Prashanth Southekal

Prashanth Southekal is the co-founder and director of Catyeus, a Calgary-based software engineering solution provider for managing COTS, customized COTS, and custom software applications. He brings more than 15 years of SAP program management and architecture experience from companies such as Accenture, SAP AG, and General Electric. He is the author of the book A Measurement Framework for Software Projects, and is a frequent speaker at leading research conferences and industry forums.

ARTICLES

10 Key Steps for Empowering SAP Project End Users

Giving project end users a stake in SAP project implementations offers some great benefits for the business. Despite the fact that every SAP project is context sensitive, there are 10 main steps, based on five vital parameters — system, solutions, data, process, and people (roles) — that hold the key for empowering the SAP project end user.
Read More

BOOKS

Project Management: Pitfalls to Avoid, Best Practices to Follow

Project Management: Pitfalls to Avoid, Best Practices to Follow (Print)

$89.95

Implementing functionality in an SAP system always involves more than just the technology. As the 12 authors in this anthology show, the accompanying changes in business processes need just as much attention.

This collection of SAP Professional Journal articles shares their advice based on their many years of experience.

View
Project Management: Pitfalls to Avoid, Best Practices to Follow

Project Management: Pitfalls to Avoid, Best Practices to Follow (Electronic + Print Bundle)

$99.95

Implementing functionality in an SAP system always involves more than just the technology. As the 12 authors in this anthology show, the accompanying changes in business processes need just as much attention.

This collection of SAP Professional Journal articles shares their advice based on their many years of experience.

View
Project Management: Pitfalls to Avoid, Best Practices to Follow

Project Management: Pitfalls to Avoid, Best Practices to Follow (Electronic Editions)

$79.95

Implementing functionality in an SAP system always involves more than just the technology. As the 12 authors in this anthology show, the accompanying changes in business processes need just as much attention.

This collection of SAP Professional Journal articles shares their advice based on their many years of experience.

View

Popular Chapters

View More
  • Chapter 7: Phase Four: Transition

    In the final phase, transition, we go through what you can expect at go-live, followed by lengthy discussions regarding service level agreements, operations process training, and transition to cloud operations. We talk about intricacies of system stabilization and monitoring. Finally, we explore the options for business continuity and security

    Read More
  • Chapter 6: Phase Three: Build

    In the third phase, build, we walk through developing proofs of concept for your project. The chapter discusses how to take advantage of a provision-shared infrastructure, as well as strategies for building and testing that infrastructure. There is an examination on how to build and mitigate databases and applications, as well as planning the phase cutover. It also looks at automated provisioning and automated services.

    Read More
  • Chapter 5: Phase Two: Model

    The second phase of moving SAP to the cloud, model, contains an overview of the second half of onboarding to the cloud. It examples infrastructure requirements and design and walks the reader through the process of developing a workload analysis. The chapter discusses application and business process discovery as well as operational run books and migration strategy.

    Read More
View More

Do you #LearnLikeAnInsider?

See what it means to redefine reading and start to #LearnLikeAnInsider today.

insiderBOOKS Video

From The Blog

  • Encryption

    The previous chapters [of SAP in the Cloud: Security Essentials] discussed how cloud providers can prevent an attacker from accessing your data. But what happens if an attacker does gain access? Does this mean it’s game over, data’s stolen, start running damage control? Not necessarily. This is where encryption can help you. In this chapter excerpt, we’ll cover what encryption is and how you can use it to protect your cloud-based SAP system.

    Read More