Creation of documentation
SE90 Repository Info System / Object Navigation
SAP HANA (SAP High-Performance Analytic Appliance) is an SAP platform based on in-memory technology. With SAP HANA, you can achieve huge performance increases over traditional databases that were previously unthinkable. This enables you to analyze and evaluate mass data almost in real time without the need for data aggregation.
In addition to scanning and identifying the respective security vulnerabilities of a program, it is also possible to stop tasks that are to be transported to other SAP systems with security vulnerabilities in the further transport process This applies, for example, to the CHARM process based on SAP Solution Manager. This forces a programmer to securely check the programs he or she is responsible for according to the same security criteria. If a program then still has security problems, it can either be released via the dual control principle or returned for further processing. Do you know of any other solutions for improving ABAP code security or have you already gained experience with the products mentioned above? I look forward to your comments!
Migration of the SAP systems' databases to the HANA Database,
Over time, the tasks associated with the base became more complex and time-consuming, so that only the consultants could handle them. A need arose to hire a person to deal only with Basis matters.
The SAP NetWeaver Integration Technology part of the course covers the basic areas of use and properties of the various integration technologies. Interrelationships between the integration technologies, Web Services, ALE, BAPI, Process Integration, Web Application Server are taught. Further contents are the basic communication technologies: IDoc, RFC, http and SOAP.
The "Shortcut for SAP Systems" tool is ideal for doing many tasks in the SAP basis more easily and quickly.
Synchronisation of Dictionary Objects (SPDD): The developers can view the list of affected objects with the addition of Synchronise Modifications in the input image of the transaction SPAM.
After the query is executed, all the roles assigned to the previously entered user are displayed.