Data & system migrations
Handling SAP day-to-day business such as administration, maintenance and configuration of your SAP systems
Information technology plays an even more important role in the age of digitalisation. Innovation without IT is unimaginable. But it is not just technology itself, but also how it is delivered that matters. The SAP basis sees itself as a partner and contact for new SAP technologies. Further details on the recommendation can be found in the Master's thesis in chapters 7.5 and 9.3.
The basis of every SAP system is the SAP NetWeaver Application Server. Everything depends on this "SAP Basis" to keep SAP systems running. In the area of SAP Basis Operations, we handle all technical tasks for our customers that arise during the installation, operation and maintenance of SAP systems. We install, administer, configure, troubleshoot and optimize your SAP system.
SAP performance optimization
This is where all the system's data resides. These are composed of the actual database and the DBMS, the "database management system". In earlier versions, the database here came from different manufacturers. For example, Microsoft SQL or Oracle. Since SAP HANA, a lot has changed for IT in this data layer. This is because the database comes from SAP itself and is automatically monitored by the system. There is more to this database layer than just the working data. Important elements such as the configuration tables and system data for control and application content are also stored here. This is the repository data used by applications.
IT professionals are taking the first steps in automation with the use of tools like RedHat Ansible. At our company, for example, Ansible is used for mass rollouts of agents in large environments.
Some missing SAP basic functions in the standard are supplied by the PC application "Shortcut for SAP Systems".
Job scheduling: your system needs to run various automatic background jobs that consume resources.
For this reason, in this article I present two of the possibilities that already exist in the broad area of security automation.