The security of data processed by SAP systems such as SAP ERP and SAP S/4HANA is vital as they contain significant amounts of business-critical information.
Latest Blogs
In SAP ERP HCM’s Ogranizational Management (SAP OM) module, an evaluation path can be defined as a chain of relationships between at least two object...
A recurring claim made by SAP is that we’re living in the midst of a “customer experience revolution.” I agree wholeheartedly.
You can integrate multiple business processes in SAP S/4HANA Sales. In this blog post, we’ll take a look at four SAP Quality Management (QM)...
Part of your SAP HANA security strategy should be granting objects explicit permissions to access only the data they should be accessing. One way you...
When building an application for users running an SAP solution, programming design principles dictate that you must keep the user in mind.
SAP Activate is a methodology businesses use to perform SAP S/4HANA implementations.
SAP provides a standard workflow for processing requests for change and the follow-on change documents that ultimately deploy the change depending...
Supply chain planners running solutions such as SAP Integrated Business Planning (SAP IBP) face different situations that contribute to the...
When speaking to customers, to be efficient and effective, your customer service agents need context—an idea dubbed the “customer 360° view.”
Sven Denecken, Jan Musil, Srivatsan Santhanam, and Bob Byrne, SAP employees and authors of our book SAP Activate: Project Management for SAP S/4HANA,...