Programming | Featured article

Authentication Methods for Logging into SAP's Cloud Connector

In this blog post, you’ll learn how to log on to the cloud connector itself. Depending on the roles you have, you can access different functions in the cloud connector.

Latest Blogs

FICO

SAP S/4HANA Implementation Best Practices

Implementing an SAP S/4HANA system can be a transformative journey for any organization—and for those moving from SAP ERP, it’s a necessary step to...

Programming

How to Create Link-Sensitive Graphics Like Image Maps with HTML

Link-sensitive graphics (also called image maps) are just links embedded within a graphic. Such an image map defined in HTML consists of three parts.

Logistics

Master Data Settings for PP/DS in SAP S/4HANA

In embedded PP/DS with SAP S/4HANA, for master data specific to PP/DS, it’s possible to maintain the configuration settings that can be used by the...

Business Intelligence

Prompting with Variants in SAP Analysis for Microsoft Office

Once you’ve defined the values for a prompt in SAP Analysis for Microsoft Office, you can save these values as a variant, as shown in this figure.

Logistics

SAP Best Practices for Embedded EWM

SAP Best Practices for SAP S/4HANA have been made available to allow for quick implementation of core standard based organizational structures and...

Programming

Advanced CDS Functionality for ABAP Development

You may run into a scenario where requirements placed on your CDS data model are very difficult or impossible to meet with basic CDS functionality.

Programming

How DevOps Improves Your SAP Application Development

DevOps is a software deployment methodology that incorporates best practices, automation tools, and a culture of collaboration and transparency to...

Administration

What Are the Differences Between SAP S/4HANA and SAP S/4HANA Cloud?

When talking about SAP S/4HANA, there is a cloud version, an on-premise version—even industry-specific implementations. There’s a new offering called...

Administration

Securing Linux Using 2FA with Google Authenticator

In this blog post, we’ll show you how you can implement two-factor authentication for SSH on a Linux system.

Programming

How to Leverage SAP BTP as an Enterprise Architect

Enterprise architecture has often been described as a city map of the IT landscape for the customer.