How to implement GDPR using SAP ILM Customization of ILM Objects for ERP, HCM BW to identify personal data, how to create a PoC or deletion, block or residence with legal cases concept
Breaking, forensicating and anti-forensicating SAP Portal and J2EE EngineERPScan
?
SAP is the most popular business application with more than one hundred eighty thousand installations all over the world. But people spend enormous amounts of money to install it and then forget about security. In ERP systems, all business processes are performed, all critical information is stored like finances, HR, clients. Not to care about the security of this data is not very sensible.
The presentation provides examples of simple and advanced attacks along with ways to avoid them.
The document discusses how organizations are struggling to customize SAP to meet new pressures from mobility, customer experience, and operational excellence. It is difficult to customize SAP due to its large and complex landscape. The OutSystems platform allows organizations to extend SAP applications without modifying core SAP, through rapid application development capabilities and tight integration with SAP that inherits security, governance, and other capabilities. Developers can discover and consume SAP APIs easily to build new applications on any device.
Default accounts are commonly exploited to gain unauthorized access to SAP systems. The presentation identifies several new default accounts in SAP Solution Manager with the password "init1234" that can be used to retrieve passwords, execute operating system commands, and fully compromise associated SAP systems. It provides examples of how these accounts can be exploited and advises customers to use available tools to detect and remediate exposed default accounts.
Practical SAP pentesting workshop (NullCon Goa)ERPScan
?
All business processes are generally contained in ERP systems. Any information an attacker might want is stored in a company’s ERP. This information can include financial, customer or public relations, intellectual property, personally identifiable information and more. And SAP is the most popular business application vendor with more than 250000 customers worldwide.
The workshop conducted by Alexander Polyakov, CTO of ERPScan, at NullCon Goa Conference is a practical SAP pentesting guide.
The document discusses how SAP Solution Manager can be used to manage custom code. It describes how Solution Manager provides transparency into an organization's custom code through tools that create a central repository. It also allows for control of custom code through reporting, governance, and testing tools. Solution Manager offers optimization of custom code through capabilities like clone finding and code inspection. It provides reporting and governance over custom code through business intelligence reports and dashboards.
A crushing blow at the heart of SAP’s J2EE Engine. ERPScan
?
Automation of business processes like ERP, PLM, CRM, SRM based on ABAP.
There are the following integration, collaboration and management based on J2EE engine:
- SAP Portal
- SAP PI
- SAP XI
- SAP Mobile Infrastructure
- SAP Solution Manager.
Administrators, developers, pentesters, and researchers mostly focus on ABAP stack. Hackers know about it, so they will find easier ways to control your business.
The presentation describes SAP J2EE Platform Architecture and provides examples of internal and external attacks and ways of its prevention.
Practical SAP pentesting (B-Sides San Paulo)ERPScan
?
All business processes are generally contained in ERP systems. Any information an attacker might want is stored in a company’s ERP. This information can include financial, customer or public relations, intellectual property, personally identifiable information and more. And SAP is the most popular business application vendor with more than 250000 customers worldwide.
The workshop conducted by Alexander Polyakov, CTO of ERPScan, at B-Sides Conference 2014 (San Paulo) is a practical SAP pentesting guide.
Injecting evil code in your SAP J2EE systems. Security of SAP Software Deploy...ERPScan
?
SAP is the most popular business application with more than two hundred forty thousand installations all over the world. But people spend enormous amounts of money to install it and then forget about security. However, in ERP systems, all business processes are performed, all critical information is stored like finances, HR, clients. Not to care about the security of this data is not very sensible.
SAP NetWeaver Development Infrastructure is a complex item. It combines the characteristics and advantages of local development environments with a server-based development landscape. All this stuff centrally provides opportunities to support the software, implement new features, manage lifecycle of a product, etc. So, the main aim is to control deployment of components in the system landscape in a standardized manner.
The key component in DI scheme is Software Deployment Manager (SDM). It is directly related to the production systems, that is why it is so critical.
The presentation describes special features of SDM and provides several SDM attack scenarios along with the ways to prevent them.
SAP is the most popular business application with more than two hundred forty thousand installations all over the world. But people spend enormous amounts of money to install it and then forget about security. However, in ERP systems, all business processes are performed, all critical information is stored like finances, HR, clients. Not to care about the security of this data is not very sensible.
SAP NetWeaver Development Infrastructure is a complex item. It combines the characteristics and advantages of local development environments with a server-based development landscape. All this stuff centrally provides opportunities to support the software, implement new features, manage lifecycle of a product, etc. So, the main aim is to control deployment of components in the system landscape in a standardized manner.
The key component in DI scheme is Software Deployment Manager (SDM). It is directly related to the production systems, that is why it is so critical.
The presentation describes special features of SDM and provides several SDM attack scenarios along with the ways to prevent them.
This document provides information about archiving processes and functions for various objects in SAP's Plant Maintenance and Customer Service (PM/CS) module, including equipment, functional locations, serial number histories, measurement documents, and maintenance notifications. For each archiving object, the document outlines application-specific features, customizing options, dependencies, authorization requirements, and logs to view archived objects or monitor the archiving process. The goal of archiving is to optimize system performance by removing old, inactive master data from the database.
The document discusses security issues related to SAP systems and portals. It notes that while SAP is widely used, security vulnerabilities are common due to lack of logging and exposure of services. The document emphasizes that SAP portals deserve attention as they provide a common entry point for attackers and link to other critical systems. Proper monitoring of portals and exposed services is needed to detect attacks and unauthorized access.
This document provides a summary of the Investment Management training course offered by SAP. It covers navigating the SAP system, the investment management lifecycle, creating master data, planning and budgeting investments, implementing measures, settling investments, and performing the fiscal year change process. The target users are project managers and team members responsible for investment planning and management.
Implementing Process Controls and Risk Management with Novell Compliance Mana...Novell
?
The document discusses Novell's Compliance Management Platform and its extension for SAP environments. The platform provides integrated identity and security management through components like Identity Vault, Identity Manager, Sentinel, and Access Manager. The extension for SAP includes tools like a Role Mapping Administrator and enhanced SAP drivers. It aims to develop synergies between Identity Manager and SAP BusinessObjects Access Control for improved provisioning, access control, risk analysis, and monitoring capabilities. Three scenarios are presented showing how provisioning and access control can be integrated between the solutions.
Implementing Process Controls and Risk Management with Novell Compliance Mana...Novell
?
The document discusses Novell's Compliance Management Platform and its extension for SAP environments. The platform provides integrated identity and security management through components like Identity Vault, Identity Manager, Sentinel, and Access Manager. The extension for SAP adds tools like a Role Mapping Administrator and new/enhanced SAP drivers. It aims to develop synergies between Identity Manager and SAP Access Control and extend existing integrations with SAP products. Scenarios show how the platform can be used for SAP user provisioning and access control. Risk management integration is also discussed.
The document discusses performance analysis and tuning in SAP systems. It provides an overview of workload analysis techniques, including analyzing wait times, database times, and other components of transaction response times. It also describes various performance monitors in SAP systems for analyzing the basis and application layers, such as the workload monitor, transaction profile, work process overview, and operating system monitor. The goal is to help consultants identify and address performance bottlenecks.
SAP security becomes a hot theme nowadays. Attacks on SAP can put a business at risk of Espionage, Sabotage and Fraud.
The presentation covers the following architecture and unusual issues:
Authentication Bypass
1. Verb tampering
2. Invoker servlet
Encryption
3. Storage – SAPGUI
4. Authentication – P4
5. Transfer – RFC, Diag
SSRF
6. Port Scan
7. Command execution
8. Security bypass
Also, the presentation gives advice for developers and describes future trends in SAP Security area.
The document discusses managing custom code in SAP systems. It covers the reasons to control custom code, providing transparency into how much custom code exists, controlling custom code through its lifecycle, and optimizing custom code quality. It describes tools in SAP Solution Manager and standalone systems for custom code management, including Custom Code Lifecycle Management, ABAP Test Cockpit, SAP Coverage Analyzer, and SAP Code Inspector.
Pratham Kapoor has over 3 years of experience as an SAP ABAP Technical Developer with Infosys Technologies Ltd, where he has worked on projects involving SAP SRM 7.01 customizations including workflow enhancements, Webdynpro component development, and ABAP programming. He has expertise in ABAP/4, SAPGUI, Windows operating systems, ABAP OO, BRF workflow, ALV reports, and data mapping. Pratham holds a B.Tech in Computer Science from Jaypee University of Engineering & Technology.
The document contains a list of skills and corresponding designations for various roles. It includes roles in areas like Oracle IDM, TVM/WAS, CC&B, Oracle Apps DBA, Oracle Apps Functional, I-Procurement, Hyperion, SAP QM, and SAP SRM. For each role, it provides responsibilities, required skills, experience and qualifications.
The document discusses sizing storage for SAP implementations. It describes different types of sizing including greenfield, brownfield, and hybrid. It also covers sizing tools from SAP like QuickSizer that estimate hardware requirements based on metrics like CPU time, memory usage, and disk space. The document emphasizes that sizing is an iterative process that requires validating assumptions with usage data and testing.
Visually understand the redefined SAP technology landscape on:
how it improves decision making
automates business processes of a given enterprise
increases productivity with a digital core that supports all the mission-critical business processes
CONFidence 2014: Dimitriy Chastuhin: All your sap p@$$w0яd z belong to usPROIDEA
?
Nowadays, everyone knows about the great importance of SAP systems and the critical data processed by them. Large companies install SAP Security Notes regularly so as not to repeat the mistake of Nvidia. One bug is not enough anymore to get access to all corporate SAP systems. Pentesters frequently find themselves in a situation where the OS of an SAP server has been compromised successfully, but they have not got an access to the ERP system. In addition, it is rather common to have an unprivileged account, which give them access to the encrypted password, but not to the whole system. Sometimes they even try to break into other systems with help of the passwords, which users usually use in the systems they’ve already broken, but they can’t, because they need them to be decrypted first. Where do we find the treasured password to access the financial transactions and revenues of NASDAQ monsters?
Where and how does SAP store user passwords? Are all passwords stored as hashes, or can attackers find passwords in plaintext?
This talk reviews the many places where SAP stores critical credentials, such as usernames and passwords, and, which is more interesting, the way it stores them. Methods of retrieving them will be described, and decryption utilities will be presented.
SAP GUI shortcuts, RFC connections, SAP Security Storage, logs, traces, Database links, SAP HANA Storage, you name it – all varieties of SAP modules will be discussed in this talk.
This document provides information about CoreToEdge, a technology services company. It details CoreToEdge's mission, vision, history, services, products, customers, and partners. CoreToEdge's services include SAP hosting, cloud services, training, and technology services. Their products include BasisCockpit for real-time SAP system monitoring and Verilista for predictive maintenance. The document shares CoreToEdge's numbers, locations, and social media accounts.
Your Salesforce toolbelt – Practical recommendations to keep your Org healthyYeurDreamin'
?
The challenges involved in keeping a healthy, performant and scalable Org are many and come in different shapes and sizes. Clearly these increase with the complexity of the customisations performed on your Orgs, but even if you are sticking to the Out of the Box processes as much as possible, and keeping your APEX codebase to the minimum, it is still possible to find yourself in a situation in which issues show up in your productive Org.
ILM archiving strategy involves using SAP tools like Launchpad, Archiving IQ, and DVM to archive and decommission data according to retention policies. Key transactions and reports are used to configure and monitor the ILM process which archives objects like customer, vendor, material, and HR data according to dependencies. Sample SAP notes provide guidance on configuring and validating ILM policies for customer/vendor destruction.
This document provides an overview of SAP Information Lifecycle Management (ILM), including its functionality, relevant business functions, main transactions, and setup steps. It discusses analyzing ILM objects, assigning objects to audit areas, creating ILM rules and policies, and archiving ILM stores. References for additional information on SAP ILM and related topics such as data archiving, retention management, and data privacy are also provided.
SAP is the most popular business application with more than two hundred forty thousand installations all over the world. But people spend enormous amounts of money to install it and then forget about security. However, in ERP systems, all business processes are performed, all critical information is stored like finances, HR, clients. Not to care about the security of this data is not very sensible.
SAP NetWeaver Development Infrastructure is a complex item. It combines the characteristics and advantages of local development environments with a server-based development landscape. All this stuff centrally provides opportunities to support the software, implement new features, manage lifecycle of a product, etc. So, the main aim is to control deployment of components in the system landscape in a standardized manner.
The key component in DI scheme is Software Deployment Manager (SDM). It is directly related to the production systems, that is why it is so critical.
The presentation describes special features of SDM and provides several SDM attack scenarios along with the ways to prevent them.
This document provides information about archiving processes and functions for various objects in SAP's Plant Maintenance and Customer Service (PM/CS) module, including equipment, functional locations, serial number histories, measurement documents, and maintenance notifications. For each archiving object, the document outlines application-specific features, customizing options, dependencies, authorization requirements, and logs to view archived objects or monitor the archiving process. The goal of archiving is to optimize system performance by removing old, inactive master data from the database.
The document discusses security issues related to SAP systems and portals. It notes that while SAP is widely used, security vulnerabilities are common due to lack of logging and exposure of services. The document emphasizes that SAP portals deserve attention as they provide a common entry point for attackers and link to other critical systems. Proper monitoring of portals and exposed services is needed to detect attacks and unauthorized access.
This document provides a summary of the Investment Management training course offered by SAP. It covers navigating the SAP system, the investment management lifecycle, creating master data, planning and budgeting investments, implementing measures, settling investments, and performing the fiscal year change process. The target users are project managers and team members responsible for investment planning and management.
Implementing Process Controls and Risk Management with Novell Compliance Mana...Novell
?
The document discusses Novell's Compliance Management Platform and its extension for SAP environments. The platform provides integrated identity and security management through components like Identity Vault, Identity Manager, Sentinel, and Access Manager. The extension for SAP includes tools like a Role Mapping Administrator and enhanced SAP drivers. It aims to develop synergies between Identity Manager and SAP BusinessObjects Access Control for improved provisioning, access control, risk analysis, and monitoring capabilities. Three scenarios are presented showing how provisioning and access control can be integrated between the solutions.
Implementing Process Controls and Risk Management with Novell Compliance Mana...Novell
?
The document discusses Novell's Compliance Management Platform and its extension for SAP environments. The platform provides integrated identity and security management through components like Identity Vault, Identity Manager, Sentinel, and Access Manager. The extension for SAP adds tools like a Role Mapping Administrator and new/enhanced SAP drivers. It aims to develop synergies between Identity Manager and SAP Access Control and extend existing integrations with SAP products. Scenarios show how the platform can be used for SAP user provisioning and access control. Risk management integration is also discussed.
The document discusses performance analysis and tuning in SAP systems. It provides an overview of workload analysis techniques, including analyzing wait times, database times, and other components of transaction response times. It also describes various performance monitors in SAP systems for analyzing the basis and application layers, such as the workload monitor, transaction profile, work process overview, and operating system monitor. The goal is to help consultants identify and address performance bottlenecks.
SAP security becomes a hot theme nowadays. Attacks on SAP can put a business at risk of Espionage, Sabotage and Fraud.
The presentation covers the following architecture and unusual issues:
Authentication Bypass
1. Verb tampering
2. Invoker servlet
Encryption
3. Storage – SAPGUI
4. Authentication – P4
5. Transfer – RFC, Diag
SSRF
6. Port Scan
7. Command execution
8. Security bypass
Also, the presentation gives advice for developers and describes future trends in SAP Security area.
The document discusses managing custom code in SAP systems. It covers the reasons to control custom code, providing transparency into how much custom code exists, controlling custom code through its lifecycle, and optimizing custom code quality. It describes tools in SAP Solution Manager and standalone systems for custom code management, including Custom Code Lifecycle Management, ABAP Test Cockpit, SAP Coverage Analyzer, and SAP Code Inspector.
Pratham Kapoor has over 3 years of experience as an SAP ABAP Technical Developer with Infosys Technologies Ltd, where he has worked on projects involving SAP SRM 7.01 customizations including workflow enhancements, Webdynpro component development, and ABAP programming. He has expertise in ABAP/4, SAPGUI, Windows operating systems, ABAP OO, BRF workflow, ALV reports, and data mapping. Pratham holds a B.Tech in Computer Science from Jaypee University of Engineering & Technology.
The document contains a list of skills and corresponding designations for various roles. It includes roles in areas like Oracle IDM, TVM/WAS, CC&B, Oracle Apps DBA, Oracle Apps Functional, I-Procurement, Hyperion, SAP QM, and SAP SRM. For each role, it provides responsibilities, required skills, experience and qualifications.
The document discusses sizing storage for SAP implementations. It describes different types of sizing including greenfield, brownfield, and hybrid. It also covers sizing tools from SAP like QuickSizer that estimate hardware requirements based on metrics like CPU time, memory usage, and disk space. The document emphasizes that sizing is an iterative process that requires validating assumptions with usage data and testing.
Visually understand the redefined SAP technology landscape on:
how it improves decision making
automates business processes of a given enterprise
increases productivity with a digital core that supports all the mission-critical business processes
CONFidence 2014: Dimitriy Chastuhin: All your sap p@$$w0яd z belong to usPROIDEA
?
Nowadays, everyone knows about the great importance of SAP systems and the critical data processed by them. Large companies install SAP Security Notes regularly so as not to repeat the mistake of Nvidia. One bug is not enough anymore to get access to all corporate SAP systems. Pentesters frequently find themselves in a situation where the OS of an SAP server has been compromised successfully, but they have not got an access to the ERP system. In addition, it is rather common to have an unprivileged account, which give them access to the encrypted password, but not to the whole system. Sometimes they even try to break into other systems with help of the passwords, which users usually use in the systems they’ve already broken, but they can’t, because they need them to be decrypted first. Where do we find the treasured password to access the financial transactions and revenues of NASDAQ monsters?
Where and how does SAP store user passwords? Are all passwords stored as hashes, or can attackers find passwords in plaintext?
This talk reviews the many places where SAP stores critical credentials, such as usernames and passwords, and, which is more interesting, the way it stores them. Methods of retrieving them will be described, and decryption utilities will be presented.
SAP GUI shortcuts, RFC connections, SAP Security Storage, logs, traces, Database links, SAP HANA Storage, you name it – all varieties of SAP modules will be discussed in this talk.
This document provides information about CoreToEdge, a technology services company. It details CoreToEdge's mission, vision, history, services, products, customers, and partners. CoreToEdge's services include SAP hosting, cloud services, training, and technology services. Their products include BasisCockpit for real-time SAP system monitoring and Verilista for predictive maintenance. The document shares CoreToEdge's numbers, locations, and social media accounts.
Your Salesforce toolbelt – Practical recommendations to keep your Org healthyYeurDreamin'
?
The challenges involved in keeping a healthy, performant and scalable Org are many and come in different shapes and sizes. Clearly these increase with the complexity of the customisations performed on your Orgs, but even if you are sticking to the Out of the Box processes as much as possible, and keeping your APEX codebase to the minimum, it is still possible to find yourself in a situation in which issues show up in your productive Org.
ILM archiving strategy involves using SAP tools like Launchpad, Archiving IQ, and DVM to archive and decommission data according to retention policies. Key transactions and reports are used to configure and monitor the ILM process which archives objects like customer, vendor, material, and HR data according to dependencies. Sample SAP notes provide guidance on configuring and validating ILM policies for customer/vendor destruction.
This document provides an overview of SAP Information Lifecycle Management (ILM), including its functionality, relevant business functions, main transactions, and setup steps. It discusses analyzing ILM objects, assigning objects to audit areas, creating ILM rules and policies, and archiving ILM stores. References for additional information on SAP ILM and related topics such as data archiving, retention management, and data privacy are also provided.
The document discusses important SAP notes related to information lifecycle management (ILM) and GDPR compliance. It lists several SAP notes that can help standardize and customize ILM objects. It also discusses how to assign application rule variants to ILM rules and applications. Finally, it provides details on legal case management in SAP, including how to enable legal hold to extend data retention on business objects involved in a legal case.
This white paper discusses new approaches to network planning given convergence of fixed and mobile networks and divergence of applications and services. It proposes optimizing network planning to maximize benefits for investors, suppliers and operators while minimizing risks. The paper outlines challenges like self-similar traffic, dynamic routing and topological constraints. It advocates dividing the network planning problem into smaller subproblems and using techniques like queueing theory, simulation and optimization algorithms to develop short, medium and long-term plans that meet technical, economic and business factors over time as networks and technologies evolve.
Big data analytics for telecom operators final use cases 0712-2014_prof_m erdasProf Dr Mehmed ERDAS
?
Big Data Analytics for TELCOs Customer Experience Management Permission Based Marketing for Location and Movement Data Data Modelling Business Use Cases Data Mining BSS OSS COTS OTT Churm Modeling Markov Processes HANA HADOOP INtegration Video Streaming Test cases
The document outlines the phases and steps for migrating an existing SAP landscape including ECC 6, BW 7.3, and other components to SAP HANA. It involves scoping, blueprinting, implementation, testing, and go-live preparation over 5-6 months. Key steps include identifying data sources, reviewing reports, installing HANA, migrating and converting BW objects to in-memory structures, authorization changes, testing, and go-live support. Required resources include project managers, solution architects, and application consultants for each system.
This document provides a summary of Eldorado's SAP HANA ramp up project. It outlines the project description and scope, including the tasks and responsibilities of the ramp up coach. It also includes the project plan with timelines and resource assignments for migrating Eldorado's existing SAP BW landscape to SAP HANA. The goals of the project are to enable Eldorado to become an early adopter of SAP BW on HANA in order to gain strategic advantages from new capabilities like real-time analytics and improved supply chain processes.
This white paper discusses new approaches to telecommunications network planning given convergence of fixed and mobile networks and divergence of applications and services. It proposes optimizing network planning to maximize benefits for investors, suppliers and operators while minimizing risks. The paper provides an overview of factors to consider in network planning like traffic patterns, routing, and topology. These include technological, economic, financial, business, organizational and environmental factors. It also discusses approaches like dividing the problem into smaller subproblems and using algorithms like integer programming, graph theory and simulation to optimize network design and costs over time.
This document discusses the challenges of localizing English terms related to SAP programming into Turkish for the first time. It explains how providing conceptual consistency and avoiding contradictions with existing definitions is difficult but important. It also notes that understanding ABAP code is still necessary even with new graphic tools, and introduces a book on ABAP by Yener Türkeli aimed at both beginners and experienced SAP and ABAP users. A recommendation for the book is provided by Prof. Dr. Mehmet Erda?.
Bb Consulting Profil Me 2008 English 08072008 08 38 Am10 Jul 08Prof Dr Mehmed ERDAS
?
This document provides a competence profile for Prof. Dr. Dipl. Ing. Mehmet Erdas, an SAP BI 7.0 Senior Consultant and Trainer. It outlines his professional qualifications and over 25 years of IT experience, including fluency in German, English, and Turkish. It also details his hands-on project experience delivering SAP BI solutions, as well as the courses and certifications he has completed. His areas of expertise include SAP BI, data modeling, ETL, reporting, and performance optimization.
This document provides a literature list of 20 German, English, and Turkish language books related to SAP ERP BW BI. The books cover topics such as SAP BI project management, data warehousing with SAP BW, warehouse management with SAP, SAP BW performance optimization, SAP BW data modeling, and sales and inventory planning with SAP APO. It also lists abbreviations and websites related to SAP NetWeaver and provides a list of consulting firms in Germany that specialize in ERP, PPS, production, and consulting for various industries.
Hire Android App Developers in India with Cerebraixcerebraixs
?
Android app developers are crucial for creating
high-quality, user-friendly, and innovative mobile
applications. Their expertise in mobile development,
UI/UX design, and seamless integration ensures robust
and scalable apps that drive user engagement and
business success in the competitive mobile market.
Boosting MySQL with Vector Search Scale22X 2025.pdfAlkin Tezuysal
?
As the demand for vector databases and Generative AI continues to rise, integrating vector storage and search capabilities into traditional databases has become increasingly important. This session introduces the *MyVector Plugin*, a project that brings native vector storage and similarity search to MySQL. Unlike PostgreSQL, which offers interfaces for adding new data types and index methods, MySQL lacks such extensibility. However, by utilizing MySQL's server component plugin and UDF, the *MyVector Plugin* successfully adds a fully functional vector search feature within the existing MySQL + InnoDB infrastructure, eliminating the need for a separate vector database. The session explains the technical aspects of integrating vector support into MySQL, the challenges posed by its architecture, and real-world use cases that showcase the advantages of combining vector search with MySQL's robust features. Attendees will leave with practical insights on how to add vector search capabilities to their MySQL
The truth behind the numbers: spotting statistical misuse.pptxandyprosser3
?
As a producer of official statistics, being able to define what misinformation means in relation to data and statistics is so important to us.
For our sixth webinar, we explored how we handle statistical misuse especially in the media. We were also joined by speakers from the Office for Statistics Regulation (OSR) to explain how they play an important role in investigating and challenging the misuse of statistics across government.
Optimizing Common Table Expressions in Apache Hive with CalciteStamatis Zampetakis
?
In many real-world queries, certain expressions may appear multiple times, requiring repeated computations to construct the final result. These recurring computations, known as common table expressions (CTEs), can be explicitly defined in SQL queries using the WITH clause or implicitly derived through transformation rules. Identifying and leveraging CTEs is essential for reducing the cost of executing complex queries and is a critical component of modern data management systems.
Apache Hive, a SQL-based data management system, provides powerful mechanisms to detect and exploit CTEs through heuristic and cost-based optimization techniques.
This talk delves into the internals of Hive's planner, focusing on its integration with Apache Calcite for CTE optimization. We will begin with a high-level overview of Hive's planner architecture and its reliance on Calcite in various planning phases. The discussion will then shift to the CTE rewriting phase, highlighting key Calcite concepts and demonstrating how they are employed to optimize CTEs effectively.
8. How to find&implement the ILMOBJ/ S_NOTE
? https://launchpad.support.sap.com/#/solutions/notesv2/?q=SAP%25
2520ILM%252520NOtes%252520List&sortBy=score&sortOrder=des
?
?
12. SAMPLE LIST OF SAP S_NOTES
launchpad.support.sap.com/#/notes/Nr.
21. SAP Note 2298980; Customer/Vendor Destruction: ILM Policies checks
and validation LO-MD-BP-DP
? KUNDE Domain RSCRDD31
Table Short description
? /WSWN/076 SPEEDI: Errortable of copy of scheduling agreements
? SER02 Document Header for Serial Nos for Maint.Contract (SD Order)
? VAKPA Sales Index: Orders by Partner Function
? VLKPA SD Index: Deliveries by Partner Functions
? VRKPA Sales Index: Bills by Partner Functions
? SAP_APPL 617 617 2066278 Customer/vendor master data destruction - New Enterprise
Services - Interface note Part 2 LO-MD-BP-DP
? SAP_APPL 617 617 2112841 Customer/Vendor data Destruction: No ERP Layer EoP Check - Part
2 LO-MD-BP-DP
? SAP_APPL 617 617 2298980 Customer/Vendor Destruction: ILM Policies checks and validation
LO-MD-BP-DP
? SAP_APPL 618 618 2298980 Customer/Vendor Destruction: ILM Policies checks and validation