The security of data processed by SAP systems such as SAP ERP and SAP S/4HANA is vital as they contain significant amounts of business-critical information.
Latest Blogs
In this video from the SAP PRESS Book Club Q&A with Frank Finkbohner and Boris Rubarth, learn who should be involved in an SAP S/4HANA migration...
Let’s explore the architecture of SAP Data Intelligence.
In this post, let’s discuss the day-to-day tasks of an SAP HANA database administrator and how to get yourself started down that career path.
After you process an invoice, the next step is payment. Traditionally, paying suppliers has been challenging to automate.
After you’ve procured a Microsoft Azure subscription, the next step is to determine how you’ll connect Microsoft Azure to your SAP system and how...
Since I became an independent SAP consultant in 2008, I’ve encountered many times what’s become known as a “middle man.”
In this video from the SAP PRESS Book Club Q&A with Janet Salmon, learn just how many custom fields you can add to the Universal Journal.
This blog post describes the individual characteristics of the respective operating models of SAP S/4HANA in detail and compares how the...
Earlier this year I took part in the SAP PRESS Book Club webinar series, where I answered reader questions about ABAP development over the course of...
IAS 8 and FASB Statement No.131 have detailed guidance on which items of revenue and expense are included in segment reporting so that all companies...