In the IT world, especially within industries like food and beverage, we constantly face the challenge of building enterprise resource planning (ERP) systems that meet unique business needs without overcomplicating operations. As Shiv Kaushik highlights in his Forbes article, finding the right balance between customization and standardization is crucial for ERP success. Too much customization can create long-term issues, while an over-reliance on out-of-the-box solutions may limit business flexibility. Kaushik stresses the importance of a hybrid approach: “configure-first, customize-when-necessary.” This methodology allows IT teams to leverage the flexibility of configuration tools within modern ERP platforms while avoiding the pitfalls of excessive customization. A focus on standardizing core processes, while customizing only when absolutely necessary, reduces complexity, minimizes upgrade costs, and ensures smoother future integrations. For IT professionals, this means conducting thorough business capability assessments to distinguish between core differentiators that require customization and commodity functions that can be managed through standard ERP modules. By leveraging industry-specific ERP solutions and configuration tools (such as role-based dashboards and low-code platforms), organizations can accelerate implementation and avoid the technical debt that often accompanies custom-built systems. Kaushik also emphasizes the value of strong governance, including continuous oversight and iterative improvements post-implementation. This ensures systems evolve alongside the business without unnecessary bloat. Ultimately, the key takeaway for IT professionals is this: balancing flexibility with control is critical to achieving an ERP system that’s both scalable and future-proof.

 

For Full Article, Click Here

Intuitively you may assume that you can access scheduled processes in the Lawson Process Server Administrator main toolbar:

This becomes more frustrating because you would assume it would be under “Scheduling”. After all, this is supposed to be Infor’s convenient move away from the clunky Rich Client app.

 

To access your existing scheduled processes, you need to go to the top right where your user is and click there and select “My Actions”, NOTE: you’ll need to be logged in as the system user

This will take you to your Scheduled Actions as show below. Double click the Name to modify the schedule and you’re set after saving!

As ERP adoption accelerates across industries, integration has become a silent risk. In a recent article on OneIndia, writer Sathish Raman explores the hidden pitfalls of enterprise resource planning (ERP) projects—and how Aditya Ramaswamy, a leading enterprise architect, is helping organizations rethink their integration strategies. Traditional ERP integrations—often rigid and schedule-based—struggle with evolving business needs, leading to payroll errors, compliance issues, and data delays. Ramaswamy champions a shift to event-driven architectures, enabling processes like payroll and GL reporting to run based on system state, not fixed schedules. This approach has cut processing times from over two hours to under 15 minutes. Ramaswamy has also engineered a single payment connector that replaced six separate banking workflows for a major healthcare network, boosting automation and audit readiness. His solutions address niche challenges too, like multi-position payrolls and grant-based accounting—critical in regulated sectors. Another standout: his automated documentation tool, which generates handover materials from integration metadata, solving a common pain point in ERP sustainability. These innovations have prevented over 100,000 payroll failures and are now being reused across industries as integration best practices. The bottom line, Raman notes, as ERP systems evolve, integration must move from being an afterthought to a strategic asset—built on flexibility, traceability, and resilience.

 

For Full Article, Click Here

Here’s how to update IPA to add emails on the following error:

 

WU_Name.ipd

 

First, load the IPA and go to create process that checks for file, click on Error tab, copy TO, paste in CC but change to ManagerNoticiation.

What should happen on Error? STOP Process. (it is already on Stop Process so it will notify)

 

Next, click on the File tab then SAVE the changes.

 

Then Upload it

 

Next, go back to the Configuration Manager

 

Then go to Main and create or update ManagerNotification to include the email address(s)

Finally, look at process version

 

 

 

Files are essential to modern business operations, yet new research reveals they’ve become a major security vulnerability—especially amid rising insider threats and the growing impact of AI. In his recent Forbes article, cybersecurity reporter Tony Bradley explores the growing threats to file security in the AI-driven enterprise landscape. His article highlights findings from the 2025 State of File Security Report by the Ponemon Institute—revealing that 61% of organizations experienced file-related incidents tied to insider actions, costing an average of $2.7 million per breach. Files are most vulnerable when they’re uploaded, transferred, or shared externally, yet these are the moments when security is weakest. Common gaps include inconsistent enforcement of encryption, malware scanning, and access controls. Insiders, both negligent and malicious, are now the top threat. Contributing factors include the rise of generative AI, complex IT environments, and fragmented security tools. Attackers are also leveraging AI to hide malicious prompts in documents, pushing organizations to rethink their defenses. Traditional threats like macro-based malware remain a concern, demanding layered security strategies such as content disarm and reconstruction (CDR) and multi-scanning. Yet, Bradley notes fewer than half of organizations can detect file threats within a day—an unacceptable delay in the age of automated attacks. To close the gap, companies are shifting from point solutions to integrated platforms with centralized visibility and consistent policy enforcement across email, cloud, and storage systems. Ultimately, file security is not just a technical issue—it’s a strategic business risk. Organizations that treat it as such—investing in technology, governance, and employee training—will be best positioned to protect sensitive data and maintain trust in an AI-powered world.

 

For Full Article, Click Here

 

Data lakes offer a powerful way to store massive volumes of structured and unstructured data—from IoT sensors to AI-generated output. In his recent Forbes article, technology journalist Adrian Bridgwater explores the benefits and risks of this approach, warning that without proper controls, data lakes can become dangerous waters. With everything flowing into one place, a single access point can expose sensitive data—especially if legacy systems or poorly tracked databases are involved. Add in AI tools that indiscriminately consume data, and you risk exposing personally identifiable information (PII) or duplicating flawed data across systems.

To avoid these “data lake crocodiles,” Bridgwater advises organizations to consider the following:

  • Structure the lake using models like Microsoft’s Medallion Architecture to organize data by quality and sensitivity.
  • Mask or synthesize data for development and testing—keeping real customer data safe while enabling realistic scenarios.
  • Segment environments, creating separate, secure “shallow ends” for non-production use.
  • Control AI access to ensure it doesn’t pull or reveal data it shouldn’t.

Data lakes are valuable tools—but only when managed properly. By combining thoughtful architecture, strong governance, and safe testing practices, businesses can unlock the full potential of their data—without becoming prey to lurking risks.

 

For Full Article, Click Here

Follow these steps below to learn how to Access and elect an older IPA Process Version History:

  1. You can access via Rich client or web based Process Server Administrator:
    • Process Server Administrator – configuration >> Process Definitions >> User Defined Processes
    • Rich Client – Process Server Administrator >> Configuration >> Process Definitions >> User Defined Processes

 

  1. Double click the process:
  2. Under Process Versions >> Right Click the version you want >> Make Current Version

 

You’ll also see new versions here once uploaded from IPD.

 

Migrating to the cloud can be tricky for small businesses, especially with limited budgets and IT resources. But with the right cloud partner, the process can be smoother and more efficient. According to a recent article on BizTech Magazine, here’s how to simplify your cloud journey:

  1. Start with Strategy and Design. Work with a cloud expert to figure out your business goals and where you are in your cloud journey. You’ll want to compare the costs of different options—like staying on-premises, going hybrid, or fully migrating to the cloud—over 3, 5, and 7 years. This will help you understand when you’ll start seeing cost savings.
  2. Prioritize Security and Governance. Security is a must. Your cloud strategy should include protecting data, ensuring secure access, and staying compliant with standards. A good partner can help you design a secure plan and implement it, keeping everything safe as you move forward.
  3. Plan Your Migration and Modernization. When it’s time to move your apps, you’ll need a solid plan. Group interdependent apps together, set up a secure cloud environment (called a “landing zone”), and decide how to modernize each app. Some may need minimal changes, others a complete overhaul. A skilled partner can guide you through this process.
  4. Focus on FinOps and Ongoing Operations. It’s essential to manage cloud costs effectively. Set up a cloud center of excellence (CCOE) to oversee the cloud strategy long-term. And work with your partner to develop a FinOps framework to optimize costs from start to finish.

Migrating to the cloud doesn’t have to be overwhelming. By partnering with the right experts and focusing on strategy, security, migration, and cost management, small businesses can make the most of their cloud investment and set themselves up for success.

 

For Full Article, Click Here

If you upload the ACH file generated by PR160 to your bank, chances are you will need to fix the formatting after your upgrade to version 10.  Some banks require the 94-character fixed width format, rather than the sequential format that is the Lawson default.  Here are the steps to update your ACH file format.

  1. In LID, type in the command workdef
  2. Search for your product line and the File name TAPE

  1. File Media should be “Tape”
  2. The default “Value” for file name is PR160-ACHTAPE. If you need to drop the file under a custom name, you will enter it in the “Value”.  If you want to keep the default, leave that field blank.
  3. Click enter twice to save your changes
  4. The PR160-ACHTAPE file is defaulted to save in the user’s print directory. If you want it saved somewhere else, you can supply the filename on the PR160 job.  If you supply a file path on PR160, make sure the file name matches the “Value” field in workdef.

  5. In Lawson Security, make sure that your Batch role has access to the cnvexp development token

 

Effective data governance ensures your data is trustworthy, usable, and compliant—ready to support real business decisions. The challenge? Figuring out how to actually make that happen. Todd Slind, VP of Technology at TRCA, shares an article on Fast Company that makes a powerful case: to succeed with AI, businesses must radically rethink how they approach data governance. Traditional, top-down governance models—designed to control how data is collected, stored, and accessed—are no longer effective in today’s fast-paced, data-rich environments. The problem? These rigid frameworks don’t reflect how data is actually created and used. Frontline employees, field teams, IoT systems, and AI tools like ChatGPT are now generating massive volumes of valuable data—often more than what’s centrally managed. These users aren’t just data consumers; they’re creators and curators.

To adapt, organizations need to shift to a user-empowered governance model. Instead of dictating how data should be handled, leaders should ask:

  • What data do users find most valuable?

  • Where are the quality issues?

  • How can teams be supported in organizing and improving the data they generate?

This bottom-up approach means involving employees across all levels—not just those at desks—in shaping governance policies. Gathering feedback on how data is used helps identify what’s truly valuable and where governance guardrails are needed. Slind concludes that by democratizing data governance, organizations can improve data quality, increase its business impact, and build a more agile, AI-ready foundation.

For Full Article, Click Here