Shared lock (s lock ):If transaction t adds a shared lock to data a, other transactions can only add a shared lock to data a, but cannot apply an exclusive lock until all shared locks are released. Transactions authorized to share locks can only read data and cannot modify data.Exclusive lock (x lock ):If transaction t adds an exclusive lock to data a, other transactions cannot add any type of lock to aunti
--
Get ledger mapping ID
Begin
Select
Coa_mapping_id
Into
Vl_mapping_id
From
Gl_coa_mappings
Where
Name
=
Vgc_mapping_name
And
Rownum
=
1
;
End
;
--
Clear temp table
Begin
Delete
Gl_accts_map_int_gt;
End
;
--
Insert R12 CCID
Begin
Insert
Into
Gl_accts_map_int_gt(From_ccid, coa_mapping_id)
Values
(Pi_ccid, vl_mapping_id );
End
;
--
Call API
Gl_
AR View those documents (Transaciton, receipt, etc.) have not yet created the use of accounting entries: Subledger Period close exceptions
The AP is used: Period close exceptions the statement (XML), Subledger Period Close exceptions (this very detailed)
Subledger Period Close Exceptions style:
Journal Category
Receipts
Event Class
Receipt
Event Date
Event Type
Transaction Number
Status
Customer Name
Customer Number
Receipt Number
[translation]next-ledger-architecture-proposal
Original: Https://github.com/hyperledger/fabric/blob/master/proposals/r1/Next-Ledger-Architecture-Proposal.md
Translation: Sycamore Tree
Draft / in progress
This document is a proposal for a future ledger architecture based on community feedback. All inputs are the goal of community efforts. Catalogue
ObjectiveApiPo
This is a creation in
Article, where the information may have evolved or changed.
Summary
The Super Ledger (Hyperledger) is one of many projects under the Linux Foundation. The blockchain project, introduced in 2015 by IBM, Interlaken, and the financial companies, GP Morgan and other joint agencies, also includes 5 framework projects: Sawtooth, Iroha, Fabric, Burrow, Indy, and 3 tool projects: Blockchain Explorer, cello, Composer. One of the most wide
Optimistic locks and pessimistic locks, optimistic locks pessimistic locks
Locking)
This concept has been touched upon when we learned multithreading. In fact, the lock here and the concurrent lock processing in multithreading are a truth. They all violently classify resources as their own. Here, we use
Configure "Special General Ledger Sign" in SAP fi SGLcreated: October 6, 2018 (Saturday) 3:42 | Category: Uncategorized | words: 396 |Configure "Special General Ledger Sign" in SAP fi SGLNovember 11, 2013 08:42:44 and all-in-one reading: 17387 Tags: SAP SGL special general Ledger ID billing code more Personal Category: Sap-fiIn SAP, the special G/L account is a
This is a creation in
Article, where the information may have evolved or changed.
HyperLedger Fabcar Study notes (writing the first app based on the Super Ledger)
Translated from: Http://hyperledger-fabric.rea ...
Writing the first application
We need to implement the following three steps
First set up a development environment
Learn some simple parameters of the smart contract that our app will use
Develop an app to update queries for a
This is a creation in
Article, where the information may have evolved or changed.
HyperLedger Fabcar Study notes (writing the first app based on the Super Ledger)
Translated from: Http://hyperledger-fabric.rea ...
Writing the first application
We need to implement the following three steps
First set up a development environment
Learn some simple parameters of the smart contract that our app will use
Develop an app to update queries for a
1. ledger
Ledger is the core of the company's financial records, and everything must go through this process.
Main ledger: The main ledger defined by 4C for record storage
Kochi
Calendar
Currency
Subcategory endurance accounting method
Auxiliary classification endurance: Used to assist multinational companies in comp
(stub, args) ; } }The 1th I would like to point out is that Abstractchaincode is a subclass of Chaincodebase, which comes from the shim client of the structure ( lines 7th, 10 ).The第17-19 line shows the methods that need to be implemented in the Chaincodelog class (subclasses of Abstractchaincode), which are used to implement initialization, ledger querying, and logging functions, respectively.The第22-36 line shows the run () method of the Chaincodeb
First, a hierarchical relationship between the legal entity and the ledger in EBS and the OU is shown below:
Among them, for the ledger and legal entity, is not simple is a one-to-many relationship, in theory: Because of the ledger ledger subsidiary ledger, so a legal enti
Update lost: New changes to overwrite first, the development of three ways to solve
1, raise the transaction level to the highest level transaction_serializable
Both sides of the operation should raise the level; The query uses the shared lock; updates use the update lock; one query, one update, the shared lock and the update lock conflict; When both sides update the lock and a deadlock occurs, the program automatically rolls back one side of the operation to avoid the loss of the update
2, p
This article will show you how to use the blockchain network through the Super Ledger Fabric network. One of the most common aspects is that applications on the blockchain network allow users to query the ledger (ledger), get specific records contained in the ledger, or update the
2014-07-12 baoxinjian
I. Summary
R12 use MOAC to set operation unit access permissions for restricted duties
In the general ledger, you need to set the data access permission to set the access permission of the ledger with limited responsibilities.
(1) specific steps to set the access permission for Operation Unit
1. Create a security profile)
2. Run the concurrent program security list maintenance
3. Set
First, there is a hierarchical relationship between the legal entity, ledger, and OU in EBS, for example:
Among them, the relationship between the Ledger and the legal entity is not simply one-to-many. In theory, because the Ledger has a secondary Ledger, a legal entity corresponds to one Primary
Page Level: Engine BDB.Table-level: Engine MyISAM, which is interpreted as locking the entire table and reading at the same time.Row-level: Engine INNODB, locking a single row of records
At the table level, the entire table is locked directly. During the lock period, other processes cannot perform write operations on the table. If you are writing a lock, other processes are not allowed to read it.Row-level, which only locks specified records, so that
Steps for user business operations:
1. Create a "prepayment" invoice:cwy1501111 in January to validate Invoice and create ledger accounts;
2. Create "invoice:cws1502036" in February to validate Invoice and create ledger accounts;
3. Use "Advance Payment" Invoice CWY1501111 to sell nuclear "quasi-standard" Invoice CWS1502036;
4. "Quasi-standard" Invoice CWS1502036 need to be validated.
5. "Quasi-standar
In computer science, a lock is a synchronization mechanism used to forcibly restrict access to resources in the execution of multiple threads, which is used to guarantee the satisfaction of mutex requirements in concurrency control.
In the DBMS, database locks can be divided into row-level locks (InnoDB engines), table-level locks (MyISAM engines), and page-leve
MySQL row-level lock, table-level lock, page-level lock details page-level: engine BDB.
Table-level: engine MyISAM, which is interpreted as locking the entire table and reading at the same time.
Row-level: engine INNODB, locking a single row of records
At the table level, the entire table is locked directly. during the lock period, other processes cannot perform write operations on the table. If you are writing a lock, other processes are not allowed to read it.Row-level, which only
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.