Hello Colleagues, Im part of HANA LAC team that help with the most complex migrations in the region, thanks for take some time in read this blog about Tenant replicacion, this method will be the most common in the next years due a some restriction we will face in on premise and RISE infrastructure. The....
There is huge knowledge available about SAP HANA High Availability and Disaster Recovery topic, but the knowledge is very fragmented (Help Portal, Blog post, SAP KBA, SAP Note, other). The aim of this article is simplify and make content consumption easier with a centralized page. There is no reason to duplicate the already well prepared content,....
(Jana Subramanian serves as APJ Principal Cybersecurity Advisor for Cloud Security and has been recognized as a Fellow of Information Privacy (FIP) by the International Association of Privacy Professionals (IAPP). As part of his responsibilities, Jana helps with strategic customer engagements related to topics such as cybersecurity, data privacy, multi-cloud security integration architecture, contractual assurance,....
While you’re developing any enterprise applications under HANA Server, you must have came across such tables which are not of use and we should delete to avoid memory consumption of a HANA server.But it can’t be performed without any validation which will cause major issues to performance of web applications developed. Hence, We have taken....
(Jana Subramanian is APJ Principal Cybersecurity Advisor for Cloud Security and Fellow of Information Privacy (FIP) awarded by International Association of Privacy Professional (IAPP). Jana supports strategic customer engagements on cybersecurity, data privacy, multi-cloud security architecture, contractual assurance, audit, and compliance domains.) Introduction Transitioning to RISE with SAP cloud services, SAP customers have a choice of opting for....
This article will briefly touch on the trend to rethink and restructure IT teams around the concept of a “Cloud Operating Model”. The cloud represented by fluffy pictograms and icons has become familiar to all manner of human beings today. IT professionals, ordinary users and consumers and certainly technology sponsors and stakeholders understand it is....