Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of rehanzaidi

rehanzaidi

Send rehanzaidi an email

Latest from rehanzaidi

  • Comprehend the SAP Authorization concept with these code samples
    Developer

    Comprehend the SAP Authorization concept with these code samples

    Whether you're a developer, a consultant, or the user of a SAP system, you'll eventually come across issues related to authorization. This article provides some handy code samples to help you get acquainted with authorization in SAP.

    rehanzaidi
    Published:  December 12, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:48 AM PDT Read More See more Developer
  • Understanding key aspects of the SAP locking mechanism
    Enterprise Software

    Understanding key aspects of the SAP locking mechanism

    There's nothing worse than having two users changing the same data simultaneously. The results can be problematic at best and disastrous at worse. SAP R/3's locking mechanism can protect data when more than one user is accessing it.

    rehanzaidi
    Published:  September 4, 2003, 12:00 AM PDT Modified:  September 18, 2013, 1:28 AM PDT Read More See more Enterprise Software
  • Unleash the power of macros in ABAP
    Developer

    Unleash the power of macros in ABAP

    Like many programming languages, SAP's ABAP makes liberal use of macros. Here are some scenarios that illustrate when using macros in SAP is the best choice.

    rehanzaidi
    Published:  July 10, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:45 AM PDT Read More See more Developer
  • How event-driven responses are triggered in SAP Business Workflow
    Developer

    How event-driven responses are triggered in SAP Business Workflow

    SAP Business Workflow allows you to seamlessly integrate various business processes, enabling you to carry out multiple tasks at the correct moment. Event handling makes this all happen.

    rehanzaidi
    Published:  April 18, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:41 AM PDT Read More See more Developer

TechRepublic Premium

  • TechRepublic Premium

    Employee privacy policy

    PURPOSE This policy describes the organization’s employee privacy guidelines and outlines employee privacy expectations. From the policy: POLICY DETAILS The organization’s IT equipment, services and systems are intended for business use only. However, the organization acknowledges that staff, consultants and volunteers occasionally require opportunities to make or receive personal phone calls, access personal email, utilize ...

    Published:  March 19, 2023, 12:00 PM EDT Modified:  March 20, 2023, 4:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Security response policy

    PURPOSE The purpose of this Security Response Policy from TechRepublic Premium is to outline the security incident response processes which must be followed. This policy will assist to identify and resolve information security incidents quickly and effectively, thus minimizing their business impact and reducing the risk of similar incidents recurring. It includes requirements for both ...

    Downloads
    Published:  March 19, 2023, 12:00 PM EDT Modified:  March 20, 2023, 4:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    End user data backup policy

    PURPOSE This policy from TechRepublic Premium provides guidelines for reliable and secure backups of end user data. It outlines the responsibilities of IT departments and employees to identify tasks and action items for each group. The policy can be customized to fit the needs of your organization. From the policy: IT STAFF RESPONSIBILITIES IT staff ...

    Published:  March 16, 2023, 12:00 PM EDT Modified:  March 17, 2023, 5:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Electronic communication policy

    This policy from TechRepublic Premium provides guidelines for the appropriate use of electronic communications. It covers topics such as privacy, confidentiality and security; ensures electronic communications resources are used for appropriate purposes; informs employees regarding the applicability of laws and company policies to electronic communications; and prevents disruptions to and misuse of company electronic communications ...

    Published:  March 16, 2023, 12:00 PM EDT Modified:  March 17, 2023, 3:00 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice