As a Lawson Managed Service provider, we see many different Lawson v10 systems (even v9 systems) and often we find users with CheckLS = No but get asked if this should be set to Yes.

In the past when migrating clients from LAUA to v9 or v10, CheckLS to Yes would put them on v9 or v10 security instead of LAUA security.

 

Today if you’re on later versions of v10, it’s still the best practice to set CheckLS to Yes in the users RM info but the official Infor documentation reads as follows:

“When you upgrade to 10.0.x, the system will treat this field (checkLS) as set to Yes in all cases”

 

So if you’re scratching your head, what this means is that in v10 and forward, checkLS field Yes or No still puts you on v10 Security. However, setting it to Yes can also give users the ability to access LID if needed (assuming they have ENV access to specific LID command tokens).

 

 

According to IBM’s Institute for business value, around 75% of CEOs believe generative AI (artificial intelligence) is the key to competitive advantage. However, this may be limited in areas such as supply chain where AI could have limited use. Steve Banker, logistics and supply chain management experts, shares an article on Forbes about how business experts have talked about the use of generative AI to improve supply chain system user interfaces. “The idea here is an Alexa type experience where a user asks a question and the technology searches through an application to find the answer, states Banker. “So, a user might ask, ‘who is the supplier on this order.'” The answer: Infor Nexus.

Infor Nexus is a supply chain network that connects businesses to their key partners and makes coordinating the flow of materials and information much more seamless. The solution is particularly strong in creating visibility and coordination of international transport, collaboration with supplier networks and automating trade finance processes. “Infor Nexus’s approach is not to just give a specific answer to a specific question, but to provide the right data visual, in this example a matrix type view of several days of shipments with demurrage risk,” states Banker. Tom Sorgie, the senior vice president of technology at Infor Nexus, calls this rich visual controls. “These visual controls present the information in an intuitive and verifiable way and enable the users to dive right into the data,” says Sorgie. He also adds that the combination of generative AI and a graph database can be powerful.

 

Now is the best time for companies to go over their systems or databases and clean up obsolete data and consider retiring legacy systems. One approach would be to consider migrating from an on-premise enterprise resource planning (ERP) system to a cloud ERP platform. SAP’s Zoryana Zagorodnya shares an article on Forbes stating that with cloud ERP, companies get advanced features, flexibility and accessibility. Not only that, SAP’s CMO Eric van Rossum also adds that with ERP in the cloud, customers expect faster delivery of products and services, nonstop product and service improvements, greater reliability, and lower costs. Additionally, many companies see artificial intelligence (AI) as a powerful game changer when coupled with their cloud ERP systems. According to a recent study conducted by Forbes Advisor, says Zagorodnya, “a significant number of business owners, who currently utilize or intend to integrate AI into their operations reported that 53% employ AI to enhance production processes, while 51% embrace AI for process automation. Embedding AI into end-to-end business processes allows companies to utilize the vast amount of data accessible through modern ERP systems.”

 

For Full Article, Click Here

The BATCH privileged user will only be used for standard Lawson batch programs. If the LSF environment is configured to use the BATCH privileged user and a batch job executes a user token with a script goes into “Needs recovery” status with the error: “execjob(laStartProcess): Unable to log in DOMAIN\USERNAME StartStep failed: Overlapped I/O operation is in progress”, then its possible that the users password has been changed or expired on the network.

 

The user’s password for their environment identity found in Lawson Security under User Management MUST match the user’s domain/network/AD password. This is required by user tokens. To resolve this issue so user tokens run to completion, the Lawson Security Administrator will need to update the environment identity password for the user running the job so it matches their OS/AD password, OR the system would need to be configured so the user could enter their own password so it matches their OS/AD password.

Back in 2003, Salling Group implemented Quest PLM (product lifecycle management) and started digitalizing all design and development lifecycle processes, from sketch to store. Since then, Quest PLM has been acquired by Infor, and in 2016 Salling Group transitioned to the on-premises solution Infor Fashion PLM. In January 2023, the company decided to upgrade to the multi-tenant cloud version of PLM, which was successfully finalized nine months later. Per the press release, Salling Group needed a more flexible and high-performing PLM solution that was future-ready to address the fashion industry’s increasing demands for reporting and sustainability. Infor’s Cloud-Based PLM suite was just the solution. Additionally, Ptex Solutions, based in India, helped Salling Group implement the cloud-based Infor PLM for Fashion. The company is responsible for 90 percent of Infor’s PLM implementations worldwide. Previously, Ptex had also implemented on-premises PLM at Salling Group, so the team was familiar with their requirements. Moreover, according to Karen Tretow-Loof, users are extremely surprised by the short implementation phase and the intuitive, personalized user interface. “Usually, when you go live, a lot of bugs pop up that need to be fixed. But this time, there were very few bugs. It has to do with us being good at testing, but even more so with Ptex Solutions being so good at implementing PLM. Their customer-focused approach to implementation has contributed to success throughout the entire organization, which is why we have credited the overall project a score of 10/10,” she says.

 

For Full Article, Click Here

There may be an instance when you are getting an error in Lawson Security Administrator (LSA) stating that the “Data area has been suspended”. This happens when you are adding a rule to a security class. This error usually occurs after running dbreorg without stopping your LSF WebSphere Application Server prior to the execution of dbreorg.

To resolve this issue, follow the steps below:

  1. Stop LSF WebSphere Application Server
  2. Stop LSF WebSphere Node Agent
  3. Stop LSF WebSphere Deployment Manager
  4. Make sure that there are no java processes
  5. Stop your LSF environment
  6. Start LSF WebSphere Deployment Manager
  7. Start LSF WebSphere Node Agent
  8. Start LSF WebSphere Application Server
  9. Start your LSF environment

When we integrate security and IT operations, cybersecurity becomes increasingly important and should be at the top of your list to maintain and set in place. There are Recently CrowdStrike announced new offerings that may change how cybersecurity and IT operations unify to harness the power of generative AI (artificial intelligence) to protect against breaches more effectively. Tony Bradley, tech expert and  Editor-in-Chief of TechSpective, shares an article on Forbes on how systems like CrowdStrike harnesses the power of AI for your cybersecurity. Bradley notes that at the heart of CrowdStrike’s new suite is Charlotte AI, a conversational AI that promises to transform how security teams interact with their cybersecurity tools. By leveraging foundational AI models, Charlotte AI enables security analysts at all levels to ask complex queries in plain language and receive actionable insights in real time. In addition, with the increasing popularity of AI comes an increased (if not more) risk of data sensitivity and data exposure. How so do we manage this? Bradley states that “CrowdStrike is striving to address this risk with enhancements to Falcon Data Protection, which has been updated to prevent data leakage to web-based, commercial generative AI tools. By providing comprehensive policies that track content movement and prevent unauthorized sharing or uploading, Falcon Data Protection aims to address a gap in traditional Data Loss Prevention (DLP) solutions.” Lastly, with AI in cybersecurity, there can be a unified front against cyber threats. “CrowdStrike’s latest offerings represent a strategic move towards a more integrated, AI-powered approach to cybersecurity and IT operations,” notes Bradley. “Unifying these traditionally separate domains under a single platform and leveraging the power of generative AI can enhance the efficiency and effectiveness of security and IT teams.”

 

For Full Article, Click Here

Artificial Intelligence (AI) is a technology that helps organizations save time, reduce costs and improve operational efficiency. With this transformative technology available, tech leaders might wonder how it can help with optimizing cloud storage. Julia Borgini, freelance technical copywriter and content marketing strategist, shares an article on TechTarget showing how AI is capable of expanind how cloud storage providers handle storage, maintenance and forecasting. Borgini explains, “AI most easily integrates into cloud storage for monitoring, diagnostics and predictive analysis in storage infrastructure and applications. AI can help with automated management and configuration, fault prevention, predictive resource and capacity planning, intelligent data management, and enhanced data security.” Additionally, she points out how many cloud storage vendors use AI in their platforms so customers could understand how it is used before signing up. Other best practices include seeing if the AI tools need access to user data on the hardware and software level in order for it to work properly. Lastly, Borgini suggests exploring dynamic and flexible pricing options that support customer business requirements without surprises. For many it means a pay-for-use subscription model that includes service-level agreements and guarantees that meet customer expectations.

 

For Full Article, Click Here

There may be a time when you want to remove a URL from the cached URLs list in Lawson Security Administrator (LSA).  This could help clear storage space and run your programs faster and would not hurt to clear your cache regularly.

If you want to clear your LSA cached URLs, on your desktop where you use the program, you will need navigate to %programdata%/LawsonHttpClient.  Next, edit the list as needed and save it. The changes will be immediate after you click save. Your LSA URLs have now been cached! You can refer to the screenshots below for a visual guide.

 

Infor recently announced that Nova Scotia Health and IWK Health have selected the Infor Healthcare Revenue Cycle Management application to help their organizations meet the goals of its digital transformation program, One Person One Record (OPOR). Per the press release, this major program will replace health information systems used throughout the province of Nova Scotia with a new clinical information system. Key Infor applications will be used to modernize and unify disparate patient accounting and billing systems. Scott McKenna, chief information officer, Nova Scotia Health and IWK Health, adds, “During our selection process, Infor demonstrated its understanding of the vision and strategic direction of One Person One Record, and how billing systems are part of the overall transformation. This technology will consolidate and streamline client and patient billing, payments, and follow-up for cases such as out-of-country patients or uninsured patients.”

 

For Full Article, Click Here