Lukardi

Lukardi Blog

Gartner reports that from 2026 (the clock is ticking), 90% of new installations offered by SAP will be on the Rise with SAP model (hereafter ‘RWS’). The Rise with SAP model is a cloud service which, as far as it goes, is nothing more than ‘regular S/4’ (only that in the cloud),
From January 2025, Polish entrepreneurs will have to face a new legal obligation - the introduction of the Single Control File for corporate income tax, or JPK CIT. In this article, we will take a look at what the CIT JPK is, what the consequences will be for entrepreneurs.
Through careful analysis and extrapolation of report file sizes, we were able to keep the amount of reported data at a reasonable level. This process included a detailed analysis of the types of data recorded and their growth patterns over time.
In today's dynamic business environment, one of the key tools that has revolutionized the way businesses report their financial and accounting data is the Single Audit File (PL Jednolity Plik Kontroln JPK).
SAP software is a widely used technology around the world, utilized by various businesses, huge corporations, and even small companies. SAP has clients in over 180 countries. It's pretty pricey software because it comes with a range of costs, including fees for named user licenses.
Regardless of the size of the company, document flow is the foundation of effective and efficient management. The effectiveness of decision-making and daily operations depends on how documents are shared. An Electronic Document Workflow is a tool that organizes and streamlines the document management process within a company.
At the conference on SAP Security - Tips for Security, I shared with you the knowledge I've gained from both SoD and authorizations reorganization projects and daily tasks in Managed Services. For those of you who could not attend the conference, we have prepared a brief summary.
SAP is secure in itself. However, it is up to the customer's actions to take care of data security issues. In this particular context, it is impossible to ignore the inventory benefits of dedicated SAP Security tools.
Backups are an exact copy of our organization's most important data. Such backups should be kept off the affected system - so that a potential failure or attack does not deprive us of access to all our data.
You may already know that as of SAP 7.40 SP8, you can use SAP security policies (SECPOL) to define user-specific security parameters, as opposed to system profile values.
SAP HANA is the concept of fast access to in-memory data. It allows for the analysis of large, often unaggregated amounts of data, much faster than other databases. The way data is handled in SAP HANA is quite different from what we're used to with SAP NetWeaver. It has
Business doesn't like chaos and hates uncertainty Roles, permissions and authorizations in SAP is a river topic that we have covered several times. We've written about the dangers that arise from a lack of conceptualization of authorizations, poorly managed authorization procs and the associated risks to the organization. Today, in
Regardless of the size of the company, document flow is the foundation of effective and efficient management. The effectiveness of decision-making and daily operations depends on how documents are shared. An Electronic Document Workflow is a tool that organizes and streamlines the document management process within a company.
The only job of IES is to extract data from documents and send it back to SAP, which basically means cutting down on data entry work and automating the process. Unlike the previous OCR systems dedicated to VIM (ICC – Invoice Capture Center).
Due to the lack of universality of good solutions for this area, workflow processes evolve very slowly. Moreover, they most often result from internal attempts to improve the process. Nevertheless, awareness of the needs in the area of better document control is definitely growing. It is dictated not only by changing business requirements,
The years 2022 and 2023 were revolutionary for invoice exchange also in Poland. This is all due to a new regulation that introduced the National e-Invoice System (KSeF). What is KSeF? It's a central government system designed to facilitate the electronic exchange of invoices between business entities.
ECM (Enterprise Content Management) systems, or information resource management systems, are becoming more and more common in enterprises, and their users are increasing in proportion to the growing amount of content that enterprises handle. The mass digitization of documents, has not only made it possible to speed up hitherto analog processes, but has provided entirely new opportunities.
In today’s digital age, collecting vast amounts of data has become common for organizations across various sectors. One frequently discussed issue is how to effectively manage this data to ensure smooth operations. This is where data archiving in the SAP system plays a key role.
Gartner reports that from 2026 (the clock is ticking), 90% of new installations offered by SAP will be on the Rise with SAP model (hereafter ‘RWS’). The Rise with SAP model is a cloud service which, as far as it goes, is nothing more than ‘regular S/4’ (only that in the cloud),
SAP software is a widely used technology around the world, utilized by various businesses, huge corporations, and even small companies. SAP has clients in over 180 countries. It's pretty pricey software because it comes with a range of costs, including fees for named user licenses.
Answering the question posed in this way, the answer is simple - no. But incomplete, because simply no system will ever be secure. On the other hand, it is not that we cannot strive for security - quite the opposite. It all boils down to risk management, its acceptance, but above all
SAP software is a widely used technology around the world, utilized by various businesses and corporations, whether small or large. However, purchasing and implementing SAP software comes with huge expenses for licenses. Blocking accounts or deleting them doesn't always help reduce costs.
The following post contains a synopsis of the work carried out for one of SAST's clients, the main core of which was the optimization of authorization and user access was also implemented remodeling of the authorization concept.
It is worth acknowledging that migration to S/4 HANA gives customers not only a new landscape and new functionalities, but also a new price list for SAP services and products.
Today, we would like to highlight a very important issue in the area of SAP authorization security. Besides one-off role reorganization projects and SOD, maintaining the access concept developed during the project and the administrative-process order in roles is equally crucial. How can we prevent our post-project assumptions from getting off track?
Today, companies are growing faster than ever thanks to IT. Servers, networks, operating systems, databases, etc. While it's possible, it's hard to imagine an enterprise without the support of devices and software. And just as in the past paper documents were physically protected from destruction, prying eyes, so today we make
Managing a business nowadays is almost impossible without using advanced information technologies. One of the most popular tools in this category is the SAP ERP system. It significantly simplifies running a company and helps management make decisions, which in turn gives managers the ability to work efficiently.
Through careful analysis and extrapolation of report file sizes, we were able to keep the amount of reported data at a reasonable level. This process included a detailed analysis of the types of data recorded and their growth patterns over time.
To accurately estimate migration times, we conducted intensive and repeated migrations of document samples. This hands-on approach allowed us to gather real data on transfer speeds and potential bottlenecks, providing a solid basis for our estimates. This process was crucial to understanding the real-world conditions under which the
In a recent project, we conducted a comprehensive analysis of document versions in the source system, examining their number, volume and number of versions per document. Our investigation revealed numerous documents with hundreds of versions, including cases with more than 800 versions per document. Often each version stored was several hundred in size
From January 2025, Polish entrepreneurs will have to face a new legal obligation - the introduction of the Single Control File for corporate income tax, or JPK CIT. In this article, we will take a look at what the CIT JPK is, what the consequences will be for entrepreneurs.
In today's dynamic business environment, one of the key tools that has revolutionized the way businesses report their financial and accounting data is the Single Audit File (PL Jednolity Plik Kontroln JPK).
Backups are an exact copy of our organization's most important data. Such backups should be kept off the affected system - so that a potential failure or attack does not deprive us of access to all our data.
Managing a business nowadays is almost impossible without using advanced information technologies. One of the most popular tools in this category is the SAP ERP system. It significantly simplifies running a company and helps management make decisions, which in turn gives managers the ability to work efficiently.
You may already know that as of SAP 7.40 SP8, you can use SAP security policies (SECPOL) to define user-specific security parameters, as opposed to system profile values.
SAP HANA is the concept of fast access to in-memory data. It allows for the analysis of large, often unaggregated amounts of data, much faster than other databases. The way data is handled in SAP HANA is quite different from what we're used to with SAP NetWeaver. It has
Business doesn't like chaos and hates uncertainty Roles, permissions and authorizations in SAP is a river topic that we have covered several times. We've written about the dangers that arise from a lack of conceptualization of authorizations, poorly managed authorization procs and the associated risks to the organization. Today, in
In a recent project, we conducted a comprehensive analysis of document versions in the source system, examining their number, volume and number of versions per document. Our investigation revealed numerous documents with hundreds of versions, including cases with more than 800 versions per document. Often each version stored was several hundred in size
At the conference on SAP Security - Tips for Security, I shared with you the knowledge I've gained from both SoD and authorizations reorganization projects and daily tasks in Managed Services. For those of you who could not attend the conference, we have prepared a brief summary.
SAP is secure in itself. However, it is up to the customer's actions to take care of data security issues. In this particular context, it is impossible to ignore the inventory benefits of dedicated SAP Security tools.
Backups are an exact copy of our organization's most important data. Such backups should be kept off the affected system - so that a potential failure or attack does not deprive us of access to all our data.
You may already know that as of SAP 7.40 SP8, you can use SAP security policies (SECPOL) to define user-specific security parameters, as opposed to system profile values.
SAP HANA is the concept of fast access to in-memory data. It allows for the analysis of large, often unaggregated amounts of data, much faster than other databases. The way data is handled in SAP HANA is quite different from what we're used to with SAP NetWeaver. It has
Business doesn't like chaos and hates uncertainty Roles, permissions and authorizations in SAP is a river topic that we have covered several times. We've written about the dangers that arise from a lack of conceptualization of authorizations, poorly managed authorization procs and the associated risks to the organization. Today, in
Regardless of the size of the company, document flow is the foundation of effective and efficient management. The effectiveness of decision-making and daily operations depends on how documents are shared. An Electronic Document Workflow is a tool that organizes and streamlines the document management process within a company.
The only job of IES is to extract data from documents and send it back to SAP, which basically means cutting down on data entry work and automating the process. Unlike the previous OCR systems dedicated to VIM (ICC – Invoice Capture Center).
Due to the lack of universality of good solutions for this area, workflow processes evolve very slowly. Moreover, they most often result from internal attempts to improve the process. Nevertheless, awareness of the needs in the area of better document control is definitely growing. It is dictated not only by changing business requirements,
The years 2022 and 2023 were revolutionary for invoice exchange also in Poland. This is all due to a new regulation that introduced the National e-Invoice System (KSeF). What is KSeF? It's a central government system designed to facilitate the electronic exchange of invoices between business entities.
ECM (Enterprise Content Management) systems, or information resource management systems, are becoming more and more common in enterprises, and their users are increasing in proportion to the growing amount of content that enterprises handle. The mass digitization of documents, has not only made it possible to speed up hitherto analog processes, but has provided entirely new opportunities.
In today’s digital age, collecting vast amounts of data has become common for organizations across various sectors. One frequently discussed issue is how to effectively manage this data to ensure smooth operations. This is where data archiving in the SAP system plays a key role.
Gartner reports that from 2026 (the clock is ticking), 90% of new installations offered by SAP will be on the Rise with SAP model (hereafter ‘RWS’). The Rise with SAP model is a cloud service which, as far as it goes, is nothing more than ‘regular S/4’ (only that in the cloud),
SAP software is a widely used technology around the world, utilized by various businesses, huge corporations, and even small companies. SAP has clients in over 180 countries. It's pretty pricey software because it comes with a range of costs, including fees for named user licenses.
Answering the question posed in this way, the answer is simple - no. But incomplete, because simply no system will ever be secure. On the other hand, it is not that we cannot strive for security - quite the opposite. It all boils down to risk management, its acceptance, but above all
SAP software is a widely used technology around the world, utilized by various businesses and corporations, whether small or large. However, purchasing and implementing SAP software comes with huge expenses for licenses. Blocking accounts or deleting them doesn't always help reduce costs.
The following post contains a synopsis of the work carried out for one of SAST's clients, the main core of which was the optimization of authorization and user access was also implemented remodeling of the authorization concept.
It is worth acknowledging that migration to S/4 HANA gives customers not only a new landscape and new functionalities, but also a new price list for SAP services and products.
Today, we would like to highlight a very important issue in the area of SAP authorization security. Besides one-off role reorganization projects and SOD, maintaining the access concept developed during the project and the administrative-process order in roles is equally crucial. How can we prevent our post-project assumptions from getting off track?
Today, companies are growing faster than ever thanks to IT. Servers, networks, operating systems, databases, etc. While it's possible, it's hard to imagine an enterprise without the support of devices and software. And just as in the past paper documents were physically protected from destruction, prying eyes, so today we make
Managing a business nowadays is almost impossible without using advanced information technologies. One of the most popular tools in this category is the SAP ERP system. It significantly simplifies running a company and helps management make decisions, which in turn gives managers the ability to work efficiently.
Through careful analysis and extrapolation of report file sizes, we were able to keep the amount of reported data at a reasonable level. This process included a detailed analysis of the types of data recorded and their growth patterns over time.
To accurately estimate migration times, we conducted intensive and repeated migrations of document samples. This hands-on approach allowed us to gather real data on transfer speeds and potential bottlenecks, providing a solid basis for our estimates. This process was crucial to understanding the real-world conditions under which the
In a recent project, we conducted a comprehensive analysis of document versions in the source system, examining their number, volume and number of versions per document. Our investigation revealed numerous documents with hundreds of versions, including cases with more than 800 versions per document. Often each version stored was several hundred in size
From January 2025, Polish entrepreneurs will have to face a new legal obligation - the introduction of the Single Control File for corporate income tax, or JPK CIT. In this article, we will take a look at what the CIT JPK is, what the consequences will be for entrepreneurs.
In today's dynamic business environment, one of the key tools that has revolutionized the way businesses report their financial and accounting data is the Single Audit File (PL Jednolity Plik Kontroln JPK).