Most Recent Content

Article icon
by Noorul Q. Khan, Consultant, SAP India | May 20, 2016
Financials – 
Noorul Q. Khan explains how to complete asset migration with SAP S/4HANA Finance manually (using transaction code ABLDT) or automatically (using the Legacy System Migration Workbench [LSMW] or transaction code AS100). He also outlines some additional configuration steps that need to be completed and describes how to adopt the existing Business Application Programming Interface (BAPI).

Article icon
by Darrick Arora, Consultant, SAP FI/CO, Infosys Ltd. | May 17, 2016
Financials/SAP Professional Journal – 
Darrick Arora shares his experience in helping a client replace an old solution that it used for travel and expense management with Concur’s solution.

Video icon
Financials – 

In this video recording Jonathan Essig describes the sales, production, costing, and transfer pricing capabilities of SAP Business Planning and Consolidation.


Article icon
by Mehulkumar Patel , Senior System Engineer, Conagra Foods | May 12, 2016
Financials – 

Mehulkumar Patel shows you the general configuration steps to set up a connection between SAP ERP Central Component (ECC) and an SAP Landscape Transformation system and to set up a connection between the SAP Landscape Transformation system and SAP HANA. He explains how to start the initial load from ECC to SAP HANA through the SAP Landscape Transformation system. He also explains how to use SAP HANA accelerators and how to resolve issues related to them.


Video icon
Financials – 

Learn what SAP S/4HANA Finance is and how it is both functionally and technically different from previous SAP Financial applications.


Article icon
by Michael Kummer, President Americas, SECUDE | May 2, 2016
SAP Professional Journal/Financials/HR – 
Every day users extract potentially business-critical information SAP applications for the purpose of reporting, analytics, and collaboration. Access to data stored inside SAP applications is strictly regulated by roles and authorizations. However, data that can be viewed can typically be downloaded from SAP applications. Michael Kummer explains that once the data has left the secure boundaries of the SAP system, it is at risk of being exposed to loss and theft. This is an often-overlooked gap that is complicated by the fact that SAP security teams have limited control over data outside the SAP environment.

Article icon
by Kees van Westerop, Senior SAP Consultant, Kwest Consulting | April 22, 2016
Financials – 

In this article Kees van Westerop explains how to use report RFUMSV25 to automatically make the transfer posting for taxes on sales or purchases.