Featured | Featured article

Vulnerabilities, Threats, and Risks to SAP Applications: A Primer

Vulnerabilities, threats, and risks in SAP applications are some of the most important concepts in the domain of SAP cybersecurity because they are used to build any cybersecurity program.

Latest Blog Posts

FICO

How to Generate and Print Documents in SAP Business One

In this blog post, learn how to generate batches of documents and print them in the SAP Business One solution.

Administration

What Is SAP Digital Boardroom?

SAP Digital Boardroom is integrated into SAP Analytics Cloud as an add-on and extends it by adding another presentation layer.

Featured

Happy Anniversary! 20 Years of SAP PRESS America

May I invite you to join me on a journey back through time?

Administration

First Steps in SAP S/4HANA: How to Add and Remove SAP Fiori Apps

In this video, learn the steps to follow to add and remove SAP Fiori apps in an SAP S/4HANA system.

Logistics

What Is SAP IBP?

Technology has truly changed how we interact, engage, communicate, buy, sell, coordinate, and collaborate with different business entities.

FICO

Revenue Accounting and Reporting with SAP S/4HANA

Let’s explore how revenue accounting and reporting works in SAP S/4HANA.

Programming

The 5 Pillars of SAP Business Technology Platform (SAP BTP)

SAP Business Technology Platform (SAP BTP) takes SAP’s products, services, and solutions, and puts them under one roof. 

Business Intelligence

SAP Data Intelligence Architecture

Let’s explore the architecture of SAP Data Intelligence.

Administration

What Is it Like Being an SAP HANA Database Administrator?

In this post, let’s discuss the day-to-day tasks of an SAP HANA database administrator and how to get yourself started down that career path.

Administration

How to Connect SAP HANA to and Configure a Network on Microsoft Azure

After you’ve procured a Microsoft Azure subscription, the next step is to determine how you’ll connect Microsoft Azure to your SAP system and how...