The difference between a normal programmer and a good programmer is, the latter keeps his/her basics right. Good programmers are distinguished by the quality of their deliverables. They provide enough documentation in their object so that the future practitioners supporting their product do not curse them. One of my Team Lead once told me, “your code should not only meet the functionalities, it should also be asthetically pleasing if someone happens to peep into it"
35 Excel Tips,That Could Save You from Working All Night
What is it: The following material was developed for the Excel training program.
Target audience: 1st year associates and business analysts, although there is nothing wrong doing this training as well with EMs and APs.
Duration: 3-4 hours to walk through the explanations and give everyone a chance to actually practice.
Faculty: Since the seniors showed that they can do and therefore they can expect their team members to do the same.
35 Excel Tips,That Could Save You from Working All Night
What is it: The following material was developed for the Excel training program.
Target audience: 1st year associates and business analysts, although there is nothing wrong doing this training as well with EMs and APs.
Duration: 3-4 hours to walk through the explanations and give everyone a chance to actually practice.
Faculty: Since the seniors showed that they can do and therefore they can expect their team members to do the same.
This is an excellent presentation on usage of excel with tips which are very helpful in optimizing the things.
This could save you from working all night.
Gives you concise tips that u can readily use handy
Part 3 of the SQL Tuning workshop examines the different aspects of an execution plan, from cardinality estimates to parallel execution and explains what information you should be gleaming from the plan and how it affects the execution. It offers insight into what caused the Optimizer to make the decision it did as well as a set of corrective measures that can be used to improve each aspect of the plan.
“It's Excel's world, we just live in it.”
“To be an accountant in the age of
spreadsheet program is — well,
almost sexy.” “Nobody sets out to
create a mission critical
spreadsheet, they 'just happen'. ”
“The whole world runs on Excel.
In September, 2018, we released dynamic array formulas for Excel for Microsoft 365. The differences between dynamic arrays
and legacy Ctrl+Shift+Enter (CSE) formulas are discussed below.
Dynamic array formulas:
Can "spill" outside the cell bounds where the formula is entered. The following example shows the RANDARRAY function in
D1, which spills across D1:F5, or 5 rows by 3 columns. The dynamic array formula tec
This is an excellent presentation on usage of excel with tips which are very helpful in optimizing the things.
This could save you from working all night.
Gives you concise tips that u can readily use handy
Part 3 of the SQL Tuning workshop examines the different aspects of an execution plan, from cardinality estimates to parallel execution and explains what information you should be gleaming from the plan and how it affects the execution. It offers insight into what caused the Optimizer to make the decision it did as well as a set of corrective measures that can be used to improve each aspect of the plan.
“It's Excel's world, we just live in it.”
“To be an accountant in the age of
spreadsheet program is — well,
almost sexy.” “Nobody sets out to
create a mission critical
spreadsheet, they 'just happen'. ”
“The whole world runs on Excel.
In September, 2018, we released dynamic array formulas for Excel for Microsoft 365. The differences between dynamic arrays
and legacy Ctrl+Shift+Enter (CSE) formulas are discussed below.
Dynamic array formulas:
Can "spill" outside the cell bounds where the formula is entered. The following example shows the RANDARRAY function in
D1, which spills across D1:F5, or 5 rows by 3 columns. The dynamic array formula tec
Tratamentul in medicina traditionala se face prin acupunctura, extracte hidroalcoolice de plante medicinale, alimentatie corecta si un regim de viata corespunzator care vor ameliora problema, pana la vindecarea completa. In extractul hidroalcoolic, medicul de medicina traditionala trebuie se adauge obligatoriu inclusiv plantele SAW PALMETTO, UNCARIA TOMENTOSA.
15 Ways to Kill Your Mysql Application Performanceguest9912e5
Jay is the North American Community Relations Manager at MySQL. Author of Pro MySQL, Jay has also written articles for Linux Magazine and regularly assists software developers in identifying how to make the most effective use of MySQL. He has given sessions on performance tuning at the MySQL Users Conference, RedHat Summit, NY PHP Conference, OSCON and Ohio LinuxFest, among others.In his abundant free time, when not being pestered by his two needy cats and two noisy dogs, he daydreams in PHP code and ponders the ramifications of __clone().
This presentation is an INTRODUCTION to intermediate MySQL query optimization for the Audience of PHP World 2017. It covers some of the more intricate features in a cursory overview.
For regular Updates on SAP ABAP please like our Facebook page:-
Facebook:- https://www.facebook.com/bigclasses/
Twitter:- https://twitter.com/bigclasses
LinkedIn:-https://www.linkedin.com/company/bigclasses/
Google+:https://plus.google.com/+Bigclassesonlinetraining
SAP ABAP Course Page:-https://bigclasses.com/sap-abap-online-training.html
Contact us: - India +91 800 811 4040
USA +1 732 325 1626
Email us at: - info@bigclasses.com
sap abap online training, online sap abap training, sap abap training online, sap abap training, abap online training, sap abap, sap online training, sap abap online training from india, sap abap online training demo, sap, abap, sap abap online classes, sap abap online, sap abap training course, online abap training, abap training online, sap abap online courses, www.bigclasses.com,sap abap training
usa
This PPT File, helps with the Basic Interview Questions specially for DataBase Domain.. For more questions , please log in to www.rekruitin.com
By ReKruiTIn.com
This White Paper on Spool Space in Teradata was presented by Nazir Iqbal at Wipro where he works at present.
TERADATA Spool Space is unused Perm Space that it used for running queries.
Design and develop with performance in mind
Establish a tuning environment
Index wisely
Reduce parsing
Take advantage of Cost Based Optimizer
Avoid accidental table scans
Optimize necessary table scans
Optimize joins
Use array processing
Consider PL/SQL for “tricky” SQL
500+ SAP ABAP INTERVIEW QUESTIONS WITH ANSWERSIICT Chromepet
Most Important SAP ABAP Interview Questions along with answers are Shared. These questions are useful to clear any kinds of interview. Especially for freshers its mostly useful. Dont forget to read these question and answers in SAP ABAP Module.
For training requirement please visit:
https://iicttechnologies.com/
(Or)
http://www.traininginchennai.co.in/
(Or)
https://traininginchrompet.com/
Brad McGehee's presentation on "How to Interpret Query Execution Plans in SQL Server 2005/2008".
Presented to the San Francisco SQL Server User Group on March 11, 2009.
Similar to Are you an abap coder or a programmer? (20)
Flow Chart to get Free access to SAP HANA Cloud PlatformSAPYard
Finally you are somewhat clear as to what you want to do in HANA. Now a greater hurdle. Neither your employee organization nor your current project client has HANA database. So, how would you explore the tremendous power and innovation of HANA? Is it end of the road? Was your acquaintance with HANA only till here?
Do not worry, there is always a way around. You just need to have the zeal to learn and find out the alternatives.
“When a person really desires something, the whole universe conspires to help that person to realize his dream.” :)
– Paulo Coelho, The Alchemist
The easiest option (and a better one, if you can afford) is to enroll in the authorized SAP Classroom/Online HANA training session. Consider it as an investment for your future.
But, if you do not want to shell out some $$$ right now or you want to have some bare minimum knowledge in HANA and then you plan to take proper formal training, you have another free alternative.
Remember, in the concluding lines of previous post, I mentioned that we can get access to HANA database using SAP HANA Cloud Platform. There is nothing called a “free lunch” in this world, but SAP HANA Cloud Platform is an exception. Yes, it is absolutely free!!! Thanks to SAP.
HANA the “Hot cake” of the market. I have been hearing about HANA since the beginning of this decade or even earlier. Initially I thought it was just a new database, so why the fuss? My crooked mind used to say: may be SAP does not want to share the market revenue with any other database provider (competitors); therefore they came up with their own database. Pat SAP for Smart Business Acumen. :)
Later I had a notion that HANA is only for BI/BW folks, so being an ABAPer – why should I care? Everyone used to talk about analysis and modelling. So, I used to think, let the BI/BW modelers worry about HANA.
Then the rumour started in market; ABAP and ABAPer are going to be extinct in near future. I used to wonder, if ABAPer are going to die, then who in this whole universe would support those tons and tons of ABAP code written in the history of SAP Implementations? What will happen to all those time, effort and money spent in those large and small scales SAP Implementations? What a waste of rumour!!
The bgRFC allows applications to record data that is received later by a called application. When the data is received, we must ensure that the data was transferred to the receiver either once only in any order (transactional) or once only in the order of creation (queued).
What is bgRFC?
bgRFC Configaration
bgRFC Programming
bgRFC Debugging
bgRFC Monitoring
A Chargeback is an amount claimed by a distributor from a manufacturer or vendor for the difference between their initial acquisition price and the actual agreed upon price for products/services sold to a specific end customer or partner.
There are not much documents in the internet world regarding Vistex. In this post, the author has tried to give an overview of the Vistex Chargeback and the bird’s eye view to the common terminologies, screens, transactions and technical objects (user exits, BADIs etc). Hope this post would act as a launch pad to all interested consultants who would like to take deep dive into Vistex.
Below are the contents of the attached document:
i) Definition of Chargeback
ii) Benefits of the Chargeback Application
iii) Chargeback Process
iv) Chargeback Lifecycle
v) Source Documents of Chargeback
vi) Chargeback creation based on Partner Roles with proper agreements
vii) Chargeback creation based on Partner role w/o agreement
viii) Why Partner Roles are important to create Chargeback Document
ix) Chargeback Creation Transaction codes
x) Chargeback Display or Change TCodes
xi) Chargeback Accounting Document Display
xii) Document flow for the accounting document of Chargeback
xiii) Common T-codes/User Exits/BADIs in Chargeback
xiv) High Level Overview from Contract to Chargeback Business Process for a Pharma wholesale business process
xv) Chargeback functions : CB Creation, Document flow and Reconciliation
There are not much documents in the internet world regarding Vistex. In this post, the author has tried to give an overview of the Vistex Contract (with examples from Pharma Contracts Management System) and the bird’s eye view to the common terminologies, screens, transactions and technical objects (user exits, BADIs etc). Hope this post would act as a launch pad to all interested consultants who would like to take deep dive into Vistex Contract.
Below are the contents of the attached document:
i) Vistex Introduction
ii) Benefits of Vistex Solution
iii) Industry Challenges
iv) Benefits of Vistex Solution
v) Integrated Contract Life-Cycle Management
vi) Contract Development and Administration
vii) Contract Types
viii) Contract Screen General Tab
ix) Contract Screen Customer Tab
ix) Contract Screen Products Tab
x) Group Purchase Organization (GPO) & Buying Group
xi) Group Membership
xii) Membership/Block Maintenance Screen
xiii) Buying Group assignment to Contract
xiv) Sample Process Flow
xv) Sample Exception Processing Flow
xvi) Contract Activation
xvii) Contract Best Price Logic
xviii) Contract Data Upload
xix) Manual File Upload
xx) File Upload
xxi) Inbound Contract Create/Update (EDI 845)
xxii) Common T-Codes, Tables & BADI
Couple of our readers suggested that we post something which would be easy reference for Vistex Technical who are beginners. Hope this post would help all Vistex Technical who are starting their first project in Vistex.
A. Common Modules in Vistex
1. Customer Rebate
2. Chargeback
3. Contract
4. CLM
For almost a decade I (and I am sure, all ABAPers) have been happily using the loop holes in SAP security to access the forbidden transactions, with no malicious intension though, only for speedy analysis and ethical debugging.
But today I am wondering, is it really a loop hole or has SAP provided these small windows to the developers knowingly?
SAP Security Guys!! Hope you are reading this.
As a hardcore ABAP developer, I was curious to know, how is an ABAPer affected by this upgrade 7.4. After exploring the system and going through the sap release documents, I have tried to jot down the changes which ABAPers like me would be interested in.
And NEW and VALUE Operators are the first features in EhP7 which the ABAPer would be using regularly.
Offshore development model in 10 steps sap yardSAPYard
Recently while discussing with one of my onsite client, I
came to know that clients here are not completely aware
of how offshore functions. They believe that after they
give the business requirement, their responsibilities are
over. In short, offshore model is a Black Box to them.
They are only interested in the final deliverables and not
in how offshore get the things done.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
1. 8/11/2015 Are you an ABAP coder or a programmer? | SAP Yard
http://www.sapyard.com/areyouanabapcoderoraprogrammer/ 1/8
Are you an ABAP coder or a
programmer?
TOPICS: ABAP Checklist Good Programming Practice
Guidelines
POSTED BY: SAP YARD OCTOBER 16, 2014
The difference between a normal programmer and a
good programmer is, the latter keeps his/her basics
right. Good programmers are distinguished by the
quality of their deliverables. They provide enough
documentation in their object so that the future
practitioners supporting their product do not curse
them. One of my Team Lead once told me, “your code
should not only meet the functionalities, it should also be
asthetically pleasing if someone happens to peep into it“.
Today, in this post I do not want to bore you with the
“Gyan” (Sanskrit word that roughly translates to
Enter email
Subscribe
RECENT POSTS
DELETING rows of the
internal table within the
LOOP. Is it a Taboo? A big
NO NO?
Quick Reference for Vistex
Technical
Offshore Development
Model in 10 Steps
SAP YARD
YOUR BACKYARD FOR SAP TECHNICAL TIPS AND SOLUTIONS
HOME SEE ALL POSTS ASK YOUR QUESTIONS ABOUT ME CONTACT ME
You and 92 other friends like this
SAP Yard
168 likes
Liked
SEARCH …
17
7
2
2
2. 8/11/2015 Are you an ABAP coder or a programmer? | SAP Yard
http://www.sapyard.com/areyouanabapcoderoraprogrammer/ 2/8
“sermons/preachings”). But, I would like to provide a
list of simple checks which every programmer should
remember even in their sleep…
Note: Numbers are only for bullet marker. It does not
rate one higher to next. Every point has different
weightage in different scenarios.
1) Define your variables with meaningful names (eg:
instead of v_var1; v_material is more meaningful).
Provide as much documentations/halfline comments
as possible. Align your code and demarcate your
blocks. Provide uniform spacing in between different
units and remove dead codes. Clean code would
reflect your personality..
2) In the AT SELECTION-SCREEN event, use UP TO 1
ROWS (or count( * ) UP TO 1 ROWS) in the SELECT
statement used for validating the data since the idea
is just to ensure that at least 1 row will be considered
for processing in the main selection event.
3) Internal table is defined with “TYPE
STANDARD/SORTED/HASHED TABLE OF” “INITIAL
SIZE 0″ and work area is used instead of tables with
HEADER LINES. If you have multiple internal tables
of same type, you need not always define as many
work areas. Same work area should be used across
multiple internal tables, if they are of same type.
4) Declare global internal tables only if they are
expected to be used globally (across multiple
subroutines) in the program. This is to avoid
unnecessary memory usage as local internal tables are
cleared from the memory on exiting the subroutine.
5) Wild cards like ‘A%’ should be avoided as much as
possible.
6) Always SELECT INTO internal table, except when
Ready Reckoner for SAP
Developers
Just a key and two clicks for
ALV consistency check
3. 8/11/2015 Are you an ABAP coder or a programmer? | SAP Yard
http://www.sapyard.com/areyouanabapcoderoraprogrammer/ 3/8
the table will be very large, use “UP TO N Rows” when
the number of records needed is known.
7) Use “JIT”, Just In Time concept to select data when
needed, use them and free them. Most programmers
have the habit of selecting all the tables one by one
first and then processing/massaging them later at the
end. This practice burdens the system by unnecessary
memory consumption by holding the data when they
are not needed. SELECTs should be done when
needed and FREE/REFRESH the tables as soon as it is
used and not needed afterwards.
8) SORT fields and SORT Order on the SORT
statement should be mentioned explicitly (e.g. SORT
ITAB BY FLD1 ASCENDING FLD2 DESCENDING).
9) HASHED table is used for processing large amount
of data (provided that you access single records only,
and all with a fully specified key).
10) DELETE or SORT is not used on a HASHED table
since it increases memory consumption.
11) Fields specified in the WHERE condition with the
critical operators NOT and <> (negative SQL
statements) cannot be used for a search using
database indexes. Whenever possible formulate SQL
statements positively. Avoid negation statements.
12) When IF or CASE, testing conditions are nested so
that the most frequently true conditions are
processed first. Also CASE is used instead of IF when
testing multiple fields “equal to” something.
13) READ TABLE INTO WORKAREA should be used
instead of only READ TABLE. If INTO work area is not
needed then, use the addition TRANSPORTING NO
FIELDS if the purpose of the read statement is only to
check the existence of the record in that table.
4. 8/11/2015 Are you an ABAP coder or a programmer? | SAP Yard
http://www.sapyard.com/areyouanabapcoderoraprogrammer/ 4/8
14) For copying internal tables use ‘=’ operator
instead of LOOPing and appending. SORT inside a
LOOP should be avoided.
15) Do not delete the records of internal table inside
the LOOP — ENDLOOP. Instead mark the rows to be
deleted by passing some identifier to the row field(s)
and delete all those identified after the end of LOOP.
Use Field Symbol, if you want to modify the fields of a
table in the LOOP. Usage of field symbol would avoid
modify statement inside the LOOP.
16) Use CONTROL BREAKS in the LOOP — ENDLOOP
syntax to avoid repeated reading of other internal
tables and for summarizing / updating the internal
tables.
17) DELETE ADJACENT DUPLICATES entries from
internal table before selection from database table
using “ FOR ALL ENTRIES” statement. Applicable
only in those cases where the table can possibly have
duplicate entries.
18) Nested SELECT should not be used instead,
“INNER JOIN” and/or “FAE” should be used. “FAE” is
to be used over “LOOP at ITAB / SELECT /
ENDLOOP”.
19) In SELECT statement, only the required fields
should be selected from the database
table/structure/view. While using FOR ALL ENTRIES,
make sure to SELECT all the primary keys even if you
do not need some of them later as FAE retrieves
unique result set. For selecting single row from a
database table, “SELECT UP TO 1 ROWS” is used
(when you do not have full primary key for your
WHERE clause). Always CHECK that the internal table
used in FOR ALL ENTRIES is NOT empty. “SELECT
SINGLE” is used only when full primary key
combination is known. Avoid SELECT * as much as
5. 8/11/2015 Are you an ABAP coder or a programmer? | SAP Yard
http://www.sapyard.com/areyouanabapcoderoraprogrammer/ 5/8
possible.
20) When creating JOINs over database tables there
should be an index at least on the inner table for the
fields in the JOIN condition else use “ FOR ALL
ENTRIES” SELECT statement. Ensure that the inner
join uses the correct indexes.
21) SORT internal table by fields in the correct order,
which are used in a READ TABLE statement using
BINARY SEARCH. If the order of SORTING is invalid,
the BINARY SEARCH will never work. And you would
be scratching your head for a long time to find the
root cause if you need to do dry run where issues
could be replicated..
22) Avoid MODIFY, use explicit INSERT or UPDATE;
it is better for performance and support. MODIFY
statement is more attractive to programmers because
of the ease of usage. But, believe me, splitting your
table entries to INSERT and UPDATE is still better,
even though it might need one more select
statements. Tried and Tested in real projects.
23) For large internal tables where only some rows are
to be processed, use SORT and then the READ TABLE
command is used to set index to first relevant row
before LOOPing from that index. Use CHECK or IF…
EXIT…ENDIF as appropriate to exit from the loop.
Also called, Parallel Cursor technique.
24) SORTed table is used for range accesses involving
table key or index accesses. SORTed tables are
particularly useful in nested loop processing. LOOP
AT ITAB with a WHERE condition is preferred where
ITAB is a SORTED table (instead of STANDARD or
HASHED internal table) and the fields used in the
WHERE condition are the non-unique key fields of the
sorted table.
6. 8/11/2015 Are you an ABAP coder or a programmer? | SAP Yard
http://www.sapyard.com/areyouanabapcoderoraprogrammer/ 6/8
25) Use indexed table like VAPMA instead of VBAP to
identify sales orders for a particular MATNR (i.e in
situations when you have material and you do not
have VBELN (sales order number) in hand). Similarly
VAKPA etc. VBFA is used for forward search i.e.
preceding to subsequent. For subsequent to preceding
we should use alternate tables such as LIPS or VBRP
(VBGEL, VGPOS). Try to use Views instead of joining
multiple tables.
26) Run Code Inspector and Extended syntax checks
with character literals checkbox switched on to rectify
all relevant errors and warnings. SAP has provided
this cool feature, please use it. Proudly flaunt the
results with zero/ignorable warnings.
27) Use transaction code SCI/SCII to do the sanity
check of your deliverables before passing it to the
quality reviewers. Easy way to impress your reviewer.
28) Use transaction code ST05/ST12 to trace your
code. Make sure to check what indices your database
accesses are using. Check these indices against your
“WHERE” clause to assure they are significant. Check
other indices for this table and where you have to
change your “WHERE” clause to use it. Create new
indices if necessary after consulting your Basis team.
For client dependant tables, use MANDT as the first
field in the secondary index since it is internally
considered by SAP when retrieving the data from the
database tables.
Please note, this article is not intended for Performance
Tuning. This is an effort to remind the programmers
about the simple checks which we should take care as
part of good programming practice. Please feel free to
suggest if you think something is missing. We would be
happy to add them in this list.