To trigger a work unit to process, follow these simple steps below:

 

First, you will need to access the Process Server Administrator screen and then select Scheduling > By Process Definition.

 

Next, select the process name and double click on it.

 

Then Select Actions > Start. You should now be able to trigger a work unit to process!

 

 

The evolving role of the chief information security officer (CISO) is a response to the changing landscape of cybersecurity. Mary K. Pratt, contributing writer for CSO Online, shares an article about how this traditional role, which focused on technical issues and compliance, has since expanded to include strategic, executive responsibilities. As cyber threats become more sophisticated, it’s crucial for CISOs to communicate effectively with other executives and the board. Many organizations are now recognizing the need for a CISO who can bridge the gap between IT and business objectives. This emphasis on business acumen requires CISOs to develop a strong understanding of the organization’s goals and risk tolerance. The article highlights the growing importance of risk management, where CISOs must clearly articulate cybersecurity risks in business terms. CISOs are increasingly being involved in decision-making processes, ensuring that security is considered in all aspects of business operations. As businesses digitize and adopt new technologies, the role of the CISO will continue to evolve, with more focus on proactive measures rather than reactive responses. The challenge of recruiting and retaining skilled cybersecurity professionals remains a significant obstacle for organizations. Pratt notes that the CISO role is often facing high turnover due to the pressure and expectations associated with it. Another trend is the integration of artificial intelligence and automation in cybersecurity strategies, which can help CISOs reduce workloads and improve threat detection. Additionally, it emphasizes the need for continuous education and training for CISOs to keep pace with rapidly changing technologies and threats. CISOs must also focus on fostering a culture of security within the organization, promoting awareness and responsibility among all employees. Collaboration with external partners, such as law enforcement and cybersecurity firms, is essential for enhancing an organization’s security posture. The article concludes by suggesting that the future CISO will need to be a strategic leader, adept at navigating both technological and business challenges while ensuring robust cybersecurity measures are in place. Overall, the CISO’s role is expected to become more prominent and influential in shaping organizational strategy and resilience against cyber threats.

 

For Full Article, Click Here

End of mainstream maintenance for SAP Crystal Server 2016 and support plan for SAP Crystal Server 2020

We are on Crystal Server/Reports 2016. Do we need to upgrade to Crystal 2020? I only see the 2016 version on the download site.

 

Infor BI 10.6.30 for Lawson S3/M3 now supports SAP Crystal Reports Server 2020 as a report’s server. As such, this should be reflected accordingly on the LBI installer. Changes were made on the installer to include CRAS 2020.

 

CRAS 2020 is backwards compatible with reports created in 32-bit. Users just needs to recreate the data source connections in ODBC to ODBC 64-bit using the same Datasource Name. This also means that users will need to install the 64-bit drivers and configure the settings from 32-bit to 64-bit. For MSSQL, the 64-bit drivers are already available once you already have it installed. For other data source type, download the respective 64-bit driver. Same with Lawson OLEDB, Infor has released a 64-bit version, uninstall OLE DB 32-bit and install the 64-bit version.

 

Since CRAS2020 is a 64-bit application, the JVMMaxHeap value can now be set more than the 3GB limit in D:\BusinessObjects\SAP BusinessObjects Enterprise XI 4.0\java\CRConfig.xml

Open the CRConfig.xml file. Look for the following lines:

 

<JVMMaxHeap>64000000</JVMMaxHeap>

<JVMMinHeap>32000000</JVMMinHeap>

 

Change the JVMMaxHeap value more than the 3GB limit. Save and Restart RAS.

 

Please note that Crystal Designer 2020 will no longer work when installed in the same server as CRAS 2020. In CRAS 4.3 (CR server 2020), it is not supported to install both server side and client side in the same machine. Registry keys may get corrupted.

 

If you’re interested in moving forward updating your Crystal software, Nogalis offers MSP support to assist with upgrades and migrations.

Enterprise resource planning (ERP) systems can be a huge investment for your business: you can become more efficient, your employees more productive and your customers happier. But, if you implement this valuable system wrong, it can cause even more headaches than before. Raihan Islam, Principal Advisor and Startup Coach, shares an article on Computer Weekly of the many reasons why ERP projects go wrong, and how to avoid them when implementing your own. The article discusses the common challenges faced during Enterprise Resource Planning (ERP) implementations and how organizations can recover from these setbacks. Many companies experience ERP horror stories due to poorly planned projects, lack of employee engagement, or inadequate training. The initial promise of streamlined operations can quickly turn into frustration and budget overruns. A key reason for failure is often the neglect of change management, as organizations struggle to adapt to new systems. Resistance from employees can lead to low adoption rates, further complicating the implementation process. The article emphasizes the importance of addressing employee concerns and fostering a culture of openness. Another issue highlighted is the selection of the wrong ERP system, leading to misalignment with business needs. Organizations are urged to conduct thorough assessments of their processes before choosing a solution. This assessment should include input from all stakeholders to ensure the system supports the company’s unique requirements. Islam also stresses the significance of proper training and ongoing support for users. Without comprehensive training, employees may not fully utilize the ERP system, leading to missed opportunities and inefficiencies. Regular feedback sessions can help organizations make necessary adjustments to improve user experience and system performance. To get back on track, the article suggests re-evaluating the ERP strategy and learning from previous mistakes. Engaging in continuous improvement and adopting an agile mindset can foster better adaptability to change. Establishing clear communication channels is also essential for addressing issues as they arise. Moreover, Islam provides insights into overcoming ERP challenges by focusing on employee involvement, proper system selection, training, and continuous improvement. By taking these steps, organizations can transform their ERP initiatives from horror stories into success stories.

 

For Full Article, Click Here

Asaf Kochan, Forbes Council Member and President & Co-Founder of Sentra, shares an article exploring the evolution of data security.  Kochan focuses on the transition from Data Security Posture Management (DSPM) to more comprehensive security platforms. It begins by defining DSPM as a method used to assess and enhance an organization’s data security stance. Traditional data security focused primarily on perimeter defenses, but the increasing complexity of data environments has necessitated a more robust approach. The rise in data breaches and regulatory requirements has pushed organizations to adopt more integrated solutions. In response, many are adopting comprehensive data security platforms that offer not just monitoring but also advanced protection and remediation capabilities. These platforms often utilize machine learning and automation to improve response times and efficiency. Kochan emphasizes the importance of a holistic approach to data security that encompasses all stages of data handling—from storage to sharing and disposal. He suggests that organizations need to align data security with their overall business strategy for effective risk management. The article also highlights the benefits of adopting a unified security framework, which can streamline processes and improve compliance with regulatory mandates. The need for continuous monitoring and adaptive security measures is stressed as essential in today’s evolving threat landscape. Kochan concludes that as organizations continue to evolve their data security strategies, the focus should remain on creating resilient, comprehensive platforms that can adapt to future challenges in cybersecurity.

 

For Full Article, Click Here

If you are having issues loading your externally facing Lawson Portal, one way to troubleshoot is to set the logs to debug mode so that you can hopefully get more information about the errors.

 

In WebSphere Application Server admin on your internal server, click into the web server under Servers > Server Types > Web servers.

Click the web server name then Click “Plug-in properties”.

Change the “Plug-in logging” to Log Level “Debug”

Click “Apply” or “OK”.  Go back to the web server list, and select your web server using the checkbox.  Select “Generate Plug-in”.  Since your web server is external, there is no need to Propagate the plug-ins (this is a manual process).

When you generate the plug-in, the location will be displayed at the top of the screen.  Navigate to that location and copy the plugin-cfg.xml file.

Navigate to your external server and paste the plug-in file at <WebSphere Install Directory>/Plugins/config/<webserver name>

Perform an iisreset on the external web server.

Now your web server will be in debug mode, and you will get more detailed information in the plugin logs.

 

Ransomware has become a significant threat, with attackers increasingly targeting cloud environments. Subject expert Fredrik Forslund of Blanco shares an article on SC Media explaining why classifying cloud data can help organizations mitigate ransomware. One of the key strategies to mitigate this risk is through effective data classification, which allows organizations to identify and prioritize their most critical data. Enhanced classification involves categorizing data based on its sensitivity and importance to the organization. This process enables businesses to implement stronger security measures for their most valuable information. The article highlights various classification methodologies that can be used to assess data risk levels accurately. By understanding which data is most critical, organizations can take proactive steps to protect it, such as implementing advanced encryption and access controls. Forslund also emphasizes the role of continuous monitoring and updating of classification schemes to adapt to evolving threats. Moreover, it points out that proper data classification can aid in compliance with legal and regulatory requirements. Organizations that classify their data can ensure they are meeting necessary standards for data protection. The article concludes that as ransomware attacks continue to evolve, organizations must prioritize enhanced data classification. By doing so, they can not only reduce the risk of attacks but also improve their overall data management strategies. Ultimately, investing in data classification technologies and practices is essential for safeguarding cloud environments and ensuring business continuity.

 

For Full Article, Click Here

Problem:

You may come across an instance when the MSCM server log for the Picklist scheduler shows the following errors:

“Delta Processing Error: Unparseable date: “##########”

For input string: “####” Record not inserted”

 

This problem usually means that the shipments are not found on the handhelds – and it’s because of this error causing the missing information.

 

Resolution:           

To simply amend this, you will need to ensure that the Access flag in Lawson Security is set to “Y” when the ‘lawson’ (this is referring to the lawson.username from the mscm.filter.properties file) user has a requester. Once the setting is changed or confirmed, you should not come across this error anymore.

Many companies are migrating to new enterprise resource planning (ERP) systems. Whether it be to updated systems, a brand new system or a move to the cloud, there are many ways to elevate your integration strategy. Melissa Evatt, Editorial Assistant and writer for cloud platform and technology at ERP Today, shares an article about the importance of elevating your ERP integrations. Consultancy partner Rossera, for example, provides scalable integration solutions through a reusable, silo-free framework. Their approach is aligned with business objectives and incorporates governance mechanisms for effective lifecycle management on Oracle Integration Cloud. Rossera’s integration platform, Scaffold-Once, features built-in engineering enablement, central orchestration, monitoring capabilities, and pre-packaged solutions to streamline integration. Key benefits include the prevention of common integration pitfalls, adherence to best practices, enhanced developer productivity, expedited market delivery, and improved business outcomes. This strategy supports organizations in elevating their ERP integration efforts, ultimately boosting growth and competitiveness. Without a defined integration strategy, businesses may face issues such as integration sprawl, inconsistent standards, poor reusability, scalability challenges, technical debt, security vulnerabilities, and a lack of visibility and control. These challenges can complicate the integration landscape, leading to inefficiencies and obstructing collaboration within organizations. Whether you work with Rossera or another implementation partner, ensure that you are confident of your ERP strategy to fully fit your company’s needs.

 

For Full Article, Click Here

Question:

Is it by design that the Payroll ACH payments are automatically reconciled in PR85 (Bank Account Reconciliation)?

Why are the AP ACH not automatically reconciled in CB80 (Bank Transaction Adjustment)?

 

Answer:

There is a setting on the payment code that determines if the transactions are automatically reconciled. Inquire on CB00.4 (Bank Transaction Definition) for ACH and click on the Cash Payment button (CB00.7). Set Automatic Reconciliation to “Y”.

Then when you issue an ACH payment it will be automatically reconciled.  Payments that already exist in the system will not be affected by this change and will still need to be reconciled.