SAP will provide an hotfix but for now you can solve the problem with a workaround: 1) First of all create a new custom BO with an action modeled as following The bo will receive the email request and will create the email instance. 2) Create the webservice based on the modeled BO,...
We want to make it as easy as possible for this person to learn more about us and get in contact if they want. I always recommend that you include the following right at the top of your cover letter: Email Address –Make sure it's simple and professional. 76% of applications are reje...
In July 2022, Mailgun and other companies in the digital communications space became the targets of a large-scalephishing attack. Some specific types of phishing attacks include: 1. Login scams Login scams try to trick you into “proving” you’re you. These email scams often declare that yo...
I would like to post the procedure to create the correct SSL for your mobile devices: - Android SAP Business One App 1.2.0 - iOS SAP Business One App 1.11.1 Use the IP Address instead using the hostname Once you install OpenSSL run the above command lines You can find the keystorepass...
Summary I know this is one of the many favorite topics for an SAP BI/BW developer, and can be the source of some confusion on how to accomplish. I have been a part of
In the SAP HANA Vora 1.3 series' next tutorial Bob shows how to connect to the AWS Linux Node using SSH from Terminal. Bob then details how to prepare the instance for the installation of Ambari, Hadoop and SAP HANA Vora. If you want to connect to your ...
Now we can use the Invoke web service to call a post method that will create our new item. You can see in the custom headers section where we utilized the output of the authentication call to pass our bearer token. Additional information on how to generate the Request body when working wi...
Later, this can be used against you in a dox attack, as well as in other types of scams. The more information channels we add across devices, the more opportunities there are for that data to be compromised. Healthy data practices can reduce your risk of being targeted for scams. Botnets...
So how can we send test messages also directly to the Adapter Engine Messaging System? How can we send a message to "any arbitrary Integrated Configuration" as if this ICO would be triggered by it's configured sender channel?There are a lot of threads on SCN claiming that this is not ...
Now , in your java program, user the username and password from above to connect using JDBC. Please make sure that you have added the ngdbc.jar in the CLASSPATH of your java program. ngdbc.jar has the SAP HANA JDBC driver and is available as part of the Hana client in the following ...