Join us as we take a deep dive into the highlights of SAP Asset Performance Management 2308, including new features from 2306 and 2307.
We've introduced new ways for administrators to define custom attributes for indicators.
You can now add your own identifiers, such as the external sensor ID, to an indicator and you can enter variables which can be used to derive an indicator value.
Characteristics already defined in our connected S/4 system with data type String (CHAR), Numeric (NUM), or Date (DATE) can be added as an attribute for the indicators.
Ultimately, you can use custom attributes in countless ways as per your own requirements because they are just a key value store related to a certain indicator.
What's more, we’ve extended Public APIs to enable us to Get, Create, Update, and Delete custom attributes and values. Watch the video to find out more.
When you're exploring your indicator chart, it’s now much easier to track the trends and patterns of indicator values by simply overlaying alerts on the indicator chart.
Alert Overlays in the Indicator Chart
To display the alerts simply toggle on the alert visibility in the settings and you can see the latest 100 alerts
You can instantly see the connection between alerts and indicator trends, making it much easier to analyze indicator trends in relation to specific alerts that occurred.
You also have the flexibility to filter the alerts based on alert type, severity, and status. This allows you to deep dive into precisely what you need to see, enabling you to make informed decisions with confidence. Watch the video to find out more.
This feature introduces versioning for thresholds in the indicator chart.
This is particularly useful if you want to select a long time frame to view indicator trends and alerts and solves the confusion that used to arise if historical alerts appeared to be in the normal range because the critical threshold had at some point been raised.
This historical context helps you see if threshold violations are isolated incidents or part of a larger pattern, helping you make more informed decisions about how to address them. Watch the video to find out more.
FMEA is a systematic procedure to identify the potential failure modes, their causes and effects on a technical object. You can now use the FMEA Assessment application to create a new FMEA assessment on a technical object.
We've introduced new filters (object type, authorization group and planner group) to filter technical object synchronization between SAP ERP and SAP APM. This improves the management of technical objects.
The SAP Asset Performance Management system filters out the technical objects that are set with status "Deletion flag (DLFL)" and "Deletion Indicator (DLT)" only during the initial load.
For more information, see the SAP Help Portal or watch this video
You can manually trigger delta update of master data entities at any point of time instead of waiting for the default sync period, by using the Sync Master Data option. You can also trigger configuration data updates manually using the Sync Configuration Data option.
Moreover, customers can now easily access Integration Monitor logs after performing manual synchronization. Simply click on the Refresh button to view the latest logs and check the synchronization status.
Organizations are extremely focused today on ensuring that their company and personnel data is always secure. Hence, data privacy and protection has become one of the most important topics. For SAP, the security of Customer’s data is extremely important.
SAP Asset Performance Management (APM) is using various tools and techniques to ensure that the Customer’s data in the Cloud is always protected. By default, the Customer’s tenant data is encrypted using standard techniques available in HANA. This is the standard offering of SAP Asset Performance Management.
For Customers with the highest security requirements, we are introducing additional security feature in the application: Customer-Controlled Encryption Keys.
With the Customer-Controlled Encryption Keys, the Customer is in full control of the data. As the name suggests, the encryption key used is not provided by SAP but is instead managed by the Customer and makes it available to APM for encryption during the subscription process. SAP will not have access to the Customer’s data with this approach. Watch this video to find out more.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
User | Count |
---|---|
7 | |
4 | |
3 | |
2 | |
2 | |
2 | |
1 | |
1 | |
1 | |
1 |