Programming | Featured article

Authentication Methods for Logging into SAP's Cloud Connector

In this blog post, you’ll learn how to log on to the cloud connector itself. Depending on the roles you have, you can access different functions in the cloud connector.

Latest Blogs


How to Build an SAP Cloud Application Programming Model Application

In this blog post, we’ll produce a simple SAP Cloud Application Programming Model application to familiarize you with the CDS server and SAP Cloud...


Primary and Secondary Costs in SAP S/4HANA

The efficiency and speed of the SAP HANA in-memory database allowed the introduction of the Universal Journal single line-item tables ACDOCA (actual)...


How to Migrate an SAP Web IDE Project to SAP Business Application Studio

In this video, learn how to migrate an SAP Web IDE project over to the new SAP Business Application Studio.


How to Install Docker on Windows, Mac, and Linux Systems

In this blog post, we’ll teach you how to install Docker on a Windows, Mac, or Linux system.


Exploring SAP S/4HANA Advanced Financial Closing (AFC)

The financial close process is a complex and critical process that requires a high level of expertise, attention to detail, and coordination across...


The Principle of Ajax in JavaScript

The name Ajax was first coined in 2005 by Jesse James Garrett in his essay "A New Approach to Web Applications." The idea is to use JavaScript for...


Finance Operations-Based Analytics in SAP S/4HANA

To get an overview of finance operations in accounts payable and accounts receivable in SAP S/4HANA Finance, let’s start with these two SAP Fiori...


A Look at Transportation Management and Its Functionality in SAP S/4HANA

Transportation management (TM) in SAP S/4HANA consists of business processes that drive the offering, selling, demand handling, assignment, planning,...


Unhandled Exceptions and Short Dumps in ABAP

Exceptions in ABAP can be handled using the TRY and CATCH statements. However, when an exception goes unhandled, a runtime error occurs and a short...


A Look at Zero Trust Security and Zero Trust Security Vendors

Over the past years, the rise in internal cyberattacks and network intrusions in organizations has become quite frequent.