Most Recent Content

Article icon
by Akash Kumar, Technical Consultant, SAP Labs | January 23, 2017
BI/SAP Professional Journal – 

Akash Kumar explains the benefits, design principles, and architecture of SAP BW/4HANA, and shows how to leverage them.


Article icon
BI – 

Taha M. Mahmoud shows how to use the security editor in the Information Design Tool to create security profiles. There are two main types of security profiles: data security and business security. Learn why you need to have a security matrix in place before implementing Universe security and get sample matrices to use as templates. Also, see a video demo about how to use the security editor to create different security profiles.


Video icon
BI – 
In this demo video, Taha M. Mahmoud shows how to use the security editor in the Information Design Tool to create different security profiles.

Article icon
by Alok Jaiswal, Consultant, Infosys Limited | January 5, 2017
SCM/BI – 
Alok Jaiswal explains how historical and forecasting data that resides in a planning area within the SAP Advanced Planning and Optimization (SAP APO) database can be extracted and saved in separate objects (InfoCubes). This feature not only can serve as a data backup but also can be used as a source for various reporting purposes. He also explains how the different steps involved in the extraction can be automated via a single process chain, making the entire process efficient.

Article icon
by George Chen, SAP Consultant, Lynk, Inc. | January 4, 2017
SAP Professional Journal/BI – 

Using SAP BusinessObjects Planning and Consolidation (BPC), version for NetWeaver, and an ABAP Business Add-In (BAdI), you can implement UJR_WRITE_BACK BADI, which is an enhancement spot designed for BPC. George Chen explains how to use this pre-process enhancement spot to insert your own logic to manipulate data. Inside this BAdI, you can call CL_UJO_WRITE_BACK to write back data to a different model. Further, if you have to work with a write-back that was implemented with CL_UJK_WRITE, see what problems you will face and find out how to resolve them. 


Article icon
by Taha M. Mahmoud, Senior BI Consultant | December 27, 2016
BI – 

Taha M. Mahmoud offers a comprehensive introduction to the enterprise security model in the SAP BusinessObjects BI platform. Learn about the main differences among the three different security levels in the SAP BusinessObjects BI platform 4.x: object-level, application-level, and Universe-level security. Find the right references to know more about each security level, and get two helpful security matrix templates to use for your own security implementation projects.


Quick tips icon
by Anurag Barua, Independent SAP Advisor | December 21, 2016
BI – 
Anurag Barua provides a technical and functional overview of SAP BusinessObjects Roambi to help you determine where it fits into your BI self-service strategy and BI analytics roadmap overall.