How to enable Basic Authentication for Cloud Integration on SAP Cloud Foundry

This blog describes how to set up inbound communication using Basic Authentication when using SAP Cloud Integration in the Cloud Foundry environment, as this...
Technology

SAP HCM transition strategies (Part 1)

SAP offers two solutions for SAP Human Capital Management (SAP HCM): SAP HCM for S/4HANA and SuccessFactors (Cloud). In this blog (part 1), I will share my...
News

Prepare for Planning with SAP Data Warehouse Cloud & Analytics Cloud

A few weeks ago SAP introduced the bi-directional integration between SAP Data Warehouse Cloud (DWC) and SAP Analytics Cloud (SAC). This feature, currently...
News

SAP Planning in the Cloud - Stand-alone or Live Connection

SAP Analytics Cloud has been the strategic choice for planning within SAP's portfolio for several years now. Based on our experience working with both the...
Technology

Growing IT organically: how Ecotone migrated its BI environment to SAP BW/4HANA

Earlier this year, Ecotone finalised its journey towards SAP BW/4HANA...
Technology

Master data attribute recommendation using SAP AI Core and T5 transformers

Master data maintenance is a time-consuming activity for many businesses. Companies like retailers selling large amounts of different articles or...
Technology

Balancing cost and performance with SAP HANA Data Tiering

SAP HANA is an in-memory database and is only supported on certified hardware. By requiring certified hardware, SAP is making sure that core-to-memory ratio...
Technology

SAP Data Warehouse Cloud

SAP Data Warehouse Cloud is SAP’s next generation, Cloud-based data warehouse solution. It is part of Walldorf’s HANA Cloud Services triumvirate, together...
News

The switch to Daylight Saving Time in SAP

For most humans, the switch to Daylight Saving Time (27th of March at 02:00 in the morning) just means one hour less sleep. But for software applications,...
Technology

App development with the No-code platform AppGyver

In this year’s SAP TechEd (2021), a lot of topics were about the Business Application Studio (BAS) and how to accelerate application development with...
News

Are you ready for the Euro conversion in Croatia?

Now that 2022 already has started, I have written a blog about the Euro conversion in Croatia. January 1st 2023 is an extremely important date financially....
News

Explainable forecasting using HANA and APL

Last week our colleague Dirk Kemper (Data Science and Analytics Consultant) wrote a technical blog about machine learning at true scale, with SAP HANA's...
Technology

Large-scale forecasting using HANA, APL and Node.js

For our XP Tech blog from Expertum our colleague Dirk Kemper (Data Science and Analytics Consultant) wrote a technical blog about machine learning at true...
Technology

SAP Data Warehouse Cloud: A post-TechEd round-up

This year’s SAP TechEd was the second edition held exclusively online; a format that undoubtedly holds both advantages and disadvantages for everyone....
News

The switch to standard time or winter time in SAP

For most humans, the switch to standard time just means an extra hour of sleep. But for software applications, the consequences are less appealing. Software...
Technology

Tech Alert: Windows Print Spooler Remote Code Execution Vulnerability

Microsoft released mandatory security updates for several Windows versions including 10, 8.1, 7, and Server editions to patch the 'PrintNightmare' exploit.
Technology

Tech Alert: Major Security Alert for All SAP ABAP Platforms

On 8 June SAP has issued note 3007182 - [CVE-2021-27610] Improper Authentication in SAP NetWeaver ABAP Server and ABAP Platform, describing a major...
Technology

Review Azure services certificate authorities

Microsoft is updating its Azure services to use Transport Layer Security (TLS) certificates from a different set of Root Certificate Authorities (CAs).
Technology

Recon: critical vulnerability affecting all SAP systems

A vulnerability has been discovered, which makes it possible to create SAP users with maximum privileges without the need to authenticate. The vulnerability...
Technology