Why do we need Evet Trace ON/Off

Hi All,
Why do we need Evet Trace ON/Off ???
Regards
Vamsi

Hi,
If  it is in context with ccBPM, it is used for tracing out all the steps in case of any run time error, It will help you to find out more detailed way
Rgds,
Moorthy

Similar Messages

  • Why does javascript need to be turned off for site to work?

    When javascript is enabled I cannot add items to my cart. The mouse pointer changes to a hand, button changes color, clicking does nothing. When it is disabled, I can add items that do not require a color or size choice. Cookies are enabled. This site works fine with a previous version of Firefox

    Start Firefox in <u>[[Safe Mode|Safe Mode]]</u> to check if one of the extensions or if hardware acceleration is causing the problem (switch to the DEFAULT theme: Firefox/Tools > Add-ons > Appearance/Themes).
    *Don't make any changes on the Safe mode start window.
    *https://support.mozilla.org/kb/Safe+Mode
    *https://support.mozilla.org/kb/Troubleshooting+extensions+and+themes

  • I have windows 7 and I can't sign into ITunes.  Message says to turn off compatibility mode to use.  How and why do I need to do this?

    I have Windows 7.  I was previously using Windows 98 when I set up ITunes and developed a library of music and movies.  When I try to log in I keep getting a message stating that am using an older version of Windows and that I need to turn off "compatability mode to use ITunes.  Where and why do I need to do this?

    Hi there skinguru,
    You may find the information in the article below helpful.
    iTunes for Windows: How to turn off Compatibility Mode
    http://support.apple.com/kb/ts1489
    -Griff W. 

  • Why is it a shared folder in the music app and why do i need internet to listen to it?

    why is it a shared folder in the music app and why do i need internet to listen to it?

    Try in order:
    - Resetting the iPod:
    Reset iPod touch:  Press and hold the On/Off Sleep/Wake button and the Home
    button at the same time for at least ten seconds, until the Apple logo appears.
    - Restore the iPod from backup via iTunes
    - Restore the iPod to factory defaults/new iPod since you may have corruption that is now in your backup
    Based on the info you provided it appears you did the restore from backup and sitll have problems.  Thus, I would just restore the iPod to factory defaults/new iPod.

  • Why do I need to use a CMYK profile?

    Hi all,
    I am new to these forums, but have some theoretical and a bit of practical knowledge on Color Management. I know what a dot gain, color space, true black vs composite black, etc are, yet I struggle to build the big picture of the whole thing. I am actually doing design work, where we are going to print a brochure. I have done the Illustrator artwork, it has an embedded image and I am trying to make it ready for a good precise print.
    My question is, why do I need a CMYK profile at all??
    As I understand it, my document IS CMYK already, i.e. it uses component C, M, Y and K numbers for artwork primitives, and as far as I can understand the whole point of working with CMYK instead of RGB (which is for additive colorimetry - i.e electron guns and LCDs) is the fact that it is suitable for printers. If Cyan, Magenta, Yellow and BlacK inks get input from the CMYK numbers, then the print should look the same on all ink-utilizing devices, should it not?
    That said, I understand the point of RGB-to-CMYK conversion and vice versa, since obviously i have to preview my art on my monitor before it gets into printing. But since CMYK profiles exist, does it mean printers printing the same CMYK values get different results? (disregarding issues of different paper weights and dot gains)
    Thanks. This has been bugging me, and I am not THAT much into printing yet as to buy the Real World Color Management book i ve been hearing so much about.

    If I may add,
    The ONLY times most of us need to embed an ICC profile in a CMYK file are:
    1) We want to PROOF it faithfully on a hardware-calibrated monitor (Photoshop reads the embedded profile and Converts it to Monitor RGB).
    2) We want to PROOF it faithfully on any other hardware-calibrated printer that uses a different Target color space (Photoshop reads the embedded profile and Converts it to the specific target profile). (Or the workflow ignores my Source Profile and Converts to target proofing space based on the wrong working space).
    3) We need to CONVERT it to another profile (Photoshop reads the embedded profile and Converts it to a new target space/profile).
    PERSONALLY, when I deliver CMYK it is already Converted to the correct CMYK (directly from my 16-bit Adobe RGB file), and I do not want anyone downstream dinking around with My Color.
    The old Quark did this task nicely -- simple place the tif and print the job.
    Today's pdf and color-managed layout programs make understanding and implementing this instruction much more confusing and hazardous (how to send 'the numbers' straight through).
    If I trust the print shop 100%, I will hand them my 8-bit Adobe RGB and let them do the Conversion to their press CMYK.
    Otherwise, send [my] CMYK 'numbers' straight through. Period.
    +++++++
    The problems with people who do not understand HOW ICC profile work is they will strip my profile (knowingly or unknowingly) and Assign-Apply-Assume their own profile -- effectively -- hosing my color.
    This problem is easy to see in Photoshop by Assign profile.
    The classic real-world example is the old-school print shop's clueless "color expert" who ignores our embedded profile, because he says, he has turned "color management off" and "doesn't use profiles." He tells us our file is bad because his print is bad, and he will try to correct our bad color and print another round of proofs.
    Does this sound familiar?
    What the cave man actually did was strip our embedded file of its profile, and/or he Applied-Assumed-Assigned his own working space to our file then he takes a sledgehammer and beats our color up into his closed workflow (and he is probably working on an uncalibrated monitor to boot).

  • Why do I need a hardwire for my WRVS4400N wireless router?

    I am not very technically inclined.  Plug and play is my way.  So when I got my first router (a linksys) i plugged in the ethernet cables and voila!-----internet access as well as connectivity for my xbox 360, ps3 and Wii.  The people rejoiced.
    Times change.  I was happy with my last Linksys hard-wired router, so when I finally got tired of all the wires laying around I went Linksys wireless.  BEST BUY told me the best wireless/hardwire router around is the WRVS4400N.  With this router I can have my 2 360's wireless as well as my pc.  The Wii and PS3 along with my wife's computer are hardwired.  There is also a hardwire going from the router to the Comcast cable modem.  Plug and play this, that and the other thing and voila!-----internet and gaming galore!  Once again, the people rejoiced.
    That is, until, I decided to make my wife's computer wireless.  The people rebelled.  Once my wife's pc went wireless (like my two 360's and pc),  I lost all connectivity.  No logging on to the playstation network, XBOX live, Wii surfing, and no internet access.  After many hours of turning off this, resetting that and plugging/unplugging the other thing, we finally figured out how to keep the people happy--one of the pc's has to be hard-wired to allow everything else to work (internet access, gaming, etc.).
    So the people are happy, but the king is not as his kingdom is bound by the tyranny of one ethernet cable.  Not to mention the fact that his wireless signal is unsecured.
    This makes no sense to me.  Why do I need one of the pc's to be hard-wired just to get everything else to work? 

    Trying to download firmware from this go_____ed company is like trying to pull teeth!  I mean, w_f?!  Are they trying to lose customers?
    I found answer ID 4030 and under step 2 it told me "to go to the Linksys download page, click here and verify the model and version number of your Linksys product."  I clicked on the link and that took me to "Support and Services."  I entered my model number where appropriate and that took me to some kind of small business section!  Small business?!?!?  I'm a bloody home user, not some f____ng businessman!!!!!
    Anyway, I click on this link:  Cisco Small Business (Linksys Business Series) software and firmware downloads (I know it says Small business, but where else was I supposed to go?  I mean, this is where Support and Services sent me).  That link took me to Support>Download Software.
    Under "Support>Download Software>Select a Software Product Category" I clicked on the Router Software link (which had a padlock icon next to it).  They wanted me to login again.  So I try, but I keep getting repeated (and erroneous) login errors telling me I entered my username and password incorrectly.  I checked my username and password many times.  No problems with my username or password.  Thus, a dead end there.
    I went to the "Support>Download Software>Software Search" and entered the model number of my router.  I clicked on this link:  Download Software for Cisco WRVS4400N Wireless-N Gigabit Security Router - VPN V1.0 & V1.1 : wrvs440....  Guess what?  They wanted me to login AGAIN!!!!!  So I try, but I get the same login error messages I got before!!!!!  Je___ _______ ____st!  Another dead end!
    I am at my wits end here.  Getting some kind of firmware for my router to work properly should not be this f____ng difficult!  I don't even know how to access my router's web user interface!
    Any other suggestions before I finally say goodbye to Linksys/CISCO?  Because I mean after this b______t experience, the next time I need some type of router or modem or something along those lines, I'm gonna think twice about going to Linksys/CISCO.
    P.S.  Sorry about my edited language, but if you had to go through what I did, I believe you'd be just as frustrated as I am.  I spent around $250.00 for this router and it doesn't even work right!!!!!
    Message Edited by JohnJr on 04-02-2009 10:07 PM
    Message Edited by JohnJr on 04-02-2009 10:08 PM

  • Fault message types: Why do we need them?

    Hi guys,
    I have a bpm scenario created, tested and working.
    This bpm starts with a async receive, a Sync Send to a R3 system by an ABAP proxy and a final async send to the original system.
    I'm contemplating exception handling and other type of errors. Meaning, if the abap proxy dumps I can raise an exception and map it on the XI environment. The thing is, on  sxmb_moni I get the exception handler, with the exception texts, id's, etc... from the R3 being mapped to the XI fault message type.
    But the problem is I can't get to map the text from the fault message type into any field from the response of the original system.
    I've searched the forum and I've seen that this area is surrounded by doubts and questions...
    But in the end I'm forced to place the question, why do I need the fault message types? What use can I give them, besides of the cute little thunder on the sxmb_moni?
    Thanks for your attention guys

    Hi Krishna,
    I've read the SAP description about Fault Message Types but I'm still struggling on how to use them correctly.
    Why do we need them if I can't do nothing with it on the BPM side? After the mapping of the FMT, I'd like to acess it so that I can send a description back to the original system...The thing is, in BPM you can't acess the FMT, you can only create a new BRANCH (on a block step) for it...
    I've tried to acess the description text on trace which comes with the message, but it seems that the trace only serves for posting info, and not for getting any...
    The Mapping Runtime Constants have some information where you can read some descriptions, but nothing related to the errors....You can read the Receiver service, sender, interface_namespace, but nothing from the ERROR tag...
    Is there a way to get the description? Or anything related to the error tag?
    Thanks in advance

  • Just started using illustrator and do not understand why i cannot fill this trace

    alright so i have my image that i have traced, its all chucnked up into groups (hair, eyes, etc...)  but if i try to select say the hair and try to fill it, it does it really bad
    http://img835.imageshack.us/img835/1310/picture6qs.png
    and here i use the live paint tool which does an okay job but lines show through in places where i dont want them to
    http://img543.imageshack.us/img543/6118/picture7g.png
    i do not understand what important piece of information i missed, i thought i could just trace something and fill in the colors, apparently its not that simple.
    this programs works in shapes right? i dont get why that even though everything looks closed off, and is connected to my knowledge, i cant get it to fill
    (at least correctly)
    cuz it feel like could do this in flash in no time, but i'd like to do this kind of work using programs that are specifically designed for it.
    any sort of help would be greatly appreciated.

    Kristacattack,
    The tracing results in separate paths. The straight lines show where the open filled paths start and end.
    In the first sample, you may drag with the Direct Selection Tool over the top where the straight lines meet and Ctrl/Cmd+J to join the the paths; you may do the same elsewhere to create continuous/closed paths (hopefully, you will only drag over the two endpoints, otherwise you will have to find and delete superfluous Anchor Points).
    This may be better than just cheating with the Live Paint Tool because the artwork becomes more coherent.
    Edit: Hi Monika.

  • Sapinst needs to log you off in order to reliably continue the installation

    Hi,
    When I was doing ECC6 installation on windows, just after choosing the installation mode (Typical, Custom) sapinst prompts for user logoff. Below is the some error message
    "sapinst needs to log you off in order to reliably continue the installation" then after I choose ok automatically user got logged off and I logged in again and the installation continued as usually.
    But my qustion is why it is happened. Please let me know the reason for this.
    Thanks in advance.

    Hi,
    Yes...Sunil is correct.
    SAPinst uncars many files into the installation directory and for then to take effect we need to log off and on.
    Regards,
    Nirmal.K

  • Why is serial# needed for unique session info

    hello everybody,
    as you know, a session is unique with 2 fields, SID and SERIAL# which exist on v$session view.
    my question is why is serial# needed and for which case serial# is changing.
    now, you can say that, "only oracle developers know this, that is the design" but what i mean is, for ex: if i wanted to find a session which is blocked by another session, I use this:
    select * from v$session where blocking_session is not null;in blocking_Session field, oracle gives me the session id (SID) which is blocking a session. so i can use this SID and i can kill it for instance but SID is not unique for a session I can find more than one session with same SID which one is the blocking one ?
    in real life i didnt see an example of that, there is no same sid in system like my blocking session example. so I believe that serial# is assigning for another purpose, I mean, i thougth that it could be for autonomous transaction, maybe they user same sid but differen serial# but when i tested it, i saw that i was wrong.
    so, why serial# is exists. if this is a design issue, how can i find a blocking session by just using SID info ?
    thanks a lot.

    Not surprisingly, an explanation may already be found in the documentation (and copied in Rene's reply above):
    See http://docs.oracle.com/cd/E11882_01/server.112/e25513/dynviews_3016.htm (column description).
    Or search:
    http://www.oracle.com/pls/db112/search?word=sid+serial%23&partno=
    Besides for terminating sessions, serial# may be relevant when e.g. tracing sessions (SQL Trace).
    Not sure what type of example you were looking for, but I came up with this in about five seconds:
    C:\Users>sqlplus blocker_user
    Enter password:
    Connected to:
    Oracle Database 11g Express Edition Release 11.2.0.2.0 - Production
    SQL> select sid,serial# from v$session where sid=(select sid from v$mystat where rownum=1);
           SID    SERIAL#
           136         27
    SQL> conn other_user
    Enter password:
    Connected.
    SQL> select sid,serial# from v$session where sid=(select sid from v$mystat where rownum=1);
           SID    SERIAL#
           136         29Edited by: orafad on Feb 1, 2012 12:18 AM

  • Why do we need query rewrite enabled for a function-based index?

    Oracle 9i
    ========
    I have searched a few sites but could not find any content on it. The question is why do we need to implement query rewrite enabled when we are trying out a function-based index?
    Thanks in advance.

    You don't, that's a legacy requirement from the early days of function based indexes in Oracle 8i. Here's a quick example running under 9.2.0.6
    drop table t1;
    create table t1 as
    select
    from
         all_objects
    where
         rownum <= 30000
    create or replace function pl_func(i_vc     varchar2)
    return varchar2
    deterministic
    as
    begin
         return soundex(i_vc);
    end;
    -- set the worst case scenario
    alter session set query_rewrite_enabled = false;
    alter session set query_rewrite_integrity = enforced;
    create index t1_i1 on t1(pl_func(object_name));
    execute dbms_stats.gather_table_stats(user, 't1')
    set autotrace traceonly explain
    select
         object_name
    from t1
    where pl_func(object_name) = 'T513'
    set autotrace offResults (after set feedback off)
    SQL> @temp
    Execution Plan
    Plan hash value: 1429545322
    | Id  | Operation                   | Name  | Rows  | Bytes | Cost (%CPU)| Time     |
    |   0 | SELECT STATEMENT            |       |    27 |   675 |    10   (0)| 00:00:01 |
    |   1 |  TABLE ACCESS BY INDEX ROWID| T1    |    27 |   675 |    10   (0)| 00:00:01 |
    |*  2 |   INDEX RANGE SCAN          | T1_I1 |    27 |       |     1   (0)| 00:00:01 |
    Predicate Information (identified by operation id):
       2 - access("TEST_USER"."PL_FUNC"("OBJECT_NAME")='T513')
    SQL> spool offRegards
    Jonathan Lewis
    http://jonathanlewis.wordpress.com
    http://www.jlcomp.demon.co.uk

  • Why do I need brarchive ?

    Hi,
    Few questions about db2 log archiving.
    We have TSM server in our enterprise and use it to store db2 backups and db2 logs. We have "TSM for Enterprise Resource Planning" software installed. As I understand this is like TSM client and we use it for full backups (db2 backup standard command contains path to this software directory), also there is "TSM for Enterprise Resource Planning" tool called backom which allows to backup, restore, view full backups and logs.
    Having all this software looks enough to backup logs - but our log backup script uses brarchive command. Few questions.
    1. Why do we need brarchive if we have "TSM for Enterprise Resource Planning" software and it's interface backom ? Maybe brarchive does something extra ?
    2. Does brarchive uses "TSM for Enterprise Resource Planning"  client or connects to TSM server using other methods ?
    3. What is relation of ADMPRODDB database which resides in the same db directory as PRODDB, and brarchive ?
    4. Where can I find any brarchive documentation ?
    thanks
    Vilius
    Edited by: Vilius Mockunas on Apr 2, 2009 3:04 PM
    Edited by: Vilius Mockunas on Apr 2, 2009 3:07 PM

    If you use DB2 UDB 8.2 or higher with the new logfile management [https://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/280b4546-0a01-0010-7d8c-82abb2296e1c|https://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/280b4546-0a01-0010-7d8c-82abb2296e1c] you do not need to care about brarchive.
    brarchive existed to archive logfiles that were already moved off the online directory (to another directory named ~db2<sid>/log_archive/...) to tape / external storage. As of version 8.2, Db2 includes a logfile management that makes the use of brarchive obsolete.
    Malte

  • WHY DOES MY MAC BOOK PRO SHUT OFF ON ME? SO FAR THE INFO I GOT 4 IT IS A MAC OS X VERSION 10.7.3 THE PROCESSOR IS 2.4 GHZ INTEL CORE 2 DUO MEMORY IS 2 GB 667MHZ DDR2 SDRAM I DON'T KNOW HOW OLD IT IS BECAUSE I BOUGHT IT USED SORRY I HOPE THIS HELPS THANK Y

    WHY DOES MY MAC BOOK PRO SHUT OFF ON ME? SO FAR THE INFO I GOT 4 IT IS A MAC OS X VERSION 10.7.3 THE PROCESSOR IS 2.4 GHZ INTEL CORE 2 DUO MEMORY IS 2 GB 667MHZ DDR2 SDRAM I DON'T KNOW HOW OLD IT IS BECAUSE I BOUGHT IT USED SORRY I HOPE THIS HELPS THANK YOU

    Sounds to me like you may have gotten a machine with hardware issues, but it's hard to say.  It will shut down if it gets too hot, but that's not a normal occurrence.  I have never seen a MacBook Pro shut down due to heat, even after lengthy 3D gaming sessions where the fans are running fast and the bottom of the machine is unpleasant to touch.
    First thing I would try to do is reset the SMC.  If that doesn't help, erase the hard drive and reinstall the system from scratch, which you should always do with a used machine anyway.
    If a fresh system doesn't help, you'll need to get it checked out by Apple.
    Edit: Oh, and sig is absolutely right...  please don't post in all caps!  It's very irritating.

  • I have os 10.4. Why do I need the mac box set to upgrade to snow leopard?

    I have os 10.4. Why do I need the mac box set to upgrade to snow leopard? What happens if I upgrade with just a 10.6 upgrade?

    ds store wrote:
    No iPhoto, iMovie, iDVD, Garageband, but I can pinch those off the 10.4 installer disk using Pacifist.
    You can usually get those from the original grey installer discs that came with your Mac without bothering with Pacifist. Look for an 'installed bundled software' or similarly named item on one of those discs, generally the #1 disc. Run that & the original versions of those apps that were bundled with your Mac will be installed. Software Update will let you know if there is an update you can download for them (but of course that won't include an upgrade to a more recent major version, which you would have to buy separately).

  • Why would you need a database design before implementing?

    Why would you need a database design before implementing?

    977222 wrote:
    Why would you need a database design before implementing?It appears from the 4 questions you put up ina 2 hour period
    help me with this
    Why would you need a database design before implementing?
    Re: answer these quesions pls
    answer these quesions pls
    That you have put off doing your homework and now expect this forum of volunteers to do your research for you ....

Maybe you are looking for

  • After upgrading to mountain lion my usb drive gets disconnected

    I have a late 2009 iMac that just installed Mountain Lion. Every single USB external drive that is connected, shortly after a while gets unmounted. I tried with disabling sleep mode for HD etc and no success. Then I tried USB card reader and same exa

  • Cannot download skype to my iPhone

    I had downloaded skype to my iPhone was having problems with it skype. I deleted it and I am now trying to download again to pmt phone but I cannot download.

  • Importing In different DBProvider name : Urgent

    Hi, I am trying to export a DataBase Provider from one Portal to another Portal environment. The case is that I want to import the exported DBprovider with a different name into the destination Portal environment.. Is this Possible to be done ... Tha

  • Wait time announcement on UCCX

    Hi all, Our customer have a requirement to play back the wait time using UCCX IVR, in short when the customer calls and placed in to queue, IVR has to playback the wait time to the customer , which will help them to know how long they need to wait in

  • Nokia Messaging Plan cancelled

    Hi, I have set up Nokia messaging with my former E63. Some month ago I got my new E72. When I set up mail it said that I already have an account that I can use. So did I. Now I got an automatically generated mail that said my old phone is used by som