Featured | Featured article

Vulnerabilities, Threats, and Risks to SAP Applications: A Primer

Vulnerabilities, threats, and risks in SAP applications are some of the most important concepts in the domain of SAP cybersecurity because they are used to build any cybersecurity program.

Latest Blog Posts

FICO

6 Simplifications of Period-End Close with SAP S/4HANA Finance

Let’s discuss how period-end close has been heavily simplified by SAP S/4HANA Finance. First we’ll look at how a period-end schedule could look in...

Programming

What Is Legacy Code and Why Is it Bad?

If you ask ten different people what legacy code means, you’ll get ten different answers. Let’s start by looking at what legacy code is not:

Logistics

How to Configure Contracts in SAP S/4HANA Sourcing and Procurement

To realize the features and functionalities of contract management, the system needs to be configured based on business requirements. This post...

Business Intelligence

Core Features and Benefits of SAP Analytics Cloud for Planning

Whether you’re planning to distribute your funds for R&D, trying to improve or forecast sales, or simply reallocating your market spend, SAP...

Administration

Paths to Microsoft Azure for SAP Customers

If you were moving to a new house, it’s likely that you’d review what’s important to take with you versus what can be donated, tossed, or left...

Administration

SAP Project Release Planning with SAP Activate

This blog post will help you understand release planning in the Scrum frameworkand advance your knowledge of how to plan iterative releases, testing...

Programming

ABAP in the Cloud: Getting to Know SAP BTP, ABAP Environment

SAP Business Technology Platform (SAP BTP) serves as a foundation for SAP’s cloud-based solutions. Through SAP BTP, SAP can deliver services to help...

Programming

How to Create and Maintain SAP Fiori Themes in the SAP Fiori Launchpad

A common requirement posed to developers is to modify the SAP Fiori launchpad and the SAP Fiori apps with the corporate theme of the customers, for...

FICO

Emergency Access Management with SAP GRC

The Emergency Access Management (EAM) component of SAP Governance, Risk, and Compliance (SAP GRC) provides the technical foundation to administer and...

Business Intelligence

SAP BW/4HANA Process Chain Operations

Once the first data flows have been developed, they can be used in a productive operation, while the remaining developments and maintenance work...