Improving Security and Performance

[161 Matches Found]
Page 1 of 9         1 2 3 4 5 6 7 8 9      
Article icon
by Abhijit Ingale, SAP Analytics Technical Architect, Tata Consultancy Services November 13, 2017
BI/HR/SAP Professional Journal – 

Big Data technologies offer a huge opportunity to organizations to consolidate data from a variety of data sources and derive meaningful insights from it that can help in achieving business growth. With this opportunity, there are also challenges with respect to information security. Database technologies offer a variety of ways to implement information security. SAP HANA uses analytic authorizations to implement row-level security ensuring the information is consumed only by its rightful users. However, SAP HANA does not offer a column-level security feature out of the box. Abhijit Ingale describes the process to implement column-level security in SAP HANA.


Article icon
by Joerg Boeke, Independent BW Senior Consultant and Solution Architect November 6, 2017
BI/SAP Professional Journal – 

Joerg Boeke shows the SAP HANA parameter to self-protect the SAP HANA environment by using a safety belt for memory consumption using SAP HANA studio, Eclipse Studio, or even the SAP GUI.  He shows you how to set up SAP HANA parametrization to avoid queries or all other SAP HANA processes from using 100 percent of the available memory in a single process. Adopt the parameters to allow a maximum of your desired memory occupation by a single process.


Article icon
by Rehan Zaidi, Senior SAP Technical Consultant October 16, 2017
SAP Professional Journal/BI/HR – 

Rehan Zaidi describes the basics and advantages of the Integrated Data Access version of the ABAP List Viewer and the steps required to create simple reports using the standard classes provided for this purpose. See how to access the field catalog and functions and how to specify sort and grouping criteria for your report output.


Article icon
by Matt Vasey, SAP BI Lead Consultant, Enterprise Wide September 20, 2017
BI/SAP Professional Journal – 

Matt Vasey shows how to use native SAP HANA modelling techniques and enhancements to provide end users with a user-friendly, real-time variable selection process across massive amounts of data.


Article icon
by Akash Kumar, Technical Consultant, SAP Labs September 15, 2017
SAP Professional Journal/HR/SCM/BI/Financials – 

Akash Kumar explains the concept of blockchain and explores the services released by SAP Cloud Platform Blockchain service that allow users to develop blockchain scenarios.


Article icon
SAP Professional Journal/BI – 
Joerg Boeke shows how to speed up your SAP HANA calculation views by avoiding obsolete data at the database level. Learn about a dynamic method for reading data from any existing SAP HANA or SAP BW table, and gain insight into how to use SAP HANA data staging to speed up data loading and reporting. 

Article icon
SAP Professional Journal/BI/Financials/HR/SCM – 

Hernan Huwyler goes over the particular requirements for reviewing the user and database access in your SAP system to prepare for the new General Data Protection Regulation (GDPR) in the European Union. Controls should be reinforced on user and database rights to access tables with personal information. Documentation, validation, and coordination should also be more comprehensive. 


Article icon
by Ned Falk, Senior Education Consultant, SAP May 9, 2017
BI/SAP Professional Journal – 
Ned Falk shows how to implement value help and mapping of variables and input parameters in native SAP HANA modeling with just a bit of effort. Learn how these foundational concepts previously used in SAP BW can be used in SAP HANA to create calculation views.

Article icon
by Anurag Barua, Principal, TruQua Enterprises April 24, 2017
Financials/BI/HR – 

Anurag Barua provides an overview of SAP Data Quality Management software and its capabilities for detecting and correcting incorrect or incomplete and duplicate address data at the point of entry into your SAP ERP Central Component (ECC) system.


Article icon
by Taha M. Mahmoud, Senior BI Consultant March 21, 2017
BI – 
Taha M. Mahmoud shows how to implement security in the Universe using enterprise database security tables. He also provides a comparison between using enterprise database security tables or using the Information Design Tool security editor to help you to understand when and where to use each approach.

Article icon
by Michael Vavlitis, Program and Project Associate Manager, Accenture MCaaS (Mortgage and Compliance as-a-Service) March 15, 2017
BI/SAP Professional Journal – 

In the second of his series of three articles, Michael Vavlitis explains how to load data to an SAP BW on SAP HANA enterprise data warehouse system using SAP Data Services and SAP BW extractors.


Article icon
BI – 

Taha M. Mahmoud shows how to use the security editor in the Information Design Tool to create security profiles. There are two main types of security profiles: data security and business security. Learn why you need to have a security matrix in place before implementing Universe security and get sample matrices to use as templates. Also, see a video demo about how to use the security editor to create different security profiles.


Video icon
BI – 
In this demo video, Taha M. Mahmoud shows how to use the security editor in the Information Design Tool to create different security profiles.

Article icon
by George Chen, SAP Consultant, Lynk, Inc. January 4, 2017
SAP Professional Journal/BI – 

Using SAP BusinessObjects Planning and Consolidation (BPC), version for NetWeaver, and an ABAP Business Add-In (BAdI), you can implement UJR_WRITE_BACK BADI, which is an enhancement spot designed for BPC. George Chen explains how to use this pre-process enhancement spot to insert your own logic to manipulate data. Inside this BAdI, you can call CL_UJO_WRITE_BACK to write back data to a different model. Further, if you have to work with a write-back that was implemented with CL_UJK_WRITE, see what problems you will face and find out how to resolve them. 


Article icon
by Taha M. Mahmoud, Senior BI Consultant December 27, 2016
BI – 

Taha M. Mahmoud offers a comprehensive introduction to the enterprise security model in the SAP BusinessObjects BI platform. Learn about the main differences among the three different security levels in the SAP BusinessObjects BI platform 4.x: object-level, application-level, and Universe-level security. Find the right references to know more about each security level, and get two helpful security matrix templates to use for your own security implementation projects.


Article icon
by Dominik Schrank, Senior Consultant, SAP Deutschland SE & Co. KG December 6, 2016
SAP Professional Journal/BI – 
Dominik Schrank explains the key principles and facts in the design and implementation of a cloud application on SAP HANA Cloud Platform.

Article icon
by Ingo Hilgefort, Vice President of Product Management, Visual BI Solutions August 17, 2016
BI – 

Ingo Hilgefort briefly explains the latest updates to SAP BusinessObjects Design Studio 1.6 included in Support Package 02. He provides you with an overview of the recent updates to the product as well as its new roadmap.


Video icon
by Amit Satoor, Senior Director Product and Solution Marketing, SAP August 2, 2016
BI/SAP Professional Journal – 

Amit Satoor explains how SAP HANA Vora brings together real-time business context and operational results to empower the Big Data opportunities, both on-premise and in the cloud.


Article icon
by Anupam Gupta, EPM Practice Manager, The Principal Consulting | Vasi Venkatesan, Principal Consultant, SAP June 21, 2016
BI/SAP Professional Journal – 
Anupam Gupta and Vasi Venkatesan explain the concepts of SAP HANA Vora, its services’ architecture, and how SAP Vora works on Hadoop data. Leard details about how it integrates with Apache Spark, an in-memory processing engine also running on top of Hadoop.

Article icon
BI – 

Ned Falk discusses the integration between BusinessObjects Analysis, edition for Microsoft Office, and Design Studio features. Specifically, learn how to pass  two features, calculations and conditional formatting, into a Design Studio Application from the BusinessObjects Analysis, edition for Microsoft Office, reporting tool that built them.


Page 1 of 9         1 2 3 4 5 6 7 8 9