Artificial intelligence (AI) and machine learning (ML) have changed the automation landscape and the fundamentals to IT. Antony Adshead, Storage Editor at Computer Weekly, shares a post detailing storage technology and AI’s effects on data storage. Storage becomes a key part of AI, to supply data for training and store the potentially huge volumes of data generated, or during inference when the results of AI are applied to real-world workloads, Adshead notes.

What are the key features of AI workloads? “There are three key phases and deployment types to AI workloads:

  1. Training, where recognition is worked into the algorithm from the AI model dataset, with varying degrees of human supervision;
  2. Inference, during which the patterns identified in the training phase are put to work, either in standalone AI deployments and/or;
  3. Deployment of AI to an application or sets of applications.”
What are the I/O characteristics of AI workloads? “Training and inferencing in AI workloads usually requires massively parallel processing, using graphics processing units (GPUs) or similar hardware that offload processing from central processing units (CPUs). Processing performance needs to be exceptional to handle AI training and inference in a reasonable timeframe and with as many iterations as possible to maximize quality. Infrastructure also potentially needs to be able to scale massively to handle very large training datasets and outputs from training and inference. It also requires speed of I/O between storage and processing, and potentially also to be able to manage portability of data between locations to enable the most efficient processing.”

What kind of storage do AI workloads need? “The task of storage is to supply those GPUs as quickly as possible to ensure these very costly hardware items are used optimally. More often than not, that means flash storage for low latency in I/O. Capacity required will vary according to the scale of workloads and the likely scale of the results of AI processing, but hundreds of terabytes, even petabytes, is likely.

Storage for AI projects will range from that which provides very high performance during training and inference to various forms of longer-term retention because it won’t always be clear at the outset of an AI project what data will be useful.”

Is cloud storage good for AI workloads? “Cloud storage could be a viable consideration for AI workload data. The advantage of holding data in the cloud brings an element of portability, with data able to be “moved” nearer to its processing location. Many AI projects start in the cloud because you can use the GPUs for the time you need them. The cloud is not cheap, but to deploy hardware on-premise, you need to have committed to a production project before it is justified. “

 

For Full Article, Click Here

If you have services for approval or other types of flows in IPA, and they stop getting triggered after a Landmark update, it is possible that you need to repackage and redeploy the LPS jars.  This is good practice after a Landmark CU anyway.

  1. On the Landmark server, open a Landmark command window
  2. Run the command “packageLPSClientJars”
  3. Copy the LASYSDIR/LPS/LPSClientJars.jar file to the Lawson server at GENDIR/bpm/jar
  4. Run commands stoppfem and stoppfrmi
  5. Navigate to GENDIR/bpm/jar in a command window with environment variables set
  6. Run tar -xvf LPSClientJars.jar
  7. Run commands startpffrmi and startpfem
  8. If the changes don’t take effect, reboot the Lawson server

 

When compared to on-premise environments, the benefits of being on the cloud is exponentially better. Paul Wagenseil, custom content strategist for CyberRisk Alliance, shares an informative article on their website on the impacts on cloud migration and the modern network security platform. In April 2024, the CyberRisk Alliance (CRA) Business Intelligence surveyed 202 security and IT managers, executives and practitioners and found that in the previous 12 months, 93% of respondents migrated some share of their workloads to the cloud. Forty-two percent said more than half their workloads were cloud-based, while 16% said more than three-quarters were. Likewise, in Check Point’s 2022 Cloud Security Report, 98% of respondents said their organizations used “some form of cloud-based infrastructure,” and 76% used more than one cloud service provider (CSP), including private cloud deployments. One surveyor remarked, “The cloud gives us scalability. If we need a new server, we can spin that up in minutes rather than waiting on equipment purchase for on-prem. It lets us focus more on application support … rather than focusing on worrying about infrastructure.”

However, with any new technology comes risks. Securing a cloud-based or hybrid network with both cloud and on-premise elements is different from securing a fully on-premise network. Wagenseil notes that assets, application servers, and databases are often scattered among different cloud instances, or between cloud and on-prem servers, sometimes even with the same asset sharing space in multiple environments. “Network-security practitioners can no longer draw a ring around a core group of assets and declare that they are protected,” he says. “Instead, security tools and personnel have to follow each asset, each set of data and each user and create protections around them individually. This can lead to a radically different concept of network topology and security and requires drastic retraining of security personnel.” The biggest risk is often human error and misunderstanding on how the cloud network functions. “Misconfigurations are among the top risks facing cloud users,” says Wagenseil. “Check Point’s 2022 Cloud Security Report found that, for 33% of organizations, the complexity of their cloud environments makes it challenging to rapidly identify and correct misconfigurations before they can be exploited by an attacker. Likewise, CRA’s 2024 report put misconfiguration vulnerabilities at the top of the list of common cloud security-related incidents, with 35% of respondents citing such an incident in the past year.” Organizations should dedicate their efforts to fully learning their new cloud environments, and seek multiple resources such as written guides or IT partners. This way they can completely grasp their cloud networks and not need to worry about messing up their network security.

 

For Full Article, Click Here

Infor recently announced the launch of Infor GenAI and ESG Reporting to help customers improve productivity and report on their environmental footprint. Per the press release, Infor’s modern solutions, from industry-leading ERPs to supply chain solutions, run critical operations in manufacturing, distribution, healthcare and public sector, and the power of GenAI combined with unique industry capabilities and insights give customers immediate power to leverage the right data and workflows to help realize more value more quickly. Additionally, the solutions adhere to stringent security and data privacy best practices driven by Infor’s OS platform. Soma Somasundaram, Infor’s President and Chief Technology Officer, comments, “We’re constantly listening to customers’ pain points and anticipating opportunities that allow customers to be successful and competitively advantaged. When it comes to building solutions that are hyper-productive, our vision is to minimize the time customers spend in applications so that they can maximize their time focusing on their specialized work and creating value. Achieving this requires more than just humans and artificial intelligence working together. It also requires the right, understanding of industry subsegments and individual workflows. As a company built around industry specificity, Infor understands the context of how people work so that we can build those best practices into our products to help enhance productivity. Infor GenAI is designed with this in mind.” Further, Infor ESG Reporting helps customers address the increased pressure and changing requirements from internal and external stakeholders to report on their environmental footprint. With Infor ESG Reporting, customers have the data and analytics to help drive more meaningful, measurable, and actionable change, while reporting on their environmental footprint with improved accuracy, transparency, and consistency.

 

For Full Article, Click Here

Are you getting this error when updating a user’s record in ISS stating

loadResource(): returned identity [User:] already exists?

 

If so, then this error is due to missing extended attributes in LDAP. The extended attributes are what allow ISS to know that the user exists in LMK and are created when a user is added via ISS or the user is included in a sync.

Simply run a full sync via the ISS webpage to create the extended attributes

 

To prevent this issue going forward you should add a list-based sync to the user add process. This should resolve the error completely.

 

Tech expert Brian Sommer shares an article on Diginomica highlighting Infor’s product update presentation earlier this March. The almost 2-day event at their New York HQ covered many innovations that the enterprise resource planning (ERP) vendor has been working on in recent years. Sommer provides key takeaways below:

 

For Full Article, Click Here

Using Spreadsheet Designer

Go to the field and do a Ctrl + shift and left click on your mouse, this will give you the Business class that you will need to have and the name of the field.  In this example we will be looking at the Employee business and the field Work Type

 

Let’s open up Excel and go to the Infor tab, and we will be doing a query. Go to the Insert Query and click on the drop down arrow

This box will appear, do a drop down and pick the environment name for your Data Area

 

In the second box, we will be typing in the business class, in this example it will be Employee

 

As you are typing in the second box the business class will appear

 

Now you see all the field that you can pick from under Employee Business Class. The ones that are Orange are required fields and need to be in your Query.  The Employee is the Employee ID number

 

We will be using for this example the following fields,

HROrganization

Employee

Name.FullPresentationName

 

Scroll down and pick

StartDate

Adjusted Start Date

Relationship to Org

Relationship Status and click on Insert

 

Go to the Employee and rich click on your mouse, pick Add to Filter

 

Go to the bottom of the Insert, and you will see Employee. Next to Employee, under Value enter your Employee ID number.

 

Like Below

 

Now click off that field

 

Go to Refresh at the top of the page by the Infor sign and do a drop down

 

We will be clicking on Refresh

 

This box will appear

Your Information will appear,

 

Now let add Work Type to our report, Find the Field Work Type and check the box,

Click on Refresh again and the Work Type Information will be part of your Report

 

 

At the heart of a business’s operations is usually an enterprise resource planning (ERP) system running all your processes. So how do you decide on the best one for your business. More importantly, how can you properly implement it with no hitch and run it with optimal performance? Forbes Council Member Madhavi Godbole, a seasoned expert in the field of ERP and the senior vice president at Apolisrises Inc., shares an article with her personal insights and lessons learned in implementing a successful ERP.

Lesson 1: Strategic Alignment And Clear Objectives. “One of the pivotal lessons I have learned pertains to the critical importance of strategic alignment and establishing clear objectives before embarking on any major technological initiative, particularly ERP implementation. It is imperative to align technology initiatives with overarching business goals and ensure every stakeholder comprehends the purpose and expected outcomes. By fostering a shared vision and understanding across the organization, leaders can mitigate resistance, streamline decision-making and cultivate a culture of collaboration conducive to successful ERP implementation.”

Lesson 2: Robust Change Management And Stakeholder Engagement. “Another indispensable lesson revolves around the necessity of robust change management and proactive stakeholder engagement throughout the ERP implementation process. Effective change management entails more than just technical proficiency; it necessitates empathetic leadership, open communication, and a keen awareness of organizational dynamics. Engaging stakeholders early and involving them in the decision-making process fosters a sense of ownership and buy-in, mitigating resistance and maximizing the likelihood of successful adoption. Additionally, fostering a culture of continuous learning and adaptation empowers teams to navigate challenges and capitalize on opportunities.”

Lesson 3: Iterative Approach And Continuous Improvement. “Lastly, my journey has underscored the value of adopting an iterative approach to ERP implementation and embracing a culture of continuous improvement. In today’s rapidly evolving business landscape, agility and adaptability are paramount. Rather than striving for perfection from the outset, organizations should prioritize incremental progress, leveraging feedback loops and agile methodologies to iteratively refine processes and enhance system capabilities. By embracing a mindset of continuous improvement, tech leaders can foster innovation and optimize performance. Looking back on my personal journey, during a large global ERP implementation, the significance of strategic alignment became unmistakably evident. In this implementation, the finance team emphasized strict budgetary controls and prioritized cost reduction measures, while the procurement team focused on optimizing supplier relationships and ensuring timely delivery of goods and services—with both departments advocating for divergent strategies. We had to champion an open dialogue and align our efforts with broader organizational goals in order to see the right way forward for the organization and merge the two departments’ goals.”

 

For Full Article, Click Here

Technology is ever-growing and will not slow down with new innovative methods any time soon. With new technologies or stronger technologies surfacing regularly, this becomes a concern for protecting your data from breaches in every new way possible. EY’s Emerging Tech at Work 2023 survey reveals that 89% of employees believe adopting emerging tech benefits their company. Still, cybersecurity risk can be a barrier to adoption. In the same survey, approximately 73% of employees are concerned about the cybersecurity risks associated with generative AI, and 78% worry about quantum computing. Additionally, only one in five executives see their organizations’ cybersecurity measures as effective for today and the future. Forbes Council Member, Steve Gickling and CTO of Calendar – a place for unified calendars and all your scheduling needs – shares an article depicting 4 effective ways you can defend your business from data breaches.

  1. Start with clear-cut training. “Combining upskilling and streamlined practices is often a solid approach to addressing the human element. If employees aren’t safeguarding their passwords, there’s probably a best practice they don’t fully understand. Teaching them how to recognize phishing attempts and social engineering tactics is a start, but it’s even better to educate them on why automated password management solutions simplify the use of internal technology and protect the organization.”
  2. Shield the cloud. “Organizations rely on cloud service providers for security, but that doesn’t mean those providers are necessarily protecting their clients’ data adequately. Anything from incorrect configurations to insufficient security permissions can leave a company vulnerable to cybercriminals seeking an opportunity. Auditing cloud providers and solutions can sort out who’s responsible for what. Find out what vulnerabilities providers see in their solutions and follow their recommendations on how to close the loopholes. Tech leaders can also consider implementing cloud monitoring and security software, which looks for potential issues. These vulnerabilities might be unauthorized users, a lack of data encryption and/or weak access controls. Monitoring software could also reveal whether data storage isn’t private, increasing its exposure to malicious actors.”
  3. Monitor for data leaks. “What if your employees are using the same passwords for both their personal and professional accounts? The leaked information could be from a vendor’s software platform. Cybercriminals are known to try exposed, easy-to-guess and common passwords. They may look at online org charts, hoping to find a match between a leaked personal password and an employee’s account. When implementing a data leak detection solution, workplaces need to find tools that will help them accomplish the best practices for their chosen software. To maximize the software they’ve established, a few key steps are to regularly train employees on using the most current version, constantly monitoring any potential risks and always maintaining secure processes to access the data.”
  4. Minimize data retention. “Storing data on your network comes with inherent risks, including the chance it will fall into unwanted hands. By only keeping what’s necessary, you can reduce the probability that sensitive data will become exposed. Enacting data retention procedures should thus be part of your organization’s critical cybersecurity plan. Another aspect to minimize is the locations where information is housed. Streamlining the amount of places the company stores data can reduce vulnerabilities. The fewer places sensitive information is, the less potential there is for exposure. As you condense data storage locations, however, be sure to keep close tabs on what data is being stored and where.”

 

For Full Article, Click Here

Problem:

You’re trying to generate a v10 Lawson Security Administrator (LSA) report and its stuck in “processing” status

 

Resolution:

Edit your GENDIR/java/command/lsserver.properties file (Back it up first).

 

Locate the following line:

ljx.ext.dirs=${GENDIR}/java/ext:${LAW_JAVA_HOME}/jre/lib/ext:${LAW_JAVA_HOME}/lib/ext

 

To incorporate the modification, append “${GENDIR}/java/impl:” so that it appears as follows:

 

ljx.ext.dirs=${GENDIR}/java/ext:${GENDIR}/java/impl:${LAW_JAVA_HOME}/jre/lib/ext:${LAW_JAVA_HOME}/lib/ext

 

Save the file.

 

After implementing this change, you will need to perform the following restarts:

  1. Stop your WebSphere application server or cluster for this environment.
  2. Stop the Lawson environment using the stoplaw command.
  3. Start the Lawson Environment using the startlaw command.
  4. Start the WebSphere application server or cluster for this environment.

Execute the report again to verify that it completes successfully.