Most Recent Content

Article icon
by Volker Stiehl, Chief Product Expert, SAP SE | May 23, 2016
SAP Professional Journal – 
Volker Stiehl explains how to use SAP HANA Cloud Integration (SAP HCI) for modeling the time-based activation of integration flows. Also see how to call an external web service by means of the Simple Object Access Protocol (SOAP) adapter. The use of namespace mappings clarifies how to work with several web services in one integration flow at the same time.

Article icon
by Darrick Arora, Consultant, SAP FI/CO, Infosys Ltd. | May 17, 2016
Financials/SAP Professional Journal – 
Darrick Arora shares his experience in helping a client replace an old solution that it used for travel and expense management with Concur’s solution.

Video icon
by Jonathan Haun, Director, Data and Analytics, Protiviti | May 13, 2016
SAP Professional Journal – 
Jonathan Haun explains how SAP HANA’s security mechanism works and gives expert recommendations on how to implement and maintain the best security models for your SAP HANA system.

Article icon
by Vessy Panayotova, Solution Manager Technical Analyst, Employment and Social Development Department, Government of Canada | May 10, 2016
SAP Professional Journal – 

Vessy Panayotova shares her experience with streamlining the release management process by using a little-known, out-of-the-box Change Request Management (ChaRM) functionality that requires very little customizing. The main benefits are a clear auditing trace and ease of release planning.


Article icon
by Michael Kummer, President Americas, SECUDE | May 2, 2016
SAP Professional Journal/Financials/HR – 
Every day users extract potentially business-critical information SAP applications for the purpose of reporting, analytics, and collaboration. Access to data stored inside SAP applications is strictly regulated by roles and authorizations. However, data that can be viewed can typically be downloaded from SAP applications. Michael Kummer explains that once the data has left the secure boundaries of the SAP system, it is at risk of being exposed to loss and theft. This is an often-overlooked gap that is complicated by the fact that SAP security teams have limited control over data outside the SAP environment.

Article icon
by Ned Falk, Senior Education Consultant, SAP | April 26, 2016
BI/SAP Professional Journal – 

Ned Falk explores the newest InfoProviders for SAP BW running on SAP HANA. Gain an overview of the transition in the modeling of InfoProviders from SAP BW running on traditional disk-based databases to SAP BW on SAP HANA.


Quick tips icon
BI/SAP Professional Journal – 

Chris Savelli shows three ways for executing the analysis of custom ABAP code when migrating an SAP BW application to an SAP HANA database, and how to quickly pinpoint potential issues and find solutions to remediate them.