Your comments on our Corporate ID.

Hello everyone...
I would really like to hear your comments about our new company profile...
Does it fit to a company who is producing product diplays for supermarkets and bank ATMs and visual merchandising products in its 3000m2 atelier ...
Thank you.. 

Hello Noel..
Thank you verymuch for your reply and comments..
I found that the big P then having a small P at the front of PRO made me think about it a bit.  Is it PPRO-MET or PRO-MET?  Yes you are right .. I want to use this big P alone .. and want to add this promet text in a more different way but I cant get somethhing for now.. Would be perfect if you share your idea with me ... w
Maybe that's the kind of visual tension you want - make people think about it so they remember it. 
Looks quite slick.   tHANKS...
-Noel

Similar Messages

  • This might be a simple question.   On those sites that do not differentiate between models when on the internet I.e. Facebook when after your comment and you cannot hit "enter" on an iPad for examp. And speed is slow to connect.  What is = to post?

    This might be a simple question. On those sites that do not differentiate between CRT, laptop, tablet etc. such as an iPad Mini and using the Facebook site fir example when going to post a comment and you do not have a enter button on the IPad and the speed is slow how do you get your comments to post if we do not have a enter button? 
    <Email Edited By Host>

    I don't have facebook so I cannot answer but for your personal security, I have asked the hosts to remove your e-mail address.   It is very unwise to publish this.

  • HT4528 Good afternoon ...  I would like to know how I can do to communicate with Verizone company to see if I can unlock my iPhone 5 which acquired in NY last year, buy it because you sold me released but is totally false ...  I welcome your comments ...

    Good afternoon ...  I would like to know how I can do to communicate with Verizone company to see if I can unlock my iPhone 5 which acquired in NY last year, buy it because you sold me released but is totally false ...  I welcome your comments ...

    Krawly11 wrote:
    That's what they told me at the time of purchase and that's why the team acquired ...
    But when I get to Venezuela and introduce NANO-Sim in a line to use the phone here just does not respond to the network ... None of the 3 phone lines we handle here ...
    It is a 64G IPhone 5 ... 
    Regardless, it is not a matter of carrier locking.  Verizon iPhone 5 phones were never GSM sim-locked to begin with.  Every iPhone Verizon has sold since the introduction of the iPhone 5 has been sold with an unlocked GSM slot, as required in the USA by their agreement with the FCC.  They have not been allowed to sell any iPhone 5, iPhone 5c nor iPhone 5s devices with GSM carrier locking in place.
    Your connection problems are from some other cause - it is NOT a carrier locking issue.

  • Hi, I have the following problem with Time Capsule: La imagen del disco de copia de seguridad "/Volumes/Data/MacBook Pro de Carlos.sparsebundle" ya está en uso. Please your comments to solve this problem, i can't made a backup. Thanks.

    Hi, I have the following problem with Time Capsule: La imagen del disco de copia de seguridad “/Volumes/Data/MacBook Pro de Carlos.sparsebundle” ya está en uso. Please your comments to solve this problem, i can't made a backup. Thanks.

    Try Here  >  http://pondini.org/TM/Time_Capsule.html
    Perhaps P 2  >  Time Machine could not complete . . . sparsebundle could not be accessed. (Error 109).

  • I have an ipad (IOS 7.1) and downloaded latest version of itunes (11.1.5.5) and downloaded itools (1.8.2.8) but my Itools does not work and message that your itools is not compatible with itunes so please want your comment for that.

    I have an ipad (IOS 7.1) and downloaded latest version of itunes (11.1.5.5) and downloaded itools (1.8.2.8) but my Itools does not work and message that your itools is not compatible with itunes so please want your comment for that.

    Hello JD_NINJA,
    Thanks for using Apple Support Communities.
    Error 9006 when restoring your iOS device indicates that there is security software on your computer which is preventing connection to the Apple server or your device.  To troubleshoot this issue please follow the directions below.
    Check your security software
    Related errors: 2, 4, 6, 9, 1611, 9006. Sometimes security software can stop your device from communicating with either the Apple update server or with your device.
    Check your security software and settings to make sure that they aren't blocking a connection to the Apple servers.
    Get help with iOS update and restore errors - Apple Support
    When restoring your iPhone, please make sure to follow the directions in the link below to properly restore.
    Restore your device from an iCloud or iTunes backup - Apple Support
    Take care,
    Alex H.

  • Are there companies who will create a soundtrack for our corporate project

    Does anyone know of a company or individual who can create an underlying soundtrack for our corporate training video? It's about 30 minutes long.

    Unless you have a large budget ($3,000-10,000) I would recommend purchasing Royalty free music from any one of a plethora of stock music companies. Just google Royalty free music and you'll get plenty of links.
    Here's one to start:
    http://www.royaltyfreemusic.com/corporate-presentation.html

  • I'm on Vacation with no access to my Mac.  But had tried Sync. My software update is iOS 6.0.1. I've tried another WiFi network.  I read your comment of deleting Apps for stuck update. So removed all Apps! Can't even install Free Apps. Now using my Kindle

    I'm on Vacation with no access to my Mac.  But had tried Sync. My software update is iOS 6.0.1. I've tried another WiFi network.  I read your comment of deleting Apps for stuck update. So removed all Apps! Can't even install Free Apps. Now using my Kindle

    Purplehiddledog wrote:
    I do backup with iCloud.  I can't wait until the new iMac is available so that I can once again have my files in more than 1 location without needing to rely solely on the cloud. 
    I also rely on iTunes and my MacBook and Time Machine as well as backing up to iCloud. I know many users know have gone totally PC free, but I chose to use iCloud merely as my third backup.
    I assume that the restore would result in my ability to open Pages and Numbers and fix the problem with deleting apps, but this would also mean that if my Numbers documents still exist solely within the app and are just not on iCloud for some reason that they would be gone forever.  Is that right?
    In a word, yes. In a little more detail.... When you restore from an iCloud backup, you must erase the device and start all over again. There is no other way to access the backup in iCloud without erasing the device. Consequently, you are starting all over again. Therefore, it would also be my assumption that Pages and Numbers will work again and that the deleting apps issues would be fixed as well.
    If the documents are not in the backup, and you do not have a backup elsewhere, the documents could be gone forever.

  • I would like to read your comments on following code

    Hi all.
    Here is a bdc code sample of transaction mm02.
    I have given this example to get an idea of the bdc programming.However for days I have read many articles on bdc but could not focus on this topic.
    I want to start by reading your comments on this topic.
    What is:
    perform bdc_dynpro 
    perform bdc_field
    and the values tracing them.
    While putting the itab value near this functions, I do not know put which one to put...
    Wait for Clear comments.Thanks.
    DATA : BEGIN OF MLZ OCCURS 0,
            MATNR LIKE MARA-MATNR,
            LABOR LIKE MARA-LABOR,
           END OF MLZ.
    LOOP AT MLZ.
      SELECT SINGLE * FROM MARA WHERE MATNR = MLZ-MATNR.
      LABORT = MLZ-LABOR.
      MLZ-LABOR = LABORT.
      CONDENSE MLZ-LABOR.
      perform bdc_dynpro      using 'SAPLMGMM' '0060'.
      perform bdc_field       using 'BDC_OKCODE' '=AUSW'.
      PERFORM BDC_FIELD       USING 'BDC_CURSOR' 'RMMG1-MATNR'.
      PERFORM BDC_FIELD       USING 'RMMG1-MATNR' MLZ-MATNR.
      perform bdc_dynpro      using 'SAPLMGMM' '0070'.
      perform bdc_field       using 'BDC_OKCODE' '=ENTR'.
      perform bdc_field       using 'BDC_CURSOR' 'MSICHTAUSW-KZSEL(01)'.
      perform bdc_field       using 'MSICHTAUSW-KZSEL(01)' 'X'.
      perform bdc_dynpro      using 'SAPLMGMM' '4004'.
      perform bdc_field       using 'BDC_OKCODE' '/00'.
      perform bdc_field       using 'MARA-LABOR' MLZ-LABOR.
      perform bdc_dynpro      using 'SAPLSPO1' '0300'.
      perform bdc_field       using 'BDC_OKCODE' '=YES'.
      perform bdc_transaction using 'MM02'.
      REFRESH BDCDATA.
    ENDLOOP.

    Go through this DOC ..u will find all ur ans....(Reward if helpful.
    BATCH DATA COMMUNICATION
    About Data Transfer In R/3 System
    When a company decides to implement the SAP R/3 to manage business-critical data, it usually does not start from a no-data situation. Normally, a SAP R/3 project comes into replace or complement existing application.
    In the process of replacing current applications and transferring application data, two situations might occur:
    • The first is when application data to be replaced is transferred at once, and only once.
    • The second situation is to transfer data periodically from external systems to SAP and vice versa.
    • There is a period of time when information has to be transferred from existing application, to SAP R/3, and often this process will be repetitive.
    The SAP system offers two primary methods for transferring data into SAP systems. From non-SAP systems or legacy system. These two methods are collectively called “batch input” or “batch data communication”.
    1. SESSION METHOD
    2. CALL TRANSACTION
    3. DIRECT INPUT
    Advantages offered by BATCH INPUT method:
    1. Can process large data volumes in batch.
    2. Can be planned and submitted in the background.
    3. No manual interaction is required when data is transferred.
    4. Data integrity is maintained as whatever data is transferred to the table is through transaction. Hence batch input data is submitted to all the checks and validations.
    To implement one of the supported data transfers, you must often write the program that exports the data from your non-SAP system. This program, known as a “data transfer” program must map the data from the external system into the data structure required by the SAP batch input program.
    The batch input program must build all of the input to execute the SAP transaction.
    Two main steps are required:
    • To build an internal table containing every screen and every field to be filled in during the execution of an SAP transaction.
    • To pass the table to SAP for processing.
    Prerequisite for Data Transfer Program
    Writing a Data Transfer Program involves following prerequisites:
    Analyzing data from local file
    Analyzing transaction
    Analyzing transaction involves following steps:
    • The transaction code, if you do not already know it.
    • Which fields require input i.e., mandatory.
    • Which fields can you allow to default to standard values.
    • The names, types, and lengths of the fields that are used by a transaction.
    • Screen number and Name of module pool program behind a particular transaction.
    To analyze a transaction::
    • Start the transaction by menu or by entering the transaction code in the command box.
    (You can determine the transaction name by choosing System – Status.)
    • Step through the transaction, entering the data will be required for processing your batch input data.
    • On each screen, note the program name and screen (dynpro) number.
    (dynpro = dyn + pro. Dyn = screen, pro = number)
    • Display these by choosing System – Status. The relevant fields are Program (dynpro) and Dynpro number. If pop-up windows occur during execution, you can get the program name and screen number by pressing F1 on any field or button on the screen.
    The technical info pop-up shows not only the field information but also the program and screen.
    • For each field, check box, and radio button on each screen, press F1 (help) and then choose Technical Info.
    Note the following information:
    - The field name for batch input, which you’ll find in its own box.
    - The length and data type of the field. You can display this information by double clicking on the Data Element field.
    • Find out the identification code for each function (button or menu) that you must execute to process the batch-input data (or to go to new screen).
    Place the cursor on the button or menu entry while holding down the left mouse button. Then press F1.
    In the pop-up window that follows, choose Technical info and note the code that is shown in the Function field.
    You can also run any function that is assigned to a function key by way of the function key number. To display the list of available function keys, click on the right mouse button. Note the key number that is assigned to the functions you want to run.
    Once you have program name, screen number, field name (screen field name), you can start writing.
    DATA TRANSFER program.
    Declaring internal table
    First Integral Table similar to structure like local file.
    Declaring internal table like BDCDATA
    The data from internal table is not transferred directly to database table, it has to go through transaction. You need to pass data to particular screen and to particular screen-field. Data is passed to transaction in particular format, hence there is a need for batch input structure.
    The batch input structure stores the data that is to be entered into SAP system and the actions that are necessary to process the data. The batch input structure is used by all of the batch input methods. You can use the same structure for all types of batch input, regardless of whether you are creating a session in the batch input queue or using CALL TRANSACTION.
    This structure is BDCDATA, which can contain the batch input data for only a single run of a transaction. The typical processing loop in a program is as follows:
    • Create a BDCDATA structure
    • Write the structure out to a session or process it with CALL TRANSACTION USING; and then
    • Create a BDCDATA structure for the next transaction that is to be processed.
    Within a BDCDATA structure, organize the data of screens in a transaction. Each screen that is processed in the course of a transaction must be identified with a BDCDATA record. This record uses the Program, Dynpro, and Dynbegin fields of the structure.
    The screen identifier record is followed by a separate BDCDATA record for each value, to be entered into a field. These records use the FNAM and FVAL fields of the BDCDATA structure. Values to be entered in a field can be any of the following:
    • Data that is entered into screen fields.
    • Function codes that are entered into the command field. Such function codes execute functions in a transaction, such as Save or Enter.
    The BDCDATA structure contains the following fields:
    • PROGRAM: Name of module pool program associated with the screen. Set this field only for the first record for the screen.
    • DYNPRO: Screen Number. Set this field only in the first record for the screen.
    • DYNBEGIN: Indicates the first record for the screen. Set this field to X, only for the first record for the screen. (Reset to ‘ ‘ (blank) for all other records.)
    • FNAM: Field Name. The FNAM field is not case-sensitive.
    • FVAL: Value for the field named in FNAM. The FVAL field is case-sensitive. Values assigned to this field are always padded on the right, if they are less than 132 characters. Values must be in character format.
    Transferring data from local file to internal table
    Data is uploaded to internal table by UPLOAD of WS_UPLOAD function.
    Population of BDCDATA
    For each record of internal table, you need to populate Internal table, which is similar to BDCDATA structure.
    All these five initial steps are necessary for any type of BDC interface.
    DATA TRANSFER program can call SESSION METHOD or CALL TRANSACTION. The initial steps for both the methods are same.
    First step for both the methods is to upload the data to internal table. From Internal Table, the data is transferred to database table by two ways i.e., Session method and Call transaction.
    SESSION METHOD
    About Session method
    In this method you transfer data from internal table to database table through sessions.
    In this method, an ABAP/4 program reads the external data that is to be entered in the SAP System and stores the data in session. A session stores the actions that are required to enter your data using normal SAP transaction i.e., Data is transferred to session which in turn transfers data to database table.
    Session is intermediate step between internal table and database table. Data along with its action is stored in session i.e., data for screen fields, to which screen it is passed, the program name behind it, and how the next screen is processed.
    When the program has finished generating the session, you can run the session to execute the SAP transactions in it. You can either explicitly start and monitor a session or have the session run in the background processing system.
    Unless session is processed, the data is not transferred to database table.
    BDC_OPEN_GROUP
    You create the session through program by BDC_OPEN_GROUP function.
    Parameters to this function are:
    • User Name: User name
    • Group: Name of the session
    • Lock Date: The date on which you want to process the session.
    • Keep: This parameter is passed as ‘X’ when you want to retain session after
    processing it or ‘ ‘ to delete it after processing.
    BDC_INSERT
    This function creates the session & data is transferred to Session.
    Parameters to this function are:
    • Tcode: Transaction Name
    • Dynprotab: BDC Data
    BDC_CLOSE_GROUP
    This function closes the BDC Group. No Parameters.
    Some additional information for session processing
    When the session is generated using the KEEP option within the BDC_OPEN_GROUP, the system always keeps the sessions in the queue, whether it has been processed successfully or not.
    However, if the session is processed, you have to delete it manually. When session processing is completed successfully while KEEP option was not set, it will be removed automatically from the session queue. Log is not removed for that session.
    If the batch-input session is terminated with errors, then it appears in the list of INCORRECT session and it can be processed again. To correct incorrect session, you can analyze the session. The Analysis function allows to determine which screen and value has produced the error. If you find small errors in data, you can correct them interactively, otherwise you need to modify batch input program, which has generated the session or many times even the data file.
    CALL TRANSACTION
    About CALL TRANSACTION
    A technique similar to SESSION method, while batch input is a two-step procedure, Call Transaction does both steps online, one after the other. In this method, you call a transaction from your program by
    Call transaction  0. (Call transaction returns the sy-subrc if updating is not successful).
    Call function Format_message.
    (This function is called to store the message given by system and to display it along with record)
    Append itab2.
    Display the record and message.
    DIRECT INPUT
    About Direct Input
    In contrast to batch input, this technique does not create sessions, but stores the data directly. It does not simulate the online transaction. To enter the data into the corresponding database tables directly, the system calls a number of function modules that execute any necessary checks. In case of errors, the direct input technique provides a restart mechanism. However, to be able to activate the restart mechanism, direct input programs must be executed in the background only. Direct input checks the data thoroughly and then updates the database directly.
    You can start a Direct Input program in two ways;
    Start the program directly
    This is the quickest way to see if the program works with your flat file. This option is possible with all direct input programs. If the program ends abnormally, you will not have any logs telling you what has or has not been posted. To minimize the chance of this happening, always use the check file option for the first run with your flat file. This allows you to detect format errors before transfer.
    Starting the program via the DI administration transaction
    This transaction restarts the processing, if the data transfer program aborts. Since DI document are immediately posted into the SAP D/B, the restart option prevents the duplicate document posting that occurs during a program restart (i.e., without adjusting your flat file).
    Direct input is usually done for standard data like material master, FI accounting document, SD sales order and Classification for which SAP has provided standard programs.
    First time you work with the Direct Input administration program, you will need to do some preparation before you can transfer data:
    - Create variant
    - Define job
    - Start job
    - Restart job
    Common batch input errors
    - The batch input BDCDATA structure tries to assign values to fields which do not exist in the current transaction screen.
    - The screen in the BDCDATA structure does not match the right sequence, or an intermediate screen is missing.
    - On exceptional occasions, the logic flow of batch input session does not exactly match that of manual online processing. Testing the sessions online can discover by this.
    - The BDCDATA structure contains fields, which are longer than the actual definition.
    - Authorization problems.
    RECORDING A BATCH INPUT
    A B recording allows you to record a R/3 transaction and generate a program that contains all screens and field information in the required BDC-DATA format.
    You can either use SHDB transaction for recording or
    EDIT? BATCH INPUT ? SERVICES ?SYSTEM
    And from here click recording.
    Enter name for the recording.
    (Dates are optional)
    Click recording.
    Enter transaction code.
    Enter.
    Click Save button.
    You finally come to a screen where, you have all the information for each screen including BDC_OKCODE.
    • Click Get Transaction.
    • Return to BI.
    • Click overview.
    • Position the cursor on the just recorded entry and click generate program.
    • Enter program name.
    • Click enter
    The program is generated for the particular transaction.
    BACKGROUND PROCESSING
    Need for Background processing
    When a large volume of data is involved, usually all batch inputs are done in background.
    The R/3 system includes functions that allow users to work non-interactively or offline. The background processing systems handle these functions.
    Non-interactively means that instead of executing the ABAP/4 programs and waiting for an answer, user can submit those programs for execution at a more convenient planned time.
    There are several reasons to submit programs for background execution.
    • The maximum time allowed for online execution should not exceed 300 seconds. User gets TIMEOUT error and an aborted transaction, if time for execution exceeds 300 seconds. To avoid these types of error, you can submit jobs for background processing.
    • You can use the system while your program is executing.
    This does not mean that interactive or online work is not useful. Both type of processing have their own purposes. Online work is the most common one entering business data, displaying information, printing small reports, managing the system and so on. Background jobs are mainly used for the following tasks; to process large amount of data, to execute periodic jobs without human intervention, to run program at a more convenient, planned time other than during normal working hours i.e., Nights or weekends.
    The transaction for background processing is SM36.
    Or
    Define jobs? Jobs ? Administration ?Tools
    Or
    Jobs? services ?System
    Components of the background jobs
    A job in Background processing is a series of steps that can be scheduled and step is a program for background processing.
    • Job name. Define the name of assigned to the job. It identifies the job. You can specify up to 32 characters for the name.
    • Job class. Indicates the type of background processing priority assigned to the job.
    The job class determines the priority of a job. The background system admits three types of job classes: A B & C, which correspond to job priority.
    • Job steps. Parameters to be passed for this screen are as follows:
    Program name.
    Variant if it is report program
    Start criteria for the job: Option available for this are as follows:
    Immediate - allows you to start a job immediately.
    Date/Time - allows you to start a job at a specific name.
    After job - you can start a job after a particular job.
    After event - allows you to start a job after a particular event.
    At operation mode - allows you to start a job when the system switches to a particular operation mode.
    Defining Background jobs
    It is two step process: Firstly, you define the job and then release it.
    When users define a job and save it, they are actually scheduling the report i.e., specifying the job components, the steps, the start time.
    When users schedule program for background processing, they are instructing the system to execute an ABAP/4 report or an external program in the background. Scheduled jobs are not executed until they are released. When jobs are released, they are sent for execution to the background processing system at the specified start time. Both scheduling and releasing of jobs require authorizations.
    HANDLING OF POP UP SCREEN IN BDC
    Many times in transaction pop up screen appears and for this screen you don’t pass any record but some indication to system telling it to proceed further. For example: The following screen
    To handle such screen, system has provided a variable called BDC_CURSOR. You pass this variable to BDCDATA and process the screen.
    Usually such screen appears in many transactions, in this case you are just passing information, that YES you want to save the information, that means YES should be clicked. So you are transferring this information to BDCDATA i.e., field name of YES which is usually SPOT_OPTION. Instead of BDC_OKCODE, you are passing BDC_CURSOR.
    BDC_CURSOR is also used to place cursor on particular field.
    AN EXAMPLE WITH SESSION METHOD
    Following program demonstrates how data is passed from flat file to SAP transaction and further to database table by using SESSION method.
    The transaction is TFBA (to change customer).
    A simple transaction where you are entering customer number on first screen and on next screen data is displayed for the particular customer number. Field, which we are changing here, are name and city. When you click on save, the changed record gets saved.
    Prerequisite to write this BDC interface as indicated earlier is:
    1. To find screen number
    2. To find screen field names, type of the field and length of the field.
    3. To find BDC_OKCODE for each screen
    4. Create flat file.
    Flat file can be created in your hard disk as follows:
    1 Vinod Krishna Hyderabad
    2 Kavitha Secunderabad
    3 Kishore Hyderabad
    (Where 1st character field is Customer number, 2nd field is Customer name and 3rd field is City.)
    To transfer this data to database table SCUSTOM following interface can be used.
    REPORT DEMO1.
    Following internal table is to upload flat file.
    DATA: BEGIN OF ITAB OCCURS 0,
    ID(10),
    NAME(25),
    CITY(25),
    END OF ITAB.
    *Following internal table BDCDATA is to pass date from internal table to session.
    DATA: BDCTAB LIKE BDCDATA OCCURS 0 WITH HEADER LINE.
    Variables
    DATA: DATE1 LIKE SY-DATUM. DATE1 = SY-DATUM - 1. “ This is for Hold Date
    To upload flat file to internal table.
    CALL FUNCTION UPLOAD
    EXPORTING
    FILE NAME = ‘C:FF.TXT’
    FILE TYPE = ‘ASC”
    TABLES
    DATA_TAB = ITAB
    EXCEPTIONS
    CONVERSION_ERROR = 1
    INVALID_TABLE_WIDTH = 2
    INVALID_TYPE = 3
    NO_BATCH = 4
    UNKNOWN_ERROR = 5
    OTHERS = 6.
    If sy-subrc = 0.
    Calling Function to Create a Session
    CALL FUNCTION ‘BDC_OPEN_GROUP’
    EXPORTING
    CLIENT = SY-MANDT
    GROUP = ‘POTHURI’
    HOLDDATE = DATE1
    KEEP = ‘X’
    USER = SY-UNAME
    EXCEPTIONS
    CLIENT_INVALID = 1
    DESTINATION_INVALID = 2
    GROUP_INVALID = 3
    GROUP_IS_LOCKED = 4
    HOLDDATE_INVALID = 5
    INTERNAL_ERROR = 6
    QUEUE_ERROR = 7
    RUNNING = 8
    SYSTEM_LOCK_ERROR = 9
    USER_INVALID = 10
    OTHERS = 11.
    If sy-subrc = 0.
    MAIN Logic----
    LOOP AT ITAB
    PERFORM GENERATE_DATA. “ Populating BDCDATA Table
    CALL FUNCTION ‘BDC_INSERT’
    EXPORTING
    TCODE = ‘TFBA’
    TABLES
    DYNPROTAB = BDCTAB
    EXCEPTIONS
    INTERNAL_ERROR = 1
    NOT_OPEN = 2
    QUEUE_ERROR = 3
    TCODE_INVALID = 4
    PRINTING_INVALID = 5
    POSTING_INVALID = 6
    OTHERS = 7.
    REFRESH BDCTAB
    ENDLOOP.
    Calling function to close the session
    CALL FUNCTION ‘BDC_CLOSE_GROUP’
    EXCEPTIONS
    NOT_OPEN = 1
    QUEUE_ERROR = 2
    OTHERS = 3.
    Endif.
    Endif.
    *& Form GENERATE_DATA
    Create BDC Data
    FORM GENERATE_DATA
    Passing information for 1st screen on BDCDATA
    BDCTAB-PROGRAM = ‘SAPMTFBA’.
    BDCTAX-DYNPRO = 100.
    BDCTAP-DYNBEGIN = ‘X’.
    APPEND BCDTAB.CLEAR BDCTAB.
    Passing field information to BDCDATA
    BDCTAB-FNAM = ‘SCUSTOM-ID’
    BDCTAB-FVAL = ITAB-ID.
    APPEND BDCTAB.CLEAR BDCTAB.
    Passing BDC_OKCODE to BDCDATA
    BDCTAB-FNAM = ‘BDC_OKCODE’.
    BDCTAB-FVAL = ‘/5’.
    APPEND BDCTAB.CLEAR BDCTAB.
    Passing screen information for next screen to BDCDATA
    BDCTAB-PROGRAM = ‘SAPMTFBA’.
    BDCTAB-DYNPRO = 200.
    BDCTAB-DYNBEGIN = ‘X’.
    APPEND BDCTAB.CLEAR BDCTAB.
    Passing screen information to BDCDATA
    BDCTAB-FNAM = ‘SCUSTOM-NAME’.
    BDCTAB-FVAL = ITAB-NAME.
    APPEND BDCTAB.CLEAR BDCTAB.
    Passing screen information to BDCDATA
    BDCTAB-FNAM = ‘SCUSTOM-CITY’.
    BDCTAB-FVAL = ITAB-CITY.
    APPEND BDCTAB.CLEAR BDCTAB.
    Passing BDC_OKCODE to BDCDATA
    BDCTAB-FNAM = ‘BDC_OKCODE’.
    BDCTAB-FVAL = ‘SAVE’.
    APPEND BDCTAB.CLEAR BDCTAB.
    ENDFORM. “GENERATE_DATA
    AN EXAMPLE WITH CALL TRANSACTION
    Same steps to be repeated for CALL TRANSACTION
    The only difference between the two types of interface is in Session method, you create session and store information about screen and data into session. When session is processed the data is transferred to database. While in CALL TRANSACTION, data is transferred directly to database table.
    REPORT DEMO1.
    Follow above Code till MAIN Logic. Even the Subroutine should be copied
    LOOP AT ITAB
    PERFORM GENERATE_DATA, “Populating BDCDATA Table
    Call transaction ‘TFBA’ using BCDDATA Mode ‘A’ Update ‘S’.
    REFRESH BDCTAB
    ENDLOOP.
    For BDC:
    http://myweb.dal.ca/hchinni/sap/bdc_home.htm
    https://www.sdn.sap.com/irj/sdn/wiki?path=/display/home/bdc&
    http://www.sap-img.com/abap/learning-bdc-programming.htm
    http://www.sapdevelopment.co.uk/bdc/bdchome.htm
    http://www.sap-img.com/abap/difference-between-batch-input-and-call-transaction-in-bdc.htm
    http://help.sap.com/saphelp_47x200/helpdata/en/69/c250684ba111d189750000e8322d00/frameset.htm
    http://www.sapbrain.com/TUTORIALS/TECHNICAL/BDC_tutorial.html
    Check these link:
    http://www.sap-img.com/abap/difference-between-batch-input-and-call-transaction-in-bdc.htm
    http://www.sap-img.com/abap/question-about-bdc-program.htm
    http://www.itcserver.com/blog/2006/06/30/batch-input-vs-call-transaction/
    http://www.planetsap.com/bdc_main_page.htm
    http://www.sapbrain.com/FAQs/TECHNICAL/SAP_ABAP_DATADICTIONARY_FAQ.html
    http://www.****************/InterviewQ/interviewQ.htm
    http://help.sap.com/saphelp_46c/helpdata/en/35/2cd77bd7705394e10000009b387c12/frameset.htm
    regards,
    Message was edited by:
            KaushiK©Datta

  • What do they mean on facebook when they say you haven,t finished your comment?

    When offering a comment on facebook,having finished said,I then try to send or share,but I,m told "you haven,t finished your comment yet,are you sure you want to leave this page?" What is the right protocol for finishing a comment?

    Click here and here for information.
    (24770)

  • The Adobe Updater fails everytime due to our corporate fire wall.

    The Adobe Updater fails every time due to our corporate fire wall. Is there a work around? It completes about 80% then can't see the internet. I suspect it is trying to talk to an FTP site which are blocked by our firewall.
    Is there a work-around?
    Paul

    I am using Windows 7.  I went to the "Installers" folder & there is a log file for every update except the Camera Raw update. I don't think it gets far enough to create the file. I was watching the folder & I tried to install this last patch again. I starts out saying it's downloading then aborts. No file is created. The files that are in the folder are:
    Adobe Dreamweaver CS5.5 11.5.2 08-27-2012.log.gz
    Adobe Extension Manager CS5.5 5.5.1 08-27-2012.log.gz
    Adobe Flash Builder 4.5 4.5.1 08-27-2012.log.gz
    Adobe Flash Pro CS5.5 11.5.1 08-27-2012.log.gz
    Adobe Media Encoder CS5.5 X64 5.5.1 08-27-2012.log.gz
    AIR for Apple iOS support (FB) 2.6.1 08-27-2012.log.gz
    Creative Suite 5.5 Web Premium 5.5 06-19-2012.log.gz
    Ordinarily I would just ignore this failure but I actually use Camera Raw for my Nikon D90 and Nikon D7000.

  • Configuring the iPhone and your environment for wireless corporate email

    I'm posting this as a top level thread, because I'm certain that there are others out there, who like me, are trying to figure this out.
    Configuring the iPhone for Enterprise Use
    With Apple’s release of the iPhone, IT organizations are presented with an interesting challenge. Senior execs, gadget heads, and technoratti are all flocking to this device, heralded as the be all and end all of smartphone telecommunications technology. As these devices begin to flood into our organizations, we are met with the challenge to ‘make it work’.
    After much explaining that the iPhone is not intended for Enterprise integration, and many discussions surrounding the technical feasibility of bringing said devices into the fold, and being the resident Mac and Linux head with an iPhone in hand, I decided to embark on the mission of making one ‘work’. I succeeded in part, however it’s not the kind of ‘work’ that is going to be viable for most end users.
    First of all, it’s important to understand that the email client for the iPhone is a modified version of Mac’s Mail program. Not the best client in the world, but it does support Exchange integration. It also does external email sources, such as Yahoo and gMail, very well. For my interest though, I’m focusing on the Exchange integration functionality, as that is just about everyone’s corporate standard.
    Bringing this task to fruition requires some understanding about the limitations of the iPhone, as well as some of its current quirks. Wireless802.11x, EDGE, VPN and Mail are all components necessary to provide a serviceable solution for mobile email access, and each of these things has some peculiarities that don’t appear to be fully worked out by Apple at this time.
    For instance, within my organization, we have a secured wireless connectivity option available within our building; however, the SSID of this network is not broadcast, for the obvious reasons. SO, connecting the iPhone to it is a manual process of defining the network, and automatic reconnection seems to be very hit or miss, so it becomes far less of an option for any form of direct network access to your Exchange environment. (As an example, I had to redefine that network, on the iPhone, at least half a dozen times during this process.)
    The other components have equally quirky issues, and I will discuss the how’s to get around them below.
    In coordinating this into a cohesive plan however, I will break this into three sections;
    1. Wireless and EDGE connectivity
    2. VPN access to your network
    3. Connecting to Exchange
    So, without further ado;
    Wireless and EDGE Connectivity
    The wireless capabilities of the iPhone are, on the surface at least, excellent. It connects seamlessly to unsecured networks, offers the option of prompted or unprompted automatic connectivity, and is capable of 802.11G performance. Not bad for such a small package. However, it is very limited in the forms of secure network access it supports. These are, to quote Apple’s website; (and my iPhone)
    WEP Password
    WEP hex or ASCII
    WPA (personal)
    WPA2 (personal)
    Now, due to the obvious security problems in implementing WEP security, it’s likely that any network you run into is going to be WPA or WPA2. The iPhone ONLY supports the personal versions of these protocols, so be aware of this going into the situation. If you’re not connecting to your work or school wireless, and you’re entering the information correctly, then it’s probably because they have the Enterprise version of one of the protocols enabled. If that is the case, then you’re either hunting for unsecured hotspots, or else depending on EDGE.
    In my case, I did have access to a WPA2 (Personal) enabled wireless signal to connect to my internal network. I thought my problem was half solved! I defined the connection, the wireless capability of the phone worked perfectly, and I was connected. I was wrong. Apparently, and judging from the Mac forums I’m not alone in this, the iPhone does not do a very good job of RE-connecting to a secured wireless network. It does an even worse job, when this is coupled with the fact that it doesn’t do a very good job reconnecting to a wireless network with an unpublished SSID.
    After much fiddling and research into this, I determined that this simply was not the way to go, and I abandoned the idea. I wasn’t about to compromise my network security in order to get this silly phone working! So, that left me with either unsecured WiFi, or EDGE.
    Either one of these connects pretty seamlessly, and gives me a relatively decent Internet connection. There are some issues being reported of the iPhone swapping between EDGE and WiFi for not apparent reason, but that said, it can still be made to work.
    Now that I had this connection outside of my network, I obviously had to consider options for getting a secured connection into my network, which of course leads us to;
    VPN Access Into Your Network
    Being that this device was touted as the ‘real internet’ I was very excited to see if I could achieve this connection through my SSL VPN appliance. To make a long story short, I could not. Because Apple’s idea of the ‘Real Internet’ apparently does not include those wacky concepts like Java support, this proved to be impossible. My Apple cohorts will scream that it does support JavaScript, but we all know that that and 2 bucks will get you a small coffee at Starbucks… and not much more.
    (The iPhone also does not support Flash, but that’s a topic for another conversation. I know, how could they leave that out? I’m amazed too, but then Steve Jobs always has been a bit too arrogant for his own good… I mean what does he expect, we’re all going to rewrite everything into QuickTime??? Please.)
    Since that option didn’t work, I was left with the wide selection of two possibilities provided within the iPhone software. Either, a PPTP or L2TP VPN tunnel.
    We went ahead and configured a PPTP connection on one of our Cisco routers in order to test this. It didn’t work. I couldn’t connect to it. Tried and tried. Nada. SOOOO, we said OK, and configured a L2TP connection on one of our Cisco routers, with similar results.
    Figuring that this was something in the config, we called Cisco, and did the technical support dance with them for several days, trying one thing after another to get this connection to actually work. Nothing helped, and it never worked using either protocol. Then, I noticed an obscure article somewhere on some website that said something to the effect that getting one of these tunnels to work from the iPhone to Cisco was nigh on impossible.
    About the same time, my senior network guy said screw it, let’s put this on a Microsoft server. And so we did. Now, this is interesting in it’s own right, because configuring out of the box L2TP or PPTP on a Microsoft server results in a default authentication method of Windows Authentication. This does not work for the iPhone, because it has no idea what to do with the Windows security token it receives. So, you authenticate, and then are immediately dropped due to an inability to communicate with the PPP server.
    Fortunately, we (as do most organizations) have a Radius server. We selected Radius authentication, configured both sides of the Radius authentication setup properly, and launched the PPTP tunnel…. AND…. EUREKA!!! The iPhone’s VPN software connected, authenticated, got an IP, and I was on the network! Well, no.
    After about 2 seconds, I realized that while I did indeed have a connection, I couldn’t do anything with it. Couldn’t even browse to an internal site via IP address. The connection was up, the connection was working, the connection was useless.
    So, we decided to give L2TP a shot. Configured it pretty much identically to the PPTP setup, used Radius, launched the iPhone client, and finally, after many days of screwing around, it worked. Now all I needed was to get my email working, so I started working on;
    Connecting to Exchange
    In the Mail program on the iPhone, the first time you launch it, you’re presented with the ability to configure an email source. However on subsequent or additional accounts, you must go under Settings, Mail to get to this functionality.
    Going into the Mail configuration, I selected an additional account, the account type is, of course, Exchange. The configuration components are pretty obvious, however some things of note are;
    Do NOT include your domain information in the User Name field
    For all Host Names, use the fully qualified domain name of the server, or else IP
    You WILL need to have SMTP enabled somewhere in order to send email
    Anyway, I set all this up, and nothing happened. It said that my server was not responding. Did a little research, and it turns out that the only way to connect to Exchange is through an IMAP4 connection, and just in case you didn’t know, IMAP4 is disabled by default, so you have to enable and configure it.
    Went onto the Exchange server, set the service to Auto, Started the listener, and finally, at long last, EUREKA! I finally had Corporate email on my iPhone, connecting securely, and not sending anything plain text anywhere. Hooray!
    Now for the problems with this solution;
    First of all, it depends upon VPN access into your environment, something that you may or may not be comfortable with. One good thing is that the iPhone does prompt for password to reconnect, and will tie the continuity of the VPN connection into the general phone lock security, such that an inability to provide the appropriate access code to a locked phone results in the VPN not being accessible.
    The VPN of course is dependant upon a reliable network connection. I’ve noticed that it’s somewhat graceful in switching between WiFi and EDGE, however it’s not totally graceful, and you can experience some hinky things, like being able to send and not receive, or the mail client saying ‘Connecting’ for about 5 minutes before it figures things out.
    The best cure for this is to simply stop and restart the VPN connection. Note that when you reconnect, the first attempt will prompt you for a numeric password, this is meaningless unless you have the device lock turned on. Just enter anything. (I think this is another bug) THEN it will re-prompt you for your real VPN password.
    This solution for email delivery is obviously dependant upon the VPN connection being active. I’ve noticed that at times the iPhone will disconnect the VPN (probably when service switching) and not bother to mention it. When that happens, of course the VPN must be restarted.
    For the lazy, this is an inconvenient solution because while it would appear that the iPhone will cache the VPN password, in fact it will not. That means that each re-launch requires that you re-enter your password. Not terrible for me, but I could see it being very tedious for the average corporate user.
    The OSX Mail client has several little deficiencies, which may or may not impact your use of the device in this manner. For instance, if you have subfolders defined for your inbox, and server side rules to move mail into them, then you will not see any synchronization of that mail until you actually select the subfolder. Also, since there is such poor management of attachments and downloads, moving anything around via email on this device is nigh on impossible.
    EDGE access to your corporate email, via a VPN, is a bit sloooooow. It works, it’s certainly fast enough for my purposes, but it’s not the slick quick access that we’ve all become accustomed to with Blackberry and Good devices. The lack of 3G support becomes a very noticeable shortcoming here.
    (Why Apply didn’t simply partner with Good Technologies to crank out a client for this thing, I’ll never understand, but I guess you can refer to my comment above about certain people’s arrogance.)
    The biggest problem of all of course is that it’s simply klugey. I hate klugey. But, with the capabilities at this device’s disposal, and given Apple’s ambitious, if a bit idiotic, stance that no third party will develop software for the iPhone, then this is about as good as it’s going to get for now.
    It is my understanding that overseas there is some initiative underway to provide a more seamless Visto or Synchronica integration for enterprise email. However, given Apple’s unbelievably restrictive agreement with ATT regarding this device and the OTA necessity of delivering the client, I seriously doubt if we’ll see this in the near future in the US.
    But I digress, so…
    In Conclusion
    This solution is not for the faint of heart, it doesn’t work all that well, and it has way too many moving parts that are subject to failure. However, I would say that this solution is serviceable for the corporate technology professional who needs email, and really, REALLY wants the other features of the iPhone. (ie, phone whores such as me.) It requires patience, it requires an understanding that this is not a 100% thing, and there definitely needs to be a prebuilt expectation that this device will not serve your email in anything approaching the manner to which you’ve become accustomed.
    As long as all of that is okay though, then go right ahead, set it up, and enjoy!
    The Short Version;
    (I put this at the end because I want everyone to feel my pain!)
    Wireless:
    Use unsecured wireless or EDGE. Secured wireless may be serviceable as long as the SSID is broadcast, but there are known issues with this.
    VPN:
    L2TP, shared secret, running on Microsoft server, with Radius. (May work elsewhere, but doesn’t seem to run on Cisco at all) Accounts enabled for external access.
    Exchange:
    Configure IMAP4 Virtual Server on your Exchange environment, ensure that you have some SMTP resource for outbound email, use fully qualified domain names for all servers (or IP) in the mail config and do not include any domain prefix or suffix for user accounts.
    The BIG Disclaimer at the End
    Please note that all of this is provided ‘as is’. It worked for me, and I hope it works for you. To my knowledge, it’s not endorsed by Apple, and I’m not in the business of providing support for this thing. If it breaks something, if it doesn’t work, or if you simply don’t like it or me, I don’t care. However, if you have a question, and I’m not busy, and I feel like answering, I may lend a hand. You can email me at
    Matthew dot Yotko at mac dot com
    Don’t be surprised or offended if I don’t answer. Also, understand that I don’t check this address every day… Maybe a couple times a week.
    Macbook Pro   Mac OS X (10.4.10)   iphone

    Thanks, now I understand why the wifi keeps dropping. On my personal wireless network, it also seems the distance from the access point is not good compared to my laptop. At work our network & exchange teams don't seem to have the desire to struggle with this "toy" until customers start forcing its adoption. I am using OWA and it works fine over EDGE. I will share your posting with them.
    Thank you again.
    Dell   Windows XP Pro

  • Your Comments Please: Business Case for XI

    We are a small site commencing a major project that will involve integrating SAP R/3, BW, CRM, and various non-SAP applications (web and client/server). The applications have a number of external interfaces, receiving data from or sending data to external agencies.
    I'm trying to understand the costs and benefits of including XI in the solution and would welcome comments from people already using the tool. I've read a lot of the SAP documentation so understand that it is the best thing since sliced bread, but I'd also be interested to hear your general comments and also your thoughts on the following specific points:
    (1) Maintenance effort: since we are a small site we don't have teams of people to work on each piece of technology, what is likely to be the time and effort of the training, initial configuration and on-going support?
    (2) Data transformation capabilities: are there extensive functions to manipulate the data without writing code? If you are familiar with ETL tools such as DataStage, Informatica, etc. how does it compare?
    (3) Performance with large data sets: one of our external data sources will include about two million rows of data per day, how would XI cope?
    (4) What is it like to work with? Do you spend half your time searching for, and trying to decipher notes, and applying patches, or is it generally an enjoyable experience? (for someone who doesn't enjoy the above) -- and if so why is this forum so popular?
    Many thanks
    Rob

    Hi Robert,
    I have just starting using XI 3.0 and am finding it a good experience on the whole. In answer to your points :
    1. Maintenance effort is low. Once you have grasped the concepts and steps for development it is relatively easy with no coding (although you should really have a basic understanding of Java). I would recommend attending the SAP XI 3.0 Fundamentals course for training purposes. The initial configuration has been minimal so far as it is Basis who should perform the basic configuration steps during the installation
    2. The mapping tool is a GUI driven tool and has a lot of basic functions for transforming data. It also allows the use of any specific Java functions you may already use to transform data
    3. Performance would be driven by the volume of data and the number of integration servers you have. I would personally recommend having an Integration Server solely for use for the very high volume data set you mention.
    4. From what I have seen so far, it is an enjoyable experience. Patches should be applied regularly by your Basis team so you shouldn't need to worry too much about that side of things.You are bound to get teething difficulties with such a vast product but once you get to grips with it, it is very good indeed.
    Finally, I would definitely recommend attending the XI course I mentioned. It concretes the basic understanding you would get from the SAP documentation.
    Hope this helps.
    Kind regards
    Colin

  • Comments from our word processing dept.

    I had our editing folks take a look at Buzzword and this is
    what they said:
    The ES Group used Buzzword for one of their reports recently.
    It showed where the edits were, but wouldn't allow us to accept
    changes. It just changed the font to a strikeout font for deletions
    and changed the color of the font for additions. If we could find a
    way to make it work and allow us to accept changes, it might be the
    way to go.
    Can you fix this?

    The future that Pete alluded to in his posting has arrived.
    As of today, Buzzword has a 'diffs' feature which allows you to see
    the differences between any two versions of a document. For more on
    this feature, open up our online help
    http://help.adobe.com/en_US/Acrobat.com/Buzzword/
    then click on
    How do you use Adobe Buzzword?,
    Importing and editing content and finally
    Compare document versions or revert to a previous version.
    Or just click
    here
    We also have a
    blog
    posting on it.
    Unfortunately, you can't use this to accept/reject individual
    changes. You can revert back to a previous version of the document,
    but that will 'undo' all changes, not individual ones.
    Another suggestion for your workflow is to have your
    co-authors add their material as comments, and then the
    authors/editors who have final say over the content can incorporate
    the changes.
    Do let us know if the new diffs feature helps your
    group!

  • Backup / File Serving Plan - Your comments?

    A local business would like to have a daily off-site backup, with incremental backups, and do file sharing from a single server across several users. Web based backup is probably not realistic as some files are 250 megs a pop. We have ordered an XSserve with three 750gig drives which we will use as a file server. My plan is to use Drive 1 for system files, with Drive 2 and 3 setup in Raid 1 for data files that will be mirrored. This will allow the owner to simply pull a drive out, put it in a case, and take it home with him each evening, while providing redundancy and up-time if a drive goes down.
    It doesn't, however, ensure that if somebody deletes 200 pages from a document and mistakenly saves it, there will be any archived copy, so we will continue to use our current Retrospect backup plan, with some changes to frequency.
    My current thinking with regard to the System files is to connect an external Hard Drive after the intitial setup has been finalized with the users added and use SuperDuper to clone the System hard drive and then disconnect it (after a verfifying boot from it). Backing up of that drive would be done manually when needed after adding users or doing updates that are verified to be "good" while not automatically backing up corrupted prefs or other problems that can tend to creep into a system.
    Any thoughts or comments ?

    My plan is to use Drive 1 for system files, with Drive 2
    and 3 setup in Raid 1 for data files that will be mirrored.
    This will allow the owner to simply pull a drive out, put it
    in a case, and take it home with him each evening, while
    providing redundancy and up-time if a drive goes down.
    I'll be the contrarian on this one. Yes, it will work. Just fine (but see below). That's standard practice for many servers if you need them to be kept up 24/7, and a RAID 1 mirror split is the ONLY way to do an instantaneous clone of a drive. Other solutions (SuperDuper!, CCC, etc.) scan the disk, build a list, and copy files, such that any files that change/disappear/appear during or after the scan and before the copy will be missed. We do exactly that (well, not quite) with our Xserve G5 before doing any software update.
    However, the approach we use is to add a spare drive to the mirror, allow the mirror to rebuild, then split the spare drive from the mirror. We use SoftRAID, and it has worked flawlessly for this (again, see below), and there is even a write-up on the SoftRAID web site (http://www.softraid.com) about this approach.
    Realize, though, that such a mirror split has two issues. First, it is not a backup and it should not be confused with such. No archiving is done for old files, and it's not possible to go back weeks/months to get an inadvertently deleted file. A proper backup strategy (we use Retrospect to tape in an autoloader) is necessary for that.
    Second, even though the mirror split is instantaneous, it still might not give a proper bootable image. Some programs, such as database programs (e.g., cyrus for email) maintain sets of files on disk that need to be consistent, and there needs to be (and is not) coordination between the instant of mirror split and all running services. For this reason, we shut down essential services (this can be scripted) such as email service, prior to the instant of mirror split, do the mirror split, then restart the services. Doing that avoids, for example, cyrus database corruption.
    As mentioned above, we only do this for our OS volume, which is RAID 1 (SoftRAID) with mirror secondary being a RAID 5 LUN on an Apple Hardware RAID card and with mirror primary being a Seagate Cheetah attached to an ATTO UL4D. We add another mirror secondary (a Firewire drive) to the RAID 1 mirror, allow the mirror to rebuild, shut services by scripting, split the Firewire drive from the SoftRAID mirror, restart the services. Takes only an instant, gives a good bootable OS copy. Note that we only use this approach prior to any software change on the Xserve, allows us to roll back if the software change/update goes badly, as happened once. But that's all we use it for. We count on the RAID 5 LUN for our user data, plus our daily tape backups, to handle failures and accidental deletions, and we count on the RAID 1 mirror of the OS volume to handle failure of the Apple Hardware RAID card (which MUST have the write cache turned off - there is a bug in the card - fails to fully flush write cache on graceful power down - doubt Apple will ever fix this bug) and also to improve performance of the OS volume.
    SoftRAID 3.5 is not scriptable, so this has to be done manually. I understand that scriptability is in the works, which would allow us to automate the process. SoftRAID 3.5.1 also has some issues with intel processors, the SoftRAID 3.6 beta just released resolves those issues (general release of SoftRAID 3.6 is expected shortly before MacWorld).
    One thing for you to think about is all the handling/removal/insertion of the drive, and transporting the drive home each night. That will reduce the life of the drive and of the ADM connector into which the drive plugs.
    I note upon re-reading your post that you use Retrospect, as do we. Be sure, before doing the mirror split (if you use this technique for your OS volume) that you disable Retrospect's schedule prior to the mirror split and then re-enable the schedule after the split. Otherwise, if you later try to boot from the earlier mirror split drive, all scripts with intervening scheduled times will be runnable and, just at the instant you are in a moment of crisis, trying to boot your precious backup copy, Retrospect will be firing off backups, etc. Been there, done that.
    Good luck.
    Russ
    Xserve G5 2.0 GHz 2 GB RAM Mac OS X (10.4.8) Apple Hardware RAID, ATTO UL4D, Exabyte VXA-2 1x10 1u
    Message was edited by: rhwalker (add Retrospect comments)

  • I have submitted 3 Entries on mozilla Add-Ons Contest but it appears that [Your comment is awaiting moderation.] what does it mean to be?

    About Add-Ons Contest

    Is this the contest you mean? [http://blog.mozilla.org/addons/2012/04/24/tell-us-about-your-favorite-add-on-for-a-chance-to-win-one-of-three-android-tablets/ http://blog.mozilla.org/addons/2012/04/24/tell-us-about-your-favorite-add-on-for-a-chance-to-win-one-of-three-android-tablets/] . If you are trying to post the review a a comment on that blog post, it won't work, you have to follow the process on the form.

Maybe you are looking for

  • IMac spec help required for virtualisation needs.

    Hi I currently own a MBP 13" core 2 duo with 4GB ram and its hardware limitations are becoming apparent for my needs and I cannot increase the memory any further. I have recently taken a career change and started working in IT which I love to bits. 

  • Dashed line "Dash" & "Gap" options

    Hey all, looking for a CS3 tip here. I use a lot of dashed strokes, and I've found that when I enter values in the Dash and Gap boxes, I later can't delete the values entirely. I can delete whatever I entered, but Illustrator won't leave the box blan

  • Weblogic Apache Plugin - Load Balancing

    Hi, I have two Apache servers each with the WLS Apache Plugin installed. These sit in front of two WL servers each having two managed servers. Each plugin is setup with the list of servers as follows: <IfModule mod_weblogic.c>           WebLogicClust

  • How can I remove PhotoShop Elements 12 from my desktop?

    I do not like this program and would like to remove it from my hard drive and get a refund.  Is that possible?

  • Focus changes are no longer triggered by mouse events in Flash?

    What could be causing this problem? All of the sudden I'm finding that when a TextField has the focus, the focus will not leave it when I click other objects, such as buttons that have tabEnabled = true.  It seems like something has gone terribly wro