Implementing a new enterprise resource planning (ERP) system is a huge project to undertake. When done right, an ERP system could positively boost your business processes. When done wrong – which unfortunately happens more often than not – additional time, money and resources hit you hard. You should be fully prepared for any roadblocks and obstacles that occur during an ERP project. Chris Lewis, Vice President of Solution Consulting, shares an article on ERP Today that discusses the common pitfalls associated with enterprise resource planning (ERP) implementations. It begins by highlighting that many organizations view ERP projects as a necessary step, often without fully understanding the implications. Lewis argues that instead of rushing into a comprehensive ERP overhaul, companies should assess their unique needs and address specific issues first. Organizations frequently underestimate the complexity involved in ERP projects, which can lead to failures and budget overruns. It emphasizes that companies must prioritize clear communication and alignment among stakeholders before initiating any ERP project. The importance of defining measurable goals and outcomes is underscored, as is the need to ensure that all employees understand the changes and their roles within the new system. Lewis suggests that organizations should consider alternative solutions, such as modular or smaller-scale implementations, that can be more easily managed and adapted over time. This approach allows businesses to remain flexible and responsive to changing market demands without becoming overwhelmed by a large-scale implementation. Additionally, Lewis advises companies to invest in change management strategies, providing training and support to users to facilitate smoother transitions. Involving end-users early in the process can help identify potential resistance and address concerns proactively. The article also highlights the importance of choosing the right technology partner, as their experience can significantly impact the project’s success. Lewis underscores the need for continuous evaluation and adaptation throughout the ERP implementation process. Rather than viewing ERP as a one-time project, organizations should adopt a mindset of ongoing improvement. By doing so, they can enhance their operational efficiencies and ultimately achieve better business outcomes. The conclusion reiterates that a strategic, focused approach is crucial for ERP success, rather than a blanket implementation of new systems.

 

For Full Article, Click Here

We recently had an issue with a new install where all batch jobs were going into recovery with the error “Unable to log in <username>”.  The can often be attributed to an incorrect password in the BATCH privileged identity, but in this case it was due to a typo in lajs.cfg.  The “RUNUSERKEY” field was misspelled.  So, if you ever encounter this issue, you can save yourself some time and get a couple of sets of eyes on the lajs.cfg file!  After making the change, reboot the Lawson server or stop/start services. You should now be able to log in.

 

 

Ron Teegarden, Regional Manager at Rimini Street, shares an article on SDCEXEC.com exploring the emerging trends in manufacturing ERP (Enterprise Resource Planning) systems, highlighting their benefits for businesses. Manufacturers are increasingly turning to advanced ERP solutions to enhance operational efficiency and agility. The shift towards cloud-based ERP systems allows for greater flexibility and scalability, accommodating the ever-changing needs of manufacturing environments. Integrating Artificial Intelligence (AI) and machine learning into ERP systems is also gaining traction, facilitating smarter data analysis and improved decision-making processes. This integration enables manufacturers to predict trends, optimize inventory levels, and enhance supply chain management. Moreover, ERP systems are becoming more user-friendly, incorporating intuitive interfaces that improve user experience and reduce training time. Mobile accessibility is another significant trend, allowing employees to access systems remotely, thereby increasing productivity. Data security is a crucial consideration, prompting manufacturers to adopt robust cybersecurity measures within their ERP frameworks. Additionally, sustainability is becoming a key focus, with ERP systems helping manufacturers track and manage their environmental impact. Teegarden emphasizes the importance of choosing an ERP solution that aligns with a company’s specific needs and goals. Companies are encouraged to adopt ERP systems that facilitate real-time data sharing and collaboration across departments. Lastly, the transition towards digital transformation in manufacturing underscores the necessity of ERP systems in maintaining competitive advantage. Overall, the article showcases how embracing these trends can lead to improved efficiency, better decision-making, and enhanced overall performance for manufacturers.

 

For Full Article, Click Here

Infor recently announced that Gartner® Inc. has positioned the tech giant, for the fourth consecutive time, as a Leader in the 2024 Gartner Magic Quadrant™ for Cloud ERP for Product-Centric Enterprises. Infor’s position as one of the Leaders in this Gartner Magic Quadrant is based on the Gartner evaluation of Infor’s ability to execute and completeness of vision. Soma Somasundaram, Infor president and CTO, comments, “We’re honored to be recognized by Gartner as a Leader in the Magic Quadrant for the fourth consecutive year. We feel that this placement reaffirms our role as a leading provider in the enterprise software market, driven by our commitment to a platform-first approach layered with industry-specific cloud applications. Infor’s consistent positioning reflects our dedication not only to future-focused innovation but also to delivering tangible, industry-specific advancements that empower our customers to operate more efficiently and achieve their goals faster. Per the press release, in its 2024 Magic Quadrant for Cloud ERP for Product-Centric Enterprises, Gartner notes that, AI and GenAI are at the forefront of the more significant innovation in ERP. These capabilities allow organizations a new way to consume applications. “The embedded intelligence found in packaged ERPs are evolving to the point where the solutions can act with autonomy. The embedded intelligence will become more pervasive to augment or automate work and create more intuitive user experiences.”

 

For Full Article, Click Here

When it comes to IPA security access, you can assign the following Lawson delivered roles to IPA users:

 

Delivered role Intended for use by Contains these security classes
InbasketUser_ST Normal end-users who receive work items in the Inbasket BasicProductLineAccess_ST

ProductLineAccess_ST

InbasketUser_ST

Lpa_ST

ProcessSchedulingAllAccess_ST

JobQueueServer_ST Users who must perform actions on the Landmark job queue. BasicProductLineAccess_ST

ProductLineAccess_ST

JobQueueAccess_ST

ProcessDesigner_ST Process developers BasicProductLineAccess_ST

ProductLineAccess_ST

Lpa_ST

ProcessDesigner_ST

ProcessSchedulingAllAccess_ST

ProcessServerAllAccess_ST IPA system administrators BasicProductLineAccess_ST

ProductLineAccess_ST

Lpa_ST

LpaAdmin_ST

ProcessServerAllAccess_ST

ProcessSchedulingAllAccess_ST

ScheduledActionsAccess_ST

ProcessServerReadAccess_ST IPA assistant administrators, power users, developers ProductLineAccess_ST

ProcessServerReadAccess_ST

 

These days, business processes get more and more complicated in both the hardware and software level. Simon Quicke, Microscope Editor – TechTarget, shares an article about the benefits that managed service providers (MSPs) are capitalizing on due to the increasing demand for security services among their customers. There has been a marked rise in interest in cybersecurity solutions, driven by growing threats and regulatory pressures. Customers are now seeking comprehensive security offerings, and MSPs are strategically positioning themselves to meet these needs. The shift towards hybrid work environments has also heightened awareness of security vulnerabilities, prompting organizations to reinforce their defenses. Quickes notes that MSPs are responding to this demand by expanding their security portfolios and enhancing their capabilities. This includes investing in advanced tools and technologies to better protect client data and systems. Many MSPs are forming partnerships with cybersecurity vendors to offer robust solutions. Education and awareness campaigns are becoming common as MSPs aim to guide clients through the complexities of cybersecurity. Customer trust is crucial and MSPs are striving to build long-lasting relationships by delivering reliable security services. Additionally, the integration of security into the overall managed service approach is becoming standard practice. The growth in cybersecurity demand is also reflected in the financial performance of many MSPs. However, the increasing complexity of security challenges requires MSPs to continually innovate and adapt. This often translates to scalability and flexibility in their service offerings. As security becomes a key differentiator in the market, MSPs that can effectively address these demands are likely to thrive. The article concludes by stressing the importance of certifications and ongoing training for MSP staff to stay updated on the latest threats and solutions. Overall, the current landscape presents significant opportunities for MSPs to enhance their services and grow their business in the security domain.

 

For Full Article, Click Here

Searching JXplorer can be cumbersome when you have thousands of Lawson users and possible issues with “rogue” or “orphaned” identities being stored when trying to update identity information.

Below we are going to show how you can easily search for this information vs manually scanning thousands of users.

 

First Select the part of the LDAP tree to search from:

CTRL + F

 

Notice the “Starting Searching From” field, this search will search all trees below this.

Now go into your Text Filter tab and type in parenthesis the field and value you want, click search

 

It will automatically switch to the Results field and show your results:

You can then do another search within these results or go back to Explorer tab and CTRL+F again and it will bring your previous search up.

You can also get creative and search multiple fields and values with an “OR” search:

(|(cn=*jon.doe*)(mail=*jon.doe*)(uid=*jon.doe*)(lwsnssoListOfIDs=*jon.doe*))

This is an AND search:

(&(cn=*jon.doe*)(mail=*jon.doe*)(uid=*jon.doe*)(lwsnssoListOfIDs=*jon.doe*))

 

The | means OR, & means AND. So each field cn, mail, uid etc. have to all bring back a result for it to work. It’s best to use an OR search on average.

Remember, you can also save your searches:

As mentioned above, this is especially useful when finding users in JXplorer to remove any duplicate or “orphaned” RMIDs and Identities not showing up in Lawson Security.

 

Good luck!

The increasing importance of security measures in the digital age highlight the financial implications of cyber threats. Chief Information Security Officers (CISOs) are encouraged to view cybersecurity as a strategic investment rather than a cost center. Tech and business expert Karthik Swarnam, shares an article on MSN and TechRadar on how to maximize cybersecurity return on investment (ROI). The article discusses suggests assessing risk management frameworks to identify critical areas for investment. Establishing clear metrics for evaluating cybersecurity performance is essential. The article recommends leveraging data analytics to measure the effectiveness of security initiatives. Collaboration across departments is crucial for creating a unified approach to security. Engaging with stakeholders can ensure alignment with business objectives and demonstrate the value of cybersecurity investments. The article promotes the idea of continuous education and training for staff to enhance overall security posture. It suggests prioritizing initiatives based on potential ROI and aligning investments with business risks. Furthermore, benchmarking against industry standards can provide insights into effective practices. The use of automated tools is recommended to streamline processes and improve efficiency. Additionally, building a robust incident response plan can minimize losses when breaches occur. The article underscores the need for CISOs to communicate successes to executive leadership, showcasing the value added through security programs. Establishing a strong partnership with IT and incorporating security into the software development lifecycle are also key recommendations. Lastly, adopting a proactive rather than reactive approach can lead to better cybersecurity outcomes and maximize investment efficiency. By focusing on these best practices, CISOs can significantly enhance their organization’s cybersecurity ROI.

 

For Full Article, Click Here

Kris Blackmon, partner marketing director at AvePoint, shares an article on ChannelFutures.com highlighting the critical role of managed service providers (MSPs) and how they help strengthen your organization’s data governance. The article discusses the importance of data governance for Managed Service Providers (MSPs) as data management becomes increasingly critical in today’s digital landscape. It emphasizes three key services that MSPs should provide to enhance their data governance offerings. Firstly, the article introduces data classification, which involves identifying and categorizing data based on its sensitivity and importance. This helps organizations understand their data landscape and manage risks effectively. Secondly, it highlights data lifecycle management, which ensures data is appropriately handled throughout its life—from creation to disposal. Proper lifecycle management helps maintain compliance and reduces the risk of data breaches. Thirdly, the article addresses data protection, emphasizing the need for robust cybersecurity measures to safeguard sensitive information. MSPs must offer solutions that include encryption, backup, and disaster recovery systems. Additionally, the article underscores the role of compliance in data governance. MSPs must keep abreast of the regulatory landscape and help clients navigate complex compliance requirements. By providing these services, MSPs can enhance their value proposition and build stronger client relationships. Furthermore, the article suggests that a proactive approach to data governance can help organizations avoid costly penalties associated with non-compliance. The need for transparency and accountability in data handling is also discussed. Effective data governance frameworks contribute to organizational trust and can enhance reputation. The article concludes by urging MSPs to invest in these key data governance services to stay competitive in a rapidly evolving market. Overall, the focus is on how empowering MSPs with the right tools and strategies can lead to better data governance and improved business outcomes for their clients.

 

For Full Article, Click Here

To do a full manual recompile of a Lawson Program, follow these simple steps:

  1. Open a LID session
  2. Navigate to <LAWDIR>/<prodline>/map/default
  3. Run the command scrgen <prodline> <system code> <program code>
    1. for example: scrgen prod PO PO54
  4. Run the command xscrgen <productline> <program code>
    1. For example: xscrgen prod PO PO54
  5. Run the command lstinvk -q <prodline> <program code>
    1. For example: lstinvk -q prod PO54
  6. Run the command qcompile <prodline> <system code> <program code>
    1. For example: qcompile prod PO PO54
  7. Use the command qstatus to check the status of the compile

 

Once the compile is complete, check your program again. That’s all there is to it!