Most Recent Content

Article icon
by Shreekant W. Shiralkar, Global Head, SAP Analytics CoE, Tata Consultancy | Deepak Sawant , Leader of SAP BW Center of Excellence, Tata Consultancy Services Ltd. | Jyoti Jain, Associate at Tata Consultancy Services Ltd. | February 21, 2017
BI – 

Shreekant Shiralkar, Deepak Sawant, and Jyoti Jain explain the new SAP HANA Direct Access and SAP HANA Online connection options introduced with SAP BusinessObjects 4.2 to connect to SAP HANA views. Follow their step-by-step instructions for connecting BusinessObjects Web Intelligence documents to SAP HANA views.


Quick tips icon
by Shreekant W. Shiralkar, Global Head, SAP Analytics CoE, Tata Consultancy | Deepak Sawant , Leader of SAP BW Center of Excellence, Tata Consultancy Services Ltd. | Jyoti Jain, Associate at Tata Consultancy Services Ltd. | February 15, 2017
BI – 
Shreekant Shiralkar, Deepak Sawant, and Jyoti Jain devised a quick checklist to teach you SAP BW BEx Query design best practices and to help you build performance-optimized SAP BW BEx Queries. They also review the three SAP BusinessObjects connection types to help you decide which SAP BusinessObjects connection type is right for your scenario.

Article icon
by Ingo Hilgefort, Vice President of Product Management, Visual BI Solutions | February 7, 2017
BI – 

Ingo Hilgefort explains the SAP Lumira 1.30 and 1.31 updates. In addition, he provides a detailed step-by-step guide about the most important new features, and an overview of the recent updates to the product roadmap as well.


Article icon
by Akash Kumar, Technical Consultant, SAP Labs | January 23, 2017
BI/SAP Professional Journal – 

Akash Kumar explains the benefits, design principles, and architecture of SAP BW/4HANA, and shows how to leverage them.


Article icon
BI – 

Taha M. Mahmoud shows how to use the security editor in the Information Design Tool to create security profiles. There are two main types of security profiles: data security and business security. Learn why you need to have a security matrix in place before implementing Universe security and get sample matrices to use as templates. Also, see a video demo about how to use the security editor to create different security profiles.


Video icon
BI – 
In this demo video, Taha M. Mahmoud shows how to use the security editor in the Information Design Tool to create different security profiles.

Article icon
by Alok Jaiswal, Consultant, Infosys Limited | January 5, 2017
SCM/BI – 
Alok Jaiswal explains how historical and forecasting data that resides in a planning area within the SAP Advanced Planning and Optimization (SAP APO) database can be extracted and saved in separate objects (InfoCubes). This feature not only can serve as a data backup but also can be used as a source for various reporting purposes. He also explains how the different steps involved in the extraction can be automated via a single process chain, making the entire process efficient.