Below is a cheat sheet for batch status numbers & their descriptions:

There are several use cases for querying the QUEUEDJOB table in GEN in order to get batch job details, such as status and run times.  The status is stored as a numeric value, not the actual status that is seen in the GUI. It can also be useful to be able to map it to the description.  Here are the batch job status numbers with their descriptions:

# 0 – Running
# 30 – Waiting
# 31 – Waiting Step
# 32 – Waiting On Time
# 33 – Waiting Recovery
# 34 – Needs Recovery
# 35 – Invalid Parameters
# 36 – Queue Inactive
# 37 – On Hold
# 60 – Recurring Skipped
# 61 – Recovery Deleted
# 62 – Cancelled
# 63 – Normal Completion


By now everyone knows the massive IT outage that occurred at the end of the last week caused by a CrowdStrike update that crashed millions of Windows systems.  While not a ransomware or cyber attack, critical services and business operations were hugely disrupted. The outage, that occurred on July 19th, caused many windows systems failing and revealing the infamous blue screen of death (BSOD). Not only were services and operations impacted, but it also opened our eyes to the vulnerabilities businesses can endure. IT expert Sean Michael Kerner shares an article on TechTarget explaining the outage, the businesses affected, and recovery times for businesses to get “back to normal”.

What caused the outage? The CrowdStrike Falcon platform was the main culprit. Widely used by organizations big and small using Microsoft Windows, the the flaw in CrowdStrike Falcon was inside of a sensor configuration update. With channel file 291, CrowdStrike inadvertently introduced a logic error, causing the Falcon sensor to crash and, subsequently, Windows systems in which it was integrated.

What services were affected? Microsoft estimated that approximately 8.5 million Windows devices were directly affected by the CrowdStrike logic error flaw. That’s less than 1% of Microsoft’s global Windows install base. Kerner lists the following services affected by this outage:

Airlines and airports – This outage caused grounded flights and significant delay and cancellations around the world.

Public transit – Public transit in multiple cities was affected in major US cities and globally.

Healthcare – Hospitals and healthcare clinics around the world faced significant disruptions in appointment systems, leading to delays and cancellations.

Financial services – Multiple payment platforms were directly affected, and there were individuals who did not get their paychecks when expected.

Media and broadcasting – Multiple media and broadcast outlets around the world, including British broadcaster Sky News, were taken off the air by the outage.

How long will it take businesses to recover from this outage? CrowdStrike was able to identify and deploy a fix for the issue in 79 minutes. Despite immediately finding and deploying  a fix for the issue, the recovery process for businesses is complex and time-consuming. Kerner notes that among the issues is that, once the problematic update was installed, the underlying Windows OS would trigger BSOD, rendering the system inoperative using the normal boot process. “Some businesses were able to apply the fix within a few days. However, the process was not straightforward for all, particularly those with extensive IT infrastructure and encrypted drives. The use of the Microsoft Windows BitLocker encryption technology by some organizations made it significantly more time-consuming to recover as BitLocker recovery keys were required.” It could potentially take months for some organizations to entirely recover all affected systems from the outage.
How can businesses be better prepared for tech outages?
While it wasn’t a cyberattack, the CrowdStrike Windows outage highlighted the vulnerabilities of society’s heavy reliance on technology. Kerner shares a few tips that businesses can do to be better prepared for tech outages, including the following.

Test all updates before deploying to production. “It has been a best practice for years to allow automated updates to ensure systems are always up to date. However, the CrowdStrike issue laid bare the underlying risk with that approach. For mission-critical systems, testing updates before deployment or having some form of staging environment before pushing updates to production might help to mitigate some risk.”

Develop and document manual workarounds. “Manual workarounds ensure critical business processes can continue even when technology fails. This approach was common before the digital age and, in the event of outage, can serve as a fallback. Documenting and practicing manual procedures can help mitigate the effect of outages, ensuring businesses can still operate and serve their customers, even during an outage.”

Perform disaster recovery and business continuity planning. “Outages happen for any number of different reasons. Having extensive disaster recovery and business continuity practices and plans in place is critical. Part of that effort should include the use of redundant systems and infrastructure to minimize downtime and ensure critical functions can switch to backup systems when needed.”


For Full Article, Click Here

Jobs is in needs recovery with error

tsStoreDBRec error is Record was modified or deleted since your retrieval (131). Additional information is 100. Additional Text is: ModifySqlRec

There are 3 bad invoices in APINVOICE and APPAYMENT with no distribution records in APDISTRIB.

The 3 bad records are as follows



In SQL Manger, query the APINVOICE and APPAYMENT files for any invoices with bad name format as below:

Verify these records do not have any distributions records in APDISTRIB. If not, Delete these bad invoices.



Run commit to commit the changes

Go into lawson and recover the job




Two essential tools important to the manufacturing industry for decades are enterprise resource planning (ERP) and supply chain management (SCM). ERP and SCM provide visibility into production, scheduling, inventory, quality control, forecasting, shipping and logistics management and more. Robert Kramer, VP & Principal Analyst at Moor Insights & Strategy, shares an article on Forbes that explores recent developments in ERP and SCM—including automation, security, artificial intelligence (AI) and machine learning (ML), smart factories and more—and the impacts these have on manufacturers amid the revolutions underway in data and AI. By combining advanced automation, he states, AI and other innovations such as smart factories with human skills and ingenuity, modern ERP and SCM systems can help organizations optimize production, improve efficiency and create a more responsive and sustainable manufacturing environment.


Effects Of ERP And SCM On Manufacturers

Kramers states that modern ERP and SCM systems centralize, govern, secure, analyze and utilize data across all operational aspects of an enterprise – all things that are fundamental to any manufacturer’s success, in both tactical and strategic dimensions. Tactically, ERP and SCM systems enhance operational efficiency. Strategically, ERP and SCM systems unify business information to enable a complete view of operations. Bellow are snippets of Kramer’s reports on the impact ERP and SCM have in the manufacturing space.

Data Management And AI Essentials.  “AI and machine learning can significantly enhance ERP and SCM systems in manufacturing by improving production control, inventory management and other functions. AI automates routine tasks and enhances processes such as scheduling and maintenance. ML adds value by predicting equipment failures, minimizing downtime and maintenance costs and generating accurate demand forecasts.”

Influence Of Industry 4.0 And 5.0. “Industry 4.0 focuses on automation and connected enterprises (including smart factories) to optimize production, improve operations and enhance product quality. It does this by integrating digital technologies such as IoT, AI and advanced robotics. Industry 5.0 emphasizes collaboration between humans and machines to create personalized and sustainable production processes. This approach seeks to balance technological advancements with human and environmental considerations.”

Smart-Factory Technology Impacts Manufacturing. “When considering modern ERP and SCM systems for manufacturers, the concept of the smart factory often plays a role. A smart factory is a digitized and connected production facility that leverages advanced technologies such as IoT sensors, AI, machine learning, robotics, analytics and cloud computing to optimize manufacturing processes. The goal is to enhance efficiency, flexibility and productivity through real-time monitoring, automation and the other capabilities of these advanced technologies. By integrating smart-factory principles with modern ERP and SCM systems, organizations can further improve operations and product quality while reducing costs.”

Manufacturing, like any industry, continues to evolve to meet changing market demands, This makes modern ERP and SCM systems crucial for global operations and supply chain management. As Kramer discussed, these systems integrate advanced technologies such as AI, machine learning, IoT, automation and smart factories. He notes that cloud-based solutions can provide a unified system with flexibility and scalability, offering benefits such as accessibility, rapid deployment, improved performance and centralized data security.


For Full Article, Click Here

NBA legend Michael Jordan famously said, “You can practice shooting eight hours a day, but if your technique is wrong, then all you become is very good at shooting the wrong way. Get the fundamentals down, and the level of everything you do will rise.” The same can be said for the hospitality industry. At least it is what Joe Vargas, SVP & General Manager, Infor Hospitality believes as he shares an article on about mastering the fundamentals of guest experience. We live in a technologically inspired world and innovation is present in our daily lives. In hospitality, innovative features have the potential to undoubtedly elevate guest experiences. However, Vargas says that hotel executives aiming to close the experience gap must first lay a strong foundation by perfecting core operations. Concentrating on essential elements ensures guest satisfaction and creates a stable infrastructure that supports further technological enhancements. For example, your hotel’s website must balance the traditional guest booking experience before you add flashy bells and whistles. “When it comes to frictionless service,” Vargas notes, “people often recognize the link between technology and guest experience only when tech fails, is slow, or disrupts the process. Guests look for elegantly designed, user-friendly websites, booking engines, and mobile apps, with automation simplifying the check-in process. But, these elements must be supported by technology to ensure speed, convenience, and adequately timed information to enhance the experience.”


Bridging the guest experience gap
When it comes to guest experiences, the margin for error is  very thin. On the other hand, Vargas says that meeting or exceeding guest expectations brings measurable business benefits, and the guest experience gap presents a golden opportunity. By bridging this gap, where technology complements rather than complicates the human element of the guest experience, hotels can unlock new levels of guest satisfaction. Vargas highlights the following strategies for hoteliers to enhance this experience for their properties.

  • Invest in Modern, Unified Technology
  • Empower Your Workforce
  • Deliver Personalized Experiences
  • Create Emotional Connections
  • Proactively Manage and Respond to Feedback

Vargas concludes that mastering the fundamentals with the help of modern hotel technology is the key to ultimate guest experience. “To triumph in the guest experience race, align your experience goals and hotel systems with what truly matters to your guests. When guests feel appreciated, the tangible business benefits include enhanced guest loyalty and capturing a larger share of their spending.”


For Full Article, Click Here



I continue to receive the following error message  when attempting to log into LID:

That indicates a license issue.

so I ran licsta -r  and found the license file is corrupt because it reverted to client 9999.


> licsta -r


Active License Status For Client 9999


License Code/  Active  Licensed  Highest

Application    Users    Users      Use    Expiration Date

———–    ——  ——–  ——-  —————

default                  2         7    Thu Aug 31 13:25:17 2023

PR           2                       Not Licensed

LP           1                       Not Licensed

HR           1                       Not Licensed

un              4       10       13    Sun Sep 17 10:39:42 2023


Run licsta -f and verified the file is corrupt.

> licsta -f

File [E:\lawson\law\system\license] not copied to E:\lawson\law\system\tmplicense] – Error [33]

Unable to Read License File Header – File May Be Corrupted


You will need to request a new software license key and re-install the license file.


Matt Heerey, President of Manufacturing, ECI Software Solutions, shares an article on of data security’s role in this digital age. He states in the article, “for machine shops, compliance with government standards is an evolving challenge. Defense and aerospace manufacturers must adhere to strict standards and documentation procedures, including the DoD’s Cybersecurity Maturity Model Certification (CMMC). Failure to comply with evolving requirements in a timely manner results in severe consequences. This challenge to evolve must be met head-on and with urgency, to anticipate and plan for compliance requirements as manufacturers in the defense and aerospace industries position for success now and in the future.” Many of these regulations require companies to work with national security information to implement aggressive levels of cybersecurity standards based on the type and sensitivity of information. This means they must be able to meet the technological standards that allow them to comply with ever-changing regulations. ” As certification standards continue to evolve, working with outdated tools will become obsolete or hinder progress. Heerey states that the evolving landscape means the requirement of agile solutions. “In order to remain compliant and continue supplying the DoD, job shops must enhance their data security ahead of these rollouts. Manufacturers should focus on leveraging solutions that will integrate with their contractual requirements and CMMC implementation strategy. Cloud-based enterprise resource planning (ERP) solutions can help in a variety of ways, including centralized data management, compliance features, as well as enabling scalability and the ability to manage risk.” Heerey concludes that manufacturers must adopt adaptable, industry-evolving solutions to remain compliant and position themselves for future success, especially as the new CMMC standards are set to be in place Q1 of 2025. “Failing to leverage the technology required,” he notes, “will ultimately be of a higher cost than the technological investment. Secure, agile solutions continue to provide the visibility and compliance that the government requires and serve as a strategic step to set manufacturers up for future success.”


For Full Article, Click Here

Sometime you may have a need to update your LDAP bind connection, such as when the domain controller you are bound to is decommissioned.

To update the LDAP bind connection,

First figure out which service is using ldap bind.  To do that, go to http(s)://<server>:<port>/ssoconfig/SSOCfgInfoServlet.  Make a note of the service name displayed on the page.

Next, log into ssoconfig and export that service:

Now, open the file you just exported.  Update the OVERRIDE attribute to “true”.  Update the “PROVIDER” element to the new server and port.

Next, upload your updated file into ssoconfig.  The syntax is ssoconfig -l <password> <full file path>

For example:

Ssoconfig data is stored in the security cache, so you will need to recycle your system for this change to take effect.

NOTE: If you need to change the credentials for the domain controller, this will be an extra process.  You will need to update the service associated with your LDAP bind.  This is most likely your SSOP_BIND service.  You can look under privileged identities in Lawson Security, check for a “DEFAULT” key associated with your ldap bind user.  That is your LDAP bind service.

To update the credentials for this service, log into ssoconfig and select Manage privileged access to services > Change existing identity.  Enter the service that you noted above.  Enter the correct user DN.  Enter the password.

Recycle Lawson.


Infor recently completed the acquisitions of Albanero, a data migration and management partner, and Acumen, a Revenue Growth Management and highly-specialized consulting company. Per the press release, both acquisitions strengthen Infor’s focus on helping customers understand how to translate the deep industry-centric data within their environment into opportunities to generate greater value and profitable growth. Infor CEO Kevin Samuelson says of the acquisition, “Infor’s strategy remains fiercely focused on helping customers unlock core value drivers within their industry-specific operations. The next wave of innovation is completely data driven and generating real value from it begins with a secure industry-rich data foundation.” Both Albanero and Acumen advance this core strategy by offering customers contextualized meaning to their industry-specific data within their core ERP systems. Moreover, Infor’s acquisition of Acumen and Albanero closed on July 1, 2024. Financial terms are not being disclosed for either acquisition. Albanero founders, Bruce Douglas and Manish Sharma, Acumen founders Nick Ryan and Matt Wills, and employees of both organizations, a total of 160 people, will transition into the Infor organization


For Full Article, Click Here

Today’s fast-paced business environment relies heavily on business systems such as enterprise resource planning (ERP) and is essential for maintaining operational efficiency and keeping a competitive foot in the game. In a paper authored by Jonathon Butler, Vice President of Business Consulting, we see the true cost of system outages and how much we lose outside of financial scopes. The article on ERP Today that discusses this paper notes that financial loss is just the beginning with ERP systems are out of services. “The true cost of such outages, not just in terms of immediate financial losses but also in the broader context of customer satisfaction, brand reputation, and long-term business strategy.”  Butler’s document outlines a three-step approach to managing these risks, beginning with understanding a company’s risk tolerance, followed by a system management health check, and culminating in a comprehensive system health check engagement. QAD offers this engagement and aims to uncover existing risks, identify the gap between current systems and business strategy, and provide actionable insights for improving system health and resilience.


For Full Article, Click Here