Cybersecurity is heading into a make-or-break moment as AI reshapes how attacks are created and launched. Scott Harrell, CEO of Infoblox, shares an article on Fast Company arguing that the traditional, reactive security models simply won’t hold up in an AI-first threat environment.

Harrell points to three trends leaders need to understand now:

  • AI-powered, highly personalized attacks
    Attackers are using AI to study individual organizations and craft custom malware, phishing, and deepfake-driven social engineering campaigns. These attacks are often brand new and designed to evade existing tools, making “detect and respond” approaches too slow. Relying on employees as the last line of defense becomes unrealistic at this level of sophistication.
  • A rapidly expanding attack surface
    IoT devices, aging network infrastructure, and AI systems themselves are becoming prime targets. As AI is embedded deeper into enterprise software, compromised models could behave like insider threats with broad access. Security teams will need to protect not just endpoints, but the AI and infrastructure running the business.
  • Cybercrime-as-a-service goes mainstream
    AI is fueling an underground economy where attackers no longer need deep technical skills. Ransomware-as-a-service, exploit kits, and stolen access marketplaces make advanced attacks easier, faster, and more scalable, blurring the line between casual hackers and organized crime.

Harrell’s message is straightforward: simply adding AI to legacy security tools creates a dangerous illusion of safety. To succeed in 2026, organizations must rethink cybersecurity from the ground up—shifting from reactive defenses to preemptive, adaptive strategies built for AI-driven attackers.

 

For Full Article, Click Here

User is trying to submit a requisition when clicking Special / Service and getting error:

“Requested delivery date cannot be less than today’s date” even though the requested delivery date was not less than today’s date. See workaround below.

  • Workaround: If the user enters the Requesting Location and Requested Delivery Date then clicks the Special / Service button (without entering any other info). It creates the requisition. They then can go into it and modify it, adding all additional information. See example screenshot:

 

NOTE: The above resolution is a workaround, you’ll have to consult with Infor to get this resolved on the application level. Nogalis also offers a team of consultants under a single MSP service plan if this is something you need future support for as we also handle communications through Infor.

 

CTOs (Chief technology officers) are entering a critical year for technology strategy, with AI, automation, and security shaping the landscape for 2026. Dimitar Dimitrov, founder and Managing Partner at Accedia, shares an article on Forbes that outlines actionable insights for technology leaders looking to turn experimentation into measurable impact.

Key trends include:

  • Slower developer hiring & upskilling focus – Demand for AI-literate engineers will outpace supply, forcing companies to invest in internal training and hybrid teams rather than rely solely on new hires.
  • Fixing underperforming AI – CEOs will look to CTOs to stabilize pilots and agents that fail on accuracy or adoption, emphasizing data cleanup, governance, and monitoring outputs.
  • AI-native platforms & domain-specific models – Smaller, AI-augmented teams can achieve more, but must embed security, compliance, and review. Domain-specific models will outperform general-purpose AI in regulated or high-precision workflows.
  • Composable AI agents & orchestration – Small, task-focused agents with clear inputs, outputs, and escalation paths will dominate. Orchestrating multiple agents across workflows unlocks substantial efficiency and automation value.
  • ROI pressure & quantum readiness – Boards demand proof of impact, with some AI budgets expected to slip into 2027 if value isn’t clear. Meanwhile, quantum computing risks require early planning for long-lived, sensitive data.

Dimitrov stresses that 2026 isn’t about chasing every new tool—it’s about disciplined execution. CTOs should prioritize measurable business outcomes, scalable AI orchestration, talent readiness, and long-term security, ensuring AI and automation deliver real, sustainable impact.

 

For Full Article, Click Here

Data integrity has quietly become the make-or-break factor for ERP (enterprise resource planning) success. In his ERP Today article, senior editor Chris Vavra explains why reliable, governed data is now central to delivering on ERP’s promises—from automation and AI to real-time reporting and predictive operations.

As organizations expand their data estates, move to the cloud, and pursue AI-driven insights, unreliable data undermines everything from automation to cross-functional reporting. Vavra emphasizes that ERP transformation works best when the underlying data foundation is coherent, accessible, and governed—without relying on expensive ERP rip-and-replace projects. The challenge is especially clear in manufacturing. Despite decades of ERP investment, many shop floors still depend on paper-based processes and siloed systems. This creates the “Hidden Factory,” where manual work, errors, and delays erode profitability. Without real-time, trustworthy metrics like OEE or downtime analysis, teams end up reacting to problems instead of addressing root causes. Vavra highlights how some organizations are solving this by unifying data across systems using semantic layers and virtualization. One steel manufacturer gained real-time reporting, consistent financials, and executive-level visibility—while avoiding months-long integrations and core ERP changes. Cultural alignment and shared ownership of data were just as critical as the technology itself. The article also points to ERP decommissioning as a key integrity strategy. By archiving historical data from legacy systems into modern, managed platforms, organizations can improve governance, reduce costs, and meet compliance requirements.

The takeaway for ERP leaders is clear: data integrity drives efficiency, trust, and ROI—and achieving it requires both disciplined governance and organizational buy-in.

 

For Full Article, Click Here

Follow the quick steps below to learn how to resolve dbreorg errors.

 

Problem Description:

Executing lasetup with the preview option.

ERROR – failed to uncompress “patch.tar.Z” file.

 

Installation YEAREND126174.preview of YEAREND126174 terminated abnormally (start = 12/20/2023 13:27:01, stop = 12/20/2023 13:27:01).

ERROR – lasetup execution unsuccessful.

lawappinstall PREVIEW YEAREND126174.preview installation completed unsuccessfully at 12/20/2023 13:27:01.

 

Resolution:

To solve the errors, complete the following actions:

  1. First, backup current LUU directory
  2. Create a new blank folder for LUU
  3. Next, move pl program to LUU
  4. Run this command:

perl LUUsetup.pl -c E:\LUU

  1. Next, run dbreorg again
  2. Finally, run activate again and compile

 

This should resolve the dbreorg errors you have.

CES is often associated with consumer gadgets, but CES 2026 told a different story. This year, the spotlight was on real-world enterprise technology—the kind that helps IT teams secure systems, streamline operations, and finally get value from AI.

Security Is No Longer an Add-On
One of the biggest takeaways was how deeply security is being embedded into everything. From AI-driven threat detection to zero-trust device ecosystems and privacy-first edge AI, vendors are addressing the reality that ERP environments now span cloud, on-prem, and edge systems. The message was clear: security has to be built in from day one, not bolted on later.

AI Is Growing Up
AI at CES 2026 wasn’t about flashy demos. It was about execution. We saw AI agents designed to work across ERP, CRM, supply chain, and IT service systems—automating tasks like procurement, maintenance planning, scheduling, and reporting. For IT and ERP leaders, this is the shift from experimenting with AI to actually putting it to work in daily operations.

Data Is Moving Closer to the Action
Edge and embedded AI also stood out. By processing data closer to where it’s created, organizations can reduce latency, improve reliability, and keep sensitive data under tighter control. For ERP environments, that means faster insights, better performance, and fewer integration headaches.

So What Does This Mean for You?
CES 2026 reinforced that modern ERP environments need to be secure, flexible, and ready for AI. It also highlighted a familiar challenge: as new technology comes in, legacy systems and old data don’t magically disappear.

At Nogalis, we help organizations keep their ERP environments stable while preparing for what’s next. Our Lawson and CloudSuite managed services take the day-to-day burden off internal teams, and our APIX application retirement and data archiving solutions help reduce risk, cost, and complexity—without losing access to the data your business still needs. If CES 2026 made you rethink your ERP roadmap, we’d be happy to talk.

To manually run an IPA Workflow, first log into process administrator:

https://<landmark_server>:<web_port>/<product_line>/LpaAdmin/page/ProcessFlowAdministrator

If you get this page, just keep refreshing until the page loads

Go to Scheduling > By Process Definition

If the Process Name isn’t listed, you’ll need to add a trigger

Click the add icon

Select the Process

Work Title is required

Click the save button after selecting a workflow and entering the work title

To run the process, right-click on the Process Trigger, and select “Start”

To view the process update and log, go to Administration > Work Units > Work Units

Double-click the work unit to open the admin panel.  The “Log” tab is the most useful.  It’s best to click “Open” on the log and it will download to a text file.

Cybersecurity is no longer just a technical safeguard—it’s becoming a decisive factor in business survival. At the end of December, Chuck Brooks, Global Thought Leader in Cybersecurity and Emerging Tech, shares an article on Forbes explaining why cyber risk has shifted from an IT issue to a core leadership and governance priority.

Brooks points to the scale of the threat: cybercrime now drives trillions in global losses, while the average data breach costs millions in downtime, legal exposure, and lost trust. As a result, company failure is increasingly tied to cybersecurity failure. The strategic challenge for 2026 is not whether to invest, but how deeply security is embedded into corporate strategy and operational resilience.

Ransomware remains the most disruptive threat, accounting for a large share of breaches and evolving into targeted, multi-layered extortion that disrupts operations even without ransom payments. At the same time, traditional network perimeters are fading. Identity has become the primary security control as stolen credentials and AI-driven phishing dominate attack methods, pushing organizations toward continuous, risk-based identity verification.

Human risk is also growing. Despite years of training, most breaches still involve human behavior, now amplified by AI-enabled social engineering. Brooks argues that effective security cultures focus on measurable behavior change and executive engagement, not just awareness programs.

Supply chain exposure is another board-level concern, as attackers increasingly compromise vendors and software ecosystems. Meanwhile, AI accelerates both defense and attack, making AI governance essential, and quantum computing raises urgent questions about future-proof encryption.

Cybersecurity success in 2026 will be measured by resilience—how quickly organizations can detect, contain, and recover from inevitable attacks.

 

For Full Article, Click Here

AI (artificial intelligence) is moving fast—and the infrastructure behind it is feeling the strain. In a recent Forbes article, senior contributor and  technology expert Jennifer Kite-Powell breaks down how the rapid growth of AI is putting serious pressure on data center infrastructure and the energy grid that supports it. According to a June 2025 Deloitte survey, AI data centers already consume about four gigawatts of power—enough to supply roughly three million U.S. homes. By 2035, that number could skyrocket to more than 120 gigawatts, or over half of all American households. The impact shows up even in simple interactions. One ChatGPT query can use nearly ten times the electricity of a typical Google search, the International Energy Agency reports. And by 2028, Goldman Sachs Research estimates AI could account for nearly one-fifth of total data center power demand, even as efficiency improves. That demand isn’t just big—it’s unpredictable. Cirba Solutions CEO Klanecky explains that AI workloads create dense, always-on power usage that many local grids weren’t built to handle. When several data centers scale up in the same region, they can strain substations, stress transmission lines, and even push energy costs higher for nearby residents. Since building new power infrastructure takes time, operators are focusing on smarter upgrades inside existing facilities. Batteries, better cooling strategies, and drop-in efficiency technologies are gaining attention because they improve performance without downtime. Kite-Powell’s big  takeaway is that AI is forcing data centers to rethink everything at once. Power, cooling, storage, and sustainability can’t be solved in isolation anymore—and the operators who adapt fastest will be the ones who keep up.

 

For Full Article, Click Here

Please note: This reboot sequencing requirement only applies IF the DB server is rebooted. If the DB server is not rebooted, you can reboot the other servers in any order

Follow this process to ensure the Lawson system comes up clean when a DB server is rebooted:

  1. Reboot the DB server BEFORE the other servers.
  2. Wait for the DB server to be completely up before rebooting any of the Application servers.
  3. Once DB server is up and running reboot Lawson application server and the Landmark Server

The main concern is that the DB server must be up and running for all other Lawson applications to connect to the DB.