Using Spreadsheet Designer

Go to the field and do a Ctrl + shift and left click on your mouse, this will give you the Business class that you will need to have and the name of the field.  In this example we will be looking at the Employee business and the field Work Type

 

Let’s open up Excel and go to the Infor tab, and we will be doing a query. Go to the Insert Query and click on the drop down arrow

This box will appear, do a drop down and pick the environment name for your Data Area

 

In the second box, we will be typing in the business class, in this example it will be Employee

 

As you are typing in the second box the business class will appear

 

Now you see all the field that you can pick from under Employee Business Class. The ones that are Orange are required fields and need to be in your Query.  The Employee is the Employee ID number

 

We will be using for this example the following fields,

HROrganization

Employee

Name.FullPresentationName

 

Scroll down and pick

StartDate

Adjusted Start Date

Relationship to Org

Relationship Status and click on Insert

 

Go to the Employee and rich click on your mouse, pick Add to Filter

 

Go to the bottom of the Insert, and you will see Employee. Next to Employee, under Value enter your Employee ID number.

 

Like Below

 

Now click off that field

 

Go to Refresh at the top of the page by the Infor sign and do a drop down

 

We will be clicking on Refresh

 

This box will appear

Your Information will appear,

 

Now let add Work Type to our report, Find the Field Work Type and check the box,

Click on Refresh again and the Work Type Information will be part of your Report

 

 

At the heart of a business’s operations is usually an enterprise resource planning (ERP) system running all your processes. So how do you decide on the best one for your business. More importantly, how can you properly implement it with no hitch and run it with optimal performance? Forbes Council Member Madhavi Godbole, a seasoned expert in the field of ERP and the senior vice president at Apolisrises Inc., shares an article with her personal insights and lessons learned in implementing a successful ERP.

Lesson 1: Strategic Alignment And Clear Objectives. “One of the pivotal lessons I have learned pertains to the critical importance of strategic alignment and establishing clear objectives before embarking on any major technological initiative, particularly ERP implementation. It is imperative to align technology initiatives with overarching business goals and ensure every stakeholder comprehends the purpose and expected outcomes. By fostering a shared vision and understanding across the organization, leaders can mitigate resistance, streamline decision-making and cultivate a culture of collaboration conducive to successful ERP implementation.”

Lesson 2: Robust Change Management And Stakeholder Engagement. “Another indispensable lesson revolves around the necessity of robust change management and proactive stakeholder engagement throughout the ERP implementation process. Effective change management entails more than just technical proficiency; it necessitates empathetic leadership, open communication, and a keen awareness of organizational dynamics. Engaging stakeholders early and involving them in the decision-making process fosters a sense of ownership and buy-in, mitigating resistance and maximizing the likelihood of successful adoption. Additionally, fostering a culture of continuous learning and adaptation empowers teams to navigate challenges and capitalize on opportunities.”

Lesson 3: Iterative Approach And Continuous Improvement. “Lastly, my journey has underscored the value of adopting an iterative approach to ERP implementation and embracing a culture of continuous improvement. In today’s rapidly evolving business landscape, agility and adaptability are paramount. Rather than striving for perfection from the outset, organizations should prioritize incremental progress, leveraging feedback loops and agile methodologies to iteratively refine processes and enhance system capabilities. By embracing a mindset of continuous improvement, tech leaders can foster innovation and optimize performance. Looking back on my personal journey, during a large global ERP implementation, the significance of strategic alignment became unmistakably evident. In this implementation, the finance team emphasized strict budgetary controls and prioritized cost reduction measures, while the procurement team focused on optimizing supplier relationships and ensuring timely delivery of goods and services—with both departments advocating for divergent strategies. We had to champion an open dialogue and align our efforts with broader organizational goals in order to see the right way forward for the organization and merge the two departments’ goals.”

 

For Full Article, Click Here

Technology is ever-growing and will not slow down with new innovative methods any time soon. With new technologies or stronger technologies surfacing regularly, this becomes a concern for protecting your data from breaches in every new way possible. EY’s Emerging Tech at Work 2023 survey reveals that 89% of employees believe adopting emerging tech benefits their company. Still, cybersecurity risk can be a barrier to adoption. In the same survey, approximately 73% of employees are concerned about the cybersecurity risks associated with generative AI, and 78% worry about quantum computing. Additionally, only one in five executives see their organizations’ cybersecurity measures as effective for today and the future. Forbes Council Member, Steve Gickling and CTO of Calendar – a place for unified calendars and all your scheduling needs – shares an article depicting 4 effective ways you can defend your business from data breaches.

  1. Start with clear-cut training. “Combining upskilling and streamlined practices is often a solid approach to addressing the human element. If employees aren’t safeguarding their passwords, there’s probably a best practice they don’t fully understand. Teaching them how to recognize phishing attempts and social engineering tactics is a start, but it’s even better to educate them on why automated password management solutions simplify the use of internal technology and protect the organization.”
  2. Shield the cloud. “Organizations rely on cloud service providers for security, but that doesn’t mean those providers are necessarily protecting their clients’ data adequately. Anything from incorrect configurations to insufficient security permissions can leave a company vulnerable to cybercriminals seeking an opportunity. Auditing cloud providers and solutions can sort out who’s responsible for what. Find out what vulnerabilities providers see in their solutions and follow their recommendations on how to close the loopholes. Tech leaders can also consider implementing cloud monitoring and security software, which looks for potential issues. These vulnerabilities might be unauthorized users, a lack of data encryption and/or weak access controls. Monitoring software could also reveal whether data storage isn’t private, increasing its exposure to malicious actors.”
  3. Monitor for data leaks. “What if your employees are using the same passwords for both their personal and professional accounts? The leaked information could be from a vendor’s software platform. Cybercriminals are known to try exposed, easy-to-guess and common passwords. They may look at online org charts, hoping to find a match between a leaked personal password and an employee’s account. When implementing a data leak detection solution, workplaces need to find tools that will help them accomplish the best practices for their chosen software. To maximize the software they’ve established, a few key steps are to regularly train employees on using the most current version, constantly monitoring any potential risks and always maintaining secure processes to access the data.”
  4. Minimize data retention. “Storing data on your network comes with inherent risks, including the chance it will fall into unwanted hands. By only keeping what’s necessary, you can reduce the probability that sensitive data will become exposed. Enacting data retention procedures should thus be part of your organization’s critical cybersecurity plan. Another aspect to minimize is the locations where information is housed. Streamlining the amount of places the company stores data can reduce vulnerabilities. The fewer places sensitive information is, the less potential there is for exposure. As you condense data storage locations, however, be sure to keep close tabs on what data is being stored and where.”

 

For Full Article, Click Here

Problem:

You’re trying to generate a v10 Lawson Security Administrator (LSA) report and its stuck in “processing” status

 

Resolution:

Edit your GENDIR/java/command/lsserver.properties file (Back it up first).

 

Locate the following line:

ljx.ext.dirs=${GENDIR}/java/ext:${LAW_JAVA_HOME}/jre/lib/ext:${LAW_JAVA_HOME}/lib/ext

 

To incorporate the modification, append “${GENDIR}/java/impl:” so that it appears as follows:

 

ljx.ext.dirs=${GENDIR}/java/ext:${GENDIR}/java/impl:${LAW_JAVA_HOME}/jre/lib/ext:${LAW_JAVA_HOME}/lib/ext

 

Save the file.

 

After implementing this change, you will need to perform the following restarts:

  1. Stop your WebSphere application server or cluster for this environment.
  2. Stop the Lawson environment using the stoplaw command.
  3. Start the Lawson Environment using the startlaw command.
  4. Start the WebSphere application server or cluster for this environment.

Execute the report again to verify that it completes successfully.

 

When it comes to backing up your organization’s valuable data, many folks are either stuck in old less secure ways or are simply not backing them up correctly – or at all. The point of backing up data is to have it be restored in a company’s system if they lose it somehow either due to cybersecurity attacks, a natural disaster, or data center and system failures. Eric Herzog, Forbes Council Member and Chief Marketing Officer at Infinidat, shares an article explaining from an IT perspective how organizations should go about securing their backed up data. He states, “From an IT perspective, backup targets have usually been measured on how fast they are, their ability to reduce the amount of data backed up and how economical they are for storage. However, ransomware and malware attacks have recently been focusing on backup infrastructure, as well as data on primary storage… Cybercriminals have learned that, to be effective, they need to not only attack data on primary storage but also disrupt backup storage.” Attacking backup storage allows cybercriminals to make a company even more vulnerable when attacking their main servers as well. This would be difficult to nearly impossible for a company to recover from a cyberattack to your backup data. With these new, more sophisticated approaches to attacking backup storage, cybercriminals are slowly “poisoning” the copies of data. With this known tactic, IT leaders and Security divisions at companies are focusing on added cybersecurity to their backup data as well. “In light of this new threat scenario that virtually all enterprises now face, the backup storage needs to take on additional responsibilities, such as expediting near-instantaneous cyber recovery or hosting recoveries with a dual role,” says Herzog. “This is noteworthy because, even if backup storage fights off a ransomware or malware attack, the cyberattack may have already reached production data on IT systems and primary storage. Enterprises need a higher level of cyber resilience to ensure that they are equipped to handle ransomware, malware and other cyberattacks.” According to Herzog, cyber secure backup storage needs to incorporate the following capabilities: immutability of data, high availability, data encryption, multifactor authentication, automation or a certain level of artificial intelligence, and cyber storage guaranteed service level agreements (SLAs). He concludes that it is best to look for cyber secure backup storage that utilizes the same underlying operating system that facilitates speedy backups. This varies based on your specific enterprise’s requirements and you may need a software-defined system that maximizes available storage capacity and offers data deduplication, such as a purpose-built backup appliance. But for those enterprises that have a higher priority on the backup target hosting application and data recovery, Herzog notes that choosing a primary storage platform that is repositioned as a backup target is the more appropriate choice.

 

For Full Article, Click Here

So you ran the PR160 again and it went into recovery due to an ACH file path parameter not being correct.

 

We don’t want to delete this but we also want to resolve it so we can recover it quickly.

 

To do this, perform a jobdump on this specific job:

jobdump -d -o Job -v JobName PR160JOBNAME -v UserName YourUSERNAME YourUSERNAME_dmp.txt

 

Once you dump this job, edit it in notepad or notepad++ and locate the incorrect path, example below:

 

Update this path ONLY to what you need it to be and use jobload to reload it:

jobload -c -o Job YourPR160JOBNAME.txt

 

Then recover the job and it should put the file in the correct path.

 

Artificial Intelligence (AI) is already providing value to businesses in ways that may not be obvious. Walter Sun, Global head of artificial intelligence at SAP, shares a great read on ERP Today about how much value AI is providing for your business. One example he shares is German retailer Lidl saw significant improvements like 15% better inventory management and 20% decrease in waste by bringing in historical business data, consumer sentiment, financial information and weather forecasts to better predict demand in their stores. SAP has also launched an AI tool called Joule which can answer complex business questions by analyzing company data. A user could ask how to improve store performance and Joule would generate an answer combining relevant information from different sources. While AI capabilities like generating art or text seem impressive, the real value lies in using data to enhance decision making and boost business performance. As supply chain management, manufacturing and customer experience all benefit from AI, it will allow any employee to access trusted insights without needing analytical expertise. The future potential for AI adoption across industries is huge. If implemented responsibly, Sun explains, AI could transform industries in coming years by enabling more accurate short-term forecasting, proactive disruption mitigation, optimized manufacturing while reducing inventory costs, and truly personalized customer experiences. Emerging regulations will provide guidance to build trust as AI gradually integrates into workplaces. Developers also need to center people, focus on customers’ critical processes, leverage real business data and take ethics seriously.

 

For Full Article, Click Here

Infor Nexus VP of product marketing and strategy Heidi Benko this month became the recipient of 2024 Pros to Know Award by Supply & Demand Chain Executive. This award recognizes outstanding executives whose accomplishments offer a roadmap for other leaders looking to leverage supply chain for competitive advantage. Marina Mayer, editor-in-chief of Food Logistics and Supply & Demand Chain Executive, comments, “Many of today’s supply chain pros are more than just leaders within their space; they’re innovators, decision makers, pioneers of change and growth. They’ve spent the last year (and more) creating safer, more efficient supply chains. New this year, we broke the award down into four distinct categories: Top Warehousing Stars; Top Procurement Stars; Rising Stars; and Lifetime Achievement. These winners continue to go above and beyond to overcome challenges, advance supply chain management and make the impossible, possible.” Per the news release, Benko has been an integral part of the Infor Nexus team to champion sustainability and social responsibility top priorities across the supply chain. She works closely with customers, prospects, industry leaders and analysts to drive greater awareness of how the unique, single-instance global supply chain platform can help companies run more efficient, profitable and sustainable supply chains.

 

For Full Article, Click Here

When you’re logged into Lawson, in order to compile all the programs invoked by one program, make sure that the syntax reads: lstinvk -q <pdl> <program>.

 

By doing this it will compile anything that is invoked by the program. After, you do this, then you will need to also compile the program itself. (See screenshot below for reference)

 

That’s all there is to it!

Steve Banker, Vice President of Supply Chain Services at ARC Advisory Group, shares a post on Forbes summarizing Infor’s strategy for differentiating their solutions at the Innovation Summit held on March 18-19th.  According to Banker, several top executives laid out Infor’s strategy for differentiating their solutions based on their approach to technology, product development, and customer service. Infor, with anticipated revenues of $3.4 billion for 2024, is the third largest supplier of enterprise resource planning software applications. Below is a summary of topics covered and  the tech giant’s approach to each one.

Infor’s Approach to Industry Specific Solutions. “The ERP market is making the transition to the Cloud. ERP firms like Infor, Oracle, and SAP – or supply chain software companies – like Manhattan Associates and Blue Yonder – have produced multitenant cloud solutions. Some of these companies are further along in their journey to convince their customers to move to a multi-tenant solution than others. Multi-tenancy, also known as ‘public cloud,’ is a software architecture where multiple instances of an application run on the same physical server. A public cloud solution has two key advantages. It can be much quicker to implement, so customers have a quicker payback period. Customers can also continue to get new functionality without going through a painful upgrade process. With traditional software, the upgrade process was so painful that many companies rarely, if ever, upgraded. But for customers to fully achieve these benefits, they need to commit to forgoing customization. Increasingly, large enterprises have decided to do just that. But where Infor is different from the largest ERP suppliers in the market is that instead of building one public cloud solution that serves all their customers, they have built three separate public cloud solutions. Each public cloud solution is designed to support a limited number of industries.”

 

Infor Success Teams. “Infor has developed customer success teams. A customer has a dedicated team that is headed up by a person with deep knowledge of the customer’s industry. The team is evaluated, in part, based on their ability to generate value for that customer over time. These teams’ job is to ask, “did the customer achieve the return on investment they were aiming for with their implementation?” Before an implementation begins, the potential is mapped. Industry best practice processes will be examined. If the customer commits to this out of the box process, what is the value they will gain? The value derived from the implementation will depend upon the customer achieving certain key performance indicators or key value indicators across all the ‘best practice’ processes. The software architecture allows the value to be measured and those metrics are visible to both the customer and the success team.”

 

Laying the Groundwork for Customer Success. “The customer success program, while more complete, does not sound radically different then what other software vendors have described as how they work with key customers. What is different is that the groundwork for achieving success is laid out during the sales process. “The implementation really starts in the sales cycle,” Frank Resink, the executive vice president of professional services, said. For food & beverage, Infor has up to 900 processes. They go through these processes with potential customers and define the value drivers. Infor works with the customer to validate which out of the box process will drive value and identify which out of the box processes would need to be adapted.”

 

Is the New Approach Working? “So, is this new approach, which is continuing to be scaled up to include more and more customers, really working? It is working for Infor. Solutions based on the public cloud – software as a service customers – have grown at a compound annual growth rate of 28.3% over the past three years. According to the company, for many customers, the speed of the implementation is now often limited by a customer’s ability to handle culture change rather than by integration, data cleansing, or configuration hurdles. There is also evidence it is working for customers. In 2020, Infor SaaS customers had an attrition rate of 8.4%. By 2023, attrition among these customers had fallen to 3.2%. Infor’s strategy for differentiating their business from competitors like SAP and Oracle is to be more industry focused. That industry focus, in turn, supports a truly differentiated approach to ensuring that their customers get ongoing value from the business applications they have purchased.”

 

For Full Article, Click Here