Last time, in my 50,000 foot view post, I presented an overview of the purpose, the location, and the expected lifecycle of change pointer records. I also briefly discussed two programs:…
Fun with Encryption/Decryption Function Modules in Solution Manager White Paper Synopsis SAP function modules FIEB_PASSWORD_ENCRYPT and FIEB_PASSWORD_DECRYPT, built with import and export interface parameters that are based on…
by Steve Park PI/ABAP consultant Have you ever called a Web Service which is hosted by SAP SE just to get a generic return code that could mean anything? Do…
the SAP Java Connector, or JCo library, is an SAP delivered tool for connecting programs written in Java to the R/3. Most articles deal with external applications connecting to SAP…
As a consultant, I have the opportunity to work on many different SAP installations. I continue to be surprised by the discovery that many of these companies are not properly…
While working with a client on developing EDI-856 transactions with one of their trading partners, an error occurred that cost my client thousands of dollars in charge back fines. In…
The other day I ran into an issue with a test client missing transports in one of my clients QA systems. Upon reviewing the logs I determined that the entire…
My previous post discussed the "hidden" menu in the SAP PI message mapping tool that can only be unlocked by pressing <Ctrl> + <Shift> while right clicking in the data…
When I was young, one of my favorite Nintendo games was Contra by Konami Corporation (old-skool NES). Standard play with Contra afforded you with 3 lives. I was not particularly adept at Contra…