Posts

Meltdown and Spectre are expected to have impacts on performance. How big the impacts will be remains a mystery. [shutterstock: 1017535906, Production Perig)

Meltdown and Spectre are expected to have impacts on performance. How big the impacts will be remains a mystery. [shutterstock: 1017535906, Production Perig)

Meltdown, Spectre & Hana

While almost the whole IT and business world is discussing the security calamity, SAP and IBM remain astonishingly calm and tight-lipped in their interaction with their community of users. Only Hana platform suppliers Red Hat and Suse are engaging in open communication.

[Read more]

With over 25 old ERP systems out of comission, Japanese brewery giant Asahi is achieving lasting reductions in IT operating costs. [shutterstock: 263923439,somsak nitimongkolchai]

With over 25 old ERP systems out of comission, Japanese brewery giant Asahi is achieving lasting reductions in IT operating costs. [shutterstock: 263923439,somsak nitimongkolchai]

New Recipe For Historical Data

Asahi, the Japanese brewery group, is shutting down 25 old systems in Central and Eastern Europe, thereby making a lasting reduction to its running costs for access to legacy data.

This article is the last of a series! If you would like to continue reading the series, please use the 'previous button' in the middle of the screen on left side.

[Read more]

The opinions on the SAP authorization concept diverge widely. The concept works well in theory, in practice, vulnerabilities do exist. [shutterstock: 624185789, Markus Mainka]

The opinions on the SAP authorization concept diverge widely. The concept works well in theory, in practice, vulnerabilities do exist. [shutterstock: 624185789, Markus Mainka]

SAP Transport Management Part 1: Circumventing Authority Checks

The opinions on the SAP authorization concept diverge widely. Surely, a certain complexity and the related maintenance effort cannot be denied. Yet, the most important requirement, the gapless protection of all read and write accesses within a program, can be realized quite well – at least in theory. In practice, there are several options to circumvent authorization checks.

[Read more]

While not every business function can operate in the cloud, there are clear benefits from cloud migration - particularly for small businesses. [shutterstock: 370754954, Rawpixel.com]

While not every business function can operate in the cloud, there are clear benefits from cloud migration - particularly for small businesses. [shutterstock: 370754954, Rawpixel.com]

Five Reasons Your Small Business Should Migrate To The Cloud

The cloud has the potential to move your small business to a whole new level, and while not every business function can operate in the cloud, cloud technology continues to improve and expand the possibilities even for small business owners. Many small business owners believe the cloud to be the domain of large companies, but no matter what size your business, you can find benefits in the cloud.

[Read more]

Disruptive technologies converge as businesses fully integrate IT systems. Monetization is becoming increasingly important. [shutterstock: 143940817, Andrey_Popov]

Disruptive technologies converge as businesses fully integrate IT systems. Monetization is becoming increasingly important. [shutterstock: 143940817, Andrey_Popov]

Monetization of Data Among Key Trends in IoT in 2018

Monetization of data collected from networked IoT devices, convergence of multiple disruptive technologies and standards, and network edge processing are among the key trends for 2018 according to the EY IoT Competence Center, a global team of IoT professionals.

[Read more]

Unsecured interfaces are one of the top issues in SAP security. Hackers and data thieves can gain access via the unsecured backdoor. [shutterstock: 787105330, g0d4ather]

Unsecured interfaces are one of the top issues in SAP security. Hackers and data thieves can gain access via the unsecured backdoor. [shutterstock: 787105330, g0d4ather]

Do you know your interfaces – all of them?

Unsecured interfaces to and from SAP systems open the doors to hackers. Many companies are aware of this – yet they still do not have sufficient security measures in place. Solutions with which interfaces in SAP system landscapes can be analyzed and monitored comprehensively are needed

[Read more]