What is Scopetable and Logtable in Stored Procudure

Hi Experts,
i am working on sap-Bpc i want some clarification on stored procedure what is "scopetable" and "logtable" in the below store procudure.
Can i run this sp from default.lgx
//*RUN_STORED_PROCEDURE = SPRUNCONSO([%APP%], [%CATEGORY_SET%],  [C_CGGROUP], [%SCOPETABLE%],[%LOGTABLE%])
Thanks & Regards,
Chandra Mohan.

Hi Chandra
Scope table is the table which would be selected by sql while running the stored procedure automatically based on the accounts or other dimension members selected in the business rules.
Log table is where the logs would be stored.

Similar Messages

  • How to explain.  OK 1st all photos are visible in my iPhoto library; however, some are stored on hard drive and some are stored on external.  All can be viewed in itunes, but none on the external will sync to my iPad.  What's up with that.

    How to explain.  OK 1st all photos are visible in my iPhoto library; however, some are stored on hard drive and some are stored on external.  All can be marked or unmarked in itunes, but none of the photos stored on the external drive will sync to my iPad.  Anybody know what's up with that?

    What really cheeses me off here is that Apple isn't allowing users enough customization.  With each update of iTunes (and the OS and iOS) we're forced to give up something that worked well for the way we want to use the app and make do with fewer (and lamer) options.  If Apple keeps this up, they're going to start losing customers fast.  I mean if this isn't fixed soon, I'm pretty sure I'm going to give up on iTunes, and then I'll probably go ahead and get a Galaxy when I need to replace my iPhone.
    What I don't understand about how they won't let users delete the list of available podcasts now is why?  How is this making it a better program?  I can understand that not all users are capable enough to right-click on a feed and select "Show all available episodes", so I can see why they want the complete list to be the default (and, surprise, it already was).  But to not give users the option to delete that list?  It's inconsiderate because it makes navigating feeds with a large back catalogue really frustrating.  I'm flabbergasted that no one at Apple considered all the podcast feeds that keep hundreds of episodes available when they removed this feature.  It smacks of rank incompetence.
    What improvement were they trying to make here anyway?  There was nothing wrong to my mind about how podcasts were managed in previous versions.  Whatever improvement they were trying to make here, they should have realized that many users would at least want the option to keep things the way they were.
    And reverting to a previous version is no solution.  I can't sync my iPhone with the new iOS without this update, and (while I do have some issues--specifically how you can't play podcasts in the Music app anymore) I do like the new iOS.

  • What are ROWID and ROWNUM? Are they stored in database and where?

    Hi All,
    can anybody please answer this question
    What are ROWID and ROWNUM? Are they stored in database and where?
    Thanks,
    Srini

    ROWID can be thought of as a pointer to the physical location (on disk) of the (table) row.
    From a ROWID value, Oracle can extract the file, block-within-that-file and offset-of-the-row-within-that-block. Using these, Oracle can directly access a disk block to retrieve a row.
    ROWNUM is a just sequence number of a row within a result set of a query.
    As said by other repliers, both are not stored. They are 'constructed' when you reference them inside a query.

  • Can i use iCloud keychain with my own passwords and not with what is assigned and stored?

    Can i use iCloud keychain with my own passwords and not with what is assigned and stored?

    tammersalem wrote:) <-HDMI-> (HDTV)
    My main concerns are:
    -If I use iTunes on my main computer, will it then be available to Apple TV?
    -If I use Apple TV to download will it be available to my Main computer?
    -Can the Apple TV use a media server for storage over LAN (using NTFS Samab or otherwise)?
    Basically iTunes feeds AppleTv with media either syncing (copying to it) or streaming live.
    Media must be compatible with AppleTV.
    AppleTV requires a proper iTunes instance running - it cannot access a NAS directly.
    If you store media in a folder on a NAS and it's part of the computer iTunes library (just stored on the NAS vs internal/external drive), then when running iTunes makes this content available to AppleTV.
    Data will travel:
    NAS > network > iTunes > network to AppleTV
    As the path is potentially slower than internal/external attached drive > iTunes > network > AppleTV, it may or may not work robustly for streaming.
    If AppleTv is set to sync (it can also stream in this mode), when you purchase direct on AppleTV, the media should sync back to where the itunes library is stored (via iTunes) to keep things in sync and to allow you to backup the media.
    You cannot drag/drop media to/from AppleTv across the network, nor can it directly access storage itself - iTunes is an essential cog in the wheel.
    The majority of commercial 'in-built iTunes media servers' will not work directly with AppleTV as it has to be 'paired' with iTunes by entering a numerical code in iTunes and does not simply see 'shared libraries'.

  • What's the best way of storing (configurable) application settings.

    I'm developing an application that has a few dozen settings, which have a default value at installation time, however they may be changed at execution time.
    The settings will not be set by the application directly itself, instead it provides an API which independant client applications can use to change the settings.
    One client will be a debug/test GUI to view and set the settings.
    Another client will be a sort of monitoring program that is able to receive setting updates sent to the device by some mechanism (i.e. HTTP or OTA etc.). When it receives the setting changes it will call the application API to change the settings.
    My first question is
    - in general what is a good mechanism for storing these settings? (The settings are small things, numbers etc.)
    - if the settings are stored in a file or database etc., how can they be made tamper-proof from malicious programs, i.e. is it possible that the only program which can change the settings is my application?
    - if my application is the only program which can directly change the settings, that's not secure if any malicious client can access my application's API. Therefore is there a mechanism whereby an application can police usage of its API to a known list of clients?
    Thanks

    niuniu wrote:
    - in general what is a good mechanism for storing these settings? (The settings are small things, numbers etc.)
    Configurable settings are generally stored in a property list file (.plist). E.g. see Storing Dictionaries in the NSDictionary reference.
    - if the settings are stored in a file or database etc., how can they be made tamper-proof from malicious programs, ...
    In general, there's no such thing as tamper-proof. You need to decide on a level of security based on how important your program is and the consequences of a security failure.
    - if my application is the only program which can directly change the settings, that's not secure if any malicious client can access my application's API. Therefore is there a mechanism whereby an application can police usage of its API to a known list of clients?
    I guess you could require clients to logon in some fashion. But protection against an entity with knowlege of your API and the ability to install a malicious client requires a level of security far above what you've asked about so far. Simply identifying the client in this scenario is a little like securing a water heater against a 9.0 earthquake when we expect the entire building to collapse at 7.5.
    For example, a priori I would look at your network input long before I would consider a malicious, local client.
    I would suggest defining your security requirements in terms of what kinds of attacks you expect and how far you're willing to go towards a defense. At that point one of the security experts around here might be able to recommend some specific solutions.
    Btw, the subject line of this thread doesn't reflect the more difficult security questions you're asking. A more accurate topic description makes the forum easier to search, and also gets the attention of the right experts. So if you don't get the kind of help you need, you might consider a new thread about data security.
    \- Ray

  • I tried to import a PDF of a line drawing into Photoshop Elements. The thumbnail looks fine, but when imported the file is empty. This used to work in the past. What is wrong and how do I solve this?

    I tried to import a PDF of a line drawing into Photoshop Elements. The thumbnail looks fine, but when imported the file is empty. This used to work in the past. What is wrong and how do I solve this?

    Hi
    The value of the Channel Strip volume etc is not stored within the C Strip setting, as you have discovered.
    If you really wanted, you could add a Gain plug to the strip, with it set to give the correct output level with the Fader set to 0
    (Or just set the fader manually in MS)
    CCT

  • Syntax of creating and calling a stored query in Ms Access

    What is the syntax of creating and calling a stored query via a java program

    Google found this:
    http://www.quepublishing.com/articles/article.asp?p=170870 It has some examples about how to call a stored procedure. Not for Access, though - if you have questions about that, ask Microsoft.

  • Hi to all... What is a  XML data provider,stored Procedure, personal data

    Hi to all... What is a  XML data provider,stored Procedure, personal data providers in deski.  when we use these data provider in desk top intelligence.. and use of it.
    Please give detail description of the above...
    Thanks for reply..........

    Hi,
    We can create Desktop Intelligence reports using XML Data Provider, Personal Data Files and Stored Procedure.
    Following is some detailed information about these three.
    Xml data provider:
    Xml data provider is used for the integration of external data sources stored in XML format.
    This is similar to HTML.
    Stored Procedure:
    A stored procedure is a set of SQL commands that has been compiled and stored on the database server.
    Once the stored procedure has been "stored", client applications can execute the stored procedure over and over again without sending it to the database server again and without compiling it again.
    Stored procedures improve performance by reducing network traffic and CPU load.
    Personal data files:
    u2022     *.prn files
         A PRN file is a special type of file which contains instructions for a printer, it tells the printer what to print on the page and where as well as which paper tray to use, what the paper size is and a number of other controls.
    u2022     *.asc files
          Between the values of a row any number of carriage returns  or blanks are allowed. In any case it is strongly recommended that the data table be stored in such a way that it can be read and edited easily.
           The values may be stored in any format (integer, floating point, exponential notation) and they must be separated at least by one blank. The class information must be of integer type, the row identifiers are interpreted as strings. The lines can have any length and must not contain any comment.
    u2022     *.csv files
    A CSV file is a specially formatted plain text file which stores spreadsheet or basic database-style information in a very simple format, with one record on each line, and each field within that record separated by a comma.
    Regards,
    Pradnya Kokil

  • What is IDOC and ALE?

    Hi anybody,
             Please tell me what is IDOC and ALE? What pupose using IDOC and ALE?
              Give me  Example sample code  of using IDOC and ALE.
    Thanks
    S.Muthu.

    Dear,
    Here is some facts which will be helpful to clear yr concepts for ALE/IDOCs.
    Data Creation in Idoc
    IDocs are text encoded documents with a rigid structure that are used to exchange data between R/3 and a foreign system. Instead of calling a program in the destination system directly, the data is first packed into an IDoc and then sent to the receiving system, where it is analyzed and properly processed. Therefore an IDoc data exchange is always an asynchronous process. The significant difference between simple RFC-calls and IDoc data exchange is the fact, that every action performed on IDocs are protocolled by R/3 and IDocs can be reprocessed if an error occurred in one of the message steps.
    While IDocs have to be understood as a data exchange protocol, EDI and ALE are typical use cases for IDocs. R/3 uses IDocs for both EDI and ALE to deliver data to the receiving system. ALE is basically the scheduling mechanism that defines when and between which partners and what kind of data will be exchanged on a regular or event triggered basis. Such a set-up is called an ALE-scenario.
    IDoc is a intermediate document to exchange data between two SAP Systems.
    An IDoc is simply a data container that is used to exchange information between any two processes that can understand the syntax and semantics of the data...
    1.IDOCs are stored in the database. In the SAP system, IDOCs are stored in database tables.
    2.IDOCs are independent of the sending and receiving systems.
    3.IDOCs are independent of the direction of data exchange.
    The two available process for IDOCs are
    Outbound Process
    Inbound Process
    AND There are basically two types of IDOCs.
    Basic IDOCs
    Basic IDOC type defines the structure and format of the business document that is to be exchanged between two systems.
    Extended IDOCs
    Extending the functionality by adding more segments to existing Basic IDOCs.
    *IDocs are structured ASCII files (or a virtual equivalent).
    *Electronic Interchange Document
    *They are the file format used by SAP R/3 to exchange data with foreign systems.
    *Data Is transmitted in ASCII format, i.e. human readable form
    *IDocs exchange messages
    *IDocs are used like classical interface files
    IDOC types are templates for specific message types depending on what is the business document, you want to exchange.
    ALE (Application Linking and Enabling)
    Ale Technology is SAP’s technology to support distributed yet integrated processes across several SAP systems.
    Distributed Process:
    A distributed process is one in which part of a business process is carried out on one system and part on another. The two systems would exchange data with each other at appropriate points to stay synchronized.
    Need for Distributed Process:
    • Business in Different Geographical Locations.
    • Non availability of dedicated network.
    • Cultural and language differences in Geographical locations.
    • Running of Mission-critical Applications (Like Maintenance downtime etc.).
    • Separate up gradation of Modules.
    Distributed SAP SYSTEM – CHALLENGES
    • A system that understands the syntax and semantics of the data. It was important from the very beginning to base the distribution of data on business rules, not on database replication techniques.
    • Distributed systems that can maintain their autonomy while being integrated as one logical SAP system. The systems should be able to operate independently and support logical processing of transactions and data.
    • Distributed systems that can handle different data models. A local implementation should be able to customize the system to meet its local needs.
    • Receiving systems that can handle their own problems and not tie up the sending system.
    • Systems that maintain continued operation in spite of network failure. Changes made to either system should be synchronized after the network connection is restored.
    • A sound technology and methodology that can be used in all distribution scenarios.
    SAP Distributed environment:
    ALE allows for efficient and reliable communication between distributed processes across physically separate SAP systems.
    ALE is based on application to application integration using messaging architecture. A message defines data that is exchanged between two processes. IDocs are containers that hold data exchanged between the two systems.
    Benefits of ALE:
    • Integration with non-SAP systems: ALE architecture allows third party applications to integrate with SAP system.
    • Reliable Distribution: Once message type created and the receiver of the message is determined, ALE delivers the message to the recipient. If there is any network problem it will buffer the message and delivers the message once the network is restored. It also ensures that the message is not delivered twice.
    • Release Upgrade: Any of the distributed system can be upgraded to the new release of SAP without affecting the functionality. The ALE layer ensures backward compatibility of messages exchanged between systems.
    ALE Architecture:
    It consists of an Outbound process, an Inbound process, and an Exception – Handling process.
    Outbound Process:
    ALE Outbound Process in SAP sends data to one or more SAP Systems. It involves four steps.
    1. Identify the need of IDoc: This step starts upon creating a application document, can relate to a change to a master data object.
    2. Generate the Master IDoc: The document or master data to be sent is read from the database and formatted into an IDoc format. This IDoc is called as a Master IDoc.
    3. Generate the Communication IDoc: The ALE Service layer generates a separate IDoc from the Master IDoc for each recipient who is interested in the data. Separate IDocs are generated because each recipient might demand a different version or a subset of the Master IDoc. These recipient-specific IDocs are called Communication IDocs and are stored in the database.
    4. Deliver the Communication IDoc: The IDoc is delivered to the recipients using an asynchronous communication method. This allows the sending system to continue its processing without having to wait for the destination system to receiver or process the IDoc.
    Inbound Process:
    The inbound process receives an IDoc and creates a document in the system.
    1. Store the IDoc in the database: The IDoc is received from the sending system and stored in the database. Then the IDoc goes through a basic integrity check and syntax check.
    2. Invoke the Posting Module: The control information in the IDoc and configuration tables are read to determine the posting program. The IDoc is then transferred to its posting program.
    3. Create the Document: The posting program reads the IDoc data and then creates a document in the system. The results are logged in the IDoc.
    IDoc Types:
    IDoc type structure can consist of several segments, and each segment can consist of several data fields. The IDoc structure defines the syntax of the data by specifying a list of permitted segments and arrangement of the segments. Segments define a set of fields and their format.
    An IDoc is an instance of an IDoc Type and consists of three types of records.
    i. One Control record: each IDoc has only one control record. The control record contains all the control information about an IDoc, including the IDoc number, the sender and recipient information, and information such as the message type it represents and IDoc type. The control record structure is same for all IDocs.
    ii. One or Many Data records: An IDoc can have multiple data records, as defined by the IDoc structure. Segments translate into data records, which store application data, such as purchase order header information and purchase order detail lines.
    iii. One or Many Status records: An IDoc can have multiple status records. Status record helps to determine whether an IDoc has any error.
    Message in IDoc Type:
    A Message represents a specific type of document transmitted between two partners.
    Outbound Process in IDocs:
    Outbound process used the following components to generate an IDoc. A customer model, and IDoc structure, selection programs, filter objects, conversion rules, a port definition, an RFC destination, a partner profile, service programs, and configuration tables.
    The Customer Model:
    A customer model is used to model a distribution scenario. In a customer model, you identify the systems involved in a distribution scenario and the message exchanged between the systems.
    Message control:
    Message control is a cross application technology used in pricing, account determination, material determination, and output determination. The output determination technique of Message control triggers the ALE for a business document. Message control separates the logic of generating IDocs from the
    application logic.
    Change Pointers:
    The change pointers technique is based on the change document technique, which tracks changes made to key documents in SAP, such as the material master, customer master and sales order.
    Changes made to a document are recorded in the change document header table CDHDR, and additional change pointers are written in the BDCP table for the changes relevant to ALE.
    IDoc Structure:
    A message is defined for data that is exchanged between two systems. The message type is based on one or more IDoc structures.
    Selection Program:
    Is typically implemented as function modules, are designed to extract application data and create a master IDoc. A selection program exists for each message type. A selection program’s design depends on the triggering mechanism used in the process.
    Filter Objects;
    Filter Objects remove unwanted data for each recipient of the data basing on the recipients requirement.
    Port Definition:
    A port is used in an outbound process to define the medium in which documents are transferred to the destination system. ALE used a Transactional RFC port, which transfers data in memory buffers.
    RFC Destination:
    The RFC destination is a logical name used to define the characteristics of a communication link to a remote system on which a function needs to be executed.
    Partner Profile:
    A partner profile specifies the components used in an outbound process(logical name of the remote SAP system, IDoc Type, message type, TRFC port), an IDoc’s packet size, the mode in which the process sends an IDoc (batch versus immediate), and the person to be notified in case of error.
    Service Programs and Configuration Tables:
    The outbound process, being asynchronous, is essentially a sequence of several processes that work together. SAP provides service programs and configuration tables to link these programs and provide customizing options for an outbound process.
    Process flow for Distributing Transactional Data:
    Transactional data is distributed using two techniques: with Message control and without message control.
    Process flow for Distributing Master Data:
    Master data between SAP systems is distributed using two techniques: Stand alone Programs and Change Pointers.
    Triggering the Outbound Process via Stand-Alone Programs:
    Stand-Alone programs are started explicitly by a user to transmit data from one SAP system to another. Standard Programs for several master data objects exist in SAP. Ex. The material master data can be transferred using the RBDSEMAT program or transaction BD10.
    The stand-alone programs provide a selection screen to specify the objects to be transferred and the receiving system. After the stand-alone program is executed, it calls the IDoc selection program with the specified parameters.
    Triggering the Outbound Process via Change Pointers:
    The change pointer technique is used to initiate the outbound process automatically when master data is created or changed.
    A standard program, RBDMIDOC, is scheduled to run on a periodic basis to evaluate the change pointers for a message type and start the ALE process for distributing the master data to the appropriate destination. The RBDMIDOC program reads the table TBDME to determine the IDoc selection program for a message type.
    Processing in the Application Layer:
    The customer distribution model is consulted to make sure that a receiver has been defined for the message to be transmitted. If not, processing ends. If at least one receiver exists, the IDoc selection program reads the master data object from the database and creates a master IDoc from it. The master IDoc is stored in memory. The program then calls the ALE service layer by using the function module MASTER_IDOC_DISTRIBUTE, passing the master IDoc and the receiver information.
    Processing in the ALE Interface Layer:
    Processing in the ALE Layer consists of the following steps:
    • Receiver Determination: The determination of the receiver is done through Customer Distribution Model.
    • IDoc Filtering: if an IDoc filter is specified in the distribution model for a receiver, values in the filter are compared against the values in the IDoc data records. If a data record does not meet the filter criteria, it is dropped.
    • Segment Filtering: For each sender and receiver combination, a set of segments that are not required can be filtered out.
    • Field conversion: Field values in data records are converted by using the conversion rules specified for the segment.
    • Version change for segments: Segments are version-controlled. A new version of a segment always contains fields from the preceding version and fields added for the new version. Release in IDoc type field of the partner profile to determine the version of the segment to be generated.
    • Version change for IDocs: IDocs are also version controlled. The version is determined from the Basic Type field of the partner profile.
    • Communication IDocs generated: The final IDoc generated for a receiver after all the conversions and filtering operations is the communication IDoc. One master IDoc can have multiple communication IDocs depending on the number of receivers identified and the filter operations performed. IDoc gets the status record with a status code of 01 (IDoc Created).
    • Syntax check performed: IDoc goes through a syntax check and data integrity validation. If errors found the IDoc get the status of 26 (error during syntax check of IDoc – Outbound). If no errors found the IDoc gets the status 30 (IDoc ready for dispatch – ALE Service).
    • IDoc dispatched to the communication Layer: In the ALE process, IDocs are dispatched using the asynchronous RFC method, which means that the sending system does not await for data to be received or processed on the destination system. After IDocs have been transferred to the communication layer, they get a status code 01 (Data Passed to Port OK).
    Processing in the Communication Layer:
    To dispatch an IDoc to a destination system, the system reads the port definition specified in the partner profile to determine the destination system, which is then used to read the RFC destination. The RFC destination contains communication settings to log o to the remote SAP system. The sending system calls the INBOUND_IDOC_PROCESS function module asynchronously on the destination system and passes the IDoc data via the memory buffers.
    Inbound Process in IDocs:
    An inbound process used IDoc structure, posting programs, filter objects, conversion rules, a partner profile, service programs, and configuration tables to post an application document from an IDoc.
    Posting Program:
    Posting programs, which are implemented as function modules, read data from an IDoc and create an application document from it. A posting program exists for each message. Each posting program is assigned a process code. A process code can point to a function module or a work flow. In the standard program process codes always point to a function module.
    Ex. The posting program for message type MATMAS is IDOC_INPUT_MATMAS which has a process code MATM.
    Workflow:
    A workflow represents a sequence of customized steps to be carried out for a process. The workflow management system is used to model the sequence, identify information required to carry out the steps and identify the person responsible for the dialog steps.
    Partner Profile;
    A partner profile specifies the components used in an inbound process (partner number, message type, and process code), the mode in which IDocs are processed (batch versus immediate), and the person to be notified in case of errors.
    Process flow for the Inbound process via a Function Module:
    In this process, IDocs are received from another system and passed to the posting function module directly.
    1. Processing in the communication Layer:
    The IDOC_INBOUND_ASYCHRONOUS program, triggered as a result of an RFC from the sending system, acts as the entry point for all inbound ALE processes. The IDoc to be processed is passed as an input parameter. Control is transferred to the ALE/EDI layer.
    2. Processing in the ALE/EDI Interface Layer:
    • Basic integrity check: A basic integrity check is performed on the control record.
    • Segment Filtering and conversion: Filtering out unwanted segments and carry out any required conversion of field values.
    • Creation of Application IDoc: The application IDoc is created and stored in the database and a syntax check is performed. If there are errors it gets status code of 60 (Error during Syntax check of IDoc – Inbound). At this point a tangible IDoc, which can be monitored via one of the monitoring transactions, is created and the IDoc gets status code 50 (IDoc Added).
    • IDoc Marked ready for Dispatch: IDoc gets the status code 64 (IDoc ready to be passed to application).
    • IDoc is passed to the posting program: The partner profile table is read. If the value of the Processing field is set to Process Immediately, the IDoc is passed to the posting program immediately using the program RBDAPP01.
    3. Processing in the Posting Module:
    The process code in the partner profile points to a posting module for the specific message in the IDoc. The posting program implemented as a function module either calls a standard SAP transaction by using the Call Transaction command for posting the document or invokes a direct input function module.
    The results of execution are passed back via the function module’s output parameters. If the posting is successful IDoc gets the status code 53 (Application Document Posted) or it gets status code 51 (Error: Application 
    How to create idoc?
    *WE30 - you can create a IDOC type
    To Create Idoc we need to follow these steps:
    Create Segment ( WE31)
    Create Idoc Type ( WE30 )
    Create Message Type ( WE81 )
    Assign Idoc Type to Message Type ( WE82 )
    Creating a Segment
    Go to transaction code WE31
    Enter the name for your segment type and click on the Create icon
    Type the short text
    Enter the variable names and data elements
    Save it and go back
    Go to Edit -> Set Release
    Follow steps to create more number of segments
    Create IDOC Type
    Go to transaction code WE30
    Enter the Object Name, select Basic type and click Create icon
    Select the create new option and enter a description for your basic IDOC type and press enter
    Select the IDOC Name and click Create icon
    The system prompts us to enter a segment type and its attributes
    Choose the appropriate values and press Enter
    The system transfers the name of the segment type to the IDOC editor.
    Follow these steps to add more number of segments to Parent or as Parent-child relation
    Save it and go back
    Go to Edit -> Set release
    Create Message Type
    Go to transaction code WE81
    Change the details from Display mode to Change mode
    After selection, the system will give this message “The table is cross-client (see Help for further info)”. Press Enter
    Click New Entries to create new Message Type
    Fill details
    Save it and go back
    Assign Message Type to IDoc Type
    Go to transaction code WE82
    Change the details from Display mode to Change mode
    After selection, the system will give this message “The table is cross-client (see Help for further info)”. Press Enter.
    Click New Entries to create new Message Type.
    Fill details
    Save it and go back
    An IDOC with data, will have to be triggered by the application that is trying to send out the data.
    Try this..Hope this will help.
    SAP ALE & IDOC<<<<
    Steps to configuration(Basis) >>
    1. Create Logical System (LS) for each applicable ALE-enabled client
    2. Link client to Logical System on the respective servers
    3. Create background user, to be used by ALE(with authorizaton for ALE postings)
    4. Create RFC Destinations(SM59)
    5. Ports in Idoc processing(WE21)
    6. Generate partner profiles for sending system
    The functional configuration(Tcode: SALE)
    • Create a Customer Distribution Model (CDM);
    • Add appropriate message types and filters to the CDM;
    • Generate outbound partner profiles;
    • Distribute the CDM to the receiving systems; and
    • Generate inbound partner profiles on each of the clients.
    Steps to customize a new IDoc >>>
    1. Define IDoc Segment (WE31)
    2. Convert Segments into an IDoc type (WE30)
    3. Create a Message Type (WE81)
    4. Create valid Combination of Message & IDoc type(WE82)
    5. Define Processing Code(WE41 for OUT / WE42 for IN)
    6. Define Partner Profile(WE20)
    Important Transaction Codes:
    SALE - IMG ALE Configuration root
    WE20 - Manually maintain partner profiles
    BD64 - Maintain customer distribution model
    BD71 - Distribute customer distribution model
    SM59 - Create RFC Destinations
    BDM5 - Consistency check (Transaction scenarios)
    BD82 - Generate Partner Profiles
    BD61 - Activate Change Pointers - Globally
    BD50 - Activate Change Pointer for Msg Type
    BD52 - Activate change pointer per change.doc object
    BD59 - Allocation object type -> IDOC type
    BD56 - Maintain IDOC Segment Filters
    BD53 - Reduction of Message Types
    BD21 - Select Change Pointer
    BD87 - Status Monitor for ALE Messages
    BDM5 - Consistency check (Transaction scenarios)
    BD62 - Define rules
    BD79 - Maintain rules
    BD55 - Defining settings for IDoc conversion
    WEDI - ALE IDoc Administration
    WE21 - Ports in Idoc processing
    WE60 - IDoc documentation
    SARA - IDoc archiving (Object type IDOC)
    WE47 - IDoc status maintenance
    WE07 - IDoc statistics
    BALE - ALE Distribution Administration
    WE05 - IDoc overview
    BD87 - Inbound IDoc reprocessing
    BD88 - Outbound IDoc reprocessing
    BDM2 - IDoc Trace
    BDM7 - IDoc Audit Analysis
    BD21 - Create IDocs from change pointers
    SM58 - Schedule RFC Failures
    Basic config for Distributed data:
    BD64: Maintain a Distributed Model
    BD82: Generate Partner Profile
    BD64: Distribute the distribution Model
    Programs
    RBDMIDOC – Creating IDoc Type from Change Pointers
    This report creates IDocs from the change pointers for the specified message type. It then sends them to the receiving system and flags the change pointers as processed in respect of the specified message type.
    The receiving systems for the specified message type are determined from the customer distribution model.
    Output:-The report outputs information about the number of master IDocs and communication IDocs created.
    RSEOUT00 – Process all selected IDocs (EDI)  Report for generation of files for EDI outbound processing.The report processes the IDocs available in the system with the status 'to be processed'. The IDocs are selected according to the selection options and parameters specified.  
    It is important that you make sure that only test messages or productive messages are selected.
    The IDocs are processed in various files for various output modes and for various ports. The names of the files are created according to the naming definition for the outbound file. This definition is determined in the port definition.
    RBDAPP01 - Inbound Processing of IDocs Ready for Transfer
    RSARFCEX - Execute Calls Not Yet Executed
    RBDMOIND - Status Conversion with Successful tRFC Execution
    RBDMANIN - Start error handling for non-posted IDocs
    RBDSTATE - Send Audit Confirmations
    For testing you can use WE19.
    Hope This will be helpful,
    Best Regards ,
    P Singh

  • What are these and what are they useful for?: and

    I have seen these symbols being used in Java: << and >>, what are they and what do they do?
    Thank you.

    As DrQuincy asks how is this of use over multiplying
    and dividing?In your processor there are often different instructions for shifting, multiplying, and deleteing. Typically the shifting instructions take less time to execute and so using the shifting operator will be faster than multiplying. This assumes the compiler doesn't recognize the situation and optimize it out though.
    The >>,<<,>>>, &,|,and ^ operators are mainly useful when you need to deal with individual bits of data. For instance if you are talking to another system (thats not java) that uses a different method of storing numbers (little endian/big endian etc.), or doing something such as creating parity data for error correction. There are lots of things to do, but most a low level and its rare when you need to use them.

  • Lastfmhelper? What is it and why is it always "not responding"?

    When ever I pull up Activity Monitor lastfmhelper is always red and not responding. Anyone have any idea what it is and why it's misbehaving? I noticed this because my 10.5.2 iMac Core 2 Due will all of the sudden become unresponsive. When I brought up Activity Monitor lastfmhelper was, as I said, red and "Not responding".
    Thanks

    It is not an OS X component so it must be from a third-party software product you've installed. A Google search only turned up a reference to a Windows file. There is a web radio site, Last.fm. You may be using software to access the site or installed software from the site to listen to their internet broadcast. If this rings a bell, then locate the software and uninstall it. It my not be compatible with Leopard.
    Uninstalling Software: The Basics
    Most OS X applications are completely self-contained "packages" that can be uninstalled by simply dragging the application to the Trash. Most applications create preference files which are stored in the /Home/Library/Preferences/ folder. Although they do nothing once you delete the associated application, they do take up some disk space. If you want you can located them in the above location and delete them, too.
    Some applications may install an uninstaller program that can be used to remove the application. In some cases the uninstaller may be part of the application's installer, and is invoked by clicking on a Customize button that will appear during the install process.
    Some applications may install components in the /Home/Library/Applications Support/ folder. You can also check there to see if the application has created a folder. You can also delete the folder that's in the Applications Support folder. Again, they don't do anything but take up disk space once the application is trashed.
    Some applications may install a startupitem or a Log In item. Startupitems are usually installed in the /Library/StartupItems/ folder and less often in the /Home/Library/StartupItems/ folder. Log In Items are set in the Accounts preferences. Open System Preferences, click on the Accounts icon, then click on the LogIn Items tab. Locate the item in the list for the application you want to remove and click on the "-" button to delete it from the list.
    If an application installs any other files the best way to track them down is to do a Finder search using the application name or the developer name as the search term.
    There are also several shareware utilities that can uninstall applications:
    AppZapper
    CleanApp
    Yank
    SuperPop
    Uninstaller
    Spring Cleaning
    Look for them at www.versiontracker.com or www.mackupdate.com.
    For more information visit The XLab FAQs and read the FAQ on removing software.

  • I have ipad 4th gen just noticed it has 10 gig of other what is it and how do i clear it

    ihave ipad 4 noticed i have 10 gigs of other what is other and how do i get rid of it

    How Do I Get Rid Of The “Other” Data Stored On My iPad Or iPhone?
    http://tinyurl.com/85w6xwn
    With an iOS device, the “Other” space in iTunes is used to store things like documents, settings, caches, and a few other important items. If you sync lots of documents to apps like GoodReader, DropCopy, or anything else that reads external files, your storage use can skyrocket. With iOS 5/6, you can see exactly which applications are taking up the most space. Just head to Settings > General > Usage, and tap the button labeled Show All Apps. The storage section will show you the app and how much storage space it is taking up. Tap on the app name to get a description of the additional storage space being used by the app’s documents and data. You can remove the storage-hogging application and all of its data directly from this screen, or manually remove the data by opening the app. Some applications, especially those designed by Apple, will allow you to remove stored data by swiping from left to right on the item to reveal a Delete button.
     Cheers, Tom

  • What is Other and why is it 22G?

    An iPad had 10G of Other on it. I did a restore and now it has 22G of Other. What is Other and why is it there consuming drive space?
    Thanks.

    "Other" is basically non media content.... The italicized text is the C&P text from an old discussion.
    "Other" includes data such as contact information and photos assigned to contacts, calendar events, Safari bookmarks/cookies/history, notes created with the Notes application, SMS messages, email stored locally or cached, and 3rd party application data created and stored by the application.
    This may be the result of some of your music, video, or photos transferred from your computer being mislabeled during the transfer process. The only way to resolve this is by doing a Restore with iTunes.
    A corrupt sync, a sync that did not finish or was interrupted, corrupt photos or files - things like that can cause "other" to soar sky high. Your 22GB is way out of whack as you know.
    You restored and that made it worse so if if one the suggestions in here helps.
    http://appchronicles.com/04/too-much-valuable-space-taken-up-by-other-category-h eres-how-to-fix-that/

  • Using 'what size' what in Library (and other folders) to delete?

    In Library I notice a lot of 'packages' and 'receipts' folders/files - 'pkg' files - can they be dumped?
    There seems to be similar files in 'previous system' - can they be dumped too?
    What is the 'private/var' folder? - can anything be dumped from this?
    Any other tips for deleting redundant files and folders - I've already got rid of the other languages related stuff.
    Many thanks
    Gordon

    "Any other tips for deleting redundant files and folders - I've already got rid of the other languages related stuff."
    http://docs.info.apple.com/article.html?artnum=305454 Mac OS X 10.4: FileVault - "There isn't enough space on your hard disk..." alert
    Empty the trash!
    Open up your application folder & go through all your apps. Trash all the apps you no longer want and/or use.
    An easier way to do this is to open the Application folder in list view & press the Command+j keys.
    In the the dialog that appears, click the "This Window Only" button & the "Calculate All Sizes" check box.
    Wait a bit until your file & folder sizes have all been calculated, then click the "Size" column to sort your apps from the fattest to the most anorexic.
    Get rid of all your photo files you don't want and/or need. Same goes for those pics off the websites you downloaded (gifs, jpegs, etc.).
    Get rid of all your music files you no longer listen too. Especially, if you already have the actual CD/DVDs or you can later redownload from a website.
    Use Spotlight to make sure you got rid of everything. You can even trash directly from Spotlight!
    Drag what you don't want and/or need to the trash. Better yet, download this neat little shareware app demo called AppZapper. It basically does all the work for you by not only trashing the apps but the apps preference files, caches & all its associated files.
    Another software that does the above is AppDelete. Best of all this software is free!
    Burn what you want and/or need onto CDs or DVDs.
    Not everyone has the luxury of purchasing an external HD and/or Mobile accounts to store their "stuff.”
    You can check with your ISP to see if they offer free storage space. Most if not all do now-a-days.
    There are thousands if not millions of free storage facilities on the web also. Use your favorite search engine to search them out as they come in different storage sizes to fit your needs & wants.
    Check for duplicate fonts.
    Applications>Font Book
    Select “All Fonts”
    If you see any “black dots” next to any fonts this mean you have duplicates and/or multiple versions of these fonts.
    To clean this up, select a “black dotted” font or the Apple + click to select multiple dotted fonts;
    Edit>Resolve>Duplicates.
    What the above does is turns off the duplicates & multiple version fonts. Not delete them.
    More than likely the “extras” were installed by other programs and/or other users.
    Clear out font caches
    Use FontNuke. It does all the work for you. And, best of all it’s FREE.
    Printer Drivers
    Get rid of all the printer drivers you don’t need & use except the ones for your current printer(s)/scanner(s).
    HD>Library>Printers Folder
    If you accidentely threw something out that you needed for your printer/scanner it can be easily obtained from the manufacturer’s website and/or from the CD that came w/the printer/scanner.
    Garage Band
    Has about 1GB of loops stored. Get rid of some some them. You surely don’t use, like and/or need them all.
    HD>Library>Audio/Apple Loops>Apple>Apple Loops For GarageBand
    Or just get rid of the Garage Band app altogether if you don’t use it.
    Get rid of extra languages
    Strip your computer down to your “native” tongue.
    You can do this with a FREE utility called Monolingual. Another app that apparently does all the work for you. I’ve never used it. However, a lot of users here swear by & recommend it highly.
    However, there is a warning for *native English speakers*. Make sure you keep BOTH English and English (United States).
    Other Resources:
    HD Space Checkers:
    Disk Inventory X (FREE)
    WhatSize (SHAREWARE)
    OmniDiskSweeper (FREE)
    GrandPerspective (FREE - donation)
    Slimming your hard drive
    *Rule of thumb: You should never let your hard drive get to where you have only 10-15% of space left.*

  • What is the best app for storing all passwords in a secure area? osx snow leopard

    What is the best app for storing all passwords in a secure area? osx snow leopard

    Keychain is nice, but I prefer to use 1Password. It's got a nice user interface, and does what I need. It stores passwords, notes, identitiy info, credit card info, application registration numbers, saves hardware information such as your router settings, and more. It also has a secure password generator. There's an extension that keeps a button in the browser toolbar for Safari, etc., so you can submit your info (password, credit card) with the click of a button, and without having to type the information in through the website you are visiting. It also pays attention when you are signing in to a website, and asks you if you want to save the login to 1Password. Once you get them all entered, it's a big timesaver.
    http://itunes.apple.com/us/app/1password/id443987910?mt=12
    The link above says it is for OS X 10.7 and up, but if you go to the developer's website (link below), it says it works with OS X 10.6 as well. You can also download a 30-day demo from the link below.
    http://agilebits.com/onepassword/mac

Maybe you are looking for

  • Can the mac air print to HP OfficeJet Pro 8600 Plus Wireless e-All-in-One?

    Can the mac air print to HP OfficeJet Pro 8600 plus Wireless e-all-in-one?

  • How to view file size of imported photo

    i plan to import a number of large photos from iphoto. i hesitate because each photo is between 20 and 50 MB. Will iweb scale this file down while importing? How can i find out about it? I did not find file information on the imported photo nor do i

  • Iphoto/Imovie Video problems

    I am haveing a problem using videoclips in iphoto 08 / Imovie 08... Tha videoclips are importet with no problem along with the photos as expected. When doubleclick the videoclips quixktime starts. But then it crashes and shuts down. It happens everyt

  • Change Aperture previews color space from Adobe98 to sRgb

    Hi, I'd like to change the default color space for the jpg previews that Aperture generates from the masters of my library. I now have all my jpegs saved as Adobe98 but it's important for me to have them saved as sRGB because when third party apps an

  • How to detect disconnect tone in spa112

    In spa-3102 is very easy: http://ubuntu4us.corp.eng.br/artigos/voip/asterisk-pbx-and-linksys-spa-3102 How to detect disconnect tone in spa112 ????