Technology is ever-growing and will not slow down with new innovative methods any time soon. With new technologies or stronger technologies surfacing regularly, this becomes a concern for protecting your data from breaches in every new way possible. EY’s Emerging Tech at Work 2023 survey reveals that 89% of employees believe adopting emerging tech benefits their company. Still, cybersecurity risk can be a barrier to adoption. In the same survey, approximately 73% of employees are concerned about the cybersecurity risks associated with generative AI, and 78% worry about quantum computing. Additionally, only one in five executives see their organizations’ cybersecurity measures as effective for today and the future. Forbes Council Member, Steve Gickling and CTO of Calendar – a place for unified calendars and all your scheduling needs – shares an article depicting 4 effective ways you can defend your business from data breaches.

  1. Start with clear-cut training. “Combining upskilling and streamlined practices is often a solid approach to addressing the human element. If employees aren’t safeguarding their passwords, there’s probably a best practice they don’t fully understand. Teaching them how to recognize phishing attempts and social engineering tactics is a start, but it’s even better to educate them on why automated password management solutions simplify the use of internal technology and protect the organization.”
  2. Shield the cloud. “Organizations rely on cloud service providers for security, but that doesn’t mean those providers are necessarily protecting their clients’ data adequately. Anything from incorrect configurations to insufficient security permissions can leave a company vulnerable to cybercriminals seeking an opportunity. Auditing cloud providers and solutions can sort out who’s responsible for what. Find out what vulnerabilities providers see in their solutions and follow their recommendations on how to close the loopholes. Tech leaders can also consider implementing cloud monitoring and security software, which looks for potential issues. These vulnerabilities might be unauthorized users, a lack of data encryption and/or weak access controls. Monitoring software could also reveal whether data storage isn’t private, increasing its exposure to malicious actors.”
  3. Monitor for data leaks. “What if your employees are using the same passwords for both their personal and professional accounts? The leaked information could be from a vendor’s software platform. Cybercriminals are known to try exposed, easy-to-guess and common passwords. They may look at online org charts, hoping to find a match between a leaked personal password and an employee’s account. When implementing a data leak detection solution, workplaces need to find tools that will help them accomplish the best practices for their chosen software. To maximize the software they’ve established, a few key steps are to regularly train employees on using the most current version, constantly monitoring any potential risks and always maintaining secure processes to access the data.”
  4. Minimize data retention. “Storing data on your network comes with inherent risks, including the chance it will fall into unwanted hands. By only keeping what’s necessary, you can reduce the probability that sensitive data will become exposed. Enacting data retention procedures should thus be part of your organization’s critical cybersecurity plan. Another aspect to minimize is the locations where information is housed. Streamlining the amount of places the company stores data can reduce vulnerabilities. The fewer places sensitive information is, the less potential there is for exposure. As you condense data storage locations, however, be sure to keep close tabs on what data is being stored and where.”

 

For Full Article, Click Here

Problem:

You’re trying to generate a v10 Lawson Security Administrator (LSA) report and its stuck in “processing” status

 

Resolution:

Edit your GENDIR/java/command/lsserver.properties file (Back it up first).

 

Locate the following line:

ljx.ext.dirs=${GENDIR}/java/ext:${LAW_JAVA_HOME}/jre/lib/ext:${LAW_JAVA_HOME}/lib/ext

 

To incorporate the modification, append “${GENDIR}/java/impl:” so that it appears as follows:

 

ljx.ext.dirs=${GENDIR}/java/ext:${GENDIR}/java/impl:${LAW_JAVA_HOME}/jre/lib/ext:${LAW_JAVA_HOME}/lib/ext

 

Save the file.

 

After implementing this change, you will need to perform the following restarts:

  1. Stop your WebSphere application server or cluster for this environment.
  2. Stop the Lawson environment using the stoplaw command.
  3. Start the Lawson Environment using the startlaw command.
  4. Start the WebSphere application server or cluster for this environment.

Execute the report again to verify that it completes successfully.

 

When it comes to backing up your organization’s valuable data, many folks are either stuck in old less secure ways or are simply not backing them up correctly – or at all. The point of backing up data is to have it be restored in a company’s system if they lose it somehow either due to cybersecurity attacks, a natural disaster, or data center and system failures. Eric Herzog, Forbes Council Member and Chief Marketing Officer at Infinidat, shares an article explaining from an IT perspective how organizations should go about securing their backed up data. He states, “From an IT perspective, backup targets have usually been measured on how fast they are, their ability to reduce the amount of data backed up and how economical they are for storage. However, ransomware and malware attacks have recently been focusing on backup infrastructure, as well as data on primary storage… Cybercriminals have learned that, to be effective, they need to not only attack data on primary storage but also disrupt backup storage.” Attacking backup storage allows cybercriminals to make a company even more vulnerable when attacking their main servers as well. This would be difficult to nearly impossible for a company to recover from a cyberattack to your backup data. With these new, more sophisticated approaches to attacking backup storage, cybercriminals are slowly “poisoning” the copies of data. With this known tactic, IT leaders and Security divisions at companies are focusing on added cybersecurity to their backup data as well. “In light of this new threat scenario that virtually all enterprises now face, the backup storage needs to take on additional responsibilities, such as expediting near-instantaneous cyber recovery or hosting recoveries with a dual role,” says Herzog. “This is noteworthy because, even if backup storage fights off a ransomware or malware attack, the cyberattack may have already reached production data on IT systems and primary storage. Enterprises need a higher level of cyber resilience to ensure that they are equipped to handle ransomware, malware and other cyberattacks.” According to Herzog, cyber secure backup storage needs to incorporate the following capabilities: immutability of data, high availability, data encryption, multifactor authentication, automation or a certain level of artificial intelligence, and cyber storage guaranteed service level agreements (SLAs). He concludes that it is best to look for cyber secure backup storage that utilizes the same underlying operating system that facilitates speedy backups. This varies based on your specific enterprise’s requirements and you may need a software-defined system that maximizes available storage capacity and offers data deduplication, such as a purpose-built backup appliance. But for those enterprises that have a higher priority on the backup target hosting application and data recovery, Herzog notes that choosing a primary storage platform that is repositioned as a backup target is the more appropriate choice.

 

For Full Article, Click Here

So you ran the PR160 again and it went into recovery due to an ACH file path parameter not being correct.

 

We don’t want to delete this but we also want to resolve it so we can recover it quickly.

 

To do this, perform a jobdump on this specific job:

jobdump -d -o Job -v JobName PR160JOBNAME -v UserName YourUSERNAME YourUSERNAME_dmp.txt

 

Once you dump this job, edit it in notepad or notepad++ and locate the incorrect path, example below:

 

Update this path ONLY to what you need it to be and use jobload to reload it:

jobload -c -o Job YourPR160JOBNAME.txt

 

Then recover the job and it should put the file in the correct path.

 

Artificial Intelligence (AI) is already providing value to businesses in ways that may not be obvious. Walter Sun, Global head of artificial intelligence at SAP, shares a great read on ERP Today about how much value AI is providing for your business. One example he shares is German retailer Lidl saw significant improvements like 15% better inventory management and 20% decrease in waste by bringing in historical business data, consumer sentiment, financial information and weather forecasts to better predict demand in their stores. SAP has also launched an AI tool called Joule which can answer complex business questions by analyzing company data. A user could ask how to improve store performance and Joule would generate an answer combining relevant information from different sources. While AI capabilities like generating art or text seem impressive, the real value lies in using data to enhance decision making and boost business performance. As supply chain management, manufacturing and customer experience all benefit from AI, it will allow any employee to access trusted insights without needing analytical expertise. The future potential for AI adoption across industries is huge. If implemented responsibly, Sun explains, AI could transform industries in coming years by enabling more accurate short-term forecasting, proactive disruption mitigation, optimized manufacturing while reducing inventory costs, and truly personalized customer experiences. Emerging regulations will provide guidance to build trust as AI gradually integrates into workplaces. Developers also need to center people, focus on customers’ critical processes, leverage real business data and take ethics seriously.

 

For Full Article, Click Here

Infor Nexus VP of product marketing and strategy Heidi Benko this month became the recipient of 2024 Pros to Know Award by Supply & Demand Chain Executive. This award recognizes outstanding executives whose accomplishments offer a roadmap for other leaders looking to leverage supply chain for competitive advantage. Marina Mayer, editor-in-chief of Food Logistics and Supply & Demand Chain Executive, comments, “Many of today’s supply chain pros are more than just leaders within their space; they’re innovators, decision makers, pioneers of change and growth. They’ve spent the last year (and more) creating safer, more efficient supply chains. New this year, we broke the award down into four distinct categories: Top Warehousing Stars; Top Procurement Stars; Rising Stars; and Lifetime Achievement. These winners continue to go above and beyond to overcome challenges, advance supply chain management and make the impossible, possible.” Per the news release, Benko has been an integral part of the Infor Nexus team to champion sustainability and social responsibility top priorities across the supply chain. She works closely with customers, prospects, industry leaders and analysts to drive greater awareness of how the unique, single-instance global supply chain platform can help companies run more efficient, profitable and sustainable supply chains.

 

For Full Article, Click Here

When you’re logged into Lawson, in order to compile all the programs invoked by one program, make sure that the syntax reads: lstinvk -q <pdl> <program>.

 

By doing this it will compile anything that is invoked by the program. After, you do this, then you will need to also compile the program itself. (See screenshot below for reference)

 

That’s all there is to it!

Steve Banker, Vice President of Supply Chain Services at ARC Advisory Group, shares a post on Forbes summarizing Infor’s strategy for differentiating their solutions at the Innovation Summit held on March 18-19th.  According to Banker, several top executives laid out Infor’s strategy for differentiating their solutions based on their approach to technology, product development, and customer service. Infor, with anticipated revenues of $3.4 billion for 2024, is the third largest supplier of enterprise resource planning software applications. Below is a summary of topics covered and  the tech giant’s approach to each one.

Infor’s Approach to Industry Specific Solutions. “The ERP market is making the transition to the Cloud. ERP firms like Infor, Oracle, and SAP – or supply chain software companies – like Manhattan Associates and Blue Yonder – have produced multitenant cloud solutions. Some of these companies are further along in their journey to convince their customers to move to a multi-tenant solution than others. Multi-tenancy, also known as ‘public cloud,’ is a software architecture where multiple instances of an application run on the same physical server. A public cloud solution has two key advantages. It can be much quicker to implement, so customers have a quicker payback period. Customers can also continue to get new functionality without going through a painful upgrade process. With traditional software, the upgrade process was so painful that many companies rarely, if ever, upgraded. But for customers to fully achieve these benefits, they need to commit to forgoing customization. Increasingly, large enterprises have decided to do just that. But where Infor is different from the largest ERP suppliers in the market is that instead of building one public cloud solution that serves all their customers, they have built three separate public cloud solutions. Each public cloud solution is designed to support a limited number of industries.”

 

Infor Success Teams. “Infor has developed customer success teams. A customer has a dedicated team that is headed up by a person with deep knowledge of the customer’s industry. The team is evaluated, in part, based on their ability to generate value for that customer over time. These teams’ job is to ask, “did the customer achieve the return on investment they were aiming for with their implementation?” Before an implementation begins, the potential is mapped. Industry best practice processes will be examined. If the customer commits to this out of the box process, what is the value they will gain? The value derived from the implementation will depend upon the customer achieving certain key performance indicators or key value indicators across all the ‘best practice’ processes. The software architecture allows the value to be measured and those metrics are visible to both the customer and the success team.”

 

Laying the Groundwork for Customer Success. “The customer success program, while more complete, does not sound radically different then what other software vendors have described as how they work with key customers. What is different is that the groundwork for achieving success is laid out during the sales process. “The implementation really starts in the sales cycle,” Frank Resink, the executive vice president of professional services, said. For food & beverage, Infor has up to 900 processes. They go through these processes with potential customers and define the value drivers. Infor works with the customer to validate which out of the box process will drive value and identify which out of the box processes would need to be adapted.”

 

Is the New Approach Working? “So, is this new approach, which is continuing to be scaled up to include more and more customers, really working? It is working for Infor. Solutions based on the public cloud – software as a service customers – have grown at a compound annual growth rate of 28.3% over the past three years. According to the company, for many customers, the speed of the implementation is now often limited by a customer’s ability to handle culture change rather than by integration, data cleansing, or configuration hurdles. There is also evidence it is working for customers. In 2020, Infor SaaS customers had an attrition rate of 8.4%. By 2023, attrition among these customers had fallen to 3.2%. Infor’s strategy for differentiating their business from competitors like SAP and Oracle is to be more industry focused. That industry focus, in turn, supports a truly differentiated approach to ensuring that their customers get ongoing value from the business applications they have purchased.”

 

For Full Article, Click Here

If your Lawson PR160 job status is in “Needs Recovery” or “Is currently running” (because it’s in recovery), see below for the potential fix.

Another error you may encounter is “Ern2 Record Exceeded limit size of 15000”

 

 

Resolution:

  1. Rerun PR140 (If you encounter an error indicating that PR160 is currently running when rerunning PR140, you should restart PR00 by performing a “double delete.”)
    1. “Double Delete” means going to PR00 and hitting the delete button twice until you clear out * and R flags
  2. Run PR160 with the Earnings Record NOT equal to blank after clearing flags in PR00

 

Hope this was helpful!

With the increasingly rapid growth of cloud the cloud platform for end-user technology, especially in enterprise resource planning (ERP), there may be some confusion whether or not a company’s system is cloud-native or simply just cloud hosted. And yes, there is a difference. Simply put, cloud-native applications are created in the cloud, utilizing the full power of cloud architecture to transcend traditional application restrictions. Cloud-hosted applications are traditional applications that have been migrated to the cloud and are not designed to take full advantage of the cloud. So, which one does your organization have and which is better to use? Robert Jolliffe President at Sabre Limited, shares an article on Spiceworks.com of four characteristics that distinguish cloud-hosted ERP solutions from cloud-native ones. Jolliffe notes that there are some common characteristics you should observe, but still major differences. Cloud-native ERP systems should have these (and maybe more) features:

  1. Serverless Design. “These technologies are serverless. The customer does not need a server, and the technology runs in a public cloud. I think the best of them have dual-use rights (so you can also choose to run them on your own infrastructure). These systems use single sign-on through Google, Microsoft, Facebook etc. Customers usually pay through a monthly subscription model, but that defines its economics, not the technology.”
  2. Cloud Native Technology is Device Agnostic. “Any cloud-native technology is, by its nature, device agnostic. A cloud-native ERP system runs on any hardware platform and any operating system. Even Microsoft’s Dynamics 365 ERP systems (Business Central and Finance and Operations) can run on a Mac, a Chromebook, a Pixel, or Android Phone. They speak “swipe and pinch” and recognize Bluetooth printers. They have native apps in all the major app stores.”
  3. Cloud-Native is App Friendly. “Whether it is Salesforce, Netsuite, the Microsoft Dynamics 365 product line, or any other cloud-native line-of-business system, they all support some private app store. The design of these technologies is open and easily integrated. It’s the design philosophy that exploded the use of the iPhone and buried Blackberry.”
  4. Rapid Deployment. “Speaking as someone who spent years selling Dynamics NAV (now in the cloud as Dynamics 365 Business Central), cloud-native ERP is deployed with virtually zero effort. The onboarding effort is more limited by customers submitting payment methods than any technical element. Old ERP systems could take weeks or months to get hardware in place and software installed. Cloud-native systems can come online by the end of a phone call.”