While using Previous/Next on a record in Lawson portal, you may eventually stumble upon a pesky error message of:

Security search limit of X employees exceeded” (X being anywhere from 1-100+)

 Commonly this could happen when restricting user access via process level, department, etc.

What happens when you click next or previous while inquiring on employees is that Lawson is searching in blocks of records based on your specified search limit.

For example:

If the Employee Security Search limit is set to 10 and we click next to inquire on the next employee record in HR11.

Lawson searches the next 10 employee records to see if the user has access to them.  If they do not, you will get the error message: “Security search limit of 10 employees exceeded”.

When we get the error, we should be on employee record number 10 – meaning if we click next again, we will be on employee number 20 if we do not have access the next 10 records again.

 

Ideally we’d like to reduce clicking next 10+ times by increasing the search limit.

Solution:

HR00.1

Don’t forget to click CHANGE after adjusting Employee Search Limit

As seen above, changing the search limit to something higher like 100 or more can dramatically reduce the amount of clicks to get to the next record that the user has access to.

If we change it to 100 and the next employee record is #200, it will only take 2 NEXT clicks to get to that record.

Ciber and Infor announced an agreement on March 20, 2017 to sell Ciber’s Infor practice to Infor. This is the most significant event in recent years within Infor’s Lawson client base as Ciber been serving the lion’s share of the Lawson customer base for nearly 17 years. The decision comes on the heels of Ciber’s financial troubles in recent years, most notably the repayment of a $28.2 million loan to Wells Fargo due by the end of March 2017.

According to the Form 8-K filed with the SEC on March 20, 2017, the terms include a cash payment of $15M. In addition, Infor will assume certain liabilities associated with the purchase. Ciber CEO Michael Boustridge commented that the sale of the Infor practice “reflects a fundamental decision to hone our business to a focused IT staffing foundation with complementary integrated business consulting and application development management capabilities in a synergistic digital transformation offering” but in light of the financial troubles Ciber has been in and the fast approaching due date of the loan, it’s hard to see this as anything other than a financial necessity.

Boustridge also said in his statement that Ciber is “working to provide a seamless transition and great continuity and service to our affected customers and our employees.” As it stands today, the arrangement seems to be that all Ciber employees within the Infor practice will be absorbed by Infor within the next few months. When it comes to clients however no significant plan has been announced. As with any merger, there will be some transition pains and bumpiness to be expected but it’s hard to imagine how mid-flight projects and managed service customers are going to be transitioned. According to the SEC filling, a key component of the deal is the transition of Ciber’s top 25 customers (by 2016 revenue) and “at least 90% of all specified Business Employees (as defined in the Asset Purchase Agreement), and 100% of certain identified key Business Employees, accepting offers of employment with Infor.”

The March 20th press release presents more questions than it answers at this early stage, such as:

– How will clients who have active projects mid-flight be transitioned from one organization to another?

– How will Ciber and Infor transition their Managed Service Clients?

– Will such a transition be done by customer consent or as part of an automatic consent built into the agreement with the customers?

Only time will tell.

‘Tis the season for taxes! For many this entails longer work hours, but if you’re not careful, this season could entail ID theft. There’s many ways in which you could be scammed or hacked, even if you think you have a safe security system.  Tax payers should be carefully analyzing their practices to make sure that they don’t become an easy target for scammers. A few tips to help you from bring a target include:

  • DO make passwords long and strong
  • DO use direct deposit or refunds or a mailbox with a lock
  • DON’T authenticate your identity to anyone via the phone or online
  • DON’T put information on your social media that could make it easy to guess your security questions

Don’t forget, the deadline this year for taxes is April 18!

For Full Article Click Here

Big Data has contributed greatly to today’s business revolution. With that, there has also been an attempt to tackle the continuous process of assuring that the approporiate decision makers have the right data. This is all a part of Data socialization. Rather than trying to use a top-down approach to impose data-directives, embedding data analytics throughout an organization and having measurable effects can be much more beneficial. “Liking” and “sharing” quality ideas can help the right people who’ll use them to make crucial decisions. This would ensure that updates and edits can be brought to their attention. It would also gives way to data stewardship which would make privacy and compliance  lot less stressful.

For Full Article Click Here

The Return Activity node in IP Designer is useful for running command line tools within a process.  You can run anything from the System Command node that could be ran in a Unix or DOS command prompt.

The first step to using a System Command Node is to configure the Sys Cmd tab in the appropriate configuration setting in Landmark.  In this case, we are using Rich Client to configure the setting.  This can also be configured via the Landmark administration web application.

To configure the System Command settings:

  1. From Rich Client, open your Configuration Sets
  2. Choose the Configuration Set for the server that you wish to run your commands
  3. Click the Sys Cmd tab, and click Actions > Create (or if one exists, select it and click Actions > Update)
  4. Fill in the parameters
    1. If the server you are accessing is remote (respective to the Landmark server), click the “Remote” checkbox
    2. The LSF Web/RMI root is the server web address
    3. The Web User is a user who has access to the Lawson Portal
    4. Password is the Web User’s password
    5. RMI timeout is the number of milliseconds to attempt the connection before timing out
    6. GENDIR and LAWDIR are the locations of those specified directories
    7. Run as user information is if you want to run your command as a different user from the user that runs the BPM process
      1. NOTE: Windows no longer allows a “Run As” user in command line activities. In typical installs, the local system user runs the BPM process on the LSF server, that is who will be running the commands in your System Command Node.  If you are using the System Command node to run Lawson tools such as importdb, you will need to make sure this local system user has access to the necessary roles in Lawson Security.

Now that your Sys Cmd settings are configured, you can use the System Command node in IPA.

  1. In the node properties, select your Configuration name.
  2. The default is the System (Landmark) configuration.
  3. For Execution mode, you can leave it as automatic and it will use the server’s inherent command mode. Or, you can specify the mode.  Options are:
    1. run directly -> {command}
    2. run shell -> sh –c {command}
    3. run Korn shell -> ksh –c {command}
    4. run shell as System Command User (Unix only) -> su –p {password} {username} –c {command}
    5. run cmd.exe (Windows only) -> cmd.exe /C {command}
  4. The Command property is the actual command script. Be sure to use the syntax appropriate for the Execution mode you chose.  You can use process variables in this window.
  5. Command input is text that is sent to the command’s input stream. This is typically left blank.

Results of this example:

Customer demands are changing, the market is evolving, and product innovation is faster than ever. The total output of U.S. manufacturing has increased by more than 250% in the past 25 years, and is expected to continue. Mark Humphlett, Director of Industry and Solution Strategy, Infor, shares key reasons for manufactures to take advantage of the cloud to increase business optimization.

  • End-to-End Visibility – A network of vendors, suppliers and partners supported by Cloud deployment’s flexible architecture allows manufacturers increased visibility to every step of the supply chain process.
  • Increased Flexibility – Companies that can adjust to market shifts will avoid decreased speed-to-market and inventory shortages.
  • Inter-operable Functionality – Cloud solutions provide manufacturers with always-modern functionality needed to remain competitive, and also manage forecasting, demand planning, tracking and traceability within one uniformed platform.

Cloud technology can provide manufacturers with the always-modern functionality and flexibility they need to react to the ever-changing market conditions, cut costs, and use data-rich analytics to strengthen customer relationships and better manage their businesses.

 

For Full Article, Click Here

The Return Activity node in IP Designer is useful for stopping the flow when specified conditions are met, and returning information to the calling process, such as a trigger.

In this example, we have an error connection between the file access node and the Return Activity Node.  In this case, if there is an error in the File Access Node, information will be returned to the calling process by the Return Activity Node.

The Return Activity node can return four fields: Error Code (integer), Information Code (integer), Return Message (string), Output Data (string or binary).  These four fields can be populated with variables or with hard-coded information.  In the example, we chose to populate them with the codes and messages generated by the File Access node.

As you can see, the Return Activity Node is a very efficient method of stopping a process and returning the results to the calling application.

Infor’s newest update includes the application on Infor Xi™ technology stack, making for a design that is more responsive and contains big data analytics and machine-learning. This will strengthen it at its core and entails for various application-level enhancements. In addition, it will also improve areas like electronic data interchange built-in functionality, order entry, and rebate processing. This update and all of its improvements will bring forth major UI improvements. Christian Ostiguy, VP of operations, DrillMex, says “with Infor CloudSuite Distribution, we will gain access to the latest and greatest version, automatically, and it will provide us with the flexibility needed to grow our business and offer better service to our customers.”

For Full Article Click Here

With the ever-growing Enterprise Resource Planning (ERP) software, it’s no doubt there will be more innovations in this management system this year. Here are a few ERP trends to be familiar with for 2017.:

  1. The Move to SaaS – the difference between traditional ERP applications and SaaS-based apps can be thousands of dollars.
  2. SaaS-Only and Mixed ERP Options – Often times you can integrate SaaS to a Mixed ERP tool so that you won’t be starting from scratch.
  3. ERP for the Subsidiary – companies are testing the waters of the SaaS ERP by implementing it into one part of the company before replacing the ERP whole-hog.
  4. Competition from Disruptors – SaaS ERP vendors targeting large enterprises is stark competition for ERP leaders.
  5. The Internet of Things – Be looking to large enterprises to begin building out their IoT) ecosystems and leveraging ERP tools to take action on the data created by this connection.

For Full Article Click Here

The Custom Activity node in IP Designer is useful for implementing functionality that is not available in the “canned” IPA nodes.

Infor delivers four Custom Activities with IPA. These are “Encoding”, “Assert”, “ComponentTest”, and “FlowRunner”. You can also create your own custom activities by creating Java Bean classes and adding them to the Grid.

Custom Activities are an advanced piece of IPA and should be configured by a developer.

To add a Custom Activity to the grid,

  1. Create a jar file for the supporting classes
  2. Place the jar file you created in the $LACFGDIR/LPS/jars folder
  3. In the Infor Grid, click the gear icon 
  4. Select Applications > Your Application
  5. Click Edit Properties 
  6. Under the LPA heading, find pfi.customActivity.beans and click the “value” link
  7. Add the full classname of your Java Bean class
    1. Class names are separated by semi-colons
  8. Restart the IPA node
  9. Launch IP Designer
  10. Add a Custom Activity node, and click to refresh the list. Your activity should be displayed now.

To use your Custom Activity, select the configuration name for email notification. Select the Activity from the list, then choose the action from within that activity. Then configure your input variables.