Show TOC

Knowledge ManagementLocate this document in the navigation structure

Use

Feature

Type of Change

Description

Configuration Framework

Changed

The configuration framework for Knowledge Management (KM) has been changed to use the Application Server Java (AS Java) Configuration Manager repository as the store for central configuration data. As a result, the Knowledge Management and Collaboration (KMC) configuration framework makes use of the AS Java locking mechanism and the AS Java cache management infrastructure.

For more information, see Knowledge Management Configuration .

Queued Update

Deleted

Queued update is not available.

Wizard-Based Basic Configuration for Knowledge Management (KM)

New

You can work through most of the KM basic configuration tasks automatically using the functional unit configuration tool.

For more information, see Wizard-Based Basic Configuration for Knowledge Management .

KMC Data Archiving

New

A KMC data archiving solution has been introduced. You can now remove KMC data that is no longer necessary from the KM repositories and store it in such a way that it is always accessible for reading, if necessary.

For more information, see Archiving Knowledge Management and Collaboration Data .

KM Resource Indexing with ACLs

New

A new query extender has been implemented. It allows you to improve performance when searching for KM resources.

For more information, see Activating KM Resource Indexing with ACLs .

File Extension and Size Filter

New

A new content filter has been implemented. Using the file extension and size filter you can restrict the upload of files to the KM repositories based on their extension and size. Thus, you can prevent the upload of resources with malicious content such as JavaScript in HTML files or macros.

For more information, see File Extension and Size Filter .

Malicious Script Filter

New

A new content filter has been implemented. The malicious script filter encodes executable scripts contained in the text of files when these files are uploaded to the KM repositories. For more information, see Malicious Script Filter .

Specifying the Maximum Number of Users

New

You can specify the maximum number of users who can be assigned to a single subscription or to a single step in the approval workflow. Thus, you can limit the number of assigned users according to your requirements.

For more information, see Subscription Service and State Management Service .

Subject Line for Subscription Notifications and Approval Workflow Mails

New

The KM component generates various e-mail notifications associated with certain events. KM applications and services use the notificator service to create and send notifications to users. Now, the notificator service has been enhanced and a customizable subject line for subscription notifications and approval workflow mails has been implemented. It enables users who have write permissions for the /etc repository to customize the subject line for subscription notifications and approval workflow mails generated in KM.

For more information, see Notificator Service .

JCIFS Implementation

Changed

A new version of JCIFS has been implemented. With the new implementation the system uses version 1.2.24.

For more information, see Network Paths .

WsActionInboxConnector

New

A new Universal Worklist connector has been implemented. You can use it in a federated portal network to provide the KM recent notifications in the Universal Worklist (UWL) of the consumer system under Notifications , the checked-out documents under Tracking , and the documents for approval under Tasks . The notifications, tracking, and tasks are taken from the provider system.

Note

We recommend that you use this connector only in a federated portal network (FPN).

For more information, see Configuring the WsActionInboxConnector .

Deactivating Repositories

New

You can now cease the automatic retries to start the failed repository managers.

For more information, see Deactivating Repositories if Not Available .

Light CM Repository Manager

New

A new internal repository manager has been implemented. The Light CM repository manager is a lightweight CM repository that offers a subset of the CM repository functionality with improved performance.

For more information, see Light CM Repository Manager .

Disc-Optimized Versioning Mode

New

A new versioning mode has been implemented. You can now set up the CM repositories in disc-optimized versioning mode. This versioning mode reduces the disc space utilization.

For more information, see CM Repository Manager .

Layout Controllers

Enhanced

The standard KM delivery has been enhanced with a new layout controller that uses three screen areas with flavors.

For more information, see Layout Controllers .

Activity Reporting

New

You can use activity reporting to record activities in KM repositories.

For more information, see Activity Reporting .

Lotus Notes Repository Manager

Changed

The manufacturer has taken Lotus Domino Server in Version 5.x out of maintenance, therefore the toolkit required (Lotus Domino Toolkit for JAVA/CORBA Release 5.0.8) is no longer available from the manufacturer. As a consequence, the Lotus Notes Repository Manager in the standard system can no longer be used in new projects.

Client-Side Caching of Static Objects

New

You can use the client cache service to cache static resources such as graphics or stylesheets in the browser cache of the client PC.

For more information, see Client-Side Caching of Static Objects .

Alternative Details Dialog Box

New

You can use a different Details dialog box than the dialog box set by default. No menu bar is displayed in the alternative Details dialog box. There are pushbuttons that allow you to quickly call up frequently used functions. To use the alternative Details dialog box, you have to enter the command that renders the link to it on the user interface into the configuration.

For more information, see Alternative Details Dialog Box .

Secure (Simplified) HTML Editor

New

The secure (simplified) HTML editor allows you to deactivate security-relevant editing functions, for example, inserting HTML text.

For more information, see HTML Editor .

Feature

Type of Change

Description

Overwrite Data Import Mode

New

A new import mode has been introduced. Now, you have the option to overwrite already transported data directly in the target system, without losing documents that have already been created.

For more information, see Transporting KM Content .

Automated Import of Transport Packages

New

You can enable scheduling and automate the import of pending KM transport packages.

For more information, see Automating the Import of Pending Transport Packages .

Transport of KM Content

Enhanced

The scope of transported data has been extended. For more information, see Transporting KM Content .

Transport of Layout Sets

Enhanced

You can now use the enhanced CTS to transport layout sets without locking the entire configuration framework

For more information, see Exporting and Importing Layout Sets .

Transport of KM Configuration Data

Enhanced

You can now check whether you need to restart the application server after the import of configuration data.

For more information, see Transporting Configuration Data .

Feature

Type of Change

Description

Folder Size Risk Analysis

New

A report that analyzes the size of each folder and displays a list of selected folders and files based on the specified parameters has been implemented.

For more information, see Analyzing Folder Size Risk .

File with List of Users Parameter

New

The user resources, deleted user cleanup, cleaning up subscriptions, notification cleanup and approval maintenance reports have been enhanced with a new parameter that provides these reports with the option to read the list of users directly from a plain text file. Now, instead of entering the users one by one, you can specify the location of the plain text file that contains a list of users.

Replacement of Invalid Room Owners

New

A report that finds and replaces the deleted room owners has been implemented.

For more information, see Replacing Invalid Room Owners .

Room Event Cleanup

New

A report that deletes all room events older than a specified period of time has been implemented.

For more information, see Deleting Old Room Events .

Rooms Per User

New

A report that searches for rooms in which a valid user participates has been implemented.

For more information, see Checking the Number of Rooms per User .

Room Risk Analysis

New

A report that displays and analyzes room statistics information has been implemented. You can search for rooms by the number of members, the size of documents and attachments contained in the room and the availability of locked documents.

For more information, see Analyzing Room Statistics Information .

Deleted User Cleanup

New

A report that scans for inconsistencies associated with deleted users has been implemented.

For more information, see Deleted User Cleanup .

Folder Settings

New

A report for checking the folder settings has been implemented.

For more information, see Checking the Folder Settings .

E-Mail Attachment Cleanup

New

A report that finds and deletes the temporary folders with e-mail attachments uploaded or added before a specified number of hours has been implemented.

For more information, see Deleting the Temporary Folders with E-mail Attachments .

Notification Cleanup

New

A report that deletes KM notifications associated with a specific user from the Universal Worklist has been implemented.

For more information, see Deleting Notifications .

Copy

New

A report that copies items from one KM repository to another has been implemented. For example, you can mass copy data from a file-system repository to a CM repository.

For more information, see Copy .

Cache Administration

New

A report that monitors the caches for all cluster nodes for a specified time interval has been implemented.

For more information, see Cluster-Wide Analysis of the Cache Load .

Subscription Administration

New

A report that finds and manages subscriptions owned by a certain user or a list of users has been implemented.

For more information, see Managing Subscriptions .

Malicious Script Handler

New

A report that finds all resources containing executable scripts according to a specified scope in the KM repositories has been implemented. The report can optionally encode or decode the content of the resources.

For more information, see Encoding and Decoding Executable Scripts .

Feature

Type of Change

Description

ACL Web Service

New

A new Web service for ACLs has been introduced. The Web service supports methods for the remote access to the KM ACLs functionality.

For more information, see ACL Web Service .

API Changes

Changed

Some of the KM APIs have been changed.

For more information, see SAP Note 1372388 Information published on SAP site.

Feature

Type of Change

Description

Multiple File Upload

New

You can now upload several files to a KM folder simultaneously.

For more information, see Uploading Multiple Files to KM Folders .

Inheritance of Folder Properties for Time-Dependent Publishing

New

You can now propagate the time-dependent publishing settings to subfolders.

For more information, see Setting Up Time-Dependent Publishing .

Inheritance of Folder Properties for Approval

New

You can propagate the approval settings of a folder to its subfolders.

For more information, see Setting Up Publishing with an Approval Process .