Features
Features
-
What other companies are implementing RFID technology?
What is RFID, and is it right for my company? This guide explains the basics of RFID, what SAP doing with RFID in its products, and how you can build a business case for RFID. Continue Reading
-
How do I calculate ROI for RFID?
What is RFID, and is it right for my company? This guide explains the basics of RFID, what SAP doing with RFID in its products, and how you can build a business case for RFID. Continue Reading
-
SearchSAP.com will have you know...
Here you'll find a compilation of silly, interesting and altogether useless IT facts, from our weekly feature in Tuesday's newsletters. Continue Reading
-
Chapter of the month -- May 2006
-
Chapter 22: 'Integration with Microsoft Office'
Mendocino is a red-hot topic, and for good reason; it allows SAP users to work with complex data using the familiar Office interface. This chapter examines the first version of Mendocino as well as other methods for moving data between SAP and Excel... Continue Reading
-
Moving data between SAP and Microsoft Office
This chapter examines the first version of Mendocino as well as other methods for moving data between SAP and Excel, Word and Access. Continue Reading
-
Crash course in SAP reporting tools
This excerpt from the book Teach Yourself SAP in 24 Hours provides a crash course in the most common SAP reporting tools: SAP Query, InfoSet Query, Ad Hoc Query and QuickViewer. Continue Reading
-
Chapter of the Month -- April 2006
InfoObjects, characteristics and key figures form the foundation of the data model in SAP Business Information Warehouse (BW). This chapter explains the basics you need to know. Continue Reading
-
SAP vs. Oracle: Round two
We recently asked two prominent experts to argue their respective cases for SAP vs. Oracle. These follow-up columns are their official rebuttals of each other's arguments. Continue Reading
-
Book excerpt: SAP R/3 for Everyone
This chapter examines line-item reports and issues like sorting and grouping, filtering techniques, executing transaction procedures, handling negative values and summing columns. Continue Reading
-
Securing Web Services with Java
This chapter of the book Building Web Services with Java examines security basics, Web services-specific security, trust, security policies, enterprise security, authorization, security services and J2EE security. Continue Reading
-
A primer on XML
This chapter examines the origins of XML and dives into issues like document vs. data-centric XML, instances, namespaces and document type definitions. It also provides insight into the best approach for XML schemas. This overview containing many ... Continue Reading
-
Chapter 2: 'XML primer'
This chapter examines the origins of XML and dives into issues like document vs. data-centric XML, instances, namespaces and document type definitions. We also get some insights into the best approach for XML schemas and processing best-practices. ... Continue Reading
-
Chapter 14: 'Sorting, filtering and summing up line-item reports'
This chapter examines the inner workings of line-item reports and how to effectively work with them. Topics include sorting and grouping, filtering techniques, executing transaction procedures, handling negative values and easily summing up columns ... Continue Reading
-
Chapter 9: 'Securing Web Services'
First, we get a walk-through of security basics along with Web Services-specific security. Then the focus shifts to more specific issues like trust, security policies, Enterprise security, authorization and security services. It also has a dedicated... Continue Reading