 Support
      JavaAppletPlugin: Version: Java 7 Update 71 Check version
    3rd Party Preference Panes: ℹ️
      Flash Player  Support
      Java  Support
      Microsoft Mouse  Support
      MusicManager  Support
    Time Machine: ℹ️
      Skip System Files: NO
      Mobile backups: ON
      Auto backup: NO - Auto backup turned off
      Volumes being backed up:
      Data: Disk size: 319.21 GB Disk used: 89.17 GB
      Destinations:
      Passport [Local]
      Total size: 499.76 GB
      Total number of backups: 25
      Oldest backup: 2014-05-10 16:56:40 +0000
      Last backup: 2014-11-14 17:38:44 +0000
      Size of backup disk: Adequate
      Backup size 499.76 GB > (Disk used 89.17 GB X 3)
    Top Processes by CPU: ℹ️
          3% WindowServer
          1% Google Chrome Canary
          1% coreaudiod
          0% systemstatsd
          0% ps
    Top Processes by Memory: ℹ️
      174 MB Google Chrome Canary
      84 MB Google Chrome Helper
      64 MB mds_stores
      52 MB Finder
      45 MB iconservicesagent
    Virtual Memory Information: ℹ️
      3.02 GB Free RAM
      1.69 GB Active RAM
      317 MB Inactive RAM
      753 MB Wired RAM
      8.69 GB Page-ins
      156 MB Page-outs
    I hope to hear from anyone even to knock me in the head, lol. Thanks in advance and I'll be around trying to figure this out.

    1. This procedure is a diagnostic test. It changes nothing, for better or worse, and therefore will not, in itself, solve the problem. But with the aid of the test results, the solution may take a few minutes, instead of hours or days.
    Don't be put off by the complexity of these instructions. The process is much less complicated than the description. You do harder tasks with the computer all the time.
    2. If you don't already have a current backup, back up all data before doing anything else. The backup is necessary on general principle, not because of anything in the test procedure. Backup is always a must, and when you're having any kind of trouble with the computer, you may be at higher than usual risk of losing data, whether you follow these instructions or not.
    There are ways to back up a computer that isn't fully functional. Ask if you need guidance.
    3. Below are instructions to run a UNIX shell script, a type of program. As I wrote above, it changes nothing. It doesn't send or receive any data on the network. All it does is to generate a human-readable report on the state of the computer. That report goes nowhere unless you choose to share it. If you prefer, you can act on it yourself without disclosing the contents to me or anyone else.
    You should be wondering whether you can believe me, and whether it's safe to run a program at the behest of a stranger. In general, no, it's not safe and I don't encourage it.
    In this case, however, there are a couple of ways for you to decide whether the program is safe without having to trust me. First, you can read it. Unlike an application that you download and click to run, it's transparent, so anyone with the necessary skill can verify what it does.
    You may not be able to understand the script yourself. But variations of the script have been posted on this website thousands of times over a period of years. The site is hosted by Apple, which does not allow it to be used to distribute harmful software. Any one of the millions of registered users could have read the script and raised the alarm if it was harmful. Then I would not be here now and you would not be reading this message.
    Nevertheless, if you can't satisfy yourself that these instructions are safe, don't follow them. Ask for other options.
    4. Here's a summary of what you need to do, if you choose to proceed:
    ☞ Copy a line of text in this window to the Clipboard.
    ☞ Paste into the window of another application.
    ☞ Wait for the test to run. It usually takes a few minutes.
    ☞ Paste the results, which will have been copied automatically, back into a reply on this page.
    The sequence is: copy, paste, wait, paste again. You don't need to copy a second time. Details follow.
    5. You may have started the computer in "safe" mode. Preferably, these steps should be taken in “normal” mode, under the conditions in which the problem is reproduced. If the system is now in safe mode and works well enough in normal mode to run the test, restart as usual. If you can only test in safe mode, do that.
    6. If you have more than one user, and the one affected by the problem is not an administrator, then please run the test twice: once while logged in as the affected user, and once as an administrator. The results may be different. The user that is created automatically on a new computer when you start it for the first time is an administrator. If you can't log in as an administrator, test as the affected user. Most personal Macs have only one user, and in that case this section doesn’t apply. Don't log in as root.
    7. The script is a single long line, all of which must be selected. You can accomplish this easily by triple-clicking anywhere in the line. The whole line will highlight, though you may not see all of it in the browser window, and you can then copy it. If you try to select the line by dragging across the part you can see, you won't get all of it.
    Triple-click anywhere in the line of text below on this page to select it:
    PATH=/usr/bin:/bin:/usr/sbin:/sbin:/usr/libexec;clear;cd;p=(Software Hardware Memory Diagnostics Power FireWire Thunderbolt USB Fonts SerialATA 4 1000 25 5120 KiB/s 1024 85 \\b%% 20480 1 MB/s 25000 ports ' com.clark.\* \*dropbox \*genieo\* \*GoogleDr\* \*k.AutoCAD\* \*k.Maya\* vidinst\* ' DYLD_INSERT_LIBRARIES\ DYLD_LIBRARY_PATH -86 "` route -n get default|awk '/e:/{print $2}' `" 25 N\\/A down up 102400 25600 recvfrom sendto CFBundleIdentifier 25 25 25 1000 MB ' com.adobe.AAM.Updater-1.0 com.adobe.AdobeCreativeCloud com.adobe.CS4ServiceManager com.adobe.CS5ServiceManager com.adobe.fpsaud com.adobe.SwitchBoard com.apple.aelwriter com.apple.AirPortBaseStationAgent com.apple.FolderActions.enabled com.apple.FolderActions.folders com.apple.installer.osmessagetracing com.apple.mrt.uiagent com.apple.ReportCrash.Self com.apple.rpmuxd com.apple.SafariNotificationAgent com.apple.usbmuxd com.google.keystone.agent com.google.keystone.daemon com.microsoft.office.licensing.helper com.oracle.java.Helper-Tool com.oracle.java.JavaUpdateHelper ' ' 879294308 461455494 3627668074 1083382502 1274181950 1855907737 1848501757 464843899 3694147963 1417519526 1233118628 2456546649 2806998573 2778718105 2636415542 842973933 3301885676 891055588 998894468 695903914 4136085286 ' 51 5120 files );N5=${#p[@]};p[N5]=` networksetup -listnetworkserviceorder|awk ' NR>1 { sub(/^\([0-9]+\) /,"");n=$0;getline;} $NF=="'${p[26]}')" { sub(/.$/,"",$NF);print n;exit;} ' `;f=('\n%s: %s\n' '\n%s\n\n%s\n' '\nRAM details\n%s\n' %s\ %s '%s\n-\t%s\n' );S0() { echo ' { q=$NF+0;$NF="";u=$(NF-1);$(NF-1)="";gsub(/^ +| +$/,"");if(q>='${p[$1]}') printf("%s (UID %s) is using %s '${p[$2]}'",$0,u,q);} ';};s=(' s/[0-9A-Za-z._]+@[0-9A-Za-z.]+\.[0-9A-Za-z]{2,4}/EMAIL/g;/faceb/s/(at\.)[^.]+/\1NAME/g;/\/Shared/!s/(\/Users\/)[^ /]+/\1USER/g;s/[-0-9A-Fa-f]{22,}/UUID/g;' ' s/^ +//;/de: S|[nst]:/p;' ' {sub(/^ +/,"")};/er:/;/y:/&&$2<'${p[10]} ' 1s/://;3,6d;/[my].+:/d;s/^ {4}//;H;${ g;s/\n$//;/s: (E[^m]|[^EO])|x([^08]|02[^F]|8[^0])/p;} ' ' 5h;6{ H;g;/P/!p;} ' ' ($1~/^Cy/&&$3>'${p[11]}')||($1~/^Cond/&&$2!~/^N/) ' ' /:$/{ N;/:.+:/d;s/ *://;b0'$'\n'' };/^ *(V.+ [0N]|Man).+ /{ s/ 0x.... //;s/[()]//g;s/(.+: )(.+)/ (\2)/;H;};$b0'$'\n'' d;:0'$'\n'' x;s/\n\n//;/Apple[ ,]|Genesy|Intel|SMSC/d;s/\n.*//;/\)$/p;' ' s/^.*C/C/;H;${ g;/No th|pms/!p;} ' '/= [^GO]/p' '{$1=""};1' ' /Of/!{ s/^.+is |\.//g;p;} ' ' $0&&!/ / { n++;print;} END { if(n<10) print "com.apple.";} ' ' { sub(/ :/,"");print|"tail -n'${p[12]}'";} ' ' NR==2&&$4<='${p[13]}' { print $4;} ' ' END { $2/=256;if($2>='${p[15]}') print int($2) } ' ' NR!=13{next};{sub(/[+-]$/,"",$NF)};'"`S0 21 22`" 'NR!=2{next}'"`S0 37 17`" ' NR!=5||$8!~/[RW]/{next};{ $(NF-1)=$1;$NF=int($NF/10000000);for(i=1;i<=3;i++){$i="";$(NF-1-i)="";};};'"`S0 19 20`" 's:^:/:p' '/\.kext\/(Contents\/)?Info\.plist$/p' 's/^.{52}(.+) <.+/\1/p' ' /Launch[AD].+\.plist$/ { n++;print;} END { if(n<200) print "/System/";} ' '/\.xpc\/(Contents\/)?Info\.plist$/p' ' NR>1&&!/0x|\.[0-9]+$|com\.apple\.launchctl\.(Aqua|Background|System)$/ { print $3;} ' ' /\.(framew|lproj)|\):/d;/plist:|:.+(Mach|scrip)/s/:[^:]+//p ' '/^root$/p' ' !/\/Contents\/.+\/Contents|Applic|Autom|Frameworks/&&/Lib.+\/Info.plist$/ { n++;print;} END { if(n<1100) print "/System/";} ' '/^\/usr\/lib\/.+dylib$/p' ' /Temp|emac/{next};/(etc|Preferences|Launch[AD].+)\// { sub(".(/private)?","");n++;print;} END { split("'"${p[41]}"'",b);split("'"${p[42]}"'",c);for(i in b) print b[i]".plist\t"c[i];if(n<500) print "Launch";} ' ' /\/(Contents\/.+\/Contents|Frameworks)\/|\.wdgt\/.+\.([bw]|plu)/d;p;' 's/\/(Contents\/)?Info.plist$//;p' ' { gsub("^| |\n","\\|\\|kMDItem'${p[35]}'=");sub("^...."," ") };1 ' p '{print $3"\t"$1}' 's/\'$'\t''.+//p' 's/1/On/p' '/Prox.+: [^0]/p' '$2>'${p[43]}'{$2=$2-1;print}' ' BEGIN { i="'${p[26]}'";M1='${p[16]}';M2='${p[18]}';M3='${p[31]}';M4='${p[32]}';} !/^A/{next};/%/ { getline;if($5<M1) a="user "$2"%, system "$4"%";} /disk0/&&$4>M2 { b=$3" ops/s, "$4" blocks/s";} $2==i { if(c) { d=$3+$4+$5+$6;next;};if($4>M3||$6>M4) c=int($4/1024)" in, "int($6/1024)" out";} END { if(a) print "CPU: "a;if(b) print "I/O: "b;if(c) print "Net: "c" (KiB/s)";if(d) print "Net errors: "d" packets/s";} ' ' /r\[0\] /&&$NF!~/^1(0|72\.(1[6-9]|2[0-9]|3[0-1])|92\.168)\./ { print $NF;exit;} ' ' !/^T/ { printf "(static)";exit;} ' '/apsd|BKAg|OpenD/!s/:.+//p' ' (/k:/&&$3!~/(255\.){3}0/ )||(/v6:/&&$2!~/A/ ) ' ' $1~"lR"&&$2<='${p[25]}';$1~"li"&&$3!~"wpa2";' ' BEGIN { FS=":";p="uniq -c|sed -E '"'s/ +\\([0-9]+\\)\\(.+\\)/\\\2 x\\\1/;s/x1$//'"'";} { n=split($3,a,".");sub(/_2[01].+/,"",$3);print $2" "$3" "a[n]$1|p;b=b$1;} END { close(p);if(b) print("\n\t* Code injection");} ' ' NR!=4{next} {$NF/=10240} '"`S0 27 14`" ' END { if($3~/[0-9]/)print$3;} ' ' BEGIN { L='${p[36]}';} !/^[[:space:]]*(#.*)?$/ { l++;if(l<=L) f=f"\n   "$0;} END { F=FILENAME;if(!F) exit;if(!f) f="\n   [N/A]";"cksum "F|getline C;split(C, A);C="checksum "A[1];"file -b "F|getline T;if(T!~/^(AS.+ (En.+ )?text(, with v.+)?$|(Bo|PO).+ sh.+ text ex|XM)/) F=F" ("T", "C")";else F=F" ("C")";printf("\nContents of %s\n%s\n",F,f);if(l>L) printf("\n   ...and %s more line(s)\n",l-L);} ' ' s/^ ?n...://p;s/^ ?p...:/-'$'\t''/p;' 's/0/Off/p' ' END{print NR} ' ' /id: N|te: Y/{i++} END{print i} ' ' / / { print "'"${p[28]}"'";exit;};1;' '/ en/!s/\.//p' ' NR!=13{next};{sub(/[+-M]$/,"",$NF)};'"`S0 39 40`" ' $10~/\(L/&&$9!~"localhost" { sub(/.+:/,"",$9);print $1": "$9|"sort|uniq";} ' '/^ +r/s/.+"(.+)".+/\1/p' 's/(.+\.wdgt)\/(Contents\/)?Info\.plist$/\1/p' 's/^.+\/(.+)\.wdgt$/\1/p' ' /l: /{ /DVD/d;s/.+: //;b0'$'\n'' };/s: /{ /V/d;s/^ */- /;H;};$b0'$'\n'' d;:0'$'\n'' x;/APPLE [^:]+$/d;p;' ' /^find: /d;p;' "`S0 44 45`" ' BEGIN{FS="= "} /Path/{print $2} ' ' /^ *$/d;s/^ */   /;' ' s/^.+ |\(.+\)$//g;p ' '/\.(appex|pluginkit)\/Contents\/Info\.plist$/p' ' /2/{print "WARN"};/4/{print "CRITICAL"};' 's/^.+: //p' );c1=(system_profiler pmset\ -g nvram fdesetup find syslog df vm_stat sar ps sudo\ crontab sudo\ iotop top pkgutil 'PlistBuddy 2>&1 -c "Print' whoami cksum kextstat launchctl sudo\ launchctl crontab 'sudo defaults read' stat lsbom mdfind ' for i in ${p[24]};do ${c1[18]} ${c2[27]} $i;done;' defaults\ read scutil sudo\ dtrace sudo\ profiles sed\ -En awk /S*/*/P*/*/*/C*/*/airport networksetup mdutil sudo\ lsof test osascript\ -e sysctl\ -n pluginkit sudo\ smcDiagnose );c2=(com.apple.loginwindow\ LoginHook '" /L*/P*/loginw*' "'tell app \"System Events\" to get properties of login items'|tr , \\\n" 'L*/Ca*/com.ap*.Saf*/E*/* -d 1 -name In*t -exec '"${c1[14]}"' :CFBundleDisplayName" {} \;|sort|uniq' '~ $TMPDIR.. \( -flags +sappnd,schg,uappnd,uchg -o ! -user $UID -o ! -perm -600 \)' '.??* -path .Trash -prune -o -type d -name *.app -print -prune' :${p[35]}\" :Label\" '{/,}L*/{Con,Pref}* -type f ! -size 0 -name *.plist -exec plutil -s {} \;' "-f'%N: %l' Desktop L*/Keyc*" therm sysload boot-args status " -F '\$Time \$(RefProc): \$Message' -k Sender kernel -k Message Req 'bad |Beac|caug|corru|dead[^bl]|FAIL|fail|GPU |hfs: Ru|inval|jnl:|last value [1-9]|n Cause: -|NVDA\(|pagin|proc: t|Roamed|rror|ssert|Thrott|tim(ed? ?|ing )o|WARN' -k Message Rne 'Goog|ksadm|Roame|SMC:|suhel| VALI|ver-r|xpma' -o -o -k Sender fseventsd -k Message Req SL -o -k Sender Req launchd -k Message Req de: " '-du -n DEV -n EDEV 1 10' 'acrx -o comm,ruid,%cpu' '-t1 10 1' '-f -pfc /var/db/r*/com.apple.*.{BS,Bas,Es,J,OSXU,Rem,up}*.bom' '{/,}L*/Lo*/Diag* -type f -regex .\*[cght] ! -name .?\* ! -name \*ag \( -exec grep -lq "^Thread c" {} \; -exec printf \* \; -o -true \) -execdir stat -f:%Sc:%N -t%F {} \;|sort -t: -k2 |tail -n'${p[38]} '/S*/*/Ca*/*xpc* >&- ||echo No' '-L /{S*/,}L*/StartupItems -type f -exec file {} +' '-L /S*/L*/{C*/Sec*A,Ex}* {/,}L*/{A*d,Ca*/*/Ex,Co{mpon,reM},Ex,In{p,ter},iTu*/*P,Keyb,Mail/B,Pr*P,Qu*T,Scripti,Sec,Servi,Spo,Widg}* -path \\*s/Resources -prune -o -type f -name Info.plist' '/usr/lib -type f -name *.dylib' `awk "${s[31]}"<<<${p[23]}` "/e*/{auto,{cron,fs}tab,hosts,{[lp],sy}*.conf,mach_i*/*,pam.d/*,ssh{,d}_config,*.local} {,/usr/local}/etc/periodic/*/* /L*/P*{,/*}/com.a*.{Bo,sec*.ap}*t {/S*/,/,}L*/Lau*/*t .launchd.conf" list getenv /Library/Preferences/com.apple.alf\ globalstate --proxy '-n get default' -I --dns -getdnsservers\ "${p[N5]}" -getinfo\ "${p[N5]}" -P -m\ / '' -n1 '-R -l1 -n1 -o prt -stats command,uid,prt' '--regexp --only-files --files com.apple.pkg.*|sort|uniq' -kl -l -s\ / '-R -l1 -n1 -o mem -stats command,uid,mem' '+c0 -i4TCP:0-1023' com.apple.dashboard\ layer-gadgets '-d /L*/Mana*/$USER&&echo On' '-app Safari WebKitDNSPrefetchingEnabled' "+c0 -l|awk '{print(\$1,\$3)}'|sort|uniq -c|sort -n|tail -1|awk '{print(\$2,\$3,\$1)}'" -m 'L*/{Con*/*/Data/L*/,}Pref* -type f -size 0c -name *.plist.???????|wc -l' kern.memorystatus_vm_pressure_level '3>&1 >&- 2>&3' );N1=${#c2[@]};for j in {0..9};do c2[N1+j]=SP${p[j]}DataType;done;N2=${#c2[@]};for j in 0 1;do c2[N2+j]="-n ' syscall::'${p[33+j]}':return { @out[execname,uid]=sum(arg0) } tick-10sec { trunc(@out,1);exit(0);} '";done;l=(Restricted\ files Hidden\ apps 'Elapsed time (s)' POST Battery Safari\ extensions Bad\ plists 'High file counts' User Heat System\ load boot\ args FileVault Diagnostic\ reports Log 'Free space (MiB)' 'Swap (MiB)' Activity 'CPU per process' Login\ hook 'I/O per process' Mach\ ports kexts Daemons Agents XPC\ cache Startup\ items Admin\ access Root\ access Bundles dylibs Apps Font\ issues Inserted\ dylibs Firewall Proxies DNS TCP/IP Wi-Fi Profiles Root\ crontab User\ crontab 'Global login items' 'User login items' Spotlight Memory Listeners Widgets Parental\ Controls Prefetching SATA Descriptors App\ extensions Lockfiles Memory\ pressure SMC );N3=${#l[@]};for i in 0 1 2;do l[N3+i]=${p[5+i]};done;N4=${#l[@]};for j in 0 1;do l[N4+j]="Current ${p[29+j]}stream data";done;A0() { id -G|grep -qw 80;v[1]=$?;((v[1]==0))&&sudo true;v[2]=$?;v[3]=`date +%s`;clear >&-;date '+Start time: %T %D%n';};for i in 0 1;do eval ' A'$((1+i))'() { v=` eval "${c1[$1]} ${c2[$2]}"|'${c1[30+i]}' "${s[$3]}" `;[[ "$v" ]];};A'$((3+i))'() { v=` while read i;do [[ "$i" ]]&&eval "${c1[$1]} ${c2[$2]}" \"$i\"|'${c1[30+i]}' "${s[$3]}";done<<<"${v[$4]}" `;[[ "$v" ]];};A'$((5+i))'() { v=` while read i;do '${c1[30+i]}' "${s[$1]}" "$i";done<<<"${v[$2]}" `;[[ "$v" ]];};';done;A7(){ v=$((`date +%s`-v[3]));};B2(){ v[$1]="$v";};for i in 0 1;do eval ' B'$i'() { v=;((v['$((i+1))']==0))||{ v=No;false;};};B'$((3+i))'() { v[$2]=`'${c1[30+i]}' "${s[$3]}"<<<"${v[$1]}"`;} ';done;B5(){ v[$1]="${v[$1]}"$'\n'"${v[$2]}";};B6() { v=` paste -d: <(printf "${v[$1]}") <(printf "${v[$2]}")|awk -F: ' {printf("'"${f[$3]}"'",$1,$2)} ' `;};B7(){ v=`grep -Fv "${v[$1]}"<<<"$v"`;};C0() { [[ "$v" ]]&&sed -E "$s"<<<"$v";};C1() { [[ "$v" ]]&&printf "${f[$1]}" "${l[$2]}" "$v"|sed -E "$s";};C2() { v=`echo $v`;[[ "$v" != 0 ]]&&C1 0 $1;};C3() { v=`sed -E "${s[63]}"<<<"$v"`&&C1 1 $1;};for i in 1 2;do for j in 0 2 3;do eval D$i$j'(){ A'$i' $1 $2 $3; C'$j' $4;};';done;done;{ A0;D20 0 $((N1+1)) 2;D10 0 $N1 1;B0;C2 27;B0&&! B1&&C2 28;D12 15 37 25 8;A1 0 $((N1+2)) 3;C0;D13 0 $((N1+3)) 4 3;D23 0 $((N1+4)) 5 4;D13 0 $((N1+9)) 59 50;for i in 0 1 2;do D13 0 $((N1+5+i)) 6 $((N3+i));done;D13 1 10 7 9;D13 1 11 8 10;B1&&D13 40 53 67 55;D22 2 12 9 11;D12 3 13 10 12;D23 4 19 44 13;D23 5 14 12 14;D22 6 36 13 15;D22 38 52 66 54;D22 7 37 14 16;D23 8 15 38 17;D22 9 16 16 18;B1&&{ D22 35 49 61 51;D22 11 17 17 20;for i in 0 1;do D22 28 $((N2+i)) 45 $((N4+i));done;};D22 12 44 54 45;D22 12 39 15 21;A1 13 40 18;B2 4;B3 4 0 19;A3 14 6 32 0;B4 0 5 11;A1 17 41 20;B7 5;C3 22;B4 4 6 21;A3 14 7 32 6;B4 0 7 11;B3 4 0 22;A3 14 6 32 0;B4 0 8 11;B5 7 8;B1&&{ A2 19 26 23;B7 7;C3 23;};A2 18 26 23;B7 7;C3 24;D13 4 21 24 26;B4 4 12 26;B3 4 13 27;A1 4 22 29;B7 12;B2 14;A4 14 6 52 14;B2 15;B6 14 15 4;B3 0 0 30;C3 29;A1 4 23 27;B7 13;C3 30;B3 4 0 65;A3 14 6 32 0;B4 0 16 11;A1 39 50 64;B7 16;C3 52;D13 24 24 32 31;D13 25 37 32 33;A2 23 18 28;B2 16;A2 16 25 33;B7 16;B3 0 0 34;B2 21;A6 47 21&&C0;B1&&{ D13 21 0 32 19;D13 10 42 32 40;D22 29 35 46 39;};D23 14 1 62 42;D12 34 43 53 44;D12 22 20 32 25;D22 0 $((N1+8)) 51 32;D13 4 8 41 6;D12 26 28 35 34;D13 27 29 36 35;A2 27 32 39&&{ B2 19;A2 33 33 40;B2 20;B6 19 20 3;};C2 36;D23 33 34 42 37;B1&&D23 35 45 55 46;D23 32 31 43 38;D12 36 47 32 48;D13 20 42 32 41;D13 37 2 48 43;D13 4 5 32 1;D13 4 3 60 5;D12 26 48 49 49;B3 4 22 57;A1 26 46 56;B7 22;B3 0 0 58;C3 47;D22 4 4 50 0;D12 4 51 32 53;D23 22 9 37 7;A7;C2 2;} 2>/dev/null|pbcopy;exit 2>&-
    Copy the selected text to the Clipboard by pressing the key combination command-C.
    8. Launch the built-in Terminal application in any of the following ways:
    ☞ Enter the first few letters of its name into a Spotlight search. Select it in the results (it should be at the top.)
    ☞ In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. The application is in the folder that opens.
    ☞ Open LaunchPad. Click Utilities, then Terminal in the icon grid.
    Click anywhere in the Terminal window and paste by pressing command-V. The text you pasted should vanish immediately. If it doesn't, press the return key.
    9. If you see an error message in the Terminal window such as "Syntax error" or "Event not found," enter
    exec bash
    and press return. Then paste the script again.
    10. If you're logged in as an administrator, you'll be prompted for your login password. Nothing will be displayed when you type it. You will not see the usual dots in place of typed characters. Make sure caps lock is off. Type carefully and then press return. You may get a one-time warning to be careful. If you make three failed attempts to enter the password, the test will run anyway, but it will produce less information. In most cases, the difference is not important. If you don't know the password, or if you prefer not to enter it, press the key combination control-C or just press return  three times at the password prompt. Again, the script will still run.
    If you're not logged in as an administrator, you won't be prompted for a password. The test will still run. It just won't do anything that requires administrator privileges.
    11. The test may take a few minutes to run, depending on how many files you have and the speed of the computer. A computer that's abnormally slow may take longer to run the test. While it's running, there will be nothing in the Terminal window and no indication of progress. Wait for the line
    [Process completed]
    to appear. If you don't see it within half an hour or so, the test probably won't complete in a reasonable time. In that case, close the Terminal window and report what happened. No harm will be done.
    12. When the test is complete, quit Terminal. The results will have been copied to the Clipboard automatically. They are not shown in the Terminal window. Please don't copy anything from there. All you have to do is start a reply to this comment and then paste by pressing command-V again.
    At the top of the results, there will be a line that begins with the words "Start time." If you don't see that, but instead see a mass of gibberish, you didn't wait for the "Process completed" message to appear in the Terminal window. Please wait for it and try again.
    If any private information, such as your name or email address, appears in the results, anonymize it before posting. Usually that won't be necessary.
    13. When you post the results, you might see an error message on the web page: "You have included content in your post that is not permitted," or "You are not authorized to post." That's a bug in the forum software. Please post the test results on Pastebin, then post a link here to the page you created.
    14. This is a public forum, and others may give you advice based on the results of the test. They speak only for themselves, and I don't necessarily agree with them.
    Copyright © 2014 by Linc Davis. As the sole author of this work, I reserve all rights to it except as provided in the Use Agreement for the Apple Support Communities website ("ASC"). Readers of ASC may copy it for their own personal use. Neither the whole nor any part may be redistributed.

  • OSS note 506603 What is it And where can I get it?

    Hello,
    I am trying to create my form with a SAP Table wizard connection, when I try to use the Table wizard I got the error: "No such interface supported". I can see in a lot of comments the solution is on OSS note 506603. I was trying to find this patch in the sdn site but I could not find it. I am not sure if it is a document, an exe file, a dll,,, and when I see the same question asking where to get the OSS note 506603 there is no answer, could somebody help me telling me what is this and where can I get the patch? I would really appreciate it.
    Many thanks.

    Hi Eden,
    How are you doing ?
    OSS note is the older nomenclature for what is now SAP Notes.
    They are available at :
    http://service.sap.com/notes
    you will need a service marketplace user id to log on.
    alternatively, if you do not have access to service.marketplace.
    send me an email [view my business card], i will reply with the patch. it is a few hundred kb.
    with respect,
    amit
    the note number 506603 :-
    Summary
    Symptom
    Additional information for SAP.Net Connector that was not included in the guide.
    Other terms
    SAP .NET Connector, Proxy Wizard
    Solution
    SAP.NET Connector Version 1.0 has been available since Nov 21, 2002. You can download the software from http://service.sap.com/connectors.
    Version 2.0 is also available. Use only the new version for new developments.
    Report any problems with the SAP.NET Connector under the components:
    BC-MID-CON-DNW for problems with the .NET Proxy Wizard for Visual Studio.NET.
    BC-MID-CON-DNC for problems with Communication Runtime.
    Known problems
    1. The Proxy Wizard terminates with the error message "Exception caught in method createFunction for DD_GET_UCLEN Reason: null".
    This is caused by a missing function module, which can be installed as described in Note 580834.
    2. Corrections for SAP.NET Connector 1.0
    The updated version corrects various problems that have been noted during the interim period. You can download it from http://service.sap.com/connectors. To install this version, see the "Release Notes" file. For SAP.NET Connect 1.x, the newest patch-version is called "1.0.3".
    3. Corrections for SAP.NET Connector 2.0
    For Visual Studio Integration (Design Time) following problems have occurred:
    For proxies with several functions, the following runtime error can occur under certain circumstances: "Method xyz can not be reflected." The cause is a combination of an error in the .NET framework and the way in which the proxy generator uses XML-attributes.
    The SAP wizard table does not work. Existing tables are not recognized.
    Both problems are solved by the patch attached to this note. Stop all instances of Visual Studio and unpack the ZIP file into the "%Program Files%\Microsoft Visual Studio .NET 2003/Common7/IDE" directory, whereby the "SAP.Connector.Design.DLL" file is replaced.
    Header Data
    Release Status: Released for Customer
    Released on: 10.12.2004  16:40:26
    Priority: Recommendations/additional info
    Category: Installation information
    Primary Component: BC-OP-NET-NCO SAP .Net Connector
    Secondary Components: BC-OP-NET-VS Visual Studio .Net Connector Wizard
    Message was edited by:
            amit chawathe

  • How to compare a Date data with Current Year and Period Member on FIX

    Hi experts,
    I have a Project dim that each member is a Project (P01, P02...)
    and Account dim that stores information of the each Project (Name, Start date, Finished Date...)
    Finished Date member is in Date data type
    So how can write a IF condition below in order to compare Project Finished Date with Current Year and Period members on FIX
    FIX (@Descendants(Projects), Descendants(All Year), Descendants("Year Total")...)
    IF (@CURRMBR(Period)->@CURRMBR(Year) < Project->FinishedDate)
    Do something...
    Else
    Do something
    Please help me on this. Sorry for my bad grammar. Please ask if there is anything unclear
    Many thanks,
    Huy Van.
    Edited by: Huy Van on Jan 29, 2013 1:14 AM
    Edited by: Huy Van on Jan 29, 2013 2:24 AM
    Edited by: Huy Van on Jan 29, 2013 2:25 AM
    Edited by: Huy Van on Jan 29, 2013 6:04 PM

    Here is what I have done. Post for whom may concern later
    VAR FM; /* Finished Month of Project*/
    VAR FY; /* Finished Year of Project */
    VAR CM; /* Capture Current Month on FIX statments */
    VAR CY; /* Capture Current Year on FIX statments*/
    FIX ( @RELATIVE( "Year", 0), @RELATIVE( "Period", 0), @IDescendants( "Base Projects")....)
    FY = @ROUND( "TGHT"->"NA Contract"->"FY06"->"NA Period" / 10000, 0);
    FM = @MOD( @ROUND( "TGHT"->"NA Contract"->"FY06"->"NA Period" / 100, 0), 100);
    /* For FY13 return 13... */
    CY = @JgetDoubleFromString( @CONCATENATE( "20", @SUBSTRING( @NAME( @CURRMBRRANGE( Year, Lev, 0, 0, 0)), 2)));
    /* Set CM value based on currrent Period On FIX statement */
    IF ( @ISMBR( "Jan"))
    CM = 1;
    ELSEIF ( @ISMBR( "Feb"))
    CM = 2;
    ELSEIF ( @ISMBR( "Dec"))
    CM = 12;
    ENDIF
    IF ( CY < FY OR ( CY == FY AND CM < FM))
    Do something...
    ELSE
    Do something...
    ENDIF
    ENDFIX
    Edited by: Huy Van on Feb 19, 2013 11:10 PM
    Edited by: Huy Van on Feb 20, 2013 7:46 PM

  • In Material Master Screen,functionally what is BAckward Consumption period

    In Material Master Screen,functionally what is BAckward Consumption period & Forward Consumption period in the MRP Screen.Pls explain its functionality

    Hi,
    The safety time / actual range of coverage ensures that the planned warehouse stock covers the requirements of a defined number of days. It therefore serves as a time float and thus works alongside the safety stock, which acts as quantity float.
    The system simulates bringing the requirements forward by the specified number of days and the planning for the receipts, created for these requirements in the planning run, is also brought forward by this number of days.
    Prerequisites
    ·   You have set the Safety Time indicator in the material master record (MRP 2 View) to define whether the safety time is only to apply to independent requirements or to all requirements.
    ·    In the material master record (MRP 2 View), in the Safety Time/Actual Range of Coverage field, you have entered the number of workdays by which the requirements are to be brought forward.
    ·    If, in addition to this actual range of coverage, you also want to define a different number of workdays in certain periods or a safety time less than one day then, in Customizing for MRP in the activity Define Period Profile for Safety Time/Actual Range of Coverage you can define a period profile and assign it to the material in the material master record.
    Regards,
    Vijay

  • What are valid and invalid email address characters

    What are valid and invalid email address characters in Exchange 2010, for example can you have Conan.O'[email protected] is there a document that shows the valid and invalid sysmbols?

    Hi
        The format of email addresses is
    local-part@domain where the local-part may be up to 64 characters long and the
    domain name may have a
    maximum of 253 characters - but the maximum 256 characters length of a forward or reverse path restricts the entire email address to be no more than 254 characters.<sup id="cite_ref-0">[1]</sup>
    The formal definitions are in RFC 5322 (sections 3.2.3
    and 3.4.1) and RFC 5321 - with a more readable form given in
    the informational RFC 3696<sup id="cite_ref-1">[2]</sup>
    and the associated errata.
    Local part
    The local-part of the email address may use any of these
    ASCII characters
    RFC 5322 Section
    3.2.3:
    Uppercase and lowercase English letters (a–z, A–Z) (ASCII: 65-90, 97-122)
    Digits
    0 to
    9 (ASCII: 48-57)
    Characters
    !#$%&'*+-/=?^_`{|}~ (ASCII: 33, 35-39, 42, 43, 45, 47, 61, 63, 94-96, 123-126)
    Character
    . (dot, period, full stop) (ASCII: 46) provided that it is not the first or last character, and
    provided also that it does not appear two or more times consecutively (e.g. [email protected] is not allowed.).
    Special characters are allowed with restrictions. They are:
    o   
    Space and
    "(),:;<>@[\] (ASCII: 32, 34, 40, 41, 44, 58, 59, 60, 62, 64, 91-93)
    The restrictions for special characters are that they must only be used when contained between quotation marks, and that 3 of them (The
    space, backslash \ and
    quotation mark " (ASCII: 32, 92, 34)) must also be preceded by a backslash
    \ (e.g.
    A quoted string may exist as a dot separated entity within the local-part, or it may exist when the outermost quotes are the outermost characters of the local-part
    (e.g. abc."defghi"[email protected] or
    "abcdefghixyz"@example.com are allowed. Conversely,
    abc"defghi"[email protected] is not; neither is
    abc\"def\"[email protected]). Quoted strings and characters however, are not commonly used.
    RFC 5321 also
    warns that "a host that expects to receive mail SHOULD avoid defining mailboxes where the Local-part requires (or uses) the Quoted-string form".
    The local-part "postmaster" is treated specially - it is case-insensitive, and should be forwarded to the server's administrator. Technically all other local-parts
    are case sensitive, therefore [email protected] and [email protected] specify different mailboxes. However most organizations treat uppercase and lowercase letters as equivalent, and also do not allow use of the technically valid characters
    (space, ? and ^). Organizations are free to restrict the forms of their own email addresses as desired, e.g.,
    Windows Live Hotmail,
    for example, only allows creation of email addresses using alphanumerics, dot (.), underscore (_)
    and hyphen (-).<sup id="cite_ref-2">[3]</sup>
    Systems that send mail must be capable of handling outgoing mail for all valid addresses. Contrary to the relevant standards, some defective systems treat certain
    legitimate addresses as invalid and fail to handle mail to these addresses. Hotmail, for example, refuses to send mail to any address containing any of the following standards-permissible characters:
    !#$%*/?^`{|}~
    Domain part
    The domain name part of an email address has to conform to strict guidelines: it must match the requirements for a
    hostname,
    consisting of letters, digits, hyphens and dots. In addition, the domain part may be an
    IP address
    literal, surrounded by square braces, such as jsmith@[192.168.2.1], although this is rarely seen except
    in email spam.
    Examples
    Valid email addresses
    <tt>[email protected]</tt>
    <tt>[email protected]</tt>
    <tt>[email protected]</tt>
    <tt>much."more\ unusual"@example.com</tt>
    <tt>very.unusual."@"[email protected]</tt>
    <tt>very."(),:;<>[]".VERY."very@\\\ \"very"[email protected]</tt>
    Invalid email addresses
    <tt>Abc.example.com</tt> (an @ character must separate the local and domain parts)
    <tt>[email protected]</tt> (character dot(.) is last in local part)
    <tt>[email protected]</tt> (character dot(.) is double)
    <tt>A@b@[email protected]</tt> (only one @ is allowed outside quotation marks)
    <tt>a"b(c)d,e:f;g<h>i[j\k][email protected]</tt> (none of the special characters in this local part
    is allowed outside quotation marks)
    <tt>just"not"[email protected]</tt> (quoted strings must be dot separated, or the only element making
    up the local-part)
    <tt>this is"not\[email protected]</tt> (spaces, quotes, and backslashes may only exist when within
    quoted strings and preceded by a slash)
    <tt>this\ still\"not\\[email protected]</tt> (even if escaped (preceded by a backslash), spaces, quotes,
    and backslashes must still be contained by quotes)
    Terence Yu
    TechNet Community Support

  • What kind of financial periods exist in SAP? What is the relevant table for

    What kind of financial periods exist in SAP? What is the relevant table for that?

    Hi venumadhav
                    In FInancial Accounting , Period is during time that you post G/L account  and you have to close period after  end of period and you will see the balance each G/L Account in each period.
                     There are 12 normal period and 4 special period (normal case , but can be changed by configuration ).  normal period are Jan , Feb ,...Dec and Special period are the extended period that use for posting in special case .For example if you close period in Dec and you have to adjust G/L Account by auditor checking  , you can post G/L Account to special period . special period are 13,14,15,16.  12 may use for Audit , 13 may use for changing after Sending to audit and found something mistake . that 's sample.
                  normally there is posting date to control the period (BUDAT) in the table BSIS. if the posting date is in the during time of period , we can say this posting is in that period .
    posting date : 03.09.2007            period : 09    
    posting date : 30.11.2007            period : 11
    Regards
    Wiboon

  • What is IDOC and ALE?

    Hi anybody,
             Please tell me what is IDOC and ALE? What pupose using IDOC and ALE?
              Give me  Example sample code  of using IDOC and ALE.
    Thanks
    S.Muthu.

    Dear,
    Here is some facts which will be helpful to clear yr concepts for ALE/IDOCs.
    Data Creation in Idoc
    IDocs are text encoded documents with a rigid structure that are used to exchange data between R/3 and a foreign system. Instead of calling a program in the destination system directly, the data is first packed into an IDoc and then sent to the receiving system, where it is analyzed and properly processed. Therefore an IDoc data exchange is always an asynchronous process. The significant difference between simple RFC-calls and IDoc data exchange is the fact, that every action performed on IDocs are protocolled by R/3 and IDocs can be reprocessed if an error occurred in one of the message steps.
    While IDocs have to be understood as a data exchange protocol, EDI and ALE are typical use cases for IDocs. R/3 uses IDocs for both EDI and ALE to deliver data to the receiving system. ALE is basically the scheduling mechanism that defines when and between which partners and what kind of data will be exchanged on a regular or event triggered basis. Such a set-up is called an ALE-scenario.
    IDoc is a intermediate document to exchange data between two SAP Systems.
    An IDoc is simply a data container that is used to exchange information between any two processes that can understand the syntax and semantics of the data...
    1.IDOCs are stored in the database. In the SAP system, IDOCs are stored in database tables.
    2.IDOCs are independent of the sending and receiving systems.
    3.IDOCs are independent of the direction of data exchange.
    The two available process for IDOCs are
    Outbound Process
    Inbound Process
    AND There are basically two types of IDOCs.
    Basic IDOCs
    Basic IDOC type defines the structure and format of the business document that is to be exchanged between two systems.
    Extended IDOCs
    Extending the functionality by adding more segments to existing Basic IDOCs.
    *IDocs are structured ASCII files (or a virtual equivalent).
    *Electronic Interchange Document
    *They are the file format used by SAP R/3 to exchange data with foreign systems.
    *Data Is transmitted in ASCII format, i.e. human readable form
    *IDocs exchange messages
    *IDocs are used like classical interface files
    IDOC types are templates for specific message types depending on what is the business document, you want to exchange.
    ALE (Application Linking and Enabling)
    Ale Technology is SAP’s technology to support distributed yet integrated processes across several SAP systems.
    Distributed Process:
    A distributed process is one in which part of a business process is carried out on one system and part on another. The two systems would exchange data with each other at appropriate points to stay synchronized.
    Need for Distributed Process:
    • Business in Different Geographical Locations.
    • Non availability of dedicated network.
    • Cultural and language differences in Geographical locations.
    • Running of Mission-critical Applications (Like Maintenance downtime etc.).
    • Separate up gradation of Modules.
    Distributed SAP SYSTEM – CHALLENGES
    • A system that understands the syntax and semantics of the data. It was important from the very beginning to base the distribution of data on business rules, not on database replication techniques.
    • Distributed systems that can maintain their autonomy while being integrated as one logical SAP system. The systems should be able to operate independently and support logical processing of transactions and data.
    • Distributed systems that can handle different data models. A local implementation should be able to customize the system to meet its local needs.
    • Receiving systems that can handle their own problems and not tie up the sending system.
    • Systems that maintain continued operation in spite of network failure. Changes made to either system should be synchronized after the network connection is restored.
    • A sound technology and methodology that can be used in all distribution scenarios.
    SAP Distributed environment:
    ALE allows for efficient and reliable communication between distributed processes across physically separate SAP systems.
    ALE is based on application to application integration using messaging architecture. A message defines data that is exchanged between two processes. IDocs are containers that hold data exchanged between the two systems.
    Benefits of ALE:
    • Integration with non-SAP systems: ALE architecture allows third party applications to integrate with SAP system.
    • Reliable Distribution: Once message type created and the receiver of the message is determined, ALE delivers the message to the recipient. If there is any network problem it will buffer the message and delivers the message once the network is restored. It also ensures that the message is not delivered twice.
    • Release Upgrade: Any of the distributed system can be upgraded to the new release of SAP without affecting the functionality. The ALE layer ensures backward compatibility of messages exchanged between systems.
    ALE Architecture:
    It consists of an Outbound process, an Inbound process, and an Exception – Handling process.
    Outbound Process:
    ALE Outbound Process in SAP sends data to one or more SAP Systems. It involves four steps.
    1. Identify the need of IDoc: This step starts upon creating a application document, can relate to a change to a master data object.
    2. Generate the Master IDoc: The document or master data to be sent is read from the database and formatted into an IDoc format. This IDoc is called as a Master IDoc.
    3. Generate the Communication IDoc: The ALE Service layer generates a separate IDoc from the Master IDoc for each recipient who is interested in the data. Separate IDocs are generated because each recipient might demand a different version or a subset of the Master IDoc. These recipient-specific IDocs are called Communication IDocs and are stored in the database.
    4. Deliver the Communication IDoc: The IDoc is delivered to the recipients using an asynchronous communication method. This allows the sending system to continue its processing without having to wait for the destination system to receiver or process the IDoc.
    Inbound Process:
    The inbound process receives an IDoc and creates a document in the system.
    1. Store the IDoc in the database: The IDoc is received from the sending system and stored in the database. Then the IDoc goes through a basic integrity check and syntax check.
    2. Invoke the Posting Module: The control information in the IDoc and configuration tables are read to determine the posting program. The IDoc is then transferred to its posting program.
    3. Create the Document: The posting program reads the IDoc data and then creates a document in the system. The results are logged in the IDoc.
    IDoc Types:
    IDoc type structure can consist of several segments, and each segment can consist of several data fields. The IDoc structure defines the syntax of the data by specifying a list of permitted segments and arrangement of the segments. Segments define a set of fields and their format.
    An IDoc is an instance of an IDoc Type and consists of three types of records.
    i. One Control record: each IDoc has only one control record. The control record contains all the control information about an IDoc, including the IDoc number, the sender and recipient information, and information such as the message type it represents and IDoc type. The control record structure is same for all IDocs.
    ii. One or Many Data records: An IDoc can have multiple data records, as defined by the IDoc structure. Segments translate into data records, which store application data, such as purchase order header information and purchase order detail lines.
    iii. One or Many Status records: An IDoc can have multiple status records. Status record helps to determine whether an IDoc has any error.
    Message in IDoc Type:
    A Message represents a specific type of document transmitted between two partners.
    Outbound Process in IDocs:
    Outbound process used the following components to generate an IDoc. A customer model, and IDoc structure, selection programs, filter objects, conversion rules, a port definition, an RFC destination, a partner profile, service programs, and configuration tables.
    The Customer Model:
    A customer model is used to model a distribution scenario. In a customer model, you identify the systems involved in a distribution scenario and the message exchanged between the systems.
    Message control:
    Message control is a cross application technology used in pricing, account determination, material determination, and output determination. The output determination technique of Message control triggers the ALE for a business document. Message control separates the logic of generating IDocs from the
    application logic.
    Change Pointers:
    The change pointers technique is based on the change document technique, which tracks changes made to key documents in SAP, such as the material master, customer master and sales order.
    Changes made to a document are recorded in the change document header table CDHDR, and additional change pointers are written in the BDCP table for the changes relevant to ALE.
    IDoc Structure:
    A message is defined for data that is exchanged between two systems. The message type is based on one or more IDoc structures.
    Selection Program:
    Is typically implemented as function modules, are designed to extract application data and create a master IDoc. A selection program exists for each message type. A selection program’s design depends on the triggering mechanism used in the process.
    Filter Objects;
    Filter Objects remove unwanted data for each recipient of the data basing on the recipients requirement.
    Port Definition:
    A port is used in an outbound process to define the medium in which documents are transferred to the destination system. ALE used a Transactional RFC port, which transfers data in memory buffers.
    RFC Destination:
    The RFC destination is a logical name used to define the characteristics of a communication link to a remote system on which a function needs to be executed.
    Partner Profile:
    A partner profile specifies the components used in an outbound process(logical name of the remote SAP system, IDoc Type, message type, TRFC port), an IDoc’s packet size, the mode in which the process sends an IDoc (batch versus immediate), and the person to be notified in case of error.
    Service Programs and Configuration Tables:
    The outbound process, being asynchronous, is essentially a sequence of several processes that work together. SAP provides service programs and configuration tables to link these programs and provide customizing options for an outbound process.
    Process flow for Distributing Transactional Data:
    Transactional data is distributed using two techniques: with Message control and without message control.
    Process flow for Distributing Master Data:
    Master data between SAP systems is distributed using two techniques: Stand alone Programs and Change Pointers.
    Triggering the Outbound Process via Stand-Alone Programs:
    Stand-Alone programs are started explicitly by a user to transmit data from one SAP system to another. Standard Programs for several master data objects exist in SAP. Ex. The material master data can be transferred using the RBDSEMAT program or transaction BD10.
    The stand-alone programs provide a selection screen to specify the objects to be transferred and the receiving system. After the stand-alone program is executed, it calls the IDoc selection program with the specified parameters.
    Triggering the Outbound Process via Change Pointers:
    The change pointer technique is used to initiate the outbound process automatically when master data is created or changed.
    A standard program, RBDMIDOC, is scheduled to run on a periodic basis to evaluate the change pointers for a message type and start the ALE process for distributing the master data to the appropriate destination. The RBDMIDOC program reads the table TBDME to determine the IDoc selection program for a message type.
    Processing in the Application Layer:
    The customer distribution model is consulted to make sure that a receiver has been defined for the message to be transmitted. If not, processing ends. If at least one receiver exists, the IDoc selection program reads the master data object from the database and creates a master IDoc from it. The master IDoc is stored in memory. The program then calls the ALE service layer by using the function module MASTER_IDOC_DISTRIBUTE, passing the master IDoc and the receiver information.
    Processing in the ALE Interface Layer:
    Processing in the ALE Layer consists of the following steps:
    • Receiver Determination: The determination of the receiver is done through Customer Distribution Model.
    • IDoc Filtering: if an IDoc filter is specified in the distribution model for a receiver, values in the filter are compared against the values in the IDoc data records. If a data record does not meet the filter criteria, it is dropped.
    • Segment Filtering: For each sender and receiver combination, a set of segments that are not required can be filtered out.
    • Field conversion: Field values in data records are converted by using the conversion rules specified for the segment.
    • Version change for segments: Segments are version-controlled. A new version of a segment always contains fields from the preceding version and fields added for the new version. Release in IDoc type field of the partner profile to determine the version of the segment to be generated.
    • Version change for IDocs: IDocs are also version controlled. The version is determined from the Basic Type field of the partner profile.
    • Communication IDocs generated: The final IDoc generated for a receiver after all the conversions and filtering operations is the communication IDoc. One master IDoc can have multiple communication IDocs depending on the number of receivers identified and the filter operations performed. IDoc gets the status record with a status code of 01 (IDoc Created).
    • Syntax check performed: IDoc goes through a syntax check and data integrity validation. If errors found the IDoc get the status of 26 (error during syntax check of IDoc – Outbound). If no errors found the IDoc gets the status 30 (IDoc ready for dispatch – ALE Service).
    • IDoc dispatched to the communication Layer: In the ALE process, IDocs are dispatched using the asynchronous RFC method, which means that the sending system does not await for data to be received or processed on the destination system. After IDocs have been transferred to the communication layer, they get a status code 01 (Data Passed to Port OK).
    Processing in the Communication Layer:
    To dispatch an IDoc to a destination system, the system reads the port definition specified in the partner profile to determine the destination system, which is then used to read the RFC destination. The RFC destination contains communication settings to log o to the remote SAP system. The sending system calls the INBOUND_IDOC_PROCESS function module asynchronously on the destination system and passes the IDoc data via the memory buffers.
    Inbound Process in IDocs:
    An inbound process used IDoc structure, posting programs, filter objects, conversion rules, a partner profile, service programs, and configuration tables to post an application document from an IDoc.
    Posting Program:
    Posting programs, which are implemented as function modules, read data from an IDoc and create an application document from it. A posting program exists for each message. Each posting program is assigned a process code. A process code can point to a function module or a work flow. In the standard program process codes always point to a function module.
    Ex. The posting program for message type MATMAS is IDOC_INPUT_MATMAS which has a process code MATM.
    Workflow:
    A workflow represents a sequence of customized steps to be carried out for a process. The workflow management system is used to model the sequence, identify information required to carry out the steps and identify the person responsible for the dialog steps.
    Partner Profile;
    A partner profile specifies the components used in an inbound process (partner number, message type, and process code), the mode in which IDocs are processed (batch versus immediate), and the person to be notified in case of errors.
    Process flow for the Inbound process via a Function Module:
    In this process, IDocs are received from another system and passed to the posting function module directly.
    1. Processing in the communication Layer:
    The IDOC_INBOUND_ASYCHRONOUS program, triggered as a result of an RFC from the sending system, acts as the entry point for all inbound ALE processes. The IDoc to be processed is passed as an input parameter. Control is transferred to the ALE/EDI layer.
    2. Processing in the ALE/EDI Interface Layer:
    • Basic integrity check: A basic integrity check is performed on the control record.
    • Segment Filtering and conversion: Filtering out unwanted segments and carry out any required conversion of field values.
    • Creation of Application IDoc: The application IDoc is created and stored in the database and a syntax check is performed. If there are errors it gets status code of 60 (Error during Syntax check of IDoc – Inbound). At this point a tangible IDoc, which can be monitored via one of the monitoring transactions, is created and the IDoc gets status code 50 (IDoc Added).
    • IDoc Marked ready for Dispatch: IDoc gets the status code 64 (IDoc ready to be passed to application).
    • IDoc is passed to the posting program: The partner profile table is read. If the value of the Processing field is set to Process Immediately, the IDoc is passed to the posting program immediately using the program RBDAPP01.
    3. Processing in the Posting Module:
    The process code in the partner profile points to a posting module for the specific message in the IDoc. The posting program implemented as a function module either calls a standard SAP transaction by using the Call Transaction command for posting the document or invokes a direct input function module.
    The results of execution are passed back via the function module’s output parameters. If the posting is successful IDoc gets the status code 53 (Application Document Posted) or it gets status code 51 (Error: Application 
    How to create idoc?
    *WE30 - you can create a IDOC type
    To Create Idoc we need to follow these steps:
    Create Segment ( WE31)
    Create Idoc Type ( WE30 )
    Create Message Type ( WE81 )
    Assign Idoc Type to Message Type ( WE82 )
    Creating a Segment
    Go to transaction code WE31
    Enter the name for your segment type and click on the Create icon
    Type the short text
    Enter the variable names and data elements
    Save it and go back
    Go to Edit -> Set Release
    Follow steps to create more number of segments
    Create IDOC Type
    Go to transaction code WE30
    Enter the Object Name, select Basic type and click Create icon
    Select the create new option and enter a description for your basic IDOC type and press enter
    Select the IDOC Name and click Create icon
    The system prompts us to enter a segment type and its attributes
    Choose the appropriate values and press Enter
    The system transfers the name of the segment type to the IDOC editor.
    Follow these steps to add more number of segments to Parent or as Parent-child relation
    Save it and go back
    Go to Edit -> Set release
    Create Message Type
    Go to transaction code WE81
    Change the details from Display mode to Change mode
    After selection, the system will give this message “The table is cross-client (see Help for further info)”. Press Enter
    Click New Entries to create new Message Type
    Fill details
    Save it and go back
    Assign Message Type to IDoc Type
    Go to transaction code WE82
    Change the details from Display mode to Change mode
    After selection, the system will give this message “The table is cross-client (see Help for further info)”. Press Enter.
    Click New Entries to create new Message Type.
    Fill details
    Save it and go back
    An IDOC with data, will have to be triggered by the application that is trying to send out the data.
    Try this..Hope this will help.
    SAP ALE & IDOC<<<<
    Steps to configuration(Basis) >>
    1. Create Logical System (LS) for each applicable ALE-enabled client
    2. Link client to Logical System on the respective servers
    3. Create background user, to be used by ALE(with authorizaton for ALE postings)
    4. Create RFC Destinations(SM59)
    5. Ports in Idoc processing(WE21)
    6. Generate partner profiles for sending system
    The functional configuration(Tcode: SALE)
    • Create a Customer Distribution Model (CDM);
    • Add appropriate message types and filters to the CDM;
    • Generate outbound partner profiles;
    • Distribute the CDM to the receiving systems; and
    • Generate inbound partner profiles on each of the clients.
    Steps to customize a new IDoc >>>
    1. Define IDoc Segment (WE31)
    2. Convert Segments into an IDoc type (WE30)
    3. Create a Message Type (WE81)
    4. Create valid Combination of Message & IDoc type(WE82)
    5. Define Processing Code(WE41 for OUT / WE42 for IN)
    6. Define Partner Profile(WE20)
    Important Transaction Codes:
    SALE - IMG ALE Configuration root
    WE20 - Manually maintain partner profiles
    BD64 - Maintain customer distribution model
    BD71 - Distribute customer distribution model
    SM59 - Create RFC Destinations
    BDM5 - Consistency check (Transaction scenarios)
    BD82 - Generate Partner Profiles
    BD61 - Activate Change Pointers - Globally
    BD50 - Activate Change Pointer for Msg Type
    BD52 - Activate change pointer per change.doc object
    BD59 - Allocation object type -> IDOC type
    BD56 - Maintain IDOC Segment Filters
    BD53 - Reduction of Message Types
    BD21 - Select Change Pointer
    BD87 - Status Monitor for ALE Messages
    BDM5 - Consistency check (Transaction scenarios)
    BD62 - Define rules
    BD79 - Maintain rules
    BD55 - Defining settings for IDoc conversion
    WEDI - ALE IDoc Administration
    WE21 - Ports in Idoc processing
    WE60 - IDoc documentation
    SARA - IDoc archiving (Object type IDOC)
    WE47 - IDoc status maintenance
    WE07 - IDoc statistics
    BALE - ALE Distribution Administration
    WE05 - IDoc overview
    BD87 - Inbound IDoc reprocessing
    BD88 - Outbound IDoc reprocessing
    BDM2 - IDoc Trace
    BDM7 - IDoc Audit Analysis
    BD21 - Create IDocs from change pointers
    SM58 - Schedule RFC Failures
    Basic config for Distributed data:
    BD64: Maintain a Distributed Model
    BD82: Generate Partner Profile
    BD64: Distribute the distribution Model
    Programs
    RBDMIDOC – Creating IDoc Type from Change Pointers
    This report creates IDocs from the change pointers for the specified message type. It then sends them to the receiving system and flags the change pointers as processed in respect of the specified message type.
    The receiving systems for the specified message type are determined from the customer distribution model.
    Output:-The report outputs information about the number of master IDocs and communication IDocs created.
    RSEOUT00 – Process all selected IDocs (EDI)  Report for generation of files for EDI outbound processing.The report processes the IDocs available in the system with the status 'to be processed'. The IDocs are selected according to the selection options and parameters specified.  
    It is important that you make sure that only test messages or productive messages are selected.
    The IDocs are processed in various files for various output modes and for various ports. The names of the files are created according to the naming definition for the outbound file. This definition is determined in the port definition.
    RBDAPP01 - Inbound Processing of IDocs Ready for Transfer
    RSARFCEX - Execute Calls Not Yet Executed
    RBDMOIND - Status Conversion with Successful tRFC Execution
    RBDMANIN - Start error handling for non-posted IDocs
    RBDSTATE - Send Audit Confirmations
    For testing you can use WE19.
    Hope This will be helpful,
    Best Regards ,
    P Singh

  • I want to know what is backward and forward consumption

    dear exports
    i want to know what is backward and forward consumption , how maintain in mrp  view plz reply me

    Hi,
    Consumption mode and consumption period are maintained in MRP 3 view .In strategy 40 when sales order is submitted it see the availability of PIR for consumption. The consumption mode decides the way of looking the PIR (i.e. If 3- It will look into forward direction like this) and consumption period states the limitation of looking.
    e.g.
    If MODE is 3 and forward period is 30 days then the sales order will look the PIR in next 30 days and if mode 1 and period is 45 days then it will look the PIR in past 45 days.
    Regards,
    Shekhar

  • Example Vi's For Voltage and Period

    We have just recieved a couple of DAQCard-AI-16XE-50 cards and Labview. I
    am trying to find an example vi showing how to combine hardware timed voltage
    input and period calculation in the same loop.
    Basically I want to record volages from a couple of strain gages and two
    RPM pickups. I am using the period vi instead of the frequency vi because
    I don't want to tie up both counters on one input.
    Thanks for any help,
    Christopher Quijano

    Be sure you have DAQmx drivers installed. Then you can find many prepared examples in Help -> Find Examples, where you can browse to Hardware Input and Output -> DAQmx -> Counter Measurements. Here you can find many examples - you just need to specify the board you use, and connect signals properly to terminal block.
    If you are looking for how the frequency measuremen is made, then I recommend you to see M Series User Manual (or E or X Series), Chapter 7 - Counters, section Counter Input Applications, part Frequency Measurement.
    if anything doesn't work, it would be useful to specify what board do you use, what drivers you have installed and what you try to implement.
    regards,
    stefo

  • In general what is the time period of the XI projects ?

    Hi All
        Can any one help me what is the time period of the XI Projects (In general)?
        In realtime how the time is managed/Utilized on resources ?
        How the work estimations will be done ? Based on What ?
    Adv...thanks and points
    regards
    ---  Rakesh

    Hi
          This is based on the projects but in general (In addition to above)
          As follows
         In general there are ‘3’ kinds of interfaces
    1)     Easy  ---  2 days (Which will include dev+ document)
         2)  Medium -
    5 days          “           “
    3)     Complex  -
    10 to 12 days  (complex BPMs + Mappings+ document)
          Project full time will purely depends on the  Business (Requirement)
         + No.systems+ No.scenarios
          But in general 4months to 6 months for normal projects
    >> About work already answer given
    I hope this will solve your question
    regards
    -- prasad

  • Design of Cube for Year and Period from Posting Date

    Experts,
    In my report requirement one of the selection criteria is Year and Month (YY-MM) which needs to be got from the Posting Date.
    In my ODS I have a 0PSTING_DATE. What infobjects are needed in the cube to get the value of YY and Period and the mapping from the 0PSTING_DATE to these infoobjects.
    Thanks,
    Raj

    Hi Rajesh,
    Time Update:
    When performing a time update, automatic time conversion and time distribution are available.
    Direct Update: the system automatically performs a time conversion.
    Time Conversion:
    You can update source time characteristics to target time characteristics using automatic time conversion
                   Check here..........
    http://help.sap.com/saphelp_nw70ehp1/helpdata/en/e5/f913426908ca7ee10000000a1550b0/content.htm
    Thanks,
    Vijay.

  • What is OLTP and OLAP in BW .

    Hi friends
    Q: what is OLTP and OLAP.
    Q: SAP-BW follows which process OLTP or OLAP and explain the difference.

    Hi Vrushabh,
    Ans-1. OLTP vs OLAP
    OLTP : Online Transaction Processing (Operational System)
    OLAP : Online Analytical Processing (Data Warehouse)
    a. Source of data
    OLTP : Operational data; OLTPs are the original source of the data.
    OLAP : Consolidation data; OLAP data comes from the various OLTP Databases
    b. Purpose of data
    OLTP : To control and run fundamental business tasks
    OLAP : To help with planning, problem solving, and decision support.
    c. What the data Reveals
    OLTP : A snapshot of ongoing business processes
    OLAP : Multi-dimensional views of various kinds of business activities.
    d. Inserts and Updates
    OLTP :  Short and fast inserts and updates initiated byend users
    OLAP : Periodic long-running batch jobs refresh the data
    e. Queries
    OLTP :  Relatively standardized and simple queries Returning relatively few records.
    OLAP : Often complex queries involving aggregations
    f. Processing Speed
    OLTP : Typically very fast
    OLAP : Depends on the amount of data involved; batch data refreshes and complex queries may take many hours; query speed can be improved by creating indexes
    g. Space Requirements
    OLTP : Can be relatively small if historical data is archived. OLAP : Larger due to the existence of aggregation structures and history data; requires more indexes than OLTP
    h. Database Design
    OLTP :  Highly normalized with many tables
    OLAP : Typically de-normalized with fewer tables; use of star and/or snowflake schemas
    i. Backup and Recovery
    OLTP :  Backup religiously; operational data is critical to run the business, data loss is likely to entail significant monetary loss and legal liability
    OLAP : Instead of regular backups, some environments may consider simply reloading the OLTP data as a recovery method.
    Ans -2   SAP BW follows OLAP.
    Reward points if helpful.
    Regards
    Hemant

  • What are RLT and backorder processing?

    Hi Gurus,
    Can you tell me what are RLT and backorder processing and why we do backorder processing?
    Thanks,
    Paul

    hi,
    Replenishment lead time is the time that is needed to order or produce the requested material. The system determines replenishment lead time according to specific times defined by you in the material master record. Depending on the material type, replenishment lead time can be calculated according to various time periods. In the case of trading goods, for example, it is determined according to the planned delivery time, purchasing processing time, and the goods receipt processing time.
    Backorder Processing
    Backorder processing is a functionality in SAP where you can change the committments and over-ride the blockage of stocks
    marked against sales documents/deliveries. For e.g. you receive an order from a very important customer for material "A" but
    the entire quantity of A is committed to another customer "B" via earlier sales orders and this is where BACKORDER processing helps you to change the committment and shift stock due for B to A. This is the benefit of this funtionality.
    OMIH - Checking rule for updating backorders
    OPJL   - Define new checking rule
    OPJJ   - Define scope of check
    V_RA - Backorder Processing
    Data selection:-
    Sold-to-party             Customer code            Mandatory
    Sales Organization                                         Mandatory
    Distribution Channel                                       Mandatory
    Division                                                         Mandatory
    Changed confirmed quantity :-
    Tick the material you want to changed and click the Backorder button
    Confirmed quantity that still can be changed are highlighted.
    V.15 - Backorder List
    Sales Organization                                         Mandatory
    Distribution Channel                                       Mandatory
    Division                                                         Mandatory
    regards
    sadhu kishore

Maybe you are looking for