At the core, SAP HANA is a relational database management system (RDBMS). It combines OLAP and OLTP processing into a single in-memory database – eliminating disk bottlenecks and offering groundbreaking performance. This ACID-compliant, in-memory columnar database stores compressed data, offers parallel processing across multi-processor cores, and supports single instruction multiple data (SIMD) commands.
Stop using yesterday's data to make today's decisions. With SAP HANA in-memory database software, you can run advanced analytics alongside high-speed transactions – and get accurate, up-to-date responses in a fraction of a second. The in-memory database eliminates pre-defined aggregates, materialized views, and data duplication between operational and decision support systems. So, the real-time data you need is at your fingertips – 24/7.
BA Insight’s SAP HANA Connector is built upon industry standard database access methods, so it can equally support databases from other systems such as Oracle, MySQL, and IBM DB2.
The SAP HANA Connector honors the security of the source database and provides both full and incremental crawls so that users have the latest information available to them all of the time. It indexes content from SAP HANA into Azure, Elastic, SharePoint Online and SharePoint 2016/2013, surfacing it through BA Insight’s SmartHub to provide users with integrated search results.
With SAP HANA, all your transactional and analytical data can live in a single database. This means you have access to the exact data you need in real-time – all the time.
Our SAP HANA Connector is standard, off-the-shelf software that addresses the following requirements:
Works with all types of data.
Works with custom tables, documents, attachments, and BLOB data.
Indexes every desired item with a very high throughput. Many SQL databases have millions of rows, making high throughput critical to the success of the implementation.
Minimizes the impact on the source system through views or stored procedures as necessary, ensuring no impact to its performance.
Only surfaces the content that users are permitted to see, even if the security configuration is custom designed.
The source system retains the master information and the search index has only a representation (pointers). If applicable to the database being crawled, users click on a search result and are taken to their original item or document.