In my last post on this topic, I discussed several change pointer data forensic methods that I use to point me in the right cleanup direction. The change pointer data... read more →
Your batch job analysis shows that you are currently running the change pointer processing program RBDMIDOC, and the change pointer cleanup program RBDCPCLR; but you notice that the size of... read more →
So I have been working on a list of blog topics. I actually have an outline that is 3 pages long, but I am not going to blog on any... read more →
This is a continuation of Server Programming in JCo Part 1. In this post, I will deal with the setting up the constructs of the java program acting as the... read more →
GuiXT is a scripting environment that allows for the creation of huge macros in the SAP GUI environment. The HP testing product LoadRunner uses GuiXT to generate user load for... read more →
Last time, in my 50,000 foot view post, I presented an overview of the purpose, the location, and the expected lifecycle of change pointer records. I also briefly discussed two programs:... read more →
Fun with Encryption/Decryption Function Modules in Solution Manager White Paper Synopsis SAP function modules FIEB_PASSWORD_ENCRYPT and FIEB_PASSWORD_DECRYPT, built with import and export interface parameters that are based on... read more →
DataXstream has a long history with Meggitt Aircraft Braking Systems (ABS). Over 10 years ago, Dataxstream was contracted to connect a manufacturing control system to SAP during the initial go-live.... read more →
Learn how to increase visibility of your company's accounts receivables. Most SAP implementations do not provide good visibility into one of the most important assets that your company has, namely... read more →
Learn how to increase your Credit Department's value through automation and process improvement. Many companies are looking for answers to help them adapt to the current economic environment. Your customers... read more →