Search Results for: hana

How to Understand IT Risk Management Basics

Executive Summary The basics of IT risk management are routinely ignored on projects. We cover what they are and how they can be followed. Introduction To understand how to manage IT project risks, we must first level set on what we mean by risk. First, there are many different degrees of success or failure on…

Analysis of Rimini Street’s Presentation on ERP Support

Executive Summary Rimini Street created a presentation on ERP support. We evaluated this presentation for accuracy. Introduction Rimini Street wrote the article 10 Telltale Signs of that it is Time to Change in Your ERP Strategy. This is a document that focuses on the history of ERP and ERP support. It seemed worthy of analysis….

How to Best Understand the Control of SAP on IT Media

Executive Summary SAP controls the IT media system with a combination of advertising and paid placements. IT media entities do not declare their income source from SAP. Introduction I recently wrote an article that is a critique of our IT media system in the article The IT Media and the Fake News Debate. Increasingly what…

SAP’s Big Idea: ERP Data and Big Data on the Same Database?

Executive Summary SAP proposes that ERP and Big Data should reside on the same database. We evaluate the reasonableness of this proposal for using one giant database. Video Introduction: SAP’s Big Idea: ERP Data and Big Data on the Same Database? Text Introduction (Skip if You Watched the Video) SAP has been proposing that there…

Should You Listen to Gartner on Indirect Access?

Executive Summary Gartner writes on SAP indirect access. However, SAP also has enormous conflicts of interest in analyzing indirect access as it receives so much money from SAP. The question is, how is Gartner on the topic of SAP indirect access. Introduction In a previous article titled Taking A Multi-Dimensional Approach to Indirect Access, I explained…

The Time Crunch When Faced with SAP’s Indirect Access

Executive Summary SAP uses time constraints in a highly underhanded and effective way against their customers. Learn how SAP does this and what SAP customers can expect. Introduction One is the interesting features of indirect access that SAP does not want its customers to know about. And, of course, all of the consulting companies help…

Misleading Next Steps from ASUG on Indirect Access

Executive Summary An Analysis of ASUG’s Article on Next Steps for ASUG Members Questions ASUG Does not Want to be Asked Introduction In a previous article, I analyzed false information provided by ASUG on indirect access. In this article, ASUG is so discredited that it is interesting to see what else ASUG publishes on the…

How SAP Has Been Secretly Outsourcing Hosting

Executive Summary SAP states that they offer cloud services to customers, but in most cases, this is outsourced to other entities that SAP places a margin upon. SAP only recommends entities that allow it to markup their services. Video Introduction: How SAP Has Been Secretly Outsourcing Hosting Text Introduction (Skip if You Watched the Video)…

The Real Story on IT Implementation Methodologies

Executive Summary There are a number of IT implementation methodologies, but they usually are not evaluated for their effectiveness. We cover SAP consulting company methodologies as well as SAP’s Rapid Deployment Methodology. Introduction to IT Methodologies IT methodologies are often presented as major differentiators for implementation companies. However, IT methodologies are not what they appear….