This document provides an overview of the technical realization of the client/server architecture in SAP R/3 and describes how to perform basic system administration tasks. It covers topics such as starting and stopping the database and SAP instances, monitoring system status, managing background jobs, configuring the update system, and setting up output management. The document also discusses user administration, authorizations, and transport management.
This document provides an overview of accounting and chargeback concepts and describes how to set up and use the Resource Accounting Feature (RAF) of Tivoli Decision Support for OS/390 to capture system resource usage data and generate bills. It covers RAF components, host considerations, installing the accounting console, exploring the demo database, and processes for customizing and running the monthly billing cycle. The goal is to help customers quickly establish host and workstation accounting environments to use financial databases for multiple analyses and planning.
This manual provides information about installing and using TeamViewer version 6.0. Some of the key features covered include remote control, file transfer, presentations, and connecting to partners. The manual has sections that describe how to install TeamViewer, perform remote control sessions, use advanced functions like accessing systems via a web connector, and manage partner lists and accounts.
This document provides guidance on configuring HP Project and Portfolio Management Center software version 7.5. It includes information on gathering requirements for workflows, requests, contacts and other configuration elements. The document also describes how to create and configure workflows using the workflow workbench, including setting general properties, adding different types of workflow steps, and configuring security and notifications.
This document provides guidance and reference information for commands, tokens, and validations in HP Project and Portfolio Management Center Software Version 7.5. It describes the different types of commands used to define workflows for objects and requests in PPM. It also explains how to configure and use special commands to perform actions like copying or moving requests between workflows. The document reviews various token formats that can be used to reference field values, parameters, and other dynamic elements. It includes instructions for using the Token Builder tool to define tokens. Finally, it discusses how validations can be applied to check field values and other properties when objects and requests are created or updated in PPM.
This document is an IBM Tivoli Usage and Accounting Manager V7.1 Handbook. It provides an end-to-end IT charging and accounting solution that works with Tivoli Decision Support for z/OS. The handbook contains information about financial management and cost allocation using IBM Tivoli Usage and Accounting Manager, including its components, data collection, processing, and reporting capabilities.
This document provides information about new features, enhancements, and changes in HP Project and Portfolio Management Center Software Version 9.20, including usability enhancements, user interface enhancements, improvements to demand management, program management, document management, and solution integrations. It also covers upgrade considerations, such as supported operating systems and database versions.
Complete 84-page User and Administrative Guide to MIDAS v4.15.
MIDAS (https://mid.as) is a powerful and intuitive browser-based scheduling system that gives you complete control over your room bookings & resource scheduling. Accessed entirely from your favorite web browser, see at a glance when your bookings are scheduled, manage staffing & equipment, send confirmations & invoices to clients, take booking requests through your website, and put an end to confusion & double bookings once and for all!
As all you need is a browser, your MIDAS booking system is readily available wherever you are! - Whether at the office, at home, or on the move - from your desktop, laptop, tablet or mobile device - your booking information is right at your fingertips! Available to download (for use on your own server), or as cloud hosted SaaS (Software as a Service), MIDAS drastically cuts down on your costs, by streamlining the time spent on booking & administrative tasks, and reducing the amount of paperwork!
Manuals for other versions may be obtained via https://mid.as/manuals
This document is the Administrator's Guide for Palo Alto Networks firewall release 4.1. It provides information and instructions for system setup, configuration, license management, and other device management tasks. The guide includes chapters on introduction, getting started, device management, security policies, address objects, VPN configurations, and more. It aims to help administrators effectively configure and manage Palo Alto Networks firewalls.
This document provides an overview of accounting and chargeback concepts and describes how to set up and use the Resource Accounting Feature (RAF) of Tivoli Decision Support for OS/390 to capture system resource usage data and generate bills. It covers RAF components, host considerations, installing the accounting console, exploring the demo database, and processes for customizing and running the monthly billing cycle. The goal is to help customers quickly establish host and workstation accounting environments to use financial databases for multiple analyses and planning.
This manual provides information about installing and using TeamViewer version 6.0. Some of the key features covered include remote control, file transfer, presentations, and connecting to partners. The manual has sections that describe how to install TeamViewer, perform remote control sessions, use advanced functions like accessing systems via a web connector, and manage partner lists and accounts.
This document provides guidance on configuring HP Project and Portfolio Management Center software version 7.5. It includes information on gathering requirements for workflows, requests, contacts and other configuration elements. The document also describes how to create and configure workflows using the workflow workbench, including setting general properties, adding different types of workflow steps, and configuring security and notifications.
This document provides guidance and reference information for commands, tokens, and validations in HP Project and Portfolio Management Center Software Version 7.5. It describes the different types of commands used to define workflows for objects and requests in PPM. It also explains how to configure and use special commands to perform actions like copying or moving requests between workflows. The document reviews various token formats that can be used to reference field values, parameters, and other dynamic elements. It includes instructions for using the Token Builder tool to define tokens. Finally, it discusses how validations can be applied to check field values and other properties when objects and requests are created or updated in PPM.
This document is an IBM Tivoli Usage and Accounting Manager V7.1 Handbook. It provides an end-to-end IT charging and accounting solution that works with Tivoli Decision Support for z/OS. The handbook contains information about financial management and cost allocation using IBM Tivoli Usage and Accounting Manager, including its components, data collection, processing, and reporting capabilities.
This document provides information about new features, enhancements, and changes in HP Project and Portfolio Management Center Software Version 9.20, including usability enhancements, user interface enhancements, improvements to demand management, program management, document management, and solution integrations. It also covers upgrade considerations, such as supported operating systems and database versions.
Complete 84-page User and Administrative Guide to MIDAS v4.15.
MIDAS (https://mid.as) is a powerful and intuitive browser-based scheduling system that gives you complete control over your room bookings & resource scheduling. Accessed entirely from your favorite web browser, see at a glance when your bookings are scheduled, manage staffing & equipment, send confirmations & invoices to clients, take booking requests through your website, and put an end to confusion & double bookings once and for all!
As all you need is a browser, your MIDAS booking system is readily available wherever you are! - Whether at the office, at home, or on the move - from your desktop, laptop, tablet or mobile device - your booking information is right at your fingertips! Available to download (for use on your own server), or as cloud hosted SaaS (Software as a Service), MIDAS drastically cuts down on your costs, by streamlining the time spent on booking & administrative tasks, and reducing the amount of paperwork!
Manuals for other versions may be obtained via https://mid.as/manuals
This document is the Administrator's Guide for Palo Alto Networks firewall release 4.1. It provides information and instructions for system setup, configuration, license management, and other device management tasks. The guide includes chapters on introduction, getting started, device management, security policies, address objects, VPN configurations, and more. It aims to help administrators effectively configure and manage Palo Alto Networks firewalls.
This document provides guidance on deploying IBM Tivoli Composite Application Manager for WebSphere (ITCAM for WebSphere). It includes sample code, installation instructions, and assistance with scope development for a services engagement with ITCAM for WebSphere. The document covers planning the engagement, demonstrating the key capabilities of ITCAM for WebSphere through a sample implementation, and implementing the full ITCAM for WebSphere solution. It also discusses complementary solutions that can be bundled with an ITCAM for WebSphere engagement.
RF card terminal user manual in which we have mentioned how to register and delete the people from device and other fnctions too, this will be a great help for our end users.
This document provides an overview of the Paladin network security system, including descriptions of the Paladin server, client workstations, and admin console. It discusses system requirements, installation instructions for the Paladin server and running it with SQL or MSDE databases. It also outlines how to configure system settings like email/proxy servers and port settings. The document describes how to set up policies for clients by configuring scan schedules, item actions, preventions, and alerts. It explains how to manage clients and detected spyware items.
This document provides an overview of the configuration and advanced operation capabilities of the OMNI 6000/3000 flow computer firmware revisions 22.74 and 26.74. It describes how to configure physical inputs and outputs, meter stations, meter runs, temperature, pressure, density, products, batches, and other parameters using the keypad in program mode. It also covers user-programmable functions including Boolean flags, variables, and display screens. Finally, it details the flow equations and algorithms used to calculate flow rates and properties for liquid hydrocarbons in US customary and SI metric units.
The document provides an overview of the TCP/IP protocol suite, including its layered architecture and key components. It describes the lower layers including Ethernet, WiFi, ATM and PPP. It then covers the main Internet protocols - IP for addressing and routing packets, ICMP for error reporting, UDP for connectionless transport, and TCP for reliable connected transport. The document also discusses routing protocols, infrastructure protocols like DNS and ARP, and several applications that use TCP/IP like DHCP, SNMP, authentication protocols and VPNs.
This chapter introduces network policies and Cisco access lists. Network policies are needed to implement security, robustness, and business policies on networks. Access lists are a key tool that network administrators can use on Cisco routers to implement these policies by controlling router resources, filtering packets, and filtering routing information. The chapter describes different types of network policies and provides an overview of how access lists can be used to achieve policy goals related to security, robustness, and business needs.
This document provides an overview and guide for using HSPcomplete, a hosting automation solution that allows hosting service providers to manage infrastructure, billing, sales channels, and e-commerce through a single system. It describes HSPcomplete's advantages like integrated billing and credit card processing, virtual private server management, and domain registration. Hardware, software, and user requirements for HSPcomplete deployment are also outlined.
This document provides an overview and instructions for installing and using the NUUO Central Management System (NCS). The NCS is a client/server system that allows centralized management of security cameras. It includes an NCS server, NCS client, and NCS matrix. The document covers installing SQL Server 2005 Express, the NCS server, NCS client, and NCS matrix software. It provides information on setting up server groups, maps, devices, coverage, user groups, alarms, and matrix systems in the administrator functions.
This document provides an introduction to using Actix Analyzer software for analyzing GSM network performance. It covers loading and viewing drive test and other radio network data, performing queries and filters on the data, configuring cell sites and networks, and generating reports. Key features discussed include mapping cells and drive test data, binning and aggregating data, exploring data on charts and tables, and using preconfigured applications and reports for common analysis tasks.
This document provides an overview and how-to guide for setting up IBM Tivoli License Manager (ITLM), a software license management tool. It discusses the key components of ITLM including the Administration Server, Runtime Server, Agents, and Catalog Manager. It also provides guidance on planning the ITLM implementation including physical design considerations, logical design of the customer environment, disaster recovery procedures, and planning for each ITLM component. Finally, it walks through setting up the ITLM Administration Server with steps for installing required software like IBM DB2 and WebSphere and configuring the DB2 schema. The document aims to help IT professionals successfully set up their ITLM license management environment.
Auto dialer Newfies-dialer documentation for latest version 3.9.2.
Newfies-Dialer is an Voice broadcasting solution built to support cloud based servers and can also work on standalone servers.
This EMC Engineering TechBook provides insight and understanding of some options available for managing your data center connectivity, including information on some new software management tools developed to bridge the gap in the I/O consolidation environment.
Managing and operating a Microsoft Virtual Server ...webhostingguy
This document provides information on managing and operating a Microsoft Virtual Server infrastructure with HP ProLiant servers. It discusses using HP Systems Insight Manager (HP SIM) for virtualization management including the HP Virtual Machine Management Pack. It also covers backup and recovery, security, performance management, and more. Templates, migrations between virtual and physical environments, and clustering are described.
Newfies-Dialer : Autodialer software - Documentation version 1.1.0Areski Belaid
Newfies-Dialer is an open source autodialer application designed and built to automate the delivery of interactive phone calls to contacts, clients and the general public.
http://www.newfies-dialer.org
This document provides guidance for consultants on implementing Openbravo QuickStart 2. It outlines the initial interview process, including critical information to obtain from the client and templates to use. It then covers the deployment options of Openbravo on-premises, in the cloud, or hosted. The document reviews setting up backups, installing QuickStart 2, initial configuration steps, functional areas to implement, creating a test environment, training requirements and the support phase. It aims to guide consultants through the entire QuickStart 2 implementation process.
This document is a study guide for the IBM Tivoli Access Manager for e-business 6.0 certification. It provides an overview of the certification program and prerequisites. It also lists the test objectives that candidates need to understand to pass the exam. Additionally, it recommends educational resources like courses and documentation to help candidates prepare.
This document provides an overview of the TriCaster TCXD300 system. It begins with a table of contents and introduction to the manual. Section 2 provides an overview of the startup screen and Live Desktop interface. Section 3 covers setting up inputs, outputs, and other configuration options. Section 4 walks through a sample live production workflow, demonstrating features like switching, recording, media playback, and streaming. The remainder of the document provides in-depth reference information on various Live Desktop tools and configuration options.
Sg247692 Websphere Accounting Chargeback For Tuam Guidebrzaaap
This document provides guidance on implementing IBM Tivoli Usage and Accounting Manager V7.1. It discusses planning the implementation, including account code structure, collector selection, and report requirements. It then covers installing and configuring the application server, database, and collectors. The document provides details on configuring users, clients, rates, and other system elements. Its goal is to help users successfully set up and verify an IBM Tivoli Usage and Accounting Manager V7.1 environment.
This document provides guidance on updating SAP ABAP systems on UNIX and Linux using Software Update Manager 2.0 SP11. It describes the basic concepts of upgrades and updates in SAP systems, planning activities like determining the upgrade schedule and scope, preparing for the update including checking software and hardware requirements, and performing the update using the Software Update Manager user interface. The document contains detailed sections on planning, preparation, and using SUM for both upgrades and updates.
The document provides an overview of the TeamViewer remote control software, outlining its key features and functions. It describes how to install TeamViewer, configure it to start automatically with Windows, and explains the differences between running TeamViewer as an application or system service. The document also gives an overview of TeamViewer's licensing options and related downloads.
This document provides an administrator manual for Atoll version 3.1.0. It discusses installing and configuring Atoll and its components, setting up distributed calculation servers, managing licenses, and working with Atoll databases. The manual is divided into several sections covering topics such as supported technologies, installation, license management, database management, and more.
This document is the manual for Greenbone Security Manager version 4. It provides information on installing and configuring the Greenbone Security Manager and its components. The manual covers system administration topics like network configuration, user management, and maintenance functions. It also introduces the Greenbone Security Manager graphical user interface and concepts.
This document provides guidance on deploying IBM Tivoli Composite Application Manager for WebSphere (ITCAM for WebSphere). It includes sample code, installation instructions, and assistance with scope development for a services engagement with ITCAM for WebSphere. The document covers planning the engagement, demonstrating the key capabilities of ITCAM for WebSphere through a sample implementation, and implementing the full ITCAM for WebSphere solution. It also discusses complementary solutions that can be bundled with an ITCAM for WebSphere engagement.
RF card terminal user manual in which we have mentioned how to register and delete the people from device and other fnctions too, this will be a great help for our end users.
This document provides an overview of the Paladin network security system, including descriptions of the Paladin server, client workstations, and admin console. It discusses system requirements, installation instructions for the Paladin server and running it with SQL or MSDE databases. It also outlines how to configure system settings like email/proxy servers and port settings. The document describes how to set up policies for clients by configuring scan schedules, item actions, preventions, and alerts. It explains how to manage clients and detected spyware items.
This document provides an overview of the configuration and advanced operation capabilities of the OMNI 6000/3000 flow computer firmware revisions 22.74 and 26.74. It describes how to configure physical inputs and outputs, meter stations, meter runs, temperature, pressure, density, products, batches, and other parameters using the keypad in program mode. It also covers user-programmable functions including Boolean flags, variables, and display screens. Finally, it details the flow equations and algorithms used to calculate flow rates and properties for liquid hydrocarbons in US customary and SI metric units.
The document provides an overview of the TCP/IP protocol suite, including its layered architecture and key components. It describes the lower layers including Ethernet, WiFi, ATM and PPP. It then covers the main Internet protocols - IP for addressing and routing packets, ICMP for error reporting, UDP for connectionless transport, and TCP for reliable connected transport. The document also discusses routing protocols, infrastructure protocols like DNS and ARP, and several applications that use TCP/IP like DHCP, SNMP, authentication protocols and VPNs.
This chapter introduces network policies and Cisco access lists. Network policies are needed to implement security, robustness, and business policies on networks. Access lists are a key tool that network administrators can use on Cisco routers to implement these policies by controlling router resources, filtering packets, and filtering routing information. The chapter describes different types of network policies and provides an overview of how access lists can be used to achieve policy goals related to security, robustness, and business needs.
This document provides an overview and guide for using HSPcomplete, a hosting automation solution that allows hosting service providers to manage infrastructure, billing, sales channels, and e-commerce through a single system. It describes HSPcomplete's advantages like integrated billing and credit card processing, virtual private server management, and domain registration. Hardware, software, and user requirements for HSPcomplete deployment are also outlined.
This document provides an overview and instructions for installing and using the NUUO Central Management System (NCS). The NCS is a client/server system that allows centralized management of security cameras. It includes an NCS server, NCS client, and NCS matrix. The document covers installing SQL Server 2005 Express, the NCS server, NCS client, and NCS matrix software. It provides information on setting up server groups, maps, devices, coverage, user groups, alarms, and matrix systems in the administrator functions.
This document provides an introduction to using Actix Analyzer software for analyzing GSM network performance. It covers loading and viewing drive test and other radio network data, performing queries and filters on the data, configuring cell sites and networks, and generating reports. Key features discussed include mapping cells and drive test data, binning and aggregating data, exploring data on charts and tables, and using preconfigured applications and reports for common analysis tasks.
This document provides an overview and how-to guide for setting up IBM Tivoli License Manager (ITLM), a software license management tool. It discusses the key components of ITLM including the Administration Server, Runtime Server, Agents, and Catalog Manager. It also provides guidance on planning the ITLM implementation including physical design considerations, logical design of the customer environment, disaster recovery procedures, and planning for each ITLM component. Finally, it walks through setting up the ITLM Administration Server with steps for installing required software like IBM DB2 and WebSphere and configuring the DB2 schema. The document aims to help IT professionals successfully set up their ITLM license management environment.
Auto dialer Newfies-dialer documentation for latest version 3.9.2.
Newfies-Dialer is an Voice broadcasting solution built to support cloud based servers and can also work on standalone servers.
This EMC Engineering TechBook provides insight and understanding of some options available for managing your data center connectivity, including information on some new software management tools developed to bridge the gap in the I/O consolidation environment.
Managing and operating a Microsoft Virtual Server ...webhostingguy
This document provides information on managing and operating a Microsoft Virtual Server infrastructure with HP ProLiant servers. It discusses using HP Systems Insight Manager (HP SIM) for virtualization management including the HP Virtual Machine Management Pack. It also covers backup and recovery, security, performance management, and more. Templates, migrations between virtual and physical environments, and clustering are described.
Newfies-Dialer : Autodialer software - Documentation version 1.1.0Areski Belaid
Newfies-Dialer is an open source autodialer application designed and built to automate the delivery of interactive phone calls to contacts, clients and the general public.
http://www.newfies-dialer.org
This document provides guidance for consultants on implementing Openbravo QuickStart 2. It outlines the initial interview process, including critical information to obtain from the client and templates to use. It then covers the deployment options of Openbravo on-premises, in the cloud, or hosted. The document reviews setting up backups, installing QuickStart 2, initial configuration steps, functional areas to implement, creating a test environment, training requirements and the support phase. It aims to guide consultants through the entire QuickStart 2 implementation process.
This document is a study guide for the IBM Tivoli Access Manager for e-business 6.0 certification. It provides an overview of the certification program and prerequisites. It also lists the test objectives that candidates need to understand to pass the exam. Additionally, it recommends educational resources like courses and documentation to help candidates prepare.
This document provides an overview of the TriCaster TCXD300 system. It begins with a table of contents and introduction to the manual. Section 2 provides an overview of the startup screen and Live Desktop interface. Section 3 covers setting up inputs, outputs, and other configuration options. Section 4 walks through a sample live production workflow, demonstrating features like switching, recording, media playback, and streaming. The remainder of the document provides in-depth reference information on various Live Desktop tools and configuration options.
Sg247692 Websphere Accounting Chargeback For Tuam Guidebrzaaap
This document provides guidance on implementing IBM Tivoli Usage and Accounting Manager V7.1. It discusses planning the implementation, including account code structure, collector selection, and report requirements. It then covers installing and configuring the application server, database, and collectors. The document provides details on configuring users, clients, rates, and other system elements. Its goal is to help users successfully set up and verify an IBM Tivoli Usage and Accounting Manager V7.1 environment.
This document provides guidance on updating SAP ABAP systems on UNIX and Linux using Software Update Manager 2.0 SP11. It describes the basic concepts of upgrades and updates in SAP systems, planning activities like determining the upgrade schedule and scope, preparing for the update including checking software and hardware requirements, and performing the update using the Software Update Manager user interface. The document contains detailed sections on planning, preparation, and using SUM for both upgrades and updates.
The document provides an overview of the TeamViewer remote control software, outlining its key features and functions. It describes how to install TeamViewer, configure it to start automatically with Windows, and explains the differences between running TeamViewer as an application or system service. The document also gives an overview of TeamViewer's licensing options and related downloads.
This document provides an administrator manual for Atoll version 3.1.0. It discusses installing and configuring Atoll and its components, setting up distributed calculation servers, managing licenses, and working with Atoll databases. The manual is divided into several sections covering topics such as supported technologies, installation, license management, database management, and more.
This document is the manual for Greenbone Security Manager version 4. It provides information on installing and configuring the Greenbone Security Manager and its components. The manual covers system administration topics like network configuration, user management, and maintenance functions. It also introduces the Greenbone Security Manager graphical user interface and concepts.
This document provides a summary of the HiPath 4000 V6 system software components, including:
- Descriptions of hardware configurations, licensing, applications, and the hard disk layout.
- Details on the HiPath 4000 Assistant, including its applications, user accounts, and notification mechanisms.
- An overview of the HiPath 4000 CSTA software component.
The document contains technical information on the various software aspects that make up the HiPath 4000 V6 communication system.
BOOK - IBM Implementing ibm system directory 6.1Satya Harish
This document provides an overview and guide to implementing IBM Systems Director 6.1. It discusses the key features and components of IBM Systems Director 6.1. It also covers planning considerations for hardware, software, security and other aspects. The document aims to help readers get the most out of IBM Systems Director 6.1 through practical implementation guidance and real-world scenarios.
This document provides a user guide for the Maintenance Planner tool. It describes how to use Maintenance Planner to plan changes to an SAP landscape, including installing new systems, updating systems, and defining dependencies between systems. It covers planning for SAP S/4HANA, BW/4HANA and Fiori installations. The document also describes how to execute the planned changes and work with transactions in Maintenance Planner.
OpenScape Contact Center Enterprise V10 Manager Administration Guide Administ...EnriqueJoseCaleroGal
This document provides an overview and instructions for planning and implementing OpenScape Contact Center Enterprise V10. It discusses the processing flow, database configuration, initial Manager setup, and user interface. Configuration topics include users, templates, profiles, permissions, contact handling, media settings, thresholds, reports, and security. The document contains detailed information on designing an implementation and configuring various Contact Center resources and components.
This document provides an overview of IBM InfoSphere Streams V3.0, which is a stream computing platform for performing real-time analytics on big data. It discusses key concepts of stream computing and InfoSphere Streams architecture. New features in V3.0 include improved configuration, administration, integration capabilities, and analytics toolkits. The document also covers deployment planning and creating Streams instances.
The document provides an introduction to artificial intelligence, including:
- A brief history of AI from the 1980s "AI winter" period of failed projects through to recent advances enabled by improved hardware and new research areas like machine learning.
- Knowledge representation and reasoning, rule engines, hybrid reasoning systems, and expert systems are introduced as key concepts in AI.
- The advantages of using a rule engine are discussed, as well as when rule engines are appropriate versus other approaches like scripting engines. The Rete algorithm, which is commonly used in rule engines, is also introduced.
The document is a manual for Tivoli Business Systems Manager Version 2.1. It provides an overview of the product, which allows for end-to-end business impact management through integrated systems management. The manual details the product structure, components, functions, database structure, user interface, and planning requirements for implementation. It is intended to help users understand and implement the key capabilities of Tivoli Business Systems Manager.
This document is the SAP HANA Administration Guide for version SPS 06. It provides information on administering SAP HANA systems using the SAP HANA studio tool. The guide covers topics such as adding and managing SAP HANA systems, starting and stopping systems, configuring system properties, managing licenses and users, and security administration.
This document provides best practices for using IBM Blueworks Live to conduct process discovery. It discusses starting a process discovery project in Blueworks Live, creating a "Discovery Map" to identify milestones and activities, developing a process diagram using BPMN notation, and using the "Analyze Mode" feature to analyze bottlenecks and opportunities for improvement. The overall goal is to uncover an as-is view of key business processes in order to identify areas that could benefit from process optimization or automation.
This document provides best practices for using IBM Blueworks Live to conduct process discovery. It discusses starting a process discovery project in Blueworks Live, creating a "Discovery Map" to identify milestones and activities, developing a process diagram using BPMN notation, and using the "Analyze Mode" feature to analyze bottlenecks and opportunities for improvement. The overall goal is to uncover an as-is view of key business processes in order to identify areas that could benefit from process optimization or automation.
This document provides information about configuring and using the SAP Event Stream Processor Cockpit user interface. It describes how to start and stop the SAP ESP Cockpit server, log in and out of the interface, and view node statistics. It also outlines how to configure various aspects of the ESP Cockpit like collection jobs, logging, backups, ports and memory usage. Sections cover user management features and using the ESP Cockpit console.
This document provides an overview of the FortiManager system including key features, documentation resources, and basic configuration instructions. It summarizes the new features introduced in version 4.0 MR3 including improvements to global policies, administrative domains, installation wizards, policy usability, FortiToken support, management models, licensing, and the web-based manager. It also describes the FortiManager management module and its role in centrally managing FortiGate devices and their configurations.
This document provides an overview of SAP Treasury and Risk Management software. It discusses key topics such as master data, transaction management, position management, integration with other modules, market data, hedge management, reporting, portfolio controlling, interfaces and enhancements. The book is intended to help readers understand all functional areas of SAP Treasury and provide guidance on working with the software.
This document provides guidance on implementing IBM Tivoli Usage and Accounting Manager V7.1. It covers planning the implementation, installing the software, configuring various components, and verifying the installation. Key areas discussed include planning the account code structure and report requirements, installing prerequisites and the application server, configuring users, clients, rates and the database, and verifying sample data collection. The goal is to help users successfully set up and deploy IBM Tivoli Usage and Accounting Manager V7.1.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
2. Contents
Foreword to the series of books 13
Foreword 15
Introduction 17
1 Technical Realization of Client/Server
Architecture in SAP R/3 21
1.1 Client/Server Architecture in SAP R/3 .................................................... 21
1.2 Internet Connection............................................................................... 24
1.2.1 Internet Transaction Server (ITS)................................................ 25
1.2.2 Internet Communication Manager (ICM)................................... 26
1.2.3 Business Connector ................................................................... 26
1.3 Presentation Layer ................................................................................. 27
1.4 Application Layer ................................................................................... 33
1.5 Database Layer....................................................................................... 39
1.6 Network................................................................................................. 41
1.7 Operating System .................................................................................. 42
1.7.1 Directory Structure ................................................................... 43
1.7.2 Users......................................................................................... 44
1.8 Tips ........................................................................................................ 45
1.9 Transactions and Menu Paths ................................................................ 45
1.10 Additional Documentation..................................................................... 46
1.11 Questions .............................................................................................. 46
2 Getting Started 49
2.1 Starting the Database and SAP R/3 Instances........................................ 49
2.2 Stopping SAP R/3 Instances and the Database...................................... 57
2.3 Starting the Frontend ............................................................................ 57
Contents 5
3. 2.4 General Administrative Tasks ................................................................ 59
2.4.1 Status ....................................................................................... 59
2.4.2 System Monitoring ................................................................... 60
2.4.3 System Log ............................................................................... 66
2.4.4 System Messages ...................................................................... 66
2.4.5 Lists .......................................................................................... 67
2.4.6 Table Maintenance ................................................................... 67
2.5 Tips........................................................................................................ 69
2.6 Transactions and Menu Paths................................................................ 70
2.7 Additional Documentation .................................................................... 70
2.8 Questions .............................................................................................. 71
3 Service and Support 73
3.1 Remote Connection ............................................................................... 73
3.1.1 General Comments ................................................................... 73
3.1.2 SAProuter ................................................................................. 75
3.1.3 Setting Up a Connection........................................................... 77
3.2 SAP Services .......................................................................................... 79
3.3 Essential Services .................................................................................. 80
3.3.1 Problem Management .............................................................. 80
3.3.2 SAP Notes Database ................................................................. 82
3.3.3 Service Connections ................................................................. 82
3.3.4 Registration of Developers and Objects .................................... 84
3.3.5 Registration of Namespaces ...................................................... 84
3.3.6 License Key .............................................................................. 85
3.3.7 Migration Key........................................................................... 86
3.3.8 Support Packages and Software Download ............................... 86
3.4 Support Tools ........................................................................................ 86
3.4.1 EarlyWatch Alert....................................................................... 86
3.4.2 Note Assistant .......................................................................... 86
3.5 SAP Solution Manager: Overview.......................................................... 88
3.6 Tips........................................................................................................ 92
3.7 Transactions and Menu Paths................................................................ 92
3.8 Additional Documentation .................................................................... 92
3.9 Questions .............................................................................................. 93
4 Installation Concepts 95
4.1 Preparations .......................................................................................... 95
4.2 Architecture of the R3setup Installation Tool........................................ 101
4.3 Installation Steps................................................................................... 103
6 Contents
4. 4.4 Changes with the SAP Web Application Server ..................................... 110
4.4.1 SAPinst ..................................................................................... 110
4.4.2 MCOD: Multiple Components on One Database....................... 113
4.5 Postprocessing....................................................................................... 114
4.6 Tips ........................................................................................................ 119
4.7 Transactions and Menu Paths ................................................................ 120
4.8 Additional Documentation..................................................................... 120
4.9 Questions .............................................................................................. 121
5 Setting Up the System Landscape 123
5.1 Initializing the Change and Transport System........................................ 124
5.2 Tasks of a System Landscape ................................................................. 127
5.3 Configuration of the Transport Management System ............................ 130
5.3.1 Transport Domains.................................................................... 130
5.3.2 Transport Routes....................................................................... 137
5.3.3 Extended Transport Control ...................................................... 140
5.3.4 QA Approval Procedure ............................................................ 141
5.3.5 Transport Strategy ..................................................................... 142
5.4 Transport Control Program tp ................................................................ 143
5.5 Tips ........................................................................................................ 144
5.6 Transactions and Menu Paths ................................................................ 144
5.7 Additional Documentation..................................................................... 144
5.8 Questions .............................................................................................. 145
6 Software Logistics 147
6.1 Implementation Guide ........................................................................... 147
6.2 Object Editing........................................................................................ 150
6.2.1 Change Requests....................................................................... 151
6.2.2 Editing Requests with the Transport Organizer .......................... 153
6.2.3 Transport Logs .......................................................................... 161
6.2.4 Transport Organizer (Extended View) ........................................ 166
6.2.5 Transport Tools ......................................................................... 167
6.3 Importing Transport Requests ............................................................... 168
6.4 Manual Operation of the Transport Control Program tp........................ 171
6.5 Importing Support Packages and Industry Solutions ............................. 172
6.5.1 Importing Support Packages...................................................... 172
6.5.2 Importing Add-Ons ................................................................... 174
6.6 Tips ........................................................................................................ 175
6.7 Transactions and Menu Paths ................................................................ 176
Contents 7
5. 6.8 Additional Documentation .................................................................... 177
6.9 Questions .............................................................................................. 177
7 Client Administration 179
7.1 Creating New Clients............................................................................. 180
7.2 Local Copy ............................................................................................. 186
7.3 Remote Copy ......................................................................................... 192
7.4 Client Transport..................................................................................... 194
7.5 Special Functions................................................................................... 203
7.6 Tips........................................................................................................ 204
7.7 Transactions and Menu Paths................................................................ 207
7.8 Additional Documentation .................................................................... 208
7.9 Questions .............................................................................................. 208
8 R/3 Users and Authorizations 211
8.1 Basics..................................................................................................... 211
8.2 User Maintenance ................................................................................. 212
8.2.1 Creating Users .......................................................................... 213
8.2.2 License Data ............................................................................. 217
8.2.3 Changes to Users/Mass Changes ............................................... 217
8.2.4 Logon and Password Protection ................................................ 218
8.2.5 Standard Users.......................................................................... 219
8.3 Authorizations ....................................................................................... 219
8.3.1 Overview of the Authorization Check ....................................... 220
8.3.2 Authorizations and Authorization Objects ................................. 221
8.3.3 Authorization Profiles ............................................................... 223
8.3.4 Important Profiles for System Administration ............................ 225
8.3.5 Role Maintenance..................................................................... 227
8.3.6 Important Roles for System Administration ............................... 236
8.3.7 User Assignment and User Comparison..................................... 237
8.3.8 Transporting Roles .................................................................... 239
8.3.9 Upgrade Procedures ................................................................. 239
8.3.10 Troubleshooting and Traces ...................................................... 240
8.4 Personal Settings ................................................................................... 241
8.5 Internet Users........................................................................................ 242
8.6 Information About Users and Authorizations ........................................ 243
8.6.1 Information System .................................................................. 243
8.6.2 Security Audit Log .................................................................... 245
8.7 Central User Administration .................................................................. 247
8.7.1 Configuring the ALE Scenario.................................................... 248
8.7.2 Activating and Configuring Central User Administration ............ 249
8 Contents
6. 8.7.3 Deleting Central User Administration ........................................ 250
8.7.4 Administering Users in Central User Administration................... 250
8.8 Outlook: Directory Services ................................................................... 251
8.9 Tips ........................................................................................................ 252
8.10 Transactions and Menu Paths ................................................................ 252
8.11 Additional Documentation..................................................................... 254
8.12 Questions .............................................................................................. 255
9 Background Processing 257
9.1 Concepts ................................................................................................ 257
9.2 Definition of Background Jobs ............................................................... 260
9.2.1 General Information.................................................................. 261
9.2.2 Start Time ................................................................................. 262
9.2.3 Processing Steps........................................................................ 263
9.3 Analysis.................................................................................................. 266
9.4 Analysis Functions ................................................................................. 270
9.5 Authorizations........................................................................................ 274
9.6 Maintenance Jobs .................................................................................. 275
9.7 External Interface ................................................................................... 277
9.8 Tips ........................................................................................................ 277
9.9 Transactions and Menu Paths ................................................................ 278
9.10 Other Documentation............................................................................ 279
9.11 Questions .............................................................................................. 280
10 Update 281
10.1 Update Concepts ................................................................................... 281
10.1.1 Update Mode and Update Modules .......................................... 284
10.2 Configuring the Update System ............................................................. 285
10.3 Monitoring and Troubleshooting for the Update................................... 287
10.3.1 Monitoring the Update ............................................................. 287
10.3.2 Troubleshooting Canceled Updates ........................................... 290
10.4 Tips ........................................................................................................ 293
10.5 Transactions and Menu Paths ................................................................ 294
10.6 Additional Documentation..................................................................... 294
10.7 Questions .............................................................................................. 295
Contents 9
7. 11 Output Configuration and Management 297
11.1 Basics..................................................................................................... 297
11.2 Configuring Spool Work Processes........................................................ 299
11.3 Configuring the Spool Server................................................................. 301
11.4 Configuring the Output Devices Landscape .......................................... 307
11.5 Analysis and Error Correction ................................................................ 316
11.5.1 Usage Statistics ......................................................................... 316
11.5.2 Administrative Tasks ................................................................. 318
11.6 Authorizations ....................................................................................... 321
11.7 Tips........................................................................................................ 322
11.8 Transactions and Menu Paths................................................................ 322
11.9 Additional Documentation .................................................................... 323
11.10 Questions .............................................................................................. 324
12 Data Archiving 327
12.1 Archive Development Kit....................................................................... 328
12.2 Customizing........................................................................................... 332
12.2.1 Cross-Archiving Object Customizing ......................................... 335
12.2.2 Archiving Object-Specific Customizing ...................................... 336
12.2.3 Basis Customizing ..................................................................... 338
12.2.4 Application-Specific Customizing .............................................. 339
12.3 Control and Analysis.............................................................................. 339
12.4 Tips........................................................................................................ 343
12.5 Transactions and Menu Paths................................................................ 344
12.6 Additional Documentation .................................................................... 345
12.7 Questions .............................................................................................. 346
13 Data Distribution and Transfer 347
13.1 RFC Destinations................................................................................... 348
13.2 Application Link Enabling...................................................................... 354
13.2.1 Technical basics ........................................................................ 355
13.2.2 Narrow and Loose Coupling Using BAPIs .................................. 358
13.2.3 Configuration ........................................................................... 358
13.2.4 Monitoring and Analysis ........................................................... 365
13.3 Data Transfer ......................................................................................... 369
13.3.1 Batch Input............................................................................... 369
13.3.2 Direct Input.............................................................................. 371
13.3.3 Fast Input/Call Transaction........................................................ 373
10 Contents
8. 13.3.4 BAPI.......................................................................................... 373
13.3.5 Legacy System Migration Workbench........................................ 373
13.3.6 Data Transfer Workbench ......................................................... 374
13.4 SAPconnect ............................................................................................ 374
13.5 Tips ........................................................................................................ 375
13.6 Transactions and Menu Paths ................................................................ 375
13.7 Additional Documentation..................................................................... 377
13.8 Questions .............................................................................................. 377
14 Maintaining Instances 379
14.1 Profile Maintenance ............................................................................... 379
14.2 Operation Modes................................................................................... 391
14.3 Control Panel ......................................................................................... 398
14.4 Dynamic User Distribution .................................................................... 399
14.5 Tips ........................................................................................................ 402
14.6 Transactions and Menu Paths ................................................................ 403
14.7 Additional Documentation..................................................................... 404
14.8 Questions .............................................................................................. 404
15 System Monitoring 405
15.1 Server and Process Overviews ............................................................... 405
15.2 User Overviews...................................................................................... 414
15.3 System Log............................................................................................. 416
15.4 Analyzing Runtime Errors....................................................................... 418
15.5 Trace Files .............................................................................................. 419
15.6 Lock Entries ........................................................................................... 424
15.7 Performance Monitoring ........................................................................ 426
15.7.1 Basic Administration.................................................................. 426
15.7.2 Monitors ................................................................................... 427
15.8 Database Administration ....................................................................... 428
15.8.1 Regularly Scheduled Tasks ......................................................... 429
15.8.2 Database Fill Level and Objects ................................................. 431
15.9 Overview of Regular Tasks..................................................................... 432
15.10 Tips ........................................................................................................ 434
15.11 Transactions and Menu Paths ................................................................ 435
15.12 Additional Documentation..................................................................... 438
15.13 Questions .............................................................................................. 439
Contents 11
9. 16 Monitoring Architecture 441
16.1 Alert Monitor......................................................................................... 442
16.1.1 Basics ....................................................................................... 442
16.1.2 Components............................................................................. 444
16.1.3 Technical Implementation......................................................... 446
16.2 Customizing the Alert Monitor.............................................................. 451
16.2.1 Integrating Remote Systems...................................................... 451
16.2.2 Creating Customer-Specific Monitors and Monitor Sets ............ 451
16.2.3 Specific Adjustment of Properties ............................................. 453
16.3 Analyzing the Alert Monitors................................................................. 459
16.4 Example Customizing ............................................................................ 460
16.4.1 Analyzing a Log File .................................................................. 460
16.4.2 Auto-Reaction Method: Send Mail............................................ 462
16.4.3 Filtering the System Logs .......................................................... 463
16.5 Tips........................................................................................................ 465
16.6 Transactions and Menu Paths................................................................ 467
16.7 Additional Documentation .................................................................... 467
16.8 Questions .............................................................................................. 468
A Questions and Answers 471
B Important Transaction Codes 485
C Profile Parameters 491
D Menu Structures 497
E Glossary 501
F Bibliography 509
Index 511
12 Contents
10. Foreword to the series of books
At SAP, our first priority is to ensure that the SAP software solutions in
your enterprise run successfully and at a minimal cost. This “Lowest Cost
of Ownership” is achieved with fast and efficient implementation,
together with optimal and dependable operation. SAP Active Global Sup-
port is actively and consistently there to help you, with the new SAP Solu-
tion Management strategy. Throughout the entire lifecycle of a solution,
SAP offers customers all necessary services, first-class support, a suitable
infrastructure, and the relevant know-how. The new strategy is backed up
by three powerful support programs: Safeguarding, or, in other words, risk
management; Solution Management Optimization, which aims to optimize
the customer's IT solution; and Empowering, which ensures a targeted,
effective transfer of knowledge from SAP to the customer.
The imparting of knowledge is also one of the key aims of this book-part
of the line of SAP Technical Support Guides. This series gives you a detailed
overview of technical aspects and concepts for managing SAP software
solutions. The topics dealt with in these books range from a technical
implementation project to running a software system and the relevant
database system.
Whether you are new to SAP system management or wish to gain further
qualifications, you will benefit from the wealth of practical experience and
firsthand information contained in these books. With this line of books,
SAP also endeavors to help prepare you for qualification as a “Certified
Technical Consultant”. Please note, however: These books cannot replace,
nor do they attempt to replace, personal experience gained from working
with the various SAP solutions! Rather, the authors offer suggestions to
help in your day-to-day work with the software. Innovation in SAP solu-
tions always brings with it new challenges and solutions for system man-
agement. The demands made on the customer's own or external support
organizations also increase. The expertise and knowledge of these organi-
zations can be a great help in avoiding problems when using the software.
Therefore, one of the core tasks of this series of books is to teach problem-
solving skills.
Even in this Internet age, books prove to be an ideal medium for imparting
knowledge in a compact form. Furthermore, their content complements
the new service and support platform, the SAP Solution Manager, and
other new services offered by SAP. The series provides background knowl-
Foreword to the series of books 13
11. edge on the operation and functioning of new SAP solutions and contrib-
utes to customer satisfaction.
Gerhard Oswald
Member of the executive board of SAP AG
Dr. Uwe Hommel
Senior Vice President at SAP AG
SAP Active Global Support
Rot, October 2003
14 Foreword to the series of books
12. Foreword
Almost exactly three years have passed since the first edition of Liane
Will’s book on R/3 administration, which has become something of a clas-
sic. That’s a long time in the world of information technology. This book
builds on the structure of its predecessor; however, it is more than just a
new edition, because of its numerous new developments and enhance-
ments.
If you’re an SAP R/3 system administrator who has already traveled on the
evolutionary path of Basis administration from SAP R/3 4.0 to the
EnjoySAP changes in SAP R/3 4.5, you’ll notice that SAP R/3 4.6C has sig-
nificantly enhanced many approaches-in the Transport Management Sys-
tem and in monitoring, for example. Nevertheless, the design of Basis sys-
tems 4.6C and 6.x (SAP Web Application Server) does not essentially
differ regarding classic administrative topics, which make up the contents
of this book.
If you still want to pursue the topic of Basis administration unencum-
bered, I’d be pleased if this book helps you to become familiar with this
truly complex area and sail around some critical crags.
All the specifications, statements, menu paths, and screenshots in this
book are based on SAP R/3 4.6C and SAP Web Application Server 6.20
and 6.30. Unfortunately, I cannot guarantee that what you see in this
book won’t appear differently in later releases. Therefore, I ask that you
factor this into your work. This book would not exist without the support
of Roland Mayr, who spent endless hours proofreading it, and contributed
many valuable tips from his experience in the administration of complex
landscapes, and Karen Hagemann, whose illustrations clarify contexts and
backgrounds. Of course, I also wish to thank Liane Will and Florian Zim-
niak for nudging me forward and for their patience. In addition, I want to
mention Günter Lemoine for the translation, and Nancy Etscovitz for edit-
ing the book in English.
Sigrid Hagemann
SAP Systems Integration AG
Alsbach-Hähnlein, October 2003
Foreword 15
13. 9 Background Processing
In addition to dialog mode processing, the R/3 system can also
process jobs in the background. This is particularly relevant for
long-running programs that do not require any interactive
input. This chapter focuses on the management of background
jobs. You will learn how to schedule background jobs by time
and by event, and how to analyze the flow traces.
9.1 Concepts
Generally, all programs that don’t require explicit user dialog processing Background
can also run in the background. Background processing is most useful processing
when the program you’re running is long and resource-intensive, and
should therefore run at a time when the system load is low. Online exe-
cution would tie up a dialog process for the entire run, thereby indirectly
hindering other dialog users.
Figure 9.1 Long-Running Task in Dialog Mode
To prevent users from executing long-running reports interactively (see
Figure 9.1), the dialog steps have a runtime limit. This limit is set to 600
seconds by default. Processing is terminated after this period. You can set
this limit in the system profile (parameter rdisp/max_wprun_time). Back-
ground processing has no limits of this type.
Automating periodically required routine tasks is another obvious use for
background processing. The R/3 system provides the background service
with its background work processes (or simply background processes) for
Background Processing 257
14. background processing. In contrast to dialog processing, in which the dis-
patcher assigns each logical unit of work (LUW, see Chapter 1) to the next
available dialog process, background processing consists of a fixed con-
nection with one background process during the entire execution. The
system administrator or user schedules the start time for the background
job. You can choose between time control and event control.
Time-controlled In the time-controlled approach, you define a start time when you sched-
job scheduler ule a job. Each instance of the R/3 system that is configured for back-
ground work processes has an active time-controlled job scheduler, which
checks in defined intervals whether any background jobs are waiting for
processing. The descriptions of pending jobs are stored in central tables in
the database. This scheduler is an ABAP program that is interpreted and
processed within a selected dialog process, which is selected automati-
cally during R/3 system startup. The interval after which the time-con-
trolled job scheduler becomes active is set to 60 seconds by default. The
administrator can change this interval to any value in the instance profile
by using the parameter rdisp/btctime. The time interval between two job
scheduler runs can result in delays when starting jobs. Therefore, if these
delays are too long for your needs, you can reduce the duration of the
interval. Accordingly, if a possible delay is immaterial for starting a job, you
can increase the interval. Please note, however, that reducing the run fre-
quency of the time-controlled job schedule has a nearly negligible effect
on the system load.
Event-controlled In contrast to the time-controlled job scheduler, the event-controlled job
job scheduler scheduler reacts to events. It starts the appropriate background job in
response to a specific event. The event-controlled job scheduler is also
processed by a dialog work process. You define the instance to use with
parameter rdisp/btcname = <server_name> in the standard profile of the
R/3 system (DEFAULT.PFL).
System events You first have to define the events that you want the R/3 system to
respond to. Many kinds of events are already defined in the standard R/3
system. You can display an overview in ̈ Event Maintenance. The events
that are included in the standard system are also called system events. Sys-
tem events are frequently used for internal R/3 control; however, they are
also available for use by R/3 users.
User events In addition, users can use the same menu path to define their own new
events—the user events. Initially, the event definition is nothing more than
an entry in a table.
258 Background Processing
15. There are several different ways in which you can trigger an event: Triggers
̈ Manually for test purposes, with ̈ Trigger Event
̈ Using function module BP_EVENT_RAISE from an ABAP program
within the R/3 system
̈ With the external program sapevt
The sapevt program allows you to trigger an event in the R/3 system from sapevt
within an external program. The sapevt program is available in the stan-
dard SAP directory for executable programs (see Chapter 1). You can use
it as follows:
sapevt <EventID> [-p <parameter>] [-t]
pf=<profile>|name=<R/3_System_name> nr=<R/3_System_num-
ber>
The -t option causes the system to write a log file, dev_evt, in the sapevt
call directory. You can use the -p option to pass on a parameter that spec-
ifies an R/3 module (such as FI). This makes it easier to assign the events
to the work areas. This assignment is merely of a descriptive nature and
has no other function
Example: The following call:
sapevt SAP_TRIGGER_RDDIMPDP name=QO1 nr=00
triggers event SAP_TRIGGER_RDDIMPDP in R/3 system Q01.
Event control is used within the R/3 system to transport objects between
R/3 systems, for example. Transports performed with tp, the transport
control program, are executed in several phases. In addition to the actual
data import, the individual objects often have to be generated or acti-
vated. Accordingly, the tp program triggers event SAP_TRIGGER_
RDDIMPDP once the data import is complete. In an R/3 system, the
scheduling of job RDDIMPDP is always dependent on this event. When
event SAP_TRIGGER_RDDIMPDP occurs, job RDDIMPDP is executed
automatically in the background.
This technique affords you a lot of flexibility. You can’t always predict
when actions will be completed, and this makes it almost impossible to
create dependencies between background jobs. Event control gives you
entirely new perspectives to consider.
Concepts 259
16. 9.2 Definition of Background Jobs
To configure background jobs, use ̈ Job Definition (see Figure 9.2).
Figure 9.2 Initial Screen: Job Definition
Frequently, the scheduling of background jobs is integrated directly into
the applications—to copy clients, for example, or in the user master com-
parison. The appearance of the screens can differ, and certain job
attributes may be preassigned, depending on the application in use. The
basic features and background processing options described in this chap-
ter remain applicable, however, and can also be applied to these special
cases.
The definition of background jobs consists of the following three primary
attributes:
̈ General information, such as the job name, job class, and target server
̈ Information about the start time or assignment of a triggering event
̈ List of the processing steps
260 Background Processing
17. 9.2.1 General Information
The general information is the first step in defining any background job
(see Figure 9.2). You should choose as descriptive a job name as possible,
as this name will be used in all logs and overviews that you will have to
analyze later. From a technical standpoint, the job name is negligible; it
does not have to be unique.
The priority for executing a job is initially determined from the assignment Job class
of that job to a job class. The following job classes are defined:
̈ A — Highest priority
Time-critical jobs that ensure the functionality of R/3
̈ B — Medium priority
Periodic jobs that ensure the functionality of R/3
̈ C — Normal priority
Job class C is the usual job class for R/3users
System resources are assigned based on the job class. If many class C jobs
are often being processed, which means jobs with classes A and B have to
wait for background processes to become available, the system adminis-
trator can specify n number of background processes to reserve for class
A jobs in ̈ Operation Mode Maintenance. This configuration ensures
that n background processes are always available for executing class A
jobs. Jobs with class B and C have to wait until at least n+1 processes are
available. This configuration is described in Section 14.2 on operation
mode maintenance.
In a distributed R/3 system, you can assign the execution of a job to any Target server
R/3 instance with the background service. This R/3 instance is called the
target server in the background processing context. If you do not explicitly
specify a target server, the next available background process at execution
time is selected.
The following priorities are defined for processing a request on a defined
background server:
1. Job class A, target server is specified
2. Job class A, no target server is specified
3. Job class B, target server is specified
4. Job class B, no target server is specified
5. Job class C, target server is specified
6. Job class C, no target server is specified
Definition of Background Jobs 261
18. If the pending jobs have equal priority according to the above criteria, the
waiting time is used.
If a target server is specified, this value is binding. If a target server is not
available when the job is started, no background process of another
instance will take over the processing. The job remains in the queue until
the defined target server starts working again, or processing is explicitly
moved to another server.
The output generated by an ABAP program is saved as a spool request in
the SAP spool system. You can use Spool list recipient to send the output
to a user. This technique makes it possible for several people to administer
a background job and analyze its results, for example. Because the output
can be quite large, we recommend that you use this option with caution.
For performance reasons, the length of an output list sent in SAPoffice is
restricted to 1,000 lines. You specify the information for the print param-
eters themselves in the step definition (see Section 9.2.3).
9.2.2 Start Time
In the next step, you have to select the parameters to determine the start
time. To do so, choose a Start condition from the initial screen for the job
definition. You can specify the start date as being time- or event-con-
trolled (see Figure 9.3). The time information and time zone used are
based on the system time. In addition to specifying the start time directly,
time-controlled job scheduling also enables you to schedule jobs period-
ically—for example, for regular analyses or the maintenance jobs
described in Section 9.6. You can choose any repeat interval: a number of
minutes, hourly, daily, weekly, and so on. You can use the Restrictions
button to define exceptions from the usual period, for example, to con-
sider legal holidays in the valid factory calendar. When time-sensitive jobs
are involved, you can define the latest possible time for starting the job
(No start after).
Instead of defining a time control, you can also specify a defined event as
a trigger. In particular, operation mode changes (see Chapter 14) and the
end of a job are defined as events, which means a background job can also
be started as a follow-on job. You can use the Start status-dependent
option to make the job start, given the successful completion of the pre-
vious job. If the previous job terminates, the dependent follow-on job is
also set to status cancelled and is not executed.
262 Background Processing
19. Figure 9.3 Start Dates for Scheduling Background Jobs
If jobs with start date After job, After event, or At operation mode cannot
be started, because no background processes are available when the
expected event occurs, they are noted to start immediately, and are then
also started by the time-controlled job scheduler as soon as possible.
9.2.3 Processing Steps
To complete the definition of a background job, describe the processing
steps that comprise the job. A processing step is defined as the execution
of an independent program, such as an ABAP program or an external pro-
gram. A background job consists of one or more such processing steps. To
define the steps, choose the Step function in the job definition transaction
(see Figure 9.2). Each processing step can be executed by a user different
than the scheduler. The authorization checks are always performed based
on the assigned users. This enables you to implement scenarios in which
one group of users is responsible (and authorized) for job scheduling,
while another group of users is responsible for job analysis. Using explicitly
assigned users can also simplify the subsequent analysis of background job
results, because the generated lists can be clearly assigned to those users.
You can define the background users, which were described in Chapter 8,
for this specific purpose.
Steps can be formed from ABAP programs, external commands, or exter-
nal programs (see Figure 9.4).
Definition of Background Jobs 263
20. ABAP program As mentioned above, all dialog-free ABAP programs can also be executed
in the background. To do so, choose the ABAP program function (see Fig-
ure 9.4). Enter the name of the ABAP program to execute and, if neces-
sary, a language for generating any log that is created. Many ABAP pro-
grams are controlled with variables, such as program RSPFPAR. This
program creates a list of all configured instance parameters. Users can
restrict the namespace of the instance parameters to display before exe-
cution. To run this type of program in the background, you have to define
variants for a program. A variant is a fixed set of values for the variables of
a program that is saved under a variant name. You define variants in the
̈ ABAP Editor with Goto • Variants. Then, enter the variant name and the
required parameter values. Next, you can schedule the defined variant of
an ABAP program for background processing. Figure 9.4 shows you the
scheduling of ABAP program RSPFPAR, for which variant “ALL” has been
defined to create a list of all current instance parameters. Generate the list
in English. You can configure the print output of the list with the Print
specifications button.
Figure 9.4 Step Definition
264 Background Processing
21. R/3 users with administrator authorization can select External Program to External programs
run any programs at operating-system level from within the R/3 system.
The name of the target server is required; parameters are optional. Rou-
tine SAPXPG is started on the target server to execute the program, and
communicates via RFC with the calling R/3 system, using the ID of special
R/3 user SAPCPIC (see Chapter 8).
To use the internal R/3 authorization mechanism, but still enable external External
programs to run in a limited manner, external commands are preconfigured commands
to be extendable. An external command consists of a name and an
assigned external program, along with possible parameter values that can
vary depending on the operating system. Before external commands can
be used in background processing, you have to define them first with
̈ Create External Operating System Commands (see Figure 9.5).
Figure 9.5 Creating an External Command
The standard R/3 system already contains many external commands. Sys-
tem administrators can define any other command in the customer
namespace. Figure 9.5 illustrates this for a ZLIST command, which is
defined for UNIX systems as the ls command with parameter -lisa, to
display the contents of the current directory.
You could also create an external command with the same name for the
Windows NT system, which would call the corresponding program dir.
Definition of Background Jobs 265
22. Commands defined in this manner are not only used for specifying back-
ground jobs, but can also be executed from within the Computing Center
Management System (CCMS). To do so, start ̈ External Operating Sys-
tem Commands, select the required command, and then choose Edit
Execute.
You can define a check module to further restrict the use of an external
command for security reasons. The check module runs before the com-
mand is started. Depending on the result of the check routine, the com-
mand is either executed or not. Routine SPXG_DUMMY_COMMAND_
CHECK is a model example in the system, which you can use as a template
for your own checks.
When you define a step within a background job, the external command
to execute is determined from the name, such as ZLIST, and the relevant
operating system, such as UNIX. You can allow users to add additional
parameters to the predefined ones. You always have to specify the target
server, as you do with external programs.
If external commands or external programs are used in the step list of a
background job, you can use the Control flags option in the step definition
to define whether the outputs and error messages from the operating sys-
tem should be recorded in the job log of the step, and whether synchro-
nous or asynchronous processing is needed, to improve integration.
Once you have entered the general information, start time, and individual
steps of the background job, its definition is complete. Save your infor-
mation when you are through.
Job Wizard All of the described entries can also be queried step-by-step using the Job
Wizard. You can call the Job Wizard directly from the ̈ Job Definition.
API R/3 provides an interface (Application Programming Interface, API) that
allows users to schedule background jobs from customer programs, in
addition to the menu-based method described above.
9.3 Analysis
You analyze and monitor the background jobs with ̈ Simple Job Selec-
tion or ̈ Extended job selection. You can filter jobs by various criteria,
including scheduling user, period, job period, event, and status (see Figure
9.6). The selection criteria are restricted by the authorization concept. If
you have administrator authorization for background processing, you can
display the jobs in all clients in the extended job selection. If not, you can
only display the jobs in the logon client.
266 Background Processing
23. Figure 9.6 Simple Job Selection
A list of all background jobs that meet the selection criteria is generated
(see Figure 9.7).
The status of a job has the following meanings:
̈ Sched.
The step definitions of the job have been saved; a start time has not
been defined yet.
̈ Released
The job has been scheduled and a start time has been set explicitly, or
the job is waiting for an event.
̈ Ready
The start time has been reached, or the awaited event has occurred; the
job is waiting for system resources to start execution.
̈ Active
The job is currently being processed.
̈ Finished
The job has been completed successfully.
Analysis 267
24. ̈ Canceled
Processing was terminated due to a problem. The job was not com-
pleted successfully.
Figure 9.7 List of Background Jobs
You can double-click on a selected job to display the job log from its exe-
cution. In addition to the start and end times, terminated jobs contain
valuable information about the termination cause. The job log in Figure
9.8 was created during an attempted data extraction. According to the
log, duplicate records in the database caused the termination.
Figure 9.8 Log of a Termination
The job overview integrates all the major operations used for background
jobs. This includes:
̈ Displaying the scheduling data
̈ Canceling jobs with Active status
268 Background Processing
25. ̈ Deleting jobs with status Sched., Released, Finished, or Canceled
̈ Canceling the release for one or more jobs; the job status changes to
planned
̈ Comparing several jobs: you specify the general job information, the
step definition, and the start requirements
̈ Moving to another server
̈ Interrupting an active job when problems are suspected (long-running
tasks): A job that is currently running an ABAP program can be stopped
and analyzed with the ABAP debugger. The program continues to run
normally when you exit the debugger.
̈ Checking the status of active jobs (see Section 9.4)
̈ Copying planned, released, or finished jobs; the new job is set to status
Sched.
In addition to this list overview, a graphical display is available, which
enables you to change and release jobs as well as check active jobs. The
graphical monitor is available in the ̈ Job Monitor (see Figure 9.9). The
job status values are displayed in color for faster comprehension.
Figure 9.9 Job Scheduling Monitor
You can also select ̈ Own Jobs or ̈ Job Definition • Own jobs to display
an overview of your own background jobs.
Analysis 269
26. 9.4 Analysis Functions
Because a user’s problems in background processing—in contrast to dia-
log processing—are often not even apparent to the users themselves,
additional analysis functions are available within the CCMS.
Runtime analysis Up to R/3 Release 4.6B, the ̈ Performance Analysis function displays a
list of all selected background jobs, along with the planned and actual start
times and runtimes. Starting in R/3 Release 4.6C, this information is inte-
grated in the ̈ Simple Job Selection. Large variances between the
planned and actual start times indicate a bottleneck in the available back-
ground processes, as they indicate that it took a while for a released job
to be sent to a background process for processing. If a user can rule out
performance bottlenecks during the execution of scheduled background
jobs, the administrator should check the resources and increase the num-
ber of background processes if necessary (parameter rdisp/wp_no_btc in
the instance profiles or in profile maintenance; see Chapter 14).
Zombies When you start up an R/3 system, it checks whether jobs with status ready
or active are found, although they are not possible in this situation. Any
such jobs that are found are set to status Sched. or canceled. Such zombies
can be created when an application server is shut down before the job
ends and the status can be updated in the database.
Status check To check whether the displayed status actually agrees with the actual sta-
tus (or whether an inconsistency exists), you can select the critical jobs in
the ̈ Simple Job Selection and choose Job status to find any possible dis-
crepancies. If necessary, you can reset job status to Sched. or cancel the
jobs themselves.
Alerts from Some background processing parameters have been integrated in the
background CCMS monitoring architecture. The Background Processing monitor pro-
processing
vides information about the average load on the background work pro-
cesses, the server-specific and average length of the wait queue for jobs in
Ready status (which cannot be started for lack of a background server),
and the number of aborted jobs (see Figure 9.10).
Control object list To ensure that the controller in background processing is working prop-
erly, use the ̈ Background Control Object Monitor. This transaction
enables you to check important background processing components—
such as time-controlled and event-controlled job schedulers, zombie
cleanup, start of external programs, and switching operating modes—and
analyze them with additional trace outputs.
270 Background Processing
27. Figure 9.10 Integration of Background Processing in Alert Monitoring
Figure 9.11 Monitor for Background Control
You can run a comprehensive analysis of all aspects of background pro- Analysis tool for
cessing with ̈ Analysis of Background Processing. In particular, this anal- background
processing
ysis tool enables you to locate and correct inconsistencies in the database
Analysis Functions 271
28. tables for job control. The following listing contains an example of the out-
put from this tool:
Listing 9.1 Output from the Analysis Tool
******************************************************
* Analysis tool for background processing
******************************************************
** Test: Determine all batch-capable servers
******************************************************
* Server name Host Name
* psasb009_IE4_00 psasb009
******************************************************
* Test: Test TemSe functionality
******************************************************
* ==> TemSe check ran without errors
******************************************************
* Test: Check a user’s batch authorizations
******************************************************
* User to check = D036044
* ==> Possesses the following authorizations:
* Batch administrator : Yes
* EarlyWatch: Yes
* Delete external jobs: Yes
* Display job logs: Yes
* Release jobs: Yes
* Display external jobs: Yes
******************************************************
* Test: Test environment for starting external programs
******************************************************
* ==> User SAPCPIC not defined in client 002
* External programs cannot be started in
* this client!
* ==> User SAPCPIC not defined in client 066
* External programs cannot be started in
* this client!
******************************************************
* Test: Consistency check of database tables
******************************************************
* ==> No inconsistencies found!
* ==> All job contexts are consistent
272 Background Processing
29. ******************************************************
* Test: Check profile parameters
******************************************************
* Server = psasb009_IE4_00 , Date = 10/13/2002 ,
* Time = 2:35:46 p.m.
******************************************************
* rdisp/btctime = 60
* rdisp/wp no btc = 6
* ==> Server is configured correctly for
* background processing
******************************************************
* Test: Check local host name against message server
******************************************************
* Server = psasb009_IE4_00 , Date = 10/13/2002 ,
* Time = 2:35:46 p.m.
******************************************************
* Local host name = psasb009
* ==> Local host name agrees with name on
* message server
******************************************************
* Test: Determine status of batch work processes
* on a server
******************************************************
* Server = psasb009_IE4_00 , Date = 10/13/2002 ,
* Time = 2:35:46 p.m.
******************************************************
* ==> Status of batch work processes:
* WP 1 : waiting
* WP 2 : waiting
* WP 3 : waiting
* WP 4 : waiting
* WP 5 : waiting
* WP 6 : waiting
* Number of reserved class A work processes: 0
******************************************************
* Test: Determine number of requests in batch queue
******************************************************
* Server = psasb009_IE4_00 , Date = 10/13/2002 ,
* Tie = 14:35:46
Analysis Functions 273
30. ******************************************************
* ==> Number of requests in batch queue = 0
******************************************************
9.5 Authorizations
Authorizations also control which actions a user is allowed to perform in
background processing. Table 9.1 lists and describes the most important
authorizations in this area. Even without any special authorization, all
users are authorized to schedule, cancel, delete, and check the status of
their own jobs. Special authorization is required for the following actions:
̈ Manipulating a job scheduled by a different user
̈ Displaying the job log
̈ Displaying a spool request generated by a background job
̈ Releasing a job for execution
̈ Using an external command
Authorization Description
S_BTCH_ADM Batch administration
S_BTCH_JOB Operations with background jobs, client-dependent
Possible values:
DELE — Delete other users’ jobs
LIST — Display other users’ spool lists
PROT — Display other users’ logs
RELE — Schedule own jobs and release for execution
SHOW — Display other users’ job details
You can use the “Job Group” field to restrict the
authorization to selected job names.
S_BTCH_NAM Use of an explicit background user
S_DEVELOP Interrupt jobs
S_LOG_COM Execute external commands
Required parameters:
COMMAND — Name of the logical command
OPSYSTEM — Operating system
HOST — Name of target system
S_RZL_ADM CCMS system administration
S_ADMI_FCD System authorization for special functions
Table 9.1 Authorizations for Background Processing
274 Background Processing
31. In contrast to dialog mode, no passwords are checked during background
processing. The relevant R/3 users merely have to be defined and not
locked in the current client.
9.6 Maintenance Jobs
The system administrator is responsible for running certain jobs for main-
taining the performance and functionality of the R/3 system. These jobs
delete unnecessary tables, for example, or collect statistical data for the
performance analysis. Table 9.2 lists and describes the most important
maintenance jobs. Additional jobs may also be necessary, depending on
which applications and proprietary developments you use.
Recommended Job Name/Description ABAP Variant Interval
SAP_COLLECTOR_FOR_ RSCOLL00 No Hourly
PERFMONITOR
Collects general statistical data for per-
formance analysis in the R/3 system.
Cross-client
Schedule in client 000 as DDIC.
SAP_COLLECTOR_FOR_ RSBPCOLL No Daily
JOBSTATISTIC
Collects statistical data to analyze
the average runtime of periodically
scheduled jobs.
Cross-client
SAP_REORG_JOBS RSBTCDEL Yes Daily
Deletes all logs of successfully executed
jobs. System administrators can use
variants to define the number of days to
elapse before deleting a log.
Cross-client
SAP_REORG_JOBSTATISTIC RSBPSTDE Yes Monthly
Reorganizes the runtime statistics of the
background jobs.
All objects that are older than the spec-
ified date are deleted.
Cross-client
Table 9.2 Important Maintenance Jobs
Maintenance Jobs 275
32. SAP_REORG_BATCHINPUT RSBDCREO Yes Daily, but only
Deletes processed batch input during times
sessions and their logs, as well as where there is
all logs for which sessions no no batch input
longer exist. activity
Client-specific
SAP_REORG_SPOOL RSPO0041 / Yes Daily
Deletes outdated spool objects. RSPO1041
Client-specific
No standard name. RSPO0043 / Yes Daily
Deletes spool lists that are relics of ter- RSPO1043
minated background programs.
Consistency check of spooler tables
Cross-client
SAP_REORG_ABAPDUMPS RSSNAPDL Yes Daily
Deletes entries (short dumps) from
runtime errors.
Cross-client
SAP_REORG_PRIPARAMS RSBTCPRIDE No Monthly
Reorganizes the print parameters. L
Cross-client
SAP_CCMS_MONI_BATCH_DP RSAL_BATCH No Hourly
System monitoring
Client-specific TOOL_DIS-
PATCHING
No standard name. RDDIMPDP Event con-
Implements transport requests. trolled
EU_PUT SAPRSLOG Daily
Administration job for updating
object lists and navigation indexes.
Cross-client
EU_REORG SAPRSEUT Daily
Administration job for updating
object lists after a transport.
Cross-client
Table 9.2 Important Maintenance Jobs (cont.)
For more information on the properties and parameters of these jobs,
refer to the documentation of the individual program. You can do so in the
̈ ABAP Editor. Enter the program name and choose Documentation •
Display.
276 Background Processing
33. In R/3 Release 4.6C and later, you can schedule all of the above jobs indi-
vidually, or automatically with standard parameters, with ̈ Job Definition
• Standard jobs.
In addition to the Basis-related maintenance jobs, application-specific
reorganizations can also improve system performance. One important
example is report SBAL_DELETE, which deletes the application log.
9.7 External Interface
The SAP BC-XBP interface enables you to integrate R/3 background jobs
with external job management systems. The following functions are sup-
ported:
̈ Defining jobs
̈ Changing, editing, and deleting jobs
̈ Starting jobs
̈ Terminating active jobs
̈ Accessing job information (status, log files, and so on)
To display a list of the products certified for this interface, visit the SAP Ser-
vice Marketplace under alias background.
9.8 Tips
̈ Defining jobs with a target server
If you often specify a target server in your job definitions, you must
modify the job definitions when your system configuration changes.
This is the case, for example, when:
̈ You move an application server to other hardware (change of server
name)
̈ You change the distribution of work processes in the definition of
the operation modes
̈ Deleting jobs that are no longer current and have status Sched.
When you display the current job queue in the ̈ Simple Job Selection,
the Job Status: Planned checkbox is usually not checked, which means
the administrator may not notice unnecessary jobs with this status.
Another common mistake is to forget the checkbox Or after event,
which means event-triggered jobs are not displayed.
External Interface 277
34. ̈ Scheduling jobs under a non-generic user
When you schedule periodic jobs that will run over a long period, it
makes sense to assign the individual steps to generic background users.
This will help you to avoid problems later on if the users who schedule
the jobs are deleted.
̈ Minimum number of processes
You have to configure at least two background work processes for the
transport system, even if you do not plan to use background processing
actively.
̈ Deallocation and rescheduling of all released jobs
Report BTCTRNS1 is used during upgrades in R/3 Release 4.5B and
later. It changes the status of all jobs to a status that the job scheduler
does not recognize, in order to prevent unwanted starts. After the
upgrade, report BTCTRNS2 is used to change the jobs back to their
original status. Of course, you can also use these functions for other
purposes.
̈ Moving the start times of individual, time-controlled job schedulers
If several instances with background processes are used, it may make
sense to set parameter rdisp/btctime to different values in the instance
profiles, in order to achieve better load distribution.
̈ Problems with self-planning periodic jobs with a limited start time
If you use periodic jobs that schedule themselves again automatically at
the end of each run, and you define a time after which such jobs can no
longer be started, these jobs may stop running altogether after a long
system shutdown. You must monitor these jobs manually.
9.9 Transactions and Menu Paths
ABAP Editor: SAP Menu • Tools • ABAP Workbench • Development ABAP
Editor (SE38)
Analysis of background processing: SAP Menu • Tools • CCMS • Jobs •
Check Environment (SM65)
Background control object monitor: SAP Menu • Tools • CCMS • Jobs •
Background Objects (SM61)
Create external operating system commands: SAP Menu • Tools • CCMS
• Configuration • External Commands (SM69)
Event maintenance: SAP Menu • Tools • CCMS • Jobs • Maintain Event
(SM62)
278 Background Processing
35. Index
A Archive Development Kit – see ADK
ABAP 501 Archive files transfer 331
ABAP Dictionary 501 Archive Information system 344
ABAP processor 35 ArchiveLink 501
Access method 307 ArchiveLink interface 327
local 308 Archiving object 328, 501
remote 310 structure 329
ACID 36, 501 ASAP 502
Action authorization 321 Authorization administrator 219
Action log 162 Authorization check 220
Activity group 227 Authorization object 221
Add-On Installation Tool 174 Authorization profile 223
Add-Ons 172, 174 Authorizations 211, 219, 221
Address maintenance 212 and authorization objects 221
ADK 327, 329, 501 information about 243
ADO 501 maintaining 235
AGate 25 Auto-reaction method 454, 462
Agents 447 central 466
installation 448
log analysis 460 B
SAPCCM4X 448 Background 258
SAPCCMSR 448 Background jobs
sapccmsr.ini, configuration file 460 analysis 266
SAPCM3X 448 API 266
SAPPCCM4X 466 definition 260
ALE 247, 248, 347, 354, 501 delete 277
background jobs 367 external interface 277
configuration 358 Job Wizard 266
coupling with BAPIs 358 processing steps 263
scenario design 355 runtime analysis 270
status monitor 365 status check 270
Alert Monitor 442, 501 zombies 270
analysis 459 Background process 35
Customizing 451, 460 Background processing 257, 502
ANSI 501 alerts 270
API 501 analysis functions 270
APPC 501 analysis tool 271
Application layer 23, 33 authorizations 274
Application Link Enabling – see ALE Backup Domain Controller 133
347 BAPI 347, 373, 502
Application server 23, 501 ALE 358
Archive administration 335 Batch 35
Archive administration, statistics 343 Batch input 369, 502
Archive configuration 334 Batch input session 369, 370
Index 511
36. Batch processes 35 Client import 201, 202
Batch processing 33 Client maintenance 68, 184
Batch service 35 Client transport 167, 186, 194
Batch work process 35 Client/Server Architecture 21
BDC 133 Client-specific objects 183
Best Practices 89 Cluster 40
Business Application Programming Cofile 166
Interface – see BAPI 347 Collective run modules 285
Business Connector 24, 26 Command field 32
Business Object Repository (BOR) 347 Command, external 265
Business object type 347 Communication system 134
Business Process Monitoring 90 Company address 213
Composite profile 223
C Composite role 235
Call transaction 373 Configuration
CATT 184, 502 three-layer 22
CCMS 502 two-layer 22
Central User Administration (see CUA) Consolidation route 138
247 Consolidation system 127, 128
Change and Transport System – see Control panel 398, 502
CTS 123 Copy profile 187
Change indicator 356 Copy profiles 194
Change request 151 Correction 161
assignment 155 Cost-based optimizer 430
display 155 CPI-C 41, 502
local change request 151 Cross-client objects 183
release 152 CTS 123, 502
transportable change request 151 components 123
Check indicators 229 Initialization 126
Client 179, 502 CUA 247, 252
changeability 182 configuration 249
create 180 deleting 250
delete 204 user administration 250
role 182 Customer message 80
standard 180 acknowledgement 81
Client administration 179 creating 81
special functions 203 Customer namespace 84, 160
Client comparison 204 Customer object 84
Client copy 118, 181, 186 Customizing 123, 147, 179, 502
copy profile 187 archiving 335, 336
copy profiles 194 Customizing Cross-System Viewer 184
database indices 206 Customizing Organizer 153
local 186, 188 Customizing request 151
postprocessing 203 assign 155
remote 186, 192 create 153
size of client 204 release 156
Client export 195
restart 206
512 Index
37. D Developer trace 419, 434
Data archiving 327, 502 Development class 160
basis customizing 338 temporary 160
CCMS-Monitoring 335 Device authorization 321
customizing 332 Device management 307
Document Relationship Browser DIAG interface 25
344 DIAG protocol 503
index 338 Dialog service 33, 35
procedure 330 Dialog step 36
reload 342 Dialog work process 503
Data archiving, archive information Direct input 371
system 344 Directory services 251
Data archiving, control and analysis Directory structure 43
339 disp+work 64
Data Browser 45, 68 Dispatcher 34, 503
Data classes 179 Distribution model 360
Data collector 446 DML 503
Data Dictionary Comparison 174 Document Relationship Browser 344
Data file 166 Domain link 135
Data profile 187 dpmon 61, 63, 413
Data transfer 369 Dump analysis 418
Data Transfer Workbench 374 Dynpro 503
database 502
Database administration 428 E
backup 430 EarlyWatch Alert 86
cost-based optimizer 430 eCATT 184
database fill level 431 EDI 503
dictionary consistency 431 End marks 170
verification 430 Enqueue 33
weekly planning 429 Enqueue server 36
Database copy 206 Enqueue service 36
Database fill level 431 Enqueue work process 424
Database instance 502 Enterprise IMG 148
Database interface 39 Export 161
Database layer 23 Extended table maintenance 68
Database log 424 External systems 134
Database server 503
DBA Planning Calendar 429 F
DCL 503 Fast input 373
DDL 503 Favorites list 31, 32
Deadlock 503 FDDI 503
Debugging 410 File system cleanup 435
DEFAULT.PFL 53 Filters 362
Delivery route 138 Firewall 503
Delivery system 128 Frontend
Desktop printer 307 installation 115
Developer registration 159 starting 57
Index 513
38. Front-end computer 503 Internet Application Component (IAC)
Frontend trace 421 25
Internet Communication Manager
G (ICM) 24, 26
Gateway 33 Internet Transaction Server (ITS) 24, 25
Gateway process 66 Internet users 242
Gateway service 37 IPC 505
Graphical editor 139 ITS 505
GUI 503
J
H Job class 261
Hardware key 407 Job definition 277
Hierarchical Storage Management Job log 268
System (HSM) 331 Job overview 268
High availability 503 Job scheduler, event controlled 258
Host name, length 119 Job scheduler, time controlled 258,
HSM 504 278
HTML 504 Job status 267
HTTP 504 Job Wizard 266
I L
IAC 242, 504 Language import 117
ICM Monitor 411 Language management 117, 120
ICM statistics 414 Law keys 150
ICM status 413 LDAP 251, 505
icmon 413 LDAP Connector 100
IDES 504 LDAP integration 100
IDoc 356, 504 Legacy System Migration Workbench –
delete 375 see LSMW
generate 356 License data 217
structure 357 License key 85, 119
IDoc type 356, 504 Lightweight Directory Access Protocol
IMG 147, 504 251
project 148 List editor 137
SAP Reference 147 Lists 67
Implementation Guide 147, 504 Load distribution 302, 399
Import 168, 170 Lock entries 424, 425
Import queue 169 Lock management 424
Industry Solutions 172, 174 Lock table 435
Installation check 116 Logical server 301
Instance 22, 23, 504 Logical systems 359
central 34 Logical systems, renaming 375
entering 392 Logical units of work 36
profile view 393 Logon data 213
Instance profile 55 Logon group 399, 403
InstGUI 101 Logon load balancing 399
Integration system 128 LSMW 373, 374
LUW 505, 506
514 Index
39. M Note Assistant 86, 92
Main memory size 52 Notes database 82
Maintenance jobs 275, 276
MAPI 505 O
Mass import 175 Object catalog 161
Mass printer 307 Object checking 176
MCOD 113, 505 Object class 222
MCOD system 24 Object editing 150
memlimits 391 Object key 159
Memory Management 44, 52 Object linking and enabling 42
Menu bar 30 Object lists 167
Message control 357 Object registration 159
Message server 33, 34, 36 OLE 505
Message server overview 407 OLTP 505
Message type 356, 362 OMS 315, 505
Microsoft Management Console external 315
(MMC) 49, 100 Online documentation, installation
Migration key 86 119
Missing indices 206 Online Service System – see OSS
MONI 426 Open SQL 39
Monitor attributes 455 Operating system 42
Monitor segment 445 user 45
Monitor set 442 Operating system data collector 446
creating customer-specific 451 Operation modes 379, 391, 505
Monitoring architecture 441 defining 391
alert monitor 442 maintaining 391
Monitoring attributes 444 overview 391, 396
Monitoring object 445 profile view 393
Monitoring tree element 444 time table 397
Monitors, creating customer-specific Optimizer 334, 430
451 statistics 334
MTE 444 OS 505
analysis method 454 OSS 77, 79, 80, 82, 84, 92, 505
auto-reaction method 454 Output management systems 315
data collection method 454 ROMS and LOMS 315
real and virtual 446 Output request 297
MTE classes 458 status 316
Multilingual features 32 Output service 36
Multiple Components on One
Database (MCOD) 113 P
Multiplexing 286 Packet 160
Multisystem landscape 129 PAI 505
Parameters, specifying 242
N Partner profiles 363
Name spaces 126 Password protection 218
Native SQL 39 PBO 506
New developments 159
Index 515
40. Performance monitoring 426 Q
buffers 427 QA approval procedure 141
database 428 Q-API 42, 506
operating system 428 Queue Application Programming
workload analysis 427 Interface 506
Performance trace 422, 424 Queue Application programming
Plug-ins 174 interface 42
Pool table 40 Quick Sizing Tool 95
Port 365, 506
Presentation layer 23, 27 R
Process number R/3 instance 23
at operating-system level (PID) 408 R/3 system
internal 408 configuration variations 22
Process overview 408, 410 distributed 24
global 411 hardware requirements 95
Process types 408 internet connection 24
Processes license administration 115
error log file 410 software requirements 97
reasons for holding 409 starting 49
semaphores 409 startup problems 69
start methods 409 stopping 57
status 408 R/3 transaction 36
Production printers 307 R/3 users 44
Profile changes R3setup 100, 101, 379
manual 402 control files 104, 119
Profile Generator 240, 506 postprocessing 114
Profile maintenance 379 RDBMS installation 108
Profile parameters 388 Templates 119
changing 402 R3trans 124, 143, 170
creating 389 RAID 99, 506
maintaining 388 Registration
Profiles 52, 211, 225, 506 developers and objects 84
activating 386 name spaces 84
basic maintenance 384 Regular tasks 432
changing administration data 384 Release 161
copying 383 Reload 342
evaluation 56 remote function call – see RFC
extended maintenance 385 Repair 161
importing 380 Request number 152
special case profile 402 Resource requirements, according to
Programs external 265, 266 release 97
Project creation 148 RFC 41, 348, 506
Project IMG 148 asynchronous 353
creating 148 group 352
Pushbutton 506 logical connections 353
monitoring 354
queued 354
516 Index
41. synchronous 353 SAP Reference IMG 147
transactional 353 SAP Service Manager 49
RFC destinations 348 SAP Service Marketplace 79, 80
connection types 350 developer registration 84
create 350 license key 85
RFC links 348, 349 migration key 86
Role 227, 506 searching for Notes 82
concept 220 support packages 86
creating 230 SAP Services 79
maintenance 227, 230 SAP system identifier 24
standard 230 SAP system trace 421
transporting 239 SAP transaction 506
Route permission table 75 SAPCCM4X 448
Router string 78 SAPCCMSR 448
RSBDCREO 276 SAPCM3X 448
RSBPCOLL 275 SAPconnect 252, 374
RSBPSTDE 275 sapevt 259
RSBTCDEL 275 SAPinst 100, 110, 379
RSCOLL00 275 control files 119
RSP00041 319 postprocessing 114
RSPARAM 389 sapinst.log 110
RSPFPAR 264 SAPLOGON 28, 100, 401
RSPO0041 276 front-end installation 115
RSRFCTRC 351 saplogon.ini 58
RSSNAPDL 276 SAPLPD 308
Runtime error 276 sapmsg.ini 58
analyzing 418 SAPNet R/3 Frontend 79, 80
SAPNet User 80
S saposcol 49, 50, 64, 426, 446, 448, 467
S user 80 in dialog mode 465
SAA standard 41 process monitoring 465
SAP APO 21 sappfpar 390
SAP BW 21 saproute.ini 58
SAP CRM 21 SAProuter 73, 74, 507
SAP DB 431 connections 75
SAP Gateway 41 options 76
SAP GUI 23, 27, 115 routing table 76
for HTML 25, 29 setting up a connection 77
for Java 29 sapstart 64
for Windows 29 Scheduler, background 258
SAP instance 504 Screen processor 35
SAP kernel 43 Security Audit Log 245
SAP license key 114 Self Service 89
SAP LUW 281 Semaphores 409
SAP objects, modify 159 Server 507
SAP operating system collector 49 Server overview 405
SAP proposals 227
Index 517
42. Service 33 Starting the R/3 system 49
enqueue 36 problems 69
gateway 37 startsap 50
output 36 Status 59
spool 36 Status bar 32
Service connections 82 Step 263
Service level reporting 91 Stopping an R/3 system 57
Session 28, 32, 507 stopsap 57
Shared memory 441, 507 Superuser 226
Short dump 276 Support Package 86, 172
SID 24, 507 Support package 507
Sizing 95 Support Package Manager 173
SMO 89 Support Tools 86
SMTP plug-in 374 System
SNA 24 external 134
SNC 217, 507 virtual 134
Software components 125 System Administration Assistant 433
Software download 86 System events 258
Solution Management Optimization System identifier 24
89 System infrastructure 507
Solution Management Roadmap 89 System landscape 123
Solution Manager 88 Multi- 129
SPAU modification adjustment 174 tasks 127
Specifying parameters 242 Three- 128
Spool 226 Two- 127
Spool administration 304, 316, 318 System log 66, 416
authorizations 321 analyzing 417
Spool process 36 filtering 463
Spool request 297 global 416
Overview 316 local 417
status 316 maintaining messages 464
Spool server 301 repairing a local 435
classification 302 selecting 416
definition 304 System messages 66
Spool service 33, 36, 300 System modifiability 124
Spool system reorganization 319 System monitoring 60, 90
Spool work process 299
request management 300 T
sequential processing 300 Table maintenance 67
SQL interface 35 extended 68
SQL trace 422, 423 tools 68
SSCR 507 Table types 40
Standard toolbar 30 Tables
Standard user 219 pool 40
Start profile 53 transparent 40
startdb.log 51 Task handler 35
TCP/IP protocol 41
518 Index