Achieve Day 2 Operational Excellence and Safeguard your SAP Landscape

500 results

  1. Managing Data with SAP Data Replication and Transformation Tools

    Data and solution integration is becoming one of the most important aspects in enterprise architecture. Learn about the functionalities provided by SAP data replication and transformation solutions and their proper use. Key Concept Modern business solutions often run in a complex enterprise landscape that requires extensive use of data replication and transformation functionality. Tools such…...…
  2. Decentralized WM Takes the Pain Out of Dealing with Stock in Multiple SAP ERP Systems

    Reading time: 12 mins

    Learn how to set up Decentralized Warehouse Management (DWM) for one warehouse under multiple SAP ERP systems. DWM is a fully integrated, cost-effective, flexible solution for connecting applications that perform warehouse management activities to applications that perform SAP ERP processes. Key Concept Application Link Enabling (ALE) is a middleware tool that connects different applications on…...…
  3. Digitalization Is the Key to SAP Modernization

    Business leaders are no doubt excited about the opportunities presented by a move to the cloud. However, many will still have reservations about such an involved overhaul. They may wonder what will become of their data and processes and have security concerns regarding their SAP landscapes. In this article, you will learn how the key…
  4. Bulletproof Your SAP Implementations and Legacy-to-SAP Conversions

    Find out the pitfalls that occur most often when converting from a non-SAP legacy system to an SAP system. Then discover best practices to help you avoid these pitfalls and see how you can apply them to your project. Key Concept Project success can be defined as providing a well-developed system near its due date…...…
  5. Select and Transfer a Time Slice of Data for Testing with SAP Test Data Migration Server 3.0

    The new SAP Test Data Migration Server (TDMS) is an automated solution for creating test systems that can be a real alternative to full-system copies. It can pare down the size of your test system in a variety of ways, the most popular of which is to copy only a time slice of your production…...…
  6. Take a Serious Look at the “A” in SOA and Gain Flexible, Adaptable Architecture

    Understand what the ideal architecture for an enterprise-ready composite application should look like. Discover the pitfalls involved, how to avoid them, and how your decisions influence the overall complexity of the final application. By following these recommendations, you can develop applications that are well prepared for your always-changing IT landscape. Key Concept The basic idea…...…
  7. Securing and Governing Data at Rest

    Data at rest is a high-value target for hackers. It is a source of people, banking, product, and intellectual property information that is highly valuable for resale or creating counterfeit products. It includes quality assurance systems, development environments, client copies, disaster recovery sites, archives, and online backups. In this article, SAPinsider cybersecurity expert Julie Hallet…
  8. What You Need to Know About SAP xMII to Enable Adaptive Manufacturing

    Learn about SAP xApp Manufacturing Integration and Intelligence (xMII) and see how you can use it to improve your manufacturing processes. Through several real-world examples, see how xMII helps your operation monitoring and control, quality management, and manufacturing synchronization. Then, take a look at the technology behind xMII. Key Concept SAP xApp Manufacturing Integration and…...…
  9. How to Prepare for a Comprehensive System Audit and Technical Review of SAP Access Control 10.0

    Learn invaluable tricks and tips for overcoming top auditing issues specific to an SAP Access Control 10.0 system. Key Concept A system audit is an exercise performed to gain assurance that defined controls work as intended, thereby eliminating the likelihood of fraudulent or malicious activities in the enterprise system. It involves the verification of conformance…...…
  10. Implement a Compliant Identity Management Solution for Effective Provisioning, Reporting, and Role Management

    Learn how to achieve efficient, compliant, and secure management of user accounts and identities with SAP NetWeaver Identity Management (SAP NetWeaver IDM). Step through an overview of SAP NetWeaver IDM, including the product’s architecture and integration capabilities. Key Concept SAP NetWeaver Identity Management (SAP NetWeaver IDM) provides provisioning capabilities for SAP and third-party applications. You…...…