When and why do we use MTL_TRANSACTION_LOTS_INTERFACE in WOLC completions?

Hi,
While performing WOLC (Work OrderLess Completions) for Assembly completions, why do we check for records in MTL_TRANSACTION_LOTS_INTERFACE?
For example, I'm performing WOLC for one assembly item for which we have lot-controlled components.
Is it necessary for the records to exist in MTL_TRANSACTION_LOTS_INTERFACE ?
Thanks in advance.

Dear Vikash and dear Javier,
Thanks for your help. I am still confused with these sales area. But what you say is:
- We can create a sold to party without sales area in CRM and it could be replicated into ISU as a contract partner with an SD customer.
- To replicate the service contract into ISU, I need to assign to this document a sales area. Is it necessary because it will be replicated in ISU as an utilities contract and it's not an SD document? If the sales area are required, i will have to set up these sales area in the organizational structure (PPOMA_CRM). In this case, when I will create the service contract, I will have to determine the correct organisational structure based to some custom/specific rules?
Sorry for these riddiculous questions but it's hard for me to understand this sales area concept.
Thanks again,
Stephanie

Similar Messages

  • When and why (how) use the exit RSR00003 (EXIT_SAPLRRS2_001)

    Boa tarde, expert´s ...
    I tried to find documentation about exit RSR00003, but I didn´t found ...
    I want know when and why a have to use this exit ...
    Muito obrigado,

    Hello,
    The exit is only for Internal SAP use this is why you don't find any documentation for it. So you don't need
    to use it, see the information in the SAP note 153562.
    Best Regards,
    Des

  • Which partition type option i use and when and why?

    hi
    i really confused with the types of partition available with essbase, i really want to know which partitioning option i use and in which situation and why should i use that partion type.
    ok

    Hi This kinda question is already answered in this forum many times.
    See the below threads, you will get a better idea of using partitions.
    Re: using partition in real time
    Re: Partition between Essbase and Hyperion Planning Cube
    Re: Transparent Partition - REQUEST HELP
    Re: partition aso to bso error

  • What is "Directory Service" and why does it "use up 194%" ?

    What is "Directory Service" and why does it "use up 194%" on my istat CPU app monitor?
    Ever since I installed Leopard I've noticed this happening more and more - especially when I install an external hard drive or unplug my ethernet line - this is plainly weird and never happened under Tiger - the temperature shoots up to 84° also - I always to a restart to get rid of it but it's kind of worrying....anybody have any ideas?
    Message was edited by: Host

    Had this happen myself.
    It does have something to do with Spotlight/searching. Should go away after a while, or so I have heard from other users, 'cause it hasn't stopped driving me and my fan mad yet.
    Am going to have my MacBook index and follow-up on indexing and whatever else it feels is necessary to finally allow me to search in peace over the weekend while locking it away where I can't hear it.
    Hopefully that does the trick.
    If it wasn't for things working better/faster and most things looking better I might actually consider taking Leopard off again ...

  • When and Why Do We Need to Create 2 Diff iTunes Libraries?

    Hi,
    When and Why Do We Need to Create 2 Diff iTunes Libraries?
    Thanks.
    Ed

    There's no fast rule sayng you must, and I suspect most people only use one.
    You might want to set up a second library if your first one is so huge that it is slow to operate.  Split your media. For example, I don't listen to classical and rock music at the same time and could restart iTunes ffrom a different library when the time came to switch.
    I have a few extra libraries. One's for music I organized for a special occasion but don't really listen to myself and don't want it cluttering mine. I also have a special library for my mp3 player (not an Apple model) with its own set of files which match some in my main library but they are tagged differently to be compatible with the player's quirks.
    I could also see having a different library for files on an external drive if you have some on your internal drive too.  You might, for example, have a bunch of movie files on an external drive that you don't normally need to have plugged in all the time and don't want iTunes giving you a bunch of exclamation marks if are using it to play your music media on your internal drive.

  • When and why "Never Shared" ??

    when and why we use "Never Shared" in Essbase ??
    Give an real life example which explore it detail ??
    Thanks in advance ....

    Here is an example of lots of reading for you :- Never Share memer
    Cheers
    John
    http://john-goodwin.blogspot.com/

  • Vectors gone?  When and why?

    I have read in a couple of posts that Vectors are "legacy" and may not be around forever. Can anyone shed light on the when and why of this? I am relatively new to JAVA programming but I do have a bunch of applications out there that use Vectors. I personally found them very easy to work with.
    Thoughts?

    Wow! I can't wait for Java 2.0! (Please read heavy sarcasm.)
    Speaking of rumors, let's not start spreading any rumors that the Java group at Sun has actually started to talk about -- let alone publicly announced -- that a 2.0 version is in the works; 1.5 sounds right to me.
    I know that you can get almost the same functionality out of a List that is returned from the Collections.synchronizedList(List) method as you can out of a Vector, but Vector is by no means a deprecated class. (We should try to be careful about the casual use of meaning-laden words.) pengjuc is right that a lot of Swing (and non-Swing) classes such as JTable rely on Vector; the mere rewrite to replace all the Vectors with ArrayLists would probably require a Java release all on its own (and whose to say that ArrayLists are really all that, anyway?). Moreover, Vector is part of the public API of many classes and to deprecate it would throw a lot of developers into a tizzy because it would potentially break the ability of their applications to upgrade to a new version of Java. There is nothing inherently wrong with Vector -- it performs as advertised -- and pengjuc is right again that the performance differentials are minute over small object collections.
    In response, again, to dubwai, there's a difference between using Vectors as a developer and having them included in the J2SDK. If you don't like them don't use them, and if you don't like them in other classes, rewrite those classes to your taste. Personally, I think you either have to take what you're given, do it yourself, or get involved in the process.
    Good luck, All!
    Shaun

  • When and Why do we need to build a CUSTOM CUBE

    Hello Experts, Could some please explain with a scenerio ..
    "When and Why do we need to build a CUSTOM CUBE"
    Thanks in advance
    Bhalout

    When and Why:
    Custom cube should be think of when the constent cube is either not suitable nor available for a subject area.
    If there is a content cube and but does not meet your reporting needs, then the better thing will be to adopt the content one and make changes.
    Ravi Thothadri

  • How and why do I use Xpn files in Photoshop cc 2014

    How and why do I use Xpn files in Photoshop cc 2014. in windows & SP2. I have been given about 20 .XPN files with a Photoshop course. I believe they are PS presets. I have no idea what to do with them.
    Thanks

    To be honest, i don't what those are either, as far as photoshop is concerned.
    Is the course specific to one subject or a general photoshop course?
    Here's a list of some of the most common kinds of photoshop files and the relevant extensions
    http://www.zuberphotographics.com/content/downloads/file-extensions.htm

  • What is MRP and why it is used?

    hi
    this question was asked in an interview can some one explain in detail for me
    What is MRP and why it is used? If there are 2 Lakhs of items is it feasiable to run MRP since running of MRP for 2 lakhs of item is time consuming, if yes then how it is been done?
    thanx

    Dear Bashir,
    1.MRP is material requirements planning which plans the required quantity of depedent material's along with the required date.
    2.MRP procedure is sub divided into a normal MRP,Master Production Scheduling and Consumption Based Planning.
    3.Cosnumtion BAsed planning is further sub-divided into Time Phased Planning,Reorder Point Planning and Forecast based
    Planning.Reorder point planning can be automatic or Manual.
    4.MRP type is differentiated using the MRP type value assigned in the MRP1 view of the material master.
    5.Some of the MRP types are PD - MRP,M0,M1,M2,M3 - MAster Production Scheduling related,VB - Manual reorder point
    planning,VM-Automatic reorder point planning.
    6.It is possible to take the MRP for the whole plant/for a specific MRP area using the batch MRP job.
    7.MDBT is the T Code for scheduling the MRP job or it can be scheduled for the program RMMRP000 using the T Code SM36
    and the results can be checked using SM37.
    Regards
    Mangalraj.S

  • When and why do i have to use a Network-Path?

    Hello,
    i'm wondering when i why i have to use a Network-Path in KM.
    I'm able to connect to a File-System Repository, even if i have no Network-Path defined.
    - both run on W2K Server
    - EP runs on host EP (not an Domain-member)
    - Filesystem is provided by host FS (Domain-member)
    - EP is started with the default local-user SAPServiceEP6
    - on the FS host, i have defined also a local-user SAPServiceEP6 (because EP always wants to logon with these credentials, i have checked this in the windows securitylog of host FS)
    - no network-path defined
    So regarding the fact, that everything is working, can anybody tell me when i have to use a Network-Path?
    Thanks in advance
    Frank

    Hi,
    for example if you want to access a share that only access is granted for a given user. The idea is having a superuser with privileges on the other computer to do things like checking ACLS.
    Another example, how can you access windows shares when running the portal in Unix? Using a network path.
    REgards,
    Miguel

  • What is kernel_task? And why does it use so much memory?

    I have an iMac 27 inch late 2009 purchased new in July 2010. It has a 3.08 Ghz Intel Core 2 Duo Processor and 4 GB of Memory. I recently upgraded to Yosemite and just now was unable to save an Excel document to an external hard drive with plenty of space with the warning I did not have enough memory. I went to my activity monitor and indeed there is very little memory and at the top of the usages of memory is kernel_task?  I don't know what that is and why it requires so much system memory.
    Also, there is an installation I aborted for an app I realized I didnt need and for some reason something it out there still taking system memory and I get a message when I shut down that it can't install. How do I delete that.

    DNS (Domain Name Service) is the Internet "address book" of web sites. Whenever you go to a site such as http://apple.com your browser must make calls to the DNS server specified in your Network Settings to translate "apple.com" into Apple's IP (Internet Protocol) address of 17.178.96.59. Any time you access any Internet resource (such as sending or receiving email, playing multi-player games, using a browser, Using any app that accesses data on the Internet such as news, weather, stocks, etc) one or more DNS lookups must be made. Many web sites have content from several different sites. Each site referenced on the page must also be looked up. Each query is small (~100 bytes), but they can add up.

  • JAAS. BEA, when and how should I use it?

    Hi,
    I am confused and I hope someone at BEA sees this post or someone who knows the
    answer steps up and clarifies this issue for me - please.
    I have a basic web application, WLS 7, using Struts, Toplink, Oracle 8i. Pretty
    standard. In 6.0 we used RDBMS realms to Authenticate and Authorize our users.
    We used the web.xml to indicate we were using FORM based authentication and the
    SECURITY CONSTRAINTS were using role names that matched what the RDBMS Realms
    were pulling from Oracle.
    As I read the docs and look at the examples I see all the old stuff is deprecated,
    I do see I have the option of running in compatability mode - however I don't
    want to do this if this is not the way things will be done in the future.
    I followed the steps in the excellent post by Aaron Mulder "Weblogic 7 RDBMS Realm
    Procedure" and create my own Authentication provider, deployed it and it seems
    to be running. However I am now having problems getting the web.xml to "kick"
    when I try and access a resticted resource I am not sent to my FORM Based authentication
    login page... shouldn't I be? I would think the security constraints would be
    loaded correctly and same with the LOGIN config stuff and that WLS would just
    use all the providers but that it would know what to do for things like _security
    check and all the contraints in the web.xml.
    Am I going down the correct path? Do I just need to now write an Authorization
    provider too? In my test in my Authentication provider I put everyone into the
    "Administrators" group and use that in my web.xml. I would expect I would be sent
    to the login page first, then WLS would upon form submittal, check the Authentication
    provider, then my code would say all users are "Administrators", then it would
    check that with the web.xml security constraint, then if the role matched would
    send me on to the page.
    Help :> I just want to get this working and make sure I am using the correct paradigm.
    Thanks,
    Jerry Rodgers

    You use JAAS when running in the app maybe, that is up to the container. It
    is transparent to the developer. If your writing a J2EE app, you do not need
    to write JAAS modules. Use j_security_check and the rest is handled through
    the container.
    You don't need that runAs() shit or LoginContxt.login() etc.
    Only if you are outside the container.
    Go head, reinvent the wheel. JAAS is meant for people who write containers,
    not for people who use them.
    Way to add confusion to an already clouded issue.
    Also, let me explain J2EE authorization
    You said: "As far as I know, J2EE does not specify how the authentication
    is performed, so I don't know how you can say that JAAS goes
    against the J2EE spec."
    Dude, you define security restraints (authorization) to whatever resources
    you want through a web.xml or ejb-jar.xml by asigning roles to them.
    Im doing it as we speak.
    Mike
    "Wayne M Adams" <[email protected]> wrote in message
    news:[email protected]...
    >
    Michael:
    Please see my posts (8771 and 8772). You do use JAAS
    when running an app within the WLS container. In fact,
    you already are, whether you use the OOTB "new" security
    SPI authentication providers or are in Compatibility
    Security, in which case you're using JAAS through an adapter
    to your old-style Realm.
    Concerning "standard" authentication, the J2EE spec says:
    "The web client forwards the authentication data to
    the web server, where it is validated by the web
    server... The validation mechanism may be local to
    the server, or it may leverage the underlying
    security services. On the basis of the validation,
    the web server sets a credential for the user."
    (Also, see section J2EE.3.3.2, "Non Goals").
    As far as I know, J2EE does not specify how the authentication
    is performed, so I don't know how you can say that JAAS goes
    against the J2EE spec. WLS chose to use JAAS for authentication
    because it's a Java-based implementation of a "standard" (PAM)
    and Java security developers are familiar with it...
    Jerry, it sounds like you're doing the right thing. You
    will want to move away from the old Realm and get out of
    Compatibility mode. I'm not sure what specific problem
    you're having - if you're not being directed to your login
    form page, my guess would be something else is wrong. That
    is, I wouldn't expect to see a problem in the new ATN provider
    crop up until after you had submitted your form info to
    j_security_check. If you're not getting to the login page
    at all, it would seem there might be a problem with a URL
    mapping in a web resource collection, or something like that.
    Just a guess.
    Also, I don't think you need to implement your own provider
    unless the one that's there doesn't meet your needs. In other
    words, I can't see any reason why your authentication provider
    couldn't work just fine with all the other WLS OOTB security
    providers.
    wayne
    "Michael Lee" <[email protected]> wrote:
    Dont use JAAS when running an app within your container. That goes
    against
    the J2EE spec.
    Read my 32423432 previous posts here.
    Mike
    "Jerry Rodgers" <[email protected]> wrote in message
    news:[email protected]...
    Hi,
    I am confused and I hope someone at BEA sees this post or someone whoknows the
    answer steps up and clarifies this issue for me - please.
    I have a basic web application, WLS 7, using Struts, Toplink, Oracle8i.
    Pretty
    standard. In 6.0 we used RDBMS realms to Authenticate and Authorizeour
    users.
    We used the web.xml to indicate we were using FORM based authenticationand the
    SECURITY CONSTRAINTS were using role names that matched what the RDBMSRealms
    were pulling from Oracle.
    As I read the docs and look at the examples I see all the old stuffis
    deprecated,
    I do see I have the option of running in compatability mode - howeverI
    don't
    want to do this if this is not the way things will be done in the
    future.
    >>>
    I followed the steps in the excellent post by Aaron Mulder "Weblogic7
    RDBMS Realm
    Procedure" and create my own Authentication provider, deployed it andit
    seems
    to be running. However I am now having problems getting the web.xmlto
    "kick"
    when I try and access a resticted resource I am not sent to my FORMBased
    authentication
    login page... shouldn't I be? I would think the security constraintswould
    be
    loaded correctly and same with the LOGIN config stuff and that WLSwould
    just
    use all the providers but that it would know what to do for thingslike
    _security
    check and all the contraints in the web.xml.
    Am I going down the correct path? Do I just need to now write anAuthorization
    provider too? In my test in my Authentication provider I put everyoneinto
    the
    "Administrators" group and use that in my web.xml. I would expect Iwould
    be sent
    to the login page first, then WLS would upon form submittal, checkthe
    Authentication
    provider, then my code would say all users are "Administrators", thenit
    would
    check that with the web.xml security constraint, then if the role
    matched
    would
    send me on to the page.
    Help :> I just want to get this working and make sure I am using thecorrect paradigm.
    Thanks,
    Jerry Rodgers

  • When and Why Did Apple Drop The 160GB Classic Ipod

    Hi
    I was going to go and finally buy a 160GB Ipod tomrrow.I see they don't even list it anymore on Apples site and Future-shop doesn't even list it on the site.
    They only make a 120GB Now
    When Did they Drop this and why???
    Also Do any stores still have them in Stock???
    I won't be spending the money on only a 120GB if thats all they make now
    I've had my Ipod Mini 4GB since 2005 and thought it was time for a upgrade.
    Please do tell me if Apple still makes the 160GB Ipod
    thanks

    Apple has discontinued the 160GB. You can buy one online still, but not from Apple. Or buy a used one off Craig's List.
    P.S. Actually Apple is still selling refurbished 160GB on it's site, if you want to go that route. I also found some new ones on Amazon. Buy.com may have some too.
    Message was edited by: iPodDiva

  • What is powerd and why is it using so much cpu

    When I check the activity monitor, it is almost pegged out. Because of this other things run slowly. So, what is "powerd" and why is it all of a sudden using so CPU?

    It is something related to power management, but it shouldn't be running away like that.
    Select it in Activity Monitor and then Quit it using the "X in octagon" button. You should only need Quit, but try force quit if needed.
    It will restart, but hopefully it won't start running away. If it does, there is likely something else causing it to do that.

Maybe you are looking for

  • How can I remove all the drawing canvases from a Word file?

    Hi, There are many drawing canvases in the document, which were created by pressing 'edit' on embedded EMF files. I would like to replace the embedded figures with object references, so I searched for a way to delete all the drawing canvases but coul

  • Changing Picture Icons???

    Okay, so I noticed something weird just now, I was just checking over my system preferences when I noticed that one of the icons now has a different picture. The universal settings icon was just a symbol that resembeled a person right? Now what is sh

  • Create New Entry Points

    Hi All, I have a requirement to display a folder as an Entry Points in KM. Same as displayed in the blog [https://www.sdn.sap.com/irj/scn/weblogs?blog=/pub/wlg/1027] I have done the configuartion as mentioned the blog still I am not able to view the

  • Long Captures aborting at 5 minutes.

    Screen image freezes about 5 minutes in everytime I try to capture. Then it starts again but clip is out of synch. Never had this problem before. 4 years. Warning indicates dropped frames on both the line cut and ISO reel. Already went into preferenc

  • Are networking problems all a matter of security settings?

    After attempting in every possible way to resolve the various networking and airport issues discussed in this forum, I seemingly resolved all of them by switching security from WPA/WPA2 to WEP. As soon as I reset my routers to reflect that, everythin